WorldWideScience

Sample records for dense mobile ad

  1. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  2. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  3. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  4. Adaptive Probabilistic Broadcasting over Dense Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Victor Gau

    2010-01-01

    Full Text Available We propose an idle probability-based broadcasting method, iPro, which employs an adaptive probabilistic mechanism to improve performance of data broadcasting over dense wireless ad hoc networks. In multisource one-hop broadcast scenarios, the modeling and simulation results of the proposed iPro are shown to significantly outperform the standard IEEE 802.11 under saturated condition. Moreover, the results also show that without estimating the number of competing nodes and changing the contention window size, the performance of the proposed iPro can still approach the theoretical bound. We further apply iPro to multihop broadcasting scenarios, and the experiment results show that within the same elapsed time after the broadcasting, the proposed iPro has significantly higher Packet-Delivery Ratios (PDR than traditional methods.

  5. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  6. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  7. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  8. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  9. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  10. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  11. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  12. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  13. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  14. Value Added Services and Adoption of Mobile Payments

    DEFF Research Database (Denmark)

    Augsburg, Christel; Hedman, Jonas

    2014-01-01

    In this paper, we investigate the role of Value Added Services (VAS) in consumers’ adoption of mobile payments. VAS are supplementary digital services offered in connection with mobile payments; in this study exemplified by receipts, loyalty cards, and coupons. A research model is derived from...... that intention to adopt mobile payments increases as VAS are introduced and that this increase comes from a positive change in Perceived Usefulness, compatibility, and Convenience....

  15. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  16. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  17. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  18. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  19. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  20. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  1. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...

  2. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  3. What Makes Consumers Recall Banner Ads in Mobile Applications

    Directory of Open Access Journals (Sweden)

    Mesut Çiçek

    2017-09-01

    Full Text Available The uses of mobile advertisements are increasing their popularity across the world. Companies can gather information about the mobile users based on their locations, lifestyle, and preferences via GPS, cookies and browsing history and embed highly personalized banner ads in mobile applications. However, in the literature there is hardly any work on the effectiveness of these highly personalized in-app banner ads. The aim of the study is to reveal which factors affect the effectiveness of in-app banner ads. An experimental study was designed and 209 subjects participated. The results of Ordinal Logistic Regression indicated that prior brand attitude and attitude towards application have a positive effect, while brand engagement with self-concept has a negative effect on the recall of in-app banner ads. Moreover, in-app banner ads are recalled more when they are located in landscape applications and positioned at the top part of the screen. This research provides some implications for future studies and practitioners.

  4. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  5. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  6. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  7. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  8. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  9. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model....... The predictive accuracy of the model is monitored and used to update the model dynamically. The results indicate the framework may be useful for the optimization of dynamic systems of high dimension....

  10. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  11. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  12. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  13. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  14. The added value of contrast enhanced spectral mammography in identification of multiplicity of suspicious lesions in dense breast

    Directory of Open Access Journals (Sweden)

    Amr Farouk Ibrahim Moustafa

    2018-03-01

    Full Text Available Objective: To evaluate the additive value of Contrast Enhanced Spectral Mammography (CESM in the preoperative assessment of malignant lesions in dense breast parenchyma regarding multiplicity. Material and methods: The study included 160 women having heterogeneous dense breast parenchyma (ACR c and d with suspicious lesions identified on sono mammography examination. All patients performed contrast enhanced spectral mammography to confirm or exclude lesion multiplicity. The number of lesions was calculated in the contrast high energy subtraction images with the reference standard being histopathological analysis. Results: Adding CESM to sono-mammography the accuracy in identifying multiple malignant lesion increased from 81.8% accuracy of sono-mammography up to 100% accuracy after adding CESM. Conclusion: Contrast enhanced spectral mammogram showed an added value in the preoperative assessment of breast masses increasing the accuracy of detection of lesions and multiplicity (multifocality and multi-centricity. Keywords: Breast cancer, Contrast enhanced spectral mammogram

  15. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  16. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  17. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  18. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  19. Processing and characterization of 3D dense chitosan pieces, for orthopedic applications, by adding plasticizers

    OpenAIRE

    Figueiredo, Lígia; Moura, Carla; Pinto, Luís F. V.; Ferreira, Frederico Castelo; Rodrigues, Alexandra

    2015-01-01

    In this work, plasticizer agents were incorporated in a chitosan based formulation, as a strategy to improve the fragile structure of chitosan based-materials. Three different plasticizers: ethylene glycol, glycerol and sorbitol, were blended with chitosan to prepare 3D dense chitosan specimens. The properties of the obtained structures were assessed for mechanical, microstructural, physical and biocompatibility behavior. The results obtained revealed that from the different specimens prepare...

  20. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  1. Les Protocoles de routage dans les réseaux mobiles Ad Hoc ...

    African Journals Online (AJOL)

    Dans cet article nous présentons un état de l'art sur les protocoles de routage dans les réseaux mobiles Ad hoc. Mots clés : Réseaux mobiles ad hoc/, Protocoles de routage. Routing protocols in wireless mobile ad hoc networks. Abstract:The communication between users with handheld computers interconnected through ...

  2. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  3. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  4. Sensor Sharing in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  5. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    aerial vehicle VANET vehicular ad hoc network VoIP Voice over Internet Protocol VRR Virtual Ring Routing xiii EFFECTS OF DATA REPLICATION ON DATA...ad hoc networks in mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and flying ad hoc net- works (FANETs). Much of the research...metric, such as capacity, congestion , power, or combinations thereof. Caro refers to two different types of ants, FANTs and BANTs which are analogous to

  6. FHWA White Paper on Mobile Ad Hoc Networks

    Science.gov (United States)

    2018-01-01

    Advanced next generation communications technologies offer the potential to greatly improve safety, system efficiency, and mobility across our Nations roadways. These new technologies and processes can address both traditionally difficult as well ...

  7. Simplified Multicast Forwarding in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Macker, Joseph P; Dean, Justin; Chao, William

    2004-01-01

    ...) based upon flooding mechanisms. We present the design of a working experimental prototype and some initial performance results using the NRL mobile network emulation system and various optional flooding approaches within the design framework...

  8. Diabetes and Orientation and Mobility Training: An Added Challenge.

    Science.gov (United States)

    Kozel, B.

    1995-01-01

    Issues related to promoting orientation and mobility training for individuals with visual impairments and diabetes are discussed, including effects of insulin, hypoglycemia and hyperglycemia, the timing of training, complications to the feet, and fluctuations in vision. Major lifestyle changes required by diabetes are stressed. (Author/SW)

  9. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  10. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  11. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  12. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  13. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  14. Impact of mobility on the performance of relaying in ad hoc networks (Extended version)

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E.

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  15. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  16. Impact of mobility on the performance7 of relaying in ad hoc networks – Extended version

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  17. Ad-me: Intelligent Context-Sensitive Advertising within a Mobile Tourist Guide.

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector is set to witness phenomenal growth. In particular context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the mobile e-commerce user) system which proactively delivers advertisements to users. Within the context of a mobile tourist guide advertisements are presented relative to user location and perceived needs. It uses Global Positioning System (GPS) and embraces agent-oriented design p...

  18. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  19. Mobile home automation-merging mobile value added services and home automation technologies

    OpenAIRE

    Rosendahl, Andreas; Hampe, Felix J.; Botterweck, Goetz

    2007-01-01

    non-peer-reviewed In this paper we study mobile home automation, a field that emerges from an integration of mobile application platforms and home automation technologies. In a conceptual introduction we first illustrate the need for such applications by introducing a two-dimensional conceptual model of mobility. Subsequently we suggest an architecture and discuss different options of how a user might access a mobile home automation service and the controlled devices. As another contrib...

  20. A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Niranjan Kumar Ray

    2016-01-01

    Full Text Available We proposed an energy conservation technique called Location Based Topology Control with Sleep Scheduling for ad hoc networks. It uses the feature of both topology control approach and power management approach. Like the topology control approach, it attempts to reduce the transmission power of a node, which is determined from its neighborhood location information. A node goes to sleep state based on the traffic condition as that of power management approach. In the proposed scheme, a node goes to sleep state only when its absence does not create local partition in its neighborhood. We preformed extensive simulation to compare the proposed scheme with existing ones. Simulation results show that the energy consumption is lower with increase in the network lifetime and higher throughput in the proposed scheme.

  1. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  2. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  3. Mobility-Aware Modeling and Analysis of Dense Cellular Networks With $C$ -Plane/ $U$ -Plane Split Architecture

    KAUST Repository

    Ibrahim, Hazem

    2016-09-19

    The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number of users associated with each BS, leading to an improved spatial frequency reuse and spectral efficiency, and thus, higher network capacity. However, the densification gain comes at the expense of higher handover rates and network control overhead. Hence, user’s mobility can diminish or even nullifies the foreseen densification gain. In this context, splitting the control plane ( C -plane) and user plane ( U -plane) is proposed as a potential solution to harvest densification gain with reduced cost in terms of handover rate and network control overhead. In this paper, we use stochastic geometry to develop a tractable mobility-aware model for a two-tier downlink cellular network with ultra-dense small cells and C -plane/ U -plane split architecture. The developed model is then used to quantify the effect of mobility on the foreseen densification gain with and without C -plane/ U -plane split. To this end, we shed light on the handover problem in dense cellular environments, show scenarios where the network fails to support certain mobility profiles, and obtain network design insights.

  4. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  5. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    Science.gov (United States)

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  6. Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach

    OpenAIRE

    Gavalas, Damianos; Pantziou, Grammati; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this work, we introduce an efficient distributed clustering algorithm that uses both location and energy metrics for cluster formation. Our proposed solution mainly addresses cluster stability, manageability and energy efficiency i...

  7. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  8. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...

  9. Model-based prototyping of an interoperability protocol for mobile ad-hoc networks

    NARCIS (Netherlands)

    Kristensen, L.M.; Westergaard, M.; Norgaard, P.C.; Romijn, J.; Smith, G.; Pol, van de J.

    2005-01-01

    We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for the specification of an interoperability protocol for routing packets between fixed core networks and mobile ad-hoc networks. The

  10. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  11. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  12. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  13. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  14. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  15. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  16. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

    OpenAIRE

    Shahram Behzad; Reza Fotohi; Shahram Jamali

    2013-01-01

    Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destination...

  17. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  18. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  19. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  20. Effect of grain mobility on ionic conductivity of Ceria added YSZ electrolyte

    International Nuclear Information System (INIS)

    Gupta, Alka; Omar, Shobit; Balani, Kantesh

    2012-01-01

    In an effort to develop novel electrolyte materials, the present work explores the effect of grain boundary mobility on ionic conductivity of CeO 2 -YSZ electrolyte. For cubic zirconia in general, the higher the grain boundary mobility, the lower the activation energy for oxide ion migration and judicious doping can be an effective method for mobility control. The two main directions for fabricating 8 mol. % YSZs (8YSZ) with 0,5 and 10 wt % CeO 2 are being followed: (i) co doping by conventional sintering (CS, 1400 ℃, 4h holding, ∼98 % theoretical density), and (ii) nano composite approach by spark plasma sintering (SPS, 1200 ℃, 5 min holding, ∼96 % theoretical density). Phase analysis by XRD, indicates that CeO 2 forms the complete solid solution with YSZ when synthesized by CS and both solid solution and composite formation (seen as isolated ceria rich zones in YSZ matrix by EDS analysis via TEM) by SPS. The grain boundary mobility for CS samples of pure and 10%CeO 2 added YSZ are 6.69 x 10 -18 to 10.35 X 10 -18 m 3 /N/s respectively. While for SPS sintered samples of pure and 10% CeO 2 added YSZ the grain boundary mobility comes out to be ∼0.032 X 10 -18 to 0.039 X 10 18 m 3 /N/s respectively. Grain mobility does not show any marginal change with increasing ceria content, elicit that the defect concentration is nearly constant in 8YSZ and is insensitive to ceria content. Remarkable increase of grain mobility in the SPS samples is attributed to rapid grain coarsening in the nano-grains limited to shorter sintering times. As expected, grain mobility for longer-times average out the transient phase and lower the net grain mobility such as in CS samples. The enhanced mobility in CeO 2 -YSZ SPS sintered electrolytes must be due to lower cation migration energy (activation energy for oxide ion migration), promoting enhanced ionic conductivity. (author)

  1. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  2. Revenue-sharing analysis in the mobile value-added services

    Institute of Scientific and Technical Information of China (English)

    LIU Bing; TANG Shou-lian

    2006-01-01

    This article provides a framework e within which the revenue-sharing in mobile value-added services can be analyzed.It shows that the revenue-sharing ratio between a network operator and a content provider (CP) has no significant effect on prices, market shares or social welfare in the case of nonstandardization. This implies that the revenue-sharing ratio cannot be used as a policy variable.

  3. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  4. Context dependent off loading for cloudlet in mobile ad-hoc network

    Science.gov (United States)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  5. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  6. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  7. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  8. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  9. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    Science.gov (United States)

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  10. Analysis of foliage effects on mobile propagation in dense urban environments

    Science.gov (United States)

    Bronshtein, Alexander; Mazar, Reuven; Lu, I.-Tai

    2000-07-01

    Attempts to reduce the interference level and to increase the spectral efficiency of cellular radio communication systems operating in dense urban and suburban areas lead to the microcellular approach with a consequent requirement to lower antenna heights. In large metropolitan areas having high buildings this requirement causes a situation where the transmitting and receiving antennas are both located below the rooftops, and the city street acts as a type of a waveguiding channel for the propagating signal. In this work, the city street is modeled as a random multislit waveguide with randomly distributed regions of foliage parallel to the building boundaries. The statistical propagation characteristics are expressed in terms of multiple ray-fields approaching the observer. Algorithms for predicting the path-loss along the waveguide and for computing the transverse field structure are presented.

  11. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  12. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  13. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  14. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  15. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  16. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  17. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  18. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  19. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Mansour Sheikhan

    2012-06-01

    Full Text Available Mobile ad-hoc network (MANET is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and increase the reliability, security and lifetime of network. However, selecting an optimal multipath is an NP-complete problem. In this paper, Hopfield neural network (HNN which its parameters are optimized by particle swarm optimization (PSO algorithm is proposed as multipath routing algorithm. Link expiration time (LET between each two nodes is used as the link reliability estimation metric. This approach can find either node-disjoint or link-disjoint paths in singlephase route discovery. Simulation results confirm that PSO-HNN routing algorithm has better performance as compared to backup path set selection algorithm (BPSA in terms of the path set reliability and number of paths in the set.

  20. An Opportunistic Routing for Data Forwarding Based on Vehicle Mobility Association in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Leilei Wang

    2017-11-01

    Full Text Available Vehicular ad hoc networks (VANETs have emerged as a new powerful technology for data transmission between vehicles. Efficient data transmission accompanied with low data delay plays an important role in selecting the ideal data forwarding path in VANETs. This paper proposes a new opportunity routing protocol for data forwarding based on vehicle mobility association (OVMA. With assistance from the vehicle mobility association, data can be forwarded without passing through many extra intermediate nodes. Besides, each vehicle carries the only replica information to record its associated vehicle information, so the routing decision can adapt to the vehicle densities. Simulation results show that the OVMA protocol can extend the network lifetime, improve the performance of data delivery ratio, and reduce the data delay and routing overhead when compared to the other well-known routing protocols.

  1. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  2. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  3. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  4. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  5. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  6. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  7. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  8. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  9. An Automated Tool for the Creation of Desired Emulated Topologies of a Mobile Ad-Hoc Network

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research effort that the U.S. Army Research Laboratory conducted in FY 2005 in support of the development of advanced technologies for tactical mobile ad hoc networks (MANET...

  10. The added value of a gaming context and intelligent adaptation for a mobile application for vocabulary learning

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; Hoogendoorn, P.

    2014-01-01

    Two groups participated in a study on the added value of a gaming context and intelligent adaptation for a mobile learning application. The control group worked at home for a fortnight with the original Mobile English Learning application (MEL-original) developed in a previous project. The

  11. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  12. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  13. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  14. Approaches to Addressing Service Selection Ties in Ad Hoc Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ayotuyi Tosin Akinola

    2018-01-01

    Full Text Available The ad hoc mobile cloud (AMC allows mobile devices to connect together through a wireless connection or any other means and send a request for web services from one to another within the mobile cloud. However, one of the major challenges in the AMC is the occurrence of dissatisfaction experienced by the users. This is because there are many services with similar functionalities but varying nonfunctional properties. Moreover, another resultant cause of user dissatisfaction being coupled with runtime redundancy is the attainment of similar quality computations during service selection, often referred to as “service selection ties.” In an attempt to address this challenge, service selection mechanisms for the AMC were developed in this work. This includes the use of selected quality of service properties coupled with user feedback data to determine the most suitable service. These mechanisms were evaluated using the experimental method. The evaluation of the mechanisms mainly focused on the metrics that evaluate the satisfaction of users' interest via the quantitative evaluation. The experiments affirmed that the use of the shortest distance can help to break selection ties between potential servicing nodes. Also, a continuous use of updated and unlimited range of users' assessments enhances an optimal service selection.

  15. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  16. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  17. A Performance Evaluation Model for Mobile Ad Hoc Networks and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-03-01

    Full Text Available Potential applications in areas such as military sites and disaster relief fields that are characterized by absence of prefixed infrastructure justify the development of mobile ad hoc networks (MANETs and wireless sensor networks (WSNs. However, unfavorable wireless links and dynamic topology are still challenging, leading to the proposal of a collection of routing protocols for MANETs and WSNs. Nevertheless the performance of algorithms may vary with deployment scenario due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and WSNs is investigated and a novel performance ranking model, termed AHP-SAW, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies based on which ranking results are provided. Extensive simulations show that an overall 37.2 %, at most, gain may be achieved based on the AHP-SAW model.

  18. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  19. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  20. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  1. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  2. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  3. Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm

    Directory of Open Access Journals (Sweden)

    Ahmad Maleki

    2014-09-01

    Full Text Available An important issue in ad-hoc on-demand distance vector (AODV routing protocols is route failure caused by node mobility in the MANETs. The AODV requires a new route discovery procedure whenever a route breaks and these frequent route discoveries increase transmission delays and routing overhead. The present study proposes a new method for AODVs using a genetic algorithm to improve the route recovery mechanism. When failure occurs in a route, the proposed method (GAAODV makes decisions regarding the QOS parameter to select source or local repair. The task of the genetic algorithm is to find an appropriate combination of weights to optimize end-to-end delay. This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. Comparison of the new algorithm and AODV (RFC 3561 using a NS-2 simulator shows that GAAODV obtains better results for the QOS parameters.

  4. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed

    2016-09-28

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission-critical operations such as disaster relief, law enforcement, and emergency response. Mobile Ad Hoc Networks (MANET) is a natural contender in such contexts. However, classical MANET routing schemes fall short in terms of scalability, bandwidth and latency; all three metrics being quite essential for mission-critical applications. As such, autonomous cooperative routing (ACR) has gained traction as the most viable MANET proposition. Nonetheless, ACR is also associated with a few implementation challenges. If they go unaddressed, will deem ACR practically useless. In this paper, efficient and low-complexity remedies to those issues are presented, analyzed, and validated. The validation is based on field experiments carried out using software-defined radio (SDR) platforms. Compared to classical MANET routing schemes, ACR was shown to offer up to 2X better throughput, more than 4X reduction in end-to-end latency, while observing a given target of transport rate normalized to energy consumption.

  5. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  6. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  7. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  8. Quality-of-Service Routing Using Path and Power Aware Techniques in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. Asokan

    2008-01-01

    Full Text Available Mobile ad hoc network (MANET is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. Quality of service (QoS is a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. QoS support MANETs is a challenging task due to the dynamic topology and limited resources. The main objective of this paper is to enhance the QoS routing for MANET using temporally ordered routing algorithm (TORA with self-healing and optimized routing techniques (SHORT. SHORT improves routing optimality by monitoring routing paths continuously and redirecting the path whenever a shortcut path is available. In this paper, the performance comparison of TORA and TORA with SHORT has been analyzed using network simulator for various parameters. TORA with SHORT enhances performance of TORA in terms of throughput, packet loss, end-to-end delay, and energy.

  9. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  10. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  11. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  12. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  13. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  14. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  15. Two-terminal reliability of a mobile ad hoc network under the asymptotic spatial distribution of the random waypoint model

    International Nuclear Information System (INIS)

    Chen, Binchao; Phillips, Aaron; Matis, Timothy I.

    2012-01-01

    The random waypoint (RWP) mobility model is frequently used in describing the movement pattern of mobile users in a mobile ad hoc network (MANET). As the asymptotic spatial distribution of nodes under a RWP model exhibits central tendency, the two-terminal reliability of the MANET is investigated as a function of the source node location. In particular, analytical expressions for one and two hop connectivities are developed as well as an efficient simulation methodology for two-terminal reliability. A study is then performed to assess the effect of nodal density and network topology on network reliability.

  16. Investing in communities: evaluating the added value of community mobilization on HIV prevention outcomes among FSWs in India.

    Science.gov (United States)

    Kuhlmann, Anne Sebert; Galavotti, Christine; Hastings, Philip; Narayanan, Pradeep; Saggurti, Niranjan

    2014-04-01

    Community mobilization often requires greater time and resource investments than typical interventions, yet few evaluations exist to justify these investments. We evaluated the added benefit of community mobilization on HIV prevention outcomes among female sex workers (FSWs) using a composite measure of volunteer participation in program committees by FSWs. After adjusting for treatment propensity, we used multilevel structural equation modeling (MSEM) to test our program theory. We hypothesized that stronger community mobilization would be associated with increased levels of consistent condom use and with increased levels of perceived fairness, mediated by psychosocial processes. Community mobilization had an indirect effect on consistent condom use mediated through social cohesion and an indirect effect on perceived fairness mediated by collective efficacy. Our results suggest higher levels of community mobilization help improve condom use and reduce perceived discrimination beyond the effects of the core HIV intervention program. We recommend further testing of this model.

  17. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Directory of Open Access Journals (Sweden)

    Byoungjip Kim

    2015-07-01

    Full Text Available In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  18. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls.

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-07-16

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user's place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  19. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-01-01

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense. PMID:26193275

  20. A Bioinspired Adaptive Congestion-Avoidance Routing for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Qiong

    2014-01-01

    Full Text Available Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.

  1. A FSA Model for Performance Evaluation over Mobile Ad Hoc Networks with Low Traffic Volume

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-07-01

    Full Text Available A Mobile Ad hoc network (MANET, which is composed of nodes that are able to move arbitrarily, differs from a direct connection network in the way that it is multi-hopping and self- organizing and thus able to operate without the help of prefixed infrastructures. However, problems such as unfavorable wireless links and dynamic topology are challenging, resulting in the proposal of a collection of routing protocols for MANETs. Nevertheless the performance of protocols may deteriorate dramatically as deployment scenario changes due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and is explored and a novel performance ranking model, termed FSA, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies. The FSA is able to rank the performance of DSDV and DSR depending on the average value and standard deviation results. Extensive simulations show that an overall 20.74 %, at most, gain may be achieved based on the FSA model.

  2. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    Science.gov (United States)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  3. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  4. ADDED VALUE-BASED APROACH TO ANALYZE ELECTRONIC COMMERCE AND MOBILE COMMERCE BUSINESS MODELS

    Directory of Open Access Journals (Sweden)

    Moritz Weizmann

    2004-03-01

    Full Text Available

    Se propone aplicar la teoría del valor informacional agregado (Theory of Informational Added Values, IAV al Electronic Commerce (EC y al Mobile Commerce (MC. El trabajo presentado es una propuesta para acercarse a modelos de negocio, con el foco de criterios típicos de evaluación para modelos de negocio de Internet y del MC. Es también conveniente para comparar modelos de negocio distintos y para poner el valor añadido para los participantes en un contexto. De esta manera, se establecen criterios objetivos que reducen la subjetividad y permiten hacer ciertas predicciones. El artículo termina con un análisis crítico del estado del arte y un comentario sobre las perspectivas futuras.

  5. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  6. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    International Nuclear Information System (INIS)

    Yang Juan; Yang Dan; Zhang Xiao-Hong; Huang Bin; Luo Jian-Lu

    2014-01-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm. (general)

  7. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  8. Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Shigeru Kashihara

    2014-01-01

    Full Text Available This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET. In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE, Chachulski et al. (2007, improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  9. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  10. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  11. Modeling Consumer Adoption and Usage of Value-Added Mobile Services

    NARCIS (Netherlands)

    R. Prins (Remco)

    2008-01-01

    textabstractIn recent years, the mobile telecommunications market has been very dynamic in terms of innovations. Mobile service providers continuously invest in new technologies and introduce many new mobile services for consumers, such as MMS and web services. However, adoption rates are often not

  12. Adding navigation, artificial audition and vital sign monitoring capabilities to a telepresence mobile robot for remote home care applications.

    Science.gov (United States)

    Laniel, Sebastien; Letourneau, Dominic; Labbe, Mathieu; Grondin, Francois; Polgar, Janice; Michaud, Francois

    2017-07-01

    A telepresence mobile robot is a remote-controlled, wheeled device with wireless internet connectivity for bidirectional audio, video and data transmission. In health care, a telepresence robot could be used to have a clinician or a caregiver assist seniors in their homes without having to travel to these locations. Many mobile telepresence robotic platforms have recently been introduced on the market, bringing mobility to telecommunication and vital sign monitoring at reasonable costs. What is missing for making them effective remote telepresence systems for home care assistance are capabilities specifically needed to assist the remote operator in controlling the robot and perceiving the environment through the robot's sensors or, in other words, minimizing cognitive load and maximizing situation awareness. This paper describes our approach adding navigation, artificial audition and vital sign monitoring capabilities to a commercially available telepresence mobile robot. This requires the use of a robot control architecture to integrate the autonomous and teleoperation capabilities of the platform.

  13. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  14. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks

    Directory of Open Access Journals (Sweden)

    C.C. Suma

    2017-01-01

    Full Text Available Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.

  15. Information Literacy on the Go! Adding Mobile to an Age Old Challenge

    Science.gov (United States)

    Schmidt Hanbidge, Alice; Sanderson, Nicole; Tin, Tony

    2016-01-01

    Integrating information literacy skills is fundamental to learning in all contexts. The nexus of mobile devices and information literacy lessons to learn these skills is an innovative pedagogy in higher education explored in this Mobile Information Literacy Tool (MIL) project. Currently, the project's second stage of data collection and analysis…

  16. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  17. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  18. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  19. Mobility-Aware Modeling and Analysis of Dense Cellular Networks With $C$ -Plane/ $U$ -Plane Split Architecture

    KAUST Repository

    Ibrahim, Hazem; Elsawy, Hesham; Nguyen, Uyen Trang; Alouini, Mohamed-Slim

    2016-01-01

    The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number

  20. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed; Alouini, Mohamed-Slim

    2016-01-01

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission

  1. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  2. Enabling Co-located Learning over Mobile Ad Hoc P2P with LightPeers

    DEFF Research Database (Denmark)

    Christensen, Bent Guldbjerg; Kristensen, Mads Darø; Hansen, Frank Allan

    2008-01-01

    This paper presents LightPeers – a new mobile P2P framework specifically tailored for use in a nomadic learning environment. A set of key requirements for the framework is identified based on nomadic learning, and these requirements are used as outset for designing and implementing the architectu...

  3. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  4. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  5. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    Science.gov (United States)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  6. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    Science.gov (United States)

    2014-02-26

    4 develops a novel model-based approach to de- scribe dynamic behaviors of nodes in MANETs in the pres- ence of misbehaving nodes with the objective...bile node to subjectively yet informatively assess the trust levels of other mobile nodes. Further, SQTrust is resilient against misbehaving nodes. Given...objective trust’’ despite the presence of misbehaving nodes. The desirable output is to achieve high accuracy in peer-to-peer subjective trust evaluation

  7. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  8. Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times

    Directory of Open Access Journals (Sweden)

    Preiss Bruno

    2011-01-01

    Full Text Available With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode system architecture that employs the delay-tolerant network (DTN concept to provide seamless communications for roaming users over interconnected heterogeneous wireless networks. Mobile ad hoc networks (MANETs are considered a key component of the supernode system for services over an area not covered by other wireless networks. Within the super node system, a dominating-set routing technique is proposed to improve message delivery over MANETs and to achieve better resource utilization. The performance of the dominating-set routing technique depends on estimation accuracy of the probability of a future contact between nodes. This paper studies how node mobility can be modeled and used to better estimate the probability of a contact. We derive a distribution for the node-to-node intermeeting time and present numerical results to demonstrate that the distribution can be used to improve the dominating-set routing technique performance. Moreover, we investigate how the distribution can be employed to relax the constraints of selecting the dominating-set members in order to improve the system resource utilization.

  9. Adding intelligence to mobile asset management in hospitals: the true value of RFID.

    Science.gov (United States)

    Castro, Linda; Lefebvre, Elisabeth; Lefebvre, Louis A

    2013-10-01

    RFID (Radio Frequency Identification) technology is expected to play a vital role in the healthcare arena, especially in times when cost containments are at the top of the priorities of healthcare management authorities. Medical equipment represents a significant share of yearly healthcare operational costs; hence, ensuring an effective and efficient management of such key assets is critical to promptly and reliably deliver a diversity of clinical services at the patient bedside. Empirical evidence from a phased-out RFID implementation in one European hospital demonstrates that RFID has the potential to transform asset management by improving inventory management, enhancing asset utilization, increasing staff productivity, improving care services, enhancing maintenance compliance, and increasing information visibility. Most importantly, RFID allows the emergence of intelligent asset management processes, which is, undoubtedly, the most important benefit that could be derived from the RFID system. Results show that the added intelligence can be rather basic (auto-status change) or a bit more advanced (personalized automatic triggers). More importantly, adding intelligence improves planning and decision-making processes.

  10. Reliable Ant Colony Routing Algorithm for Dual-Channel Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    YongQiang Li

    2018-01-01

    Full Text Available For the problem of poor link reliability caused by high-speed dynamic changes and congestion owing to low network bandwidth in ad hoc networks, an ant colony routing algorithm, based on reliable path under dual-channel condition (DSAR, is proposed. First, dual-channel communication mode is used to improve network bandwidth, and a hierarchical network model is proposed to optimize the dual-layer network. Thus, we reduce network congestion and communication delay. Second, a comprehensive reliable path selection strategy is designed, and the reliable path is selected ahead of time to reduce the probability of routing restart. Finally, the ant colony algorithm is used to improve the adaptability of the routing algorithm to changes of network topology. Simulation results show that DSAR improves the reliability of routing, packet delivery, and throughput.

  11. Adding memory processing behaviors to the fuzzy behaviorist-based navigation of mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Pin, F.G.; Bender, S.R.

    1996-05-01

    Most fuzzy logic-based reasoning schemes developed for robot control are fully reactive, i.e., the reasoning modules consist of fuzzy rule bases that represent direct mappings from the stimuli provided by the perception systems to the responses implemented by the motion controllers. Due to their totally reactive nature, such reasoning systems can encounter problems such as infinite loops and limit cycles. In this paper, we proposed an approach to remedy these problems by adding a memory and memory-related behaviors to basic reactive systems. Three major types of memory behaviors are addressed: memory creation, memory management, and memory utilization. These are first presented, and examples of their implementation for the recognition of limit cycles during the navigation of an autonomous robot in a priori unknown environments are then discussed.

  12. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad

    2016-07-01

    Full Text Available The blind flooding of query packets in route discovery more often characterizes the broadcast storm problem, exponentially increases energy consumption of intermediate nodes and congests the entire network. In such a congested network, the task of establishing the path between resources may become very complex and unwieldy. An extensive research work has been done in this area to improve the route discovery phase of routing protocols by reducing broadcast expenses. The purpose of this study is to provide a comparative analysis of existing broadcasting techniques for the route discovery phase, in order to bring about an efficient broadcasting technique for determining the route with minimum conveying nodes in ad-hoc networks. The study is designed to highlight the collective merits and demerits of such broadcasting techniques along with certain conclusions that would contribute to the choice of broadcasting techniques.

  13. MUSIC algorithm DoA estimation for cooperative node location in mobile ad hoc networks

    Science.gov (United States)

    Warty, Chirag; Yu, Richard Wai; ElMahgoub, Khaled; Spinsante, Susanna

    In recent years the technological development has encouraged several applications based on distributed communications network without any fixed infrastructure. The problem of providing a collaborative early warning system for multiple mobile nodes against a fast moving object. The solution is provided subject to system level constraints: motion of nodes, antenna sensitivity and Doppler effect at 2.4 GHz and 5.8 GHz. This approach consists of three stages. The first phase consists of detecting the incoming object using a highly directive two element antenna at 5.0 GHz band. The second phase consists of broadcasting the warning message using a low directivity broad antenna beam using 2× 2 antenna array which then in third phase will be detected by receiving nodes by using direction of arrival (DOA) estimation technique. The DOA estimation technique is used to estimate the range and bearing of the incoming nodes. The position of fast arriving object can be estimated using the MUSIC algorithm for warning beam DOA estimation. This paper is mainly intended to demonstrate the feasibility of early detection and warning system using a collaborative node to node communication links. The simulation is performed to show the behavior of detecting and broadcasting antennas as well as performance of the detection algorithm. The idea can be further expanded to implement commercial grade detection and warning system

  14. Implementing a Topology Management Algorithm for Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mrinal K. Naskar

    2008-01-01

    Full Text Available In this paper, we propose to maintain the topology of a MANET by suitably selecting multiple coordinators among the nodes constituting the MANET. The maintenance of topology in a mobile ad–hoc network is of primary importance because the routing techniques can only work if we have a connected network. Thus of the burning issues at present is to device algorithms which ensure that the network topology is always maintained. The basic philosophy behind our algorithm is to isolate two coordinators amongst the system based on positional data. Once elected, they are entrusted with the responsibility to emit signals of different frequencies while the other nodes individually decide the logic they need to follow in order to maintain the topology, thereby greatly reducing the overhead. As far as our knowledge goes, we are the first ones to introduce the concept of multiple coordinators which not only reduces the workload of the coordinator, but also eliminates the need of different signal ranges thereby ensuring greater efficiency. We have simulated the algorithm with the help of a number of robots using embedded systems. The results we have obtained have been quite encouraging.

  15. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Nyholm Jørgensen, Rasmus; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  16. A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hope Forsmann; Robert Hiromoto; John Svoboda

    2007-04-01

    The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

  17. A Simulation Study: The Impact of Random and Realistic Mobility Models on the Performance of Bypass-AODV in Ad Hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    Baroudi Uthman

    2010-01-01

    Full Text Available To bring VANET into reality, it is crucial to devise routing protocols that can exploit the inherited characteristics of VANET environment to enhance the performance of the running applications. Previous studies have shown that a certain routing protocol behaves differently under different presumed mobility patterns. Bypass-AODV is a new optimization of the AODV routing protocol for mobile ad-hoc networks. It is proposed as a local recovery mechanism to enhance the performance of the AODV routing protocol. It shows outstanding performance under the Random Waypoint mobility model compared with AODV. However, Random Waypoint is a simple model that may be applicable to some scenarios but it is not sufficient to capture some important mobility characteristics of scenarios where VANETs are deployed. In this paper, we will investigate the performance of Bypass-AODV under a wide range of mobility models including other random mobility models, group mobility models, and vehicular mobility models. Simulation results show an interesting feature that is the insensitivity of Bypass-AODV to the selected random mobility model, and it has a clear performance improvement compared to AODV. For group mobility model, both protocols show a comparable performance, but for vehicular mobility models, Bypass-AODV suffers from performance degradation in high-speed conditions.

