WorldWideScience

Sample records for dense mobile ad

  1. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  2. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  3. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  4. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  5. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  6. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  7. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  8. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  9. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  10. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  11. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  12. What Makes Consumers Recall Banner Ads in Mobile Applications

    Directory of Open Access Journals (Sweden)

    Mesut Çiçek

    2017-09-01

    Full Text Available The uses of mobile advertisements are increasing their popularity across the world. Companies can gather information about the mobile users based on their locations, lifestyle, and preferences via GPS, cookies and browsing history and embed highly personalized banner ads in mobile applications. However, in the literature there is hardly any work on the effectiveness of these highly personalized in-app banner ads. The aim of the study is to reveal which factors affect the effectiveness of in-app banner ads. An experimental study was designed and 209 subjects participated. The results of Ordinal Logistic Regression indicated that prior brand attitude and attitude towards application have a positive effect, while brand engagement with self-concept has a negative effect on the recall of in-app banner ads. Moreover, in-app banner ads are recalled more when they are located in landscape applications and positioned at the top part of the screen. This research provides some implications for future studies and practitioners.

  13. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  14. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  15. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  16. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  17. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  18. Les Protocoles de routage dans les réseaux mobiles Ad Hoc ...

    African Journals Online (AJOL)

    Dans cet article nous présentons un état de l'art sur les protocoles de routage dans les réseaux mobiles Ad hoc. Mots clés : Réseaux mobiles ad hoc/, Protocoles de routage. Routing protocols in wireless mobile ad hoc networks. Abstract:The communication between users with handheld computers interconnected through ...

  19. Value Added Services and Adoption of Mobile Payments

    DEFF Research Database (Denmark)

    Augsburg, Christel; Hedman, Jonas

    2014-01-01

    In this paper, we investigate the role of Value Added Services (VAS) in consumers’ adoption of mobile payments. VAS are supplementary digital services offered in connection with mobile payments; in this study exemplified by receipts, loyalty cards, and coupons. A research model is derived from...... that intention to adopt mobile payments increases as VAS are introduced and that this increase comes from a positive change in Perceived Usefulness, compatibility, and Convenience....

  20. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  1. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  2. Adaptive Probabilistic Broadcasting over Dense Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Victor Gau

    2010-01-01

    Full Text Available We propose an idle probability-based broadcasting method, iPro, which employs an adaptive probabilistic mechanism to improve performance of data broadcasting over dense wireless ad hoc networks. In multisource one-hop broadcast scenarios, the modeling and simulation results of the proposed iPro are shown to significantly outperform the standard IEEE 802.11 under saturated condition. Moreover, the results also show that without estimating the number of competing nodes and changing the contention window size, the performance of the proposed iPro can still approach the theoretical bound. We further apply iPro to multihop broadcasting scenarios, and the experiment results show that within the same elapsed time after the broadcasting, the proposed iPro has significantly higher Packet-Delivery Ratios (PDR than traditional methods.

  3. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  4. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  5. The added value of contrast enhanced spectral mammography in identification of multiplicity of suspicious lesions in dense breast

    Directory of Open Access Journals (Sweden)

    Amr Farouk Ibrahim Moustafa

    2018-03-01

    Full Text Available Objective: To evaluate the additive value of Contrast Enhanced Spectral Mammography (CESM in the preoperative assessment of malignant lesions in dense breast parenchyma regarding multiplicity. Material and methods: The study included 160 women having heterogeneous dense breast parenchyma (ACR c and d with suspicious lesions identified on sono mammography examination. All patients performed contrast enhanced spectral mammography to confirm or exclude lesion multiplicity. The number of lesions was calculated in the contrast high energy subtraction images with the reference standard being histopathological analysis. Results: Adding CESM to sono-mammography the accuracy in identifying multiple malignant lesion increased from 81.8% accuracy of sono-mammography up to 100% accuracy after adding CESM. Conclusion: Contrast enhanced spectral mammogram showed an added value in the preoperative assessment of breast masses increasing the accuracy of detection of lesions and multiplicity (multifocality and multi-centricity. Keywords: Breast cancer, Contrast enhanced spectral mammogram

  6. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  7. Mobility-Aware Modeling and Analysis of Dense Cellular Networks With $C$ -Plane/ $U$ -Plane Split Architecture

    KAUST Repository

    Ibrahim, Hazem

    2016-09-19

    The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number of users associated with each BS, leading to an improved spatial frequency reuse and spectral efficiency, and thus, higher network capacity. However, the densification gain comes at the expense of higher handover rates and network control overhead. Hence, user’s mobility can diminish or even nullifies the foreseen densification gain. In this context, splitting the control plane ( C -plane) and user plane ( U -plane) is proposed as a potential solution to harvest densification gain with reduced cost in terms of handover rate and network control overhead. In this paper, we use stochastic geometry to develop a tractable mobility-aware model for a two-tier downlink cellular network with ultra-dense small cells and C -plane/ U -plane split architecture. The developed model is then used to quantify the effect of mobility on the foreseen densification gain with and without C -plane/ U -plane split. To this end, we shed light on the handover problem in dense cellular environments, show scenarios where the network fails to support certain mobility profiles, and obtain network design insights.

  8. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  9. Photogrammetric 3D reconstruction using mobile imaging

    Science.gov (United States)

    Fritsch, Dieter; Syll, Miguel

    2015-03-01

    In our paper we demonstrate the development of an Android Application (AndroidSfM) for photogrammetric 3D reconstruction that works on smartphones and tablets likewise. The photos are taken with mobile devices, and can thereafter directly be calibrated using standard calibration algorithms of photogrammetry and computer vision, on that device. Due to still limited computing resources on mobile devices, a client-server handshake using Dropbox transfers the photos to the sever to run AndroidSfM for the pose estimation of all photos by Structure-from-Motion and, thereafter, uses the oriented bunch of photos for dense point cloud estimation by dense image matching algorithms. The result is transferred back to the mobile device for visualization and ad-hoc on-screen measurements.

  10. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  11. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  12. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  13. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  14. Ad-me: Intelligent Context-Sensitive Advertising within a Mobile Tourist Guide.

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector is set to witness phenomenal growth. In particular context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the mobile e-commerce user) system which proactively delivers advertisements to users. Within the context of a mobile tourist guide advertisements are presented relative to user location and perceived needs. It uses Global Positioning System (GPS) and embraces agent-oriented design p...

  15. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  16. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  17. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  18. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  19. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...

  20. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  1. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  2. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  3. Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach

    OpenAIRE

    Gavalas, Damianos; Pantziou, Grammati; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this work, we introduce an efficient distributed clustering algorithm that uses both location and energy metrics for cluster formation. Our proposed solution mainly addresses cluster stability, manageability and energy efficiency i...

  4. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  5. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  6. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  7. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  8. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  9. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  10. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  11. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  12. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  13. Revenue-sharing analysis in the mobile value-added services

    Institute of Scientific and Technical Information of China (English)

    LIU Bing; TANG Shou-lian

    2006-01-01

    This article provides a framework e within which the revenue-sharing in mobile value-added services can be analyzed.It shows that the revenue-sharing ratio between a network operator and a content provider (CP) has no significant effect on prices, market shares or social welfare in the case of nonstandardization. This implies that the revenue-sharing ratio cannot be used as a policy variable.

  14. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  15. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  16. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  17. Effect of grain mobility on ionic conductivity of Ceria added YSZ electrolyte

    International Nuclear Information System (INIS)

    Gupta, Alka; Omar, Shobit; Balani, Kantesh

    2012-01-01

    In an effort to develop novel electrolyte materials, the present work explores the effect of grain boundary mobility on ionic conductivity of CeO 2 -YSZ electrolyte. For cubic zirconia in general, the higher the grain boundary mobility, the lower the activation energy for oxide ion migration and judicious doping can be an effective method for mobility control. The two main directions for fabricating 8 mol. % YSZs (8YSZ) with 0,5 and 10 wt % CeO 2 are being followed: (i) co doping by conventional sintering (CS, 1400 ℃, 4h holding, ∼98 % theoretical density), and (ii) nano composite approach by spark plasma sintering (SPS, 1200 ℃, 5 min holding, ∼96 % theoretical density). Phase analysis by XRD, indicates that CeO 2 forms the complete solid solution with YSZ when synthesized by CS and both solid solution and composite formation (seen as isolated ceria rich zones in YSZ matrix by EDS analysis via TEM) by SPS. The grain boundary mobility for CS samples of pure and 10%CeO 2 added YSZ are 6.69 x 10 -18 to 10.35 X 10 -18 m 3 /N/s respectively. While for SPS sintered samples of pure and 10% CeO 2 added YSZ the grain boundary mobility comes out to be ∼0.032 X 10 -18 to 0.039 X 10 18 m 3 /N/s respectively. Grain mobility does not show any marginal change with increasing ceria content, elicit that the defect concentration is nearly constant in 8YSZ and is insensitive to ceria content. Remarkable increase of grain mobility in the SPS samples is attributed to rapid grain coarsening in the nano-grains limited to shorter sintering times. As expected, grain mobility for longer-times average out the transient phase and lower the net grain mobility such as in CS samples. The enhanced mobility in CeO 2 -YSZ SPS sintered electrolytes must be due to lower cation migration energy (activation energy for oxide ion migration), promoting enhanced ionic conductivity. (author)

  18. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  19. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  20. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  1. Impact of mobility on the performance of relaying in ad hoc networks (Extended version)

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E.

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  2. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    aerial vehicle VANET vehicular ad hoc network VoIP Voice over Internet Protocol VRR Virtual Ring Routing xiii EFFECTS OF DATA REPLICATION ON DATA...ad hoc networks in mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and flying ad hoc net- works (FANETs). Much of the research...metric, such as capacity, congestion , power, or combinations thereof. Caro refers to two different types of ants, FANTs and BANTs which are analogous to

  3. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  4. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  5. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    Science.gov (United States)

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  6. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  7. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  8. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  9. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  10. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  11. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  12. Holographic Renormalization in Dense Medium

    International Nuclear Information System (INIS)

    Park, Chanyong

    2014-01-01

    The holographic renormalization of a charged black brane with or without a dilaton field, whose dual field theory describes a dense medium at finite temperature, is investigated in this paper. In a dense medium, two different thermodynamic descriptions are possible due to an additional conserved charge. These two different thermodynamic ensembles are classified by the asymptotic boundary condition of the bulk gauge field. It is also shown that in the holographic renormalization regularity of all bulk fields can reproduce consistent thermodynamic quantities and that the Bekenstein-Hawking entropy is nothing but the renormalized thermal entropy of the dual field theory. Furthermore, we find that the Reissner-Nordström AdS black brane is dual to a theory with conformal matter as expected, whereas a charged black brane with a nontrivial dilaton profile is mapped to a theory with nonconformal matter although its leading asymptotic geometry still remains as AdS space

  13. Model-based prototyping of an interoperability protocol for mobile ad-hoc networks

    NARCIS (Netherlands)

    Kristensen, L.M.; Westergaard, M.; Norgaard, P.C.; Romijn, J.; Smith, G.; Pol, van de J.

    2005-01-01

    We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for the specification of an interoperability protocol for routing packets between fixed core networks and mobile ad-hoc networks. The

  14. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  15. Context dependent off loading for cloudlet in mobile ad-hoc network

    Science.gov (United States)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  16. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model....... The predictive accuracy of the model is monitored and used to update the model dynamically. The results indicate the framework may be useful for the optimization of dynamic systems of high dimension....

  17. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  18. Impact of mobility on the performance7 of relaying in ad hoc networks – Extended version

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  19. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  20. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  1. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  2. The added value of a gaming context and intelligent adaptation for a mobile application for vocabulary learning

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; Hoogendoorn, P.

    2014-01-01

    Two groups participated in a study on the added value of a gaming context and intelligent adaptation for a mobile learning application. The control group worked at home for a fortnight with the original Mobile English Learning application (MEL-original) developed in a previous project. The

  3. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  4. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-01-01

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense. PMID:26193275

  5. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls.

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-07-16

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user's place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  6. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  7. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    Science.gov (United States)

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  8. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  9. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  10. An Automated Tool for the Creation of Desired Emulated Topologies of a Mobile Ad-Hoc Network

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research effort that the U.S. Army Research Laboratory conducted in FY 2005 in support of the development of advanced technologies for tactical mobile ad hoc networks (MANET...

  11. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Directory of Open Access Journals (Sweden)

    Byoungjip Kim

    2015-07-01

    Full Text Available In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  12. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...

  13. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  14. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  15. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  16. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  17. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  18. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  19. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  20. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  1. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  2. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

    OpenAIRE

    Shahram Behzad; Reza Fotohi; Shahram Jamali

    2013-01-01

    Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destination...

  3. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  4. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  5. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  6. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  7. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  8. Approaches to Addressing Service Selection Ties in Ad Hoc Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ayotuyi Tosin Akinola

    2018-01-01

    Full Text Available The ad hoc mobile cloud (AMC allows mobile devices to connect together through a wireless connection or any other means and send a request for web services from one to another within the mobile cloud. However, one of the major challenges in the AMC is the occurrence of dissatisfaction experienced by the users. This is because there are many services with similar functionalities but varying nonfunctional properties. Moreover, another resultant cause of user dissatisfaction being coupled with runtime redundancy is the attainment of similar quality computations during service selection, often referred to as “service selection ties.” In an attempt to address this challenge, service selection mechanisms for the AMC were developed in this work. This includes the use of selected quality of service properties coupled with user feedback data to determine the most suitable service. These mechanisms were evaluated using the experimental method. The evaluation of the mechanisms mainly focused on the metrics that evaluate the satisfaction of users' interest via the quantitative evaluation. The experiments affirmed that the use of the shortest distance can help to break selection ties between potential servicing nodes. Also, a continuous use of updated and unlimited range of users' assessments enhances an optimal service selection.

  9. Mobile home automation-merging mobile value added services and home automation technologies

    OpenAIRE

    Rosendahl, Andreas; Hampe, Felix J.; Botterweck, Goetz

    2007-01-01

    non-peer-reviewed In this paper we study mobile home automation, a field that emerges from an integration of mobile application platforms and home automation technologies. In a conceptual introduction we first illustrate the need for such applications by introducing a two-dimensional conceptual model of mobility. Subsequently we suggest an architecture and discuss different options of how a user might access a mobile home automation service and the controlled devices. As another contrib...

  10. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  11. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  12. Investing in communities: evaluating the added value of community mobilization on HIV prevention outcomes among FSWs in India.

    Science.gov (United States)

    Kuhlmann, Anne Sebert; Galavotti, Christine; Hastings, Philip; Narayanan, Pradeep; Saggurti, Niranjan

    2014-04-01

    Community mobilization often requires greater time and resource investments than typical interventions, yet few evaluations exist to justify these investments. We evaluated the added benefit of community mobilization on HIV prevention outcomes among female sex workers (FSWs) using a composite measure of volunteer participation in program committees by FSWs. After adjusting for treatment propensity, we used multilevel structural equation modeling (MSEM) to test our program theory. We hypothesized that stronger community mobilization would be associated with increased levels of consistent condom use and with increased levels of perceived fairness, mediated by psychosocial processes. Community mobilization had an indirect effect on consistent condom use mediated through social cohesion and an indirect effect on perceived fairness mediated by collective efficacy. Our results suggest higher levels of community mobilization help improve condom use and reduce perceived discrimination beyond the effects of the core HIV intervention program. We recommend further testing of this model.

  13. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  14. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  15. Two-terminal reliability of a mobile ad hoc network under the asymptotic spatial distribution of the random waypoint model

    International Nuclear Information System (INIS)

    Chen, Binchao; Phillips, Aaron; Matis, Timothy I.

    2012-01-01

    The random waypoint (RWP) mobility model is frequently used in describing the movement pattern of mobile users in a mobile ad hoc network (MANET). As the asymptotic spatial distribution of nodes under a RWP model exhibits central tendency, the two-terminal reliability of the MANET is investigated as a function of the source node location. In particular, analytical expressions for one and two hop connectivities are developed as well as an efficient simulation methodology for two-terminal reliability. A study is then performed to assess the effect of nodal density and network topology on network reliability.

  16. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Mansour Sheikhan

    2012-06-01

    Full Text Available Mobile ad-hoc network (MANET is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and increase the reliability, security and lifetime of network. However, selecting an optimal multipath is an NP-complete problem. In this paper, Hopfield neural network (HNN which its parameters are optimized by particle swarm optimization (PSO algorithm is proposed as multipath routing algorithm. Link expiration time (LET between each two nodes is used as the link reliability estimation metric. This approach can find either node-disjoint or link-disjoint paths in singlephase route discovery. Simulation results confirm that PSO-HNN routing algorithm has better performance as compared to backup path set selection algorithm (BPSA in terms of the path set reliability and number of paths in the set.

  17. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  18. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  19. MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    K.G. Santhiya

    2012-12-01

    Full Text Available MANET (Mobile Ad-hoc Network is an infra structure less wireless ad-hoc network that does not require any basic central control. The topology of the network changes drastically due to very fast mobility of nodes. So an adaptive routing protocol is needed for routing in MANET. AODV (Ad-hoc On-demand Distance Vector routing is the effective and prominent on-demand Ad-hoc routing protocols. During route establishment phase in traditional AODV, only one route reply message will be sent in the reverse path to establish routing path. The high mobility of nodes may affect the reply messages which lead to the retransmission of route request message by the sender which in turn leads to higher communication delay, power consumption and the reduction in the ratio of packets delivered. Sending multiple route reply messages and establishing multiple paths in a single path discovery will reduce the routing overhead involved in maintaining the connection between source and destination nodes. Multipath routing can render high scalability, end-to-end throughput and provide load balancing in MANET. The new proposed novel Multipath QoS aware reliable routing protocol establishes two routes of maximum node disjoint paths and the data transfer is carried out in the two paths simultaneously. To select best paths, the new proposed protocol uses three parameters Link Eminence, MAC overhead and node residual energy. The experimental values prove that the MQARR-AODV protocol achieves high reliability, stability, low latency and outperforms AODV by the less energy consumption, overhead and delay.

  20. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  1. Sensor Sharing in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  2. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  3. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  4. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  5. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  6. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  7. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  8. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  9. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  10. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  11. Ad-Me: A Context-Sensitive Advertising System

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector and in particular the context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the Mobile E-commerce user) system. The Ad-me is a mobile tourist guide that proactively delivers advertisements to users based upon perceived individual user needs together with their location. A Multi-Agent Systems (MAS) design philosophy is adopted. In order to achieve maximum content diffusion a range of presentation...

  12. IrisDenseNet: Robust Iris Segmentation Using Densely Connected Fully Convolutional Networks in the Images by Visible Light and Near-Infrared Light Camera Sensors.

    Science.gov (United States)

    Arsalan, Muhammad; Naqvi, Rizwan Ali; Kim, Dong Seop; Nguyen, Phong Ha; Owais, Muhammad; Park, Kang Ryoung

    2018-05-10

    The recent advancements in computer vision have opened new horizons for deploying biometric recognition algorithms in mobile and handheld devices. Similarly, iris recognition is now much needed in unconstraint scenarios with accuracy. These environments make the acquired iris image exhibit occlusion, low resolution, blur, unusual glint, ghost effect, and off-angles. The prevailing segmentation algorithms cannot cope with these constraints. In addition, owing to the unavailability of near-infrared (NIR) light, iris recognition in visible light environment makes the iris segmentation challenging with the noise of visible light. Deep learning with convolutional neural networks (CNN) has brought a considerable breakthrough in various applications. To address the iris segmentation issues in challenging situations by visible light and near-infrared light camera sensors, this paper proposes a densely connected fully convolutional network (IrisDenseNet), which can determine the true iris boundary even with inferior-quality images by using better information gradient flow between the dense blocks. In the experiments conducted, five datasets of visible light and NIR environments were used. For visible light environment, noisy iris challenge evaluation part-II (NICE-II selected from UBIRIS.v2 database) and mobile iris challenge evaluation (MICHE-I) datasets were used. For NIR environment, the institute of automation, Chinese academy of sciences (CASIA) v4.0 interval, CASIA v4.0 distance, and IIT Delhi v1.0 iris datasets were used. Experimental results showed the optimal segmentation of the proposed IrisDenseNet and its excellent performance over existing algorithms for all five datasets.

  13. IrisDenseNet: Robust Iris Segmentation Using Densely Connected Fully Convolutional Networks in the Images by Visible Light and Near-Infrared Light Camera Sensors

    Directory of Open Access Journals (Sweden)

    Muhammad Arsalan

    2018-05-01

    Full Text Available The recent advancements in computer vision have opened new horizons for deploying biometric recognition algorithms in mobile and handheld devices. Similarly, iris recognition is now much needed in unconstraint scenarios with accuracy. These environments make the acquired iris image exhibit occlusion, low resolution, blur, unusual glint, ghost effect, and off-angles. The prevailing segmentation algorithms cannot cope with these constraints. In addition, owing to the unavailability of near-infrared (NIR light, iris recognition in visible light environment makes the iris segmentation challenging with the noise of visible light. Deep learning with convolutional neural networks (CNN has brought a considerable breakthrough in various applications. To address the iris segmentation issues in challenging situations by visible light and near-infrared light camera sensors, this paper proposes a densely connected fully convolutional network (IrisDenseNet, which can determine the true iris boundary even with inferior-quality images by using better information gradient flow between the dense blocks. In the experiments conducted, five datasets of visible light and NIR environments were used. For visible light environment, noisy iris challenge evaluation part-II (NICE-II selected from UBIRIS.v2 database and mobile iris challenge evaluation (MICHE-I datasets were used. For NIR environment, the institute of automation, Chinese academy of sciences (CASIA v4.0 interval, CASIA v4.0 distance, and IIT Delhi v1.0 iris datasets were used. Experimental results showed the optimal segmentation of the proposed IrisDenseNet and its excellent performance over existing algorithms for all five datasets.

  14. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed

    2016-09-28

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission-critical operations such as disaster relief, law enforcement, and emergency response. Mobile Ad Hoc Networks (MANET) is a natural contender in such contexts. However, classical MANET routing schemes fall short in terms of scalability, bandwidth and latency; all three metrics being quite essential for mission-critical applications. As such, autonomous cooperative routing (ACR) has gained traction as the most viable MANET proposition. Nonetheless, ACR is also associated with a few implementation challenges. If they go unaddressed, will deem ACR practically useless. In this paper, efficient and low-complexity remedies to those issues are presented, analyzed, and validated. The validation is based on field experiments carried out using software-defined radio (SDR) platforms. Compared to classical MANET routing schemes, ACR was shown to offer up to 2X better throughput, more than 4X reduction in end-to-end latency, while observing a given target of transport rate normalized to energy consumption.

  15. Building Evacuation with Mobile Devices

    OpenAIRE

    Merkel, Sabrina

    2014-01-01

    The rapidly growing world population and increasingly dense settlements demand ever-larger and more complex buildings from today's engineers. In comparison to this technological progress, a building's equipment for emergency evacuation has been hardly developed further. This work presents a concept for a building evacuation system based on mobile devices. Furthermore, various algorithms for route planning with mobile devices and for indoor localization of mobile devices are addressed.

  16. Adding navigation, artificial audition and vital sign monitoring capabilities to a telepresence mobile robot for remote home care applications.

    Science.gov (United States)

    Laniel, Sebastien; Letourneau, Dominic; Labbe, Mathieu; Grondin, Francois; Polgar, Janice; Michaud, Francois

    2017-07-01

    A telepresence mobile robot is a remote-controlled, wheeled device with wireless internet connectivity for bidirectional audio, video and data transmission. In health care, a telepresence robot could be used to have a clinician or a caregiver assist seniors in their homes without having to travel to these locations. Many mobile telepresence robotic platforms have recently been introduced on the market, bringing mobility to telecommunication and vital sign monitoring at reasonable costs. What is missing for making them effective remote telepresence systems for home care assistance are capabilities specifically needed to assist the remote operator in controlling the robot and perceiving the environment through the robot's sensors or, in other words, minimizing cognitive load and maximizing situation awareness. This paper describes our approach adding navigation, artificial audition and vital sign monitoring capabilities to a commercially available telepresence mobile robot. This requires the use of a robot control architecture to integrate the autonomous and teleoperation capabilities of the platform.

  17. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  18. An Opportunistic Routing for Data Forwarding Based on Vehicle Mobility Association in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Leilei Wang

    2017-11-01

    Full Text Available Vehicular ad hoc networks (VANETs have emerged as a new powerful technology for data transmission between vehicles. Efficient data transmission accompanied with low data delay plays an important role in selecting the ideal data forwarding path in VANETs. This paper proposes a new opportunity routing protocol for data forwarding based on vehicle mobility association (OVMA. With assistance from the vehicle mobility association, data can be forwarded without passing through many extra intermediate nodes. Besides, each vehicle carries the only replica information to record its associated vehicle information, so the routing decision can adapt to the vehicle densities. Simulation results show that the OVMA protocol can extend the network lifetime, improve the performance of data delivery ratio, and reduce the data delay and routing overhead when compared to the other well-known routing protocols.

  19. Quality-of-Service Routing Using Path and Power Aware Techniques in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. Asokan

    2008-01-01

    Full Text Available Mobile ad hoc network (MANET is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. Quality of service (QoS is a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. QoS support MANETs is a challenging task due to the dynamic topology and limited resources. The main objective of this paper is to enhance the QoS routing for MANET using temporally ordered routing algorithm (TORA with self-healing and optimized routing techniques (SHORT. SHORT improves routing optimality by monitoring routing paths continuously and redirecting the path whenever a shortcut path is available. In this paper, the performance comparison of TORA and TORA with SHORT has been analyzed using network simulator for various parameters. TORA with SHORT enhances performance of TORA in terms of throughput, packet loss, end-to-end delay, and energy.

  20. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  1. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  2. Energy Assessment of Automated Mobility Districts

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Yuche [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-08-03

    Automated vehicles (AVs) are increasingly being discussed as the basis for on-demand mobility services, introducing a new paradigm in which a fleet of AVs displace private automobiles for day-to-day travel in dense activity districts. This project examines such a concept to displace privately owned automobiles within a region containing dense activity generators (jobs, retail, entertainment, etc.), referred to as an automated mobility district (AMDs). The project reviews several such districts including airport, college campuses, business parks, downtown urban cores, and military bases, with examples of previous attempts to meet the mobility needs apart from private automobiles, some with automated technology and others with more traditional transit based solutions. The issues and benefits of AMDs are framed within the perspective of intra-district, inter-district, and border issues, and the requirements for a modeling framework are identified to adequately reflect the breadth of mobility, energy, and emissions impact anticipated with AMDs.

  3. Mechanism design for mobile geo-location advertising

    OpenAIRE

    Gatti, Nicola; Rocco, Marco; Ceppi, Sofia; Gerding, Enrico H.

    2014-01-01

    Mobile geo–location advertising, where mobile ads are targeted based on a user’s location, has been identified as a key growth factor for the mobile market. As with online advertising, a crucial ingredient for their success is the development of effective economic mechanisms. An important difference is that mobile ads are shown sequentially over time and information about the user can be learned based on their movements. Furthermore, ads need to be shown selectively to prevent ad fatigue. To ...

  4. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  5. A Simulation Study: The Impact of Random and Realistic Mobility Models on the Performance of Bypass-AODV in Ad Hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    Baroudi Uthman

    2010-01-01

    Full Text Available To bring VANET into reality, it is crucial to devise routing protocols that can exploit the inherited characteristics of VANET environment to enhance the performance of the running applications. Previous studies have shown that a certain routing protocol behaves differently under different presumed mobility patterns. Bypass-AODV is a new optimization of the AODV routing protocol for mobile ad-hoc networks. It is proposed as a local recovery mechanism to enhance the performance of the AODV routing protocol. It shows outstanding performance under the Random Waypoint mobility model compared with AODV. However, Random Waypoint is a simple model that may be applicable to some scenarios but it is not sufficient to capture some important mobility characteristics of scenarios where VANETs are deployed. In this paper, we will investigate the performance of Bypass-AODV under a wide range of mobility models including other random mobility models, group mobility models, and vehicular mobility models. Simulation results show an interesting feature that is the insensitivity of Bypass-AODV to the selected random mobility model, and it has a clear performance improvement compared to AODV. For group mobility model, both protocols show a comparable performance, but for vehicular mobility models, Bypass-AODV suffers from performance degradation in high-speed conditions.

  6. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  7. A Performance Evaluation Model for Mobile Ad Hoc Networks and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-03-01

    Full Text Available Potential applications in areas such as military sites and disaster relief fields that are characterized by absence of prefixed infrastructure justify the development of mobile ad hoc networks (MANETs and wireless sensor networks (WSNs. However, unfavorable wireless links and dynamic topology are still challenging, leading to the proposal of a collection of routing protocols for MANETs and WSNs. Nevertheless the performance of algorithms may vary with deployment scenario due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and WSNs is investigated and a novel performance ranking model, termed AHP-SAW, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies based on which ranking results are provided. Extensive simulations show that an overall 37.2 %, at most, gain may be achieved based on the AHP-SAW model.

  8. Modeling Consumer Adoption and Usage of Value-Added Mobile Services

    NARCIS (Netherlands)

    R. Prins (Remco)

    2008-01-01

    textabstractIn recent years, the mobile telecommunications market has been very dynamic in terms of innovations. Mobile service providers continuously invest in new technologies and introduce many new mobile services for consumers, such as MMS and web services. However, adoption rates are often not

  9. Dense power-law networks and simplicial complexes

    Science.gov (United States)

    Courtney, Owen T.; Bianconi, Ginestra

    2018-05-01

    There is increasing evidence that dense networks occur in on-line social networks, recommendation networks and in the brain. In addition to being dense, these networks are often also scale-free, i.e., their degree distributions follow P (k ) ∝k-γ with γ ∈(1 ,2 ] . Models of growing networks have been successfully employed to produce scale-free networks using preferential attachment, however these models can only produce sparse networks as the numbers of links and nodes being added at each time step is constant. Here we present a modeling framework which produces networks that are both dense and scale-free. The mechanism by which the networks grow in this model is based on the Pitman-Yor process. Variations on the model are able to produce undirected scale-free networks with exponent γ =2 or directed networks with power-law out-degree distribution with tunable exponent γ ∈(1 ,2 ) . We also extend the model to that of directed two-dimensional simplicial complexes. Simplicial complexes are generalization of networks that can encode the many body interactions between the parts of a complex system and as such are becoming increasingly popular to characterize different data sets ranging from social interacting systems to the brain. Our model produces dense directed simplicial complexes with power-law distribution of the generalized out-degrees of the nodes.