  18. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  19. A Static and Dynamic Investigation of Quantum Nonlinear Transport in Highly Dense and Mobile 2D Electron Systems

    Science.gov (United States)

    Dietrich, Scott

    Heterostructures made of semiconductor materials may be one of most versatile environments for the study of the physics of electron transport in two dimensions. These systems are highly customizable and demonstrate a wide range of interesting physical phenomena. In response to both microwave radiation and DC excitations, strongly nonlinear transport that gives rise to non-equilibrium electron states has been reported and investigated. We have studied GaAs quantum wells with a high density of high mobility two-dimensional electrons placed in a quantizing magnetic field. This study presents the observation of several nonlinear transport mechanisms produced by the quantum nature of these materials. The quantum scattering rate, 1tau/q, is an important parameter in these systems, defining the width of the quantized energy levels. Traditional methods of extracting 1tau/q involve studying the amplitude of Shubnikov-de Haas oscillations. We analyze the quantum positive magnetoresistance due to the cyclotron motion of electrons in a magnetic field. This method gives 1tau/q and has the additional benefit of providing access to the strength of electron-electron interactions, which is not possible by conventional techniques. The temperature dependence of the quantum scattering rate is found to be proportional to the square of the temperature and is in very good agreement with theory that considers electron-electron interactions in 2D systems. In quantum wells with a small scattering rate - which corresponds to well-defined Landau levels - quantum oscillations of nonlinear resistance that are independent of magnetic field strength have been observed. These oscillations are periodic in applied bias current and are connected to quantum oscillations of resistance at zero bias: either Shubnikov-de Haas oscillations for single subband systems or magnetointersubband oscillations for two subband systems. The bias-induced oscillations can be explained by a spatial variation of electron

  20. Overestimation of on-road air quality surveying data measured with a mobile laboratory caused by exhaust plumes of a vehicle ahead in dense traffic areas.

    Science.gov (United States)

    Woo, Sang-Hee; Kwak, Kyung-Hwan; Bae, Gwi-Nam; Kim, Kyung Hwan; Kim, Chang Hyeok; Yook, Se-Jin; Jeon, Sangzin; Kwon, Sangil; Kim, Jeongsoo; Lee, Seung-Bok

    2016-11-01

    The unintended influence of exhaust plumes emitted from a vehicle ahead to on-road air quality surveying data measured with a mobile laboratory (ML) at 20-40 km h -1 in dense traffic areas was investigated by experiment and life-sized computational fluidic dynamics (CFD) simulation. The ML equipped with variable sampling inlets of five columns by four rows was used to measure the spatial distribution of CO 2 and NO x concentrations when following 5-20 m behind a sport utility vehicle (SUV) as an emitter vehicle equipped with a portable emission monitoring system (PEMS). The PEMS measured exhaust gases at the tailpipe for input data of the CFD simulations. After the CFD method was verified with experimental results of the SUV, dispersion of exhaust plumes emitted from a bus and a sedan was numerically analyzed. More dilution of the exhaust plume was observed at higher vehicle speeds, probably because of eddy diffusion that was proportional to turbulent kinetic energy and vehicle speed. The CO 2 and NO x concentrations behind the emitter vehicle showed less overestimation as both the distance between the two vehicles and their background concentrations increased. If the height of the ML inlet is lower than 2 m and the ML travels within 20 m behind a SUV and a sedan ahead at 20 km h -1 , the overestimation should be considered by as much as 200 ppb in NO x and 80 ppm in CO 2 . Following a bus should be avoided if possible, because effect of exhaust plumes from a bus ahead could not be negligible even when the distance between the bus and the ML with the inlet height of 2 m, was more than 40 m. Recommendations are provided to avoid the unintended influence of exhaust plumes from vehicles ahead of the ML during on-road measurement in urban dense traffic conditions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR PROTOCOL IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Alaa Azmi Allahham

    2017-02-01

    Full Text Available Mobile Ad-hoc networks (MANETs involved in many applications, whether commercial or military because of their characteristics that do not depend on the infrastructure as well as the freedom movement of their elements, but in return has caused this random mobility of the nodes many of the challenges, where the routing is considered one of these challenges. There are many types of routing protocols that operate within MANET networks, which responsible for finding paths between the source and destination nodes with the modernization of these paths which are constantly changing due to the dynamic topology of the network stemming from the constant random movement of the nodes. The DSR (Dynamic Source Routing routing protocol algorithm is one of these routing protocols which consist of two main stages; route discovery and maintenance, where the route discovery algorithm operates based on blind flooding of request messages. blind flooding is considered as the most well known broadcasting mechanism, it is inefficient in terms of communication and resource utilization, which causing increasing the probability of collisions, repeating send several copies of the same message, as well as increasing the delay. Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. The implementation of proposed algorithms showed positive results in terms of delay, overhead, and improve the performance of MANETs in general.

  2. A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

    Directory of Open Access Journals (Sweden)

    Tryfonas Theo

    2011-01-01

    Full Text Available Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.

  3. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  4. Disentangling location based mobile advertising: the effects of location congruence and type of the medium on consumers' ad-recall and buying behaviour

    NARCIS (Netherlands)

    Bernritter, S.; Ketelaar, P.; van Woudenberg, T.J.; Vantriet, J.; Huhn, A.; Janssen, L.

    2015-01-01

    An emerging body of research focuses on location-based advertising (LBA). This literature suggests that the merits of LBA rely on the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, it has not yet been taken into account that LBA consists of

  5. Minimizing the negative effects of device mobility in cell-based ad-hoc wireless computational grids

    CSIR Research Space (South Africa)

    Mudali, P

    2006-09-01

    Full Text Available This paper provides an outline of research being conducted to minimize the disruptive effects of device mobility in wireless computational grid networks. The proposed wireless grid framework uses the existing GSM cellular architecture, with emphasis...

  6. MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    K.G. Santhiya

    2012-12-01

    Full Text Available MANET (Mobile Ad-hoc Network is an infra structure less wireless ad-hoc network that does not require any basic central control. The topology of the network changes drastically due to very fast mobility of nodes. So an adaptive routing protocol is needed for routing in MANET. AODV (Ad-hoc On-demand Distance Vector routing is the effective and prominent on-demand Ad-hoc routing protocols. During route establishment phase in traditional AODV, only one route reply message will be sent in the reverse path to establish routing path. The high mobility of nodes may affect the reply messages which lead to the retransmission of route request message by the sender which in turn leads to higher communication delay, power consumption and the reduction in the ratio of packets delivered. Sending multiple route reply messages and establishing multiple paths in a single path discovery will reduce the routing overhead involved in maintaining the connection between source and destination nodes. Multipath routing can render high scalability, end-to-end throughput and provide load balancing in MANET. The new proposed novel Multipath QoS aware reliable routing protocol establishes two routes of maximum node disjoint paths and the data transfer is carried out in the two paths simultaneously. To select best paths, the new proposed protocol uses three parameters Link Eminence, MAC overhead and node residual energy. The experimental values prove that the MQARR-AODV protocol achieves high reliability, stability, low latency and outperforms AODV by the less energy consumption, overhead and delay.

  7. Holographic Renormalization in Dense Medium

    International Nuclear Information System (INIS)

    Park, Chanyong

    2014-01-01

    The holographic renormalization of a charged black brane with or without a dilaton field, whose dual field theory describes a dense medium at finite temperature, is investigated in this paper. In a dense medium, two different thermodynamic descriptions are possible due to an additional conserved charge. These two different thermodynamic ensembles are classified by the asymptotic boundary condition of the bulk gauge field. It is also shown that in the holographic renormalization regularity of all bulk fields can reproduce consistent thermodynamic quantities and that the Bekenstein-Hawking entropy is nothing but the renormalized thermal entropy of the dual field theory. Furthermore, we find that the Reissner-Nordström AdS black brane is dual to a theory with conformal matter as expected, whereas a charged black brane with a nontrivial dilaton profile is mapped to a theory with nonconformal matter although its leading asymptotic geometry still remains as AdS space

  8. A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mobile Ad Hoc and Sensor Networks

    OpenAIRE

    Francesco Beritelli; Aurelio La Corte; Corrado Rametta; Francesco Scaglione

    2018-01-01

    As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are...

  9. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  10. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  11. Mobilities

    DEFF Research Database (Denmark)

    to social networks, personal identities, and our relationship to the built environment. The omnipresence of mobilities within everyday life, high politics, technology, and tourism (to mention but a few) all point to a key insight harnessed by the ‘mobilities turn’. Namely that mobilities is much more than......The world is on the move. This is a widespread understanding by many inhabitants of contemporary society across the Globe. But what does it actually mean? During over one decade the ‘mobilities turn’ within the social sciences have provided a new set of insights into the repercussions of mobilities...... and environmental degradation. The spaces and territories marked by mobilities as well as the sites marked by the bypassing of such are explored. Moreover, the architectural and technological dimensions to infrastructures and sites of mobilities will be included as well as the issues of power, social exclusion...

  12. Effects of organic amendments on the mobility of Pb and Zn from mine tailings added to semi-arid soils.

    Science.gov (United States)

    Barajas-Aceves, M; Rodríguez-Vázquez, R

    2013-01-01

    The effects of mine tailings and three organic amendments (compost, bokashi and vermicompost) on the mobility factor for Pb and Zn and on the potential C and N mineralization in semi-arid agricultural and rangeland soils were examined. During the experiment, soil samples were analyzed periodically for CO(2)-C evolution, inorganic N, dehydrogenase activity and percent Pb and Zn mobility during 169 d of incubation. The dehydrogenase activity and CO(2)-C evolved were strongly inhibited by mine tailings mixed with organic compost in both agricultural and rangeland soils (37 to 43 %), followed by N mineralization in treatments with mine tailings plus bokashi or compost (13 to 26.5 %) at 169 d incubation. The highest % mobility of Pb and Zn were observed in soils amended with mine tailings alone, while the lowest was observed in agricultural soils treated with vermicompost plus mine tailings. The CO(2)-C evolved was fitted to first order E, while the cumulative N mineralization was fitted to the linearized power function. Mine tailings were found to influence the potential C and N mineralization rate constants in both soils. The models for C and N mineralization could be used to evaluate the effects of mine tailings, which include intrinsic parameters in the soil.

  13. Adding Value to the Network: Exploring the Software as a Service and Platform as a Service Models for Mobile Operators

    Science.gov (United States)

    Gonçalves, Vânia

    The environments of software development and software provision are shifting to Web-based platforms supported by Platform/Software as a Service (PaaS/SaaS) models. This paper will make the case that there is equally an opportunity for mobile operators to identify additional sources of revenue by exposing network functionalities through Web-based service platforms. By elaborating on the concepts, benefits and risks of SaaS and PaaS, several factors that should be taken into consideration in applying these models to the telecom world are delineated.

  14. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  15. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  16. Research on user interest modeling in mobile ad recommendation%手机广告推荐中的用户兴趣建模研究

    Institute of Scientific and Technical Information of China (English)

    顾其威; 郭鹏; 潘锋

    2012-01-01

    为了增强基于WAP网页的手机广告推荐中用户建模的准确性,并对“非邀”式广告推荐中脱离用户兴趣试探性推荐进行修正,针对手机广告推荐中手机屏幕小、用户注意力集中等特点,根据用户对广告的访问历史和操作模式建立其广告兴趣模型和非兴趣模型,同时分析用户网页访问模式探测其网页兴趣度,在此基础上建立用户综合兴趣模型.分别采用基于网页兴趣模型、基于广告兴趣模型和基于用户综合兴趣模型进行广告推荐,随着样本空间增大,综合兴趣模型的查准率明显优于另两者.实验验证了用户综合兴趣模型在手机广告推荐中的有效性和优越性.%For enhancing the accuracy of mobile advertising recommendation on the basis of WAP Web page, and amending the exploratory recommended in the mobile advertising recommendation of which recommendation pattern is No Invitation, on account of mobile phone' s small screen and user' s great attention, builds advertising interest model and noninterest model according the ads visiting history and operation mode. Simultaneously, analyzed the Web access mode to detect the user' s Web interest degree, proposed a user comprehensive interest model which considering the user' s Web interest and user' s ads interest. Employed three recommended patterns to recommend the mobile advertising based on Web page interest model, advertising interest model and comprehensive interest model, with the sample space growing, the accuracy of comprehensive interest model was superior to other two models. Experiments prove that the effectiveness and superiority of comprehensive model in the mobile advertising recommendation.

  17. Rapid screening of non-steroidal anti-inflammatory drugs illegally added in anti-rheumatic herbal supplements and herbal remedies by portable ion mobility spectrometry.

    Science.gov (United States)

    Li, Mengjiao; Ma, Haiyan; Gao, Jinglin; Zhang, Lina; Wang, Xinyu; Liu, Di; Bian, Jing; Jiang, Ye

    2017-10-25

    In this work, for the first time, a high-performance ion mobility spectrometry with electrospray ionization (ESI-HPIMS) method has been employed as a rapid screening tool for the detection of acetaminophen, ibuprofen, naproxen, diclofenac sodium and indomethacin illegally added in anti-rheumatic herbal supplements and herbal remedies. Samples were dissolved and filtered through a 0.45μm microporous membrane, then the filtrate was directly injected into the high-performance ion mobility spectrometry for analysis. Using this approach, the screening of illegal additions can be accomplished in as rapid as two to three minutes with no pretreatment required. The proposed method provided a LOD of 0.06-0.33μgmL -1 , as well as a good seperation of the five NSAIDs. The precision of the method was 0.1-0.4% (repeatability, n=6) and 0.9-3.3% (reproducibility, n=3). The proposed method appeared to be simple, rapid and highly specific, thus could be effective for the in-situ screening of NSAIDs in anti-rheumatic herbal supplements and herbal remedies. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Photogrammetric 3D reconstruction using mobile imaging

    Science.gov (United States)

    Fritsch, Dieter; Syll, Miguel

    2015-03-01

    In our paper we demonstrate the development of an Android Application (AndroidSfM) for photogrammetric 3D reconstruction that works on smartphones and tablets likewise. The photos are taken with mobile devices, and can thereafter directly be calibrated using standard calibration algorithms of photogrammetry and computer vision, on that device. Due to still limited computing resources on mobile devices, a client-server handshake using Dropbox transfers the photos to the sever to run AndroidSfM for the pose estimation of all photos by Structure-from-Motion and, thereafter, uses the oriented bunch of photos for dense point cloud estimation by dense image matching algorithms. The result is transferred back to the mobile device for visualization and ad-hoc on-screen measurements.

  19. Atoms in dense plasmas

    International Nuclear Information System (INIS)

    More, R.M.

    1986-01-01

    Recent experiments with high-power pulsed lasers have strongly encouraged the development of improved theoretical understanding of highly charged ions in a dense plasma environment. This work examines the theory of dense plasmas with emphasis on general rules which govern matter at extreme high temperature and density. 106 refs., 23 figs

  20. Atoms in dense plasmas

    Energy Technology Data Exchange (ETDEWEB)

    More, R.M.

    1986-01-01

    Recent experiments with high-power pulsed lasers have strongly encouraged the development of improved theoretical understanding of highly charged ions in a dense plasma environment. This work examines the theory of dense plasmas with emphasis on general rules which govern matter at extreme high temperature and density. 106 refs., 23 figs.

  1. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  2. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  3. Supervision de la sécurité pour des réseaux ad hoc mobiles : un système léger, robuste, et fiable de détection d'intrusion

    OpenAIRE

    Alattar , Mouhannad

    2013-01-01

    Mobile Ad hoc NETworks (referred to as MANETs) continue increasing their presence in our every day life. They become a corner stone in the commercial, the society, the military, the science, and even the next-generation applications. However, these networks mostly operate over open environments and are therefore vulnerable to a large body of threats. Traditional ways of securing networks relying on preventive techniques, e.g., firewall and encryption, are not sufficient and should henceforth ...

  4. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  5. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  6. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  7. Modelling dense relational data

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2012-01-01

    they are not naturally suited for kernel K-means. We propose a generative Bayesian model for dense matrices which generalize kernel K-means to consider off-diagonal interactions in matrices of interactions, and demonstrate its ability to detect structure on both artificial data and two real data sets....

  8. Is dense codeswitching complex?

    NARCIS (Netherlands)

    Dorleijn, M.

    In this paper the question is raised to what extent dense code switching can be considered complex. Psycholinguistic experiments indicate that code switching involves cognitive costs, both in production and comprehension, a conclusion that could indicate that code switching is indeed complex. In

  9. Simulation of dense colloids

    NARCIS (Netherlands)

    Herrmann, H.J.; Harting, J.D.R.; Hecht, M.; Ben-Naim, E.

    2008-01-01

    We present in this proceeding recent large scale simulations of dense colloids. On one hand we simulate model clay consisting of nanometric aluminum oxide spheres in water using realistic DLVO potentials and a combination of MD and SRD. We find pronounced cluster formation and retrieve the shear

  10. Hairy AdS solitons

    International Nuclear Information System (INIS)

    Anabalón, Andrés; Astefanesei, Dumitru; Choque, David

    2016-01-01

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  11. Hairy AdS solitons

    Energy Technology Data Exchange (ETDEWEB)

    Anabalón, Andrés, E-mail: andres.anabalon@uai.cl [Departamento de Ciencias, Facultad de Artes Liberales and Facultad de Ingeniería y Ciencias, Universidad Adolfo Ibáñez, Av. Padre Hurtado 750, Viña del Mar (Chile); Astefanesei, Dumitru, E-mail: dumitru.astefanesei@pucv.cl [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Choque, David, E-mail: brst1010123@gmail.com [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Universidad Técnica Federico Santa María, Av. España 1680, Valparaíso (Chile)

    2016-11-10

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  12. Atoms in dense plasmas

    International Nuclear Information System (INIS)

    More, R.M.

    1987-01-01

    This paper covers some aspects of the theory of atomic processes in dense plasmas. Because the topic is very broad, a few general rules which give useful guidance about the typical behavior of dense plasmas have been selected. These rules are illustrated by semiclassical estimates, scaling laws and appeals to more elaborate calculations. Included in the paper are several previously unpublished results including a new mechanism for electron-ion heat exchange (section II), and an approximate expression for oscillator-strengths of highly charged ions (section V). However the main emphasis is not upon practical formulas but rather on questions of fundamental theory, the structural ingredients which must be used in building a model for plasma events. What are the density effects and how does one represent them? Which are most important? How does one identify an incorrect theory? The general rules help to answer these questions. 106 references, 23 figures, 2 tables

  13. Dense Plasma Focus Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Li, Hui [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Li, Shengtai [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Jungman, Gerard [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Hayes-Sterbenz, Anna Catherine [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-31

    The mechanisms for pinch formation in Dense Plasma Focus (DPF) devices, with the generation of high-energy ions beams and subsequent neutron production over a relatively short distance, are not fully understood. Here we report on high-fidelity 2D and 3D numerical magnetohydrodynamic (MHD) simulations using the LA-COMPASS code to study the pinch formation dynamics and its associated instabilities and neutron production.

  14. Dense ceramic articles

    International Nuclear Information System (INIS)

    Cockbain, A.G.

    1976-01-01

    A method is described for the manufacture of articles of substantially pure dense ceramic materials, for use in severe environments. Si N is very suitable for use in such environments, but suffers from the disadvantage that it is not amenable to sintering. Some disadvantages of the methods normally used for making articles of Si N are mentioned. The method described comprises mixing a powder of the substantially pure ceramic material with an additive that promotes densification, and which is capable of nuclear transmutation into a gas when exposed to radiation, and hot pressing the mixture to form a billet. The billet is then irradiated to convert the additive into a gas which is held captive in the billet, and it is then subjected to a hot forging operation, during which the captive gas escapes and an article of substantially pure dense ceramic material is forged. The method is intended primarily for use for Si N, but may be applied to other ceramic materials. The additive may be Li or Be or their compounds, to the extent of at least 5 ppm and not more than 5% by weight. Irradiation is effected by proton or neutron bombardment. (UK)

  15. DENSE MEDIUM CYCLONE OPTIMIZATON

    Energy Technology Data Exchange (ETDEWEB)

    Gerald H. Luttrell; Chris J. Barbee; Peter J. Bethell; Chris J. Wood

    2005-06-30

    Dense medium cyclones (DMCs) are known to be efficient, high-tonnage devices suitable for upgrading particles in the 50 to 0.5 mm size range. This versatile separator, which uses centrifugal forces to enhance the separation of fine particles that cannot be upgraded in static dense medium separators, can be found in most modern coal plants and in a variety of mineral plants treating iron ore, dolomite, diamonds, potash and lead-zinc ores. Due to the high tonnage, a small increase in DMC efficiency can have a large impact on plant profitability. Unfortunately, the knowledge base required to properly design and operate DMCs has been seriously eroded during the past several decades. In an attempt to correct this problem, a set of engineering tools have been developed to allow producers to improve the efficiency of their DMC circuits. These tools include (1) low-cost density tracers that can be used by plant operators to rapidly assess DMC performance, (2) mathematical process models that can be used to predict the influence of changes in operating and design variables on DMC performance, and (3) an expert advisor system that provides plant operators with a user-friendly interface for evaluating, optimizing and trouble-shooting DMC circuits. The field data required to develop these tools was collected by conducting detailed sampling and evaluation programs at several industrial plant sites. These data were used to demonstrate the technical, economic and environmental benefits that can be realized through the application of these engineering tools.

  16. Mobilities Mobilities

    Directory of Open Access Journals (Sweden)

    César Pompeyo

    2011-12-01

    Full Text Available Urry, John (2007 Mobilities.Oxford: Polity Press.Urry, John (2007 Mobilities.Oxford: Polity Press.John Urry (1946-, profesor en la Universidad de Lancaster, es un sociólogo de sobra conocido y altamente reputado en el panorama internacional de las ciencias sociales. Su dilatada carrera, aparentemente dispersa y diversificada, ha seguido senderos bastante bien definidos dejando tras de sí un catálogo extenso de obras sociológicas de primer nivel. Sus primeros trabajos se centraban en el campo de la teoría social y la filosofía de las ciencias sociales o de la sociología del poder [...

  17. Adding Ajax

    CERN Document Server

    Powers, Shelley

    2007-01-01

    Ajax can bring many advantages to an existing web application without forcing you to redo the whole thing. This book explains how you can add Ajax to enhance, rather than replace, the way your application works. For instance, if you have a traditional web application based on submitting a form to update a table, you can enhance it by adding the capability to update the table with changes to the form fields, without actually having to submit the form. That's just one example.Adding Ajax is for those of you more interested in extending existing applications than in creating Rich Internet Applica

  18. Hyperons in dense matter

    Energy Technology Data Exchange (ETDEWEB)

    Dapo, Haris

    2009-01-28

    The hyperon-nucleon YN low momentum effective interaction (V{sub low} {sub k}) allows for an extensive study of the behavior of hyperons in dense matter, together with an investigation of effects of the presence of hyperons on dense matter. The first step towards this goal is the construction of the matrix elements for the hyperon-nucleon low momentum potential. In order to assess the different properties of hyperons within these potentials we calculate the hyperon single-particle potentials in the Hartree-Fock approximation for all of the interactions. Their dependence on both momentum and density, is studied. The single-particle potentials are then used to determine the chemical potential of hyperons in neutron stars. For nucleonic properties, the nucleon-nucleon V{sub low} {sub k} can be used with the caveat that the calculation of the ground-state energy of symmetric nuclear matter does not correctly reproduce the properties of matter at saturation. With the nucleon-nucleon V{sub low} {sub k} one is unable to reach the densities needed for the calculation of neutron star masses. To circumvent this problem we use two approaches: in the first one, we parametrize the entire nucleonic sector. In the second one, we replace only the three-body force. The former will enable us to study neutron star masses, and the latter for studying the medium's response to the external probe. In this thesis we take the external probe to be the neutrino. By combining this parametrization with the YN V{sub low} {sub k} potential, we calculate the equation of state of equilibrated matter. Performing the calculation in the Hartree-Fock approximation at zero temperature, the concentrations of all particles are calculated. From these we can ascertain at which densities hyperons appear for a wide range of parameters. Finally, we calculate the masses of neutron stars with these concentrations. For the calculation of the medium's response to an external probe, we replace the three

  19. Hyperons in dense matter

    International Nuclear Information System (INIS)

    Dapo, Haris

    2009-01-01

    The hyperon-nucleon YN low momentum effective interaction (V low k ) allows for an extensive study of the behavior of hyperons in dense matter, together with an investigation of effects of the presence of hyperons on dense matter. The first step towards this goal is the construction of the matrix elements for the hyperon-nucleon low momentum potential. In order to assess the different properties of hyperons within these potentials we calculate the hyperon single-particle potentials in the Hartree-Fock approximation for all of the interactions. Their dependence on both momentum and density, is studied. The single-particle potentials are then used to determine the chemical potential of hyperons in neutron stars. For nucleonic properties, the nucleon-nucleon V low k can be used with the caveat that the calculation of the ground-state energy of symmetric nuclear matter does not correctly reproduce the properties of matter at saturation. With the nucleon-nucleon V low k one is unable to reach the densities needed for the calculation of neutron star masses. To circumvent this problem we use two approaches: in the first one, we parametrize the entire nucleonic sector. In the second one, we replace only the three-body force. The former will enable us to study neutron star masses, and the latter for studying the medium's response to the external probe. In this thesis we take the external probe to be the neutrino. By combining this parametrization with the YN V low k potential, we calculate the equation of state of equilibrated matter. Performing the calculation in the Hartree-Fock approximation at zero temperature, the concentrations of all particles are calculated. From these we can ascertain at which densities hyperons appear for a wide range of parameters. Finally, we calculate the masses of neutron stars with these concentrations. For the calculation of the medium's response to an external probe, we replace the three-body force with a density-dependent interaction. This

  20. Geometrical optics of dense aerosols: forming dense plasma slabs.

    Science.gov (United States)

    Hay, Michael J; Valeo, Ernest J; Fisch, Nathaniel J

    2013-11-01

    Assembling a freestanding, sharp-edged slab of homogeneous material that is much denser than gas, but much more rarefied than a solid, is an outstanding technological challenge. The solution may lie in focusing a dense aerosol to assume this geometry. However, whereas the geometrical optics of dilute aerosols is a well-developed field, the dense aerosol limit is mostly unexplored. Yet controlling the geometrical optics of dense aerosols is necessary in preparing such a material slab. Focusing dense aerosols is shown here to be possible, but the finite particle density reduces the effective Stokes number of the flow, a critical result for controlled focusing.

  1. Dense ceramic membranes for methane conversion

    Energy Technology Data Exchange (ETDEWEB)

    Bouwmeester, Henny J.M. [Laboratory for Inorganic Materials Science, Department of Science and Technology and MESA Research Institute, University of Twente, 7500 AE Enschede (Netherlands)

    2003-07-30

    Dense ceramic membranes made from mixed oxygen-ionic and electronic conducting perovskite-related oxides allow separation of oxygen from an air supply at elevated temperatures (>700C). By combining air separation and catalytic partial oxidation of methane to syngas into a ceramic membrane reactor, this technology is expected to significantly reduce the capital costs of conversion of natural gas to liquid added-value products. The present survey is mainly concerned with the material properties that govern the performance of the mixed-conducting membranes in real operating conditions and highlights significant developments in the field.

  2. Mercury's Densely Cratered Surface

    Science.gov (United States)

    1974-01-01

    Mariner 10 took this picture (FDS 27465) of the densely cratered surface of Mercury when the spacecraft was 18,200 kilometers (8085 miles) from the planet on March 29. The dark line across top of picture is a 'dropout' of a few TV lines of data. At lower left, a portion of a 61 kilometer (38 mile) crater shows a flow front extending across the crater floor and filling more than half of the crater. The smaller, fresh crater at center is about 25 kilometers (15 miles) in diameter. Craters as small as one kilometer (about one-half mile) across are visible in the picture.The Mariner 10 mission, managed by the Jet Propulsion Laboratory for NASA's Office of Space Science, explored Venus in February 1974 on the way to three encounters with Mercury-in March and September 1974 and in March 1975. The spacecraft took more than 7,000 photos of Mercury, Venus, the Earth and the Moon.Image Credit: NASA/JPL/Northwestern University

  3. Hadrons in dense matter. Proceedings

    International Nuclear Information System (INIS)

    Buballa, M.; Noerenberg, W.; Schaefer, B.J.; Wambach, J.

    2000-03-01

    The following topics were dealt with: Elementary hadronic reactions, Delta dynamics in nuclei, in-medium s-wave ππ-correlations, strangeness in hot and dense matter, medium modifications of vector mesons and dilepton production, medium modifications of charmonium, thermal properties of hot and dense hadronic matter, nuclear matter, spectral functions and QCD sum rules

  4. Bubbling AdS3

    International Nuclear Information System (INIS)

    Martelli, Dario; Morales, Jose Francisco

    2005-01-01

    In the light of the recent Lin, Lunin, Maldacena (LLM) results, we investigate 1/2-BPS geometries in minimal (and next to minimal) supergravity in D = 6 dimensions. In the case of minimal supergravity, solutions are given by fibrations of a two-torus T 2 specified by two harmonic functions. For a rectangular torus the two functions are related by a non-linear equation with rare solutions: AdS 3 x S 3 , the pp-wave and the multi-center string. 'Bubbling', i.e. superpositions of droplets, is accommodated by allowing the complex structure of the T 2 to vary over the base. The analysis is repeated in the presence of a tensor multiplet and similar conclusions are reached, with generic solutions describing D1D5 (or their dual fundamental string-momentum) systems. In this framework, the profile of the dual fundamental string-momentum system is identified with the boundaries of the droplets in a two-dimensional plane. (author)

  5. Unified approach to dense matter

    International Nuclear Information System (INIS)

    Park, Byung-Yoon; Lee, Hee-Jung; Vento, Vicente; Kim, Joon-Il; Min, Dong-Pil; Rho, Mannque

    2005-01-01

    We apply the Skyrme model to dense hadronic matter, which provides a unified approach to high density, valid in the large N c limit. In our picture, dense hadronic matter is described by the classical soliton configuration with minimum energy for the given baryon number density. By incorporating the meson fluctuations on such ground state we obtain an effective Lagrangian for meson dynamics in a dense medium. Our starting point has been the Skyrme model defined in terms of pions, thereafter we have extended and improved the model by incorporating other degrees of freedom such as dilaton, kaons and vector mesons

  6. Transport properties of dense matter

    International Nuclear Information System (INIS)

    Itoh, Naoki; Mitake, Shinichi; Iyetomi, Hiroshi; Ichimaru, Setsuo

    1983-01-01

    Transport coefficients, electrical and thermal conductivities in particular, are essential physical quantities for the theories of stellar structure. Since the discoveries of pulsars and X-ray stars, an accurate evaluation of the transport coefficients in the dense matter has become indispensable to the quantitative understanding of the observed neutron stars. The authors present improved calculations of the electrical and thermal conductivities of the dense matter in the liquid metal phase, appropriate to white dwarfs and neutron stars. (Auth.)

  7. Realtime multiprocessor for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    T. Jungeblut

    2008-05-01

    Full Text Available This paper introduces a real-time Multiprocessor System-On-Chip (MPSoC for low power wireless applications. The multiprocessor is based on eight 32bit RISC processors that are connected via an Network-On-Chip (NoC. The NoC follows a novel approach with guaranteed bandwidth to the application that meets hard realtime requirements. At a clock frequency of 100 MHz the total power consumption of the MPSoC that has been fabricated in 180 nm UMC standard cell technology is 772 mW.

  8. Secrecy in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Hüttel, Hans; Rafnsson, Willard

    2008-01-01

    We propose a framework for automated verification of secrecy properties of MANET protocols, consisting of a formal language and a proven sound verifi- cation technique which can be automated. We start off by presenting the dis- tributed applied pi calculus with broadcast (DAπβ ), whereafter we summ...

  9. Dynamics of dense particle disks

    International Nuclear Information System (INIS)

    Araki, S.; Tremaine, S.; Toronto Univ., Canada)

    1986-01-01

    The present investigation of mechanical equilibrium and collisional transport processes in dense, differentially rotating particle disks is based on the Enskog (1922) theory of dense, hard sphere gases, with the single exception that the spheres are inelastic. The viscous instability suggested as a source of Saturn B ring structure does not arise in the models presented, although the ring may be subject to a phase transition analogous to the liquid-solid transition observed in molecular dynamics simulations of elastic hard spheres. In such a case, the ring would alternately exhibit zero-shear, or solid, and high shear, or liquid, zones. 29 references

  10. String Theory on AdS Spaces

    NARCIS (Netherlands)

    de Boer, J.

    2000-01-01

    In these notes we discuss various aspects of string theory in AdS spaces. We briefly review the formulation in terms of Green-Schwarz, NSR, and Berkovits variables, as well as the construction of exact conformal field theories with AdS backgrounds. Based on lectures given at the Kyoto YITP Workshop

  11. Dense Crowds of Virtual Humans

    NARCIS (Netherlands)

    Stüvel, S.A.

    2016-01-01

    This thesis presents a novel crowd simulation method `Torso Crowds', aimed at the simulation of dense crowds. The method is based on the results of user studies and a motion capture experiment, which are also described in this thesis. Torso Crowds introduces a capsule shape to represent people in

  12. Building Evacuation with Mobile Devices

    OpenAIRE

    Merkel, Sabrina

    2014-01-01

    The rapidly growing world population and increasingly dense settlements demand ever-larger and more complex buildings from today's engineers. In comparison to this technological progress, a building's equipment for emergency evacuation has been hardly developed further. This work presents a concept for a building evacuation system based on mobile devices. Furthermore, various algorithms for route planning with mobile devices and for indoor localization of mobile devices are addressed.

  13. Warped AdS3 black holes

    International Nuclear Information System (INIS)

    Anninos, Dionysios; Li Wei; Padi, Megha; Song Wei; Strominger, Andrew

    2009-01-01

    Three dimensional topologically massive gravity (TMG) with a negative cosmological constant -l -2 and positive Newton constant G admits an AdS 3 vacuum solution for any value of the graviton mass μ. These are all known to be perturbatively unstable except at the recently explored chiral point μl = 1. However we show herein that for every value of μl ≠ 3 there are two other (potentially stable) vacuum solutions given by SL(2,R) x U(1)-invariant warped AdS 3 geometries, with a timelike or spacelike U(1) isometry. Critical behavior occurs at μl = 3, where the warping transitions from a stretching to a squashing, and there are a pair of warped solutions with a null U(1) isometry. For μl > 3, there are known warped black hole solutions which are asymptotic to warped AdS 3 . We show that these black holes are discrete quotients of warped AdS 3 just as BTZ black holes are discrete quotients of ordinary AdS 3 . Moreover new solutions of this type, relevant to any theory with warped AdS 3 solutions, are exhibited. Finally we note that the black hole thermodynamics is consistent with the hypothesis that, for μl > 3, the warped AdS 3 ground state of TMG is holographically dual to a 2D boundary CFT with central charges c R -formula and c L -formula.

  14. Warm Dense Matter: An Overview

    International Nuclear Information System (INIS)

    Kalantar, D H; Lee, R W; Molitoris, J D

    2004-01-01

    This document provides a summary of the ''LLNL Workshop on Extreme States of Materials: Warm Dense Matter to NIF'' which was held on 20, 21, and 22 February 2002 at the Wente Conference Center in Livermore, CA. The warm dense matter regime, the transitional phase space region between cold material and hot plasma, is presently poorly understood. The drive to understand the nature of matter in this regime is sparking scientific activity worldwide. In addition to pure scientific interest, finite temperature dense matter occurs in the regimes of interest to the SSMP (Stockpile Stewardship Materials Program). So that obtaining a better understanding of WDM is important to performing effective experiments at, e.g., NIF, a primary mission of LLNL. At this workshop we examined current experimental and theoretical work performed at, and in conjunction with, LLNL to focus future activities and define our role in this rapidly emerging research area. On the experimental front LLNL plays a leading role in three of the five relevant areas and has the opportunity to become a major player in the other two. Discussion at the workshop indicated that the path forward for the experimental efforts at LLNL were two fold: First, we are doing reasonable baseline work at SPLs, HE, and High Energy Lasers with more effort encouraged. Second, we need to plan effectively for the next evolution in large scale facilities, both laser (NIF) and Light/Beam sources (LCLS/TESLA and GSI) Theoretically, LLNL has major research advantages in areas as diverse as the thermochemical approach to warm dense matter equations of state to first principles molecular dynamics simulations. However, it was clear that there is much work to be done theoretically to understand warm dense matter. Further, there is a need for a close collaboration between the generation of verifiable experimental data that can provide benchmarks of both the experimental techniques and the theoretical capabilities. The conclusion of this

  15. Suprathermal viscosity of dense matter

    International Nuclear Information System (INIS)

    Alford, Mark; Mahmoodifar, Simin; Schwenzer, Kai

    2010-01-01

    Motivated by the existence of unstable modes of compact stars that eventually grow large, we study the bulk viscosity of dense matter, taking into account non-linear effects arising in the large amplitude regime, where the deviation μ Δ of the chemical potentials from chemical equilibrium fulfills μ Δ > or approx. T. We find that this supra-thermal bulk viscosity can provide a potential mechanism for saturating unstable modes in compact stars since the viscosity is strongly enhanced. Our study confirms previous results on strange quark matter and shows that the suprathermal enhancement is even stronger in the case of hadronic matter. We also comment on the competition of different weak channels and the presence of suprathermal effects in various color superconducting phases of dense quark matter.

  16. Dilute and dense axion stars

    Science.gov (United States)

    Visinelli, Luca; Baum, Sebastian; Redondo, Javier; Freese, Katherine; Wilczek, Frank

    2018-02-01

    Axion stars are hypothetical objects formed of axions, obtained as localized and coherently oscillating solutions to their classical equation of motion. Depending on the value of the field amplitude at the core |θ0 | ≡ | θ (r = 0) |, the equilibrium of the system arises from the balance of the kinetic pressure and either self-gravity or axion self-interactions. Starting from a general relativistic framework, we obtain the set of equations describing the configuration of the axion star, which we solve as a function of |θ0 |. For small |θ0 | ≲ 1, we reproduce results previously obtained in the literature, and we provide arguments for the stability of such configurations in terms of first principles. We compare qualitative analytical results with a numerical calculation. For large amplitudes |θ0 | ≳ 1, the axion field probes the full non-harmonic QCD chiral potential and the axion star enters the dense branch. Our numerical solutions show that in this latter regime the axions are relativistic, and that one should not use a single frequency approximation, as previously applied in the literature. We employ a multi-harmonic expansion to solve the relativistic equation for the axion field in the star, and demonstrate that higher modes cannot be neglected in the dense regime. We interpret the solutions in the dense regime as pseudo-breathers, and show that the life-time of such configurations is much smaller than any cosmological time scale.

  17. Connecting Mobile Game Advertising with Local Stores

    OpenAIRE

    Wen, Yanzhao

    2016-01-01

    With the growth of mobile market, mobile advertising and mobile game advertising are becoming more and more important. On one hand, mobile advertising is able to deliver relevant ads to targeted users based on their locations and behaviors. On the other hand, as the number of mobile game players and free-to-play mobile games are increasing, mobile game advertising forms one important way of monetization. It is important to increase the advertising effectiveness while producing friendly user e...

  18. Dense Breasts: Answers to Commonly Asked Questions

    Science.gov (United States)

    ... Cancer Prevention Genetics of Breast & Gynecologic Cancers Breast Cancer Screening Research Dense Breasts: Answers to Commonly Asked Questions What are dense breasts? Breasts contain glandular, connective, and fat tissue. Breast density is a term that describes the ...

  19. Constructing Dense Graphs with Unique Hamiltonian Cycles

    Science.gov (United States)

    Lynch, Mark A. M.

    2012-01-01

    It is not difficult to construct dense graphs containing Hamiltonian cycles, but it is difficult to generate dense graphs that are guaranteed to contain a unique Hamiltonian cycle. This article presents an algorithm for generating arbitrarily large simple graphs containing "unique" Hamiltonian cycles. These graphs can be turned into dense graphs…

  20. AdS solutions through transgression

    International Nuclear Information System (INIS)

    Donos, Aristomenis; Gauntlett, Jerome P.; Kim, Nakwoo

    2008-01-01

    We present new classes of explicit supersymmetric AdS 3 solutions of type IIB supergravity with non-vanishing five-form flux and AdS 2 solutions of D = 11 supergravity with electric four-form flux. The former are dual to two-dimensional SCFTs with (0,2) supersymmetry and the latter to supersymmetric quantum mechanics with two supercharges. We also investigate more general classes of AdS 3 solutions of type IIB supergravity and AdS 2 solutions of D = 11 supergravity which in addition have non-vanishing three-form flux and magnetic four-form flux, respectively. The construction of these more general solutions makes essential use of the Chern-Simons or 'transgression' terms in the Bianchi identity or the equation of motion of the field strengths in the supergravity theories. We construct infinite new classes of explicit examples and for some of the type IIB solutions determine the central charge of the dual SCFTs. The type IIB solutions with non-vanishing three-form flux that we construct include a two-torus, and after two T-dualities and an S-duality, we obtain new AdS 3 solutions with only the NS fields being non-trivial.

  1. Polarised Black Holes in AdS

    CERN Document Server

    Costa, Miguel S.; Oliveira, Miguel; Penedones, João; Santos, Jorge E.

    2016-05-03

    We consider solutions in Einstein-Maxwell theory with a negative cosmological constant that asymptote to global $AdS_{4}$ with conformal boundary $S^{2}\\times\\mathbb{R}_{t}$. At the sphere at infinity we turn on a space-dependent electrostatic potential, which does not destroy the asymptotic $AdS$ behaviour. For simplicity we focus on the case of a dipolar electrostatic potential. We find two new geometries: (i) an $AdS$ soliton that includes the full backreaction of the electric field on the $AdS$ geometry; (ii) a polarised neutral black hole that is deformed by the electric field, accumulating opposite charges in each hemisphere. For both geometries we study boundary data such as the charge density and the stress tensor. For the black hole we also study the horizon charge density and area, and further verify a Smarr formula. Then we consider this system at finite temperature and compute the Gibbs free energy for both $AdS$ soliton and black hole phases. The corresponding phase diagram generalizes the Hawkin...

  2. Screening in dense ionic fluids

    International Nuclear Information System (INIS)

    Tosi, M.P.

    1991-01-01

    There has been great progress in recent years in determining and understanding the structure of molten salts. I focus on molten alkali halides and discuss two main points concerning their liquid structure and its relationship with static electrical response in these dense ionic conductors. These are (i) the nature of screening and the related definitions and properties of the screening length and of the dielectric function, and (ii) developments in integral equations techniques for the evaluation of molten salt structure and static screening from given pair potentials. (author). 26 refs, 3 figs, 2 tabs

  3. Ad-Me: A Context-Sensitive Advertising System

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector and in particular the context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the Mobile E-commerce user) system. The Ad-me is a mobile tourist guide that proactively delivers advertisements to users based upon perceived individual user needs together with their location. A Multi-Agent Systems (MAS) design philosophy is adopted. In order to achieve maximum content diffusion a range of presentation...

  4. Mobile marketing for mobile games

    OpenAIRE

    Vu, Giang

    2016-01-01

    Highly developed mobile technology and devices enable the rise of mobile game industry and mobile marketing. Hence mobile marketing for mobile game is an essential key for a mobile game success. Even though there are many articles on marketing for mobile games, there is a need of highly understanding mobile marketing strategies, how to launch a mobile campaign for a mobile game. Besides that, it is essential to understand the relationship between mobile advertising and users behaviours. There...

  5. Dense power-law networks and simplicial complexes

    Science.gov (United States)

    Courtney, Owen T.; Bianconi, Ginestra

    2018-05-01

    There is increasing evidence that dense networks occur in on-line social networks, recommendation networks and in the brain. In addition to being dense, these networks are often also scale-free, i.e., their degree distributions follow P (k ) ∝k-γ with γ ∈(1 ,2 ] . Models of growing networks have been successfully employed to produce scale-free networks using preferential attachment, however these models can only produce sparse networks as the numbers of links and nodes being added at each time step is constant. Here we present a modeling framework which produces networks that are both dense and scale-free. The mechanism by which the networks grow in this model is based on the Pitman-Yor process. Variations on the model are able to produce undirected scale-free networks with exponent γ =2 or directed networks with power-law out-degree distribution with tunable exponent γ ∈(1 ,2 ) . We also extend the model to that of directed two-dimensional simplicial complexes. Simplicial complexes are generalization of networks that can encode the many body interactions between the parts of a complex system and as such are becoming increasingly popular to characterize different data sets ranging from social interacting systems to the brain. Our model produces dense directed simplicial complexes with power-law distribution of the generalized out-degrees of the nodes.

  6. Mobility2.0: co-operative ITS systems for enhanced electric vehicle mobility

    NARCIS (Netherlands)

    Unknown, [Unknown; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Mobility2.0 will develop and test an in-vehicle commuting assistant for FEV mobility, resulting in more reliable and energy-efficient electro-mobility. In order to achieve a maximum impact, Mobility2.0 takes an integrated approach of ad- dressing the main bottlenecks of urban FEV mobility: range

  7. A proxy for variance in dense matching over homogeneous terrain

    Science.gov (United States)

    Altena, Bas; Cockx, Liesbet; Goedemé, Toon

    2014-05-01

    Automation in photogrammetry and avionics have brought highly autonomous UAV mapping solutions on the market. These systems have great potential for geophysical research, due to their mobility and simplicity of work. Flight planning can be done on site and orientation parameters are estimated automatically. However, one major drawback is still present: if contrast is lacking, stereoscopy fails. Consequently, topographic information cannot be obtained precisely through photogrammetry for areas with low contrast. Even though more robustness is added in the estimation through multi-view geometry, a precise product is still lacking. For the greater part, interpolation is applied over these regions, where the estimation is constrained by uniqueness, its epipolar line and smoothness. Consequently, digital surface models are generated with an estimate of the topography, without holes but also without an indication of its variance. Every dense matching algorithm is based on a similarity measure. Our methodology uses this property to support the idea that if only noise is present, no correspondence can be detected. Therefore, the noise level is estimated in respect to the intensity signal of the topography (SNR) and this ratio serves as a quality indicator for the automatically generated product. To demonstrate this variance indicator, two different case studies were elaborated. The first study is situated at an open sand mine near the village of Kiezegem, Belgium. Two different UAV systems flew over the site. One system had automatic intensity regulation, and resulted in low contrast over the sandy interior of the mine. That dataset was used to identify the weak estimations of the topography and was compared with the data from the other UAV flight. In the second study a flight campaign with the X100 system was conducted along the coast near Wenduine, Belgium. The obtained images were processed through structure-from-motion software. Although the beach had a very low

  8. Current status of AdS instability

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    arXiv:1403.6471 and thoroughly developed in arXiv:1407.6273. On the other hand the negative cosmological constant allows for the existence of stable, time-periodic, asymptotically AdS solutions of Einstein equations [arXiv:1303.3186].

  9. AdS. Klein-Gordon equation

    OpenAIRE

    Bel, Ll.

    2014-01-01

    I propose a generalization of the Klein-Gordon equation in the framework of AdS space-time and exhibit a four parameter family of solutions among which there is a two parameter family of time-dependent bound states.

  10. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  11. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  12. Deterministic and unambiguous dense coding

    International Nuclear Information System (INIS)

    Wu Shengjun; Cohen, Scott M.; Sun Yuqing; Griffiths, Robert B.

    2006-01-01

    Optimal dense coding using a partially-entangled pure state of Schmidt rank D and a noiseless quantum channel of dimension D is studied both in the deterministic case where at most L d messages can be transmitted with perfect fidelity, and in the unambiguous case where when the protocol succeeds (probability τ x ) Bob knows for sure that Alice sent message x, and when it fails (probability 1-τ x ) he knows it has failed. Alice is allowed any single-shot (one use) encoding procedure, and Bob any single-shot measurement. For D≤D a bound is obtained for L d in terms of the largest Schmidt coefficient of the entangled state, and is compared with published results by Mozes et al. [Phys. Rev. A71, 012311 (2005)]. For D>D it is shown that L d is strictly less than D 2 unless D is an integer multiple of D, in which case uniform (maximal) entanglement is not needed to achieve the optimal protocol. The unambiguous case is studied for D≤D, assuming τ x >0 for a set of DD messages, and a bound is obtained for the average . A bound on the average requires an additional assumption of encoding by isometries (unitaries when D=D) that are orthogonal for different messages. Both bounds are saturated when τ x is a constant independent of x, by a protocol based on one-shot entanglement concentration. For D>D it is shown that (at least) D 2 messages can be sent unambiguously. Whether unitary (isometric) encoding suffices for optimal protocols remains a major unanswered question, both for our work and for previous studies of dense coding using partially-entangled states, including noisy (mixed) states

  13. Lorentzian AdS, Wormholes and Holography

    CERN Document Server

    Arias, Raul E; Silva, Guillermo A

    2011-01-01

    We investigate the structure of two point functions for the QFT dual to an asymptotically Lorentzian AdS-wormhole. The bulk geometry is a solution of 5-dimensional second order Einstein Gauss Bonnet gravity and causally connects two asymptotically AdS space times. We revisit the GKPW prescription for computing two-point correlation functions for dual QFT operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values phi_0^\\pm at each of the two asymptotic AdS regions, along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O^\\pm and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom leaving at each boundary. The AdS_(1+1) geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a ...

  14. Mechanism design for mobile geo-location advertising

    OpenAIRE

    Gatti, Nicola; Rocco, Marco; Ceppi, Sofia; Gerding, Enrico H.

    2014-01-01

    Mobile geo–location advertising, where mobile ads are targeted based on a user’s location, has been identified as a key growth factor for the mobile market. As with online advertising, a crucial ingredient for their success is the development of effective economic mechanisms. An important difference is that mobile ads are shown sequentially over time and information about the user can be learned based on their movements. Furthermore, ads need to be shown selectively to prevent ad fatigue. To ...

  15. Baby Skyrmions in AdS

    Energy Technology Data Exchange (ETDEWEB)

    Elliot-Ripley, Matthew; Winyard, Thomas [Department of Mathematical Sciences, Durham University,South Rd, Durham (United Kingdom)

    2015-09-01

    We study the baby Skyrme model in a pure AdS background without a mass term. The tail decays and scalings of massless radial solutions are demonstrated to take a similar form to those of the massive flat space model, with the AdS curvature playing a similar role to the flat space pion mass. We also numerically find minimal energy solutions for a range of higher topological charges and find that they form concentric ring-like solutions. Popcorn transitions (named in analogy with studies of toy models of holographic QCD) from an n layer to an n+1-layer configuration are observed at topological charges 9 and 27 and further popcorn transitions for higher charges are predicted. Finally, a point-particle approximation for the model is derived and used to successfully predict the ring structures and popcorn transitions for higher charge solitons.

  16. Breaking Dense Structures: Proving Stability of Densely Structured Hybrid Systems

    Directory of Open Access Journals (Sweden)

    Eike Möhlmann

    2015-06-01

    Full Text Available Abstraction and refinement is widely used in software development. Such techniques are valuable since they allow to handle even more complex systems. One key point is the ability to decompose a large system into subsystems, analyze those subsystems and deduce properties of the larger system. As cyber-physical systems tend to become more and more complex, such techniques become more appealing. In 2009, Oehlerking and Theel presented a (de-composition technique for hybrid systems. This technique is graph-based and constructs a Lyapunov function for hybrid systems having a complex discrete state space. The technique consists of (1 decomposing the underlying graph of the hybrid system into subgraphs, (2 computing multiple local Lyapunov functions for the subgraphs, and finally (3 composing the local Lyapunov functions into a piecewise Lyapunov function. A Lyapunov function can serve multiple purposes, e.g., it certifies stability or termination of a system or allows to construct invariant sets, which in turn may be used to certify safety and security. In this paper, we propose an improvement to the decomposing technique, which relaxes the graph structure before applying the decomposition technique. Our relaxation significantly reduces the connectivity of the graph by exploiting super-dense switching. The relaxation makes the decomposition technique more efficient on one hand and on the other allows to decompose a wider range of graph structures.

  17. Optimal super dense coding over memory channels

    OpenAIRE

    Shadman, Zahra; Kampermann, Hermann; Macchiavello, Chiara; Bruß, Dagmar

    2011-01-01

    We study the super dense coding capacity in the presence of quantum channels with correlated noise. We investigate both the cases of unitary and non-unitary encoding. Pauli channels for arbitrary dimensions are treated explicitly. The super dense coding capacity for some special channels and resource states is derived for unitary encoding. We also provide an example of a memory channel where non-unitary encoding leads to an improvement in the super dense coding capacity.

  18. Supersymmetric AdS3, AdS2 and bubble solutions

    International Nuclear Information System (INIS)

    Gauntlett, Jerome P.; Waldram, Daniel; Kim, Nakwoo

    2007-01-01

    We present new supersymmetric AdS 3 solutions of type IIB supergravity and AdS 2 solutions of D = 11 supergravity. The former are dual to conformal field theories in two dimensions with N = (0, 2) supersymmetry while the latter are dual to conformal quantum mechanics with two supercharges. Our construction also includes AdS 2 solutions of D = 11 supergravity that have non-compact internal spaces which are dual to three-dimensional N = 2 superconformal field theories coupled to point-like defects. We also present some new bubble-type solutions, corresponding to BPS states in conformal theories, that preserve four supersymmetries

  19. Dense module enumeration in biological networks

    Science.gov (United States)

    Tsuda, Koji; Georgii, Elisabeth

    2009-12-01

    Analysis of large networks is a central topic in various research fields including biology, sociology, and web mining. Detection of dense modules (a.k.a. clusters) is an important step to analyze the networks. Though numerous methods have been proposed to this aim, they often lack mathematical rigorousness. Namely, there is no guarantee that all dense modules are detected. Here, we present a novel reverse-search-based method for enumerating all dense modules. Furthermore, constraints from additional data sources such as gene expression profiles or customer profiles can be integrated, so that we can systematically detect dense modules with interesting profiles. We report successful applications in human protein interaction network analyses.

  20. Dense module enumeration in biological networks

    International Nuclear Information System (INIS)

    Tsuda, Koji; Georgii, Elisabeth

    2009-01-01

    Analysis of large networks is a central topic in various research fields including biology, sociology, and web mining. Detection of dense modules (a.k.a. clusters) is an important step to analyze the networks. Though numerous methods have been proposed to this aim, they often lack mathematical rigorousness. Namely, there is no guarantee that all dense modules are detected. Here, we present a novel reverse-search-based method for enumerating all dense modules. Furthermore, constraints from additional data sources such as gene expression profiles or customer profiles can be integrated, so that we can systematically detect dense modules with interesting profiles. We report successful applications in human protein interaction network analyses.

  1. Dense sheet Z-pinches

    International Nuclear Information System (INIS)

    Tetsu, Miyamoto

    1999-01-01

    The steady state and quasi-steady processes of infinite- and finite-width sheet z-pinches are studied. The relations corresponding to the Bennett relation and Pease-Braginskii current of cylindrical fiber z-pinches depend on a geometrical factor in the sheet z-pinches. The finite-width sheet z-pinch is approximated by a segment of infinite-width sheet z-pinch, if it is wide enough, and corresponds to a number of (width/thickness) times fiber z-pinch plasmas of the diameter that equals the sheet thickness. If the sheet current equals this number times the fiber current, the plasma created in the sheet z-pinches is as dense as in the fiber z-pinches. The total energy of plasma and magnetic field per unit mass is approximately equal in both pinches. Quasi-static transient processes are different in several aspects from the fiber z-pinch. No radiation collapse occurs in the sheet z-pinch. The stability is improved in the sheet z-pinches. The fusion criterions and the experimental arrangements to produce the sheet z-pinches are also discussed. (author)

  2. STAR FORMATION IN DENSE CLUSTERS

    International Nuclear Information System (INIS)

    Myers, Philip C.

    2011-01-01

    A model of core-clump accretion with equally likely stopping describes star formation in the dense parts of clusters, where models of isolated collapsing cores may not apply. Each core accretes at a constant rate onto its protostar, while the surrounding clump gas accretes as a power of protostar mass. Short accretion flows resemble Shu accretion and make low-mass stars. Long flows resemble reduced Bondi accretion and make massive stars. Accretion stops due to environmental processes of dynamical ejection, gravitational competition, and gas dispersal by stellar feedback, independent of initial core structure. The model matches the field star initial mass function (IMF) from 0.01 to more than 10 solar masses. The core accretion rate and the mean accretion duration set the peak of the IMF, independent of the local Jeans mass. Massive protostars require the longest accretion durations, up to 0.5 Myr. The maximum protostar luminosity in a cluster indicates the mass and age of its oldest protostar. The distribution of protostar luminosities matches those in active star-forming regions if protostars have a constant birthrate but not if their births are coeval. For constant birthrate, the ratio of young stellar objects to protostars indicates the star-forming age of a cluster, typically ∼1 Myr. The protostar accretion luminosity is typically less than its steady spherical value by a factor of ∼2, consistent with models of episodic disk accretion.

  3. Predicting AD conversion

    DEFF Research Database (Denmark)

    Liu, Yawu; Mattila, Jussi; Ruiz, Miguel �ngel Mu�oz

    2013-01-01

    To compare the accuracies of predicting AD conversion by using a decision support system (PredictAD tool) and current research criteria of prodromal AD as identified by combinations of episodic memory impairment of hippocampal type and visual assessment of medial temporal lobe atrophy (MTA) on MRI...

  4. Winding strings in AdS3

    International Nuclear Information System (INIS)

    Herscovich, Estanislao; Minces, Pablo; Nunez, Carmen

    2006-01-01

    Correlation functions of one-unit spectral flowed states in string theory on AdS 3 are considered. We present the modified Knizhnik-Zamolodchikov and null vector equations to be satisfied by amplitudes containing states in winding sector one and study their solution corresponding to the four point function including one w = 1 field. We compute the three point function involving two one-unit spectral flowed operators and find expressions for amplitudes of three w = 1 states satisfying certain particular relations among the spins of the fields. Several consistency checks are performed

  5. The forecaster's added value

    Science.gov (United States)

    Turco, M.; Milelli, M.

    2009-09-01

    To the authors' knowledge there are relatively few studies that try to answer this topic: "Are humans able to add value to computer-generated forecasts and warnings ?". Moreover, the answers are not always positive. In particular some postprocessing method is competitive or superior to human forecast (see for instance Baars et al., 2005, Charba et al., 2002, Doswell C., 2003, Roebber et al., 1996, Sanders F., 1986). Within the alert system of ARPA Piemonte it is possible to study in an objective manner if the human forecaster is able to add value with respect to computer-generated forecasts. Every day the meteorology group of the Centro Funzionale of Regione Piemonte produces the HQPF (Human QPF) in terms of an areal average for each of the 13 regional warning areas, which have been created according to meteo-hydrological criteria. This allows the decision makers to produce an evaluation of the expected effects by comparing these HQPFs with predefined rainfall thresholds. Another important ingredient in this study is the very dense non-GTS network of rain gauges available that makes possible a high resolution verification. In this context the most useful verification approach is the measure of the QPF and HQPF skills by first converting precipitation expressed as continuous amounts into ‘‘exceedance'' categories (yes-no statements indicating whether precipitation equals or exceeds selected thresholds) and then computing the performances for each threshold. In particular in this work we compare the performances of the latest three years of QPF derived from two meteorological models COSMO-I7 (the Italian version of the COSMO Model, a mesoscale model developed in the framework of the COSMO Consortium) and IFS (the ECMWF global model) with the HQPF. In this analysis it is possible to introduce the hypothesis test developed by Hamill (1999), in which a confidence interval is calculated with the bootstrap method in order to establish the real difference between the

  6. Dense image correspondences for computer vision

    CERN Document Server

    Liu, Ce

    2016-01-01

    This book describes the fundamental building-block of many new computer vision systems: dense and robust correspondence estimation. Dense correspondence estimation techniques are now successfully being used to solve a wide range of computer vision problems, very different from the traditional applications such techniques were originally developed to solve. This book introduces the techniques used for establishing correspondences between challenging image pairs, the novel features used to make these techniques robust, and the many problems dense correspondences are now being used to solve. The book provides information to anyone attempting to utilize dense correspondences in order to solve new or existing computer vision problems. The editors describe how to solve many computer vision problems by using dense correspondence estimation. Finally, it surveys resources, code, and data necessary for expediting the development of effective correspondence-based computer vision systems.   ·         Provides i...

  7. Mobile Context Toolbox

    DEFF Research Database (Denmark)

    Stopczynski, Arkadiusz; Larsen, Jakob Eg; Skomail, Lukasz

    2010-01-01

    In this paper we describe an open framework utilizing sensors and application data on the Maemo mobile platform enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new hardware and software sensors and features to be added...... to the context framework. We present initial results from in-the-wild experiments where contextual data was acquired using the tool. In the experiments 6 participants were using a Nokia N900 mobile phone continuously with a logger application for an average of 33 days. The study has provided valuable insights...

  8. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  9. Displays enabling mobile multimedia

    Science.gov (United States)

    Kimmel, Jyrki

    2007-02-01

    With the rapid advances in telecommunications networks, mobile multimedia delivery to handsets is now a reality. While a truly immersive multimedia experience is still far ahead in the mobile world, significant advances have been made in the constituent audio-visual technologies to make this become possible. One of the critical components in multimedia delivery is the mobile handset display. While such alternatives as headset-style near-to-eye displays, autostereoscopic displays, mini-projectors, and roll-out flexible displays can deliver either a larger virtual screen size than the pocketable dimensions of the mobile device can offer, or an added degree of immersion by adding the illusion of the third dimension in the viewing experience, there are still challenges in the full deployment of such displays in real-life mobile communication terminals. Meanwhile, direct-view display technologies have developed steadily, and can provide a development platform for an even better viewing experience for multimedia in the near future. The paper presents an overview of the mobile display technology space with an emphasis on the advances and potential in developing direct-view displays further to meet the goal of enabling multimedia in the mobile domain.

  10. Composite systems of dilute and dense couplings

    International Nuclear Information System (INIS)

    Raymond, J R; Saad, D

    2008-01-01

    Composite systems, where couplings are of two types, a combination of strong dilute and weak dense couplings of Ising spins, are examined through the replica method. The dilute and dense parts are considered to have independent canonical disordered or uniform bond distributions; mixing the models by variation of a parameter γ alongside inverse temperature β we analyse the respective thermodynamic solutions. We describe the variation in high temperature transitions as mixing occurs; in the vicinity of these transitions we exactly analyse the competing effects of the dense and sparse models. By using the replica symmetric ansatz and population dynamics we described the low temperature behaviour of mixed systems

  11. Intense, ultrashort light and dense, hot matter

    Indian Academy of Sciences (India)

    tiphoton and tunneling ionization, the physics of plasma formed in dense matter is .... A typical Gaussian laser pulse of 100 fs dura- .... J range) – and finally it is compressed back to its .... bond-hardening, molecular orientation and reori-.

  12. Finding dense locations in indoor tracking data

    DEFF Research Database (Denmark)

    Ahmed, Tanvir; Pedersen, Torben Bach; Lu, Hua

    2014-01-01

    for semi-constrained indoor movement, and then uses this to map raw tracking records into mapping records representing object entry and exit times in particular locations. Then, an efficient indexing structure, the Dense Location Time Index (DLT-Index) is proposed for indexing the time intervals...... of the mapping table, along with associated construction, query processing, and pruning techniques. The DLT-Index supports very efficient aggregate point queries, interval queries, and dense location queries. A comprehensive experimental study with real data shows that the proposed techniques can efficiently......Finding the dense locations in large indoor spaces is very useful for getting overloaded locations, security, crowd management, indoor navigation, and guidance. Indoor tracking data can be very large and are not readily available for finding dense locations. This paper presents a graph-based model...

  13. Interference Coordination for Dense Wireless Networks

    DEFF Research Database (Denmark)

    Soret, Beatriz; Pedersen, Klaus I.; Jørgensen, Niels T.K.

    2015-01-01

    and dense deployment in Tokyo are compared. Evolution to DenseNets offers new opportunities for further development of downlink interference cooperation techniques. Various mechanisms in LTE and LTE-Advanced are revisited. Some techniques try to anticipate the future in a proactive way, whereas others......The promise of ubiquitous and super-fast connectivity for the upcoming years will be in large part fulfilled by the addition of base stations and spectral aggregation. The resulting very dense networks (DenseNets) will face a number of technical challenges. Among others, the interference emerges...... as an old acquaintance with new significance. As a matter of fact, the interference conditions and the role of aggressor and victim depend to a large extent on the density and the scenario. To illustrate this, downlink interference statistics for different 3GPP simulation scenarios and a more irregular...

  14. Skyrmions, dense matter and nuclear forces

    International Nuclear Information System (INIS)

    Pethick, C.J.

    1984-12-01

    A simple introduction to a number of properties of Skyrme's chiral soliton model of baryons is given. Some implications of the model for dense matter and for nuclear interactions are discussed. (orig.)

  15. Dynamical theory of dense groups of galaxies

    Science.gov (United States)

    Mamon, Gary A.

    1990-01-01

    It is well known that galaxies associate in groups and clusters. Perhaps 40% of all galaxies are found in groups of 4 to 20 galaxies (e.g., Tully 1987). Although most groups appear to be so loose that the galaxy interactions within them ought to be insignificant, the apparently densest groups, known as compact groups appear so dense when seen in projection onto the plane of the sky that their members often overlap. These groups thus appear as dense as the cores of rich clusters. The most popular catalog of compact groups, compiled by Hickson (1982), includes isolation among its selection critera. Therefore, in comparison with the cores of rich clusters, Hickson's compact groups (HCGs) appear to be the densest isolated regions in the Universe (in galaxies per unit volume), and thus provide in principle a clean laboratory for studying the competition of very strong gravitational interactions. The $64,000 question here is then: Are compact groups really bound systems as dense as they appear? If dense groups indeed exist, then one expects that each of the dynamical processes leading to the interaction of their member galaxies should be greatly enhanced. This leads us to the questions: How stable are dense groups? How do they form? And the related question, fascinating to any theorist: What dynamical processes predominate in dense groups of galaxies? If HCGs are not bound dense systems, but instead 1D change alignments (Mamon 1986, 1987; Walke & Mamon 1989) or 3D transient cores (Rose 1979) within larger looser systems of galaxies, then the relevant question is: How frequent are chance configurations within loose groups? Here, the author answers these last four questions after comparing in some detail the methods used and the results obtained in the different studies of dense groups.

  16. Kinetic chemistry of dense interstellar clouds

    International Nuclear Information System (INIS)

    Graedel, T.E.; Langer, W.D.; Frerking, M.A.

    1982-01-01

    A detailed model of the time-dependent chemistry of dense interstellar clouds has been developed to study the dominant chemical processes in carbon and oxygen isotope fractionation, formation of nitrogen-containing molecules, evolution of product molecules as a function of cloud density and temperature, and other topics of interest. The full computation involves 328 individual reactions (expanded to 1067 to study carbon and oxygen isotope chemistry); photodegradation processes are unimportant in these dense clouds and are excluded

  17. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  18. Mobile Learning Using Mobile Phones

    Science.gov (United States)

    Vicente, Paula

    2013-01-01

    The participation in mobile learning programs is conditioned by having/using mobile communication technology. Those who do not have or use such technology cannot participate in mobile learning programs. This study evaluates who are the most likely participants of mobile learning programs by examining the demographic profile and mobile phone usage…

  19. AdS2 holographic dictionary

    International Nuclear Information System (INIS)

    Cvetič, Mirjam; Papadimitriou, Ioannis

    2016-01-01

    We construct the holographic dictionary for both running and constant dilaton solutions of the two dimensional Einstein-Maxwell-Dilaton theory that is obtained by a circle reduction from Einstein-Hilbert gravity with negative cosmological constant in three dimensions. This specific model ensures that the dual theory has a well defined ultraviolet completion in terms of a two dimensional conformal field theory, but our results apply qualitatively to a wider class of two dimensional dilaton gravity theories. For each type of solutions we perform holographic renormalization, compute the exact renormalized one-point functions in the presence of arbitrary sources, and derive the asymptotic symmetries and the corresponding conserved charges. In both cases we find that the scalar operator dual to the dilaton plays a crucial role in the description of the dynamics. Its source gives rise to a matter conformal anomaly for the running dilaton solutions, while its expectation value is the only non trivial observable for constant dilaton solutions. The role of this operator has been largely overlooked in the literature. We further show that the only non trivial conserved charges for running dilaton solutions are the mass and the electric charge, while for constant dilaton solutions only the electric charge is non zero. However, by uplifting the solutions to three dimensions we show that constant dilaton solutions can support non trivial extended symmetry algebras, including the one found by Compère, Song and Strominger http://dx.doi.org/10.1007/JHEP05(2013)152, in agreement with the results of Castro and Song http://arxiv.org/abs/1411.1948. Finally, we demonstrate that any solution of this specific dilaton gravity model can be uplifted to a family of asymptotically AdS 2 ×S 2 or conformally AdS 2 ×S 2 solutions of the STU model in four dimensions, including non extremal black holes. The four dimensional solutions obtained by uplifting the running dilaton solutions coincide

  20. Complexity of the AdS soliton

    Science.gov (United States)

    Reynolds, Alan P.; Ross, Simon F.

    2018-05-01

    We consider the holographic complexity conjectures in the context of the AdS soliton, which is the holographic dual of the ground state of a field theory on a torus with antiperiodic boundary conditions for fermions on one cycle. The complexity is a non-trivial function of the size of the circle with antiperiodic boundary conditions, which sets an IR scale in the dual geometry. We find qualitative differences between the calculations of complexity from spatial volume and action (CV and CA). In the CV calculation, the complexity for antiperiodic boundary conditions is smaller than for periodic, and decreases monotonically with increasing IR scale. In the CA calculation, the complexity for antiperiodic boundary conditions is larger than for periodic, and initially increases with increasing IR scale, eventually decreasing to zero as the IR scale becomes of order the UV cutoff. We compare these results to a simple calculation for free fermions on a lattice, where we find the complexity for antiperiodic boundary conditions is larger than for periodic.