  10. Mobility2.0: co-operative ITS systems for enhanced electric vehicle mobility

    NARCIS (Netherlands)

    Unknown, [Unknown; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Mobility2.0 will develop and test an in-vehicle commuting assistant for FEV mobility, resulting in more reliable and energy-efficient electro-mobility. In order to achieve a maximum impact, Mobility2.0 takes an integrated approach of ad- dressing the main bottlenecks of urban FEV mobility: range

  11. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  12. Developing Cost-Effective Dense Continuous SDC Barrier Layers for SOFCs

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen, Hoang Viet P.; Hardy, John S.; Coyle, Christopher A.; LU, Zigui; Stevenson, Jeffry W.

    2017-12-04

    Significantly improved performance during electrochemical testing of a cell with a dense continuous pulsed laser deposited (PLD) samarium doped ceria (SDC) layer spurred investigations into the fabrication of dense continuous SDC barrier layers by means of cost-effective deposition using screen printing which is amenable to industrial production of SOFCs. Many approaches to improve the SDC density have been explored including the use of powder with reduced particle sizes, inks with increased solids loading, and doping with sintering aids (1). In terms of sintering aids, dopants like Mo or binary systems of Mo+Cu or Fe+Co greatly enhance SDC sinterability. In fact, adding dopants to a screen printed, prefired, porous SDC layer made it possible to achieve a dense continuous barrier layer atop the YSZ electrolyte without sintering above 1200°C. Although the objective of fabricating a dense continuous layer was achieved, additional studies have been initiated to improve the cell performance. Underlying issues with constrained sintering and dopant-enhanced ceria-zirconia solid solubility are also addressed in this paper.

  13. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  14. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  15. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  16. Dense ceramic membranes for methane conversion

    Energy Technology Data Exchange (ETDEWEB)

    Bouwmeester, Henny J.M. [Laboratory for Inorganic Materials Science, Department of Science and Technology and MESA Research Institute, University of Twente, 7500 AE Enschede (Netherlands)

    2003-07-30

    Dense ceramic membranes made from mixed oxygen-ionic and electronic conducting perovskite-related oxides allow separation of oxygen from an air supply at elevated temperatures (>700C). By combining air separation and catalytic partial oxidation of methane to syngas into a ceramic membrane reactor, this technology is expected to significantly reduce the capital costs of conversion of natural gas to liquid added-value products. The present survey is mainly concerned with the material properties that govern the performance of the mixed-conducting membranes in real operating conditions and highlights significant developments in the field.

  17. A Bioinspired Adaptive Congestion-Avoidance Routing for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Qiong

    2014-01-01

    Full Text Available Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.

  18. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  19. Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times

    Directory of Open Access Journals (Sweden)

    Preiss Bruno

    2011-01-01

    Full Text Available With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode system architecture that employs the delay-tolerant network (DTN concept to provide seamless communications for roaming users over interconnected heterogeneous wireless networks. Mobile ad hoc networks (MANETs are considered a key component of the supernode system for services over an area not covered by other wireless networks. Within the super node system, a dominating-set routing technique is proposed to improve message delivery over MANETs and to achieve better resource utilization. The performance of the dominating-set routing technique depends on estimation accuracy of the probability of a future contact between nodes. This paper studies how node mobility can be modeled and used to better estimate the probability of a contact. We derive a distribution for the node-to-node intermeeting time and present numerical results to demonstrate that the distribution can be used to improve the dominating-set routing technique performance. Moreover, we investigate how the distribution can be employed to relax the constraints of selecting the dominating-set members in order to improve the system resource utilization.

  20. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  1. Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm

    Directory of Open Access Journals (Sweden)

    Ahmad Maleki

    2014-09-01

    Full Text Available An important issue in ad-hoc on-demand distance vector (AODV routing protocols is route failure caused by node mobility in the MANETs. The AODV requires a new route discovery procedure whenever a route breaks and these frequent route discoveries increase transmission delays and routing overhead. The present study proposes a new method for AODVs using a genetic algorithm to improve the route recovery mechanism. When failure occurs in a route, the proposed method (GAAODV makes decisions regarding the QOS parameter to select source or local repair. The task of the genetic algorithm is to find an appropriate combination of weights to optimize end-to-end delay. This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. Comparison of the new algorithm and AODV (RFC 3561 using a NS-2 simulator shows that GAAODV obtains better results for the QOS parameters.

  2. Disentangling location based mobile advertising: the effects of location congruence and type of the medium on consumers' ad-recall and buying behaviour

    NARCIS (Netherlands)

    Bernritter, S.; Ketelaar, P.; van Woudenberg, T.J.; Vantriet, J.; Huhn, A.; Janssen, L.

    2015-01-01

    An emerging body of research focuses on location-based advertising (LBA). This literature suggests that the merits of LBA rely on the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, it has not yet been taken into account that LBA consists of

  3. Pathloss Modelling of less dense urban area in Lagos State using Lee Model

    OpenAIRE

    O. Shoewu

    2017-01-01

    In this study we aim to adopt a propagation model for a less dense urban area in Lagos state by examining one of the popular empirical path loss models for mobile communication. Lee’s model was compared with measured path loss obtain from the field measurement at GSM frequency of 900 MHz . TEMS Investigation tool was used for the drive test. The measurements of the received signal strength were collected through drive test with the aid of an Ericson test mobile system (TEMS). This was conduct...

  4. Toward Superior Capacitive Energy Storage: Recent Advances in Pore Engineering for Dense Electrodes.

    Science.gov (United States)

    Liu, Congcong; Yan, Xiaojun; Hu, Fei; Gao, Guohua; Wu, Guangming; Yang, Xiaowei

    2018-04-01

    With the rapid development of mobile electronics and electric vehicles, future electrochemical capacitors (ECs) need to store as much energy as possible in a rather limited space. As the core component of ECs, dense electrodes that have a high volumetric energy density and superior rate capability are the key to achieving improved energy storage. Here, the significance of and recent progress in the high volumetric performance of dense electrodes are presented. Furthermore, dense yet porous electrodes, as the critical precondition for realizing superior electrochemical capacitive energy, have become a scientific challenge and an attractive research focus. From a pore-engineering perspective, insight into the guidelines of engineering the pore size, connectivity, and wettability is provided to design dense electrodes with different porous architectures toward high-performance capacitive energy storage. The current challenges and future opportunities toward dense electrodes are discussed and include the construction of an orderly porous structure with an appropriate gradient, the coupling of pore sizes with the solvated cations and anions, and the design of coupled pores with diverse electrolyte ions. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Geometrical optics of dense aerosols: forming dense plasma slabs.

    Science.gov (United States)

    Hay, Michael J; Valeo, Ernest J; Fisch, Nathaniel J

    2013-11-01

    Assembling a freestanding, sharp-edged slab of homogeneous material that is much denser than gas, but much more rarefied than a solid, is an outstanding technological challenge. The solution may lie in focusing a dense aerosol to assume this geometry. However, whereas the geometrical optics of dilute aerosols is a well-developed field, the dense aerosol limit is mostly unexplored. Yet controlling the geometrical optics of dense aerosols is necessary in preparing such a material slab. Focusing dense aerosols is shown here to be possible, but the finite particle density reduces the effective Stokes number of the flow, a critical result for controlled focusing.

  6. ADDED VALUE-BASED APROACH TO ANALYZE ELECTRONIC COMMERCE AND MOBILE COMMERCE BUSINESS MODELS

    Directory of Open Access Journals (Sweden)

    Moritz Weizmann

    2004-03-01

    Full Text Available

    Se propone aplicar la teoría del valor informacional agregado (Theory of Informational Added Values, IAV al Electronic Commerce (EC y al Mobile Commerce (MC. El trabajo presentado es una propuesta para acercarse a modelos de negocio, con el foco de criterios típicos de evaluación para modelos de negocio de Internet y del MC. Es también conveniente para comparar modelos de negocio distintos y para poner el valor añadido para los participantes en un contexto. De esta manera, se establecen criterios objetivos que reducen la subjetividad y permiten hacer ciertas predicciones. El artículo termina con un análisis crítico del estado del arte y un comentario sobre las perspectivas futuras.

  7. FHWA White Paper on Mobile Ad Hoc Networks

    Science.gov (United States)

    2018-01-01

    Advanced next generation communications technologies offer the potential to greatly improve safety, system efficiency, and mobility across our Nations roadways. These new technologies and processes can address both traditionally difficult as well ...

  8. Simplified Multicast Forwarding in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Macker, Joseph P; Dean, Justin; Chao, William

    2004-01-01

    ...) based upon flooding mechanisms. We present the design of a working experimental prototype and some initial performance results using the NRL mobile network emulation system and various optional flooding approaches within the design framework...

  9. How Ad-talk and Word-of-Mouth Influence Consumers’ Responses

    DEFF Research Database (Denmark)

    Martensen, Anne; Mouritsen, Jan

    2014-01-01

    This study investigates: (a) if consumers talk about advertizing messages – ad-talk – is a new, distinct concept that differs from word-of-mouth (WOM) communication in definition and impact; (b) how ad-talk mobilizes WOM; (c) how WOM mediates the relationship between ad-talk and consumer responses....... A new model is developed that adapts the classic Theory of Reasoned Action (TRA) framework by replacing the social norm with consumers’ ad-talk and WOM. Two large scale internet surveys are conducted to test and validate the model. Findings show that ad-talk and WOM are two different social processes....... Ad-talk only mobilizes PWOM. PWOM mediates and leverages ad-talk’s influence on consumer responses, because PWOM adds personal experiences, preferences and social acceptance to the brand promise seen in the firm’s advertizing. This changes the value of the brand and makes the firm’s offer better than...

  10. Processing and characterization of 3D dense chitosan pieces, for orthopedic applications, by adding plasticizers

    OpenAIRE

    Figueiredo, Lígia; Moura, Carla; Pinto, Luís F. V.; Ferreira, Frederico Castelo; Rodrigues, Alexandra

    2015-01-01

    In this work, plasticizer agents were incorporated in a chitosan based formulation, as a strategy to improve the fragile structure of chitosan based-materials. Three different plasticizers: ethylene glycol, glycerol and sorbitol, were blended with chitosan to prepare 3D dense chitosan specimens. The properties of the obtained structures were assessed for mechanical, microstructural, physical and biocompatibility behavior. The results obtained revealed that from the different specimens prepare...

  11. Low-cost mobile phone microscopy with a reversed mobile phone camera lens.

    Directory of Open Access Journals (Sweden)

    Neil A Switz

    Full Text Available The increasing capabilities and ubiquity of mobile phones and their associated digital cameras offer the possibility of extending low-cost, portable diagnostic microscopy to underserved and low-resource areas. However, mobile phone microscopes created by adding magnifying optics to the phone's camera module have been unable to make use of the full image sensor due to the specialized design of the embedded camera lens, exacerbating the tradeoff between resolution and field of view inherent to optical systems. This tradeoff is acutely felt for diagnostic applications, where the speed and cost of image-based diagnosis is related to the area of the sample that can be viewed at sufficient resolution. Here we present a simple and low-cost approach to mobile phone microscopy that uses a reversed mobile phone camera lens added to an intact mobile phone to enable high quality imaging over a significantly larger field of view than standard microscopy. We demonstrate use of the reversed lens mobile phone microscope to identify red and white blood cells in blood smears and soil-transmitted helminth eggs in stool samples.

  12. Low-cost mobile phone microscopy with a reversed mobile phone camera lens.

    Science.gov (United States)

    Switz, Neil A; D'Ambrosio, Michael V; Fletcher, Daniel A

    2014-01-01

    The increasing capabilities and ubiquity of mobile phones and their associated digital cameras offer the possibility of extending low-cost, portable diagnostic microscopy to underserved and low-resource areas. However, mobile phone microscopes created by adding magnifying optics to the phone's camera module have been unable to make use of the full image sensor due to the specialized design of the embedded camera lens, exacerbating the tradeoff between resolution and field of view inherent to optical systems. This tradeoff is acutely felt for diagnostic applications, where the speed and cost of image-based diagnosis is related to the area of the sample that can be viewed at sufficient resolution. Here we present a simple and low-cost approach to mobile phone microscopy that uses a reversed mobile phone camera lens added to an intact mobile phone to enable high quality imaging over a significantly larger field of view than standard microscopy. We demonstrate use of the reversed lens mobile phone microscope to identify red and white blood cells in blood smears and soil-transmitted helminth eggs in stool samples.

  13. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  14. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    The constant mobility of people, the growing need to be always connected, the large number of vehicles that nowadays can be found in the roads and the advances in technology make Vehicular Ad hoc Networks (VANETs) be a major area of research. Vehicular Ad hoc Networks are a special type of wireless Mobile Ad hoc Networks (MANETs), which allow a group of mobile nodes configure a temporary network and maintain it without the need of a fixed infrastructure. A vehicular network presents some spec...

  15. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from

  16. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  17. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  18. Displays enabling mobile multimedia

    Science.gov (United States)

    Kimmel, Jyrki

    2007-02-01

    With the rapid advances in telecommunications networks, mobile multimedia delivery to handsets is now a reality. While a truly immersive multimedia experience is still far ahead in the mobile world, significant advances have been made in the constituent audio-visual technologies to make this become possible. One of the critical components in multimedia delivery is the mobile handset display. While such alternatives as headset-style near-to-eye displays, autostereoscopic displays, mini-projectors, and roll-out flexible displays can deliver either a larger virtual screen size than the pocketable dimensions of the mobile device can offer, or an added degree of immersion by adding the illusion of the third dimension in the viewing experience, there are still challenges in the full deployment of such displays in real-life mobile communication terminals. Meanwhile, direct-view display technologies have developed steadily, and can provide a development platform for an even better viewing experience for multimedia in the near future. The paper presents an overview of the mobile display technology space with an emphasis on the advances and potential in developing direct-view displays further to meet the goal of enabling multimedia in the mobile domain.

  19. Initial Assessment and Modeling Framework Development for Automated Mobility Districts: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Hou, Yi [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Young, Stanley E [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Garikapati, Venu [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Chen, Yuche [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Zhu, Lei [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2018-02-07

    Automated vehicles (AVs) are increasingly being discussed as the basis for on-demand mobility services, introducing a new paradigm in which a fleet of AVs displaces private automobiles for day-to-day travel in dense activity districts. This paper examines a concept to displace privately owned automobiles within a region containing dense activity generators (jobs, retail, entertainment, etc.), referred to as an automated mobility district (AMD). This paper reviews several such districts, including airports, college campuses, business parks, downtown urban cores, and military bases, with examples of previous attempts to meet the mobility needs apart from private automobiles, some with automated technology and others with more traditional transit-based solutions. The issues and benefits of AMDs are framed within the perspective of intra-district, inter-district, and border issues, and the requirements for a modeling framework are identified to adequately reflect the breadth of mobility, energy, and emissions impact anticipated with AMDs

  20. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  1. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  2. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  3. Impact of typical rather than nutrient-dense food choices in the US Department of Agriculture Food Patterns.

    Science.gov (United States)

    Britten, Patricia; Cleveland, Linda E; Koegel, Kristin L; Kuczynski, Kevin J; Nickols-Richardson, Sharon M

    2012-10-01

    The US Department of Agriculture (USDA) Food Patterns, released as part of the 2010 Dietary Guidelines for Americans, are designed to meet nutrient needs without exceeding energy requirements. They identify amounts to consume from each food group and recommend that nutrient-dense forms-lean or low-fat, without added sugars or salt-be consumed. Americans fall short of most food group intake targets and do not consume foods in nutrient-dense forms. Intake of calories from solid fats and added sugars exceed maximum limits by large margins. Our aim was to determine the potential effect on meeting USDA Food Pattern nutrient adequacy and moderation goals if Americans consumed the recommended quantities from each food group, but did not implement the advice to select nutrient-dense forms of food and instead made more typical food choices. Food-pattern modeling analysis using the USDA Food Patterns, which are structured to allow modifications in one or more aspects of the patterns, was used. Nutrient profiles for each food group were modified by replacing each nutrient-dense representative food with a similar but typical choice. Typical nutrient profiles were used to determine the energy and nutrient content of the food patterns. Moderation goals are not met when amounts of food in the USDA Food Patterns are followed and typical rather than nutrient-dense food choices are made. Energy, total fat, saturated fat, and sodium exceed limits in all patterns, often by substantial margins. With typical choices, calories were 15% to 30% (ie, 350 to 450 kcal) above the target calorie level for each pattern. Adequacy goals were not substantially affected by the use of typical food choices. If consumers consume the recommended quantities from each food group and subgroup, but fail to choose foods in low-fat, no-added-sugars, and low-sodium forms, they will not meet the USDA Food Patterns moderation goals or the 2010 Dietary Guidelines for Americans. Copyright © 2012 Academy of

  4. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    International Nuclear Information System (INIS)

    Yang Juan; Yang Dan; Zhang Xiao-Hong; Huang Bin; Luo Jian-Lu

    2014-01-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm. (general)

  5. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  6. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  7. Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Shigeru Kashihara

    2014-01-01

    Full Text Available This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET. In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE, Chachulski et al. (2007, improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  8. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  9. Zero added oxygen for high quality sputtered ITO: A data science investigation of reduced Sn-content and added Zr

    International Nuclear Information System (INIS)

    Peshek, Timothy J.; Burst, James M.; Coutts, Timothy J.; Gessert, Timothy A.

    2016-01-01

    The authors demonstrate mobilities of >45 cm 2 /V s for sputtered tin-doped indium oxide (ITO) films at zero added oxygen. All films were deposited with 5 wt. % SnO 2 , instead of the more conventional 8–10 wt. %, and had varying ZrO 2 content from 0 to 3 wt. %, with a subsequent reduction in In 2 O 3 content. These films were deposited by radio-frequency magnetron sputtering from nominally stoichiometric targets with varying oxygen partial pressure in the sputter ambient. Anomalous behavior was discovered for films with no Zr-added, where a bimodality of high and low mobilities was discovered for nominally similar growth conditions. However, all films showed the lowest resistivity and highest mobilities when the oxygen partial pressure in the sputter ambient was zero. This result is contrasted with several other reports of ITO transport performance having a maximum for small but nonzero oxygen partial pressure. This result is attributed to the reduced concentration of SnO 2 . The addition of ZrO 2 yielded the highest mobilities at >55 cm 2 /V s and the films showed a modest increase in optical transmission with increasing Zr-content

  10. WARM EXTENDED DENSE GAS AT THE HEART OF A COLD COLLAPSING DENSE CORE

    International Nuclear Information System (INIS)

    Shinnaga, Hiroko; Phillips, Thomas G.; Furuya, Ray S.; Kitamura, Yoshimi

    2009-01-01

    In order to investigate when and how the birth of a protostellar core occurs, we made survey observations of four well-studied dense cores in the Taurus molecular cloud using CO transitions in submillimeter bands. We report here the detection of unexpectedly warm (∼30-70 K), extended (radius of ∼2400 AU), dense (a few times 10 5 cm -3 ) gas at the heart of one of the dense cores, L1521F (MC27), within the cold dynamically collapsing components. We argue that the detected warm, extended, dense gas may originate from shock regions caused by collisions between the dynamically collapsing components and outflowing/rotating components within the dense core. We propose a new stage of star formation, 'warm-in-cold core stage (WICCS)', i.e., the cold collapsing envelope encases the warm extended dense gas at the center due to the formation of a protostellar core. WICCS would constitute a missing link in evolution between a cold quiescent starless core and a young protostar in class 0 stage that has a large-scale bipolar outflow.

  11. Analysis of foliage effects on mobile propagation in dense urban environments

    Science.gov (United States)

    Bronshtein, Alexander; Mazar, Reuven; Lu, I.-Tai

    2000-07-01

    Attempts to reduce the interference level and to increase the spectral efficiency of cellular radio communication systems operating in dense urban and suburban areas lead to the microcellular approach with a consequent requirement to lower antenna heights. In large metropolitan areas having high buildings this requirement causes a situation where the transmitting and receiving antennas are both located below the rooftops, and the city street acts as a type of a waveguiding channel for the propagating signal. In this work, the city street is modeled as a random multislit waveguide with randomly distributed regions of foliage parallel to the building boundaries. The statistical propagation characteristics are expressed in terms of multiple ray-fields approaching the observer. Algorithms for predicting the path-loss along the waveguide and for computing the transverse field structure are presented.

  12. Diabetes and Orientation and Mobility Training: An Added Challenge.

    Science.gov (United States)

    Kozel, B.

    1995-01-01

    Issues related to promoting orientation and mobility training for individuals with visual impairments and diabetes are discussed, including effects of insulin, hypoglycemia and hyperglycemia, the timing of training, complications to the feet, and fluctuations in vision. Major lifestyle changes required by diabetes are stressed. (Author/SW)

  13. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  14. Connecting Mobile Game Advertising with Local Stores

    OpenAIRE

    Wen, Yanzhao

    2016-01-01

    With the growth of mobile market, mobile advertising and mobile game advertising are becoming more and more important. On one hand, mobile advertising is able to deliver relevant ads to targeted users based on their locations and behaviors. On the other hand, as the number of mobile game players and free-to-play mobile games are increasing, mobile game advertising forms one important way of monetization. It is important to increase the advertising effectiveness while producing friendly user e...

  15. Mobile Context Toolbox

    DEFF Research Database (Denmark)

    Stopczynski, Arkadiusz; Larsen, Jakob Eg; Skomail, Lukasz

    2010-01-01

    In this paper we describe an open framework utilizing sensors and application data on the Maemo mobile platform enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new hardware and software sensors and features to be added...... to the context framework. We present initial results from in-the-wild experiments where contextual data was acquired using the tool. In the experiments 6 participants were using a Nokia N900 mobile phone continuously with a logger application for an average of 33 days. The study has provided valuable insights...

  16. AdDroid: Privilege Separation for Applications and Advertisers in Android

    Science.gov (United States)

    2013-05-14

    consumers . Mobile advertising services such as AdMob [1] and Millennial Media [22] play a key role in this ecosystem by allowing developers to generate...privacy-sensitive permissions just to display advertisements . 1Applications need phone state to obtain the phone’s In- ternational Mobile Equipment Identity...the Android permis- sion system and explain how mobile advertising currently works. We then explain how the current system leads to privacy and

  17. Added Sugars and Cardiovascular Disease Risk in Children

    Science.gov (United States)

    Vos, Miriam B.; Kaar, Jill L.; Welsh, Jean A.; Van Horn, Linda V.; Feig, Daniel I.; Anderson, Cheryl A.M.; Patel, Mahesh J.; Munos, Jessica Cruz; Krebs, Nancy F.; Xanthakos, Stavra A.; Johnson, Rachel K.

    2017-01-01

    BACKGROUND Poor lifestyle behaviors are leading causes of preventable diseases globally. Added sugars contribute to a diet that is energy dense but nutrient poor and increase risk of developing obesity, cardiovascular disease, hypertension, obesity-related cancers, and dental caries. METHODS AND RESULTS For this American Heart Association scientific statement, the writing group reviewed and graded the current scientific evidence for studies examining the cardiovascular health effects of added sugars on children. The available literature was subdivided into 5 broad subareas: effects on blood pressure, lipids, insulin resistance and diabetes mellitus, nonalcoholic fatty liver disease, and obesity. CONCLUSIONS Associations between added sugars and increased cardiovascular disease risk factors among US children are present at levels far below current consumption levels. Strong evidence supports the association of added sugars with increased cardiovascular disease risk in children through increased energy intake, increased adiposity, and dyslipidemia. The committee found that it is reasonable to recommend that children consume ≤25 g (100 cal or ≈6 teaspoons) of added sugars per day and to avoid added sugars for children added sugars most likely can be safely consumed in low amounts as part of a healthy diet, few children achieve such levels, making this an important public health target. PMID:27550974

  18. Mobility Model for Self-Organizing and Cooperative MSN and MANET Systems

    Directory of Open Access Journals (Sweden)

    Andrzej Sikora

    2012-03-01

    Full Text Available Self-organization mechanisms are used for building scalable systems consisting of a huge number of subsystems. In computer networks, self-organizing is especially important in ad hoc networking. A self-organizing ad hoc network is a collection of wireless devices that collaborate with each other to form a network system that adapts to achieve a goal or goals. Such network is often built from mobile devices that may spontaneously create a network and dynamically adapted to changes in an unknown environment. Mobility pattern is a critical element that influences the performance characteristics of mobile sensor networks (MSN and mobile ad hoc networks (MANET. In this paper, we survey main directions to mobility modeling. We describe a novel algorithm for calculating mobility patterns for mobile devices that is based on a cluster formation and an artificial potential function. Finally, we present the simulation results of its application to a rescue mission planning.

  19. Information Literacy on the Go! Adding Mobile to an Age Old Challenge

    Science.gov (United States)

    Schmidt Hanbidge, Alice; Sanderson, Nicole; Tin, Tony

    2016-01-01

    Integrating information literacy skills is fundamental to learning in all contexts. The nexus of mobile devices and information literacy lessons to learn these skills is an innovative pedagogy in higher education explored in this Mobile Information Literacy Tool (MIL) project. Currently, the project's second stage of data collection and analysis…

  20. Fluorescence and absorption spectroscopy for warm dense matter studies and ICF plasma diagnostics

    Science.gov (United States)

    Hansen, S. B.; Harding, E. C.; Knapp, P. F.; Gomez, M. R.; Nagayama, T.; Bailey, J. E.

    2018-05-01

    The burning core of an inertial confinement fusion (ICF) plasma produces bright x-rays at stagnation that can directly diagnose core conditions essential for comparison to simulations and understanding fusion yields. These x-rays also backlight the surrounding shell of warm, dense matter, whose properties are critical to understanding the efficacy of the inertial confinement and global morphology. We show that the absorption and fluorescence spectra of mid-Z impurities or dopants in the warm dense shell can reveal the optical depth, temperature, and density of the shell and help constrain models of warm, dense matter. This is illustrated by the example of a high-resolution spectrum collected from an ICF plasma with a beryllium shell containing native iron impurities. Analysis of the iron K-edge provides model-independent diagnostics of the shell density (2.3 × 1024 e/cm3) and temperature (10 eV), while a 12-eV red shift in Kβ and 5-eV blue shift in the K-edge discriminate among models of warm dense matter: Both shifts are well described by a self-consistent field model based on density functional theory but are not fully consistent with isolated-atom models using ad-hoc density effects.

  1. A mobile sensing system for structural health monitoring: design and validation

    International Nuclear Information System (INIS)

    Zhu, Dapeng; Yi, Xiaohua; Wang, Yang; Lee, Kok-Meng; Guo, Jiajie

    2010-01-01

    This paper describes a new approach using mobile sensor networks for structural health monitoring. Compared with static sensors, mobile sensor networks offer flexible system architectures with adaptive spatial resolutions. The paper first describes the design of a mobile sensing node that is capable of maneuvering on structures built with ferromagnetic materials. The mobile sensing node can also attach/detach an accelerometer onto/from the structural surface. The performance of the prototype mobile sensor network has been validated through laboratory experiments. Two mobile sensing nodes are adopted for navigating on a steel portal frame and providing dense acceleration measurements. Transmissibility function analysis is conducted to identify structural damage using data collected by the mobile sensing nodes. This preliminary work is expected to spawn transformative changes in the use of mobile sensors for future structural health monitoring

  2. A mobile sensing system for structural health monitoring: design and validation

    Science.gov (United States)

    Zhu, Dapeng; Yi, Xiaohua; Wang, Yang; Lee, Kok-Meng; Guo, Jiajie

    2010-05-01

    This paper describes a new approach using mobile sensor networks for structural health monitoring. Compared with static sensors, mobile sensor networks offer flexible system architectures with adaptive spatial resolutions. The paper first describes the design of a mobile sensing node that is capable of maneuvering on structures built with ferromagnetic materials. The mobile sensing node can also attach/detach an accelerometer onto/from the structural surface. The performance of the prototype mobile sensor network has been validated through laboratory experiments. Two mobile sensing nodes are adopted for navigating on a steel portal frame and providing dense acceleration measurements. Transmissibility function analysis is conducted to identify structural damage using data collected by the mobile sensing nodes. This preliminary work is expected to spawn transformative changes in the use of mobile sensors for future structural health monitoring.

  3. Maturation State and Matrix Microstructure Regulate Interstitial Cell Migration in Dense Connective Tissues.

    Science.gov (United States)

    Qu, Feini; Li, Qing; Wang, Xiao; Cao, Xuan; Zgonis, Miltiadis H; Esterhai, John L; Shenoy, Vivek B; Han, Lin; Mauck, Robert L

    2018-02-19

    Few regenerative approaches exist for the treatment of injuries to adult dense connective tissues. Compared to fetal tissues, adult connective tissues are hypocellular and show limited healing after injury. We hypothesized that robust repair can occur in fetal tissues with an immature extracellular matrix (ECM) that is conducive to cell migration, and that this process fails in adults due to the biophysical barriers imposed by the mature ECM. Using the knee meniscus as a platform, we evaluated the evolving micromechanics and microstructure of fetal and adult tissues, and interrogated the interstitial migratory capacity of adult meniscal cells through fetal and adult tissue microenvironments with or without partial enzymatic digestion. To integrate our findings, a computational model was implemented to determine how changing biophysical parameters impact cell migration through these dense networks. Our results show that the micromechanics and microstructure of the adult meniscus ECM sterically hinder cell mobility, and that modulation of these ECM attributes via an exogenous matrix-degrading enzyme permits migration through this otherwise impenetrable network. By addressing the inherent limitations to repair imposed by the mature ECM, these studies may define new clinical strategies to promote repair of damaged dense connective tissues in adults.