  1. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  2. Staging Mobilities / Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2015-01-01

    , and systems 'hosting' these multiple and complex mobilities are designed and how they are staging these in terms of their physical layout. By analysing specific cases of ‘mobilities design’ related to the four modes of moving; Walk, Bike, Train, and Car, the book uncover important and until now neglected...... is more than movement between point A and B. It explores how the movement of people, goods, information, and signs influences human understandings of self, other and the built environment. Moving towards a new understanding of the relationship between movement, interaction and environments, the project...

  3. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from

  4. Handover management in dense cellular networks: A stochastic geometry approach

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    Cellular operators are continuously densifying their networks to cope with the ever-increasing capacity demand. Furthermore, an extreme densification phase for cellular networks is foreseen to fulfill the ambitious fifth generation (5G) performance requirements. Network densification improves spectrum utilization and network capacity by shrinking base stations' (BSs) footprints and reusing the same spectrum more frequently over the spatial domain. However, network densification also increases the handover (HO) rate, which may diminish the capacity gains for mobile users due to HO delays. In highly dense 5G cellular networks, HO delays may neutralize or even negate the gains offered by network densification. In this paper, we present an analytical paradigm, based on stochastic geometry, to quantify the effect of HO delay on the average user rate in cellular networks. To this end, we propose a flexible handover scheme to reduce HO delay in case of highly dense cellular networks. This scheme allows skipping the HO procedure with some BSs along users' trajectories. The performance evaluation and testing of this scheme for only single HO skipping shows considerable gains in many practical scenarios. © 2016 IEEE.

  5. Handover management in dense cellular networks: A stochastic geometry approach

    KAUST Repository

    Arshad, Rabe

    2016-07-26

    Cellular operators are continuously densifying their networks to cope with the ever-increasing capacity demand. Furthermore, an extreme densification phase for cellular networks is foreseen to fulfill the ambitious fifth generation (5G) performance requirements. Network densification improves spectrum utilization and network capacity by shrinking base stations\\' (BSs) footprints and reusing the same spectrum more frequently over the spatial domain. However, network densification also increases the handover (HO) rate, which may diminish the capacity gains for mobile users due to HO delays. In highly dense 5G cellular networks, HO delays may neutralize or even negate the gains offered by network densification. In this paper, we present an analytical paradigm, based on stochastic geometry, to quantify the effect of HO delay on the average user rate in cellular networks. To this end, we propose a flexible handover scheme to reduce HO delay in case of highly dense cellular networks. This scheme allows skipping the HO procedure with some BSs along users\\' trajectories. The performance evaluation and testing of this scheme for only single HO skipping shows considerable gains in many practical scenarios. © 2016 IEEE.

  6. AdS3: the NHEK generation

    International Nuclear Information System (INIS)

    Bena, Iosif; Heurtier, Lucien; Puhm, Andrea

    2016-01-01

    It was argued in http://dx.doi.org/10.1007/JHEP03(2013)028 that the five-dimensional near-horizon extremal Kerr (NHEK) geometry can be embedded in String Theory as the infrared region of an infinite family of non-supersymmetric geometries that have D1, D5, momentum and KK monopole charges. We show that there exists a method to embed these geometries into asymptotically-AdS 3 ×S 3 /ℤ N solutions, and hence to obtain infinite families of flows whose infrared is NHEK. This indicates that the CFT dual to the NHEK geometry is the IR fixed point of a Renormalization Group flow from a known local UV CFT and opens the door to its explicit construction.

  7. Hadronization at the AdS wall

    International Nuclear Information System (INIS)

    Evans, Nick; French, James; Threlfall, Ed; Jensen, Kristan

    2010-01-01

    We describe hadronization events, using the AdS/CFT Correspondence, which display many of the qualitative features expected in QCD. In particular we study the motion of strings with separating end points in a back-reacted hard wall geometry. The solutions show the development of a linear QCD-like string. The end points oscillate in the absence of string breaking. We introduce string breaking by hand and evolve the new state forward in time to observe the separation of two string segments. A kink associated with this breaking evolves to the end points of the string inducing rho meson production. We explicitly compute the rho meson production at the end point.

  8. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  9. Constitutive law of dense granular matter

    International Nuclear Information System (INIS)

    Hatano, Takahiro

    2010-01-01

    The frictional properties of dense granular matter under steady shear flow are investigated using numerical simulation. Shear flow tends to localize near the driving boundary unless the coefficient of restitution is close to zero and the driving velocity is small. The bulk friction coefficient is independent of shear rate in dense and slow flow, whereas it is an increasing function of shear rate in rapid flow. The coefficient of restitution affects the friction coefficient only in such rapid flow. Contrastingly, in dense and slow regime, the friction coefficient is independent of the coefficient of restitution and mainly determined by the elementary friction coefficient and the rotation of grains. It is found that the mismatch between the vorticity of flow and the angular frequency of grains plays a key role to the frictional properties of sheared granular matter.

  10. Mobile Election

    OpenAIRE

    Long, Elena; Lovitskii, Vladimir; Thrasher, Michael; Traynor, David

    2009-01-01

    Mobile phones have the potential of fostering political mobilisation. There is a significant political power in mobile technology. Like the Internet, mobile phones facilitate communication and rapid access to information. Compared to the Internet, however, mobile phone diffusion has reached a larger proportion of the population in most countries, and thus the impact of this new medium is conceivably greater. There are now more mobile phones in the UK than there are people (ave...

  11. Mobile Advertising

    OpenAIRE

    Alamuri, Lavanya

    2009-01-01

    The aim of this project was to get an understanding of how companies adopt mobile as an advertising medium. The literature review aided in framing a draft of the factors that affect mobile advertising adoption and possible forms of mobile advertising. Considering the scope of the thesis work, branding strategy, service costs, personalization and privacy and platform were considered to be the factors that could affect the mobile advertising adoption. A few possible forms on mobile device we...

  12. Nucleon structure and properties of dense matter

    International Nuclear Information System (INIS)

    Kutschera, M.; Pethick, C.J.; Illinois Univ., Urbana, IL

    1988-01-01

    We consider the properties of dense matter in a framework of the Skyrme soliton model and the chiral bag model. The influence of the nucleon structure on the equation of state of dense matter is emphasized. We find that in both models the energy per unit volume is proportional to n 4/3 , n being the baryon number density. We discuss the properties of neutron stars with a derived equation of state. The role of many-body effects is investigated. The effect of including higher order terms in the chiral lagrangian is examined. The phase transition to quark matter is studied. 29 refs., 6 figs. (author)

  13. Fast Solvers for Dense Linear Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kauers, Manuel [Research Institute for Symbolic Computation (RISC), Altenbergerstrasse 69, A4040 Linz (Austria)

    2008-10-15

    It appears that large scale calculations in particle physics often require to solve systems of linear equations with rational number coefficients exactly. If classical Gaussian elimination is applied to a dense system, the time needed to solve such a system grows exponentially in the size of the system. In this tutorial paper, we present a standard technique from computer algebra that avoids this exponential growth: homomorphic images. Using this technique, big dense linear systems can be solved in a much more reasonable time than using Gaussian elimination over the rationals.

  14. Pathloss Modelling of less dense urban area in Lagos State using Lee Model

    OpenAIRE

    O. Shoewu

    2017-01-01

    In this study we aim to adopt a propagation model for a less dense urban area in Lagos state by examining one of the popular empirical path loss models for mobile communication. Lee’s model was compared with measured path loss obtain from the field measurement at GSM frequency of 900 MHz . TEMS Investigation tool was used for the drive test. The measurements of the received signal strength were collected through drive test with the aid of an Ericson test mobile system (TEMS). This was conduct...

  15. Stable solutions of a scalar conservation law for particle-size segregation in dense granular avalanches

    OpenAIRE

    Shearer, M.; Gray, J. M N T; Thornton, A. R.

    2008-01-01

    Dense, dry granular avalanches are very efficient at sorting the larger particles towards the free surface of the flow, and finer grains towards the base, through the combined processes of kinetic sieving and squeeze expulsion. This generates an inversely graded particle-size distribution, which is fundamental to a variety of pattern formation mechanisms, as well as subtle size-mobility feedback effects, leading to the formation of coarse-grained lateral levees that create channels in geophys...

  16. Management job ads

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2014-01-01

    jobs by discursively constructing job ads that appeal to both sexes. This argument is part of the broader field of corporate social responsibility, corporate citizenship, and stakeholder management, which involves discussions of the obligations of corporations to acknowledge and mitigate...... the increasingly widespread impact that their activities have on communities and social structures. The article emphasises the need for more active engagement on the part of corporations by analysing the discursive construction of preferred candidates in a small sample of Danish management job ads. By means...... that this agreement reflects a high degree of conservatism in the system where men enjoy a considerable advantage and where procedures that ensure male dominance are perpetuated even in the linguistic and discursive construction of job ads....

  17. Energy Assessment of Automated Mobility Districts

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Yuche [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-08-03

    Automated vehicles (AVs) are increasingly being discussed as the basis for on-demand mobility services, introducing a new paradigm in which a fleet of AVs displace private automobiles for day-to-day travel in dense activity districts. This project examines such a concept to displace privately owned automobiles within a region containing dense activity generators (jobs, retail, entertainment, etc.), referred to as an automated mobility district (AMDs). The project reviews several such districts including airport, college campuses, business parks, downtown urban cores, and military bases, with examples of previous attempts to meet the mobility needs apart from private automobiles, some with automated technology and others with more traditional transit based solutions. The issues and benefits of AMDs are framed within the perspective of intra-district, inter-district, and border issues, and the requirements for a modeling framework are identified to adequately reflect the breadth of mobility, energy, and emissions impact anticipated with AMDs.

  18. ADS National Programmes: China

    International Nuclear Information System (INIS)

    2015-01-01

    In China the conceptual study of an ADS concept which lasted for about five years ended in 1999. As one project of the National Basic Research Programme of China (973 Programme) in energy domain, which is sponsored by the China Ministry of Science and Technology (MOST), a five year programme of fundamental research of ADS physics and related technology was launched in 2000 and passed national review at the end of 2005. From 2007, another five year 973 Programme Key Technology Research of Accelerator Driven Subcritical System for Nuclear waste Transmutation started. The research activities were focused on HPPA physics and technology, reactor physics of external source driven subcritical assembly, nuclear data base and material study. For HPPA, a high current injector consisting of an ECR ion source, LEBT and an RFQ accelerating structure of 3.5 MeV has been built and were being improved. In reactor physics study, a series of neutron multiplication experimental study has been carrying out. The VENUS I facility has been constructed as the basic experimental platform for neutronics study in ADS blanket. VENUS I a zero power subcritical neutron multiplying assembly driven by external neutron produced by a pulsed neutron generator or 252Cf neutron source. The theoretical, experimental and simulation studies on nuclear data, material properties and nuclear fuel circulation related to ADS are carried out in order to provide the database for ADS system analysis. China Institute of Atomic Energy (CIAE), Institute of High Energy Physics (IHEP) and other Chinese institutes carried out the MOST project together. Besides CIAE, China Academy of Science (CAS) pays more and more attention to Advanced Nuclear Fuel Cycles (ANFC). A large programme of ANFC, including ADS and Th based nuclear fuel cycle, has been launched by CAS

  19. The added value of a mobile application of Community Case Management on referral, re-consultation and hospitalization rates of children aged under 5 years in two districts in Northern Malawi: study protocol for a pragmatic, stepped-wedge cluster-randomized controlled trial.

    Science.gov (United States)

    Hardy, Victoria; O'Connor, Yvonne; Heavin, Ciara; Mastellos, Nikolaos; Tran, Tammy; O'Donoghue, John; Fitzpatrick, Annette L; Ide, Nicole; Wu, Tsung-Shu Joseph; Chirambo, Griphin Baxter; Muula, Adamson S; Nyirenda, Moffat; Carlsson, Sven; Andersson, Bo; Thompson, Matthew

    2017-10-11

    There is evidence to suggest that frontline community health workers in Malawi are under-referring children to higher-level facilities. Integrating a digitized version of paper-based methods of Community Case Management (CCM) could strengthen delivery, increasing urgent referral rates and preventing unnecessary re-consultations and hospital admissions. This trial aims to evaluate the added value of the Supporting LIFE electronic Community Case Management Application (SL eCCM App) compared to paper-based CCM on urgent referral, re-consultation and hospitalization rates, in two districts in Northern Malawi. This is a pragmatic, stepped-wedge cluster-randomized trial assessing the added value of the SL eCCM App on urgent referral, re-consultation and hospitalization rates of children aged 2 months and older to up to 5 years, within 7 days of the index visit. One hundred and two health surveillance assistants (HSAs) were stratified into six clusters based on geographical location, and clusters randomized to the timing of crossover to the intervention using simple, computer-generated randomization. Training workshops were conducted prior to the control (paper-CCM) and intervention (paper-CCM + SL eCCM App) in assigned clusters. Neither participants nor study personnel were blinded to allocation. Outcome measures were determined by abstraction of clinical data from patient records 2 weeks after recruitment. A nested qualitative study explored perceptions of adherence to urgent referral recommendations and a cost evaluation determined the financial and time-related costs to caregivers of subsequent health care utilization. The trial was conducted between July 2016 and February 2017. This is the first large-scale trial evaluating the value of adding a mobile application of CCM to the assessment of children aged under 5 years. The trial will generate evidence on the potential use of mobile health for CCM in Malawi, and more widely in other low- and middle

  20. Mobilities Design

    DEFF Research Database (Denmark)

    Lanng, Ditte Bendix; Wind, Simon; Jensen, Ole B.

    2017-01-01

    Mobilities comprise a large part of our world and everyday lives, and the mobilities spaces in which we travel are ubiquitous. Yet, ordinary mobilities spaces – such as parking lots, pedestrian tunnels, and road lay-bys – tend to be criticized as typologies that lack consideration for the people...... who use them and for their wider social, aesthetic, cultural, and ecological agency in the city. This is clearly not an unambiguous characterization. But from it follows an urgency to re-examine unheeded mobilities spaces and extend demands of their agency beyond standards of technical efficiency....... This article draws on the recent “mobilities turn” in social science to support such re-examination of mobilities spaces. In social-scientific mobilities research, mobilities are considered the departure point for understanding the socio-material world in which we live. Mobilities are regarded as far more than...

  1. Toward Superior Capacitive Energy Storage: Recent Advances in Pore Engineering for Dense Electrodes.

    Science.gov (United States)

    Liu, Congcong; Yan, Xiaojun; Hu, Fei; Gao, Guohua; Wu, Guangming; Yang, Xiaowei

    2018-04-01

    With the rapid development of mobile electronics and electric vehicles, future electrochemical capacitors (ECs) need to store as much energy as possible in a rather limited space. As the core component of ECs, dense electrodes that have a high volumetric energy density and superior rate capability are the key to achieving improved energy storage. Here, the significance of and recent progress in the high volumetric performance of dense electrodes are presented. Furthermore, dense yet porous electrodes, as the critical precondition for realizing superior electrochemical capacitive energy, have become a scientific challenge and an attractive research focus. From a pore-engineering perspective, insight into the guidelines of engineering the pore size, connectivity, and wettability is provided to design dense electrodes with different porous architectures toward high-performance capacitive energy storage. The current challenges and future opportunities toward dense electrodes are discussed and include the construction of an orderly porous structure with an appropriate gradient, the coupling of pore sizes with the solvated cations and anions, and the design of coupled pores with diverse electrolyte ions. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. Antecedents to Consumers' Acceptance of Mobile Advertisements

    DEFF Research Database (Denmark)

    Rajala, Risto; Westerlund, Mika

    2010-01-01

    The paper presents a hierarchical construct PLS structural equation model to analyze mobile advertisement acceptance. Hypotheses are established and tested about the hierarchical structure and the effects of the factors that precede consumers' behavioral intention to accept mobile advertisement....... The results suggest that valuable content and trust in advertisers are key predictors of mobile device users' acceptance of mobile advertising. In addition, subjective value of the ads and subjective norms mediate these antecedent-acceptance relationships. The results are invaluable to both scholars...

  3. Correlation ion mobility spectroscopy

    Science.gov (United States)

    Pfeifer, Kent B [Los Lunas, NM; Rohde, Steven B [Corrales, NM

    2008-08-26

    Correlation ion mobility spectrometry (CIMS) uses gating modulation and correlation signal processing to improve IMS instrument performance. Closely spaced ion peaks can be resolved by adding discriminating codes to the gate and matched filtering for the received ion current signal, thereby improving sensitivity and resolution of an ion mobility spectrometer. CIMS can be used to improve the signal-to-noise ratio even for transient chemical samples. CIMS is especially advantageous for small geometry IMS drift tubes that can otherwise have poor resolution due to their small size.

  4. Dense high temperature ceramic oxide superconductors

    Science.gov (United States)

    Landingham, Richard L.

    1993-01-01

    Dense superconducting ceramic oxide articles of manufacture and methods for producing these articles are described. Generally these articles are produced by first processing these superconducting oxides by ceramic processing techniques to optimize materials properties, followed by reestablishing the superconducting state in a desired portion of the ceramic oxide composite.

  5. Dense high-temperature plasma transport processes

    International Nuclear Information System (INIS)

    Giniyatova, Sh.G.

    2002-01-01

    In this work the transport processes in dense high-temperature semiclassical plasma are studied on the base of the kinetic equation, where the semiclassical potential was used, in its collision integral. The coefficient of plasma electrical conductivity, viscosity and thermal conductivity were received. There were compared with the other authors' results. The Grad's method was used obtaining of viscosity and thermal coefficients. (author)

  6. The electronic pressure in dense plasmas

    International Nuclear Information System (INIS)

    Pozwolski, A.E.

    1982-01-01

    A thermodynamic calculation of the electronic pressure in a dense plasma is given. Approximations involved by the use of the Debye length are avoided, so the above theory remains valid even if the Debye length is smaller than the interionic distance. (author)

  7. APT: Action localization Proposals from dense Trajectories

    NARCIS (Netherlands)

    van Gemert, J.C.; Jain, M.; Gati, E.; Snoek, C.G.M.; Xie, X.; Jones, M.W.; Tam, G.K.L.

    2015-01-01

    This paper is on action localization in video with the aid of spatio-temporal proposals. To alleviate the computational expensive video segmentation step of existing proposals, we propose bypassing the segmentations completely by generating proposals directly from the dense trajectories used to

  8. Dense Alternating Sign Matrices and Extensions

    Czech Academy of Sciences Publication Activity Database

    Fiedler, Miroslav; Hall, F.J.; Stroev, M.

    2014-01-01

    Roč. 444, 1 March (2014), s. 219-226 ISSN 0024-3795 Institutional support: RVO:67985807 Keywords : alternating sign matrix * dense matrix * totally unimodular matrix * combined matrix * generalized complementary basic matrix Subject RIV: BA - General Mathematics Impact factor: 0.939, year: 2014

  9. Coalescence preference in dense packing of bubbles

    Science.gov (United States)

    Kim, Yeseul; Gim, Bopil; Gim, Bopil; Weon, Byung Mook

    2015-11-01

    Coalescence preference is the tendency that a merged bubble from the contact of two original bubbles (parent) tends to be near to the bigger parent. Here, we show that the coalescence preference can be blocked by densely packing of neighbor bubbles. We use high-speed high-resolution X-ray microscopy to clearly visualize individual coalescence phenomenon which occurs in micro scale seconds and inside dense packing of microbubbles with a local packing fraction of ~40%. Previous theory and experimental evidence predict a power of -5 between the relative coalescence position and the parent size. However, our new observation for coalescence preference in densely packed microbubbles shows a different power of -2. We believe that this result may be important to understand coalescence dynamics in dense packing of soft matter. This work (NRF-2013R1A22A04008115) was supported by Mid-career Researcher Program through NRF grant funded by the MEST and also was supported by Ministry of Science, ICT and Future Planning (2009-0082580) and by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry and Education, Science and Technology (NRF-2012R1A6A3A04039257).

  10. Probing dense matter with strange hadrons

    CERN Document Server

    Rafelski, Johann; Rafelski, Johann; Letessier, Jean

    2002-01-01

    Analysis of hadron production experimental data allows to understand the properties of the dense matter fireball produced in relativistic heavy ion collisions. We interpret the analysis results and argue that color deconfined state has been formed at highest CERN-SPS energies and at BNL-RHIC.

  11. Adding an extra storey

    DEFF Research Database (Denmark)

    Engelmark, Jesper; Dahl, Torben; Melgaard, Ebbe

    2007-01-01

    of them had to be renovated after a shorter period. In stead of just replacing the original roof with a new one, it is now a days rather common to ad an extra storey where that is possible according to local planning. The reason is as a rule based on economical benefits, but very often this extra storey...

  12. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  13. Globally regular instability of AdS_3

    OpenAIRE

    Bizon, P.; Jałmużna, J.

    2013-01-01

    We consider three-dimensional AdS gravity minimally coupled to a massless scalar field and study numerically the evolution of small smooth circularly symmetric perturbations of the $AdS_3$ spacetime. As in higher dimensions, for a large class of perturbations, we observe a turbulent cascade of energy to high frequencies which entails instability of $AdS_3$. However, in contrast to higher dimensions, the cascade cannot be terminated by black hole formation because small perturbations have ener...

  14. Nonlinear realization of supersymmetric AdS space isometries

    International Nuclear Information System (INIS)

    Clark, T. E.; Love, S. T.

    2006-01-01

    The isometries of AdS 5 space and supersymmetric AdS 5 xS 1 space are nonlinearly realized on four-dimensional Minkowski space. The resultant effective actions in terms of the Nambu-Goldstone modes are constructed. The dilatonic mode governing the motion of the Minkowski space probe brane into the covolume of supersymmetric AdS 5 space is found to be unstable and the bulk of the AdS 5 space is unable to sustain the brane. No such instability appears in the nonsupersymmetric case

  15. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix

    Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the background of the ‘mobilities turn’ (e.g. Cresswell 2006, Urry 2007) this book articulates a new and emerging research field, namely that of ‘m......Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the background of the ‘mobilities turn’ (e.g. Cresswell 2006, Urry 2007) this book articulates a new and emerging research field, namely...... that of ‘mobilities design’. The book revolves around the following research question: How are design decisions and interventions staging mobilities? It builds upon the Staging Mobilities model (Jensen 2013) in an explorative inquiry into the problems and potentials of the design of mobilities. The exchange value...

  16. Mobile economy

    OpenAIRE

    Turowski, Klaus

    2004-01-01

    Mobile economy : Transaktionen, Prozesse, Anwendungen und Dienste ; 4. Workshop Mobile Commerce, 02.-03. Februar 2004, Univ. Augsburg / K. Turowski ... (Hrsg.). - Bonn : Ges. für Informatik, 2004. - 189 S. : Ill., graph. Darst. - (GI-Edition : Proceedings ; 42)

  17. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  18. Mobile marketing

    OpenAIRE

    Gause, Matěj

    2012-01-01

    The goal of bachelor's thesis on the theme "Mobile marketing" is to outline its development and why is this new phenomen so important for all modern companies around the world. The work is not about simple description of mobile marketing media but it vividly informs about the latest trends and news from the world of mobile apps and games. It presents the most successful mobile apps which registered more than billion downloads and from their unique characteristics it unveils great potential of...

  19. Mobile marketing

    OpenAIRE

    KLEČKOVÁ, Zuzana

    2013-01-01

    The main aim of this thesis was to provide a comprehensive overview of the mobile marketing and analyze selected campaigns of Czech mobile marketing in comparison to world successful campaigns. The research contained studying of available literature about the theme to gain general knowledge about the issue. The theoretical part of the thesis contains predominantly various definitions of mobile marketing and its tools, advantages of these tools and some information about Mobile Marketing Assoc...

  20. IrisDenseNet: Robust Iris Segmentation Using Densely Connected Fully Convolutional Networks in the Images by Visible Light and Near-Infrared Light Camera Sensors.

    Science.gov (United States)

    Arsalan, Muhammad; Naqvi, Rizwan Ali; Kim, Dong Seop; Nguyen, Phong Ha; Owais, Muhammad; Park, Kang Ryoung

    2018-05-10

    The recent advancements in computer vision have opened new horizons for deploying biometric recognition algorithms in mobile and handheld devices. Similarly, iris recognition is now much needed in unconstraint scenarios with accuracy. These environments make the acquired iris image exhibit occlusion, low resolution, blur, unusual glint, ghost effect, and off-angles. The prevailing segmentation algorithms cannot cope with these constraints. In addition, owing to the unavailability of near-infrared (NIR) light, iris recognition in visible light environment makes the iris segmentation challenging with the noise of visible light. Deep learning with convolutional neural networks (CNN) has brought a considerable breakthrough in various applications. To address the iris segmentation issues in challenging situations by visible light and near-infrared light camera sensors, this paper proposes a densely connected fully convolutional network (IrisDenseNet), which can determine the true iris boundary even with inferior-quality images by using better information gradient flow between the dense blocks. In the experiments conducted, five datasets of visible light and NIR environments were used. For visible light environment, noisy iris challenge evaluation part-II (NICE-II selected from UBIRIS.v2 database) and mobile iris challenge evaluation (MICHE-I) datasets were used. For NIR environment, the institute of automation, Chinese academy of sciences (CASIA) v4.0 interval, CASIA v4.0 distance, and IIT Delhi v1.0 iris datasets were used. Experimental results showed the optimal segmentation of the proposed IrisDenseNet and its excellent performance over existing algorithms for all five datasets.

  1. IrisDenseNet: Robust Iris Segmentation Using Densely Connected Fully Convolutional Networks in the Images by Visible Light and Near-Infrared Light Camera Sensors

    Directory of Open Access Journals (Sweden)

    Muhammad Arsalan

    2018-05-01

    Full Text Available The recent advancements in computer vision have opened new horizons for deploying biometric recognition algorithms in mobile and handheld devices. Similarly, iris recognition is now much needed in unconstraint scenarios with accuracy. These environments make the acquired iris image exhibit occlusion, low resolution, blur, unusual glint, ghost effect, and off-angles. The prevailing segmentation algorithms cannot cope with these constraints. In addition, owing to the unavailability of near-infrared (NIR light, iris recognition in visible light environment makes the iris segmentation challenging with the noise of visible light. Deep learning with convolutional neural networks (CNN has brought a considerable breakthrough in various applications. To address the iris segmentation issues in challenging situations by visible light and near-infrared light camera sensors, this paper proposes a densely connected fully convolutional network (IrisDenseNet, which can determine the true iris boundary even with inferior-quality images by using better information gradient flow between the dense blocks. In the experiments conducted, five datasets of visible light and NIR environments were used. For visible light environment, noisy iris challenge evaluation part-II (NICE-II selected from UBIRIS.v2 database and mobile iris challenge evaluation (MICHE-I datasets were used. For NIR environment, the institute of automation, Chinese academy of sciences (CASIA v4.0 interval, CASIA v4.0 distance, and IIT Delhi v1.0 iris datasets were used. Experimental results showed the optimal segmentation of the proposed IrisDenseNet and its excellent performance over existing algorithms for all five datasets.

  2. Ads in Indonesia

    Directory of Open Access Journals (Sweden)

    Wulan Roro Retno

    2017-01-01

    Full Text Available Cosmetics industry created the beauty myth for women through advertising. A cosmetic ad in Indonesia has spread a new concept of white skin: East Asia beauty myth. The white concept of Asia white skin basically derived from colonial legacy. The purpose of the research was analyzing the beauty myth in Indonesia ads using postcolonial perspective. The principal result brought the discourse analysis and postcolonial perspective a new insight in communication research. Particularly on media and cultural studies. Major conclusions showed that the beauty myth since the Dutch colonial period never been change. The main concept is always in colonialism’s idea: “white is better”. The West is better than the East.

  3. Staging Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    and lived as people are “staging themselves” (from below). Staging mobilities is a dynamic process between “being staged” (for example, being stopped at traffic lights) and the “mobile staging” of interacting individuals (negotiating a passage on the pavement). Staging Mobilities is about the fact...

  4. Subversive Mobilities

    DEFF Research Database (Denmark)

    Thelle, Mikkel

    2013-01-01

    The article approaches mobility through a cultural history of urban conflict. Using a case of “The Copenhagen Trouble,“ a series of riots in the Danish capital around 1900, a space of subversive mobilities is delineated. These turn-of-the-century riots points to a new pattern of mobile gathering...

  5. Philosophia ad bellum

    Directory of Open Access Journals (Sweden)

    Yu. O. Loboda

    2014-06-01

    Full Text Available In the paper «Philosophia ad bellum» is being realized an attempt to classify philosophic approaches to the study of phenomenon of war by the analogy with the structure of «Just war theory» – 1. Philosophia ad bellum – «philosophy for war», where are investigated ways of using of philosophic methods of cognition in applied military sciences; 2. Philosophia supra bello – «philosophy above war», which investigates world­view, historic­philosophic, existential, logic­epistemological aspects of war; 3. Philosophia contra belli – «philosophy against war», where research of the essence of war gets its logical conclusion in grounding of the absurdity of thinking schemes which justify war as an act of violence. In the article was made historic­philosophic overview of the part «Philosophia ad bellum», where were showed tangent questions, which are considered by philosophic logic and theory of strategic intelligence. It was stated, that specialists if military intelligence admit the important role of researches in logic and theory of cognition in their professional work; were defined basic questions, which have the most essential interest for military professionals. There were analyzed ways of using of philosophic methods in developing military strategies, was made a conclusion that philosophy can be a basis of strategic failures and victories as well.

  6. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-08-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical and virtual carrier sense networks, which reveals counter-intuitively that receivers in large dense networks with directional antennas can experience larger interference than in omnidirectional networks unless the beamwidth is sufficiently small. Validity of mathematical analysis is confirmed using simulations.

  7. WARM EXTENDED DENSE GAS AT THE HEART OF A COLD COLLAPSING DENSE CORE

    International Nuclear Information System (INIS)

    Shinnaga, Hiroko; Phillips, Thomas G.; Furuya, Ray S.; Kitamura, Yoshimi

    2009-01-01

    In order to investigate when and how the birth of a protostellar core occurs, we made survey observations of four well-studied dense cores in the Taurus molecular cloud using CO transitions in submillimeter bands. We report here the detection of unexpectedly warm (∼30-70 K), extended (radius of ∼2400 AU), dense (a few times 10 5 cm -3 ) gas at the heart of one of the dense cores, L1521F (MC27), within the cold dynamically collapsing components. We argue that the detected warm, extended, dense gas may originate from shock regions caused by collisions between the dynamically collapsing components and outflowing/rotating components within the dense core. We propose a new stage of star formation, 'warm-in-cold core stage (WICCS)', i.e., the cold collapsing envelope encases the warm extended dense gas at the center due to the formation of a protostellar core. WICCS would constitute a missing link in evolution between a cold quiescent starless core and a young protostar in class 0 stage that has a large-scale bipolar outflow.

  8. Mobile Probes in Mobile Learning

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Blomhøj, Ulla; Duvaa, Uffe

    In this paper experiences from using mobile probes in educational design of a mobile learning application is presented. The probing process stems from the cultural probe method, and was influenced by qualitative interview and inquiry approaches. In the project, the mobile phone was not only acting...... as an agent for acquiring empirical data (as the situation in hitherto mobile probe settings) but was also the technological medium for which data should say something about (mobile learning). Consequently, not only the content of the data but also the ways in which data was delivered and handled, provided...... a valuable dimension for investigating mobile use. The data was collected at the same time as design activities took place and the collective data was analysed based on user experience goals and cognitive processes from interaction design and mobile learning. The mobile probe increased the knowledge base...

  9. The group approach to AdS space propagators

    International Nuclear Information System (INIS)

    Leonhardt, Thorsten; Manvelyan, Ruben; Ruehl, Werner

    2003-01-01

    We show that AdS two-point functions can be obtained by connecting two points in the interior of AdS space with one point on its boundary by a dual pair of Dobrev's boundary-to-bulk intertwiners and integrating over the boundary point

  10. Mobile Semiotics

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2013-01-01

    This chapter aims to understand the mobile condition of contemporary life with a particular view to the signifying dimension of the environment and its ‘readability’. The chapter explores the potentials of semiotics and its relationship to the new mobilities literature. What takes place...... is a ‘mobile sense making’ where signs and materially situated meanings connect to the moving human body and thus create particular challenges and complexities of making sense of the world. The chapter includes notions of mobility systems and socio-technical networks in order to show how a ‘semiotic layer’ may...... work to afford or restrict mobile practices....

  11. Dense Output for Strong Stability Preserving Runge–Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2016-12-10

    We investigate dense output formulae (also known as continuous extensions) for strong stability preserving (SSP) Runge–Kutta methods. We require that the dense output formula also possess the SSP property, ideally under the same step-size restriction as the method itself. A general recipe for first-order SSP dense output formulae for SSP methods is given, and second-order dense output formulae for several optimal SSP methods are developed. It is shown that SSP dense output formulae of order three and higher do not exist, and that in any method possessing a second-order SSP dense output, the coefficient matrix A has a zero row.

  12. Canopy bidirectional reflectance calculation based on Adding method and SAIL formalism: AddingS / AddingSD

    NARCIS (Netherlands)

    Kallel, A.; Verhoef, W.; Hegarat-Mascle, Le S.; Ottle, C.; Hubert-Moy, L.

    2008-01-01

    The SAIL model (proposed by Verhoef) is largely used in the remote sensing community to calculate the canopy Bidirectional Reflectance Distribution Function. The simulation results appear acceptable compared to observations especially for not very dense planophile vegetation. However, for

  13. Dense plasma focus - a literature review

    International Nuclear Information System (INIS)

    Tendys, J.

    1976-01-01

    The dense plasma focus (DPF) is a convenient source of short, intense neutron pulses, and dense, high temperature plasma. This review of the literature on the DPF indicates that its operation is still not understood, and attempts to show where the present data is either inadequate or inconsistent. Because the plasma conditions and neutron and x-ray fluxes vary from shot to shot, it is maintained that, to resolve inconsistencies in the present data, spectra need to be measured with energy and time resolution simultaneously, and cannot be built up from a large number of shots. Time resolutions of the order of 1 nsec for pulse lengths of about 100 nsec make these requirements especially difficult. Some theoretical models are presented for the neutron output and its spectrum, but no self-consistent description of the plasma in the focus region is likely for some time. (author)

  14. Highly Dense Isolated Metal Atom Catalytic Sites

    DEFF Research Database (Denmark)

    Chen, Yaxin; Kasama, Takeshi; Huang, Zhiwei

    2015-01-01

    -ray diffraction. A combination of electron microscopy images with X-ray absorption spectra demonstrated that the silver atoms were anchored on five-fold oxygen-terminated cavities on the surface of the support to form highly dense isolated metal active sites, leading to excellent reactivity in catalytic oxidation......Atomically dispersed noble-metal catalysts with highly dense active sites are promising materials with which to maximise metal efficiency and to enhance catalytic performance; however, their fabrication remains challenging because metal atoms are prone to sintering, especially at a high metal...... loading. A dynamic process of formation of isolated metal atom catalytic sites on the surface of the support, which was achieved starting from silver nanoparticles by using a thermal surface-mediated diffusion method, was observed directly by using in situ electron microscopy and in situ synchrotron X...