  4. A FSA Model for Performance Evaluation over Mobile Ad Hoc Networks with Low Traffic Volume

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-07-01

    Full Text Available A Mobile Ad hoc network (MANET, which is composed of nodes that are able to move arbitrarily, differs from a direct connection network in the way that it is multi-hopping and self- organizing and thus able to operate without the help of prefixed infrastructures. However, problems such as unfavorable wireless links and dynamic topology are challenging, resulting in the proposal of a collection of routing protocols for MANETs. Nevertheless the performance of protocols may deteriorate dramatically as deployment scenario changes due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and is explored and a novel performance ranking model, termed FSA, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies. The FSA is able to rank the performance of DSDV and DSR depending on the average value and standard deviation results. Extensive simulations show that an overall 20.74 %, at most, gain may be achieved based on the FSA model.

  5. A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR PROTOCOL IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Alaa Azmi Allahham

    2017-02-01

    Full Text Available Mobile Ad-hoc networks (MANETs involved in many applications, whether commercial or military because of their characteristics that do not depend on the infrastructure as well as the freedom movement of their elements, but in return has caused this random mobility of the nodes many of the challenges, where the routing is considered one of these challenges. There are many types of routing protocols that operate within MANET networks, which responsible for finding paths between the source and destination nodes with the modernization of these paths which are constantly changing due to the dynamic topology of the network stemming from the constant random movement of the nodes. The DSR (Dynamic Source Routing routing protocol algorithm is one of these routing protocols which consist of two main stages; route discovery and maintenance, where the route discovery algorithm operates based on blind flooding of request messages. blind flooding is considered as the most well known broadcasting mechanism, it is inefficient in terms of communication and resource utilization, which causing increasing the probability of collisions, repeating send several copies of the same message, as well as increasing the delay. Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. The implementation of proposed algorithms showed positive results in terms of delay, overhead, and improve the performance of MANETs in general.

  6. A Space-Frequency Data Compression Method for Spatially Dense Laser Doppler Vibrometer Measurements

    Directory of Open Access Journals (Sweden)

    José Roberto de França Arruda

    1996-01-01

    Full Text Available When spatially dense mobility shapes are measured with scanning laser Doppler vibrometers, it is often impractical to use phase-separation modal parameter estimation methods due to the excessive number of highly coupled modes and to the prohibitive computational cost of processing huge amounts of data. To deal with this problem, a data compression method using Chebychev polynomial approximation in the frequency domain and two-dimensional discrete Fourier series approximation in the spatial domain, is proposed in this article. The proposed space-frequency regressive approach was implemented and verified using a numerical simulation of a free-free-free-free suspended rectangular aluminum plate. To make the simulation more realistic, the mobility shapes were synthesized by modal superposition using mode shapes obtained experimentally with a scanning laser Doppler vibrometer. A reduced and smoothed model, which takes advantage of the sinusoidal spatial pattern of structural mobility shapes and the polynomial frequency-domain pattern of the mobility shapes, is obtained. From the reduced model, smoothed curves with any desired frequency and spatial resolution can he produced whenever necessary. The procedure can he used either to generate nonmodal models or to compress the measured data prior to modal parameter extraction.

  7. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  8. Driving advertising into mobile mediums : Study of consumer attitudes towards mobile advertising and of factors affecting on them

    OpenAIRE

    Pietz, Michal; Storbacka, Lauri

    2007-01-01

    The high penetration rate of mobile phones along with the recent technological development has created a whole new marketing medium named mobile advertising filled with possibilities for the advertisers. Earlier studies have although indicated the success of this new advertising channel to depend on user acceptance of receiving mobile ads. Wherefore a study of consumer attitudes towards mobile advertising can be considered necessary in order to create a lucrative business. Even though this to...

  9. Position-Based Packet Forwarding for Vehicular Ad-Hoc Networks

    OpenAIRE

    Füßler, Holger

    2007-01-01

    Mobile Ad-Hoc Networks, or MANETs, are data communication networks between (potentially) mobile computer systems equipped with wireless communication devices and — in their purest form — in complete absence of communication infrastructure. Usage scenarios for these systems include communication during disaster recovery or battlefield communications. One of the great research challenges concerning MANETs is the Packet Forwarding Problem, i.e., the question to which neighbor node a data packet ...

  10. Mobile Context Toolbox - an extensible context framework for S60 mobile phones

    DEFF Research Database (Denmark)

    Larsen, Jakob Eg; Jensen, Kristian

    2009-01-01

    We describe an open framework utilizing sensors and application data on S60 mobile phones enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new sensors and features to be added to the context framework as they become....... In the experiments 14 participants have been continuously using a Nokia N95 mobile phone with a context logger application for an average of 48 days per user and covering 70% of the time. The study has provided valuable insights into the performance issues of the system in real-life usage situations, including...

  11. Handover management in dense cellular networks: A stochastic geometry approach

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    Cellular operators are continuously densifying their networks to cope with the ever-increasing capacity demand. Furthermore, an extreme densification phase for cellular networks is foreseen to fulfill the ambitious fifth generation (5G) performance requirements. Network densification improves spectrum utilization and network capacity by shrinking base stations' (BSs) footprints and reusing the same spectrum more frequently over the spatial domain. However, network densification also increases the handover (HO) rate, which may diminish the capacity gains for mobile users due to HO delays. In highly dense 5G cellular networks, HO delays may neutralize or even negate the gains offered by network densification. In this paper, we present an analytical paradigm, based on stochastic geometry, to quantify the effect of HO delay on the average user rate in cellular networks. To this end, we propose a flexible handover scheme to reduce HO delay in case of highly dense cellular networks. This scheme allows skipping the HO procedure with some BSs along users' trajectories. The performance evaluation and testing of this scheme for only single HO skipping shows considerable gains in many practical scenarios. © 2016 IEEE.

  12. Handover management in dense cellular networks: A stochastic geometry approach

    KAUST Repository

    Arshad, Rabe

    2016-07-26

    Cellular operators are continuously densifying their networks to cope with the ever-increasing capacity demand. Furthermore, an extreme densification phase for cellular networks is foreseen to fulfill the ambitious fifth generation (5G) performance requirements. Network densification improves spectrum utilization and network capacity by shrinking base stations\\' (BSs) footprints and reusing the same spectrum more frequently over the spatial domain. However, network densification also increases the handover (HO) rate, which may diminish the capacity gains for mobile users due to HO delays. In highly dense 5G cellular networks, HO delays may neutralize or even negate the gains offered by network densification. In this paper, we present an analytical paradigm, based on stochastic geometry, to quantify the effect of HO delay on the average user rate in cellular networks. To this end, we propose a flexible handover scheme to reduce HO delay in case of highly dense cellular networks. This scheme allows skipping the HO procedure with some BSs along users\\' trajectories. The performance evaluation and testing of this scheme for only single HO skipping shows considerable gains in many practical scenarios. © 2016 IEEE.

  13. Stable solutions of a scalar conservation law for particle-size segregation in dense granular avalanches

    OpenAIRE

    Shearer, M.; Gray, J. M N T; Thornton, A. R.

    2008-01-01

    Dense, dry granular avalanches are very efficient at sorting the larger particles towards the free surface of the flow, and finer grains towards the base, through the combined processes of kinetic sieving and squeeze expulsion. This generates an inversely graded particle-size distribution, which is fundamental to a variety of pattern formation mechanisms, as well as subtle size-mobility feedback effects, leading to the formation of coarse-grained lateral levees that create channels in geophys...

  14. Densely Aligned Graphene Nanoribbon Arrays and Bandgap Engineering

    Energy Technology Data Exchange (ETDEWEB)

    Su, Justin [Stanford Univ., CA (United States); Chen, Changxin [Stanford Univ., CA (United States); Gong, Ming [Stanford Univ., CA (United States); Kenney, Michael [Stanford Univ., CA (United States)

    2017-01-04

    Graphene has attracted great interest for future electronics due to its high mobility and high thermal conductivity. However, a two-dimensional graphene sheet behaves like a metal, lacking a bandgap needed for the key devices components such as field effect transistors (FETs) in digital electronics. It has been shown that, partly due to quantum confinement, graphene nanoribbons (GNRs) with ~2 nm width can open up sufficient bandgaps and evolve into semiconductors to exhibit high on/off ratios useful for FETs. However, a challenging problem has been that, such ultra-narrow GNRs (~2 nm) are difficult to fabricate, especially for GNRs with smooth edges throughout the ribbon length. Despite high on/off ratios, these GNRs show very low mobility and low on-state conductance due to dominant scattering effects by imperfections and disorders at the edges. Wider GNRs (>5 nm) show higher mobility, higher conductance but smaller bandgaps and low on/off ratios undesirable for FET applications. It is highly desirable to open up bandgaps in graphene or increase the bandgaps in wide GNRs to afford graphene based semiconductors for high performance (high on-state current and high on/off ratio) electronics. Large scale ordering and dense packing of such GNRs in parallel are also needed for device integration but have also been challenging thus far. It has been shown theoretically that uniaxial strains can be applied to a GNR to engineer its bandgap. The underlying physics is that under uniaxial strain, the Dirac point moves due to stretched C-C bonds, leading to an increase in the bandgap of armchair GNRs by up to 50% of its original bandgap (i.e. bandgap at zero strain). For zigzag GNRs, due to the existence of the edge states, changes of bandgap are smaller under uniaxial strain and can be increased by ~30%. This work proposes a novel approach to the fabrication of densely aligned graphene nanoribbons with highly smooth edges afforded by anisotropic etching and uniaxial strain for

  15. Sensor and ad-hoc networks theoretical and algorithmic aspects

    CERN Document Server

    Makki, S Kami; Pissinou, Niki; Makki, Shamila; Karimi, Masoumeh; Makki, Kia

    2008-01-01

    This book brings together leading researchers and developers in the field of wireless sensor networks to explain the special problems and challenges of the algorithmic aspects of sensor and ad-hoc networks. The book also fosters communication not only between the different sensor and ad-hoc communities, but also between those communities and the distributed systems and information systems communities. The topics addressed pertain to the sensors and mobile environment.

  16. Fermionic halos at finite temperature in AdS/CFT

    Science.gov (United States)

    Argüelles, Carlos R.; Grandi, Nicolás E.

    2018-05-01

    We explore the gravitational backreaction of a system consisting in a very large number of elementary fermions at finite temperature, in asymptotically AdS space. We work in the hydrodynamic approximation, and solve the Tolman-Oppenheimer-Volkoff equations with a perfect fluid whose equation of state takes into account both the relativistic effects of the fermionic constituents, as well as its finite temperature effects. We find a novel dense core-diluted halo structure for the density profiles in the AdS bulk, similarly as recently reported in flat space, for the case of astrophysical dark matter halos in galaxies. We further study the critical equilibrium configurations above which the core undergoes gravitational collapse towards a massive black hole, and calculate the corresponding critical central temperatures, for two qualitatively different central regimes of the fermions: the diluted-Fermi case, and the degenerate case. As a probe for the dual CFT, we construct the holographic two-point correlator of a scalar operator with large conformal dimension in the worldline limit, and briefly discuss on the boundary CFT effects at the critical points.

  17. Atoms in dense plasmas

    International Nuclear Information System (INIS)

    More, R.M.

    1986-01-01

    Recent experiments with high-power pulsed lasers have strongly encouraged the development of improved theoretical understanding of highly charged ions in a dense plasma environment. This work examines the theory of dense plasmas with emphasis on general rules which govern matter at extreme high temperature and density. 106 refs., 23 figs

  18. Atoms in dense plasmas

    Energy Technology Data Exchange (ETDEWEB)

    More, R.M.

    1986-01-01

    Recent experiments with high-power pulsed lasers have strongly encouraged the development of improved theoretical understanding of highly charged ions in a dense plasma environment. This work examines the theory of dense plasmas with emphasis on general rules which govern matter at extreme high temperature and density. 106 refs., 23 figs.

  19. Comparison of MANET Routing Protocols in Different Traffic and Mobility Models

    Directory of Open Access Journals (Sweden)

    J. Baraković

    2010-06-01

    Full Text Available Routing protocol election in MANET (Mobile Ad Hoc Network is a great challenge, because of its frequent topology changes and routing overhead. This paper compares performances of three routing protocols: Destination Sequenced Distance Vector (DSDV, Ad Hoc Ondemand Distance Vector (AODV and Dynamic Source Routing (DSR, based on results analysis obtained using simulations with different load and mobility scenarios performed with Network Simulator version 2 (NS-2. In low load and low mobility scenarios routing protocols perform in a similar manner. However, with mobility and load increasing DSR outperforms AODV and DSDV protocols.

  20. The effect of playing advergames that promote energy-dense snacks or fruit on actual food intake among children.

    Science.gov (United States)

    Folkvord, Frans; Anschütz, Doeschka J; Buijzen, Moniek; Valkenburg, Patti M

    2013-02-01

    Previous studies have focused on the effects of television advertising on the energy intake of children. However, the rapidly changing food-marketing landscape requires research to measure the effects of nontraditional forms of marketing on the health-related behaviors of children. The main aim of this study was to examine the effect of advergames that promote energy-dense snacks or fruit on children's ad libitum snack and fruit consumption and to examine whether this consumption differed according to brand and product type (energy-dense snacks and fruit). The second aim was to examine whether advergames can stimulate fruit intake. We used a randomized between-subject design with 270 children (age: 8-10 y) who played an advergame that promoted energy-dense snacks (n = 69), fruit (n = 67), or nonfood products (n = 65) or were in the control condition (n = 69). Subsequently, we measured the free intake of energy-dense snacks and fruit. The children then completed questionnaire measures, and we weighed and measured them. The main finding was that playing an advergame containing food cues increased general energy intake, regardless of the advertised brand or product type (energy-dense snacks or fruit), and this activity particularly increased the intake of energy-dense snack foods. Children who played the fruit version of the advergame did not eat significantly more fruit than did those in the other groups. The findings suggest that playing advergames that promote food, including either energy-dense snacks or fruit, increases energy intake in children.

  1. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Nyholm Jørgensen, Rasmus; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  2. Dense-gas dispersion advection-diffusion model

    International Nuclear Information System (INIS)

    Ermak, D.L.

    1992-07-01

    A dense-gas version of the ADPIC particle-in-cell, advection- diffusion model was developed to simulate the atmospheric dispersion of denser-than-air releases. In developing the model, it was assumed that the dense-gas effects could be described in terms of the vertically-averaged thermodynamic properties and the local height of the cloud. The dense-gas effects were treated as a perturbation to the ambient thermodynamic properties (density and temperature), ground level heat flux, turbulence level (diffusivity), and windfield (gravity flow) within the local region of the dense-gas cloud. These perturbations were calculated from conservation of energy and conservation of momentum principles along with the ideal gas law equation of state for a mixture of gases. ADPIC, which is generally run in conjunction with a mass-conserving wind flow model to provide the advection field, contains all the dense-gas modifications within it. This feature provides the versatility of coupling the new dense-gas ADPIC with alternative wind flow models. The new dense-gas ADPIC has been used to simulate the atmospheric dispersion of ground-level, colder-than-ambient, denser-than-air releases and has compared favorably with the results of field-scale experiments

  3. Role of ultrasonography in detecting mammographically occult breast carcinoma in women with dense breasts.

    Science.gov (United States)

    Corsetti, V; Ferrari, A; Ghirardi, M; Bergonzini, R; Bellarosa, S; Angelini, O; Bani, C; Ciatto, S

    2006-04-01

    The purpose of this study was to assess the usefulness of routine ultrasonography in women with negative mammography and dense breasts [Breast Imaging Reporting and Data System (BIRADS D3-4)]. We applied a protocol involving routine ultrasonography in a consecutive series of subjects with negative mammography and dense breasts. After evaluation by internal and external reviewers of cancers detected by ultrasonography performed to confirm negative mammography, we determined the additional cancer detection rate of ultrasonography and the cost of the protocol. Out of 17,883 total mammographies, 167 cancers were diagnosed (detection rate: 0.93%). Out of 257 suspicious mammographies, 138 cancers were detected. Out of 17,626 negative mammographies, 6,449 (36.5%) were classified as "dense breast" and underwent ultrasonography: 29 cancers were detected (detection rate: 0.44%, or 17.3% of total cancers). Out of 25 cancer cases reviewed, negative mammography and asymptomatic status was confirmed in 15 (detection rate 0.23%, or 8.9% of total cancers). The cancer detection rate was 0.11%, 0.22%, 0.32% and 0.14% for age groups 59, respectively. The cost per additional carcinoma detected by ultrasonography alone was euro 25,847.85 whereas that per examined woman was euro 21.68. The study confirms the possibility that ultrasonography can detect mammographically occult breast carcinoma in dense breasts. The evidence is insufficient to recommend this policy in routine screening practice but suggests that, at least in current clinical practice, adding ultrasonography in dense breasts may be useful despite the substantial costs.

  4. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-08-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical and virtual carrier sense networks, which reveals counter-intuitively that receivers in large dense networks with directional antennas can experience larger interference than in omnidirectional networks unless the beamwidth is sufficiently small. Validity of mathematical analysis is confirmed using simulations.

  5. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  6. Research on user interest modeling in mobile ad recommendation%手机广告推荐中的用户兴趣建模研究

    Institute of Scientific and Technical Information of China (English)

    顾其威; 郭鹏; 潘锋

    2012-01-01

    为了增强基于WAP网页的手机广告推荐中用户建模的准确性,并对“非邀”式广告推荐中脱离用户兴趣试探性推荐进行修正,针对手机广告推荐中手机屏幕小、用户注意力集中等特点,根据用户对广告的访问历史和操作模式建立其广告兴趣模型和非兴趣模型,同时分析用户网页访问模式探测其网页兴趣度,在此基础上建立用户综合兴趣模型.分别采用基于网页兴趣模型、基于广告兴趣模型和基于用户综合兴趣模型进行广告推荐,随着样本空间增大,综合兴趣模型的查准率明显优于另两者.实验验证了用户综合兴趣模型在手机广告推荐中的有效性和优越性.%For enhancing the accuracy of mobile advertising recommendation on the basis of WAP Web page, and amending the exploratory recommended in the mobile advertising recommendation of which recommendation pattern is No Invitation, on account of mobile phone' s small screen and user' s great attention, builds advertising interest model and noninterest model according the ads visiting history and operation mode. Simultaneously, analyzed the Web access mode to detect the user' s Web interest degree, proposed a user comprehensive interest model which considering the user' s Web interest and user' s ads interest. Employed three recommended patterns to recommend the mobile advertising based on Web page interest model, advertising interest model and comprehensive interest model, with the sample space growing, the accuracy of comprehensive interest model was superior to other two models. Experiments prove that the effectiveness and superiority of comprehensive model in the mobile advertising recommendation.

  7. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  8. Antecedents to Consumers' Acceptance of Mobile Advertisements

    DEFF Research Database (Denmark)

    Rajala, Risto; Westerlund, Mika

    2010-01-01

    The paper presents a hierarchical construct PLS structural equation model to analyze mobile advertisement acceptance. Hypotheses are established and tested about the hierarchical structure and the effects of the factors that precede consumers' behavioral intention to accept mobile advertisement....... The results suggest that valuable content and trust in advertisers are key predictors of mobile device users' acceptance of mobile advertising. In addition, subjective value of the ads and subjective norms mediate these antecedent-acceptance relationships. The results are invaluable to both scholars...

  9. RoCoMAR: Robots' Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2013-01-01

    In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay. PMID:23881134

  10. RoCoMAR: Robots’ Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Seokhoon Yoon

    2013-07-01

    Full Text Available In a practical deployment, mobile sensor network (MSN suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots’ Controllable Mobility Aided Routing that uses robotic nodes’ controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.

  11. FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios

    Directory of Open Access Journals (Sweden)

    Franco Mazzenga

    2017-10-01

    Full Text Available One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core network. In this paper, we investigate the possibility for existing FttC access networks to provide fronthaul capabilities for dense/ultra-dense 5G wireless networks. The analysis is realistic in that it is carried out considering an actual access network scenario, i.e., the Italian FttC deployment. It is assumed that access nodes are connected to the Cabinets and to the corresponding distributors by a number of copper pairs. Different types of cities grouped in terms of population have been considered. Results focus on fronthaul transport capacity provided by the FttC network and have been expressed in terms of the available fronthaul bit rate per node and of the achievable coverage.

  12. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Directory of Open Access Journals (Sweden)

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  13. FRAMEWORK FOR AD HOC NETWORK COMMUNICATION IN MULTI-ROBOT SYSTEMS

    Directory of Open Access Journals (Sweden)

    Khilda Slyusar

    2016-11-01

    Full Text Available Assume a team of mobile robots operating in environments where no communication infrastructure like routers or access points is available. The robots have to create a mobile ad hoc network, in that case, it provides communication on peer-to-peer basis. The paper gives an overview of existing solutions how to route messages in such ad hoc networks between robots that are not directly connected and introduces a design of a software framework for realization of such communication. Feasibility of the proposed framework is shown on the example of distributed multi-robot exploration of an a priori unknown environment. Testing of developed functionality in an exploration scenario is based on results of several experiments with various input conditions of the exploration process and various sizes of a team and is described herein.

  14. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  15. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks

    Directory of Open Access Journals (Sweden)

    C.C. Suma

    2017-01-01

    Full Text Available Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.

  16. Dense image correspondences for computer vision

    CERN Document Server

    Liu, Ce

    2016-01-01

    This book describes the fundamental building-block of many new computer vision systems: dense and robust correspondence estimation. Dense correspondence estimation techniques are now successfully being used to solve a wide range of computer vision problems, very different from the traditional applications such techniques were originally developed to solve. This book introduces the techniques used for establishing correspondences between challenging image pairs, the novel features used to make these techniques robust, and the many problems dense correspondences are now being used to solve. The book provides information to anyone attempting to utilize dense correspondences in order to solve new or existing computer vision problems. The editors describe how to solve many computer vision problems by using dense correspondence estimation. Finally, it surveys resources, code, and data necessary for expediting the development of effective correspondence-based computer vision systems.   ·         Provides i...

  17. Dense module enumeration in biological networks

    Science.gov (United States)

    Tsuda, Koji; Georgii, Elisabeth

    2009-12-01

    Analysis of large networks is a central topic in various research fields including biology, sociology, and web mining. Detection of dense modules (a.k.a. clusters) is an important step to analyze the networks. Though numerous methods have been proposed to this aim, they often lack mathematical rigorousness. Namely, there is no guarantee that all dense modules are detected. Here, we present a novel reverse-search-based method for enumerating all dense modules. Furthermore, constraints from additional data sources such as gene expression profiles or customer profiles can be integrated, so that we can systematically detect dense modules with interesting profiles. We report successful applications in human protein interaction network analyses.

  18. Dense module enumeration in biological networks

    International Nuclear Information System (INIS)

    Tsuda, Koji; Georgii, Elisabeth

    2009-01-01

    Analysis of large networks is a central topic in various research fields including biology, sociology, and web mining. Detection of dense modules (a.k.a. clusters) is an important step to analyze the networks. Though numerous methods have been proposed to this aim, they often lack mathematical rigorousness. Namely, there is no guarantee that all dense modules are detected. Here, we present a novel reverse-search-based method for enumerating all dense modules. Furthermore, constraints from additional data sources such as gene expression profiles or customer profiles can be integrated, so that we can systematically detect dense modules with interesting profiles. We report successful applications in human protein interaction network analyses.

  19. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    Science.gov (United States)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  20. Unified approach to dense matter

    International Nuclear Information System (INIS)

    Park, Byung-Yoon; Lee, Hee-Jung; Vento, Vicente; Kim, Joon-Il; Min, Dong-Pil; Rho, Mannque

    2005-01-01

    We apply the Skyrme model to dense hadronic matter, which provides a unified approach to high density, valid in the large N c limit. In our picture, dense hadronic matter is described by the classical soliton configuration with minimum energy for the given baryon number density. By incorporating the meson fluctuations on such ground state we obtain an effective Lagrangian for meson dynamics in a dense medium. Our starting point has been the Skyrme model defined in terms of pions, thereafter we have extended and improved the model by incorporating other degrees of freedom such as dilaton, kaons and vector mesons

  1. Supersymmetric AdS3, AdS2 and bubble solutions

    International Nuclear Information System (INIS)

    Gauntlett, Jerome P.; Waldram, Daniel; Kim, Nakwoo

    2007-01-01

    We present new supersymmetric AdS 3 solutions of type IIB supergravity and AdS 2 solutions of D = 11 supergravity. The former are dual to conformal field theories in two dimensions with N = (0, 2) supersymmetry while the latter are dual to conformal quantum mechanics with two supercharges. Our construction also includes AdS 2 solutions of D = 11 supergravity that have non-compact internal spaces which are dual to three-dimensional N = 2 superconformal field theories coupled to point-like defects. We also present some new bubble-type solutions, corresponding to BPS states in conformal theories, that preserve four supersymmetries

  2. Correlation ion mobility spectroscopy

    Science.gov (United States)

    Pfeifer, Kent B [Los Lunas, NM; Rohde, Steven B [Corrales, NM

    2008-08-26

    Correlation ion mobility spectrometry (CIMS) uses gating modulation and correlation signal processing to improve IMS instrument performance. Closely spaced ion peaks can be resolved by adding discriminating codes to the gate and matched filtering for the received ion current signal, thereby improving sensitivity and resolution of an ion mobility spectrometer. CIMS can be used to improve the signal-to-noise ratio even for transient chemical samples. CIMS is especially advantageous for small geometry IMS drift tubes that can otherwise have poor resolution due to their small size.

  3. Potential and Actual Health Hazards in the Dense Urban Operational Environment: Critical Gaps and Solutions for Military Occupational Health.

    Science.gov (United States)

    Patterson, Steven L; Dancy, Blair C R; Ippolito, Danielle L; Stallings, Jonathan D

    2017-11-01

    : This paper presents environmental health risks which are prevalent in dense urban environments.We review the current literature and recommendations proposed by environmental medicine experts in a 2-day symposium sponsored by the Department of Defense and supported by the Johns Hopkins University Applied Physics Laboratory.Key hazards in the dense urban operational environment include toxic industrial chemicals and materials, water pollution and sewage, and air pollution. Four critical gaps in environmental medicine were identified: prioritizing chemical and environmental concerns, developing mobile decision aids, personalized health assessments, and better real-time health biomonitoring.As populations continue to concentrate in cities, civilian and military leaders will need to meet emerging environmental health concerns by developing and delivering adequate technology and policy solutions.

  4. Increasing the Effectiveness of Mobile Advertising by Using Contextual Information

    Directory of Open Access Journals (Sweden)

    Andrews Michelle

    2017-11-01

    Full Text Available To avoid overtargeting consumers or targeting them at the wrong moment, mobile ads need to be relevant. Geographically, consumers have been shown to be more responsive to promotional offers from shops that were located close to them. For the lead time of promotions, insights are similar: The closer in time, the better the response. When considering the interplay of time and space, though, the picture becomes more complex. Recipients need enough time to respond given their distance from the promoted venue, but too much time may reduce response rates. It appears that people do not plan too far in advance for events such as movie watching or with small-screen devices such as smartphones. Another context that can affect people’s response to mobile ads is that of the environment - what is going on around people. In a study of mobile promotions during subway rides, mobile campaigns turned out to be more effective on more crowded trains. Even if this finding cannot be generalized to all forms of crowded environments, it clearly shows that context matters. Understanding its impact can help marketers become better gatekeepers by delivering the right mobile ad to the right person at the right time at the right place in the right context.

  5. Data-Driven Handover Optimization in Next Generation Mobile Communication Networks

    Directory of Open Access Journals (Sweden)

    Po-Chiang Lin

    2016-01-01

    Full Text Available Network densification is regarded as one of the important ingredients to increase capacity for next generation mobile communication networks. However, it also leads to mobility problems since users are more likely to hand over to another cell in dense or even ultradense mobile communication networks. Therefore, supporting seamless and robust connectivity through such networks becomes a very important issue. In this paper, we investigate handover (HO optimization in next generation mobile communication networks. We propose a data-driven handover optimization (DHO approach, which aims to mitigate mobility problems including too-late HO, too-early HO, HO to wrong cell, ping-pong HO, and unnecessary HO. The key performance indicator (KPI is defined as the weighted average of the ratios of these mobility problems. The DHO approach collects data from the mobile communication measurement results and provides a model to estimate the relationship between the KPI and features from the collected dataset. Based on the model, the handover parameters, including the handover margin and time-to-trigger, are optimized to minimize the KPI. Simulation results show that the proposed DHO approach could effectively mitigate mobility problems.

  6. Repair of dense connective tissues via biomaterial-mediated matrix reprogramming of the wound interface.

    Science.gov (United States)

    Qu, Feini; Pintauro, Michael P; Haughan, Joanne E; Henning, Elizabeth A; Esterhai, John L; Schaer, Thomas P; Mauck, Robert L; Fisher, Matthew B

    2015-01-01

    Repair of dense connective tissues in adults is limited by their intrinsic hypocellularity and is exacerbated by a dense extracellular matrix (ECM) that impedes cellular migration to and local proliferation at the wound site. Conversely, healing in fetal tissues occurs due in part to an environment conducive to cell mobility and division. Here, we investigated whether the application of a degradative enzyme, collagenase, could reprogram the adult wound margin to a more fetal-like state, and thus abrogate the biophysical impediments that hinder migration and proliferation. We tested this concept using the knee meniscus, a commonly injured structure for which few regenerative approaches exist. To focus delivery and degradation to the wound interface, we developed a system in which collagenase was stored inside poly(ethylene oxide) (PEO) electrospun nanofibers and released upon hydration. Through a series of in vitro and in vivo studies, our findings show that partial digestion of the wound interface improves repair by creating a more compliant and porous microenvironment that expedites cell migration to and/or proliferation at the wound margin. This innovative approach of targeted manipulation of the wound interface, focused on removing the naturally occurring barriers to adult tissue repair, may find widespread application in the treatment of injuries to a variety of dense connective tissues. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Broadcast scheduling for mobile advertising

    OpenAIRE

    De Reyck, B.; Degraeve, Z.