  15. Anomalous properties of hot dense nonequilibrium plasmas

    International Nuclear Information System (INIS)

    Ferrante, G; Zarcone, M; Uryupin, S A

    2005-01-01

    A concise overview of a number of anomalous properties of hot dense nonequilibrium plasmas is given. The possibility of quasistationary megagauss magnetic field generation due to Weibel instability is discussed for plasmas created in atom tunnel ionization. The collisionless absorption and reflection of a test electromagnetic wave normally impinging on the plasma with two-temperature bi-maxwellian electron velocity distribution function are studied. Due to the wave magnetic field influence on the electron kinetics in the skin layer the wave absorption and reflection significantly depend on the degree of the electron temperature anisotropy. The linearly polarized impinging wave during reflection transforms into an elliptically polarized one. The problem of transmission of an ultrashort laser pulse through a layer of dense plasma, formed as a result of ionization of a thin foil, is considered. It is shown that the strong photoelectron distribution anisotropy yields an anomalous penetration of the wave field through the foil

  16. Deterministic dense coding with partially entangled states

    Science.gov (United States)

    Mozes, Shay; Oppenheim, Jonathan; Reznik, Benni

    2005-01-01

    The utilization of a d -level partially entangled state, shared by two parties wishing to communicate classical information without errors over a noiseless quantum channel, is discussed. We analytically construct deterministic dense coding schemes for certain classes of nonmaximally entangled states, and numerically obtain schemes in the general case. We study the dependency of the maximal alphabet size of such schemes on the partially entangled state shared by the two parties. Surprisingly, for d>2 it is possible to have deterministic dense coding with less than one ebit. In this case the number of alphabet letters that can be communicated by a single particle is between d and 2d . In general, we numerically find that the maximal alphabet size is any integer in the range [d,d2] with the possible exception of d2-1 . We also find that states with less entanglement can have a greater deterministic communication capacity than other more entangled states.

  17. PHOTOCHEMICAL HEATING OF DENSE MOLECULAR GAS

    Energy Technology Data Exchange (ETDEWEB)

    Glassgold, A. E. [Astronomy Department, University of California, Berkeley, CA 94720 (United States); Najita, J. R. [National Optical Astronomy Observatory, 950 North Cherry Avenue, Tucson, AZ 85719 (United States)

    2015-09-10

    Photochemical heating is analyzed with an emphasis on the heating generated by chemical reactions initiated by the products of photodissociation and photoionization. The immediate products are slowed down by collisions with the ambient gas and then heat the gas. In addition to this direct process, heating is also produced by the subsequent chemical reactions initiated by these products. Some of this chemical heating comes from the kinetic energy of the reaction products and the rest from collisional de-excitation of the product atoms and molecules. In considering dense gas dominated by molecular hydrogen, we find that the chemical heating is sometimes as large, if not much larger than, the direct heating. In very dense gas, the total photochemical heating approaches 10 eV per photodissociation (or photoionization), competitive with other ways of heating molecular gas.

  18. Manifestly T-dual formulation of AdS space

    International Nuclear Information System (INIS)

    Hatsuda, Machiko; Kamimura, Kiyoshi; Siegel, Warren

    2017-01-01

    We present a manifestly T-dual formulation of curved spaces such as an AdS space. For group manifolds related by the orthogonal vielbein fields the three form H=dB in the doubled space is universal at least locally. We construct an affine nondegenerate doubled bosonic AdS algebra to define the AdS space with the Ramond-Ramond flux. The non-zero commutator of the left and right momenta leads to that the left momentum is in an AdS space while the right momentum is in a dS space. Dimensional reduction constraints and the physical AdS algebra are shown to preserve all the doubled coordinates.

  19. Evaporation of large black holes in AdS

    International Nuclear Information System (INIS)

    Rocha, Jorge V

    2010-01-01

    The AdS/CFT correspondence offers a new perspective on the long-standing black hole information paradox. However, to be able to use the available gauge/gravity machinery one is forced to consider so-called 'large' black holes in AdS, and these objects are thermodynamically stable - they do not evaporate. We describe a simple toy model that allows large AdS black holes to decay, by coupling the emitted radiation to an external scalar field propagating in an auxiliary space. This effectively changes the properties of the boundary of AdS, making it partly absorbing. We demonstrate that the evaporation process never ceases by explicitly presenting (a) the transmission coefficient for a wave scattering from the bulk into auxiliary space and (b) the greybody factor for a black 3-brane in an AdS background. Therefore, the model provides an interesting framework to address the information paradox using AdS/CFT techniques.

  20. Manifestly T-dual formulation of AdS space

    Energy Technology Data Exchange (ETDEWEB)

    Hatsuda, Machiko [Physics Division, Faculty of Medicine, Juntendo University,Chiba 270-1695 (Japan); KEK Theory Center, High Energy Accelerator Research Organization,Tsukuba, Ibaraki 305-0801 (Japan); Kamimura, Kiyoshi [Physics Division, Faculty of Medicine, Juntendo University,Chiba 270-1695 (Japan); Siegel, Warren [C.N. Yang Institute for Theoretical Physics, Stony Brook University,Stony Brook, NY 11794-3840 (United States)

    2017-05-12

    We present a manifestly T-dual formulation of curved spaces such as an AdS space. For group manifolds related by the orthogonal vielbein fields the three form H=dB in the doubled space is universal at least locally. We construct an affine nondegenerate doubled bosonic AdS algebra to define the AdS space with the Ramond-Ramond flux. The non-zero commutator of the left and right momenta leads to that the left momentum is in an AdS space while the right momentum is in a dS space. Dimensional reduction constraints and the physical AdS algebra are shown to preserve all the doubled coordinates.

  1. Open strings on AdS2 branes

    International Nuclear Information System (INIS)

    Lee, Peter; Ooguri, Hirosi.; Park, Jongwon; Tannenhauser, Jonathan

    2001-01-01

    We study the spectrum of open strings on AdS 2 branes in AdS 3 in an NS-NS background, using the SL(2,R) WZW model. When the brane carries no fundamental string charge, the open string spectrum is the holomorphic square root of the spectrum of closed strings in AdS 3 . It contains short and long strings, and is invariant under spectral flow. When the brane carries fundamental string charge, the open string spectrum again contains short and long strings in all winding sectors. However, branes with fundamental string charge break half the spectral flow symmetry. This has different implications for short and long strings. As the fundamental string charge increases, the brane approaches the boundary of AdS 3 . In this limit, the induced electric field on the worldvolume reaches its critical value, producing noncommutative open string theory on AdS 2

  2. Dense-plasma research using ballistic compressors

    International Nuclear Information System (INIS)

    Hess, H.

    1986-01-01

    An introduction is given to research on dense (or nonideal) plasmas which can be generated to advantage by ballistic compressors. Some properties of ballistic compressors are discussed especially in comparison with shock tubes. A short review is given on the history of these devices for high-pressure plasma generation. The present state of the art is reported including research on the two ZIE (Central Institute for Electron Physics) ballistic compressors. (author)

  3. Studying dense plasmas with coherent XUV pulses

    International Nuclear Information System (INIS)

    Stabile, H.

    2006-12-01

    The investigation of dense plasma dynamic requires the development of diagnostics able to ensure the measurement of electronic density with micro-metric space resolution and sub-nanosecond, or even subpicosecond, time resolution (indeed this must be at least comparable with the characteristic tune scale of plasma evolution). In contrast with low-density plasmas, dense plasmas cannot be studied using optical probes in the visible domain, the density range accessible being limited to the critical density (N c equals 1.1*10 21 λ -2 (μm) ∼ 10 21 cm -3 for infrared). In addition, light is reflected even at smaller densities if the medium exhibits sharp density gradients. Hence probing of dense plasmas, for instance those produced by laser irradiation of solids, requires using shorter wavelength radiation. Thanks to their physical properties, high order harmonics generated in rare gases are particularly adapted to the study of dense plasmas. Indeed, they can naturally be synchronized with the generating laser and their pulse duration is very short, which makes it possible to use them in pump-probe experiments. Moreover, they exhibit good spatial and temporal coherencies. Two types of diagnostics were developed during this thesis. The first one was used to study the instantaneous creation of hot-solid-density plasma generated by focusing a femtosecond high-contrast laser on an ultra-thin foil (100 nm) in the 10 18 W/cm 2 intensity regime. The use of high order harmonics, providing a probe beam of sufficiently short wavelengths to penetrate such a medium, enables the study of its dynamics on the 100 fs time scale. The second one uses the harmonics beam as probe beam (λ equals 32 nm) within an interferometric device. This diagnostic was designed to ensure a micro-metric spatial resolution and a temporal resolution in the femtosecond range. The first results in presence of plasma created by irradiation of an aluminum target underline the potentialities of this new

  4. Particle identification system based on dense aerogel

    Energy Technology Data Exchange (ETDEWEB)

    Barnyakov, A.Yu. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Barnyakov, M.Yu. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State Technical University, 20, Karl Marx prospect, Novosibirsk, 630092 (Russian Federation); Beloborodov, K.I., E-mail: K.I.Beloborodov@inp.nsk.su [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State University, 2, Pirogova Street, Novosibirsk 630090 (Russian Federation); Bobrovnikov, V.S.; Buzykaev, A.R. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Danilyuk, A.F. [Boreskov Institute of Catalysis, 5, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Golubev, V.B. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State University, 2, Pirogova Street, Novosibirsk 630090 (Russian Federation); Gulevich, V.V. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Kononov, S.A.; Kravchenko, E.A. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State University, 2, Pirogova Street, Novosibirsk 630090 (Russian Federation); Onuchin, A.P.; Martin, K.A. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State Technical University, 20, Karl Marx prospect, Novosibirsk, 630092 (Russian Federation); Serednyakov, S.I. [Budker Institute of Nuclear Physics, 11, akademika Lavrentieva prospect, Novosibirsk 630090 (Russian Federation); Novosibirsk State University, 2, Pirogova Street, Novosibirsk 630090 (Russian Federation); and others

    2013-12-21

    A threshold Cherenkov counter based on dense aerogel with refraction index n=1.13 is described. This counter is used for kaon identification at momenta below 1 GeV/c in the SND detector, which takes data at the VEPP-2000 e{sup +}e{sup −} collider. The results of measurements of the counter efficiency using electrons, muons, pions, and kaons produced in e{sup +}e{sup −} annihilation are presented.

  5. Leeuwpan fine coal dense medium plant

    CSIR Research Space (South Africa)

    Lundt, M

    2010-11-01

    Full Text Available Beneficiation 2010, 4–6 May 2010. 671The Journal of The Southern African Institute of Mining and Metallurgy VOLUME 110 NOVEMBER 2010 L Leeuwpan fine coal dense medium plant mixed with magnetite in the launder and enters... with production. Plant equipment operational changes Cyclone spigot changes In an attempt to lower the cut-point density, the spigot on the L 672 NOVEMBER 2010 VOLUME 110 The Journal of The Southern African Institute of Mining and Metallurgy Figure 1...

  6. Densely Aligned Graphene Nanoribbon Arrays and Bandgap Engineering

    Energy Technology Data Exchange (ETDEWEB)

    Su, Justin [Stanford Univ., CA (United States); Chen, Changxin [Stanford Univ., CA (United States); Gong, Ming [Stanford Univ., CA (United States); Kenney, Michael [Stanford Univ., CA (United States)

    2017-01-04

    Graphene has attracted great interest for future electronics due to its high mobility and high thermal conductivity. However, a two-dimensional graphene sheet behaves like a metal, lacking a bandgap needed for the key devices components such as field effect transistors (FETs) in digital electronics. It has been shown that, partly due to quantum confinement, graphene nanoribbons (GNRs) with ~2 nm width can open up sufficient bandgaps and evolve into semiconductors to exhibit high on/off ratios useful for FETs. However, a challenging problem has been that, such ultra-narrow GNRs (~2 nm) are difficult to fabricate, especially for GNRs with smooth edges throughout the ribbon length. Despite high on/off ratios, these GNRs show very low mobility and low on-state conductance due to dominant scattering effects by imperfections and disorders at the edges. Wider GNRs (>5 nm) show higher mobility, higher conductance but smaller bandgaps and low on/off ratios undesirable for FET applications. It is highly desirable to open up bandgaps in graphene or increase the bandgaps in wide GNRs to afford graphene based semiconductors for high performance (high on-state current and high on/off ratio) electronics. Large scale ordering and dense packing of such GNRs in parallel are also needed for device integration but have also been challenging thus far. It has been shown theoretically that uniaxial strains can be applied to a GNR to engineer its bandgap. The underlying physics is that under uniaxial strain, the Dirac point moves due to stretched C-C bonds, leading to an increase in the bandgap of armchair GNRs by up to 50% of its original bandgap (i.e. bandgap at zero strain). For zigzag GNRs, due to the existence of the edge states, changes of bandgap are smaller under uniaxial strain and can be increased by ~30%. This work proposes a novel approach to the fabrication of densely aligned graphene nanoribbons with highly smooth edges afforded by anisotropic etching and uniaxial strain for

  7. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2014-01-01

    Users are already mobile, but the question is to which extent knowledge-based dictionary apps are designed for the mobile user situation. The objective of this article is to analyse the characteristics of the mobile user situation and to look further into the stationary user situation and the mob......Users are already mobile, but the question is to which extent knowledge-based dictionary apps are designed for the mobile user situation. The objective of this article is to analyse the characteristics of the mobile user situation and to look further into the stationary user situation...... and the mobile user situation. The analysis is based on an empirical survey involving ten medical doctors and a monolingual app designed to support cognitive lexicographic functions, cf. (Tarp 2006:61-64). In test A the doctors looked up five medical terms while sitting down at a desk and in test B the doctors...

  8. Mobility Divides

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    Contemporary mobilities are cultural and social manifestations, and the mobile practices in the everyday life of billions of humans are re-configuring senses of place, self, other and relationships to the built environment. The way ‘mobile situations’ are staged in designed and built environments......’ in the everyday life and cast light on how design and ‘materialities of mobilites’ are creating differential mobilities across societies, social networks, and communities of practices.......Contemporary mobilities are cultural and social manifestations, and the mobile practices in the everyday life of billions of humans are re-configuring senses of place, self, other and relationships to the built environment. The way ‘mobile situations’ are staged in designed and built environments...

  9. Mobile Semiotics - signs and mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    a potential for mobilities studies if the awareness of seeing the environment as a semiotic layer and system can be sensitized to the insights of the ‘mobilities turn’. Empirically the paper tentatively explores the usefulness of a mobile semiotics approach to cases such as street signage, airport design...

  10. Collective dynamics in dense fluid mixtures

    International Nuclear Information System (INIS)

    Sinha, S.

    1992-01-01

    This thesis deals with the short wavelength collective dynamics of dense binary fluid mixtures. The analysis shows that at the level of linearized generalized hydrodynamics, the longitudinal modes of the system separates essentially into two parts - one involves the coupling of partial density fluctuations of the two species and the other involves coupling of longitudinal momentum and temperature fluctuations. The authors have shown that the coupling of longitudinal momentum and temperature fluctuations leads to an adequate description of sound propagation in such systems. In particular, they show that structural disorder controls the trapping of sound waves in dense mixtures. The coupling of the partial density fluctuations of the two species leads to a simple description of the partial dynamic structure factors. The results are in agreement with the molecular dynamics simulations of soft sphere mixtures. The partial density fluctuations are the slowest decaying fluctuations on molecular length scales and it turns out that nonlinear coupling of these slow modes leads to important corrections to the long time behavior of the time correlation functions determining the shear viscosity in dense mixtures

  11. Formation and fragmentation of protostellar dense cores

    International Nuclear Information System (INIS)

    Maury, Anaelle

    2009-01-01

    Stars form in molecular clouds, when they collapse and fragment to produce protostellar dense cores. These dense cores are then likely to contract under their own gravity, and form young protostars, that further evolve while accreting their circumstellar mass, until they reach the main sequence. The main goal of this thesis was to study the formation and fragmentation of protostellar dense cores. To do so, two main studies, described in this manuscript, were carried out. First, we studied the formation of protostellar cores by quantifying the impact of protostellar outflows on clustered star formation. We carried out a study of the protostellar outflows powered by the young stellar objects currently formed in the NGc 2264-C proto-cluster, and we show that protostellar outflows seem to play a crucial role as turbulence progenitors in clustered star forming regions, although they seem unlikely to significantly modify the global infall processes at work on clump scales. Second, we investigated the formation of multiple systems by core fragmentation, by using high - resolution observations that allow to probe the multiplicity of young protostars on small scales. Our results suggest that the multiplicity rate of protostars on small scales increase while they evolve, and thus favor dynamical scenarios for the formation of multiple systems. Moreover, our results favor magnetized scenarios of core collapse to explain the small-scale properties of protostars at the earliest stages. (author) [fr

  12. Hybrid-Based Dense Stereo Matching

    Science.gov (United States)

    Chuang, T. Y.; Ting, H. W.; Jaw, J. J.

    2016-06-01

    Stereo matching generating accurate and dense disparity maps is an indispensable technique for 3D exploitation of imagery in the fields of Computer vision and Photogrammetry. Although numerous solutions and advances have been proposed in the literature, occlusions, disparity discontinuities, sparse texture, image distortion, and illumination changes still lead to problematic issues and await better treatment. In this paper, a hybrid-based method based on semi-global matching is presented to tackle the challenges on dense stereo matching. To ease the sensitiveness of SGM cost aggregation towards penalty parameters, a formal way to provide proper penalty estimates is proposed. To this end, the study manipulates a shape-adaptive cross-based matching with an edge constraint to generate an initial disparity map for penalty estimation. Image edges, indicating the potential locations of occlusions as well as disparity discontinuities, are approved by the edge drawing algorithm to ensure the local support regions not to cover significant disparity changes. Besides, an additional penalty parameter 𝑃𝑒 is imposed onto the energy function of SGM cost aggregation to specifically handle edge pixels. Furthermore, the final disparities of edge pixels are found by weighting both values derived from the SGM cost aggregation and the U-SURF matching, providing more reliable estimates at disparity discontinuity areas. Evaluations on Middlebury stereo benchmarks demonstrate satisfactory performance and reveal the potency of the hybrid-based dense stereo matching method.

  13. Leading Change, Adding Value.

    Science.gov (United States)

    Evans, Nick

    2016-09-12

    Essential facts Leading Change, Adding Value is NHS England's new nursing and midwifery framework. It is designed to build on Compassion in Practice (CiP), which was published 3 years ago and set out the 6Cs: compassion, care, commitment, courage, competence and communication. CiP established the values at the heart of nursing and midwifery, while the new framework sets out how staff can help transform the health and care sectors to meet the aims of the NHS England's Five Year Forward View.

  14. Analysis of pervasive mobile ad hoc routing protocols

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Hassanien, A.E.; Abawajy, J.H.; Abraham, A.; Hagras, H.

    2009-01-01

    Pervasive computing (also referred to as ubiquitous computing or ambient intelligence) aims to create environments where computers are invisibly and seamlessly integrated and connected into our everyday environment. Pervasive computing and intelligent multimedia technologies are becoming

  15. Probabilistic Models and Process Calculi for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Song, Lei

    , thus the network topology may undergo constant changes. Moreover the devices in an MANET are loosely connected not depending on pre-installed infrastructure or central control components, they exchange messages via wireless connections which are less reliable compared to wired connections. Therefore...

  16. Ad hoc networking scheme for mobile cyber-physical systems

    KAUST Repository

    Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    Embodiments of the present disclosure provide techniques for packet routing. In an embodiment, when a transmitting communication device injects a packet into a communication network, a receiving communication device that is closer to a sink

  17. Ad hoc networking scheme for mobile cyber-physical systems

    KAUST Repository

    Bader, Ahmed

    2017-08-17

    Embodiments of the present disclosure provide techniques for packet routing. In an embodiment, when a transmitting communication device injects a packet into a communication network, a receiving communication device that is closer to a sink or destination than the transmitting communication device relays the packet in a first hop. In a subsequent hop, a receiving communication device evaluates position information conveyed by the transmitting communication device of the first hop to determine whether to forward the packet. Accordingly, a receiving communication device receiver that offers progress towards the sink can elect to forward the packet.

  18. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-08-01

    the results for the standard 8 bits per pixel ( bpp ) 512512 Lena image [3] with a transmission rate of 0.375 bpp . To compare the image quality, we...use peak-signal-to-noise ratio (PSNR), defined as  DE 2255 log10PSNR  (dB) (2) where 255 is due to the 8 bpp image

  19. Network Management System for Tactical Mobile Ad Hoc Network Segments

    Science.gov (United States)

    2011-09-01

    Protocol UFO UHF Follow-On UHF Ultra High Frequency USB Universal Serial Bus VHF Very High Frequency VIRT Valuable Information at the Right Time...military satellite system known as the UHF Follow-on system ( UFO ) only provides capacity for 600 concurrent users. DoD users also have commercial

  20. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-05-01

    results quantifying the impact of fading on average symbol and error probability (SEP/ BEP ) are available for various modulation schemes. However, in slow...fading situations, there is no mapping between the average SEP/ BEP and the average PEP. Consequently knowing average SEP/ BEP does not help in...understanding the average PEP. Analysis of average PEP is a more complicated problem compared to the analysis of average SEP/ BEP . Analytical

  1. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services...... are provided to the application running on the robot. The services are generic because they can be used by many different applications, independent of the task to be solved. Likewise, specific services are requested from the underlying Virtual Machine, such as broadcast, multicast, and reliable unicast....... A prototype of the Collaboration Layer has been developed to run in a simulated environment and tested in an evaluation scenario. In the scenario five robots solve the tasks of vacuum cleaning and entrance guarding, which involves the ability to discover potential co-workers, form groups, shift from one group...

  2. Dense Output for Strong Stability Preserving Runge–Kutta Methods

    KAUST Repository

    Ketcheson, David I.; Loczi, Lajos; Jangabylova, Aliya; Kusmanov, Adil

    2016-01-01

    We investigate dense output formulae (also known as continuous extensions) for strong stability preserving (SSP) Runge–Kutta methods. We require that the dense output formula also possess the SSP property, ideally under the same step

  3. About chiral models of dense matter and its magnetic properties

    International Nuclear Information System (INIS)

    Kutschera, M.

    1990-12-01

    The chiral models of dense nucleon matter are discussed. The quark matter with broken chiral symmetry is described. The magnetic properties of dense matter are presented and conclusions are given. 37 refs. (A.S.)

  4. Conical singularities in AdS space time

    International Nuclear Information System (INIS)

    Ferreira, Cristine Nunes

    2011-01-01

    Full text: In recent years, the study of conformal gauge theories from 10-D has been motivated by the AdS d+1 /CFT d correspondence, first conjectured by J. Maldacena. The aim of this work is to consider the d = 4 case by analysing the configuration of the N coincident D3 branes. In this context, the work shows that there is a duality between type IIB string theory in AdS 5 x S 5 and N = 4 SU(N) Super Yang-Mills Theory in the IR. The AdS 5 /CFT 4 correspondence brought also new approaches to the strong coupling problem in QCD. Nowadays, there is a whole line of works that focus on the low dimensional correspondence AdS 4 /CFT 3 , like the application to graphene and topological insulators, and the AdS 3 /CFT 2 correspondence, related with the entanglement entropy. In this work, we consider the vortex configuration solution to the AdS 4 and AdS 3 space-time. The most important motivation is to discuss the boundary theory resulting from these solutions. We have examined a straightforward approach to a holographic computation of the graphene and entanglement entropy in the presence of the conical singularity. After this analysis, we consider the scalar field in the bulk in the presence of this metrics and work out the compactification modes. Taking the holographic point of view, we study and discuss the resulting Green function. (author)

  5. Hawking radiation from AdS black holes

    International Nuclear Information System (INIS)

    Hubeny, Veronika E; Rangamani, Mukund; Marolf, Donald

    2010-01-01

    We study Hartle-Hawking-like states of quantum field theories on asymptotically AdS black hole backgrounds, with particular regard to the phase structure of interacting theories. By a suitable analytic continuation we show that the equilibrium dynamics of field theories on large asymptotically AdS black holes can be related to the low-temperature states of the same field theory on the AdS soliton (or pure AdS) background. This allows us to gain insight into Hartle-Hawking-like states on large-radius Schwarzschild- or rotating-AdS black holes. Furthermore, we exploit the AdS/CFT correspondence to explore the physics of strongly coupled large N theories on asymptotically AdS black holes. In particular, we exhibit a plausibly complete set of phases for the M2-brane world-volume superconformal field theory on a BTZ black hole background. Our analysis partially resolves puzzles previously raised in connection with Hawking radiation on large AdS black holes.

  6. Sensor and ad-hoc networks theoretical and algorithmic aspects

    CERN Document Server

    Makki, S Kami; Pissinou, Niki; Makki, Shamila; Karimi, Masoumeh; Makki, Kia

    2008-01-01

    This book brings together leading researchers and developers in the field of wireless sensor networks to explain the special problems and challenges of the algorithmic aspects of sensor and ad-hoc networks. The book also fosters communication not only between the different sensor and ad-hoc communities, but also between those communities and the distributed systems and information systems communities. The topics addressed pertain to the sensors and mobile environment.

  7. Broadcast scheduling for mobile advertising

    OpenAIRE

    De Reyck, B.; Degraeve, Z.

    2003-01-01

    We describe a broadcast scheduling system developed for a precision marketing firm specialized in location-sensitive permission-based mobile advertising using SMS (Short Message Service) text messaging. Text messages containing advertisements were sent to registered customers when they were shopping in one of two shopping centers in the vicinity of London. The ads typically contained a limited-time promotional offer. The company's problem was deciding which ads to send out to which customers ...

  8. Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Katz, Marcos

    A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile...... users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for mobile clouds are also discussed, highlighting the key role of network coding. Mobile clouds have the potential to enhance communications...... performance, improve utilization of resources and create flexible platforms to share resources in very novel ways. Energy efficient aspects of mobile clouds are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple...

  9. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix; Wind, Simon

    2016-01-01

    In this paper, we identify the nexus between design (architecture, urban design, service design, etc.) and mobilities as a new and emerging research field. In this paper, we apply a “situational mobilities” perspective and take point of departure in the pragmatist question: “What design decisions...... and interventions affords this particular mobile situation?” The paper presents the contours of an emerging research agenda within mobilities research. The advent of “mobilities design” as an emerging research field points towards a critical interest in the material as well as practical consequences of contemporary......-making. The paper proposes that increased understanding of the material affordances facilitated through design provides important insight to planning and policymaking that at times might be in risk of becoming too detached from the everyday life of the mobile subject within contemporary mobilities landscapes....

  10. Mobiles Robotersystem

    OpenAIRE

    Schmierer, G.; Wolf, A.

    1999-01-01

    DE 19816893 A UPAB: 20000203 NOVELTY - An optical and or acoustic noticeable advertising and or information carrier (10) is fixed permitting detachment in such a manner at the mobile platform (8), that the advertising and or information carrier does not impair the movability of the mobile platform. The advertising is provided at an exposed place on the mobile platform. USE - Advertising or information communication. ADVANTAGE - Advertising or information is imparted in prominent positioning w...

  11. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  12. AdS Branes from Partial Breaking of Superconformal Symmetries

    International Nuclear Information System (INIS)

    Ivanov, E.A.

    2005-01-01

    It is shown how the static-gauge world-volume superfield actions of diverse superbranes on the AdS d+1 superbackgrounds can be systematically derived from nonlinear realizations of the appropriate AdS supersymmetries. The latter are treated as superconformal symmetries of flat Minkowski superspaces of the bosonic dimension d. Examples include the N = 1 AdS 4 supermembrane, which is associated with the 1/2 partial breaking of the OSp(1|4) supersymmetry down to the N = 1, d = 3 Poincare supersymmetry, and the T-duality related L3-brane on AdS 5 and scalar 3-brane on AdS 5 x S 1 , which are associated with two different patterns of 1/2 breaking of the SU(2, 2|1) supersymmetry. Another (closely related) topic is the AdS/CFT equivalence transformation. It maps the world-volume actions of the codimension-one AdS d+1 (super)branes onto the actions of the appropriate Minkowski (super)conformal field theories in the dimension d

  13. Mobil marketing

    OpenAIRE

    Engelová, Kateřina

    2006-01-01

    Mobil marketing - reklama a podpora prodeje prostřednictvím mobilních telefonů. Technologické a kulturní předpoklady vzniku tohoto odvětví. Mobil marketing a marketingový mix, možnosti synergie. Nástroje mobil marketingu - reklamní SMS a MMS, lokační služby, soutěže, ankety a hlasování, věrnostní systémy, mobilní obsah. Subjekty mobil marketingu. M-komerce. Využití pro podnikové aplikace.

  14. Evolution of dense spatially modulated electron bunches

    Science.gov (United States)

    Balal, N.; Bratman, V. L.; Friedman, A.

    2018-03-01

    An analytical theory describing the dynamics of relativistic moving 1D electron pulses (layers) with the density modulation affected by a space charge has been revised and generalized for its application to the formation of dense picosecond bunches from linear accelerators with laser-driven photo injectors, and its good agreement with General Particle Tracer simulations has been demonstrated. Evolution of quasi-one-dimensional bunches (disks), for which the derived formulas predict longitudinal expansion, is compared with that for thin and long electron cylinders (threads), for which the excitation of non-linear waves with density spikes was found earlier by Musumeci et al. [Phys. Rev. Lett. 106(18), 184801 (2011)] and Musumeci et al. [Phys. Rev. Spec. Top. -Accel. Beams 16(10), 100701 (2013)]. Both types of bunches can be used for efficiency enhancement of THz sources based on the Doppler frequency up-shifted coherent spontaneous radiation of electrons. Despite the strong Coulomb repulsion, the periodicity of a preliminary modulation in dense 1D layers persists during their expansion in the most interesting case of a relatively small change in particle energy. However, the period of modulation increases and its amplitude decreases in time. In the case of a large change in electron energy, the uniformity of periodicity is broken due to different relativistic changes in longitudinal scales along the bunch: the "period" of modulation decreases and its amplitude increases from the rear to the front boundary. Nevertheless, the use of relatively long electron bunches with a proper preliminary spatial modulation of density can provide a significantly higher power and a narrower spectrum of coherent spontaneous radiation of dense bunches than in the case of initially short single bunches with the same charge.

  15. Supersymmetric warped AdS in extended topologically massive supergravity

    International Nuclear Information System (INIS)

    Deger, N.S.; Kaya, A.; Samtleben, H.; Sezgin, E.

    2014-01-01

    We determine the most general form of off-shell N=(1,1) supergravity field configurations in three dimensions by requiring that at least one off-shell Killing spinor exists. We then impose the field equations of the topologically massive off-shell supergravity and find a class of solutions whose properties crucially depend on the norm of the auxiliary vector field. These are spacelike-squashed and timelike-stretched AdS 3 for the spacelike and timelike norms, respectively. At the transition point where the norm vanishes, the solution is null warped AdS 3 . This occurs when the coefficient of the Lorentz–Chern–Simons term is related to the AdS radius by μℓ=2. We find that the spacelike-squashed AdS 3 can be modded out by a suitable discrete subgroup of the isometry group, yielding an extremal black hole solution which avoids closed timelike curves

  16. Electron conductivity model for dense plasmas

    International Nuclear Information System (INIS)

    Lee, Y.T.; More, R.M.

    1984-01-01

    An electron conductivity model for dense plasmas is described which gives a consistent and complete set of transport coefficients including not only electrical conductivity and thermal conductivity, but also thermoelectric power, and Hall, Nernst, Ettinghausen, and Leduc--Righi coefficients. The model is useful for simulating plasma experiments with strong magnetic fields. The coefficients apply over a wide range of plasma temperature and density and are expressed in a computationally simple form. Different formulas are used for the electron relaxation time in plasma, liquid, and solid phases. Comparisons with recent calculations and available experimental measurement show the model gives results which are sufficiently accurate for many practical applications

  17. Dense hydrogen plasma: Comparison between models

    International Nuclear Information System (INIS)

    Clerouin, J.G.; Bernard, S.

    1997-01-01

    Static and dynamical properties of the dense hydrogen plasma (ρ≥2.6gcm -3 , 0.1< T<5eV) in the strongly coupled regime are compared through different numerical approaches. It is shown that simplified density-functional molecular-dynamics simulations (DFMD), without orbitals, such as Thomas-Fermi Dirac or Thomas-Fermi-Dirac-Weiszaecker simulations give similar results to more sophisticated descriptions such as Car-Parrinello (CP), tight binding, or path-integral Monte Carlo, in a wide range of temperatures. At very low temperature, screening effects predicted by DFMD are still less pronounced than CP simulations. copyright 1997 The American Physical Society

  18. Electrical and thermal conductivities in dense plasmas

    Energy Technology Data Exchange (ETDEWEB)

    Faussurier, G., E-mail: gerald.faussurier@cea.fr; Blancard, C.; Combis, P.; Videau, L. [CEA, DAM, DIF, F-91297 Arpajon (France)

    2014-09-15

    Expressions for the electrical and thermal conductivities in dense plasmas are derived combining the Chester-Thellung-Kubo-Greenwood approach and the Kramers approximation. The infrared divergence is removed assuming a Drude-like behaviour. An analytical expression is obtained for the Lorenz number that interpolates between the cold solid-state and the hot plasma phases. An expression for the electrical resistivity is proposed using the Ziman-Evans formula, from which the thermal conductivity can be deduced using the analytical expression for the Lorenz number. The present method can be used to estimate electrical and thermal conductivities of mixtures. Comparisons with experiment and quantum molecular dynamics simulations are done.

  19. The Magpie dense z-pinch project

    International Nuclear Information System (INIS)

    Chittenden, J.; Choi, P.; Mitchell, I.; Dangor, A.E.; Haines, M.G.

    1990-01-01

    The authors present a design study on the Mega Ampere Generator for Plasma Implosion Experiments (MAGPIE), a project currently under construction at Imperial College London, to study radiative collapse of a dense Z-pinch plasma created from a 20 um diameter cryogenic hydrogen fiber. The 2 TW generator is composed of four individual 2.4 MV Marx banks of the HERMES III type design with a maximum stored energy of 336 kJ. They drive four 5 ohm Pulse Forming Lines which are combined into a single 1.25 MA in 150 ns to a 150 nH load

  20. Strange mesons in dense nuclear matter

    International Nuclear Information System (INIS)

    Senger, P.

    2000-10-01

    Experimental data on the production of kaons and antikaons in heavy ion collisions at relativistic energies are reviewed with respect to in-medium effects. The K - /K + ratios measured in nucleus-nucleus collisions are 1-2 orders of magnitude larger than in proton-proton collisions. The azimuthal angle distributions of K + mesons indicate a repulsive kaon-nucleon potential. Microscopic transport calculations consistently explain both the yields and the emission patterns of kaons and antikaons when assuming that their properties are modified in dense nuclear matter. The K + production excitation functions measured in light and heavy collision systems provide evidence for a soft nuclear equation-of-state. (orig.)

  1. Atomic physics in dense plasmas. Recent advances

    International Nuclear Information System (INIS)

    Leboucher-Dalimier, E.; Angelo, P.; Ceccotti, T.; Derfoul, H.; Poquerusse, A.; Sauvan, P.; Oks, E.

    2000-01-01

    This paper presents observations and simulations of novel density-dependent spectroscopic features in hot and dense plasmas. Both time-integrated and time-resolved results using ultra-high resolutions spectrometers are presented; they are justified within the standard spectral line shape theory or the quasi-molecular alternative treatment. A particular attention is paid to the impact of the spatio-temporal evolution of the plasma on the experimental spectra. Satellite-like features and molecular lines in the cases of Flyβ, Heβ are discussed emphasizing their importance for the density diagnostics when ion-ion correlations are significant. (authors)

  2. Structure of a new dense amorphous ice

    International Nuclear Information System (INIS)

    Finney, J.L.; Bowron, D.T.; Soper, A.K.; Loerting, T.; Mayer, E.; Hallbrucker, A.

    2002-01-01

    The detailed structure of a new dense amorphous ice, VHDA, is determined by isotope substitution neutron diffraction. Its structure is characterized by a doubled occupancy of the stabilizing interstitial location that was found in high density amorphous ice, HDA. As would be expected for a thermally activated unlocking of the stabilizing 'interstitial', the transition from VHDA to LDA (low-density amorphous ice) is very sharp. Although its higher density makes VHDA a better candidate than HDA for a physical manifestation of the second putative liquid phase of water, as for the HDA case, the VHDA to LDA transition also appears to be kinetically controlled

  3. Fabrication of dense panels in lithium fluoride

    International Nuclear Information System (INIS)

    Farcy, P.; Roger, J.; Pointud, R.

    1958-04-01

    The authors report a study aimed at the fabrication of large and dense lithium fluoride panels. This sintered lithium fluoride is then supposed to be used for the construction of barriers of protection against a flow of thermal neutrons. They briefly present the raw material which is used under the form of chamotte obtained through a pre-sintering process which is also described. Grain size measurements and sample preparation are indicated. Shaping, drying, and thermal treatment are briefly described, and characteristics of the sintered product are indicated

  4. Quasi-molecular processes in dense plasmas

    International Nuclear Information System (INIS)

    Younger, S.M.

    1991-01-01

    Quasi-molecular phenomena occur in dense plasmas when the interatomic spacing is comparable to the characteristic wavelength of the electrons. If the electronic states are bound, covalent orbitals arise with different excitation energies, radiative rates, and collisional rates than for isolated ions. For continuum electrons, charge localization near transient clusters of nuclei can influence many scattering and transport processes. We identify several novel consequences of quasi-molecular phenomena in plasmas and give a possible explanation of high energy features associated with helium-like emissions lines observed in recent inertial fusion experiments. 7 refs

  5. Graph Quasicontinuous Functions and Densely Continuous Forms

    Directory of Open Access Journals (Sweden)

    Lubica Hola

    2017-07-01

    Full Text Available Let $X, Y$ be topological spaces. A function $f: X \\to Y$ is said to be graph quasicontinuous if there is a quasicontinuous function $g: X \\to Y$ with the graph of $g$ contained in the closure of the graph of $f$. There is a close relation between the notions of graph quasicontinuous functions and minimal usco maps as well as the notions of graph quasicontinuous functions and densely continuous forms. Every function with values in a compact Hausdorff space is graph quasicontinuous; more generally every locally compact function is graph quasicontinuous.

  6. Mobile phones and mobile communication

    DEFF Research Database (Denmark)

    Ling, Richard; Donner, Jonathan

    With staggering swiftness, the mobile phone has become a fixture of daily life in almost every society on earth. In 2007, the world had over 3 billion mobile subscriptions. Prosperous nations boast of having more subscriptions than people. In the developing world, hundreds of millions of people who...... could never afford a landline telephone now have a mobile number of their own. With a mobile in our hand many of us feel safer, more productive, and more connected to loved ones, but perhaps also more distracted and less involved with things happening immediately around us. Written by two leading...... researchers in the field, this volume presents an overview of the mobile telephone as a social and cultural phenomenon. Research is summarized and made accessible though detailed descriptions of ten mobile users from around the world. These illustrate popular debates, as well as deeper social forces at work...

  7. Ad gist : Ad communication in a single eye fixation

    NARCIS (Netherlands)

    Pieters, R.; Wedel, M.

    2012-01-01

    Most ads in practice receive no more than a single eye fixation. This study investigates the limits of what ads can communicate under such adverse exposure conditions. We find that consumers already know at maximum levels of accuracy and with high degree of certainty whether something is an ad or is

  8. Urban Mobility

    DEFF Research Database (Denmark)

    2017-01-01

    This anthology is the proceedings publication from the 2015 NAF Symposium in Malmö, Sweden. The aim of the 2015 NAF Symposium “Urban Mobility – Architectures, Geographies and Social Space” was to facilitate a cross-disciplinary discussion on urban mobility in which the juxtaposition of different...

  9. Urban Mobility

    DEFF Research Database (Denmark)

    2017-01-01

    This anthology is the proceedings publication from the 2015 NAF Symposium in Malmö, Sweden. The aim of the 2015 NAF Symposium “Urban Mobility – Architectures, Geographies and Social Space” was to facilitate a cross-disciplinary discussion on urban mobility in which the juxtaposition of different ...

  10. Mobile phone

    International Nuclear Information System (INIS)

    2009-01-01

    Almost the entire Norwegian population has cell phone. The usefulness of the cell phone is great, but can use a mobile phone to health or discomfort? How can exposure be reduced? NRPA follows research and provides advice on mobile phone use. (AG)

  11. Neutrino interactions in hot and dense matter

    International Nuclear Information System (INIS)

    Reddy, S.; Prakash, M.; Lattimer, J.M.

    1998-01-01

    We study the charged and neutral current weak interaction rates relevant for the determination of neutrino opacities in dense matter found in supernovae and neutron stars. We establish an efficient formalism for calculating differential cross sections and mean free paths for interacting, asymmetric nuclear matter at arbitrary degeneracy. The formalism is valid for both charged and neutral current reactions. Strong interaction corrections are incorporated through the in-medium single particle energies at the relevant density and temperature. The effects of strong interactions on the weak interaction rates are investigated using both potential and effective field-theoretical models of matter. We investigate the relative importance of charged and neutral currents for different astrophysical situations, and also examine the influence of strangeness-bearing hyperons. Our findings show that the mean free paths are significantly altered by the effects of strong interactions and the multi-component nature of dense matter. The opacities are then discussed in the context of the evolution of the core of a protoneutron star. copyright 1998 The American Physical Society

  12. Predicting diffusivities in dense fluid mixtures

    Directory of Open Access Journals (Sweden)

    C. DARIVA

    1999-09-01

    Full Text Available In this work the Enskog solution of the Boltzmann equation, as corrected by Speedy, together with the Weeks-Chandler-Andersen (WCA perturbation theory of liquids is employed in correlating and predicting self-diffusivities of dense fluids. Afterwards this theory is used to estimate mutual diffusion coefficients of solutes at infinite dilution in sub and supercritical solvents. We have also investigated the behavior of Fick diffusion coefficients in the proximity of a binary vapor-liquid critical point since this subject is of great interest for extraction purposes. The approach presented here, which makes use of a density and temperature dependent hard-sphere diameter, is shown to be excellent for predicting diffusivities in dense pure fluids and fluid mixtures. The calculations involved highly nonideal mixtures as well as systems with high molecular asymmetry. The predicted diffusivities are in good agreement with the experimental data for the pure and binary systems. The methodology proposed here makes only use of pure component information and density of mixtures. The simple algebraic relations are proposed without any binary adjustable parameters and can be readily used for estimating diffusivities in multicomponent mixtures.

  13. Cold dense baryonic matter and compact stars

    International Nuclear Information System (INIS)

    Hyun Kyu Lee; Sang-Jin Sin; Mannque Rho

    2011-01-01

    Probing dense hadronic matter is thus far an uncharted field of physics. Here we give a brief summary of the highlights of what has been so far accomplished and what will be done in the years ahead by the World Class University III Project at Hanyang University in the endeavor to unravel and elucidate the multi-facet of the cold dense baryonic matter existing in the interior of the densest visible stable object in the universe, i.e. neutron stars, strangeness stars and/or quark stars, from a modest and simplified starting point of an effective field theory modeled on the premise of QCD as well as from a gravity dual approach of hQCD. The core of the matter of our research is the possible origin of the ∼ 99% of the proton mass that is to be accounted for and how the 'vacuum' can be tweaked so that the source of the mass generation can be uncovered by measurements made in terrestrial as well as space laboratories. Some of the issues treated in the program concern what can be done - both theoretically and experimentally - in anticipation of what's to come for basic physics research in Korea. (authors)

  14. Collective dynamics in dense Hg vapour

    International Nuclear Information System (INIS)

    Ishikawa, D; Inui, M; Matsuda, K; Tamura, K; Baron, A Q R; Tsutsui, S; Tanaka, Y; Ishikawa, T

    2004-01-01

    The dynamic structure factor, S(Q,ο), of dense Hg vapour has been measured by high resolution inelastic x-ray scattering for densities of 3.0, 2.1 and 1.0 g cm -3 corresponding to 0.52, 0.36 and 0.17 times the critical density, respectively, and for momentum transfers between 2.0 and 48 nm -1 . Analysis of the longitudinal current-current correlation function in the framework of generalized hydrodynamics reveals that the frequencies of the collective excitations increase faster with Q than estimated from the macroscopic speed of sound. The ratios of the frequencies were found to be 1.27 at 3.0 g cm -3 , 1.12 at 2.1 g cm -3 and 1.10 at 1.0 g cm -3 . The sound velocity obtained from the present experiments is well reproduced by a wavenumber dependent adiabatic sound velocity, which means that the collective modes remain in the spectra of dense Hg vapour. (letter to the editor)

  15. Redesigning Triangular Dense Matrix Computations on GPUs

    KAUST Repository

    Charara, Ali

    2016-08-09

    A new implementation of the triangular matrix-matrix multiplication (TRMM) and the triangular solve (TRSM) kernels are described on GPU hardware accelerators. Although part of the Level 3 BLAS family, these highly computationally intensive kernels fail to achieve the percentage of the theoretical peak performance on GPUs that one would expect when running kernels with similar surface-to-volume ratio on hardware accelerators, i.e., the standard matrix-matrix multiplication (GEMM). The authors propose adopting a recursive formulation, which enriches the TRMM and TRSM inner structures with GEMM calls and, therefore, reduces memory traffic while increasing the level of concurrency. The new implementation enables efficient use of the GPU memory hierarchy and mitigates the latency overhead, to run at the speed of the higher cache levels. Performance comparisons show up to eightfold and twofold speedups for large dense matrix sizes, against the existing state-of-the-art TRMM and TRSM implementations from NVIDIA cuBLAS, respectively, across various GPU generations. Once integrated into high-level Cholesky-based dense linear algebra algorithms, the performance impact on the overall applications demonstrates up to fourfold and twofold speedups, against the equivalent native implementations, linked with cuBLAS TRMM and TRSM kernels, respectively. The new TRMM/TRSM kernel implementations are part of the open-source KBLAS software library (http://ecrc.kaust.edu.sa/Pages/Res-kblas.aspx) and are lined up for integration into the NVIDIA cuBLAS library in the upcoming v8.0 release.

  16. Developing Cost-Effective Dense Continuous SDC Barrier Layers for SOFCs

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen, Hoang Viet P.; Hardy, John S.; Coyle, Christopher A.; LU, Zigui; Stevenson, Jeffry W.

    2017-12-04

    Significantly improved performance during electrochemical testing of a cell with a dense continuous pulsed laser deposited (PLD) samarium doped ceria (SDC) layer spurred investigations into the fabrication of dense continuous SDC barrier layers by means of cost-effective deposition using screen printing which is amenable to industrial production of SOFCs. Many approaches to improve the SDC density have been explored including the use of powder with reduced particle sizes, inks with increased solids loading, and doping with sintering aids (1). In terms of sintering aids, dopants like Mo or binary systems of Mo+Cu or Fe+Co greatly enhance SDC sinterability. In fact, adding dopants to a screen printed, prefired, porous SDC layer made it possible to achieve a dense continuous barrier layer atop the YSZ electrolyte without sintering above 1200°C. Although the objective of fabricating a dense continuous layer was achieved, additional studies have been initiated to improve the cell performance. Underlying issues with constrained sintering and dopant-enhanced ceria-zirconia solid solubility are also addressed in this paper.

  17. Fluorescence and absorption spectroscopy for warm dense matter studies and ICF plasma diagnostics

    Science.gov (United States)

    Hansen, S. B.; Harding, E. C.; Knapp, P. F.; Gomez, M. R.; Nagayama, T.; Bailey, J. E.

    2018-05-01

    The burning core of an inertial confinement fusion (ICF) plasma produces bright x-rays at stagnation that can directly diagnose core conditions essential for comparison to simulations and understanding fusion yields. These x-rays also backlight the surrounding shell of warm, dense matter, whose properties are critical to understanding the efficacy of the inertial confinement and global morphology. We show that the absorption and fluorescence spectra of mid-Z impurities or dopants in the warm dense shell can reveal the optical depth, temperature, and density of the shell and help constrain models of warm, dense matter. This is illustrated by the example of a high-resolution spectrum collected from an ICF plasma with a beryllium shell containing native iron impurities. Analysis of the iron K-edge provides model-independent diagnostics of the shell density (2.3 × 1024 e/cm3) and temperature (10 eV), while a 12-eV red shift in Kβ and 5-eV blue shift in the K-edge discriminate among models of warm dense matter: Both shifts are well described by a self-consistent field model based on density functional theory but are not fully consistent with isolated-atom models using ad-hoc density effects.

  18. Added Sugars and Cardiovascular Disease Risk in Children

    Science.gov (United States)

    Vos, Miriam B.; Kaar, Jill L.; Welsh, Jean A.; Van Horn, Linda V.; Feig, Daniel I.; Anderson, Cheryl A.M.; Patel, Mahesh J.; Munos, Jessica Cruz; Krebs, Nancy F.; Xanthakos, Stavra A.; Johnson, Rachel K.

    2017-01-01

    BACKGROUND Poor lifestyle behaviors are leading causes of preventable diseases globally. Added sugars contribute to a diet that is energy dense but nutrient poor and increase risk of developing obesity, cardiovascular disease, hypertension, obesity-related cancers, and dental caries. METHODS AND RESULTS For this American Heart Association scientific statement, the writing group reviewed and graded the current scientific evidence for studies examining the cardiovascular health effects of added sugars on children. The available literature was subdivided into 5 broad subareas: effects on blood pressure, lipids, insulin resistance and diabetes mellitus, nonalcoholic fatty liver disease, and obesity. CONCLUSIONS Associations between added sugars and increased cardiovascular disease risk factors among US children are present at levels far below current consumption levels. Strong evidence supports the association of added sugars with increased cardiovascular disease risk in children through increased energy intake, increased adiposity, and dyslipidemia. The committee found that it is reasonable to recommend that children consume ≤25 g (100 cal or ≈6 teaspoons) of added sugars per day and to avoid added sugars for children added sugars most likely can be safely consumed in low amounts as part of a healthy diet, few children achieve such levels, making this an important public health target. PMID:27550974

  19. Intensive mobilities

    DEFF Research Database (Denmark)

    Vannini, Phillip; Bissell, David; Jensen, Ole B.

    with fieldwork conducted in Canada, Denmark and Australia to develop our understanding of the experiential politics of long distance workers. Rather than focusing on the extensive dimensions of mobilities that are implicated in patterns and trends, our paper turns to the intensive dimensions of this experience......This paper explores the intensities of long distance commuting journeys as a way of exploring how bodily sensibilities are being changed by the mobilities that they undertake. The context of this paper is that many people are travelling further to work than ever before owing to a variety of factors...... which relate to transport, housing and employment. Yet we argue that the experiential dimensions of long distance mobilities have not received the attention that they deserve within geographical research on mobilities. This paper combines ideas from mobilities research and contemporary social theory...

  20. Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    are often still not engaged with in a sufficiently manner. Often social sciences keep distance to the physical and material as if the social was still to be understood as a realm separate of technology, architecture, and design (for a critique of this see; Latour 2005 and Urry 2000). This paper takes point......Within the so-called ‘mobilities turn’ (Adey 2010; Cresswell 2006; Urry 2007) much research has taken place during the last decade bringing mobilities into the centre of sociological analysis. However, the materiality and spatiality of artefacts, infrastructures, and sites hosting mobilities...... of departure in the sociological perspective termed ‘Staging Mobilities’ (Jensen 2013a) and utilizes this as an analytical frame for exploring cases of mobility design. The paper put focus on how the material shape, design and architectures of technologies, spaces and sites influence mobilities practices...

  1. Mobile probes

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Jørgensen, Anna Neustrup; Noesgaard, Signe Schack

    2016-01-01

    A project investigating the effectiveness of a collection of online resources for teachers' professional development used mobile probes as a data collection method. Teachers received questions and tasks on their mobile in a dialogic manner while in their everyday context as opposed...... to in an interview. This method provided valuable insight into the contextual use, i.e. how did the online resource transfer to the work practice. However, the research team also found that mobile probes may provide the scaffolding necessary for individual and peer learning at a very local (intra-school) community...... level. This paper is an initial investigation of how the mobile probes process proved to engage teachers in their efforts to improve teaching. It also highlights some of the barriers emerging when applying mobile probes as a scaffold for learning....

  2. Mobilities Design

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lanng, Ditte Bendix

    2016-01-01

    of life’ for billions of people in the everyday life. This paper is structured in three parts. After the general introduction we present the mobilities theory perspective of ‘staging mobilities’ and connects this to the empirical phenomenon of parking lots and their design. The paper ends in section three......Contemporary society is marked and defined by the ways in which mobile goods, bodies, vehicles, objects, and data are organized, moved and staged. On the backgound of the ‘mobilities turn’ (for short review paper on this see; Sheller 2011, Vannini 2010) this paper proposes a further development...... of the perspective in the direction of a material and design oriented turn. In order to fulfill this purpose we articulate a new and emerging research field, namely that of ‘mobilities design’. In our understanding time has come to articulate ‘Mobilities Design’ as a dedicated research field in and of its own...

  3. Mobile Lexicography

    DEFF Research Database (Denmark)

    Køhler Simonsen, Henrik

    2015-01-01

    are already mobile – but lexicography is not yet fully ready for the mobile challenge, mobile users and mobile user situations. The article is based on empirical data from two surveys comprising 10 medical doctors, who were asked to look up five medical substances with the medical dictionary app Medicin.......dk and five students, who were asked to look up five terms with the dictionary app Gyldendal Engelsk-Dansk. The empirical data comprise approximately 15 hours of recordings of user behavior, think-aloud data and interview data. The data indicate that there is still much to be done in this area...... and that lexicographic innovation is needed. A new type of users, new user situations and new access methods call for new lexicographic solutions, and this article proposes a six-pointed hexagram model, which can be used during dictionary app design to lexicographically calibrate the six dimensions in mobile...

  4. Restricted Mobilities

    DEFF Research Database (Denmark)

    Nielsen, Mette; Lassen, Claus

    2012-01-01

    communities and shopping centres through mobility lenses. The article shows how different mobility systems enable and restrict the public access to private-public spaces, and it points out that proprietary communities create an unequal potential for human movement and access in the city. The main argument......Privatisation of public spaces in the contemporary city has increased during the last decades but only few studies have approached this field from a mobility perspective. Therefore the article seeks to rectify this by exploring two Australian examples of private spaces in the city; gated...... and stratification mechanisms. In conclusion the article therefore suggests that future urban research and planning also needs a mobile understanding of spaces in the cities and how different mobility systems play an important role to sustain the exclusiveness that often characterises the private/public spaces...

  5. Mobility Work

    DEFF Research Database (Denmark)

    Bardram, Jakob Eyvind; Bossen, Claus

    2005-01-01

    We posit the concept of Mobility Work to describe efforts of moving about people and things as part of accomplishing tasks. Mobility work can be seen as a spatial parallel to the concept of articulation work proposed by the sociologist Anselm Strauss. Articulation work describes efforts of coordi....../or resources. To accomplish their work, actors have to make the right configuration of these four aspects emerge.......We posit the concept of Mobility Work to describe efforts of moving about people and things as part of accomplishing tasks. Mobility work can be seen as a spatial parallel to the concept of articulation work proposed by the sociologist Anselm Strauss. Articulation work describes efforts...... of coordination necessary in cooperative work, but focuses, we argue, mainly on the temporal aspects of cooperative work. As a supplement, the concept of mobility work focuses on the spatial aspects of cooperative work. Whereas actors seek to diminish the amount of articulation work needed in collaboration...

  6. Mobility Challenges

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Lassen, Claus

    2011-01-01

    This article takes point of departure in the challenges to understand the importance of contemporary mobility. The approach advocated is a cross-disciplinary one drawing on sociology, geography, urban planning and design, and cultural studies. As such the perspective is to be seen as a part...... of the so-called ‘mobility turn’ within social science. The perspective is illustrative for the research efforts at the Centre for Mobility and Urban Studies (C-MUS), Aalborg University. The article presents the contours of a theoretical perspective meeting the challenges to research into contemporary urban...... mobilities. In particular the article discusses 1) the physical city, its infrastructures and technological hardware/software, 2) policies and planning strategies for urban mobility and 3) the lived everyday life in the city and the region....

  7. Added masses of ship structures

    CERN Document Server

    Korotkin, Alexandr I

    2008-01-01

    This essentially self-contained reference book contains data on added masses of ships and various ship and marine engineering structures. Theoretical and experimental methods for determining added masses of these objects are described.

  8. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    The constant mobility of people, the growing need to be always connected, the large number of vehicles that nowadays can be found in the roads and the advances in technology make Vehicular Ad hoc Networks (VANETs) be a major area of research. Vehicular Ad hoc Networks are a special type of wireless Mobile Ad hoc Networks (MANETs), which allow a group of mobile nodes configure a temporary network and maintain it without the need of a fixed infrastructure. A vehicular network presents some spec...

  9. The Adoption of Shared Mobility in California and Its Relationship with Other Components of Travel Behavior

    Science.gov (United States)

    2018-03-01

    Emerging technologies and shared mobility services are quickly changing transportation. The popularity of these services is particularly high among millennials and those living in the dense central parts of cities. Still, the reasons behind the adopt...

  10. AdS5 black holes with fermionic hair

    International Nuclear Information System (INIS)

    Burrington, Benjamin A.; Liu, James T.; Sabra, W. A.

    2005-01-01

    The study of new Bogomol'nyi-Prasad-Sommerfield (BPS) objects in AdS 5 has led to a deeper understanding of AdS/CFT. To help complete this picture, and to fully explore the consequences of the supersymmetry algebra, it is also important to obtain new solutions with bulk fermions turned on. In this paper we construct superpartners of the 1/2 BPS black hole in AdS 5 using a natural set of fermion zero modes. We demonstrate that these superpartners, carrying fermionic hair, have conserved charges differing from the original bosonic counterpart. To do so, we find the R-charge and dipole moment of the new system, as well as the mass and angular momentum, defined through the boundary stress tensor. The complete set of superpartners fits nicely into a chiral representation of AdS 5 supersymmetry, and the spinning solutions have the expected gyromagnetic ratio, g=1

  11. Quantum Control of Open Systems and Dense Atomic Ensembles

    Science.gov (United States)

    DiLoreto, Christopher

    Controlling the dynamics of open quantum systems; i.e. quantum systems that decohere because of interactions with the environment, is an active area of research with many applications in quantum optics and quantum computation. My thesis expands the scope of this inquiry by seeking to control open systems in proximity to an additional system. The latter could be a classical system such as metal nanoparticles, or a quantum system such as a cluster of similar atoms. By modelling the interactions between the systems, we are able to expand the accessible state space of the quantum system in question. For a single, three-level quantum system, I examine isolated systems that have only normal spontaneous emission. I then show that intensity-intensity correlation spectra, which depend directly on the density matrix of the system, can be used detect whether transitions share a common energy level. This detection is possible due to the presence of quantum interference effects between two transitions if they are connected. This effect allows one to asses energy level structure diagrams in complex atoms/molecules. By placing an open quantum system near a nanoparticle dimer, I show that the spontaneous emission rate of the system can be changed "on demand" by changing the polarization of an incident, driving field. In a three-level, Lambda system, this allows a qubit to both retain high qubit fidelity when it is operating, and to be rapidly initialized to a pure state once it is rendered unusable by decoherence. This type of behaviour is not possible in a single open quantum system; therefore adding a classical system nearby extends the overall control space of the quantum system. An open quantum system near identical neighbours in a dense ensemble is another example of how the accessible state space can be expanded. I show that a dense ensemble of atoms rapidly becomes disordered with states that are not directly excited by an incident field becoming significantly populated

  12. High frequency flow-structural interaction in dense subsonic fluids

    Science.gov (United States)

    Liu, Baw-Lin; Ofarrell, J. M.

    1995-01-01

    Prediction of the detailed dynamic behavior in rocket propellant feed systems and engines and other such high-energy fluid systems requires precise analysis to assure structural performance. Designs sometimes require placement of bluff bodies in a flow passage. Additionally, there are flexibilities in ducts, liners, and piping systems. A design handbook and interactive data base have been developed for assessing flow/structural interactions to be used as a tool in design and development, to evaluate applicable geometries before problems develop, or to eliminate or minimize problems with existing hardware. This is a compilation of analytical/empirical data and techniques to evaluate detailed dynamic characteristics of both the fluid and structures. These techniques have direct applicability to rocket engine internal flow passages, hot gas drive systems, and vehicle propellant feed systems. Organization of the handbook is by basic geometries for estimating Strouhal numbers, added mass effects, mode shapes for various end constraints, critical onset flow conditions, and possible structural response amplitudes. Emphasis is on dense fluids and high structural loading potential for fatigue at low subsonic flow speeds where high-frequency excitations are possible. Avoidance and corrective measure illustrations are presented together with analytical curve fits for predictions compiled from a comprehensive data base.

  13. AdS Black Hole with Phantom Scalar Field

    Directory of Open Access Journals (Sweden)

    Limei Zhang

    2017-01-01

    Full Text Available We present an AdS black hole solution with Ricci flat horizon in Einstein-phantom scalar theory. The phantom scalar fields just depend on the transverse coordinates x and y, which are parameterized by the parameter α. We study the thermodynamics of the AdS phantom black hole. Although its horizon is a Ricci flat Euclidean space, we find that the thermodynamical properties of the black hole solution are qualitatively the same as those of AdS Schwarzschild black hole. Namely, there exists a minimal temperature and the large black hole is thermodynamically stable, while the smaller one is unstable, so there is a so-called Hawking-Page phase transition between the large black hole and the thermal gas solution in the AdS space-time in Poincare coordinates. We also calculate the entanglement entropy for a strip geometry dual to the AdS phantom black holes and find that the behavior of the entanglement entropy is qualitatively the same as that of the black hole thermodynamical entropy.

  14. Universal regularization prescription for Lovelock AdS gravity

    International Nuclear Information System (INIS)

    Kofinas, Georgios; Olea, Rodrigo

    2007-01-01

    A definite form for the boundary term that produces the finiteness of both the conserved quantities and Euclidean action for any Lovelock gravity with AdS asymptotics is presented. This prescription merely tells even from odd bulk dimensions, regardless the particular theory considered, what is valid even for Einstein-Hilbert and Einstein-Gauss-Bonnet AdS gravity. The boundary term is a given polynomial of the boundary extrinsic and intrinsic curvatures (also referred to as Kounterterms series). Only the coupling constant of the boundary term changes accordingly, such that it always preserves a well-posed variational principle for boundary conditions suitable for asymptotically AdS spaces. The background-independent conserved charges associated to asymptotic symmetries are found. In odd bulk dimensions, this regularization produces a generalized formula for the vacuum energy in Lovelock AdS gravity. The standard entropy for asymptotically AdS black holes is recovered directly from the regularization of the Euclidean action, and not only from the first law of thermodynamics associated to the conserved quantities

  15. Sustainable Mobility

    DEFF Research Database (Denmark)

    Kjærulff, Aslak Aamot

    This paper combines strands of mobilities theory and planning theory, and develops a qualitative approach to look across emerging planning practices. By actively following 8 Danish urban and transport planners, over the course of 2 years, we learn how their practices have changed, inspired...... by mobility management, a concept aiming to reduce carbon emissions from transportation in western societies. The article focuses on how municipal planners formulate the role of mobility management activities organized around private companies, and how their practices are connected to wider ideas on planning....

  16. Glaciations and dense interstellar clouds; and reply

    Energy Technology Data Exchange (ETDEWEB)

    McCrea, W H [Sussex Univ., Brighton (UK); Dennison, B; Mansfield, V N

    1976-09-16

    Reference is made to Dennison and Mansfield (Nature 261:32 (1976)) who offered comments on a previous paper by the author (Nature 255:607 (1975)), in which he suggested that a possible cause of an ice age on the Earth was the passage of the solar system through an interstellar matter compression region bordering a spiral arm of the Galaxy. Dennison and Mansfield criticised this suggestion because it led them to expect to find a dense cloud of interstellar matter still very close to the Earth, whereas no such cloud is known. It is stated here that this criticism ignores the structure of the Galaxy, that provided the basis of the suggestion. A reply by Dennison and Mansfield is appended.

  17. Charmonium propagation through a dense medium

    Directory of Open Access Journals (Sweden)

    Kopeliovich B.Z.

    2015-01-01

    Full Text Available Attenuation of a colourless c̄c dipole propagating with a large momentum through a hot medium originates from two sources, Debye screening (melting, and inelastic collisions with surrounding scattering centres (absorption. The former never terminates completely production of a bound charmonium in heavy ion collisions, even at very high temperatures. The latter, is controlled my the magnitude of the dipole cross section, related to the transport coefficient, which is the rate of transverse momentum broadening in the medium. A novel procedure of Lorentz boosting of the Schrödinger equation is developed, which allows to calculate the charmonium survival probability employing the path-integral technique, incorporating both melting and absorption. A novel mechanism of charmonium regeneration in a dense medium is proposed.

  18. Frontiers and challenges in warm dense matter

    CERN Document Server

    Desjarlais, Michael; Redmer, Ronald; Trickey, Samuel

    2014-01-01

    Warm Dense Matter (WDM) occupies a loosely defined region of phase space intermediate between solid, liquid, gas, and plasma, and typically shares characteristics of two or more of these phases. WDM is generally associated with the combination of strongly coupled ions and moderately degenerate electrons, and careful attention to quantum physics and electronic structure is essential. The lack of a small perturbation parameter greatly limits approximate attempts at its accurate description. Since WDM resides at the intersection of solid state and high energy density physics, many high energy density physics (HEDP) experiments pass through this difficult region of phase space. Thus, understanding and modeling WDM is key to the success of experiments on diverse facilities. These include the National Ignition Campaign centered on the National Ignition Facility (NIF), pulsed-power driven experiments on the Z machine, ion-beam-driven WDM experiments on the NDCX-II, and fundamental WDM research at the Linear Coherent...

  19. Intrinsically secure fast reactors with dense cores

    International Nuclear Information System (INIS)

    Slessarev, Igor

    2007-01-01

    Secure safety, resistance to weapons material proliferation and problems of long-lived wastes remain the most important 'painful points' of nuclear power. Many innovative reactor concepts have been developed aimed at a radical enhancement of safety. The promising potential of innovative nuclear reactors allows for shifting accents in current reactor safety 'strategy' to reveal this worth. Such strategy is elaborated focusing on the priority for intrinsically secure safety features as well as on sure protection being provided by the first barrier of defence. Concerning the potential of fast reactors (i.e. sodium cooled, lead-cooled, etc.), there are no doubts that they are able to possess many favourable intrinsically secure safety features and to lay the proper foundation for a new reactor generation. However, some of their neutronic characteristics have to be radically improved. Among intrinsically secure safety properties, the following core parameters are significantly important: reactivity margin values, reactivity feed-back and coolant void effects. Ways of designing intrinsically secure safety features in fast reactors (titled hereafter as Intrinsically Secure Fast Reactors - ISFR) can be found in the frame of current reactor technologies by radical enhancement of core neutron economy and by optimization of core compositions. Simultaneously, respecting resistance to proliferation, by using non-enriched fuel feed as well as a core breeding gain close to zero, are considered as the important features (long-lived waste problems will be considered in a separate paper). This implies using the following reactor design options as well as closed fuel cycles with natural U as the reactor feed: ·Ultra-plate 'dense cores' of the ordinary (monolithic) type with negative total coolant void effects. ·Modular type cores. Multiple dense modules can be embedded in the common reflector for achieving the desired NPP total power. The modules can be used also independently (as

  20. Coherent neutrino interactions in a dense medium

    International Nuclear Information System (INIS)

    Kiers, K.; Weiss, N.

    1997-01-01

    Motivated by the effect of matter on neutrino oscillations (the MSW effect) we study in more detail the propagation of neutrinos in a dense medium. The dispersion relation for massive neutrinos in a medium is known to have a minimum at nonzero momentum p∼G F ρ/√(2). We study in detail the origin and consequences of this dispersion relation for both Dirac and Majorana neutrinos both in a toy model with only neutral currents and a single neutrino flavor and in a realistic open-quotes standard modelclose quotes with two neutrino flavors. We find that for a range of neutrino momenta near the minimum of the dispersion relation, Dirac neutrinos are trapped by their coherent interactions with the medium. This effect does not lead to the trapping of Majorana neutrinos. copyright 1997 The American Physical Society

  1. Equation of state of dense baryonic matter

    International Nuclear Information System (INIS)

    Weber, F.; Weigel, M.K.

    1989-01-01

    In a previous investigation we treated nuclear matter as well as neutron matter at zero and finite temperatures in the frame of different relativistic field theoretical models, but with the restriction to nucleons as the only present baryons. This approach is extended by including a larger fraction of baryons and mesons, necessary for a description of baryon matter under extreme conditions. The equation of state (EOS) is calculated in both the Hartree and Hartree-Fock (HF) approximations for dense nuclear as well as neutron matter. Self-interactions of the σ field up to fourth order have been taken into account. For the treatment of many-baryon matter in the HF approach the parameters of the theory had to be readjusted. A phase transition of both many-baryon systems (neutron as well as nuclear matter) in the high-pressure and high-energy-density region has been found. (author)

  2. Nonlinear extraordinary wave in dense plasma

    Energy Technology Data Exchange (ETDEWEB)

    Krasovitskiy, V. B., E-mail: krasovit@mail.ru [Russian Academy of Sciences, Keldysh Institute of Applied Mathematics (Russian Federation); Turikov, V. A. [Russian University of Peoples’ Friendship (Russian Federation)

    2013-10-15

    Conditions for the propagation of a slow extraordinary wave in dense magnetized plasma are found. A solution to the set of relativistic hydrodynamic equations and Maxwell’s equations under the plasma resonance conditions, when the phase velocity of the nonlinear wave is equal to the speed of light, is obtained. The deviation of the wave frequency from the resonance frequency is accompanied by nonlinear longitudinal-transverse oscillations. It is shown that, in this case, the solution to the set of self-consistent equations obtained by averaging the initial equations over the period of high-frequency oscillations has the form of an envelope soliton. The possibility of excitation of a nonlinear wave in plasma by an external electromagnetic pulse is confirmed by numerical simulations.