    2003-01-01

    We describe a broadcast scheduling system developed for a precision marketing firm specialized in location-sensitive permission-based mobile advertising using SMS (Short Message Service) text messaging. Text messages containing advertisements were sent to registered customers when they were shopping in one of two shopping centers in the vicinity of London. The ads typically contained a limited-time promotional offer. The company's problem was deciding which ads to send out to which customers ...

  8. Constructing Dense Graphs with Unique Hamiltonian Cycles

    Science.gov (United States)

    Lynch, Mark A. M.

    2012-01-01

    It is not difficult to construct dense graphs containing Hamiltonian cycles, but it is difficult to generate dense graphs that are guaranteed to contain a unique Hamiltonian cycle. This article presents an algorithm for generating arbitrarily large simple graphs containing "unique" Hamiltonian cycles. These graphs can be turned into dense graphs…

  9. Hadrons in dense matter. Proceedings

    International Nuclear Information System (INIS)

    Buballa, M.; Noerenberg, W.; Schaefer, B.J.; Wambach, J.

    2000-03-01

    The following topics were dealt with: Elementary hadronic reactions, Delta dynamics in nuclei, in-medium s-wave ππ-correlations, strangeness in hot and dense matter, medium modifications of vector mesons and dilepton production, medium modifications of charmonium, thermal properties of hot and dense hadronic matter, nuclear matter, spectral functions and QCD sum rules

  10. Herbert: A Second Generation Mobile Robot.

    Science.gov (United States)

    1988-01-01

    PROJECT. TASK S Artificial Inteligence Laboratory AREA A WORK UNIT NUMBERS ’ ~ 545 Technology Square Cambridge, MA 02139 11. CONTROLLING OFFICE NAME...AD-AI93 632 WMRT: A SECOND GENERTION MOBILE ROWT(U) / MASSACHUSETTS IMST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE LAB R BROOKS ET AL .JAN l8 Al-M...MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLIGENCE LABORATORY A. I. Memo 1016 January, 1988 HERBERT: A SECOND GENERATION MOBILE ROBOT Rodney A

  11. Looking for Sustainable Urban Mobility through Bayesian Networks

    Directory of Open Access Journals (Sweden)

    Giovanni Fusco

    2004-11-01

    Full Text Available There is no formalised theory of sustainable urban mobility systems. Observed patterns of urban mobility are often considered unsustainable. But we don’t know what a city with sustainable mobility should look like. It is nevertheless increasingly apparent that the urban mobility system plays an important role in the achievement of the city’s wider sustainability objectives.In this paper we explore the characteristics of sustainable urban mobility systems through the technique of Bayesian networks. At the frontier between multivariate statistics and artificial intelligence, Bayesian networks provide powerful models of causal knowledge in an uncertain context. Using data on urban structure, transportation offer, mobility demand, resource consumption and environmental externalities from seventy-five world cities, we developed a systemic model of the city-transportation-environment interaction in the form of a Bayesian network. The network could then be used to infer the features of the city with sustainable mobility.The Bayesian model indicates that the city with sustainable mobility is most probably a dense city with highly efficient transit and multimodal mobility. It produces high levels of accessibility without relying on a fast road network. The achievement of sustainability objectives for urban mobility is probably compatible with all socioeconomic contexts.By measuring the distance of world cities from the inferred sustainability profile, we finally derive a geography of sustainability for mobility systems. The cities closest to the sustainability profile are in Central Europe as well as in affluent countries of the Far East. Car-dependent American cities are the farthest from the desired sustainability profile.

  12. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  13. Quantitative Comparison of Dense-Core Amyloid Plaque Accumulation in Amyloid-β Precursor Protein Transgenic Mice

    Science.gov (United States)

    Liu, Peng; Reichl, John H.; Rao, Eshaan R.; McNellis, Brittany M.; Huang, Eric S.; Hemmy, Laura S.; Forster, Colleen L.; Kuskowski, Michael A.; Borchelt, David R.; Vassar, Robert; Ashe, Karen H.; Zahs, Kathleen R.

    2016-01-01

    There exist several dozen lines of transgenic mice that express human amyloid-β precursor protein (AβPP) with Alzheimer’s disease (AD)-linked mutations. AβPP transgenic mouse lines differ in the types and amounts of Aβ that they generate and in their spatiotemporal patterns of expression of Aβ assemblies, providing a toolkit to study Aβ amyloidosis and the influence of Aβ aggregation on brain function. More complete quantitative descriptions of the types of Aβ assemblies present in transgenic mice and in humans during disease progression should add to our understanding of how Aβ toxicity in mice relates to the pathogenesis of AD. Here, we provide a direct quantitative comparison of amyloid plaque burdens and plaque sizes in four lines of AβPP transgenic mice. We measured the fraction of cortex and hippocampus occupied by dense-core plaques, visualized by staining with Thioflavin S, in mice from young adulthood through advanced age. We found that the plaque burdens among the transgenic lines varied by an order of magnitude: at 15 months of age, the oldest age studied, the median cortical plaque burden in 5XFAD mice was already ~4.5 times that of 21-month Tg2576 mice and ~15 times that of 21–24-month rTg9191 mice. Plaque-size distributions changed across the lifespan in a line- and region-dependent manner. We also compared the dense-core plaque burdens in the mice to those measured in a set of pathologically-confirmed AD cases from the Nun Study. Cortical plaque burdens in Tg2576, APPSwePS1ΔE9, and 5XFAD mice eventually far exceeded those measured in the human cohort. PMID:28059792

  14. Quantitative Comparison of Dense-Core Amyloid Plaque Accumulation in Amyloid-β Protein Precursor Transgenic Mice.

    Science.gov (United States)

    Liu, Peng; Reichl, John H; Rao, Eshaan R; McNellis, Brittany M; Huang, Eric S; Hemmy, Laura S; Forster, Colleen L; Kuskowski, Michael A; Borchelt, David R; Vassar, Robert; Ashe, Karen H; Zahs, Kathleen R

    2017-01-01

    There exist several dozen lines of transgenic mice that express human amyloid-β protein precursor (AβPP) with Alzheimer's disease (AD)-linked mutations. AβPP transgenic mouse lines differ in the types and amounts of Aβ that they generate and in their spatiotemporal patterns of expression of Aβ assemblies, providing a toolkit to study Aβ amyloidosis and the influence of Aβ aggregation on brain function. More complete quantitative descriptions of the types of Aβ assemblies present in transgenic mice and in humans during disease progression should add to our understanding of how Aβ toxicity in mice relates to the pathogenesis of AD. Here, we provide a direct quantitative comparison of amyloid plaque burdens and plaque sizes in four lines of AβPP transgenic mice. We measured the fraction of cortex and hippocampus occupied by dense-core plaques, visualized by staining with Thioflavin S, in mice from young adulthood through advanced age. We found that the plaque burdens among the transgenic lines varied by an order of magnitude: at 15 months of age, the oldest age studied, the median cortical plaque burden in 5XFAD mice was already ∼4.5 times that of 21-month-old Tg2576 mice and ∼15 times that of 21-24-month-old rTg9191 mice. Plaque-size distributions changed across the lifespan in a line- and region-dependent manner. We also compared the dense-core plaque burdens in the mice to those measured in a set of pathologically-confirmed AD cases from the Nun Study. Cortical plaque burdens in Tg2576, APPSwePS1ΔE9, and 5XFAD mice eventually far exceeded those measured in the human cohort.

  15. Service for fault tolerance in the Ad Hoc Networks based on Multi Agent Systems

    Directory of Open Access Journals (Sweden)

    Ghalem Belalem

    2011-02-01

    Full Text Available The Ad hoc networks are distributed networks, self-organized and does not require infrastructure. In such network, mobile infrastructures are subject of disconnections. This situation may concern a voluntary or involuntary disconnection of nodes caused by the high mobility in the Ad hoc network. In these problems we are trying through this work to contribute to solving these problems in order to ensure continuous service by proposing our service for faults tolerance based on Multi Agent Systems (MAS, which predict a problem and decision making in relation to critical nodes. Our work contributes to study the prediction of voluntary and involuntary disconnections in the Ad hoc network; therefore we propose our service for faults tolerance that allows for effective distribution of information in the Network by selecting some objects of the network to be duplicates of information.

  16. Rapid screening of non-steroidal anti-inflammatory drugs illegally added in anti-rheumatic herbal supplements and herbal remedies by portable ion mobility spectrometry.

    Science.gov (United States)

    Li, Mengjiao; Ma, Haiyan; Gao, Jinglin; Zhang, Lina; Wang, Xinyu; Liu, Di; Bian, Jing; Jiang, Ye

    2017-10-25

    In this work, for the first time, a high-performance ion mobility spectrometry with electrospray ionization (ESI-HPIMS) method has been employed as a rapid screening tool for the detection of acetaminophen, ibuprofen, naproxen, diclofenac sodium and indomethacin illegally added in anti-rheumatic herbal supplements and herbal remedies. Samples were dissolved and filtered through a 0.45μm microporous membrane, then the filtrate was directly injected into the high-performance ion mobility spectrometry for analysis. Using this approach, the screening of illegal additions can be accomplished in as rapid as two to three minutes with no pretreatment required. The proposed method provided a LOD of 0.06-0.33μgmL -1 , as well as a good seperation of the five NSAIDs. The precision of the method was 0.1-0.4% (repeatability, n=6) and 0.9-3.3% (reproducibility, n=3). The proposed method appeared to be simple, rapid and highly specific, thus could be effective for the in-situ screening of NSAIDs in anti-rheumatic herbal supplements and herbal remedies. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. The Adoption of Shared Mobility in California and Its Relationship with Other Components of Travel Behavior

    Science.gov (United States)

    2018-03-01

    Emerging technologies and shared mobility services are quickly changing transportation. The popularity of these services is particularly high among millennials and those living in the dense central parts of cities. Still, the reasons behind the adopt...

  18. Interference Coordination for Dense Wireless Networks

    DEFF Research Database (Denmark)

    Soret, Beatriz; Pedersen, Klaus I.; Jørgensen, Niels T.K.

    2015-01-01

    and dense deployment in Tokyo are compared. Evolution to DenseNets offers new opportunities for further development of downlink interference cooperation techniques. Various mechanisms in LTE and LTE-Advanced are revisited. Some techniques try to anticipate the future in a proactive way, whereas others......The promise of ubiquitous and super-fast connectivity for the upcoming years will be in large part fulfilled by the addition of base stations and spectral aggregation. The resulting very dense networks (DenseNets) will face a number of technical challenges. Among others, the interference emerges...... as an old acquaintance with new significance. As a matter of fact, the interference conditions and the role of aggressor and victim depend to a large extent on the density and the scenario. To illustrate this, downlink interference statistics for different 3GPP simulation scenarios and a more irregular...

  19. Mobile phone interaction techniques for rural economy development ...

    African Journals Online (AJOL)

    The objective of this study is to identify the various researches on interaction techniques and user interface design as a first step to the design of suitable mobile interactions and user interfaces for rural users. This research project is also aimed at socio-economic development and adding value to mobile phone users in ...

  20. An Added Value of Neuroscientific Tools to Understand Consumers’ In-Store Behaviour

    DEFF Research Database (Denmark)

    Bagdziunaite, Dalia; Nassri, Khalid; Clement, Jesper

    2014-01-01

    Little is still understood about the actual in-store purchase process. Here, we report that prior ad exposure affects in-store decision-making. By using mobile eye-tracking and electroencephalography (EEG), we demonstrate that, unbeknownst to participants, the ad effect was driven by increased...... visual exploration of the product shelves for the brand that was presented during ad exposure, and a stronger motivation score, as assess by the brain’s prefrontal asymmetry. These findings are discussed in the light of the academic and commercial need to integrate neuroscientific tools in the study...

  1. A fault-tolerant small world topology control model in ad hoc networks for search and rescue

    Science.gov (United States)

    Tan, Mian; Fang, Ling; Wu, Yue; Zhang, Bo; Chang, Bowen; Holme, Petter; Zhao, Jing

    2018-02-01

    Due to their self-organized, multi-hop and distributed characteristics, ad hoc networks are useful in search and rescue. Topology control models need to be designed for energy-efficient, robust and fast communication in ad hoc networks. This paper proposes a topology control model which specializes for search and rescue-Compensation Small World-Repeated Game (CSWRG)-which integrates mobility models, constructing small world networks and a game-theoretic approach to the allocation of resources. Simulation results show that our mobility models can enhance the communication performance of the constructed small-world networks. Our strategy, based on repeated game, can suppress selfish behavior and compensate agents that encounter selfish or faulty neighbors. This model could be useful for the design of ad hoc communication networks.

  2. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  3. A European Land Mobile Satellite System via EMS

    Science.gov (United States)

    Ananasso, Fulvio; Mistretta, Ignazio

    1991-10-01

    The paper analyzes the technical and market issues that influence the strategy of implementation of a Land Mobile Satellite System via the payload EMS (European Mobile System) embarked on ITALSAT F-2. The final goal is to determine services, network architecture, and added value chain that make LMSS via EMS profitable for a typical telecommunication company.

  4. Overestimation of on-road air quality surveying data measured with a mobile laboratory caused by exhaust plumes of a vehicle ahead in dense traffic areas.

    Science.gov (United States)

    Woo, Sang-Hee; Kwak, Kyung-Hwan; Bae, Gwi-Nam; Kim, Kyung Hwan; Kim, Chang Hyeok; Yook, Se-Jin; Jeon, Sangzin; Kwon, Sangil; Kim, Jeongsoo; Lee, Seung-Bok

    2016-11-01

    The unintended influence of exhaust plumes emitted from a vehicle ahead to on-road air quality surveying data measured with a mobile laboratory (ML) at 20-40 km h -1 in dense traffic areas was investigated by experiment and life-sized computational fluidic dynamics (CFD) simulation. The ML equipped with variable sampling inlets of five columns by four rows was used to measure the spatial distribution of CO 2 and NO x concentrations when following 5-20 m behind a sport utility vehicle (SUV) as an emitter vehicle equipped with a portable emission monitoring system (PEMS). The PEMS measured exhaust gases at the tailpipe for input data of the CFD simulations. After the CFD method was verified with experimental results of the SUV, dispersion of exhaust plumes emitted from a bus and a sedan was numerically analyzed. More dilution of the exhaust plume was observed at higher vehicle speeds, probably because of eddy diffusion that was proportional to turbulent kinetic energy and vehicle speed. The CO 2 and NO x concentrations behind the emitter vehicle showed less overestimation as both the distance between the two vehicles and their background concentrations increased. If the height of the ML inlet is lower than 2 m and the ML travels within 20 m behind a SUV and a sedan ahead at 20 km h -1 , the overestimation should be considered by as much as 200 ppb in NO x and 80 ppm in CO 2 . Following a bus should be avoided if possible, because effect of exhaust plumes from a bus ahead could not be negligible even when the distance between the bus and the ML with the inlet height of 2 m, was more than 40 m. Recommendations are provided to avoid the unintended influence of exhaust plumes from vehicles ahead of the ML during on-road measurement in urban dense traffic conditions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. The small, dense LDL phenotype and the risk of coronary heart disease: epidemiology, patho-physiology and therapeutic aspects.

    Science.gov (United States)

    Lamarche, B; Lemieux, I; Després, J P

    1999-09-01

    More than decade ago, several cross-sectional studies have reported differences in LDL particle size, density and composition between coronary heart disease (CHD) patients and healthy controls. Three recent prospective, nested case-control studies have since confirmed that the presence of small, dense LDL particles was associated with more than a three-fold increase in the risk of CHD. The small, dense LDL phenotype rarely occurs as an isolated disorder. It is most frequently accompanied by hypertriglyceridemia, reduced HDL cholesterol levels, abdominal obesity, insulin resistance and by a series of other metabolic alterations predictive of an impaired endothelial function and increased susceptibility to thrombosis. Whether or not the small, dense LDL phenotype should be considered an independent CHD risk factor remains to be clearly established. The cluster of metabolic abnormalities associated with small, dense LDL particles has been referred to as the insulin resistance-dyslipidemic phenotype of abdominal obesity. Results from the Québec Cardiovascular Study have indicated that individuals displaying three of the numerous features of insulin resistance (elevated plasma insulin and apolipoprotein B concentrations and small, dense LDL particles) showed a remarkable increase in CHD risk. Our data suggest that the increased risk of CHD associated with having small, dense LDL particles may be modulated to a significant extent by the presence/absence of insulin resistance, abdominal obesity and increased LDL particle concentration. We suggest that the complex interactions among the metabolic alterations of the insulin resistance syndrome should be considered when evaluating the risk of CHD associated with the small, dense LDL phenotype. From a therapeutic standpoint, the treatment of this condition should not only aim at reducing plasma triglyceride levels, but also at improving all features of the insulin resistance syndrome, for which body weight loss and

  6. Expected satiation after repeated consumption of low- or high-energy-dense soup.

    Science.gov (United States)

    Hogenkamp, Pleunie S; Brunstrom, Jeffrey M; Stafleu, Annette; Mars, Monica; de Graaf, Cees

    2012-07-14

    We investigated whether repeated consumption of a low-energy-dense (LED; 208 kJ/100 g) or high-energy-dense (HED; 645 kJ/100 g) soup modifies expectations relating to the satiating capacity of the food, and its subsequent intake. In study 1, participants consumed either a novel-flavoured LED (n 32; 21 (SD 1·6) years, BMI 21·4 (SD 1·6) kg/m(2)) or HED soup (n 32; 21 (SD 1·6) years, BMI 21·3 (SD 1·7) kg/m(2)). Soup was served in a fixed amount on days 1-4 and ad libitum on day 5. 'Expected satiation' was measured on days 1, 2 and 5. Expected satiation did not change after repeated consumption of the LED or HED soup. Ad libitum intake did not differ between the LED (461 (SD 213) g) and HED soup (391 (SD 164) g). Only on day 1, expected satiation was higher for the HED soup than for the LED soup (P = 0·03), suggesting a role for sensory attributes in expected satiation. In study 2, thirty participants (21 (SD 1·6) years, BMI 21·3 (SD 1·7) kg/m(2)) performed a single measurement of expected satiation of the LED and HED soup, and four commercially available types of soup. Ratings on sensory attributes were associated with expected satiation. Results on expected satiation coincided with those of study 1. Thickness and intensity of taste were independently associated with expected satiation. Expectations may initially rely on sensory attributes and previous experiences, and are not easily changed.

  7. Dynamical theory of dense groups of galaxies

    Science.gov (United States)

    Mamon, Gary A.

    1990-01-01

    It is well known that galaxies associate in groups and clusters. Perhaps 40% of all galaxies are found in groups of 4 to 20 galaxies (e.g., Tully 1987). Although most groups appear to be so loose that the galaxy interactions within them ought to be insignificant, the apparently densest groups, known as compact groups appear so dense when seen in projection onto the plane of the sky that their members often overlap. These groups thus appear as dense as the cores of rich clusters. The most popular catalog of compact groups, compiled by Hickson (1982), includes isolation among its selection critera. Therefore, in comparison with the cores of rich clusters, Hickson's compact groups (HCGs) appear to be the densest isolated regions in the Universe (in galaxies per unit volume), and thus provide in principle a clean laboratory for studying the competition of very strong gravitational interactions. The $64,000 question here is then: Are compact groups really bound systems as dense as they appear? If dense groups indeed exist, then one expects that each of the dynamical processes leading to the interaction of their member galaxies should be greatly enhanced. This leads us to the questions: How stable are dense groups? How do they form? And the related question, fascinating to any theorist: What dynamical processes predominate in dense groups of galaxies? If HCGs are not bound dense systems, but instead 1D change alignments (Mamon 1986, 1987; Walke & Mamon 1989) or 3D transient cores (Rose 1979) within larger looser systems of galaxies, then the relevant question is: How frequent are chance configurations within loose groups? Here, the author answers these last four questions after comparing in some detail the methods used and the results obtained in the different studies of dense groups.

  8. Dense Output for Strong Stability Preserving Runge–Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2016-12-10

    We investigate dense output formulae (also known as continuous extensions) for strong stability preserving (SSP) Runge–Kutta methods. We require that the dense output formula also possess the SSP property, ideally under the same step-size restriction as the method itself. A general recipe for first-order SSP dense output formulae for SSP methods is given, and second-order dense output formulae for several optimal SSP methods are developed. It is shown that SSP dense output formulae of order three and higher do not exist, and that in any method possessing a second-order SSP dense output, the coefficient matrix A has a zero row.

  9. Design of a multimedia gateway for mobile devices

    Science.gov (United States)

    Hens, Raf; Goeminne, Nico; Van Hoecke, Sofie; Verdickt, Tom; Bouve, Thomas; Gielen, Frank; Demeester, Piet

    2005-03-01

    Although mobile users are currently offered a lot more capabilities on their mobile devices, they still experience some limitations. They can surf the Internet, read their e-mail and receive MMS messages, but they have limited processing power, storage capacity and bandwidth and are limited in their access to peripherals (e.g. printers). We have designed and implemented a multimedia gateway for mobile devices that reduces these limitations. It gives the mobile devices transparent access to high capacity devices connected to the gateway, which is built around a central, modularly extensible server that can run on any PC or home gateway. It manages two sets of modules: one set offering the actual services and another set handling the IP-based wireless interaction with the client applications on the mobile devices. These modules can be added and removed dynamically, offering new services on the fly. Currently services for storage, printing, domotics and playing music are provided. Others can easily be added later on. This paper discusses the architecture and development, the management of modules, the actual services and their benefits. Besides a proprietary implementation, it also looks into OSGi and how both platforms compare to each other, concerning design, architecture, ease of development, functionality, ...

  10. Modeling virtualized downlink cellular networks with ultra-dense small cells

    KAUST Repository

    Ibrahim, Hazem

    2015-09-11

    The unrelenting increase in the mobile users\\' populations and traffic demand drive cellular network operators to densify their infrastructure. Network densification increases the spatial frequency reuse efficiency while maintaining the signal-to-interference-plus-noise-ratio (SINR) performance, hence, increases the spatial spectral efficiency and improves the overall network performance. However, control signaling in such dense networks consumes considerable bandwidth and limits the densification gain. Radio access network (RAN) virtualization via control plane (C-plane) and user plane (U-plane) splitting has been recently proposed to lighten the control signaling burden and improve the network throughput. In this paper, we present a tractable analytical model for virtualized downlink cellular networks, using tools from stochastic geometry. We then apply the developed modeling framework to obtain design insights for virtualized RANs and quantify associated performance improvement. © 2015 IEEE.

  11. Traffic Agents for Improving QoS in Mixed Infrastructure and Ad Hoc Modes Wireless LAN

    Directory of Open Access Journals (Sweden)

    Yuan Hai-Feng

    2006-01-01

    Full Text Available As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN, which can offer high data-rate wireless multimedia services to the mobile stations (MSs in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light.

  12. Mobile Disdrometer Observations of Nocturnal Mesoscale Convective Systems During PECAN

    Science.gov (United States)

    Bodine, D. J.; Rasmussen, K. L.

    2015-12-01

    Understanding microphysical processes in nocturnal mesoscale convective systems (MCSs) is an important objective of the Plains Elevated Convection At Night (PECAN) experiment, which occurred from 1 June - 15 July 2015 in the central Great Plains region of the United States. Observations of MCSs were collected using a large array of mobile and fixed instrumentation, including ground-based radars, soundings, PECAN Integrated Sounding Arrays (PISAs), and aircraft. In addition to these observations, three mobile Parsivel disdrometers were deployed to obtain drop-size distribution (DSD) measurements to further explore microphysical processes in convective and stratiform regions of nocturnal MCSs. Disdrometers were deployed within close range of a multiple frequency network of mobile and fixed dual-polarization radars (5 - 30 km range), and near mobile sounding units and PISAs. Using mobile disdrometer and multiple-wavelength, dual-polarization radar data, microphysical properties of convective and stratiform regions of MCSs are investigated. The analysis will also examine coordinated Range-Height Indicator (RHI) scans over the disdrometers to elucidate vertical DSD structure. Analysis of dense observations obtained during PECAN in combination with mobile disdrometer DSD measurements contributes to a greater understanding of the structural characteristics and evolution of nocturnal MCSs.

  13. Optimal super dense coding over memory channels

    OpenAIRE

    Shadman, Zahra; Kampermann, Hermann; Macchiavello, Chiara; Bruß, Dagmar

    2011-01-01

    We study the super dense coding capacity in the presence of quantum channels with correlated noise. We investigate both the cases of unitary and non-unitary encoding. Pauli channels for arbitrary dimensions are treated explicitly. The super dense coding capacity for some special channels and resource states is derived for unitary encoding. We also provide an example of a memory channel where non-unitary encoding leads to an improvement in the super dense coding capacity.

  14. Compressive intrinsic stress originates in the grain boundaries of dense refractory polycrystalline thin films

    Energy Technology Data Exchange (ETDEWEB)

    Magnfält, D., E-mail: danma@ifm.liu.se; Sarakinos, K. [Nanoscale Engineering Division, Department of Physics, Chemistry and Biology (IFM), Linköping University, SE-581 83 Linköping (Sweden); Fillon, A.; Abadias, G. [Institut P' , Département Physique et Mécanique des Matériaux, Université de Poitiers-CNRS-ENSMA, SP2MI, Téléport 2, Bd M. et P. Curie, F-86962 Chasseneuil-Futuroscope (France); Boyd, R. D.; Helmersson, U. [Plasma and Coatings Physics Division, Department of Physics, Chemistry and Biology (IFM), Linköping University, SE-581 83 Linköping (Sweden)

    2016-02-07

    Intrinsic stresses in vapor deposited thin films have been a topic of considerable scientific and technological interest owing to their importance for functionality and performance of thin film devices. The origin of compressive stresses typically observed during deposition of polycrystalline metal films at conditions that result in high atomic mobility has been under debate in the literature in the course of the past decades. In this study, we contribute towards resolving this debate by investigating the grain size dependence of compressive stress magnitude in dense polycrystalline Mo films grown by magnetron sputtering. Although Mo is a refractory metal and hence exhibits an intrinsically low mobility, low energy ion bombardment is used during growth to enhance atomic mobility and densify the grain boundaries. Concurrently, the lateral grain size is controlled by using appropriate seed layers on which Mo films are grown epitaxially. The combination of in situ stress monitoring with ex situ microstructural characterization reveals a strong, seemingly linear, increase of the compressive stress magnitude on the inverse grain size and thus provides evidence that compressive stress is generated in the grain boundaries of the film. These results are consistent with models suggesting that compressive stresses in metallic films deposited at high homologous temperatures are generated by atom incorporation into and densification of grain boundaries. However, the underlying mechanisms for grain boundary densification might be different from those in the present study where atomic mobility is intrinsically low.

  15. Client-Server and Peer-to-Peer Ad-hoc Network for a Flexible Learning Environment

    Directory of Open Access Journals (Sweden)

    Ferial Khaddage

    2011-01-01

    Full Text Available Peer-to-Peer (P2P networking in a mobile learning environment has become a popular topic of research. One of the new emerging research ideas is on the ability to combine P2P network with server-based network to form a strong efficient portable and compatible network infrastructure. This paper describes a unique mobile network architecture, which reflects the on-campus students’ need for a mobile learning environment. This can be achieved by combining two different networks, client-server and peer-to-peer ad-hoc to form a sold and secure network. This is accomplished by employing one peer within the ad-hoc network to act as an agent-peer to facilitate communication and information sharing between the two networks. It can be implemented without any major changes to the current network technologies, and can combine any wireless protocols such as GPRS, Wi-Fi, Bluetooth, and 3G.

  16. Canopy bidirectional reflectance calculation based on Adding method and SAIL formalism: AddingS / AddingSD

    NARCIS (Netherlands)

    Kallel, A.; Verhoef, W.; Hegarat-Mascle, Le S.; Ottle, C.; Hubert-Moy, L.

    2008-01-01

    The SAIL model (proposed by Verhoef) is largely used in the remote sensing community to calculate the canopy Bidirectional Reflectance Distribution Function. The simulation results appear acceptable compared to observations especially for not very dense planophile vegetation. However, for

  17. Mobile Prototyping Platforms for Remote Engineering Applications

    Directory of Open Access Journals (Sweden)

    Karsten Henke

    2009-08-01

    Full Text Available This paper describes a low-cost mobile communication platform as a universal rapid-prototyping system, which is based on the Quadrocopter concept. At the Integrated Hardware and Software Systems Group at the Ilmenau University of Technology these mobile platforms are used to motivate bachelor and master students to study Computer Engineering sciences. This could be done by increasing their interest in technical issues, using this platform as integral part of a new ad-hoc lab to demonstrate different aspects in the area of Mobile Communication as well as universal rapid prototyping nodes to investigate different mechanisms for self-organized mobile communication systems within the International Graduate School on Mobile Communications. Beside the three fields of application, the paper describes the current architecture concept of the mobile prototyping platform as well as the chosen control mechanism and the assigned sensor systems to fulfill all the required tasks.

  18. Mining connected global and local dense subgraphs for bigdata

    Science.gov (United States)

    Wu, Bo; Shen, Haiying

    2016-01-01

    The problem of discovering connected dense subgraphs of natural graphs is important in data analysis. Discovering dense subgraphs that do not contain denser subgraphs or are not contained in denser subgraphs (called significant dense subgraphs) is also critical for wide-ranging applications. In spite of many works on discovering dense subgraphs, there are no algorithms that can guarantee the connectivity of the returned subgraphs or discover significant dense subgraphs. Hence, in this paper, we define two subgraph discovery problems to discover connected and significant dense subgraphs, propose polynomial-time algorithms and theoretically prove their validity. We also propose an algorithm to further improve the time and space efficiency of our basic algorithm for discovering significant dense subgraphs in big data by taking advantage of the unique features of large natural graphs. In the experiments, we use massive natural graphs to evaluate our algorithms in comparison with previous algorithms. The experimental results show the effectiveness of our algorithms for the two problems and their efficiency. This work is also the first that reveals the physical significance of significant dense subgraphs in natural graphs from different domains.

  19. Transport properties of dense matter

    International Nuclear Information System (INIS)

    Itoh, Naoki; Mitake, Shinichi; Iyetomi, Hiroshi; Ichimaru, Setsuo

    1983-01-01

    Transport coefficients, electrical and thermal conductivities in particular, are essential physical quantities for the theories of stellar structure. Since the discoveries of pulsars and X-ray stars, an accurate evaluation of the transport coefficients in the dense matter has become indispensable to the quantitative understanding of the observed neutron stars. The authors present improved calculations of the electrical and thermal conductivities of the dense matter in the liquid metal phase, appropriate to white dwarfs and neutron stars. (Auth.)

  20. Ad Hoc on-Demand Distance Vector (AODV Routing Protocol Performance Evaluation on Hybrid Ad Hoc Network: Comparison of Result of Ns-2 Simulation and Implementation on Testbed using PDA

    Directory of Open Access Journals (Sweden)

    Riri Sari

    2010-10-01

    Full Text Available In Mobile Ad hoc NETwork (MANET, node supplemented with wireless equipment has the capacity to manage and organise autonomously, without the presence of network infrastructures. Hybrid ad hoc network, enable several nodes to move freely (mobile to create instant communication. Independent from infrastructure. They could access the Local Area Network (LAN or the Internet. Functionalities of ad hoc network very much dependent on the routing protocol that determines the routing around node. Ad hoc On-demand Distance Vector (AODV is one of routing protocols in ad hoc network which has a reactive characteristic. This protocol is the most common protocol being researched and used. In this Research, AODV protocol investigation was conducted by developing a testbed using Personal Computer, several Laptops (the Linux Red Hat operation system 9.0 and Fedora Core 2, and Personal Digital Assistant (PDA. This research also made a complete package by mean of cross compilation for PDA iPAQ. In general, results obtained from the simulation of AODV protocol using Network Simulator NS-2 are packet delivery ratio 99.89%, end-to-end delay of 0.14 seconds and routing overhead of 1,756.61 byte per second. Afterwards results from simulation were compared to results from testbed. Results obtained from testbed are as follows: the packet delivery ratio is 99.57%, the end-to-end delay is 1.004 seconds and the routing overhead is 1,360.36 byte per second.

  1. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  2. Finding dense locations in indoor tracking data

    DEFF Research Database (Denmark)

    Ahmed, Tanvir; Pedersen, Torben Bach; Lu, Hua

    2014-01-01

    for semi-constrained indoor movement, and then uses this to map raw tracking records into mapping records representing object entry and exit times in particular locations. Then, an efficient indexing structure, the Dense Location Time Index (DLT-Index) is proposed for indexing the time intervals...... of the mapping table, along with associated construction, query processing, and pruning techniques. The DLT-Index supports very efficient aggregate point queries, interval queries, and dense location queries. A comprehensive experimental study with real data shows that the proposed techniques can efficiently......Finding the dense locations in large indoor spaces is very useful for getting overloaded locations, security, crowd management, indoor navigation, and guidance. Indoor tracking data can be very large and are not readily available for finding dense locations. This paper presents a graph-based model...

  3. Value Added Service and Service Quality from the Customer’s Perspective: An Empirical Investigation in Thai Telecommunication Industry

    Directory of Open Access Journals (Sweden)

    Saowanee Srikanjanarak

    2009-12-01

    Full Text Available Increasing global competition has led to an intensively competitive market among service providers. Several organizations have created and developed a variety of products or services; in particular the telecommunications industry has developed mobile phone services. Various value-added services linked to mobile phone services, such as communication, entertainment, information services and money transfer services have been intensively incorporated to sustain and serve the customer’s need, which in turn demands performance maximization. In service marketing literature, SERVQUAL and SERVPERF have been reported as failing to measure service quality in new industries such as the retail industry’s B2B service. Therefore, service quality models for the mobile phone service industry need to be further developed.Service quality models have placed little focus on value-added services and no research has yet operationalized the concept of value-added services in a service quality model from the customer’s perspective of the service industry. Hence, this paper aims to conceptualize a service quality model based on Gronroos’ Model, other exploratory research and the current market situation in the service context. A total of 998 structured questionnaires were distributed to pre-paid mobile phones users in nine provinces around Thailand. The results indicate four dimensions of service quality. The value-added services have shown a particularly high level of measurements of satisfaction. These findings reveal a meaningful insight into how customers perceive the value-added services offered by service providers. This will help managers to design an appropriate variety of service options that suit their customers and in turn may lead to the development of a long-term relationship with their organizations.

  4. An Online Solution of LiDAR Scan Matching Aided Inertial Navigation System for Indoor Mobile Mapping

    OpenAIRE

    Niu, Xiaoji; Yu, Tong; Tang, Jian; Chang, Le

    2017-01-01

    Multisensors (LiDAR/IMU/CAMERA) integrated Simultaneous Location and Mapping (SLAM) technology for navigation and mobile mapping in a GNSS-denied environment, such as indoor areas, dense forests, or urban canyons, becomes a promising solution. An online (real-time) version of such system can extremely extend its applications, especially for indoor mobile mapping. However, the real-time response issue of multisensors is a big challenge for an online SLAM system, due to the different sampling f...

  5. Supergravity one-loop corrections on AdS7 and AdS3, higher spins and AdS/CFT

    Directory of Open Access Journals (Sweden)

    Matteo Beccaria

    2015-03-01

    Full Text Available As was shown earlier, the one-loop correction in 10d supergravity on AdS5×S5 corresponds to the contributions to the vacuum energy and 4d boundary conformal anomaly which are minus the values for one N=4 Maxwell supermultiplet, thus reproducing the subleading term in the N2−1 coefficient in the dual SU(N SYM theory. We perform similar one-loop computations in 11d supergravity on AdS7×S4 and 10d supergravity on AdS3×S3×T4. In the AdS7 case we find that the corrections to the 6d conformal anomaly a-coefficient and the vacuum energy are again minus the ones for one (2,0 tensor multiplet, suggesting that the total a-anomaly coefficient for the dual (2,0 theory is 4N3−9/4N−7/4 and thus vanishes for N=1. In the AdS3 case the one-loop correction to the vacuum energy or 2d central charge turns out to be equal to that of one free (4,4 scalar multiplet, i.e. is c=+6. This reproduces the subleading term in the central charge c=6(Q1Q5+1 of the dual 2d CFT describing decoupling limit of D5–D1 system. We also present the expressions for the 6d a-anomaly coefficient and vacuum energy contributions of general-symmetry higher spin field in AdS7 and consider their application to tests of vectorial AdS/CFT with the boundary conformal 6d theory represented by free scalars, spinors or rank-2 antisymmetric tensors.

  6. Situational Effects on the Usage Intention of Mobile Games

    Science.gov (United States)

    Liang, Ting-Peng; Yeh, Yi-Hsuan

    As value-added services on mobile devices are developing rapidly, text messaging, multi-media messaging, music, video, games, GPS navigation, RFID, and mobile TV are all accessible from a single device. Mobile games that combine mobile communication with computer games are an emerging industry. The purpose of this research is to explore what situation factors may affect the intention to play mobile game. We propose a research model to fit the nature of mobile games and conducted an online survey to examine the effect of situational factors. The model integrates constructs in TAM and TRA. The findings are as follows. First, Subjective norm affects a user’s intention in using mobile games when a user has no other task. Second, perceived playfulness affects a user’s intention to use mobile games when the user has another task.

  7. Data dissemination in the wild: A testbed for high-mobility MANETs

    DEFF Research Database (Denmark)

    Vingelmann, Peter; Pedersen, Morten Videbæk; Heide, Janus

    2012-01-01

    This paper investigates the problem of efficient data dissemination in Mobile Ad hoc NETworks (MANETs) with high mobility. A testbed is presented; which provides a high degree of mobility in experiments. The testbed consists of 10 autonomous robots with mobile phones mounted on them. The mobile...... information, and the goal is to convey that information to all devices. A strategy is proposed that uses UDP broadcast transmissions and random linear network coding to facilitate the efficient exchange of information in the network. An application is introduced that implements this strategy on Nokia phones...

  8. Dense Breasts: Answers to Commonly Asked Questions

    Science.gov (United States)

    ... Cancer Prevention Genetics of Breast & Gynecologic Cancers Breast Cancer Screening Research Dense Breasts: Answers to Commonly Asked Questions What are dense breasts? Breasts contain glandular, connective, and fat tissue. Breast density is a term that describes the ...

  9. Configuring Mobile Commerce Portals for Business Success

    DEFF Research Database (Denmark)

    Dholakia, Nikhilesh; Rask, Morten

    2004-01-01

    -portals must attract and retain customers. Success in mobile portal markets will depend on dynamic strategies that blend elements of personalization, permission, and specification of content. This chapter reviews the key differences between traditional e-commerce and the emergent m-commerce. It reviews...... the core concepts of personalization, permission, and content specification as they apply to e-commerce and m-commerce. The chapter presents a framework for developing effective business strategies for developing and managing mobile portals. http://www.morten-rask.dk/2003c.htm......M-commerce entails transactions conducted via mobile telecommunications networks using communication, information, and payment devices such as mobile phones or palmtop units. Geographic positioning and location capabilities are also being added to such networks and devices. Rather than using...

  10. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed; Alouini, Mohamed-Slim

    2016-01-01

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission

  11. Hairy AdS solitons

    International Nuclear Information System (INIS)

    Anabalón, Andrés; Astefanesei, Dumitru; Choque, David

    2016-01-01

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  12. Hairy AdS solitons

    Energy Technology Data Exchange (ETDEWEB)

    Anabalón, Andrés, E-mail: andres.anabalon@uai.cl [Departamento de Ciencias, Facultad de Artes Liberales and Facultad de Ingeniería y Ciencias, Universidad Adolfo Ibáñez, Av. Padre Hurtado 750, Viña del Mar (Chile); Astefanesei, Dumitru, E-mail: dumitru.astefanesei@pucv.cl [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Choque, David, E-mail: brst1010123@gmail.com [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Universidad Técnica Federico Santa María, Av. España 1680, Valparaíso (Chile)

    2016-11-10

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  13. ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS – A SURVEY

    Directory of Open Access Journals (Sweden)

    K. Sankar

    2012-06-01

    Full Text Available Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in wireless communication. The performance of the medium access control (MAC scheme not only has a fairly significant end-result on the behaviour of the routing approach employed, but also on the energy consumption of the wireless network interface card (NIC. We investigate the inadequacies of the MAC schemes designed for ad hoc wireless networks in the context of power awareness herein. The topology changes due to uncontrollable factors such as node mobility, weather, interference, noise, as well as on controllable parameters such as transmission power and antenna direction results in significant amount of energy loss. Controlling rapid topology changes by minimizing the maximum transmission power used in ad hoc wireless networks, while still maintaining networks connectivity can prolong battery life and hence network lifetime considerably. In addition, we systematically explore the potential energy consumption pitfalls of non–power-based and power based routing schemes. We suggest a thorough energy-based performance survey of energy aware routing protocols for wireless mobile ad-hoc networks. We also present the statistical performance metrics measured by our simulations.

  14. A longitudinal study of change in falls risk and balance and mobility in healthy older people and people with Alzheimer disease.

    Science.gov (United States)

    Suttanon, Plaiwan; Hill, Keith D; Said, Catherine M; Dodd, Karen J

    2013-08-01

    The aim of this study was to determine the rate of change in falls risk and balance and mobility performance in people with Alzheimer disease (AD) compared with those of healthy older people over a 1-yr period. A 1-yr follow-up study of change in levels of falls risk, balance, and mobility performance in 15 community-dwelling older people with mild to moderate AD and 15 healthy age-matched older people was conducted. Each participant completed a comprehensive assessment of balance and mobility, falls and falls risk, and level of physical activity at baseline and 1 yr later. The rate of increase in the number of falls and risk of falling was greater in people with AD. The rate of deterioration on a number of balance and mobility measures was also significantly greater in people with AD compared with the healthy older people. People with mild to moderate AD have an increased rate of decline in falls risk, balance, and mobility over a 12-mo period compared with age-matched healthy older people. Given this increased rate of decline, intermittent review of falls, balance and mobility, and interventions to address identified contributory risk factors should be considered by health practitioners.

  15. Supervision de la sécurité pour des réseaux ad hoc mobiles : un système léger, robuste, et fiable de détection d'intrusion

    OpenAIRE

    Alattar , Mouhannad

    2013-01-01

    Mobile Ad hoc NETworks (referred to as MANETs) continue increasing their presence in our every day life. They become a corner stone in the commercial, the society, the military, the science, and even the next-generation applications. However, these networks mostly operate over open environments and are therefore vulnerable to a large body of threats. Traditional ways of securing networks relying on preventive techniques, e.g., firewall and encryption, are not sufficient and should henceforth ...

  16. A bandwidth-efficient service for local information dissemination in sparse to dense roadways.

    Science.gov (United States)

    Garcia-Lozano, Estrella; Campo, Celeste; Garcia-Rubio, Carlos; Cortes-Martin, Alberto; Rodriguez-Carrion, Alicia; Noriega-Vivas, Patricia

    2013-07-05

    Thanks to the research on Vehicular Ad Hoc Networks (VANETs), we will be able to deploy applications on roadways that will contribute to energy efficiency through a better planning of long trips. With this goal in mind, we have designed a gas/charging station advertising system, which takes advantage of the broadcast nature of the network. We have found that reducing the number of total sent packets is important, as it allows for a better use of the available bandwidth. We have designed improvements for a distance-based flooding scheme, so that it can support the advertising application with good results in sparse to dense roadway scenarios.

  17. A Bandwidth-Efficient Service for Local Information Dissemination in Sparse to Dense Roadways

    Directory of Open Access Journals (Sweden)

    Patricia Noriega-Vivas

    2013-07-01

    Full Text Available Thanks to the research on Vehicular Ad Hoc Networks (VANETs, we will be able to deploy applications on roadways that will contribute to energy efficiency through a better planning of long trips. With this goal in mind, we have designed a gas/charging station advertising system, which takes advantage of the broadcast nature of the network. We have found that reducing the number of total sent packets is important, as it allows for a better use of the available bandwidth. We have designed improvements for a distance-based flooding scheme, so that it can support the advertising application with good results in sparse to dense roadway scenarios.

  18. AdS solutions through transgression

    International Nuclear Information System (INIS)

    Donos, Aristomenis; Gauntlett, Jerome P.; Kim, Nakwoo

    2008-01-01

    We present new classes of explicit supersymmetric AdS 3 solutions of type IIB supergravity with non-vanishing five-form flux and AdS 2 solutions of D = 11 supergravity with electric four-form flux. The former are dual to two-dimensional SCFTs with (0,2) supersymmetry and the latter to supersymmetric quantum mechanics with two supercharges. We also investigate more general classes of AdS 3 solutions of type IIB supergravity and AdS 2 solutions of D = 11 supergravity which in addition have non-vanishing three-form flux and magnetic four-form flux, respectively. The construction of these more general solutions makes essential use of the Chern-Simons or 'transgression' terms in the Bianchi identity or the equation of motion of the field strengths in the supergravity theories. We construct infinite new classes of explicit examples and for some of the type IIB solutions determine the central charge of the dual SCFTs. The type IIB solutions with non-vanishing three-form flux that we construct include a two-torus, and after two T-dualities and an S-duality, we obtain new AdS 3 solutions with only the NS fields being non-trivial.

  19. Warm Dense Matter: An Overview

    International Nuclear Information System (INIS)

    Kalantar, D H; Lee, R W; Molitoris, J D

    2004-01-01

    This document provides a summary of the ''LLNL Workshop on Extreme States of Materials: Warm Dense Matter to NIF'' which was held on 20, 21, and 22 February 2002 at the Wente Conference Center in Livermore, CA. The warm dense matter regime, the transitional phase space region between cold material and hot plasma, is presently poorly understood. The drive to understand the nature of matter in this regime is sparking scientific activity worldwide. In addition to pure scientific interest, finite temperature dense matter occurs in the regimes of interest to the SSMP (Stockpile Stewardship Materials Program). So that obtaining a better understanding of WDM is important to performing effective experiments at, e.g., NIF, a primary mission of LLNL. At this workshop we examined current experimental and theoretical work performed at, and in conjunction with, LLNL to focus future activities and define our role in this rapidly emerging research area. On the experimental front LLNL plays a leading role in three of the five relevant areas and has the opportunity to become a major player in the other two. Discussion at the workshop indicated that the path forward for the experimental efforts at LLNL were two fold: First, we are doing reasonable baseline work at SPLs, HE, and High Energy Lasers with more effort encouraged. Second, we need to plan effectively for the next evolution in large scale facilities, both laser (NIF) and Light/Beam sources (LCLS/TESLA and GSI) Theoretically, LLNL has major research advantages in areas as diverse as the thermochemical approach to warm dense matter equations of state to first principles molecular dynamics simulations. However, it was clear that there is much work to be done theoretically to understand warm dense matter. Further, there is a need for a close collaboration between the generation of verifiable experimental data that can provide benchmarks of both the experimental techniques and the theoretical capabilities. The conclusion of this

  20. Cocoon: A lightweight opportunistic networking middleware for community-oriented smart mobile applications

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    Modern society is surrounded by an ample spectrum of smart mobile devices. This ubiquity forms a high potential for community-oriented opportunistic ad hoc networking applications. Nevertheless, today’s smart mobile devices such as smartphones, tablets, and wristbands are still onerous to

  1. Personalized Popular Blog Recommender Service for Mobile Applications

    Science.gov (United States)

    Tsai, Pei-Yun; Liu, Duen-Ren

    Weblogs have emerged as a new communication and publication medium on the Internet for diffusing the latest useful information. Providing value-added mobile services such as blog articles is increasingly important to attract mobile users to mobile commerce. There are, however, a tremendous number of blog articles, and mobile users generally have difficulty in browsing weblogs. Accordingly, providing mobile users with blog articles that suit their interests is an important issue. Very little research, however, focuses on this issue. In this work, we propose a Customized Content Service on a mobile device (m-CCS) to filter and push blog articles to mobile users. The m-CCS can predict the latest popular blog topics by forecasting the trend of time-sensitive popularity of weblogs. Furthermore, to meet the diversified interest of mobile users, m-CCS further analyzes users’ browsing logs to derive their interests, which are then used to recommend their preferred popular blog topics and articles. The prototype system of m-CCS demonstrates that the system can effectively recommend mobile users desirable blog articles with respect to both popularity and personal interests.

  2. Survival of density subpopulations of rabbit platelets: use of 51Cr-or 111In-labeled platelets to measure survival of least dense and most dense platelets concurrently

    International Nuclear Information System (INIS)

    Rand, M.L.; Packham, M.A.; Mustard, J.F.

    1983-01-01

    The origin of the density heterogeneity of platelets was studied by measuring the survival of density subpopulations of rabbit platelets separated by discontinuous Stractan density gradient centrifugation. When a total population of 51 Cr-labelled platelets was injected into recipient rabbits, the relative specific radioactivity of the most dense platelets decreased rapidly. In contrast, that of the least dense platelets had not changed 24 hr after injection, and then decreased slowly. To distinguish between the possibilities that most dense platelets are cleared from the circulation more quickly than least dense platelets or that platelets decrease in density as they age in the circulation, the concurrent survival of least dense and most dense platelets, labelled with either 51 Cr or 111 In-labelled total platelet populations, determined concurrently in the same rabbits, are identical, calculated from 1 hr values as 100%. However, the 1-hr recovery of 111 In-labelled platelets was slightly but significantly less than that of 51 Cr-labelled platelets. Therefore, researchers studied the survival of 51 Cr-labelled least dense and 111 In-labelled most dense platelets as well as that of 111 In-labelled least dense and 51 Cr-labelled most dense platelets. Mean 1-hr recovery of least dense platelets, labelled with either isotope (78% +/- 7%, SD) was similar to that of most dense platelets, labelled with either isotope (77% +/- 8%; SD). Mean survival of least dense platelets was 47.3 +/- 18.7 hr (SD), which was significantly less than that of most dense platelets (76.1 +/- 21.6 hr; SD) (p less than 0.0025). These results indicate that platelets decrease in buoyant density as they age in the circulation and that most dense platelets are enriched in young platelets, and least dense in old

  3. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  4. Informative television and mobility. News analysis of the most followed through twitter

    Directory of Open Access Journals (Sweden)

    Leire GÓMEZ RUBIO

    2016-12-01

    Full Text Available Social networks such as Facebook and Twitter, and mobile applications such as Periscope, Snapchat, Whatsapp, among others, are some of the emerging ways of communication and access to information in recent times, for both general users and professionals of the information. Technological advances and innovations derived mainly from the web 2.0 have added new screens to traditional media, so that the newspaper can not only be read, but now also can be seen and heard, while television, besides been seen and heard, also read. To this, mobility and portability is added, as demanded by users today, and in which the mobile screen has a prominent role and influence, especially because of social networks. This contribution describes which is the production and consumption of news that comes from the information provided by the principal generalist television channels in Spain through the most mobile social network, Twitter.

  5. Dense Deposit Disease Mimicking a Renal Small Vessel Vasculitis

    Science.gov (United States)

    Singh, Lavleen; Bhardwaj, Swati; Sinha, Aditi; Bagga, Arvind; Dinda, Amit

    2016-01-01

    Dense deposit disease is caused by fluid-phase dysregulation of the alternative complement pathway and frequently deviates from the classic membranoproliferative pattern of injury on light microscopy. Other patterns of injury described for dense deposit disease include mesangioproliferative, acute proliferative/exudative, and crescentic GN. Regardless of the histologic pattern, C3 glomerulopathy, which includes dense deposit disease and C3 GN, is defined by immunofluorescence intensity of C3c two or more orders of magnitude greater than any other immune reactant (on a 0–3 scale). Ultrastructural appearances distinguish dense deposit disease and C3 GN. Focal and segmental necrotizing glomerular lesions with crescents, mimicking a small vessel vasculitis such as ANCA-associated GN, are a very rare manifestation of dense deposit disease. We describe our experience with this unusual histologic presentation and distinct clinical course of dense deposit disease, discuss the pitfalls in diagnosis, examine differential diagnoses, and review the relevant literature. PMID:26361799

  6. Collaboration and decision making tools for mobile groups

    International Nuclear Information System (INIS)

    Abrahamyan, S.; Balyan, S.; Degtyarev, A.; Ter-Minasyan, H.

    2017-01-01

    Nowadays the use of distributed collaboration tools is widespread in many areas of people activity. But lack of mobility and certain equipment dependence create difficulties and decelerate development and integration of such technologies. Also, mobile technologies allow individuals to interact with each other without need of traditional office spaces and regardless of location. Hence, realization of special infrastructures on mobile platforms with the help of ad hoc wireless local networks could eliminate hardware attachment and be also useful in terms of scientific approach. Solutions from basic internet messengers to complex software for online collaboration equipment in large-scale workgroups are implementations of tools based on mobile infrastructures. Despite growth of mobile infrastructures, applied distributed solutions in group decision-making and e-collaboration are not common. In this article we propose software complex for real-time collaboration and decision-making based on mobile devices, describe its architecture and evaluate performance.

  7. Collaboration and decision making tools for mobile groups

    Science.gov (United States)

    Abrahamyan, Suren; Balyan, Serob; Ter-Minasyan, Harutyun; Degtyarev, Alexander

    2017-12-01

    Nowadays the use of distributed collaboration tools is widespread in many areas of people activity. But lack of mobility and certain equipment-dependency creates difficulties and decelerates development and integration of such technologies. Also mobile technologies allow individuals to interact with each other without need of traditional office spaces and regardless of location. Hence, realization of special infrastructures on mobile platforms with help of ad-hoc wireless local networks could eliminate hardware-attachment and be useful also in terms of scientific approach. Solutions from basic internet-messengers to complex software for online collaboration equipment in large-scale workgroups are implementations of tools based on mobile infrastructures. Despite growth of mobile infrastructures, applied distributed solutions in group decisionmaking and e-collaboration are not common. In this article we propose software complex for real-time collaboration and decision-making based on mobile devices, describe its architecture and evaluate performance.

  8. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  9. Mobility-Aware Modeling and Analysis of Dense Cellular Networks With $C$ -Plane/ $U$ -Plane Split Architecture

    KAUST Repository

    Ibrahim, Hazem; Elsawy, Hesham; Nguyen, Uyen Trang; Alouini, Mohamed-Slim

    2016-01-01

    The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number

  10. A Skeleton Based Programming Paradigm for Mobile Multi-Agents on Distributed Systems and Its Realization within the MAGDA Mobile Agents Platform

    Directory of Open Access Journals (Sweden)

    R. Aversa

    2008-01-01

    Full Text Available Parallel programming effort can be reduced by using high level constructs such as algorithmic skeletons. Within the MAGDA toolset, supporting programming and execution of mobile agent based distributed applications, we provide a skeleton-based parallel programming environment, based on specialization of Algorithmic Skeleton Java interfaces and classes. Their implementation include mobile agent features for execution on heterogeneous systems, such as clusters of WSs and PCs, and support reliability and dynamic workload balancing. The user can thus develop a parallel, mobile agent based application by simply specialising a given set of classes and methods and using a set of added functionalities.

  11. Studies on urban vehicular ad-hoc networks

    CERN Document Server

    Zhu, Hongzi

    2013-01-01

    With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing 'smart cities' and addressing many important transportation problems such as road safety, efficiency, and convenience.This brief provides an introduction to the large trace data set collected from thousands of taxis and buses in Shanghai, the largest metropolis in China. It also presents the challenges, design issues, performance modeling and evaluation of a wide spectrum of VANET research topics, ranging from realistic vehicular mobility models and opportunistic ro

  12. Development of the SoFAS (solid fats and added sugars) concept: the 2010 Dietary Guidelines for Americans.

    Science.gov (United States)

    Nicklas, Theresa A; O'Neil, Carol E

    2015-05-01

    The diets of most US children and adults are poor, as reflected by low diet quality scores, when compared with the recommendations of the Dietary Guidelines for Americans (DGAs). Contributing to these low scores is that most Americans overconsume solid fats, which may contain saturated fatty acids and added sugars; although alcohol consumption was generally modest, it provided few nutrients. Thus, the 2005 DGAs generated a new recommendation: to reduce intakes of solid fats, alcohol, and added sugars (SoFAAS). What precipitated the emergence of the new SoFAAS terminology was the concept of discretionary calories (a "calorie" is defined as the amount of energy needed to increase the temperature of 1 kg of water by 1°C), which were defined as calories consumed after an individual had met his or her recommended nutrient intakes while consuming fewer calories than the daily recommendation. A limitation with this concept was that additional amounts of nutrient-dense foods consumed beyond the recommended amount were also considered discretionary calories. The rationale for this was that if nutrient-dense foods were consumed beyond recommended amounts, after total energy intake was met then this constituted excess energy intake. In the 2010 DGAs, the terminology was changed to solid fats and added sugars (SoFAS); thus, alcohol was excluded because it made a minor contribution to overall intake and did not apply to children. The SoFAS terminology also negated nutrient-dense foods that were consumed in amounts above the recommendations for the specific food groups in the food patterns. The ambiguous SoFAS terminology was later changed to "empty calories" to reflect only those calories from solid fats and added sugars (and alcohol if consumed beyond moderate amounts). The purpose of this review is to provide an historical perspective on how the dietary recommendations went from SoFAAS to SoFAS and how discretionary calories went to empty calories between the 2005 and 2010

  13. Warped AdS3 black holes

    International Nuclear Information System (INIS)

    Anninos, Dionysios; Li Wei; Padi, Megha; Song Wei; Strominger, Andrew

    2009-01-01

    Three dimensional topologically massive gravity (TMG) with a negative cosmological constant -l -2 and positive Newton constant G admits an AdS 3 vacuum solution for any value of the graviton mass μ. These are all known to be perturbatively unstable except at the recently explored chiral point μl = 1. However we show herein that for every value of μl ≠ 3 there are two other (potentially stable) vacuum solutions given by SL(2,R) x U(1)-invariant warped AdS 3 geometries, with a timelike or spacelike U(1) isometry. Critical behavior occurs at μl = 3, where the warping transitions from a stretching to a squashing, and there are a pair of warped solutions with a null U(1) isometry. For μl > 3, there are known warped black hole solutions which are asymptotic to warped AdS 3 . We show that these black holes are discrete quotients of warped AdS 3 just as BTZ black holes are discrete quotients of ordinary AdS 3 . Moreover new solutions of this type, relevant to any theory with warped AdS 3 solutions, are exhibited. Finally we note that the black hole thermodynamics is consistent with the hypothesis that, for μl > 3, the warped AdS 3 ground state of TMG is holographically dual to a 2D boundary CFT with central charges c R -formula and c L -formula.

  14. Disentangling location-based advertising: The effects of location congruency and medium type on consumers' ad attention and brand choice

    NARCIS (Netherlands)

    Ketelaar, P.E.; Bernritter, S.F.; Riet, J.P. van 't; Hühn, A.E.; Woudenberg, T.J. van; Müller, B.C.N.; Janssen, L.

    2017-01-01

    Research on location-based advertising (LBA) suggests that the merits of LBA lie in the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, LBA consists of two underlying constructs: a mobile (vs. point-of-sales) advertising medium and location

  15. Disentangling location-based advertising: the effects of location congruency and medium type on consumers' ad attention and brand choice

    NARCIS (Netherlands)

    Ketelaar, P.E.; Bernritter, S.F.; van't Riet, J.; Hühn, A.E.; van Woudenberg, T.J.; Müller, B.C.N.; Janssen, L.