  3. Statistical mechanics of dense granular media

    International Nuclear Information System (INIS)

    Coniglio, A; Fierro, A; Nicodemi, M; Ciamarra, M Pica; Tarzia, M

    2005-01-01

    We discuss some recent results on the statistical mechanics approach to dense granular media. In particular, by analytical mean field investigation we derive the phase diagram of monodisperse and bidisperse granular assemblies. We show that 'jamming' corresponds to a phase transition from a 'fluid' to a 'glassy' phase, observed when crystallization is avoided. The nature of such a 'glassy' phase turns out to be the same as found in mean field models for glass formers. This gives quantitative evidence for the idea of a unified description of the 'jamming' transition in granular media and thermal systems, such as glasses. We also discuss mixing/segregation transitions in binary mixtures and their connections to phase separation and 'geometric' effects

  4. A constitutive law for dense granular flows.

    Science.gov (United States)

    Jop, Pierre; Forterre, Yoël; Pouliquen, Olivier

    2006-06-08

    A continuum description of granular flows would be of considerable help in predicting natural geophysical hazards or in designing industrial processes. However, the constitutive equations for dry granular flows, which govern how the material moves under shear, are still a matter of debate. One difficulty is that grains can behave like a solid (in a sand pile), a liquid (when poured from a silo) or a gas (when strongly agitated). For the two extreme regimes, constitutive equations have been proposed based on kinetic theory for collisional rapid flows, and soil mechanics for slow plastic flows. However, the intermediate dense regime, where the granular material flows like a liquid, still lacks a unified view and has motivated many studies over the past decade. The main characteristics of granular liquids are: a yield criterion (a critical shear stress below which flow is not possible) and a complex dependence on shear rate when flowing. In this sense, granular matter shares similarities with classical visco-plastic fluids such as Bingham fluids. Here we propose a new constitutive relation for dense granular flows, inspired by this analogy and recent numerical and experimental work. We then test our three-dimensional (3D) model through experiments on granular flows on a pile between rough sidewalls, in which a complex 3D flow pattern develops. We show that, without any fitting parameter, the model gives quantitative predictions for the flow shape and velocity profiles. Our results support the idea that a simple visco-plastic approach can quantitatively capture granular flow properties, and could serve as a basic tool for modelling more complex flows in geophysical or industrial applications.

  5. Dense gas dispersion in the atmosphere

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Morten

    1998-09-01

    Dense gas dispersion is characterized by buoyancy induced gravity currents and reduction of the vertical mixing. Liquefied gas releases from industrial accidents are cold because of the heat of evaporation which determines the density for a given concentration and physical properties. The temperature deficit is moderated by the heat flux from the ground, and this convection is an additional source of turbulence which affects the mixing. A simple model as the soil heat flux is used to estimate the ability of the ground to sustain the heat flux during release. The initial enthalpy, release rate, initial entrainment and momentum are discussed for generic source types and the interaction with obstacles is considered. In the MTH project BA experiments source with and without momentum were applied. The continuously released propane gas passed a two-dimensional removable obstacle perpendicular to the wind direction. Ground-level gas concentrations and vertical profiles of concentration, temperature, wind speed and turbulence were measured in front of and behind the obstacle. Ultrasonic anemometers providing fast velocity and concentration signals were mounted at three levels on the masts. The observed turbulence was influenced by the stability and the initial momentum of the jet releases. Additional information were taken from the `Dessert tortoise` ammonia jet releases, from the `Fladis` experiment with transition from dense to passive dispersion, and from the `Thorney Island` continuous releases of isothermal freon mixtures. The heat flux was found to moderate the negative buoyancy in both the propane and ammonia experiments. The heat flux measurements are compared to an estimate by analogy with surface layer theory. (au) 41 tabs., 146 ills., 189 refs.

  6. New Massive Gravity and AdS4 Counterterms

    International Nuclear Information System (INIS)

    Jatkar, Dileep P.; Sinha, Aninda

    2011-01-01

    We show that the recently proposed Dirac-Born-Infeld extension of new massive gravity emerges naturally as a counterterm in four-dimensional anti-de Sitter space (AdS 4 ). The resulting on-shell Euclidean action is independent of the cutoff at zero temperature. We also find that the same choice of counterterm gives the usual area law for the AdS 4 Schwarzschild black hole entropy in a cutoff-independent manner. The parameter values of the resulting counterterm action correspond to a c=0 theory in the context of the duality between AdS 3 gravity and two-dimensional conformal field theory. We rewrite this theory in terms of the gauge field that is used to recast 3D gravity as a Chern-Simons theory.

  7. Constrained supermanifolds for AdS M-theory backgrounds

    International Nuclear Information System (INIS)

    Fre, Pietro; Grassi, Pietro Antonio

    2008-01-01

    A long standing problem is the supergauge completion of AdS 4 x ({G/H}) 7 or AdS 5 x ({G/H}) 5 backgrounds which preserve less then maximal supersymmetry. In parallel with the supersolvable realization of the AdS 4 x S 7 background based on κ-symmetry, we develop a technique which amounts to solving the above-mentioned problem in a way useful for pure spinor quantization for supermembranes and superstrings. Instead of gauge fixing some of the superspace coordinates using κ-symmetry, we impose an additional constraint on them reproducing the simplifications of the supersolvable representations. The constraints are quadratic, homogeneous, Sp(4,R)-covariant, and consistent from the quantum point of view in the pure spinor approach. Here we provide the geometrical solution which, in a subsequent work, will be applied to the membrane and the superstring sigma models

  8. Asymptotically AdS spacetimes with a timelike Kasner singularity

    Energy Technology Data Exchange (ETDEWEB)

    Ren, Jie [Racah Institute of Physics, The Hebrew University of Jerusalem, Jerusalem 91904 (Israel)

    2016-07-21

    Exact solutions to Einstein’s equations for holographic models are presented and studied. The IR geometry has a timelike cousin of the Kasner singularity, which is the less generic case of the BKL (Belinski-Khalatnikov-Lifshitz) singularity, and the UV is asymptotically AdS. This solution describes a holographic RG flow between them. The solution’s appearance is an interpolation between the planar AdS black hole and the AdS soliton. The causality constraint is always satisfied. The entanglement entropy and Wilson loops are discussed. The boundary condition for the current-current correlation function and the Laplacian in the IR is examined. There is no infalling wave in the IR, but instead, there is a normalizable solution in the IR. In a special case, a hyperscaling-violating geometry is obtained after a dimensional reduction.

  9. Holographic description of AdS2 black holes

    International Nuclear Information System (INIS)

    Castro, Alejandra; Larsen, Finn; Grumiller, Daniel; McNees, Robert

    2008-01-01

    We develop the holographic renormalization of AdS 2 gravity systematically. We find that a bulk Maxwell term necessitates a boundary mass term for the gauge field and verify that this unusual term is invariant under gauge transformations that preserve the boundary conditions. We determine the energy-momentum tensor and the central charge, recovering recent results by Hartman and Strominger. We show that our expressions are consistent with dimensional reduction of the AdS 3 energy-momentum tensor and the Brown-Henneaux central charge. As an application of our results we interpret the entropy of AdS 2 black holes as the ground state entropy of a dual CFT.

  10. Central charge for AdS2 quantum gravity

    International Nuclear Information System (INIS)

    Hartman, Thomas; Strominger, Andrew

    2009-01-01

    Two-dimensional Maxwell-dilaton quantum gravity on AdS 2 with radius l and a constant electric field E is studied. In conformal gauge, this is equivalent to a CFT on a strip. In order to maintain consistent boundary conditions, the usual conformal diffeomorphisms must be accompanied by a certain U(1) gauge transformation. The resulting conformal transformations are generated by a twisted stress tensor, which has a central charge c = 3kE 2 l 4 /4 where k is the level of the U(1) current. This is an AdS 2 analog of the Brown-Henneaux formula c = 3l/2G for the central charge of quantum gravity on AdS 3 .

  11. New supersymmetric AdS4 type II vacua

    International Nuclear Information System (INIS)

    Tsimpis, D.

    2010-01-01

    We review the supersymmetric AdS 4 x w M 6 backgrounds of type IIA/IIB supergravity constructed in[1]. In type IIA the supersymmetry is N=2, and the six-dimensional internal space is locally an S 2 bundle over a four-dimensional Kaehler-Einstein base; in IIB the internal space is the direct product of a circle and a five-dimensional squashed Sasaki-Einstein manifold. These backgrounds do not contain any sources, all fluxes (including the Romans mass in IIA) are generally non-zero, and the dilaton and warp factor are non-constant. The IIA solutions include the massive deformations of the IIA reduction of the eleven-dimensional AdS 4 x Y p,q solutions, and had been predicted to exist on the basis of the AdS 4 /CFT 3 correspondence. (Abstract Copyright [2010], Wiley Periodicals, Inc.)

  12. Instantons from geodesics in AdS moduli spaces

    Science.gov (United States)

    Ruggeri, Daniele; Trigiante, Mario; Van Riet, Thomas

    2018-03-01

    We investigate supergravity instantons in Euclidean AdS5 × S5/ℤk. These solutions are expected to be dual to instantons of N = 2 quiver gauge theories. On the supergravity side the (extremal) instanton solutions are neatly described by the (lightlike) geodesics on the AdS moduli space for which we find the explicit expression and compute the on-shell actions in terms of the quantised charges. The lightlike geodesics fall into two categories depending on the degree of nilpotency of the Noether charge matrix carried by the geodesic: for degree 2 the instantons preserve 8 supercharges and for degree 3 they are non-SUSY. We expect that these findings should apply to more general situations in the sense that there is a map between geodesics on moduli-spaces of Euclidean AdS vacua and instantons with holographic counterparts.

  13. Loops in AdS from conformal field theory

    Science.gov (United States)

    Aharony, Ofer; Alday, Luis F.; Bissi, Agnese; Perlmutter, Eric

    2017-07-01

    We propose and demonstrate a new use for conformal field theory (CFT) crossing equations in the context of AdS/CFT: the computation of loop amplitudes in AdS, dual to non-planar correlators in holographic CFTs. Loops in AdS are largely unexplored, mostly due to technical difficulties in direct calculations. We revisit this problem, and the dual 1 /N expansion of CFTs, in two independent ways. The first is to show how to explicitly solve the crossing equations to the first subleading order in 1 /N 2, given a leading order solution. This is done as a systematic expansion in inverse powers of the spin, to all orders. These expansions can be resummed, leading to the CFT data for finite values of the spin. Our second approach involves Mellin space. We show how the polar part of the four-point, loop-level Mellin amplitudes can be fully reconstructed from the leading-order data. The anomalous dimensions computed with both methods agree. In the case of ϕ 4 theory in AdS, our crossing solution reproduces a previous computation of the one-loop bubble diagram. We can go further, deriving the four-point scalar triangle diagram in AdS, which had never been computed. In the process, we show how to analytically derive anomalous dimensions from Mellin amplitudes with an infinite series of poles, and discuss applications to more complicated cases such as the N = 4 super-Yang-Mills theory.

  14. Phases of global AdS black holes

    International Nuclear Information System (INIS)

    Basu, Pallab; Krishnan, Chethan; Subramanian, P.N. Bala

    2016-01-01

    We study the phases of gravity coupled to a charged scalar and gauge field in an asymptotically Anti-de Sitter spacetime (AdS_4) in the grand canonical ensemble. For the conformally coupled scalar, an intricate phase diagram is charted out between the four relevant solutions: global AdS, boson star, Reissner-Nordstrom black hole and the hairy black hole. The nature of the phase diagram undergoes qualitative changes as the charge of the scalar is changed, which we discuss. We also discuss the new features that arise in the extremal limit.

  15. Minimal surfaces in AdS space and integrable systems

    Science.gov (United States)

    Burrington, Benjamin A.; Gao, Peng

    2010-04-01

    We consider the Pohlmeyer reduction for spacelike minimal area worldsheets in AdS5. The Lax pair for the reduced theory is found, and written entirely in terms of the A3 = D3 root system, generalizing the B2 affine Toda system which appears for the AdS4 string. For the B2 affine Toda system, we show that the area of the worlsheet is obtainable from the moduli space Kähler potential of a related Hitchin system. We also explore the Saveliev-Leznov construction for solutions of the B2 affine Toda system, and recover the rotationally symmetric solution associated to Painleve transcendent.

  16. AdS5 magnetized solutions in minimal gauged supergravity

    Directory of Open Access Journals (Sweden)

    Jose Luis Blázquez-Salcedo

    2017-08-01

    Full Text Available We construct a generalization of the AdS charged rotating black holes with two equal magnitude angular momenta in five-dimensional minimal gauged supergravity. In addition to the mass, electric charge and angular momentum, the new solutions possess an extra-parameter associated with a non-zero magnitude of the magnetic potential at infinity. In contrast with the known cases, these new black holes possess a non-trivial zero-horizon size limit which describes a one parameter family of spinning charged solitons. All configurations reported in this work approach asymptotically an AdS5 spacetime in global coordinates and are free of pathologies.

  17. Twistor description of spinning particles in AdS

    Science.gov (United States)

    Arvanitakis, Alex S.; Barns-Graham, Alec E.; Townsend, Paul K.

    2018-01-01

    The two-twistor formulation of particle mechanics in D-dimensional anti-de Sitter space for D = 4 , 5 , 7, which linearises invariance under the AdS isometry group Sp(4; K ) for K=R,C,H, is generalized to the massless N -extended "spinning particle". The twistor variables are gauge invariant with respect to the initial N local worldline supersymmetries; this simplifies aspects of the quantum theory such as implications of global gauge anomalies. We also give details of the two-supertwistor form of the superparticle, in particular the massive superparticle on AdS5.

  18. Holography in Lovelock Chern-Simons AdS gravity

    Science.gov (United States)

    Cvetković, Branislav; Miskovic, Olivera; Simić, Dejan

    2017-08-01

    We analyze holographic field theory dual to Lovelock Chern-Simons anti-de Sitter (AdS) gravity in higher dimensions using first order formalism. We first find asymptotic symmetries in the AdS sector showing that they consist of local translations, local Lorentz rotations, dilatations and non-Abelian gauge transformations. Then, we compute 1-point functions of energy-momentum and spin currents in a dual conformal field theory and write Ward identities. We find that the holographic theory possesses Weyl anomaly and also breaks non-Abelian gauge symmetry at the quantum level.

  19. Role of ultrasonography in detecting mammographically occult breast carcinoma in women with dense breasts.

    Science.gov (United States)

    Corsetti, V; Ferrari, A; Ghirardi, M; Bergonzini, R; Bellarosa, S; Angelini, O; Bani, C; Ciatto, S

    2006-04-01

    The purpose of this study was to assess the usefulness of routine ultrasonography in women with negative mammography and dense breasts [Breast Imaging Reporting and Data System (BIRADS D3-4)]. We applied a protocol involving routine ultrasonography in a consecutive series of subjects with negative mammography and dense breasts. After evaluation by internal and external reviewers of cancers detected by ultrasonography performed to confirm negative mammography, we determined the additional cancer detection rate of ultrasonography and the cost of the protocol. Out of 17,883 total mammographies, 167 cancers were diagnosed (detection rate: 0.93%). Out of 257 suspicious mammographies, 138 cancers were detected. Out of 17,626 negative mammographies, 6,449 (36.5%) were classified as "dense breast" and underwent ultrasonography: 29 cancers were detected (detection rate: 0.44%, or 17.3% of total cancers). Out of 25 cancer cases reviewed, negative mammography and asymptomatic status was confirmed in 15 (detection rate 0.23%, or 8.9% of total cancers). The cancer detection rate was 0.11%, 0.22%, 0.32% and 0.14% for age groups 59, respectively. The cost per additional carcinoma detected by ultrasonography alone was euro 25,847.85 whereas that per examined woman was euro 21.68. The study confirms the possibility that ultrasonography can detect mammographically occult breast carcinoma in dense breasts. The evidence is insufficient to recommend this policy in routine screening practice but suggests that, at least in current clinical practice, adding ultrasonography in dense breasts may be useful despite the substantial costs.

  20. Dense Deposit Disease Mimicking a Renal Small Vessel Vasculitis

    Science.gov (United States)

    Singh, Lavleen; Bhardwaj, Swati; Sinha, Aditi; Bagga, Arvind; Dinda, Amit

    2016-01-01

    Dense deposit disease is caused by fluid-phase dysregulation of the alternative complement pathway and frequently deviates from the classic membranoproliferative pattern of injury on light microscopy. Other patterns of injury described for dense deposit disease include mesangioproliferative, acute proliferative/exudative, and crescentic GN. Regardless of the histologic pattern, C3 glomerulopathy, which includes dense deposit disease and C3 GN, is defined by immunofluorescence intensity of C3c two or more orders of magnitude greater than any other immune reactant (on a 0–3 scale). Ultrastructural appearances distinguish dense deposit disease and C3 GN. Focal and segmental necrotizing glomerular lesions with crescents, mimicking a small vessel vasculitis such as ANCA-associated GN, are a very rare manifestation of dense deposit disease. We describe our experience with this unusual histologic presentation and distinct clinical course of dense deposit disease, discuss the pitfalls in diagnosis, examine differential diagnoses, and review the relevant literature. PMID:26361799

  1. Mixed-symmetry fields in AdS(5), conformal fields, and AdS/CFT

    Energy Technology Data Exchange (ETDEWEB)

    Metsaev, R.R. [Department of Theoretical Physics, P.N. Lebedev Physical Institute,Leninsky prospect 53, Moscow 119991 (Russian Federation)

    2015-01-15

    Mixed-symmetry arbitrary spin massive, massless, and self-dual massive fields in AdS(5) are studied. Light-cone gauge actions for such fields leading to decoupled equations of motion are constructed. Light-cone gauge formulation of mixed-symmetry anomalous conformal currents and shadows in 4d flat space is also developed. AdS/CFT correspondence for normalizable and non-normalizable modes of mixed-symmetry AdS fields and the respective boundary mixed-symmetry anomalous conformal currents and shadows is studied. We demonstrate that the light-cone gauge action for massive mixed-symmetry AdS field evaluated on solution of the Dirichlet problem amounts to the light-cone gauge 2-point vertex of mixed-symmetry anomalous shadow. Also we show that UV divergence of the action for mixed-symmetry massive AdS field with some particular value of mass parameter evaluated on the Dirichlet problem amounts to the action of long mixed-symmetry conformal field, while UV divergence of the action for mixed-symmetry massless AdS field evaluated on the Dirichlet problem amounts to the action of short mixed-symmetry conformal field. We speculate on string theory interpretation of a model which involves short low-spin conformal fields and long higher-spin conformal fields.

  2. Breast cancer screening in Korean woman with dense breast tissue

    International Nuclear Information System (INIS)

    Shin, Hee Jung; Ko, Eun Sook; Yi, Ann

    2015-01-01

    Asian women, including Korean, have a relatively higher incidence of dense breast tissue, compared with western women. Dense breast tissue has a lower sensitivity for the detection of breast cancer and a higher relative risk for breast cancer, compared with fatty breast tissue. Thus, there were limitations in the mammographic screening for women with dense breast tissue, and many studies for the supplemental screening methods. This review included appropriate screening methods for Korean women with dense breasts. We also reviewed the application and limitation of supplemental screening methods, including breast ultrasound, digital breast tomosynthesis, and breast magnetic resonance imaging; and furthermore investigated the guidelines, as well as the study results

  3. Breast cancer screening in Korean woman with dense breast tissue

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hee Jung [Dept. of Radiology and Research Institute of Radiology, University of Ulsan College of Medicine, Asan Medical Center, Seoul (Korea, Republic of); Ko, Eun Sook [Dept. of Radiology, Sungkyunkwan University School of Medicine, Samsung Medical Center, Seoul (Korea, Republic of); Yi, Ann [Dept. of Radiology, Seoul National University College of Medicine, Seoul National University Hospital, Seoul (Korea, Republic of)

    2015-11-15

    Asian women, including Korean, have a relatively higher incidence of dense breast tissue, compared with western women. Dense breast tissue has a lower sensitivity for the detection of breast cancer and a higher relative risk for breast cancer, compared with fatty breast tissue. Thus, there were limitations in the mammographic screening for women with dense breast tissue, and many studies for the supplemental screening methods. This review included appropriate screening methods for Korean women with dense breasts. We also reviewed the application and limitation of supplemental screening methods, including breast ultrasound, digital breast tomosynthesis, and breast magnetic resonance imaging; and furthermore investigated the guidelines, as well as the study results.

  4. How Ad-talk and Word-of-Mouth Influence Consumers’ Responses

    DEFF Research Database (Denmark)

    Martensen, Anne; Mouritsen, Jan

    2014-01-01

    This study investigates: (a) if consumers talk about advertizing messages – ad-talk – is a new, distinct concept that differs from word-of-mouth (WOM) communication in definition and impact; (b) how ad-talk mobilizes WOM; (c) how WOM mediates the relationship between ad-talk and consumer responses....... A new model is developed that adapts the classic Theory of Reasoned Action (TRA) framework by replacing the social norm with consumers’ ad-talk and WOM. Two large scale internet surveys are conducted to test and validate the model. Findings show that ad-talk and WOM are two different social processes....... Ad-talk only mobilizes PWOM. PWOM mediates and leverages ad-talk’s influence on consumer responses, because PWOM adds personal experiences, preferences and social acceptance to the brand promise seen in the firm’s advertizing. This changes the value of the brand and makes the firm’s offer better than...

  5. AdS pure spinor superstring in constant backgrounds

    International Nuclear Information System (INIS)

    Chandia, Osvaldo; Bevilaqua, L. Ibiapina; Vallilo, Brenno Carlini

    2014-01-01

    In this paper we study the pure spinor formulation of the superstring in AdS_5×S"5 around point particle solutions of the classical equations of motion. As a particular example we quantize the pure spinor string in the BMN background

  6. Internet Advertising. Google AdWords versus Facebook Ads

    OpenAIRE

    Paul PAŞCU

    2014-01-01

    This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  7. Internet Advertising. Google AdWords versus Facebook Ads

    Directory of Open Access Journals (Sweden)

    Paul PAŞCU

    2014-05-01

    Full Text Available This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  8. Penrose inequality for asymptotically AdS spaces

    International Nuclear Information System (INIS)

    Itkin, Igor; Oz, Yaron

    2012-01-01

    In general relativity, the Penrose inequality relates the mass and the entropy associated with a gravitational background. If the inequality is violated by an initial Cauchy data, it suggests a creation of a naked singularity, thus providing means to consider the cosmic censorship hypothesis. We propose a general form of Penrose inequality for asymptotically locally AdS spaces.

  9. Penrose inequality for asymptotically AdS spaces

    Energy Technology Data Exchange (ETDEWEB)

    Itkin, Igor [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel); Oz, Yaron, E-mail: yaronoz@post.tau.ac.il [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel)

    2012-02-28

    In general relativity, the Penrose inequality relates the mass and the entropy associated with a gravitational background. If the inequality is violated by an initial Cauchy data, it suggests a creation of a naked singularity, thus providing means to consider the cosmic censorship hypothesis. We propose a general form of Penrose inequality for asymptotically locally AdS spaces.

  10. Confinement, glueballs and strings from deformed AdS

    International Nuclear Information System (INIS)

    Apreda, Riccardo; Crooks, David E.; Evans, Nick; Petrini, Michela

    2004-01-01

    We study aspects of confinement in two deformed versions of the AdS/CFT correspondence - the GPPZ dual of N = 1* Yang Mills, and the Yang Mills* N 0 dual. Both geometries describe discrete glueball spectra which we calculate numerically. The results agree at the 10% level with previous AdS/CFT computations in the Klebanov Strassler background and AdS Schwarzchild respectively. We also calculate the spectra of bound states of the massive fermions in these geometries and show that they are light, so not decoupled from the dynamics. We then study the behaviour of Wilson loops in the 10d lifts of these geometries. We find a transition from AdS-like strings in the UV to strings that interact with the unknown physics of the central singularity of the space in the IR. (author)

  11. Repair of dense connective tissues via biomaterial-mediated matrix reprogramming of the wound interface.

    Science.gov (United States)

    Qu, Feini; Pintauro, Michael P; Haughan, Joanne E; Henning, Elizabeth A; Esterhai, John L; Schaer, Thomas P; Mauck, Robert L; Fisher, Matthew B

    2015-01-01

    Repair of dense connective tissues in adults is limited by their intrinsic hypocellularity and is exacerbated by a dense extracellular matrix (ECM) that impedes cellular migration to and local proliferation at the wound site. Conversely, healing in fetal tissues occurs due in part to an environment conducive to cell mobility and division. Here, we investigated whether the application of a degradative enzyme, collagenase, could reprogram the adult wound margin to a more fetal-like state, and thus abrogate the biophysical impediments that hinder migration and proliferation. We tested this concept using the knee meniscus, a commonly injured structure for which few regenerative approaches exist. To focus delivery and degradation to the wound interface, we developed a system in which collagenase was stored inside poly(ethylene oxide) (PEO) electrospun nanofibers and released upon hydration. Through a series of in vitro and in vivo studies, our findings show that partial digestion of the wound interface improves repair by creating a more compliant and porous microenvironment that expedites cell migration to and/or proliferation at the wound margin. This innovative approach of targeted manipulation of the wound interface, focused on removing the naturally occurring barriers to adult tissue repair, may find widespread application in the treatment of injuries to a variety of dense connective tissues. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Maturation State and Matrix Microstructure Regulate Interstitial Cell Migration in Dense Connective Tissues.

    Science.gov (United States)

    Qu, Feini; Li, Qing; Wang, Xiao; Cao, Xuan; Zgonis, Miltiadis H; Esterhai, John L; Shenoy, Vivek B; Han, Lin; Mauck, Robert L

    2018-02-19

    Few regenerative approaches exist for the treatment of injuries to adult dense connective tissues. Compared to fetal tissues, adult connective tissues are hypocellular and show limited healing after injury. We hypothesized that robust repair can occur in fetal tissues with an immature extracellular matrix (ECM) that is conducive to cell migration, and that this process fails in adults due to the biophysical barriers imposed by the mature ECM. Using the knee meniscus as a platform, we evaluated the evolving micromechanics and microstructure of fetal and adult tissues, and interrogated the interstitial migratory capacity of adult meniscal cells through fetal and adult tissue microenvironments with or without partial enzymatic digestion. To integrate our findings, a computational model was implemented to determine how changing biophysical parameters impact cell migration through these dense networks. Our results show that the micromechanics and microstructure of the adult meniscus ECM sterically hinder cell mobility, and that modulation of these ECM attributes via an exogenous matrix-degrading enzyme permits migration through this otherwise impenetrable network. By addressing the inherent limitations to repair imposed by the mature ECM, these studies may define new clinical strategies to promote repair of damaged dense connective tissues in adults.

  13. A Bandwidth-Efficient Service for Local Information Dissemination in Sparse to Dense Roadways

    Directory of Open Access Journals (Sweden)

    Patricia Noriega-Vivas

    2013-07-01

    Full Text Available Thanks to the research on Vehicular Ad Hoc Networks (VANETs, we will be able to deploy applications on roadways that will contribute to energy efficiency through a better planning of long trips. With this goal in mind, we have designed a gas/charging station advertising system, which takes advantage of the broadcast nature of the network. We have found that reducing the number of total sent packets is important, as it allows for a better use of the available bandwidth. We have designed improvements for a distance-based flooding scheme, so that it can support the advertising application with good results in sparse to dense roadway scenarios.

  14. A bandwidth-efficient service for local information dissemination in sparse to dense roadways.

    Science.gov (United States)

    Garcia-Lozano, Estrella; Campo, Celeste; Garcia-Rubio, Carlos; Cortes-Martin, Alberto; Rodriguez-Carrion, Alicia; Noriega-Vivas, Patricia

    2013-07-05

    Thanks to the research on Vehicular Ad Hoc Networks (VANETs), we will be able to deploy applications on roadways that will contribute to energy efficiency through a better planning of long trips. With this goal in mind, we have designed a gas/charging station advertising system, which takes advantage of the broadcast nature of the network. We have found that reducing the number of total sent packets is important, as it allows for a better use of the available bandwidth. We have designed improvements for a distance-based flooding scheme, so that it can support the advertising application with good results in sparse to dense roadway scenarios.

  15. Characterisation of Ferrosilicon Dense Medium Separation Material

    International Nuclear Information System (INIS)

    Waanders, F. B.; Mans, A.

    2003-01-01

    Ferrosilicon is used in the dense medium separation of iron ore at Kumba resources, Sishen, South Africa. Due to high cost and losses that occur during use, maximum recovery by means of magnetic separation is aimed for. The purpose of this project was to determine the characteristics of the unused Fe-Si and then to characterise the changes that occur during storage and use thereof. Scanning electron microscopy was used to determine the composition of each sample, whilst Moessbauer spectroscopy yielded a two-sextet spectrum with hyperfine magnetic field strengths of 20 and 31 T, respectively, for the fresh samples. Additional hematite oxide peaks appeared in the Moessbauer spectra after use of the Fe-Si over a length of time, but this did not result in a dramatic degradation of the medium. No definite changes occurred during correct storage methods. It was, however, found that the biggest loss of Fe-Si was due to the abrasion of the particles, which resulted in the formation of an oxihydroxide froth, during the process.

  16. Improved models of dense anharmonic lattices

    Energy Technology Data Exchange (ETDEWEB)

    Rosenau, P., E-mail: rosenau@post.tau.ac.il; Zilburg, A.

    2017-01-15

    We present two improved quasi-continuous models of dense, strictly anharmonic chains. The direct expansion which includes the leading effect due to lattice dispersion, results in a Boussinesq-type PDE with a compacton as its basic solitary mode. Without increasing its complexity we improve the model by including additional terms in the expanded interparticle potential with the resulting compacton having a milder singularity at its edges. A particular care is applied to the Hertz potential due to its non-analyticity. Since, however, the PDEs of both the basic and the improved model are ill posed, they are unsuitable for a study of chains dynamics. Using the bond length as a state variable we manipulate its dispersion and derive a well posed fourth order PDE. - Highlights: • An improved PDE model of a Newtonian lattice renders compacton solutions. • Compactons are classical solutions of the improved model and hence amenable to standard analysis. • An alternative well posed model enables to study head on interactions of lattices' solitary waves. • Well posed modeling of Hertz potential.

  17. Load Designs For MJ Dense Plasma Foci

    Science.gov (United States)

    Link, A.; Povlius, A.; Anaya, R.; Anderson, M. G.; Angus, J. R.; Cooper, C. M.; Falabella, S.; Goerz, D.; Higginson, D.; Holod, I.; McMahon, M.; Mitrani, J.; Koh, E. S.; Pearson, A.; Podpaly, Y. A.; Prasad, R.; van Lue, D.; Watson, J.; Schmidt, A. E.

    2017-10-01

    Dense plasma focus (DPF) Z-pinches are compact pulse power driven devices with coaxial electrodes. The discharge of DPF consists of three distinct phases: first generation of a plasma sheath, plasma rail gun phase where the sheath is accelerated down the electrodes and finally an implosion phase where the plasma stagnates into a z-pinch geometry. During the z-pinch phase, DPFs can produce MeV ion beams, x-rays and neutrons. Megaampere class DPFs with deuterium fills have demonstrated neutron yields in the 1012 neutrons/shot range with pulse durations of 10-100 ns. Kinetic simulations using the code Chicago are being used to evaluate various load configurations from initial sheath formation to the final z-pinch phase for DPFs with up to 5 MA and 1 MJ coupled to the load. Results will be presented from the preliminary design simulations. LLNL-ABS-734785 This work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory (LLNL) under Contract DE-AC52-07NA27344 and with support from the Computing Grand Challenge program at LLNL.

  18. Kinetic Simulations of Dense Plasma Focus Breakdown

    Science.gov (United States)

    Schmidt, A.; Higginson, D. P.; Jiang, S.; Link, A.; Povilus, A.; Sears, J.; Bennett, N.; Rose, D. V.; Welch, D. R.

    2015-11-01

    A dense plasma focus (DPF) device is a type of plasma gun that drives current through a set of coaxial electrodes to assemble gas inside the device and then implode that gas on axis to form a Z-pinch. This implosion drives hydrodynamic and kinetic instabilities that generate strong electric fields, which produces a short intense pulse of x-rays, high-energy (>100 keV) electrons and ions, and (in deuterium gas) neutrons. A strong factor in pinch performance is the initial breakdown and ionization of the gas along the insulator surface separating the two electrodes. The smoothness and isotropy of this ionized sheath are imprinted on the current sheath that travels along the electrodes, thus making it an important portion of the DPF to both understand and optimize. Here we use kinetic simulations in the Particle-in-cell code LSP to model the breakdown. Simulations are initiated with neutral gas and the breakdown modeled self-consistently as driven by a charged capacitor system. We also investigate novel geometries for the insulator and electrodes to attempt to control the electric field profile. The initial ionization fraction of gas is explored computationally to gauge possible advantages of pre-ionization which could be created experimentally via lasers or a glow-discharge. Prepared by LLNL under Contract DE-AC52-07NA27344.

  19. Neutrino ground state in a dense star

    International Nuclear Information System (INIS)

    Kiers, K.; Tytgat, M.H.

    1998-01-01

    It has recently been argued that long range forces due to the exchange of massless neutrinos give rise to a very large self-energy in a dense, finite-ranged, weakly charged medium. Such an effect, if real, would destabilize a neutron star. To address this issue we have studied the related problem of a massless neutrino field in the presence of an external, static electroweak potential of finite range. To be precise, we have computed to one loop the exact vacuum energy for the case of a spherical square well potential of depth α and radius R. For small wells, the vacuum energy is reliably determined by a perturbative expansion in the external potential. For large wells, however, the perturbative expansion breaks down. A manifestation of this breakdown is that the vacuum carries a non-zero neutrino charge. The energy and neutrino charge of the ground state are, to a good approximation for large wells, those of a neutrino condensate with chemical potential μ=α. Our results demonstrate explicitly that long-range forces due to the exchange of massless neutrinos do not threaten the stability of neutron stars. copyright 1998 The American Physical Society

  20. Neutral helium spectral lines in dense plasmas

    International Nuclear Information System (INIS)

    Omar, Banaz; Wierling, August; Roepke, Gerd; Guenter, Sibylle

    2006-01-01

    Shift and broadening of isolated neutral helium lines 7281 A ring (2 1 P-3 1 S), 7065 A ring (2 3 P-3 3 S), 6678 A ring (2 1 P-3 1 D), 5048 A ring (2 1 P-4 1 S), 4922 A ring (2 1 P-4 1 D), and 4713 A ring (2 3 P-4 3 S) in a dense plasma are investigated. Based on a quantum statistical theory, the electronic contributions to the shift and width are considered, using the method of thermodynamic Green functions. Dynamic screening of the electron-atom interaction is included. Compared to the width, the electronic shift is more affected by dynamical screening. This effect increases at high density. A cut-off procedure for strong collisions is used. The contribution of the ions is taken into account in a quasi-static approximation, with both the quadratic Stark effect and the quadrupole interaction included. The results for shift and width agree well with the available experimental and theoretical data

  1. Deterministic dense coding and entanglement entropy

    International Nuclear Information System (INIS)

    Bourdon, P. S.; Gerjuoy, E.; McDonald, J. P.; Williams, H. T.