    2017-01-01

    Research on location-based advertising (LBA) suggests that the merits of LBA lie in the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, LBA consists of two underlying constructs: a mobile (vs. point-of-sales) advertising medium and location

  16. Disentangling location-based advertising : the effects of location congruency and medium type on consumers' ad attention and brand choice

    NARCIS (Netherlands)

    Ketelaar, Paul; Bernritter, Stefan; van 't Riet, Jonathan; Huhn, Arief Ernst; van Woudenberg, Thabo; Muller, Barbara; Janssen, Loes

    2017-01-01

    Research on location-based advertising (LBA) suggests that the merits of LBA lie in the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, LBA consists of two underlying constructs: a mobile (vs. point-of-sales) advertising medium and location

  17. Composite systems of dilute and dense couplings

    International Nuclear Information System (INIS)

    Raymond, J R; Saad, D

    2008-01-01

    Composite systems, where couplings are of two types, a combination of strong dilute and weak dense couplings of Ising spins, are examined through the replica method. The dilute and dense parts are considered to have independent canonical disordered or uniform bond distributions; mixing the models by variation of a parameter γ alongside inverse temperature β we analyse the respective thermodynamic solutions. We describe the variation in high temperature transitions as mixing occurs; in the vicinity of these transitions we exactly analyse the competing effects of the dense and sparse models. By using the replica symmetric ansatz and population dynamics we described the low temperature behaviour of mixed systems

  18. Mobile Health Approaches to Non-Communicable Diseases in ...

    African Journals Online (AJOL)

    Mobile Health Approaches to Non-Communicable Diseases in Rwanda ... child health, it would be cost-effective to leverage this infrastructure and adapt it for the NCD domain. .... gram currently exists in Rwanda that simultaneously ad-.

  19. Constitutive law of dense granular matter

    International Nuclear Information System (INIS)

    Hatano, Takahiro

    2010-01-01

    The frictional properties of dense granular matter under steady shear flow are investigated using numerical simulation. Shear flow tends to localize near the driving boundary unless the coefficient of restitution is close to zero and the driving velocity is small. The bulk friction coefficient is independent of shear rate in dense and slow flow, whereas it is an increasing function of shear rate in rapid flow. The coefficient of restitution affects the friction coefficient only in such rapid flow. Contrastingly, in dense and slow regime, the friction coefficient is independent of the coefficient of restitution and mainly determined by the elementary friction coefficient and the rotation of grains. It is found that the mismatch between the vorticity of flow and the angular frequency of grains plays a key role to the frictional properties of sheared granular matter.

  20. Dynamics of dense particle disks

    International Nuclear Information System (INIS)

    Araki, S.; Tremaine, S.; Toronto Univ., Canada)

    1986-01-01

    The present investigation of mechanical equilibrium and collisional transport processes in dense, differentially rotating particle disks is based on the Enskog (1922) theory of dense, hard sphere gases, with the single exception that the spheres are inelastic. The viscous instability suggested as a source of Saturn B ring structure does not arise in the models presented, although the ring may be subject to a phase transition analogous to the liquid-solid transition observed in molecular dynamics simulations of elastic hard spheres. In such a case, the ring would alternately exhibit zero-shear, or solid, and high shear, or liquid, zones. 29 references

  1. STRAW - An Integrated Mobility and Traffic Model for VANETs

    National Research Council Canada - National Science Library

    Choffnes, David R; Bustamante, Fabian E

    2005-01-01

    Ad-hoc wireless communication among highly dynamic, mobile nodes in a urban network is a critical capability for a wide range of important applications including automated vehicles, real-time traffic...

  2. Hawking radiation from AdS black holes

    International Nuclear Information System (INIS)

    Hubeny, Veronika E; Rangamani, Mukund; Marolf, Donald

    2010-01-01

    We study Hartle-Hawking-like states of quantum field theories on asymptotically AdS black hole backgrounds, with particular regard to the phase structure of interacting theories. By a suitable analytic continuation we show that the equilibrium dynamics of field theories on large asymptotically AdS black holes can be related to the low-temperature states of the same field theory on the AdS soliton (or pure AdS) background. This allows us to gain insight into Hartle-Hawking-like states on large-radius Schwarzschild- or rotating-AdS black holes. Furthermore, we exploit the AdS/CFT correspondence to explore the physics of strongly coupled large N theories on asymptotically AdS black holes. In particular, we exhibit a plausibly complete set of phases for the M2-brane world-volume superconformal field theory on a BTZ black hole background. Our analysis partially resolves puzzles previously raised in connection with Hawking radiation on large AdS black holes.

  3. Polarised Black Holes in AdS

    CERN Document Server

    Costa, Miguel S.; Oliveira, Miguel; Penedones, João; Santos, Jorge E.

    2016-05-03

    We consider solutions in Einstein-Maxwell theory with a negative cosmological constant that asymptote to global $AdS_{4}$ with conformal boundary $S^{2}\\times\\mathbb{R}_{t}$. At the sphere at infinity we turn on a space-dependent electrostatic potential, which does not destroy the asymptotic $AdS$ behaviour. For simplicity we focus on the case of a dipolar electrostatic potential. We find two new geometries: (i) an $AdS$ soliton that includes the full backreaction of the electric field on the $AdS$ geometry; (ii) a polarised neutral black hole that is deformed by the electric field, accumulating opposite charges in each hemisphere. For both geometries we study boundary data such as the charge density and the stress tensor. For the black hole we also study the horizon charge density and area, and further verify a Smarr formula. Then we consider this system at finite temperature and compute the Gibbs free energy for both $AdS$ soliton and black hole phases. The corresponding phase diagram generalizes the Hawkin...

  4. Finding dense locations in symbolic indoor tracking data

    DEFF Research Database (Denmark)

    Ahmed, Tanvir; Pedersen, Torben Bach; Lu, Hua

    2017-01-01

    presents two graph-based models for constrained and semi-constrained indoor movement, respectively, and then uses the models to map raw tracking records into mapping records that represent object entry and exit times in particular locations. Subsequently, an efficient indexing structure called Hierarchical...... Dense Location Time Index (HDLT-Index) is proposed for indexing the time intervals of the mapping table, along with index construction, query processing, and pruning techniques. The HDLT-Index supports very efficient aggregate point, interval, and duration queries as well as dense location queries......Finding the dense locations in large indoor spaces is very useful for many applications such as overloaded area detection, security control, crowd management, indoor navigation, and so on. Indoor tracking data can be enormous and are not immediately ready for finding dense locations. This paper...

  5. A tandem queueing model for delay analysis in disconnected ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; de Haan, Roland; Boucherie, Richardus J.; van Ommeren, Jan C.W.

    2007-01-01

    Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called opportunistic networking which exploits the mobility of the nodes by letting them operate as relays according to the

  6. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    La movilidad constante de las personas y la creciente necesidad de estar conectados en todo momento ha hecho de las redes vehiculares un área cuyo interés ha ido en aumento. La gran cantidad de vehículos que hay en la actualidad, y los avances tecnológicos han hecho de las redes vehiculares (VANETS, Vehicular Ad hoc Networks) un gran campo de investigación. Las redes vehiculares son un tipo especial de redes móviles ad hoc inalámbricas, las cuales, al igual que las redes MANET (Mobile Ad hoc ...

  7. Kinetic chemistry of dense interstellar clouds

    International Nuclear Information System (INIS)

    Graedel, T.E.; Langer, W.D.; Frerking, M.A.

    1982-01-01

    A detailed model of the time-dependent chemistry of dense interstellar clouds has been developed to study the dominant chemical processes in carbon and oxygen isotope fractionation, formation of nitrogen-containing molecules, evolution of product molecules as a function of cloud density and temperature, and other topics of interest. The full computation involves 328 individual reactions (expanded to 1067 to study carbon and oxygen isotope chemistry); photodegradation processes are unimportant in these dense clouds and are excluded

  8. Impact of Mobility-on-Demand on Traffic Congestion: Simulation-based Study

    OpenAIRE

    Fiedler, David; Čáp, Michal; Čertický, Michal

    2017-01-01

    The increasing use of private vehicles for transportation in cities results in a growing demand for parking space and road network capacity. In many densely populated urban areas, however, the capacity of existing infrastructure is insufficient and extremely difficult to expand. Mobility-on-demand systems have been proposed as a remedy to the problem of limited parking space because they are able to satisfy the existing transportation demand with fewer shared vehicles and consequently require...

  9. Built-In Device Orientation Sensors for Ad-Hoc Pairing and Spatial Awareness

    DEFF Research Database (Denmark)

    Grønbæk, Jens Emil; O'Hara, Kenton

    Mobile devices are equipped with multiple sensors. The ubiquity of these sensors is key in their ability to support in-the-wild application and use. Building on the ubiquity we look at how we can use this existing sensing infrastructure combined with user mediation to support ad-hoc sharing with ...

  10. Development of the SoFAS (Solid Fats and Added Sugars) Concept: The 2010 Dietary Guidelines for Americans123

    Science.gov (United States)

    Nicklas, Theresa A; O’Neil, Carol E

    2015-01-01

    The diets of most US children and adults are poor, as reflected by low diet quality scores, when compared with the recommendations of the Dietary Guidelines for Americans (DGAs). Contributing to these low scores is that most Americans overconsume solid fats, which may contain saturated fatty acids and added sugars; although alcohol consumption was generally modest, it provided few nutrients. Thus, the 2005 DGAs generated a new recommendation: to reduce intakes of solid fats, alcohol, and added sugars (SoFAAS). What precipitated the emergence of the new SoFAAS terminology was the concept of discretionary calories (a “calorie” is defined as the amount of energy needed to increase the temperature of 1 kg of water by 1°C), which were defined as calories consumed after an individual had met his or her recommended nutrient intakes while consuming fewer calories than the daily recommendation. A limitation with this concept was that additional amounts of nutrient-dense foods consumed beyond the recommended amount were also considered discretionary calories. The rationale for this was that if nutrient-dense foods were consumed beyond recommended amounts, after total energy intake was met then this constituted excess energy intake. In the 2010 DGAs, the terminology was changed to solid fats and added sugars (SoFAS); thus, alcohol was excluded because it made a minor contribution to overall intake and did not apply to children. The SoFAS terminology also negated nutrient-dense foods that were consumed in amounts above the recommendations for the specific food groups in the food patterns. The ambiguous SoFAS terminology was later changed to “empty calories” to reflect only those calories from solid fats and added sugars (and alcohol if consumed beyond moderate amounts). The purpose of this review is to provide an historical perspective on how the dietary recommendations went from SoFAAS to SoFAS and how discretionary calories went to empty calories between the 2005

  11. DESAIN ALGORITMA DAN SIMULASI ROUTING UNTUK GATEWAY AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Nixson Meok

    2009-12-01

    Full Text Available   Routing protocol to the wireless ad hoc networks is very needed in the communication process between some terminals, to send the data packet through one or several node(s to the destination address where the network typology is always changing. Many previous works that discussed about routing ad hoc both for manet (mobile ad hoc networks and wireless networks, but the emphasis have more focus on comparing the performance of several routing ad hoc. While in this work, there is a bulding of routing algorithm model to gateway in land to the nodes that analogized as a boat that move on the sea. With the assumption that the communication inter terminals to radio band of Very High Frequency, thus algorithm that built in the simulation based on the range gap of the HF frequency. The result of this simulation will be developed as the platform to implement the service development of multiuser communication

  12. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  13. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link...... optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm...

  14. Added Sugars and Cardiovascular Disease Risk in Children: A Scientific Statement From the American Heart Association.

    Science.gov (United States)

    Vos, Miriam B; Kaar, Jill L; Welsh, Jean A; Van Horn, Linda V; Feig, Daniel I; Anderson, Cheryl A M; Patel, Mahesh J; Cruz Munos, Jessica; Krebs, Nancy F; Xanthakos, Stavra A; Johnson, Rachel K

    2017-05-09

    Poor lifestyle behaviors are leading causes of preventable diseases globally. Added sugars contribute to a diet that is energy dense but nutrient poor and increase risk of developing obesity, cardiovascular disease, hypertension, obesity-related cancers, and dental caries. For this American Heart Association scientific statement, the writing group reviewed and graded the current scientific evidence for studies examining the cardiovascular health effects of added sugars on children. The available literature was subdivided into 5 broad subareas: effects on blood pressure, lipids, insulin resistance and diabetes mellitus, nonalcoholic fatty liver disease, and obesity. Associations between added sugars and increased cardiovascular disease risk factors among US children are present at levels far below current consumption levels. Strong evidence supports the association of added sugars with increased cardiovascular disease risk in children through increased energy intake, increased adiposity, and dyslipidemia. The committee found that it is reasonable to recommend that children consume ≤25 g (100 cal or ≈6 teaspoons) of added sugars per day and to avoid added sugars for children added sugars most likely can be safely consumed in low amounts as part of a healthy diet, few children achieve such levels, making this an important public health target. © 2017 American Heart Association, Inc.

  15. Prediction of a Densely Loaded Particle-Laden Jet using a Euler-Lagrange Dense Spray Model

    Science.gov (United States)

    Pakseresht, Pedram; Apte, Sourabh V.

    2017-11-01

    Modeling of a dense spray regime using an Euler-Lagrange discrete-element approach is challenging because of local high volume loading. A subgrid cluster of droplets can lead to locally high void fractions for the disperse phase. Under these conditions, spatio-temporal changes in the carrier phase volume fractions, which are commonly neglected in spray simulations in an Euler-Lagrange two-way coupling model, could become important. Accounting for the carrier phase volume fraction variations, leads to zero-Mach number, variable density governing equations. Using pressure-based solvers, this gives rise to a source term in the pressure Poisson equation and a non-divergence free velocity field. To test the validity and predictive capability of such an approach, a round jet laden with solid particles is investigated using Direct Numerical Simulation and compared with available experimental data for different loadings. Various volume fractions spanning from dilute to dense regimes are investigated with and without taking into account the volume displacement effects. The predictions of the two approaches are compared and analyzed to investigate the effectiveness of the dense spray model. Financial support was provided by National Aeronautics and Space Administration (NASA).

  16. Family Adjustment to Geographic Mobility: Military Families on the Move

    Science.gov (United States)

    1981-08-11

    military are the related topics of father absence and transcultural experiences. MOBILITY AND ITS EFFECTS ON CHILDREN Children in military families...c-ild experi- ences added stress due to geographic mobility, transcultural experi- ences, transient father absences, and early retirement of the...family, and that short-term crisis therapy was the ideal psychotherapeutic modality for treatment of military children. CONCLUSION In summary, there are

  17. Ultra High Intensity laser produced fast electron transport in under-dense and over-dense matter

    International Nuclear Information System (INIS)

    Manclossi, Mauro

    2006-01-01

    This thesis is related to inertial fusion research, and particularly concerns the approach to fast ignition, which is based on the use of ultra-intense laser pulses to ignite the thermonuclear fuel. Until now, the feasibility of this scheme has not been proven and depends on many fundamental aspects of the underlying physics, which are not yet fully understood and which are also very far from controls. The main purpose of this thesis is the experimental study of transport processes in the material over-dense (solid) and under-dense (gas jet) of a beam of fast electrons produced by pulse laser at a intensity of some 10 19 Wcm -2 . (author)

  18. Smart Agent Based Mobile Tutoring and Querying System

    Directory of Open Access Journals (Sweden)

    Suresh Sankaranarayanan

    2012-08-01

    Full Text Available With our busy schedules today and the rising cost of education there is a need to find a convenient and cost effective means of maximizing our educational/training experiences. New trends in the delivery/access of information are becoming more technology based in all areas of society with education being no exception. The ubiquitous use of mobile devices has led to a boom in m-commerce. Mobile devices provide many services in commercial environments such as mobile banking, mobile purchasing, mobile learning, etc. It is therefore fitting that we seek to use mobile devices as a platform in delivering our convenient and cost effective solution. The proposed agent based Mobile tutoring system seeks to provide a student with a rich learning experience that will provide them with the relevant reading material based on their stage of development which allows them to move at their own pace. The system will allow the user to be able to ask certain questions and get explanations as if they were interacting with a human tutor but with the added benefit of being able to do this anytime in any location via their mobile phone.

  19. Signcryption-Based Key Management for MANETs Applications in Mobile Commerce

    Institute of Scientific and Technical Information of China (English)

    LI Jingfeng; ZHU Yuefei; ZHANG Yajuan; PAN Heng

    2006-01-01

    Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.

  20. Influence of galactic arm scale dynamics on the molecular composition of the cold and dense ISM. I. Observed abundance gradients in dense clouds

    Science.gov (United States)

    Ruaud, M.; Wakelam, V.; Gratier, P.; Bonnell, I. A.

    2018-04-01

    Aim. We study the effect of large scale dynamics on the molecular composition of the dense interstellar medium during the transition between diffuse to dense clouds. Methods: We followed the formation of dense clouds (on sub-parsec scales) through the dynamics of the interstellar medium at galactic scales. We used results from smoothed particle hydrodynamics (SPH) simulations from which we extracted physical parameters that are used as inputs for our full gas-grain chemical model. In these simulations, the evolution of the interstellar matter is followed for 50 Myr. The warm low-density interstellar medium gas flows into spiral arms where orbit crowding produces the shock formation of dense clouds, which are held together temporarily by the external pressure. Results: We show that depending on the physical history of each SPH particle, the molecular composition of the modeled dense clouds presents a high dispersion in the computed abundances even if the local physical properties are similar. We find that carbon chains are the most affected species and show that these differences are directly connected to differences in (1) the electronic fraction, (2) the C/O ratio, and (3) the local physical conditions. We argue that differences in the dynamical evolution of the gas that formed dense clouds could account for the molecular diversity observed between and within these clouds. Conclusions: This study shows the importance of past physical conditions in establishing the chemical composition of the dense medium.

  1. String Theory on AdS Spaces

    NARCIS (Netherlands)

    de Boer, J.

    2000-01-01

    In these notes we discuss various aspects of string theory in AdS spaces. We briefly review the formulation in terms of Green-Schwarz, NSR, and Berkovits variables, as well as the construction of exact conformal field theories with AdS backgrounds. Based on lectures given at the Kyoto YITP Workshop

  2. Open strings on AdS2 branes

    International Nuclear Information System (INIS)

    Lee, Peter; Ooguri, Hirosi.; Park, Jongwon; Tannenhauser, Jonathan

    2001-01-01

    We study the spectrum of open strings on AdS 2 branes in AdS 3 in an NS-NS background, using the SL(2,R) WZW model. When the brane carries no fundamental string charge, the open string spectrum is the holomorphic square root of the spectrum of closed strings in AdS 3 . It contains short and long strings, and is invariant under spectral flow. When the brane carries fundamental string charge, the open string spectrum again contains short and long strings in all winding sectors. However, branes with fundamental string charge break half the spectral flow symmetry. This has different implications for short and long strings. As the fundamental string charge increases, the brane approaches the boundary of AdS 3 . In this limit, the induced electric field on the worldvolume reaches its critical value, producing noncommutative open string theory on AdS 2

  3. Quantum Control of Open Systems and Dense Atomic Ensembles

    Science.gov (United States)

    DiLoreto, Christopher

    Controlling the dynamics of open quantum systems; i.e. quantum systems that decohere because of interactions with the environment, is an active area of research with many applications in quantum optics and quantum computation. My thesis expands the scope of this inquiry by seeking to control open systems in proximity to an additional system. The latter could be a classical system such as metal nanoparticles, or a quantum system such as a cluster of similar atoms. By modelling the interactions between the systems, we are able to expand the accessible state space of the quantum system in question. For a single, three-level quantum system, I examine isolated systems that have only normal spontaneous emission. I then show that intensity-intensity correlation spectra, which depend directly on the density matrix of the system, can be used detect whether transitions share a common energy level. This detection is possible due to the presence of quantum interference effects between two transitions if they are connected. This effect allows one to asses energy level structure diagrams in complex atoms/molecules. By placing an open quantum system near a nanoparticle dimer, I show that the spontaneous emission rate of the system can be changed "on demand" by changing the polarization of an incident, driving field. In a three-level, Lambda system, this allows a qubit to both retain high qubit fidelity when it is operating, and to be rapidly initialized to a pure state once it is rendered unusable by decoherence. This type of behaviour is not possible in a single open quantum system; therefore adding a classical system nearby extends the overall control space of the quantum system. An open quantum system near identical neighbours in a dense ensemble is another example of how the accessible state space can be expanded. I show that a dense ensemble of atoms rapidly becomes disordered with states that are not directly excited by an incident field becoming significantly populated

  4. Dense chlorinated solvents and other DNAPLs in groundwater

    DEFF Research Database (Denmark)

    Broholm, K.

    1996-01-01

    Anmeldelse af Pankow,J.F. & Cherry,J.A.: Dense chlorinated solvents and other DNAPLs in groundwater. Waterloo Press, Portland, Oregon, USA, 1996......Anmeldelse af Pankow,J.F. & Cherry,J.A.: Dense chlorinated solvents and other DNAPLs in groundwater. Waterloo Press, Portland, Oregon, USA, 1996...

  5. Conical singularities in AdS space time

    International Nuclear Information System (INIS)

    Ferreira, Cristine Nunes

    2011-01-01

    Full text: In recent years, the study of conformal gauge theories from 10-D has been motivated by the AdS d+1 /CFT d correspondence, first conjectured by J. Maldacena. The aim of this work is to consider the d = 4 case by analysing the configuration of the N coincident D3 branes. In this context, the work shows that there is a duality between type IIB string theory in AdS 5 x S 5 and N = 4 SU(N) Super Yang-Mills Theory in the IR. The AdS 5 /CFT 4 correspondence brought also new approaches to the strong coupling problem in QCD. Nowadays, there is a whole line of works that focus on the low dimensional correspondence AdS 4 /CFT 3 , like the application to graphene and topological insulators, and the AdS 3 /CFT 2 correspondence, related with the entanglement entropy. In this work, we consider the vortex configuration solution to the AdS 4 and AdS 3 space-time. The most important motivation is to discuss the boundary theory resulting from these solutions. We have examined a straightforward approach to a holographic computation of the graphene and entanglement entropy in the presence of the conical singularity. After this analysis, we consider the scalar field in the bulk in the presence of this metrics and work out the compactification modes. Taking the holographic point of view, we study and discuss the resulting Green function. (author)

  6. Is dense codeswitching complex?

    NARCIS (Netherlands)

    Dorleijn, M.

    In this paper the question is raised to what extent dense code switching can be considered complex. Psycholinguistic experiments indicate that code switching involves cognitive costs, both in production and comprehension, a conclusion that could indicate that code switching is indeed complex. In

  7. 1991 US-Japan workshop on Nuclear Fusion in Dense Plasmas

    International Nuclear Information System (INIS)

    Ichimaru, S.; Tajima, T.

    1991-10-01

    The scientific areas covered at the Workshop may be classified into the following subfields: (1) basic theory of dense plasma physics and its interface with atomic physics and nuclear physics; (2) physics of dense z-pinches, ICF plasmas etc; (3) stellar interior plasmas; (4) cold fusion; and (5) other dense plasmas

  8. Extending Security-by-Contract with Quantitative Trust on Mobile Devices

    DEFF Research Database (Denmark)

    Costa, Gabriele; Dragoni, Nicola; Lazouski, Aliaksandr

    2010-01-01

    program our architecture updates the trust level associated with the contract provider. We also present a possible application of our framework in the scenario of a mobile application marketplace, e.g., Apple AppStore, Cydia, Android Market, that, nowadays, are considered as one of the most attractive e......Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present the an extension of S×C, called Security-by-Contract-with-Trust (S×C×T). Indeed, we enrich the S×C architecture by integrating a trust model and adding new modules......-commerce activity for both mobile application developers and industries of mobile devices. Since the number of applications increases, Mobile Applications Marketplace (MAMp) sets up recommendation systems that rank and highlight mobile applications by category, social activity, etc. The S×C×T framework we propose...

  9. Finding Hierarchical and Overlapping Dense Subgraphs using Nucleus Decompositions

    Energy Technology Data Exchange (ETDEWEB)

    Seshadhri, Comandur [The Ohio State Univ., Columbus, OH (United States); Pinar, Ali [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sariyuce, Ahmet Erdem [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Catalyurek, Umit [The Ohio State Univ., Columbus, OH (United States)

    2014-11-01

    Finding dense substructures in a graph is a fundamental graph mining operation, with applications in bioinformatics, social networks, and visualization to name a few. Yet most standard formulations of this problem (like clique, quasiclique, k-densest subgraph) are NP-hard. Furthermore, the goal is rarely to nd the \\true optimum", but to identify many (if not all) dense substructures, understand their distribution in the graph, and ideally determine a hierarchical structure among them. Current dense subgraph nding algorithms usually optimize some objective, and only nd a few such subgraphs without providing any hierarchy. It is also not clear how to account for overlaps in dense substructures. We de ne the nucleus decomposition of a graph, which represents the graph as a forest of nuclei. Each nucleus is a subgraph where smaller cliques are present in many larger cliques. The forest of nuclei is a hierarchy by containment, where the edge density increases as we proceed towards leaf nuclei. Sibling nuclei can have limited intersections, which allows for discovery of overlapping dense subgraphs. With the right parameters, the nuclear decomposition generalizes the classic notions of k-cores and k-trusses. We give provable e cient algorithms for nuclear decompositions, and empirically evaluate their behavior in a variety of real graphs. The tree of nuclei consistently gives a global, hierarchical snapshot of dense substructures, and outputs dense subgraphs of higher quality than other state-of-theart solutions. Our algorithm can process graphs with tens of millions of edges in less than an hour.

  10. Dense ceramic articles

    International Nuclear Information System (INIS)

    Cockbain, A.G.

    1976-01-01

    A method is described for the manufacture of articles of substantially pure dense ceramic materials, for use in severe environments. Si N is very suitable for use in such environments, but suffers from the disadvantage that it is not amenable to sintering. Some disadvantages of the methods normally used for making articles of Si N are mentioned. The method described comprises mixing a powder of the substantially pure ceramic material with an additive that promotes densification, and which is capable of nuclear transmutation into a gas when exposed to radiation, and hot pressing the mixture to form a billet. The billet is then irradiated to convert the additive into a gas which is held captive in the billet, and it is then subjected to a hot forging operation, during which the captive gas escapes and an article of substantially pure dense ceramic material is forged. The method is intended primarily for use for Si N, but may be applied to other ceramic materials. The additive may be Li or Be or their compounds, to the extent of at least 5 ppm and not more than 5% by weight. Irradiation is effected by proton or neutron bombardment. (UK)

  11. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    Science.gov (United States)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  12. Rayleigh-Taylor/gravitational instability in dense magnetoplasmas

    Energy Technology Data Exchange (ETDEWEB)

    Ali, S., E-mail: shahid.ali@ncp.edu.p [National Centre for Physics, Quaid-i-Azam University Campus, Islamabad (Pakistan); IPFN, Instituto Superior Tecnico, Av. Rovisco Pais, 1049-001 Lisboa (Portugal); Ahmed, Z. [COMSATS Institute of Information Technology, Department of Physics, Wah Campus (Pakistan); Mirza, Arshad M. [Theoretical Plasma Physics Group, Physics Department, Quaid-i-Azam University, Islamabad 45320 (Pakistan); Ahmad, I. [COMSATS Institute of Information Technology, Department of Physics, Islamabad Campus (Pakistan)

    2009-08-10

    The Rayleigh-Taylor instability is investigated in a nonuniform dense quantum magnetoplasma. For this purpose, a quantum hydrodynamical model is used for the electrons whereas the ions are assumed to be cold and classical. The dispersion relation for the Rayleigh-Taylor instability becomes modified with the quantum corrections associated with the Fermi pressure law and the quantum Bohm potential force. Numerically, it is found that the quantum speed and density gradient significantly modify the growth rate of RT instability. In a dense quantum magnetoplasma case, the linear growth rate of RT instability becomes significantly higher than its classical value and the modes are found to be highly localized. The present investigation should be useful in the studies of dense astrophysical magnetoplasmas as well as in laser-produced plasmas.

  13. Rayleigh-Taylor/gravitational instability in dense magnetoplasmas

    International Nuclear Information System (INIS)

    Ali, S.; Ahmed, Z.; Mirza, Arshad M.; Ahmad, I.

    2009-01-01

    The Rayleigh-Taylor instability is investigated in a nonuniform dense quantum magnetoplasma. For this purpose, a quantum hydrodynamical model is used for the electrons whereas the ions are assumed to be cold and classical. The dispersion relation for the Rayleigh-Taylor instability becomes modified with the quantum corrections associated with the Fermi pressure law and the quantum Bohm potential force. Numerically, it is found that the quantum speed and density gradient significantly modify the growth rate of RT instability. In a dense quantum magnetoplasma case, the linear growth rate of RT instability becomes significantly higher than its classical value and the modes are found to be highly localized. The present investigation should be useful in the studies of dense astrophysical magnetoplasmas as well as in laser-produced plasmas.

  14. Fast Solvers for Dense Linear Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kauers, Manuel [Research Institute for Symbolic Computation (RISC), Altenbergerstrasse 69, A4040 Linz (Austria)

    2008-10-15

    It appears that large scale calculations in particle physics often require to solve systems of linear equations with rational number coefficients exactly. If classical Gaussian elimination is applied to a dense system, the time needed to solve such a system grows exponentially in the size of the system. In this tutorial paper, we present a standard technique from computer algebra that avoids this exponential growth: homomorphic images. Using this technique, big dense linear systems can be solved in a much more reasonable time than using Gaussian elimination over the rationals.

  15. A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

    Directory of Open Access Journals (Sweden)

    Tryfonas Theo

    2011-01-01

    Full Text Available Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.

  16. OH megamasers: dense gas & the infrared radiation field

    Science.gov (United States)

    Huang, Yong; Zhang, JiangShui; Liu, Wei; Xu, Jie

    2018-06-01

    To investigate possible factors related to OH megamaser formation (OH MM, L_{H2O}>10L_{⊙}), we compiled a large HCN sample from all well-sampled HCN measurements so far in local galaxies and identified with the OH MM, OH kilomasers (L_{H2O}gas and the dense gas, respectively), we found that OH MM galaxies tend to have stronger HCN emission and no obvious difference on CO luminosity exists between OH MM and non-OH MM. This implies that OH MM formation should be related to the dense molecular gas, instead of the low-density molecular gas. It can be also supported by other facts: (1) OH MMs are confirmed to have higher mean molecular gas density and higher dense gas fraction (L_{HCN}/L_{CO}) than non-OH MMs. (2) After taking the distance effect into account, the apparent maser luminosity is still correlated with the HCN luminosity, while no significant correlation can be found at all between the maser luminosity and the CO luminosity. (3) The OH kMs tend to have lower values than those of OH MMs, including the dense gas luminosity and the dense gas fraction. (4) From analysis of known data of another dense gas tracer HCO^+, similar results can also be obtained. However, from our analysis, the infrared radiation field can not be ruled out for the OH MM trigger, which was proposed by previous works on one small sample (Darling in ApJ 669:L9, 2007). On the contrary, the infrared radiation field should play one more important role. The dense gas (good tracers of the star formation) and its surrounding dust are heated by the ultra-violet (UV) radiation generated by the star formation and the heating of the high-density gas raises the emission of the molecules. The infrared radiation field produced by the re-radiation of the heated dust in turn serves for the pumping of the OH MM.

  17. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    Science.gov (United States)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  18. Automated Motion Estimation for 2D Cine DENSE MRI

    Science.gov (United States)

    Gilliam, Andrew D.; Epstein, Frederick H.

    2013-01-01

    Cine displacement encoding with stimulated echoes (DENSE) is a magnetic resonance (MR) method that directly encodes tissue displacement into MR phase images. This technique has successfully interrogated many forms of tissue motion, but is most commonly used to evaluate cardiac mechanics. Currently, motion analysis from cine DENSE images requires manually delineated anatomical structures. An automated analysis would improve measurement throughput, simplify data interpretation, and potentially access important physiological information during the MR exam. In this article, we present the first fully automated solution for the estimation of tissue motion and strain from 2D cine DENSE data. Results using both simulated and human cardiac cine DENSE data indicate good agreement between the automated algorithm and the standard semi-manual analysis method. PMID:22575669

  19. Making Mobile Learning Work: Student Perceptions and Implementation Factors

    Directory of Open Access Journals (Sweden)

    Sharon W. Tabor

    2016-06-01

    Full Text Available Mobile devices are the constant companions of technology users of all ages. Studies show, however, that making calls is a minimal part of our engagement with today’s smart phones and that even texting has fallen off, leaving web browsing, gaming, and social media as top uses. A cross-disciplinary group of faculty at our university came together in the mLearning Scholars group to study the potential for using mobile devices for student learning. The group met bi-weekly throughout a semester and shared thoughts, ideas, resources, and examples, while experimenting with mobile learning activities in individual classes. This paper summarizes student perceptions and adoption intent for using mobile devices for learning, and discusses implementation issues for faculty in adding mobile learning to a college course. Outcomes reflect that mobile learning adoption is not a given, and students need help in using and understanding the value in using personal devices for learning activities.

  20. Globally regular instability of AdS_3

    OpenAIRE

    Bizon, P.; Jałmużna, J.

    2013-01-01

    We consider three-dimensional AdS gravity minimally coupled to a massless scalar field and study numerically the evolution of small smooth circularly symmetric perturbations of the $AdS_3$ spacetime. As in higher dimensions, for a large class of perturbations, we observe a turbulent cascade of energy to high frequencies which entails instability of $AdS_3$. However, in contrast to higher dimensions, the cascade cannot be terminated by black hole formation because small perturbations have ener...

  1. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  2. Quantum Dense Coding About a Two-Qubit Heisenberg XYZ Model

    Science.gov (United States)

    Xu, Hui-Yun; Yang, Guo-Hui

    2017-09-01

    By taking into account the nonuniform magnetic field, the quantum dense coding with thermal entangled states of a two-qubit anisotropic Heisenberg XYZ chain are investigated in detail. We mainly show the different properties about the dense coding capacity ( χ) with the changes of different parameters. It is found that dense coding capacity χ can be enhanced by decreasing the magnetic field B, the degree of inhomogeneity b and temperature T, or increasing the coupling constant along z-axis J z . In addition, we also find χ remains the stable value as the change of the anisotropy of the XY plane Δ in a certain temperature condition. Through studying different parameters effect on χ, it presents that we can properly turn the values of B, b, J z , Δ or adjust the temperature T to obtain a valid dense coding capacity ( χ satisfies χ > 1). Moreover, the temperature plays a key role in adjusting the value of dense coding capacity χ. The valid dense coding capacity could be always obtained in the lower temperature-limit case.

  3. The role of knowledge management in mobile marketing

    Directory of Open Access Journals (Sweden)

    Łukowski, Wojciech

    2017-09-01

    Full Text Available Mobile marketing is one of the fastest growing channels of marketing information. Mobile terminal devices and mobile networks allow for mass personalisation of content transmitted to individual recipients thereby facilitating recipient segmentation within one-to-one marketing. Mobile marketing means using interactive wireless media to provide clients with personal information with precise profiling using geo-location, time, and often associated with their interests, sex or other attributes, promoting goods, services and ideas, thus, also generating added value for all the process participants. Mobile media has completely transformed the present concept of marketing campaigns and has opened up a wide array of new opportunities for advertisers. They have also brought new challenges for companies using CRM and KM. In a study involving a group of students, efforts were made to determine the factors which are likely to contribute to finding the answer to the question of how to effectively run mobile marketing campaigns and what should be taken into account when using the tools and knowledge offered by knowledge management and customer relationship management.

  4. 5G: rethink mobile communications for 2020+.

    Science.gov (United States)

    Chih-Lin, I; Han, Shuangfeng; Xu, Zhikun; Sun, Qi; Pan, Zhengang

    2016-03-06

    The 5G network is anticipated to meet the challenging requirements of mobile traffic in the 2020s, which are characterized by super high data rate, low latency, high mobility, high energy efficiency and high traffic density. This paper provides an overview of China Mobile's 5G vision and potential solutions. Three key characteristics of 5G are analysed, i.e. super fast, soft and green. The main 5G R&D themes are further elaborated, which include five fundamental rethinkings of the traditional design methodologies. The 5G network design considerations are also discussed, with cloud radio access network, ultra-dense network, software defined network and network function virtualization examined as key potential solutions towards a green and soft 5G network. The paradigm shift to user-centric network operation from the traditional cell-centric operation is also investigated, where the decoupled downlink and uplink, control and data, and adaptive multiple connections provide sufficient means to achieve a user-centric 5G network with 'no more cells'. The software defined air interface is investigated under a uniform framework and can adaptively adapt the parameters to well satisfy various requirements in different 5G scenarios. © 2016 The Author(s).

  5. Manifestly T-dual formulation of AdS space

    International Nuclear Information System (INIS)

    Hatsuda, Machiko; Kamimura, Kiyoshi; Siegel, Warren

    2017-01-01

    We present a manifestly T-dual formulation of curved spaces such as an AdS space. For group manifolds related by the orthogonal vielbein fields the three form H=dB in the doubled space is universal at least locally. We construct an affine nondegenerate doubled bosonic AdS algebra to define the AdS space with the Ramond-Ramond flux. The non-zero commutator of the left and right momenta leads to that the left momentum is in an AdS space while the right momentum is in a dS space. Dimensional reduction constraints and the physical AdS algebra are shown to preserve all the doubled coordinates.

  6. Manifestly T-dual formulation of AdS space

    Energy Technology Data Exchange (ETDEWEB)

    Hatsuda, Machiko [Physics Division, Faculty of Medicine, Juntendo University,Chiba 270-1695 (Japan); KEK Theory Center, High Energy Accelerator Research Organization,Tsukuba, Ibaraki 305-0801 (Japan); Kamimura, Kiyoshi [Physics Division, Faculty of Medicine, Juntendo University,Chiba 270-1695 (Japan); Siegel, Warren [C.N. Yang Institute for Theoretical Physics, Stony Brook University,Stony Brook, NY 11794-3840 (United States)

    2017-05-12

    We present a manifestly T-dual formulation of curved spaces such as an AdS space. For group manifolds related by the orthogonal vielbein fields the three form H=dB in the doubled space is universal at least locally. We construct an affine nondegenerate doubled bosonic AdS algebra to define the AdS space with the Ramond-Ramond flux. The non-zero commutator of the left and right momenta leads to that the left momentum is in an AdS space while the right momentum is in a dS space. Dimensional reduction constraints and the physical AdS algebra are shown to preserve all the doubled coordinates.

  7. Comparative effectiveness of combined digital mammography and tomosynthesis screening for women with dense breasts.

    Science.gov (United States)

    Lee, Christoph I; Cevik, Mucahit; Alagoz, Oguzhan; Sprague, Brian L; Tosteson, Anna N A; Miglioretti, Diana L; Kerlikowske, Karla; Stout, Natasha K; Jarvik, Jeffrey G; Ramsey, Scott D; Lehman, Constance D

    2015-03-01

    To evaluate the effectiveness of combined biennial digital mammography and tomosynthesis screening, compared with biennial digital mammography screening alone, among women with dense breasts. An established, discrete-event breast cancer simulation model was used to estimate the comparative clinical effectiveness and cost-effectiveness of biennial screening with both digital mammography and tomosynthesis versus digital mammography alone among U.S. women aged 50-74 years with dense breasts from a federal payer perspective and a lifetime horizon. Input values were estimated for test performance, costs, and health state utilities from the National Cancer Institute Breast Cancer Surveillance Consortium, Medicare reimbursement rates, and medical literature. Sensitivity analyses were performed to determine the implications of varying key model parameters, including combined screening sensitivity and specificity, transient utility decrement of diagnostic work-up, and additional cost of tomosynthesis. For the base-case analysis, the incremental cost per quality-adjusted life year gained by adding tomosynthesis to digital mammography screening was $53 893. An additional 0.5 deaths were averted and 405 false-positive findings avoided per 1000 women after 12 rounds of screening. Combined screening remained cost-effective (less than $100 000 per quality-adjusted life year gained) over a wide range of incremental improvements in test performance. Overall, cost-effectiveness was most sensitive to the additional cost of tomosynthesis. Biennial combined digital mammography and tomosynthesis screening for U.S. women aged 50-74 years with dense breasts is likely to be cost-effective if priced appropriately (up to $226 for combined examinations vs $139 for digital mammography alone) and if reported interpretive performance metrics of improved specificity with tomosynthesis are met in routine practice.

  8. Photons in dense nuclear matter: Random-phase approximation

    Science.gov (United States)

    Stetina, Stephan; Rrapaj, Ermal; Reddy, Sanjay

    2018-04-01

    We present a comprehensive and pedagogic discussion of the properties of photons in cold and dense nuclear matter based on the resummed one-loop photon self-energy. Correlations among electrons, muons, protons, and neutrons in β equilibrium that arise as a result of electromagnetic and strong interactions are consistently taken into account within the random phase approximation. Screening effects, damping, and collective excitations are systematically studied in a fully relativistic setup. Our study is relevant to the linear response theory of dense nuclear matter, calculations of transport properties of cold dense matter, and investigations of the production and propagation of hypothetical vector bosons such as the dark photons.

  9. Collective dynamics in dense fluid mixtures

    International Nuclear Information System (INIS)

    Sinha, S.

    1992-01-01

    This thesis deals with the short wavelength collective dynamics of dense binary fluid mixtures. The analysis shows that at the level of linearized generalized hydrodynamics, the longitudinal modes of the system separates essentially into two parts - one involves the coupling of partial density fluctuations of the two species and the other involves coupling of longitudinal momentum and temperature fluctuations. The authors have shown that the coupling of longitudinal momentum and temperature fluctuations leads to an adequate description of sound propagation in such systems. In particular, they show that structural disorder controls the trapping of sound waves in dense mixtures. The coupling of the partial density fluctuations of the two species leads to a simple description of the partial dynamic structure factors. The results are in agreement with the molecular dynamics simulations of soft sphere mixtures. The partial density fluctuations are the slowest decaying fluctuations on molecular length scales and it turns out that nonlinear coupling of these slow modes leads to important corrections to the long time behavior of the time correlation functions determining the shear viscosity in dense mixtures

  10. Simulation of dense colloids

    NARCIS (Netherlands)

    Herrmann, H.J.; Harting, J.D.R.; Hecht, M.; Ben-Naim, E.

    2008-01-01

    We present in this proceeding recent large scale simulations of dense colloids. On one hand we simulate model clay consisting of nanometric aluminum oxide spheres in water using realistic DLVO potentials and a combination of MD and SRD. We find pronounced cluster formation and retrieve the shear

  11. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  12. Atoms in dense plasmas

    International Nuclear Information System (INIS)

    More, R.M.

    1987-01-01

    This paper covers some aspects of the theory of atomic processes in dense plasmas. Because the topic is very broad, a few general rules which give useful guidance about the typical behavior of dense plasmas have been selected. These rules are illustrated by semiclassical estimates, scaling laws and appeals to more elaborate calculations. Included in the paper are several previously unpublished results including a new mechanism for electron-ion heat exchange (section II), and an approximate expression for oscillator-strengths of highly charged ions (section V). However the main emphasis is not upon practical formulas but rather on questions of fundamental theory, the structural ingredients which must be used in building a model for plasma events. What are the density effects and how does one represent them? Which are most important? How does one identify an incorrect theory? The general rules help to answer these questions. 106 references, 23 figures, 2 tables

  13. Suprathermal viscosity of dense matter

    International Nuclear Information System (INIS)

    Alford, Mark; Mahmoodifar, Simin; Schwenzer, Kai

    2010-01-01

    Motivated by the existence of unstable modes of compact stars that eventually grow large, we study the bulk viscosity of dense matter, taking into account non-linear effects arising in the large amplitude regime, where the deviation μ Δ of the chemical potentials from chemical equilibrium fulfills μ Δ > or approx. T. We find that this supra-thermal bulk viscosity can provide a potential mechanism for saturating unstable modes in compact stars since the viscosity is strongly enhanced. Our study confirms previous results on strange quark matter and shows that the suprathermal enhancement is even stronger in the case of hadronic matter. We also comment on the competition of different weak channels and the presence of suprathermal effects in various color superconducting phases of dense quark matter.

  14. Mixed-symmetry fields in AdS(5), conformal fields, and AdS/CFT

    Energy Technology Data Exchange (ETDEWEB)

    Metsaev, R.R. [Department of Theoretical Physics, P.N. Lebedev Physical Institute,Leninsky prospect 53, Moscow 119991 (Russian Federation)

    2015-01-15

    Mixed-symmetry arbitrary spin massive, massless, and self-dual massive fields in AdS(5) are studied. Light-cone gauge actions for such fields leading to decoupled equations of motion are constructed. Light-cone gauge formulation of mixed-symmetry anomalous conformal currents and shadows in 4d flat space is also developed. AdS/CFT correspondence for normalizable and non-normalizable modes of mixed-symmetry AdS fields and the respective boundary mixed-symmetry anomalous conformal currents and shadows is studied. We demonstrate that the light-cone gauge action for massive mixed-symmetry AdS field evaluated on solution of the Dirichlet problem amounts to the light-cone gauge 2-point vertex of mixed-symmetry anomalous shadow. Also we show that UV divergence of the action for mixed-symmetry massive AdS field with some particular value of mass parameter evaluated on the Dirichlet problem amounts to the action of long mixed-symmetry conformal field, while UV divergence of the action for mixed-symmetry massless AdS field evaluated on the Dirichlet problem amounts to the action of short mixed-symmetry conformal field. We speculate on string theory interpretation of a model which involves short low-spin conformal fields and long higher-spin conformal fields.

  15. Coalescence preference in dense packing of bubbles

    Science.gov (United States)

    Kim, Yeseul; Gim, Bopil; Gim, Bopil; Weon, Byung Mook

    2015-11-01

    Coalescence preference is the tendency that a merged bubble from the contact of two original bubbles (parent) tends to be near to the bigger parent. Here, we show that the coalescence preference can be blocked by densely packing of neighbor bubbles. We use high-speed high-resolution X-ray microscopy to clearly visualize individual coalescence phenomenon which occurs in micro scale seconds and inside dense packing of microbubbles with a local packing fraction of ~40%. Previous theory and experimental evidence predict a power of -5 between the relative coalescence position and the parent size. However, our new observation for coalescence preference in densely packed microbubbles shows a different power of -2. We believe that this result may be important to understand coalescence dynamics in dense packing of soft matter. This work (NRF-2013R1A22A04008115) was supported by Mid-career Researcher Program through NRF grant funded by the MEST and also was supported by Ministry of Science, ICT and Future Planning (2009-0082580) and by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry and Education, Science and Technology (NRF-2012R1A6A3A04039257).

  16. Live event experiences - Interactive UHDTV on mobile devices

    NARCIS (Netherlands)

    Niamut, O.A.; Thomas, G.A.; Thomas, E.D.R.; Brandenburg, R. van; D'Acunto, L.; Gregory-Clarke, R.

    2014-01-01

    This paper reports on the latest developments in tiled streaming. As an extension of HTTP adaptive streaming, it retains all the benefits of this streaming technology, while adding the potential of interaction when UHDTV is consumed on mobile devices. In particular, we discuss the underlying

  17. SMS service from your GSM mobile phone

    CERN Multimedia

    IT Department

    2009-01-01

    The exchange of SMS (Short Message Service) messages is a very popular application of GSM mobile services. However, the use of the application with a CERN subscription is subject to certain conditions: First of all, only text messages can be sent and received with a CERN GSM subscription. These messages are limited to 160 characters. MMS (Multimedia Message Service) messages, which consist in attaching pictures, videos or sounds to a message, are not supported by the current CERN mobile network configuration. In addition, value-added SMS or SMS premium messages (e.g. messages to short numbers involving extra charges) are not permitted. Before sending a message, you must first record the number of the message centre (+41765980000) in your mobile. In principle, this configuration setting is automatically applied to all standard GSM mobile phones when they are issued. To send a message to another GSM user, you must of course enter his or her GSM number. This number must be e...

  18. Reconfigurable Robust Routing for Mobile Outreach Network

    Science.gov (United States)

    Lin, Ching-Fang

    2010-01-01

    The Reconfigurable Robust Routing for Mobile Outreach Network (R3MOO N) provides advanced communications networking technologies suitable for the lunar surface environment and applications. The R3MOON techn ology is based on a detailed concept of operations tailored for luna r surface networks, and includes intelligent routing algorithms and wireless mesh network implementation on AGNC's Coremicro Robots. The product's features include an integrated communication solution inco rporating energy efficiency and disruption-tolerance in a mobile ad h oc network, and a real-time control module to provide researchers an d engineers a convenient tool for reconfiguration, investigation, an d management.

  19. Lorentzian AdS, Wormholes and Holography

    CERN Document Server

    Arias, Raul E; Silva, Guillermo A

    2011-01-01

    We investigate the structure of two point functions for the QFT dual to an asymptotically Lorentzian AdS-wormhole. The bulk geometry is a solution of 5-dimensional second order Einstein Gauss Bonnet gravity and causally connects two asymptotically AdS space times. We revisit the GKPW prescription for computing two-point correlation functions for dual QFT operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values phi_0^\\pm at each of the two asymptotic AdS regions, along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O^\\pm and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom leaving at each boundary. The AdS_(1+1) geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a ...

  20. Final report for the mobile node authentication LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Lanzone, Andrew J.

    2005-09-01

    In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

  1. Dense Output for Strong Stability Preserving Runge–Kutta Methods

    KAUST Repository

    Ketcheson, David I.; Loczi, Lajos; Jangabylova, Aliya; Kusmanov, Adil

    2016-01-01

    We investigate dense output formulae (also known as continuous extensions) for strong stability preserving (SSP) Runge–Kutta methods. We require that the dense output formula also possess the SSP property, ideally under the same step

  2. Nonlinear realization of supersymmetric AdS space isometries

    International Nuclear Information System (INIS)

    Clark, T. E.; Love, S. T.

    2006-01-01

    The isometries of AdS 5 space and supersymmetric AdS 5 xS 1 space are nonlinearly realized on four-dimensional Minkowski space. The resultant effective actions in terms of the Nambu-Goldstone modes are constructed. The dilatonic mode governing the motion of the Minkowski space probe brane into the covolume of supersymmetric AdS 5 space is found to be unstable and the bulk of the AdS 5 space is unable to sustain the brane. No such instability appears in the nonsupersymmetric case

  3. Mobile Context Toolbox - An Extensible Context Framework for the Maemo Platform

    DEFF Research Database (Denmark)

    Stopczynski, Arkadiusz; Larsen, Jakob Eg; Skomial, Lukasz

    2011-01-01

    In this paper we describe an open framework utilizing sensors and application data on the Maemo mobile platform enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new hardware and software sensors and features to be added...... to the context framework. We present initial results from in-the-wild experiments where contextual data was acquired using the tool. In the experiments 6 participants were using a Nokia N900 mobile phone continuously with a logger application for an average of 33 days. The study has provided valuable insights...

  4. LinkMind: link optimization in swarming mobile sensor networks.

    Science.gov (United States)

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  5. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Trung Dung Ngo

    2011-08-01

    Full Text Available A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  6. Effect of AOT Microemulsion Composition on the Hydrodynamic Diameter and Electrophoretic Mobility of Titanium Oxide Nanoparticles

    Science.gov (United States)

    Shaparenko, N. O.; Beketova, D. I.; Demidova, M. G.; Bulavchenko, A. I.

    2018-05-01

    The hydrodynamic diameter and electrophoretic mobility of titania nanoparticles in AOT microemulsions are studied depending on their water content (from 0 to 1.5 vol %), chloroform content in n-decane-chloroform mixture (from 0 to 30 vol %) and temperature (from 0 to 60°C). Considerable changes in diameter (from 20 to 400 nm) are detected upon adding water to the microemulsion. The electrophoretic mobility grows by 2-3 times upon adding chloroform, or as the temperature falls. The observed features allow us to halve the time of electrophoretic concentration for 140 nm TiO2 nanoparticles, and to concentrate 14 nm nanoparticles that do not exhibit electrophoretic mobility in the absence of chloroform.

  7. Modelling dense relational data

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2012-01-01

    they are not naturally suited for kernel K-means. We propose a generative Bayesian model for dense matrices which generalize kernel K-means to consider off-diagonal interactions in matrices of interactions, and demonstrate its ability to detect structure on both artificial data and two real data sets....

  8. A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Niranjan Kumar Ray

    2016-01-01

    Full Text Available We proposed an energy conservation technique called Location Based Topology Control with Sleep Scheduling for ad hoc networks. It uses the feature of both topology control approach and power management approach. Like the topology control approach, it attempts to reduce the transmission power of a node, which is determined from its neighborhood location information. A node goes to sleep state based on the traffic condition as that of power management approach. In the proposed scheme, a node goes to sleep state only when its absence does not create local partition in its neighborhood. We preformed extensive simulation to compare the proposed scheme with existing ones. Simulation results show that the energy consumption is lower with increase in the network lifetime and higher throughput in the proposed scheme.

  9. Enabling Co-located Learning over Mobile Ad Hoc P2P with LightPeers

    DEFF Research Database (Denmark)

    Christensen, Bent Guldbjerg; Kristensen, Mads Darø; Hansen, Frank Allan

    2008-01-01

    This paper presents LightPeers – a new mobile P2P framework specifically tailored for use in a nomadic learning environment. A set of key requirements for the framework is identified based on nomadic learning, and these requirements are used as outset for designing and implementing the architectu...

  10. Non-relativistic AdS branes and Newton-Hooke superalgebra

    International Nuclear Information System (INIS)

    Sakaguchi, Makoto; Yoshida, Kentaroh

    2006-01-01

    We examine a non-relativistic limit of D-branes in AdS 5 x S 5 and M-branes in AdS 4/7 x S 7/4 . First, Newton-Hooke superalgebras for the AdS branes are derived from AdS x S superalgebras as Inoenue-Wigner contractions. It is shown that the directions along which the AdS-brane worldvolume extends are restricted by requiring that the isometry on the AdS-brane worldvolume and the Lorentz symmetry in the transverse space naturally extend to the super-isometry. We also derive Newton-Hooke superalgebras for pp-wave branes and show that the directions along which a brane worldvolume extends are restricted. Then the Wess-Zumino terms of the AdS branes are derived by using the Chevalley-Eilenberg cohomology on the super-AdS x S algebra, and the non-relativistic limit of the AdS-brane actions is considered. We show that the consistent limit is possible for the following branes: Dp (even,even) for p = 1 mod 4 and Dp (odd,odd) for p = 3 mod 4 in AdS 5 x S 5 , and M2 (0,3), M2 (2,1), M5 (1,5) and M5 (3,3) in AdS 4 x S 7 and S 4 x AdS 7 . We furthermore present non-relativistic actions for the AdS branes

  11. Ab initio calculation of the zero-point energy in dense hydrogen

    Energy Technology Data Exchange (ETDEWEB)

    Takezawa, Tomoki [Division of Materials Physics, Graduate School of Engineering Science, Osaka University, Toyonaka, Osaka 560-8531 (Japan); Nagara, Hitose [Division of Materials Physics, Graduate School of Engineering Science, Osaka University, Toyonaka, Osaka 560-8531 (Japan); Nagao, Kazutaka [Laboratory of Atomic and Solid State Physics, Cornel University, Ithaca, NY (United States)

    2002-11-11

    We have studied the vibrational modes and their frequencies in both atomic and molecular phases of dense hydrogen to find the stable structures and evaluated the zero-point energies (ZPEs) and the effect on molecular dissociation. The most probable structure in the atomic phase is Cs IV whose vibrational modes have real frequencies over the whole Brillouin zone. And the structure in the molecular phase is very close to Cmca, whose vibrational modes with imaginary frequencies work as guides to the stable structure. Our estimates of the ZPE are very close to those of Kagan et al (Kagan Yu, Pushkarev V V and Kholas A 1977 Sov. Phys.-JETP 46 511). Adding the ZPE to the static energy, we estimated its effect on the pressure of the molecular dissociation. The reduction of the dissociation pressure due to the inclusion of the ZPE becomes over 100 GPa.

  12. Ab initio calculation of the zero-point energy in dense hydrogen

    International Nuclear Information System (INIS)

    Takezawa, Tomoki; Nagara, Hitose; Nagao, Kazutaka

    2002-01-01

    We have studied the vibrational modes and their frequencies in both atomic and molecular phases of dense hydrogen to find the stable structures and evaluated the zero-point energies (ZPEs) and the effect on molecular dissociation. The most probable structure in the atomic phase is Cs IV whose vibrational modes have real frequencies over the whole Brillouin zone. And the structure in the molecular phase is very close to Cmca, whose vibrational modes with imaginary frequencies work as guides to the stable structure. Our estimates of the ZPE are very close to those of Kagan et al (Kagan Yu, Pushkarev V V and Kholas A 1977 Sov. Phys.-JETP 46 511). Adding the ZPE to the static energy, we estimated its effect on the pressure of the molecular dissociation. The reduction of the dissociation pressure due to the inclusion of the ZPE becomes over 100 GPa

  13. Hybrid-Based Dense Stereo Matching

    Science.gov (United States)

    Chuang, T. Y.; Ting, H. W.; Jaw, J. J.

    2016-06-01

    Stereo matching generating accurate and dense disparity maps is an indispensable technique for 3D exploitation of imagery in the fields of Computer vision and Photogrammetry. Although numerous solutions and advances have been proposed in the literature, occlusions, disparity discontinuities, sparse texture, image distortion, and illumination changes still lead to problematic issues and await better treatment. In this paper, a hybrid-based method based on semi-global matching is presented to tackle the challenges on dense stereo matching. To ease the sensitiveness of SGM cost aggregation towards penalty parameters, a formal way to provide proper penalty estimates is proposed. To this end, the study manipulates a shape-adaptive cross-based matching with an edge constraint to generate an initial disparity map for penalty estimation. Image edges, indicating the potential locations of occlusions as well as disparity discontinuities, are approved by the edge drawing algorithm to ensure the local support regions not to cover significant disparity changes. Besides, an additional penalty parameter 𝑃𝑒 is imposed onto the energy function of SGM cost aggregation to specifically handle edge pixels. Furthermore, the final disparities of edge pixels are found by weighting both values derived from the SGM cost aggregation and the U-SURF matching, providing more reliable estimates at disparity discontinuity areas. Evaluations on Middlebury stereo benchmarks demonstrate satisfactory performance and reveal the potency of the hybrid-based dense stereo matching method.

  14. Augmented communication with haptic I/O in mobile devices

    OpenAIRE

    Haverinen, Laura

    2012-01-01

    Nonverbal communication is a very important part of face to face communication. Both explicit and implicit additions to verbal communication augment the information content of communication. Before telephones did not provide any means for adding nonverbal information to the communication, but now, as the technology has advanced, it is possible to start augmenting also the communication on the phone. Adding a haptic I/O device to a regular mobile phone opens possibilities to add value to commu...