    2008-01-01

    We present an analytical study of the standard two-party deterministic dense-coding protocol, under which communication of perfectly distinguishable messages takes place via a qudit from a pair of nonmaximally entangled qudits in a pure state |ψ>. Our results include the following: (i) We prove that it is possible for a state |ψ> with lower entanglement entropy to support the sending of a greater number of perfectly distinguishable messages than one with higher entanglement entropy, confirming a result suggested via numerical analysis in Mozes et al. [Phys. Rev. A 71, 012311 (2005)]. (ii) By explicit construction of families of local unitary operators, we verify, for dimensions d=3 and d=4, a conjecture of Mozes et al. about the minimum entanglement entropy that supports the sending of d+j messages, 2≤j≤d-1; moreover, we show that the j=2 and j=d-1 cases of the conjecture are valid in all dimensions. (iii) Given that |ψ> allows the sending of K messages and has √(λ 0 ) as its largest Schmidt coefficient, we show that the inequality λ 0 ≤d/K, established by Wu et al. [Phys. Rev. A 73, 042311 (2006)], must actually take the form λ 0 < d/K if K=d+1, while our constructions of local unitaries show that equality can be realized if K=d+2 or K=2d-1

  2. Thermochemistry of dense hydrous magnesium silicates

    Science.gov (United States)

    Bose, Kunal; Burnley, Pamela; Navrotsky, Alexandra

    1994-01-01

    Recent experimental investigations under mantle conditions have identified a suite of dense hydrous magnesium silicate (DHMS) phases that could be conduits to transport water to at least the 660 km discontinuity via mature, relatively cold, subducting slabs. Water released from successive dehydration of these phases during subduction could be responsible for deep focus earthquakes, mantle metasomatism and a host of other physico-chemical processes central to our understanding of the earth's deep interior. In order to construct a thermodynamic data base that can delineate and predict the stability ranges for DHMS phases, reliable thermochemical and thermophysical data are required. One of the major obstacles in calorimetric studies of phases synthesized under high pressure conditions has been limitation due to the small (less than 5 mg) sample mass. Our refinement of calorimeter techniques now allow precise determination of enthalpies of solution of less than 5 mg samples of hydrous magnesium silicates. For example, high temperature solution calorimetry of natural talc (Mg(0.99) Fe(0.01)Si4O10(OH)2), periclase (MgO) and quartz (SiO2) yield enthalpies of drop solution at 1044 K to be 592.2 (2.2), 52.01 (0.12) and 45.76 (0.4) kJ/mol respectively. The corresponding enthalpy of formation from oxides at 298 K for talc is minus 5908.2 kJ/mol agreeing within 0.1 percent to literature values.

  3. Borehole stability in densely welded tuffs

    International Nuclear Information System (INIS)

    Fuenkajorn, K.; Daemen, J.J.K.

    1992-07-01

    The stability of boreholes, or more generally of underground openings (i.e. including shafts, ramps, drifts, tunnels, etc.) at locations where seals or plugs are to be placed is an important consideration in seal design for a repository (Juhlin and Sandstedt, 1989). Borehole instability or borehole breakouts induced by stress redistribution could negate the effectiveness of seals or plugs. Breakout fractures along the wall of repository excavations or exploratory holes could provide a preferential flowpath for groundwater or gaseous radionuclides to bypass the plugs. After plug installation, swelling pressures exerted by a plug could induce radial cracks or could open or widen preexisting cracks in the rock at the bottom of the breakouts where the tangential compressive stresses have been released by the breakout process. The purpose of the work reported here is to determine experimentally the stability of a circular hole in a welded tuff sample subjected to various external boundary loads. Triaxial and biaxial borehole stability tests have been performed on densely welded Apache Leap tuff samples and Topopah Spring tuff samples. The nominal diameter of the test hole is 13.3 or 14.4 mm for triaxial testing, and 25.4 mm for biaxial testing. The borehole axis is parallel to one of the principal stress axes. The boreholes are drilled through the samples prior to applying external boundary loads. The boundary loads are progressively increased until breakouts occur or until the maximum load capacity of the loading system has been reached. 74 refs

  4. Packing frustration in dense confined fluids.

    Science.gov (United States)

    Nygård, Kim; Sarman, Sten; Kjellander, Roland

    2014-09-07

    Packing frustration for confined fluids, i.e., the incompatibility between the preferred packing of the fluid particles and the packing constraints imposed by the confining surfaces, is studied for a dense hard-sphere fluid confined between planar hard surfaces at short separations. The detailed mechanism for the frustration is investigated via an analysis of the anisotropic pair distributions of the confined fluid, as obtained from integral equation theory for inhomogeneous fluids at pair correlation level within the anisotropic Percus-Yevick approximation. By examining the mean forces that arise from interparticle collisions around the periphery of each particle in the slit, we calculate the principal components of the mean force for the density profile--each component being the sum of collisional forces on a particle's hemisphere facing either surface. The variations of these components with the slit width give rise to rather intricate changes in the layer structure between the surfaces, but, as shown in this paper, the basis of these variations can be easily understood qualitatively and often also semi-quantitatively. It is found that the ordering of the fluid is in essence governed locally by the packing constraints at each single solid-fluid interface. A simple superposition of forces due to the presence of each surface gives surprisingly good estimates of the density profiles, but there remain nontrivial confinement effects that cannot be explained by superposition, most notably the magnitude of the excess adsorption of particles in the slit relative to bulk.

  5. Deuterium fractionation in dense interstellar clouds

    International Nuclear Information System (INIS)

    Millar, T.J.; Bennett, A.; Herbst, E.

    1989-01-01

    The time-dependent gas-phase chemistry of deuterium fractionation in dense interstellar clouds ranging in temperature between 10 and 70 K was investigated using a pseudo-time-dependent model similar to that of Brown and Rice (1986). The present approach, however, considers much more complex species, uses more deuterium fractionation reactions, and includes the use of new branching ratios for dissociative recombinations reactions. Results indicate that, in cold clouds, the major and most global source of deuterium fractionation is H2D(+) and ions derived from it, such as DCO(+) and H2DO(+). In warmer clouds, reactions of CH2D(+), C2HD(+), and associated species lead to significant fractionation even at 70 K, which is the assumed Orion temperature. The deuterium abundance ratios calculated at 10 K are consistent with those observed in TMC-1 for most species. However, a comparison between theory and observatiom for Orion, indicates that, for species in the ambient molecular cloud, the early-time results obtained with the old dissociative recombination branching ratios are superior if a temperature of 70 K is utilized. 60 refs

  6. Deuterium fractionation in dense interstellar clouds

    Science.gov (United States)

    Millar, T. J.; Bennett, A.; Herbst, Eric

    1989-05-01

    The time-dependent gas-phase chemistry of deuterium fractionation in dense interstellar clouds ranging in temperature between 10 and 70 K was investigated using a pseudo-time-dependent model similar to that of Brown and Rice (1986). The present approach, however, considers much more complex species, uses more deuterium fractionation reactions, and includes the use of new branching ratios for dissociative recombinations reactions. Results indicate that, in cold clouds, the major and most global source of deuterium fractionation is H2D(+) and ions derived from it, such as DCO(+) and H2DO(+). In warmer clouds, reactions of CH2D(+), C2HD(+), and associated species lead to significant fractionation even at 70 K, which is the assumed Orion temperature. The deuterium abundance ratios calculated at 10 K are consistent with those observed in TMC-1 for most species. However, a comparison between theory and observatiom for Orion, indicates that, for species in the ambient molecular cloud, the early-time results obtained with the old dissociative recombination branching ratios are superior if a temperature of 70 K is utilized.

  7. Matching Cost Filtering for Dense Stereo Correspondence

    Directory of Open Access Journals (Sweden)

    Yimin Lin

    2013-01-01

    Full Text Available Dense stereo correspondence enabling reconstruction of depth information in a scene is of great importance in the field of computer vision. Recently, some local solutions based on matching cost filtering with an edge-preserving filter have been proved to be capable of achieving more accuracy than global approaches. Unfortunately, the computational complexity of these algorithms is quadratically related to the window size used to aggregate the matching costs. The recent trend has been to pursue higher accuracy with greater efficiency in execution. Therefore, this paper proposes a new cost-aggregation module to compute the matching responses for all the image pixels at a set of sampling points generated by a hierarchical clustering algorithm. The complexity of this implementation is linear both in the number of image pixels and the number of clusters. Experimental results demonstrate that the proposed algorithm outperforms state-of-the-art local methods in terms of both accuracy and speed. Moreover, performance tests indicate that parameters such as the height of the hierarchical binary tree and the spatial and range standard deviations have a significant influence on time consumption and the accuracy of disparity maps.

  8. AdDroid: Privilege Separation for Applications and Advertisers in Android

    Science.gov (United States)

    2013-05-14

    consumers . Mobile advertising services such as AdMob [1] and Millennial Media [22] play a key role in this ecosystem by allowing developers to generate...privacy-sensitive permissions just to display advertisements . 1Applications need phone state to obtain the phone’s In- ternational Mobile Equipment Identity...the Android permis- sion system and explain how mobile advertising currently works. We then explain how the current system leads to privacy and

  9. A Space-Frequency Data Compression Method for Spatially Dense Laser Doppler Vibrometer Measurements

    Directory of Open Access Journals (Sweden)

    José Roberto de França Arruda

    1996-01-01

    Full Text Available When spatially dense mobility shapes are measured with scanning laser Doppler vibrometers, it is often impractical to use phase-separation modal parameter estimation methods due to the excessive number of highly coupled modes and to the prohibitive computational cost of processing huge amounts of data. To deal with this problem, a data compression method using Chebychev polynomial approximation in the frequency domain and two-dimensional discrete Fourier series approximation in the spatial domain, is proposed in this article. The proposed space-frequency regressive approach was implemented and verified using a numerical simulation of a free-free-free-free suspended rectangular aluminum plate. To make the simulation more realistic, the mobility shapes were synthesized by modal superposition using mode shapes obtained experimentally with a scanning laser Doppler vibrometer. A reduced and smoothed model, which takes advantage of the sinusoidal spatial pattern of structural mobility shapes and the polynomial frequency-domain pattern of the mobility shapes, is obtained. From the reduced model, smoothed curves with any desired frequency and spatial resolution can he produced whenever necessary. The procedure can he used either to generate nonmodal models or to compress the measured data prior to modal parameter extraction.

  10. Compressive intrinsic stress originates in the grain boundaries of dense refractory polycrystalline thin films

    Energy Technology Data Exchange (ETDEWEB)

    Magnfält, D., E-mail: danma@ifm.liu.se; Sarakinos, K. [Nanoscale Engineering Division, Department of Physics, Chemistry and Biology (IFM), Linköping University, SE-581 83 Linköping (Sweden); Fillon, A.; Abadias, G. [Institut P' , Département Physique et Mécanique des Matériaux, Université de Poitiers-CNRS-ENSMA, SP2MI, Téléport 2, Bd M. et P. Curie, F-86962 Chasseneuil-Futuroscope (France); Boyd, R. D.; Helmersson, U. [Plasma and Coatings Physics Division, Department of Physics, Chemistry and Biology (IFM), Linköping University, SE-581 83 Linköping (Sweden)

    2016-02-07

    Intrinsic stresses in vapor deposited thin films have been a topic of considerable scientific and technological interest owing to their importance for functionality and performance of thin film devices. The origin of compressive stresses typically observed during deposition of polycrystalline metal films at conditions that result in high atomic mobility has been under debate in the literature in the course of the past decades. In this study, we contribute towards resolving this debate by investigating the grain size dependence of compressive stress magnitude in dense polycrystalline Mo films grown by magnetron sputtering. Although Mo is a refractory metal and hence exhibits an intrinsically low mobility, low energy ion bombardment is used during growth to enhance atomic mobility and densify the grain boundaries. Concurrently, the lateral grain size is controlled by using appropriate seed layers on which Mo films are grown epitaxially. The combination of in situ stress monitoring with ex situ microstructural characterization reveals a strong, seemingly linear, increase of the compressive stress magnitude on the inverse grain size and thus provides evidence that compressive stress is generated in the grain boundaries of the film. These results are consistent with models suggesting that compressive stresses in metallic films deposited at high homologous temperatures are generated by atom incorporation into and densification of grain boundaries. However, the underlying mechanisms for grain boundary densification might be different from those in the present study where atomic mobility is intrinsically low.

  11. Mobile Marketing

    OpenAIRE

    竹安, 数博; Takeyasu, Kazuhiro

    2005-01-01

    This article deals with one of the modern trends in marketing communication, which is mobile marketing. Towards the end of 2008, several projects which use mobile phones for target marketing communication were launched. Commercial SMS´s are sent on the base of agreement or registration of the consumers on special websites, for example hellomobil.cz. The benefit for the consumers is the bonus which can have more forms - not only sending money to the account, free SMS´s/MMS´s and minutes but al...

  12. Mobile Usability

    DEFF Research Database (Denmark)

    Aryana, Bijan; Clemmensen, Torkil

    2013-01-01

    In this article, a country specific comparative mobile usability study is presented, using Iran and Turkey as the two chosen emerging/emergent nation exemplars of smartphone usage and adoption. In a focus group study, three mobile applications were selected by first-time users of smartphones...... personal contacts. The results and analysis establish the existence of country specific issues and concerns, as well as reveal generic usability issues. The article concludes that the source of these issues is most likely due to a combination of certain contextual features endemic to both Iran and Turkey...

  13. The effect of playing advergames that promote energy-dense snacks or fruit on actual food intake among children.

    Science.gov (United States)

    Folkvord, Frans; Anschütz, Doeschka J; Buijzen, Moniek; Valkenburg, Patti M

    2013-02-01

    Previous studies have focused on the effects of television advertising on the energy intake of children. However, the rapidly changing food-marketing landscape requires research to measure the effects of nontraditional forms of marketing on the health-related behaviors of children. The main aim of this study was to examine the effect of advergames that promote energy-dense snacks or fruit on children's ad libitum snack and fruit consumption and to examine whether this consumption differed according to brand and product type (energy-dense snacks and fruit). The second aim was to examine whether advergames can stimulate fruit intake. We used a randomized between-subject design with 270 children (age: 8-10 y) who played an advergame that promoted energy-dense snacks (n = 69), fruit (n = 67), or nonfood products (n = 65) or were in the control condition (n = 69). Subsequently, we measured the free intake of energy-dense snacks and fruit. The children then completed questionnaire measures, and we weighed and measured them. The main finding was that playing an advergame containing food cues increased general energy intake, regardless of the advertised brand or product type (energy-dense snacks or fruit), and this activity particularly increased the intake of energy-dense snack foods. Children who played the fruit version of the advergame did not eat significantly more fruit than did those in the other groups. The findings suggest that playing advergames that promote food, including either energy-dense snacks or fruit, increases energy intake in children.

  14. Mining connected global and local dense subgraphs for bigdata

    Science.gov (United States)

    Wu, Bo; Shen, Haiying

    2016-01-01

    The problem of discovering connected dense subgraphs of natural graphs is important in data analysis. Discovering dense subgraphs that do not contain denser subgraphs or are not contained in denser subgraphs (called significant dense subgraphs) is also critical for wide-ranging applications. In spite of many works on discovering dense subgraphs, there are no algorithms that can guarantee the connectivity of the returned subgraphs or discover significant dense subgraphs. Hence, in this paper, we define two subgraph discovery problems to discover connected and significant dense subgraphs, propose polynomial-time algorithms and theoretically prove their validity. We also propose an algorithm to further improve the time and space efficiency of our basic algorithm for discovering significant dense subgraphs in big data by taking advantage of the unique features of large natural graphs. In the experiments, we use massive natural graphs to evaluate our algorithms in comparison with previous algorithms. The experimental results show the effectiveness of our algorithms for the two problems and their efficiency. This work is also the first that reveals the physical significance of significant dense subgraphs in natural graphs from different domains.

  15. Dense chlorinated solvents and other DNAPLs in groundwater

    DEFF Research Database (Denmark)

    Broholm, K.

    1996-01-01

    Anmeldelse af Pankow,J.F. & Cherry,J.A.: Dense chlorinated solvents and other DNAPLs in groundwater. Waterloo Press, Portland, Oregon, USA, 1996......Anmeldelse af Pankow,J.F. & Cherry,J.A.: Dense chlorinated solvents and other DNAPLs in groundwater. Waterloo Press, Portland, Oregon, USA, 1996...

  16. Dry processing versus dense medium processing for preparing thermal coal

    CSIR Research Space (South Africa)

    De Korte, GJ

    2013-10-01

    Full Text Available of the final product. The separation efficiency of dry processes is, however, not nearly as good as that of dense medium and, as a result, it is difficult to effectively beneficiate coals with a high near-dense content. The product yield obtained from some raw...

  17. Interparticle interaction and transport processes in dense semiclassical plasmas

    International Nuclear Information System (INIS)

    Baimbetov, F.B.; Giniyatova, Sh.G.

    2005-01-01

    On the basis of the density response formalism an expression for the pseudopotential of dense semiclassical plasma, which takes account of quantum-mechanical effects, local field corrections, and electronic screening effects is obtained. The static structure factors taking into account both local fields and quantum-mechanical effects are calculated. An electrical conductivity, thermal conductivity, and viscosity of dense semiclassical plasma are studied

  18. Kaon dynamics in dense nuclear matter

    International Nuclear Information System (INIS)

    David, Ch.

    1998-01-01

    In this thesis a list of cross sections concerning the kaons and antikaons production, has been presented. A new method for the parametrisation of particles rescattering cross sections, based on the neural networks has been developed. Because of the influence of the nuclear matter on kaons properties, the effect of the optical potential parameters has been studied. In particular a term has been added to the vector part of this potential to determine the relative importance of this part compared to the scalar part. A new parametrisation of the resonance lifetime has been proposed. (A.L.B.)

  19. Driving advertising into mobile mediums : Study of consumer attitudes towards mobile advertising and of factors affecting on them

    OpenAIRE

    Pietz, Michal; Storbacka, Lauri

    2007-01-01

    The high penetration rate of mobile phones along with the recent technological development has created a whole new marketing medium named mobile advertising filled with possibilities for the advertisers. Earlier studies have although indicated the success of this new advertising channel to depend on user acceptance of receiving mobile ads. Wherefore a study of consumer attitudes towards mobile advertising can be considered necessary in order to create a lucrative business. Even though this to...

  20. Supersymmetric AdS6 solutions of type IIB supergravity

    International Nuclear Information System (INIS)

    Kim, Hyojoong; Kim, Nakwoo; Suh, Minwoo

    2015-01-01

    We study the general requirement for supersymmetric AdS 6 solutions in type IIB supergravity. We employ the Killing spinor technique and study the differential and algebraic relations among various Killing spinor bilinears to find the canonical form of the solutions. Our result agrees precisely with the work of Apruzzi et al. (JHEP 1411:099, 2014), which used the pure spinor technique. Hoping to identify the geometry of the problem, we also computed four-dimensional theory through the dimensional reduction of type IIB supergravity on AdS 6 . This effective action is essentially a non-linear sigma model with five scalar fields parametrizing SL(3,ℝ)/SO(2,1), modified by a scalar potential and coupled to Einstein gravity in Euclidean signature. We argue that the scalar potential can be explained by a subgroup CSO(1,1,1) ⊂SL(3,ℝ) in a way analogous to gauged supergravity

  1. AdS gravity and the scalar glueball spectrum

    Energy Technology Data Exchange (ETDEWEB)

    Vento, Vicente [Departament de Fisica Teorica, Universitat de Valencia y Institut de Fisica Corpuscular, Consejo Superior de Investigaciones Cientificas, Burjassot (Valencia) (Spain)

    2017-09-15

    The scalar glueball spectrum has attracted much attention since the formulation of Quantum Chromodynamics. Different approaches give very different results for the glueball masses. We revisit the problem from the perspective of the AdS/CFT correspondence. (orig.)

  2. Smoothed transitions in higher spin AdS gravity

    International Nuclear Information System (INIS)

    Banerjee, Shamik; Shenker, Stephen; Castro, Alejandra; Hellerman, Simeon; Hijano, Eliot; Lepage-Jutier, Arnaud; Maloney, Alexander

    2013-01-01

    We consider CFTs conjectured to be dual to higher spin theories of gravity in AdS 3 and AdS 4 . Two-dimensional CFTs with W N symmetry are considered in the λ = 0 (k → ∞) limit where they are conjectured to be described by continuous orbifolds. The torus partition function is computed, using reasonable assumptions, and equals that of a free-field theory. We find no phase transition at temperatures of order 1; the usual Hawking–Page phase transition is removed by the highly degenerate light states associated with conical defect states in the bulk. Three-dimensional Chern–Simons matter CFTs with vector-like matter are considered on T 3 , where the dynamics is described by an effective theory for the eigenvalues of the holonomies. Likewise, we find no evidence for a Hawking–Page phase transition at a large level k. (paper)

  3. Winding strings and AdS3 black holes

    International Nuclear Information System (INIS)

    Troost, Jan

    2002-01-01

    We start a systematic study of string theory in AdS 3 black hole backgrounds. Firstly, we analyse in detail the geodesic structure of the BTZ black hole, including spacelike geodesics. Secondly, we study the spectrum for massive and massless scalar fields, paying particular attention to the connection between Sl(2,R) subgroups, the theory of special functions and global properties of the BTZ black holes. We construct classical strings that wind the black holes. Finally, we apply the general formalism to the vacuum black hole background, and formulate the boundary spacetime Virasoro algebra in terms of worldsheet operators. We moreover establish the link between a proposal for a ghost free spectrum for Sl(2,R) string propagation and the massless black hole background, thereby claryfing aspects of the AdS 3 /CFT correspondence. (author)

  4. AdS strings with torsion: Noncomplex heterotic compactifications

    International Nuclear Information System (INIS)

    Frey, Andrew R.; Lippert, Matthew

    2005-01-01

    Combining the effects of fluxes and gaugino condensation in heterotic supergravity, we use a ten-dimensional approach to find a new class of four-dimensional supersymmetric AdS 4 compactifications on almost-Hermitian manifolds of SU(3) structure. Computation of the torsion allows a classification of the internal geometry, which for a particular combination of fluxes and condensate, is nearly Kaehler. We argue that all moduli are fixed, and we show that the Kaehler potential and superpotential proposed in the literature yield the correct AdS 4 radius. In the nearly Kaehler case, we are able to solve the H Bianchi identity using a nonstandard embedding. Finally, we point out subtleties in deriving the effective superpotential and understanding the heterotic supergravity in the presence of a gaugino condensate

  5. The Mixed Phase of Charged AdS Black Holes

    Directory of Open Access Journals (Sweden)

    Piyabut Burikham

    2016-01-01

    Full Text Available We study the mixed phase of charged AdS black hole and radiation when the total energy is fixed below the threshold to produce a stable charged black hole branch. The coexistence conditions for the charged AdS black hole and radiation are derived for the generic case when radiation particles carry charge. The phase diagram of the mixed phase is demonstrated for both fixed potential and charge ensemble. In the dual gauge picture, they correspond to the mixed phase of quark-gluon plasma (QGP and hadron gas in the fixed chemical potential and density ensemble, respectively. In the nuclei and heavy-ion collisions at intermediate energies, the mixed phase of exotic QGP and hadron gas could be produced. The mixed phase will condense and evaporate into the hadron gas as the fireball expands.

  6. Perturbative entanglement thermodynamics for AdS spacetime: renormalization

    International Nuclear Information System (INIS)

    Mishra, Rohit; Singh, Harvendra

    2015-01-01

    We study the effect of charged excitations in the AdS spacetime on the first law of entanglement thermodynamics. It is found that ‘boosted’ AdS black holes give rise to a more general form of first law which includes chemical potential and charge density. To obtain this result we have to resort to a second order perturbative calculation of entanglement entropy for small size subsystems. At first order the form of entanglement law remains unchanged even in the presence of charged excitations. But the thermodynamic quantities have to be appropriately ‘renormalized’ at the second order due to the corrections. We work in the perturbative regime where T thermal ≪T E .

  7. Cameras in mobile phones

    Science.gov (United States)

    Nummela, Ville; Viinikanoja, Jarkko; Alakarhu, Juha

    2006-04-01

    One of the fastest growing markets in consumer markets today are camera phones. During past few years total volume has been growing fast and today millions of mobile phones with camera will be sold. At the same time resolution and functionality of the cameras has been growing from CIF towards DSC level. From camera point of view the mobile world is an extremely challenging field. Cameras should have good image quality but in small size. They also need to be reliable and their construction should be suitable for mass manufacturing. All components of the imaging chain should be well optimized in this environment. Image quality and usability are the most important parameters to user. The current trend of adding more megapixels to cameras and at the same time using smaller pixels is affecting both. On the other hand reliability and miniaturization are key drivers for product development as well as the cost. In optimized solution all parameters are in balance but the process of finding the right trade-offs is not an easy task. In this paper trade-offs related to optics and their effects to image quality and usability of cameras are discussed. Key development areas from mobile phone camera point of view are also listed.

  8. 16. Hot dense plasma atomic processes

    International Nuclear Information System (INIS)

    Werner, Dappen; Totsuji, H.; Nishii, Y.

    2002-01-01

    This document gathers 13 articles whose common feature is to deal with atomic processes in hot plasmas. Density functional molecular dynamics method is applied to the hydrogen plasma in the domain of liquid metallic hydrogen. The effects of the density gradient are taken into account in both the electronic kinetic energy and the exchange energy and it is shown that they almost cancel with each other, extending the applicability of the Thomas-Fermi-Dirac approximation to the cases where the density gradient is not negligible. Another article reports about space and time resolved M-shell X-ray measurements of a laser-produced gas jet xenon plasma. Plasma parameters have been measured by ion acoustic and electron plasma waves Thomson scattering. Photo-ionization becomes a dominant atomic process when the density and the temperature of plasmas are relatively low and when the plasma is submitted to intense external radiation. It is shown that 2 plasmas which have a very different density but have the same ionization parameters, are found in a similar ionization state. Most radiation hydrodynamics codes use radiative opacity data from available libraries of atomic data. Several articles are focused on the determination of one group Rosseland and Planck mean analytical formulas for several single elements used in inertial fusion targets. In another paper the plasma density effect on population densities, effective ionization, recombination rate coefficients and on emission lines from carbon and Al ions in hot dense plasma, is studied. The last article is devoted to a new atomic model in plasmas that considers the occupation probability of the bound state and free state density in the presence of the plasma micro-field. (A.C.)

  9. DENSE MOLECULAR CORES BEING EXTERNALLY HEATED

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Gwanjeong; Lee, Chang Won; Kim, Mi-Ryang [Radio Astronomy division, Korea Astronomy and Space Science Institute, 776 Daedeokdae-ro, Yuseong-gu, Daejeon, 34055 (Korea, Republic of); Gopinathan, Maheswar [Aryabhatta Research Institute of Observational Sciences, Manora Peak, Nainital 263129 (India); Jeong, Woong-Seob, E-mail: archer81@kasi.re.kr [Department of Astronomy and Space Science, University of Science and Technology, 217 Gajungro, Yuseong-gu, Daejeon, 34113 (Korea, Republic of)

    2016-06-20

    We present results of our study of eight dense cores, previously classified as starless, using infrared (3–160 μ m) imaging observations with the AKARI telescope and molecular line (HCN and N{sub 2}H{sup +}) mapping observations with the KVN telescope. Combining our results with the archival IR to millimeter continuum data, we examined the starless nature of these eight cores. Two of the eight cores are found to harbor faint protostars having luminosities of ∼0.3–4.4 L {sub ⊙}. The other six cores are found to remain starless and probably are in a dynamically transitional state. The temperature maps produced using multi-wavelength images show an enhancement of about 3–6 K toward the outer boundary of these cores, suggesting that they are most likely being heated externally by nearby stars and/or interstellar radiation fields. Large virial parameters and an overdominance of red asymmetric line profiles over the cores may indicate that the cores are set into either an expansion or an oscillatory motion, probably due to the external heating. Most of the starless cores show a coreshine effect due to the scattering of light by the micron-sized dust grains. This may imply that the age of the cores is of the order of ∼10{sup 5} years, which is consistent with the timescale required for the cores to evolve into an oscillatory stage due to external perturbation. Our observational results support the idea that the external feedback from nearby stars and/or interstellar radiation fields may play an important role in the dynamical evolution of the cores.

  10. Generalised structures for N=1 AdS backgrounds

    Energy Technology Data Exchange (ETDEWEB)

    Coimbra, André [Institut für Theoretische Physik & Center for Quantum Engineering and Spacetime Research,Leibniz Universität Hannover,Appelstraße 2, 30167 Hannover (Germany); Strickland-Constable, Charles [Institut de physique théorique, Université Paris Saclay, CEA, CNRS, Orme des Merisiers, F-91191 Gif-sur-Yvette (France)

    2016-11-16

    We expand upon a claim made in a recent paper [http://arxiv.org/abs/1411.5721] that generic minimally supersymmetric AdS backgrounds of warped flux compactifications of Type II and M theory can be understood as satisfying a straightforward weak integrability condition in the language of E{sub d(d)}×ℝ{sup +} generalised geometry. Namely, they are spaces admitting a generalised G-structure set by the Killing spinor and with constant singlet generalised intrinsic torsion.

  11. ADS Bumblebee comes of age

    Science.gov (United States)

    Accomazzi, Alberto; Kurtz, Michael J.; Henneken, Edwin; Grant, Carolyn S.; Thompson, Donna M.; Chyla, Roman; McDonald, Steven; Shaulis, Taylor J.; Blanco-Cuaresma, Sergi; Shapurian, Golnaz; Hostetler, Timothy W.; Templeton, Matthew R.; Lockhart, Kelly E.

    2018-01-01

    The ADS Team has been working on a new system architecture and user interface named “ADS Bumblebee” since 2015. The new system presents many advantages over the traditional ADS interface and search engine (“ADS Classic”). A new, state of the art search engine features a number of new capabilities such as full-text search, advanced citation queries, filtering of results and scalable analytics for any search results. Its services are built on a cloud computing platform which can be easily scaled to match user demand. The Bumblebee user interface is a rich javascript application which leverages the features of the search engine and integrates a number of additional visualizations such as co-author and co-citation networks which provide a hierarchical view of research groups and research topics, respectively. Displays of paper analytics provide views of the basic article metrics (citations, reads, and age). All visualizations are interactive and provide ways to further refine search results. This new search system, which has been in beta for the past three years, has now matured to the point that it provides feature and content parity with ADS Classic, and has become the recommended way to access ADS content and services. Following a successful transition to Bumblebee, the use of ADS Classic will be discouraged starting in 2018 and phased out in 2019. You can access our new interface at https://ui.adsabs.harvard.edu

  12. Designing Mobilities

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    How is the width of the pavement shaping the urban experience? How is the material design of transport infrastructure and mobile technology affording social interaction in everyday life spaces? How do people inhabit these spaces with their bodies and in accordance to social and cultural norms...

  13. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  14. Mobile Misfortune

    DEFF Research Database (Denmark)

    Vigh, Henrik Erdman

    2015-01-01

    of the mobility it enables. This article, thus, looks at the motives and manners in which young men in Bissau become caught up in transnational flows of cocaine. It shows how motion is emotively anchored and affectively bound: tied to and directed toward a feeling of worth and realisation of being, and how...

  15. Going Mobile?

    DEFF Research Database (Denmark)

    Tallon, Loic; Froes, Isabel Cristina G.

    2011-01-01

    If the future is mobile, how is the museum community developing within that future? What are the challenges museums face within it? In which directions should we be seeking to evolve our collective knowledge share? It was to gain observations on questions such as these that the 2011 Museums & Mob...

  16. Resource Mobilization

    International Development Research Centre (IDRC) Digital Library (Canada)

    Annex 1: The Scoping Study on Donor Funding for. Development Research in ... publication of the Resource Mobilization: A Practical Guide for Research .... applied the concept or technique, which validates the practical application of ... some other staff member would write up a grant application addressed to one, two, or a ...

  17. Mobile Phone

    Institute of Scientific and Technical Information of China (English)

    籍万杰

    2004-01-01

    Your mobile phone rings.and instead of usual electronic signals,it's playing your favorite music.A friend sends your favorite song to cheer you up.One day,a record company might forward new records and music videos to your phone.

  18. Noncommutative D-branes from covariant AdS superstring

    International Nuclear Information System (INIS)

    Sakaguchi, Makoto; Yoshida, Kentaroh

    2008-01-01

    We study noncommutative (NC) D-branes on AdS 5 xS 5 from κ-invariance of covariant Green-Schwarz action of an open string with a non-trivial world-volume flux. Finding boundary conditions to ensure the κ-invariance, we can see possible configurations of the NC D-branes. With this method 1/4 BPS NC D-branes are discussed. The resulting NC Dp-branes are 1/4 BPS at arbitrary position other than the p=1 case. The exceptional D-string is 1/2 BPS at the origin and 1/4 BPS outside the origin. Those are reduced to possible 1/4 BPS or 1/2 BPS AdS D-branes in the commutative limit. The same analysis is applied to an open superstring in a pp-wave and leads to 1/4 BPS configurations of NC D-branes. These D-branes are consistently obtained from AdS D-branes via the Penrose limit

  19. Supersymmetric giant graviton solutions in AdS3

    International Nuclear Information System (INIS)

    Mandal, Gautam; Raju, Suvrat; Smedbaeck, Mikael

    2008-01-01

    We parametrize all classical probe brane configurations that preserve four supersymmetries in (a) the extremal D1-D5 geometry, (b) the extremal D1-D5-P geometry, (c) the smooth D1-D5 solutions proposed by Lunin and Mathur, and (d) global AdS 3 xS 3 xT 4 /K3. These configurations consist of D1 branes, D5 branes, and bound states of D5 and D1 branes with the property that a particular Killing vector is tangent to the brane world volume at each point. We show that the supersymmetric sector of the D5-brane world volume theory may be analyzed in an effective 1+1 dimensional framework that places it on the same footing as D1 branes. In global AdS and the corresponding Lunin-Mathur solution, the solutions we describe are ''bound'' to the center of AdS for generic parameters and cannot escape to infinity. We show that these probes only exist on the submanifold of moduli space where the background B NS field and theta angle vanish. We quantize these probes in the near-horizon region of the extremal D1-D5 geometry and obtain the theory of long strings discussed by Seiberg and Witten

  20. Exploring AdS waves via nonminimal coupling

    International Nuclear Information System (INIS)

    Ayon-Beato, Eloy; Hassaiene, Mokhtar

    2006-01-01

    We consider nonminimally coupled scalar fields to explore the Siklos spacetimes in three dimensions. Their interpretation as exact gravitational waves propagating on AdS space restrict the source to behave as a pure radiation field. We show that the related pure radiation constraints single out a unique self-interaction potential depending on one coupling constant. For a vanishing coupling constant, this potential reduces to a mass term with a mass fixed in terms of the nonminimal-coupling parameter. This mass dependence allows the existence of several free cases including massless and tachyonic sources. There even exists a particular value of the nonminimal-coupling parameter for which the corresponding mass exactly compensates the contribution generated by the negative scalar curvature, producing a genuinely massless field in this curved background. The self-interacting case is studied in detail for the conformal coupling. The resulting gravitational wave is formed by the superposition of the free and the self-interaction contributions, except for a critical value of the coupling constant where a nonperturbative effect relating the strong and weak regimes of the source appears. We establish a correspondence between the scalar source supporting an AdS wave and a pp wave by showing that their respective pure radiation constraints are conformally related, while their involved backgrounds are not. Finally, we consider the AdS waves for topologically massive gravity and its limit to conformal gravity