  15. Breast cancer screening in Korean woman with dense breast tissue

    International Nuclear Information System (INIS)

    Shin, Hee Jung; Ko, Eun Sook; Yi, Ann

    2015-01-01

    Asian women, including Korean, have a relatively higher incidence of dense breast tissue, compared with western women. Dense breast tissue has a lower sensitivity for the detection of breast cancer and a higher relative risk for breast cancer, compared with fatty breast tissue. Thus, there were limitations in the mammographic screening for women with dense breast tissue, and many studies for the supplemental screening methods. This review included appropriate screening methods for Korean women with dense breasts. We also reviewed the application and limitation of supplemental screening methods, including breast ultrasound, digital breast tomosynthesis, and breast magnetic resonance imaging; and furthermore investigated the guidelines, as well as the study results

  16. Breast cancer screening in Korean woman with dense breast tissue

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hee Jung [Dept. of Radiology and Research Institute of Radiology, University of Ulsan College of Medicine, Asan Medical Center, Seoul (Korea, Republic of); Ko, Eun Sook [Dept. of Radiology, Sungkyunkwan University School of Medicine, Samsung Medical Center, Seoul (Korea, Republic of); Yi, Ann [Dept. of Radiology, Seoul National University College of Medicine, Seoul National University Hospital, Seoul (Korea, Republic of)

    2015-11-15

    Asian women, including Korean, have a relatively higher incidence of dense breast tissue, compared with western women. Dense breast tissue has a lower sensitivity for the detection of breast cancer and a higher relative risk for breast cancer, compared with fatty breast tissue. Thus, there were limitations in the mammographic screening for women with dense breast tissue, and many studies for the supplemental screening methods. This review included appropriate screening methods for Korean women with dense breasts. We also reviewed the application and limitation of supplemental screening methods, including breast ultrasound, digital breast tomosynthesis, and breast magnetic resonance imaging; and furthermore investigated the guidelines, as well as the study results.

  17. Arbitrary electron acoustic waves in degenerate dense plasmas

    Science.gov (United States)

    Rahman, Ata-ur; Mushtaq, A.; Qamar, A.; Neelam, S.

    2017-05-01

    A theoretical investigation is carried out of the nonlinear dynamics of electron-acoustic waves in a collisionless and unmagnetized plasma whose constituents are non-degenerate cold electrons, ultra-relativistic degenerate electrons, and stationary ions. A dispersion relation is derived for linear EAWs. An energy integral equation involving the Sagdeev potential is derived, and basic properties of the large amplitude solitary structures are investigated in such a degenerate dense plasma. It is shown that only negative large amplitude EA solitary waves can exist in such a plasma system. The present analysis may be important to understand the collective interactions in degenerate dense plasmas, occurring in dense astrophysical environments as well as in laser-solid density plasma interaction experiments.

  18. Mobilization of hematopoietic stem and progenitor cells in mice

    NARCIS (Netherlands)

    Robinson, Simon N; van Os, Ronald P; Bunting, Kevin

    2008-01-01

    Animal models have added significantly to our understanding of the mechanism(s) of hematopoietic stem and progenitor cell (HSPC) mobilization. Such models suggest that changes in the interaction between the HSPC and the hematopoietic microenvironmental 'niche' (cellular and extracellular components)

  19. After Mobile Phones Surpassing Telephones%当手机蹿至老大时

    Institute of Scientific and Technical Information of China (English)

    马斌; 张英

    2004-01-01

    According to the statistic of MII, the number of phone user in the whole country of China has reached 0.512 billion in 2003, with 91.85 million new users added between January and October. The newly-added users include 40.917 million telephone users and 50.933 million mobile phone users. And the total number of telephone users has reached 0.2551 billion, mobile phone users 0.2569 billion. Up to now the number of mobile phone users has surpassed that of telephone users. The surpassing is a new landmark in the development of China telecom industry. At the same time the surpassing is not just a common event, but it will bring great influence to the development pattern of our telecom industry, regulation of government in the future, mobile communications and fixed network carriers. And so in this issue "New Telecom Salon" focuses on what the surpassing will bring to telecom industry in all aspects. The specialists in the industry are invited to discuss all related things about this subject.

  20. Impact of Mobile advertising on consumer attitudes in Algeria: case study of Ooredoo

    OpenAIRE

    Amina Merabet; Abderrezzak Benhabib; Abderrezzak Merabet

    2017-01-01

    Mobile advertising is a perfect tool to build a relationship based on proximity between brand and consumer. It is tactile, interactive, and personalized. As few studies have focused on this con-cept, particularly in the Algerian context, we aim in this research to show the role of mobile ad-vertising on consumer attitudes. After a literature review, an empirical study is conducted among150 students in Tlemcen city. Results, using regression analysis, show that attitude to-wards mobile adverti...

  1. A closer look at two AdS4 branes in an AdS5 bulk

    International Nuclear Information System (INIS)

    Thambyahpillai, Shiyamala

    2005-01-01

    We investigate a scenario with two AdS 4 branes in an AdS 5 bulk. In this scenario there are two gravitons and we investigate the role played by each of them for different positions of the second brane. We show that both gravitons play a significant role only when the turn-around point in the warp factor is approximately equidistant from both branes. We find that the ultralight mode becomes heavy as the second brane approaches the turn-around point, and the physics begins to resemble that of the RS model. Thus we demonstrate the crucial role played by the turn-around in the warp factor in enabling the presence of both gravitons. (author)

  2. Two Novel Rab2 Interactors Regulate Dense-core Vesicle Maturation

    Science.gov (United States)

    Ailion, Michael; Hannemann, Mandy; Dalton, Susan; Pappas, Andrea; Watanabe, Shigeki; Hegermann, Jan; Liu, Qiang; Han, Hsiao-Fen; Gu, Mingyu; Goulding, Morgan Q.; Sasidharan, Nikhil; Schuske, Kim; Hullett, Patrick; Eimer, Stefan; Jorgensen, Erik M.

    2014-01-01

    Summary Peptide neuromodulators are released from a unique organelle: the dense-core vesicle. Dense-core vesicles are generated at the trans-Golgi, and then sort cargo during maturation before being secreted. To identify proteins that act in this pathway, we performed a genetic screen in Caenorhabditis elegans for mutants defective in dense-core vesicle function. We identified two conserved Rab2-binding proteins: RUND-1, a RUN domain protein, and CCCP-1, a coiled-coil protein. RUND-1 and CCCP-1 colocalize with RAB-2 at the Golgi, and rab-2, rund-1 and cccp-1 mutants have similar defects in sorting soluble and transmembrane dense-core vesicle cargos. RUND-1 also interacts with the Rab2 GAP protein TBC-8 and the BAR domain protein RIC-19, a RAB-2 effector. In summary, a new pathway of conserved proteins controls the maturation of dense-core vesicles at the trans-Golgi network. PMID:24698274

  3. Evaporation of large black holes in AdS

    International Nuclear Information System (INIS)

    Rocha, Jorge V

    2010-01-01

    The AdS/CFT correspondence offers a new perspective on the long-standing black hole information paradox. However, to be able to use the available gauge/gravity machinery one is forced to consider so-called 'large' black holes in AdS, and these objects are thermodynamically stable - they do not evaporate. We describe a simple toy model that allows large AdS black holes to decay, by coupling the emitted radiation to an external scalar field propagating in an auxiliary space. This effectively changes the properties of the boundary of AdS, making it partly absorbing. We demonstrate that the evaporation process never ceases by explicitly presenting (a) the transmission coefficient for a wave scattering from the bulk into auxiliary space and (b) the greybody factor for a black 3-brane in an AdS background. Therefore, the model provides an interesting framework to address the information paradox using AdS/CFT techniques.

  4. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  5. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  6. Influence of alloy disorder scattering on the hole mobility of SiGe nanowires

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Blanque, Celso; Ruiz, Francisco G., E-mail: franruiz@ugr.es; Godoy, Andres, E-mail: agodoy@ugr.es; Marin, Enrique G.; Donetti, Luca; Gámiz, Francisco [Dpto. de Electrónica y Tecnología de Computadores, Facultad de Ciencias, Universidad de Granada, Av. Fuentenueva S/N, 18071 Granada (Spain)

    2014-12-28

    In this work, we analyze the influence of the alloy disorder (AD) scattering on the low-field hole mobility of Si{sub 1-x}Ge{sub x} nanowires (NWs). To do it, the electrostatic description is achieved through a self-consistent solution of the Poisson equation and the six-band k⋅p method in the cross section of the NW. The momentum relaxation time approximation is used to calculate the hole mobility, including alloy disorder and phonon scattering mechanisms, and the use of approximations to calculate the overlap integrals for the scattering matrix elements is discussed. We study the influence of the alloy disorder scattering on the total mobility compared to the phonon contribution, for different values of the AD scattering parameter proposed in the literature, and analyze the performance of SiGe NWs as a function of the Ge molar fraction for both low and high inversion charge densities.

  7. Eculizumab for dense deposit disease and C3 glomerulonephritis.

    Science.gov (United States)

    Bomback, Andrew S; Smith, Richard J; Barile, Gaetano R; Zhang, Yuzhou; Heher, Eliot C; Herlitz, Leal; Stokes, M Barry; Markowitz, Glen S; D'Agati, Vivette D; Canetta, Pietro A; Radhakrishnan, Jai; Appel, Gerald B

    2012-05-01

    The principle defect in dense deposit disease and C3 glomerulonephritis is hyperactivity of the alternative complement pathway. Eculizumab, a monoclonal antibody that binds to C5 to prevent formation of the membrane attack complex, may prove beneficial. In this open-label, proof of concept efficacy and safety study, six subjects with dense deposit disease or C3 glomerulonephritis were treated with eculizumab every other week for 1 year. All had proteinuria >1 g/d and/or AKI at enrollment. Subjects underwent biopsy before enrollment and repeat biopsy at the 1-year mark. The subjects included three patients with dense deposit disease (including one patient with recurrent dense deposit disease in allograft) and three patients with C3 glomerulonephritis (including two patients with recurrent C3 glomerulonephritis in allograft). Genetic and complement function testing revealed a mutation in CFH and MCP in one subject each, C3 nephritic factor in three subjects, and elevated levels of serum membrane attack complex in three subjects. After 12 months, two subjects showed significantly reduced serum creatinine, one subject achieved marked reduction in proteinuria, and one subject had stable laboratory parameters but histopathologic improvements. Elevated serum membrane attack complex levels normalized on therapy and paralleled improvements in creatinine and proteinuria. Clinical and histopathologic data suggest a response to eculizumab in some but not all subjects with dense deposit disease and C3 glomerulonephritis. Elevation of serum membrane attack complex before treatment may predict response. Additional research is needed to define the subgroup of dense deposit disease/C3 glomerulonephritis patients in whom eculizumab therapy can be considered.

  8. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  9. Template-based education toolkit for mobile platforms

    Science.gov (United States)

    Golagani, Santosh Chandana; Esfahanian, Moosa; Akopian, David

    2012-02-01

    Nowadays mobile phones are the most widely used portable devices which evolve very fast adding new features and improving user experiences. The latest generation of hand-held devices called smartphones is equipped with superior memory, cameras and rich multimedia features, empowering people to use their mobile phones not only as a communication tool but also for entertainment purposes. With many young students showing interest in learning mobile application development one should introduce novel learning methods which may adapt to fast technology changes and introduce students to application development. Mobile phones become a common device, and engineering community incorporates phones in various solutions. Overcoming the limitations of conventional undergraduate electrical engineering (EE) education this paper explores the concept of template-based based education in mobile phone programming. The concept is based on developing small exercise templates which students can manipulate and revise for quick hands-on introduction to the application development and integration. Android platform is used as a popular open source environment for application development. The exercises relate to image processing topics typically studied by many students. The goal is to enable conventional course enhancements by incorporating in them short hands-on learning modules.

  10. Minimizing the negative effects of device mobility in cell-based ad-hoc wireless computational grids

    CSIR Research Space (South Africa)

    Mudali, P

    2006-09-01

    Full Text Available This paper provides an outline of research being conducted to minimize the disruptive effects of device mobility in wireless computational grid networks. The proposed wireless grid framework uses the existing GSM cellular architecture, with emphasis...

  11. AdS Black Hole with Phantom Scalar Field

    Directory of Open Access Journals (Sweden)

    Limei Zhang

    2017-01-01

    Full Text Available We present an AdS black hole solution with Ricci flat horizon in Einstein-phantom scalar theory. The phantom scalar fields just depend on the transverse coordinates x and y, which are parameterized by the parameter α. We study the thermodynamics of the AdS phantom black hole. Although its horizon is a Ricci flat Euclidean space, we find that the thermodynamical properties of the black hole solution are qualitatively the same as those of AdS Schwarzschild black hole. Namely, there exists a minimal temperature and the large black hole is thermodynamically stable, while the smaller one is unstable, so there is a so-called Hawking-Page phase transition between the large black hole and the thermal gas solution in the AdS space-time in Poincare coordinates. We also calculate the entanglement entropy for a strip geometry dual to the AdS phantom black holes and find that the behavior of the entanglement entropy is qualitatively the same as that of the black hole thermodynamical entropy.

  12. Universal regularization prescription for Lovelock AdS gravity

    International Nuclear Information System (INIS)

    Kofinas, Georgios; Olea, Rodrigo

    2007-01-01

    A definite form for the boundary term that produces the finiteness of both the conserved quantities and Euclidean action for any Lovelock gravity with AdS asymptotics is presented. This prescription merely tells even from odd bulk dimensions, regardless the particular theory considered, what is valid even for Einstein-Hilbert and Einstein-Gauss-Bonnet AdS gravity. The boundary term is a given polynomial of the boundary extrinsic and intrinsic curvatures (also referred to as Kounterterms series). Only the coupling constant of the boundary term changes accordingly, such that it always preserves a well-posed variational principle for boundary conditions suitable for asymptotically AdS spaces. The background-independent conserved charges associated to asymptotic symmetries are found. In odd bulk dimensions, this regularization produces a generalized formula for the vacuum energy in Lovelock AdS gravity. The standard entropy for asymptotically AdS black holes is recovered directly from the regularization of the Euclidean action, and not only from the first law of thermodynamics associated to the conserved quantities

  13. AdS Branes from Partial Breaking of Superconformal Symmetries

    International Nuclear Information System (INIS)

    Ivanov, E.A.

    2005-01-01

    It is shown how the static-gauge world-volume superfield actions of diverse superbranes on the AdS d+1 superbackgrounds can be systematically derived from nonlinear realizations of the appropriate AdS supersymmetries. The latter are treated as superconformal symmetries of flat Minkowski superspaces of the bosonic dimension d. Examples include the N = 1 AdS 4 supermembrane, which is associated with the 1/2 partial breaking of the OSp(1|4) supersymmetry down to the N = 1, d = 3 Poincare supersymmetry, and the T-duality related L3-brane on AdS 5 and scalar 3-brane on AdS 5 x S 1 , which are associated with two different patterns of 1/2 breaking of the SU(2, 2|1) supersymmetry. Another (closely related) topic is the AdS/CFT equivalence transformation. It maps the world-volume actions of the codimension-one AdS d+1 (super)branes onto the actions of the appropriate Minkowski (super)conformal field theories in the dimension d

  14. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  15. Nationwide impact and vehicle to grid application of electric vehicles mobility using an activity based model

    OpenAIRE

    Álvaro, Roberto; González, Jairo; Fraile Ardanuy, José Jesús; Knapen, Luk; Janssens, Davy

    2013-01-01

    This paper describes the impact of electric mobility on the transmission grid in Flanders region (Belgium), using a micro-simulation activity based models. These models are used to provide temporal and spatial estimation of energy and power demanded by electric vehicles (EVs) in different mobility zones. The increment in the load demand due to electric mobility is added to the background load demand in these mobility areas and the effects over the transmission substations are analyzed. From t...

  16. CONSUMER SWITCHING BEHAVIOR FROM ONLINE BANKING TO MOBILE BANKING

    Directory of Open Access Journals (Sweden)

    Chian-Son Yu

    2014-06-01

    Full Text Available Through investigating factors that influence consumers to make a transition from online to mobile banking, this empirical study shows that relative attitude and relative subjective norm positively motivated respondents to switch from Internet to mobile banking while relative perceived behavior control deterred respondents from transitioning. Empirical results also demonstrated that Internet banking is superior to mobile banking in terms of consumer relative compatibility, self-efficacy, resource facilitating conditions, and technology facilitating conditions. Meanwhile, mobile banking emerged as superior to Internet banking for other constructs. By adding a comparative concept into an extended decomposed theory of planned behavior (DTPB model, this study may expand the applicable domain of current social psychology theories from the adoption of single products or services to the choice between competing products or services that achieve similar purposes and functions.

  17. Dilute and dense axion stars

    Science.gov (United States)

    Visinelli, Luca; Baum, Sebastian; Redondo, Javier; Freese, Katherine; Wilczek, Frank

    2018-02-01

    Axion stars are hypothetical objects formed of axions, obtained as localized and coherently oscillating solutions to their classical equation of motion. Depending on the value of the field amplitude at the core |θ0 | ≡ | θ (r = 0) |, the equilibrium of the system arises from the balance of the kinetic pressure and either self-gravity or axion self-interactions. Starting from a general relativistic framework, we obtain the set of equations describing the configuration of the axion star, which we solve as a function of |θ0 |. For small |θ0 | ≲ 1, we reproduce results previously obtained in the literature, and we provide arguments for the stability of such configurations in terms of first principles. We compare qualitative analytical results with a numerical calculation. For large amplitudes |θ0 | ≳ 1, the axion field probes the full non-harmonic QCD chiral potential and the axion star enters the dense branch. Our numerical solutions show that in this latter regime the axions are relativistic, and that one should not use a single frequency approximation, as previously applied in the literature. We employ a multi-harmonic expansion to solve the relativistic equation for the axion field in the star, and demonstrate that higher modes cannot be neglected in the dense regime. We interpret the solutions in the dense regime as pseudo-breathers, and show that the life-time of such configurations is much smaller than any cosmological time scale.

  18. Electromagnetic fields from mobile phone base station - variability analysis.

    Science.gov (United States)

    Bienkowski, Pawel; Zubrzak, Bartlomiej

    2015-09-01

    The article describes the character of electromagnetic field (EMF) in mobile phone base station (BS) surroundings and its variability in time with an emphasis on the measurement difficulties related to its pulse and multi-frequency nature. Work also presents long-term monitoring measurements performed recently in different locations in Poland - small city with dispersed building development and in major polish city - dense urban area. Authors tried to determine the trends in changing of EMF spectrum analyzing daily changes of measured EMF levels in those locations. Research was performed using selective electromagnetic meters and also EMF meter with spectrum analysis.

  19. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  20. Principles of mobile computing and communications

    CERN Document Server

    Othman, Mazliza

    2007-01-01

    Introduction Mobile Computing Applications Evolution of Wireless Networks and Services Summary Cellular Network Architecture UMTS Architecture Public Land Mobile Network Interfaces User Authentication Frequency Reuse Channel Assignment Location Registration and Update Handover Procedures CDMA The Move toward 3G Networks Wireless Local Area Networks IEEE 802.11 Standard IEEE 802.11b Standard (Wi-Fi) IEEE 802.11a Standard IEEE 802.11g Standard HIPERLAN/2 IEEE 802.1x Standard IEEE 802.11i Standard IEEE 802.11e Standard Security Issues IP over 802.11 WLAN Integrating 802.11 WLAN and UMTS Summary Wireless Personal Area Networks HomeRF Bluetooth Technology IEEE 802.15.3 Standard Home Area Networks Summary Wireless Sensor Networks Applications of WSNs Requirements for WSNs WSN Architecture The 802.15.4 Standard The ZigBee Protocol Power Conservation Techniques Network and Communications Configuration of Sensor Networks WSN and Emergency Response Applications Summary Mobile Ad Hoc Networks AODV DSR OLSR TBRPF Summary...

  1. AdS. Klein-Gordon equation

    OpenAIRE

    Bel, Ll.

    2014-01-01

    I propose a generalization of the Klein-Gordon equation in the framework of AdS space-time and exhibit a four parameter family of solutions among which there is a two parameter family of time-dependent bound states.

  2. Neutrinos and Nucleosynthesis in Hot and Dense Matter

    Energy Technology Data Exchange (ETDEWEB)

    Fuller, George [Univ. of California, San Diego, CA (United States)

    2016-01-14

    The Topical Collaboration for Neutrinos and Nucleosynthesis in Hot and Dense matter brought together researchers from a variety of nuclear science specialties and a number of institutions to address nuclear physics and neutrino physics problems associated with dense matter and the origin of the elements. See attached final technical reports for (1) the UCSD award and (2) a copy of the report for the whole TC

  3. Immersive Live Event Experiences - Interactive UHDTV on Mobile Devices

    NARCIS (Netherlands)

    Niamut, O.A.; Thomas, G.A.; Thomas, E.D.R.; Brandenburg, R. van; D’Acunto, L.; Gregory-Clarke, R.

    2014-01-01

    This paper reports on the latest developments around tiled streaming. As an extension of HTTP adaptive streaming, it retains all the benefits of this streaming technology, while adding the possibility of interaction when consuming UHDTV on mobile devices. In particular, we discuss the underlying

  4. Two-temperature equilibration in warm dense hydrogen measured with x-ray scattering from the LCLS

    Science.gov (United States)

    Fletcher, Luke; High Energy Density Sciences Collaboration

    2017-10-01

    Understanding the properties of warm dense hydrogen plasmas is critical for modeling stellar and planetary interiors, as well as for inertial confinement fusion (ICF) experiments. Of central importance are the electron-ion collision and equilibration times that determine the microscopic properties in a high energy density state. Spectrally and angularly resolved x-ray scattering measurements from fs-laser heated hydrogen have resolved the picosecond evolution and energy relaxation from a two-temperature plasma towards thermodynamic equilibrium in the warm dense matter regime. The interaction of rapidly heated cryogenic hydrogen irradiated by a 400 nm, 5x1017 W/cm2 , 70 fs-laser is visualized with ultra-bright 5.5 kev x-ray pulses from the Linac Coherent Light (LCLS) source in 1 Hz repetition rate pump-probe setting. We demonstrate that the energy relaxation is faster than many classical binary collision theories that use ad hoc cutoff parameters used in the Landau-Spitzer determination of the Coulomb logarithm. This work was supported by the DOE Office of Science, Fusion Energy Science under contract No. SF00515 and supported under FWP 100182 and DOE Office of Basic Energy Sciences, Materials Sciences and Engineering Division, contract DE-AC02-76SF00515.

  5. Baby Skyrmions in AdS

    Energy Technology Data Exchange (ETDEWEB)

    Elliot-Ripley, Matthew; Winyard, Thomas [Department of Mathematical Sciences, Durham University,South Rd, Durham (United Kingdom)

    2015-09-01

    We study the baby Skyrme model in a pure AdS background without a mass term. The tail decays and scalings of massless radial solutions are demonstrated to take a similar form to those of the massive flat space model, with the AdS curvature playing a similar role to the flat space pion mass. We also numerically find minimal energy solutions for a range of higher topological charges and find that they form concentric ring-like solutions. Popcorn transitions (named in analogy with studies of toy models of holographic QCD) from an n layer to an n+1-layer configuration are observed at topological charges 9 and 27 and further popcorn transitions for higher charges are predicted. Finally, a point-particle approximation for the model is derived and used to successfully predict the ring structures and popcorn transitions for higher charge solitons.

  6. Fabrication, Properties and Applications of Dense Hydroxyapatite: A Review

    Science.gov (United States)

    Prakasam, Mythili; Locs, Janis; Salma-Ancane, Kristine; Loca, Dagnija; Largeteau, Alain; Berzina-Cimdina, Liga

    2015-01-01

    In the last five decades, there have been vast advances in the field of biomaterials, including ceramics, glasses, glass-ceramics and metal alloys. Dense and porous ceramics have been widely used for various biomedical applications. Current applications of bioceramics include bone grafts, spinal fusion, bone repairs, bone fillers, maxillofacial reconstruction, etc. Amongst the various calcium phosphate compositions, hydroxyapatite, which has a composition similar to human bone, has attracted wide interest. Much emphasis is given to tissue engineering, both in porous and dense ceramic forms. The current review focusses on the various applications of dense hydroxyapatite and other dense biomaterials on the aspects of transparency and the mechanical and electrical behavior. Prospective future applications, established along the aforesaid applications of hydroxyapatite, appear to be promising regarding bone bonding, advanced medical treatment methods, improvement of the mechanical strength of artificial bone grafts and better in vitro/in vivo methodologies to afford more particular outcomes. PMID:26703750

  7. Fabrication, Properties and Applications of Dense Hydroxyapatite: A Review

    Directory of Open Access Journals (Sweden)

    Mythili Prakasam

    2015-12-01

    Full Text Available In the last five decades, there have been vast advances in the field of biomaterials, including ceramics, glasses, glass-ceramics and metal alloys. Dense and porous ceramics have been widely used for various biomedical applications. Current applications of bioceramics include bone grafts, spinal fusion, bone repairs, bone fillers, maxillofacial reconstruction, etc. Amongst the various calcium phosphate compositions, hydroxyapatite, which has a composition similar to human bone, has attracted wide interest. Much emphasis is given to tissue engineering, both in porous and dense ceramic forms. The current review focusses on the various applications of dense hydroxyapatite and other dense biomaterials on the aspects of transparency and the mechanical and electrical behavior. Prospective future applications, established along the aforesaid applications of hydroxyapatite, appear to be promising regarding bone bonding, advanced medical treatment methods, improvement of the mechanical strength of artificial bone grafts and better in vitro/in vivo methodologies to afford more particular outcomes.

  8. Hugoniot measurements of double-shocked precompressed dense xenon plasmas

    Science.gov (United States)

    Zheng, J.; Chen, Q. F.; Gu, Y. J.; Chen, Z. Y.

    2012-12-01

    The current partially ionized plasmas models for xenon show substantial differences since the description of pressure and thermal ionization region becomes a formidable task, prompting the need for an improved understanding of dense xenon plasmas behavior at above 100 GPa. We performed double-shock compression experiments on dense xenon to determine accurately the Hugoniot up to 172 GPa using a time-resolved optical radiation method. The planar strong shock wave was produced using a flyer plate impactor accelerated up to ˜6 km/s with a two-stage light-gas gun. The time-resolved optical radiation histories were acquired by using a multiwavelength channel optical transience radiance pyrometer. Shock velocity was measured and mass velocity was determined by the impedance-matching methods. The experimental equation of state of dense xenon plasmas are compared with the self-consistent fluid variational calculations of dense xenon in the region of partial ionization over a wide range of pressures and temperatures.

  9. Wess-Zumino terms for AdS D-branes

    International Nuclear Information System (INIS)

    Hatsuda, Machiko; Kamimura, Kiyoshi

    2004-01-01

    We show that Wess-Zumino terms for Dp branes with p>0 in the anti-de Sitter (AdS) space are given in terms of 'left-invariant' currents on the super-AdS group or the 'expanded' super-AdS group. As a result there is no topological extension of the super-AdS algebra. In the flat limit the global Lorentz rotational charges of the AdS space turn out to be brane charges of the supertranslation algebra representing the BPS mass. We also show that a D-instanton is described by the GL(1) degree of freedom in the Roiban-Siegel formalism based on the GL(4 vertical bar 4)/[Sp(4)xGL(1)]2 coset

  10. No effect of mobile phone-like RF exposure on patients with atopic dermatitis.

    Science.gov (United States)

    Johansson, Amanda; Forsgren, Sture; Stenberg, Berndt; Wilén, Jonna; Kalezic, Nebojsa; Sandström, Monica

    2008-07-01

    This study investigates the effect of exposure to a mobile phone-like radiofrequency (RF) electromagnetic field on people with atopic dermatitis (AD). Fifteen subjects with AD were recruited and matched with 15 controls without AD. The subjects were exposed for 30 min to an RF field at 1 W/kg via an indoor base station antenna attached to a 900 MHz GSM mobile phone. Blood samples for ELISA analysis of the concentration of substance P (SP), tumor necrosis factor receptor 1 (TNF R1), and brain derived neurotrophic factor (BDNF) in serum were drawn before and after the provocation (exposure/sham). Baseline heart rate and heart rate variability, local blood flow, and electrodermal activity were also recorded. No significant differences between the subject groups were found for baseline neurophysiological data. The cases displayed a serum concentration of TNF R1 significantly higher than the control subjects and a significantly lower serum concentration of BDNF in the baseline condition. For SP there was no difference between groups. However, no effects related to RF exposure condition were encountered for any of the measured substances. As to symptoms, a possible correlation with exposure could not be evaluated, due to too few symptom reports. The result of the study does not support the hypothesis of an effect of mobile phone-like RF exposure on serum levels of SP, TNF R1, and BDNF in persons with AD.

  11. Evaluating the impact of land-use density and mix on spatiotemporal urban activity patterns: an exploratory study using mobile phone data

    NARCIS (Netherlands)

    Jacobs-Crisioni, C.G.W.; Rietveld, P.; Koomen, E.; Tranos, E.

    2014-01-01

    Dense and mixed land-use configurations are assumed to encourage high and prolonged activity levels, which in turn are considered to be important for the condition of urban neighbourhoods. We used mobile phone usage data recorded in Amsterdam, the Netherlands, as a proxy for urban activity to test

  12. Adding intelligence to mobile asset management in hospitals: the true value of RFID.

    Science.gov (United States)

    Castro, Linda; Lefebvre, Elisabeth; Lefebvre, Louis A

    2013-10-01

    RFID (Radio Frequency Identification) technology is expected to play a vital role in the healthcare arena, especially in times when cost containments are at the top of the priorities of healthcare management authorities. Medical equipment represents a significant share of yearly healthcare operational costs; hence, ensuring an effective and efficient management of such key assets is critical to promptly and reliably deliver a diversity of clinical services at the patient bedside. Empirical evidence from a phased-out RFID implementation in one European hospital demonstrates that RFID has the potential to transform asset management by improving inventory management, enhancing asset utilization, increasing staff productivity, improving care services, enhancing maintenance compliance, and increasing information visibility. Most importantly, RFID allows the emergence of intelligent asset management processes, which is, undoubtedly, the most important benefit that could be derived from the RFID system. Results show that the added intelligence can be rather basic (auto-status change) or a bit more advanced (personalized automatic triggers). More importantly, adding intelligence improves planning and decision-making processes.

  13. Implementing a Topology Management Algorithm for Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mrinal K. Naskar

    2008-01-01

    Full Text Available In this paper, we propose to maintain the topology of a MANET by suitably selecting multiple coordinators among the nodes constituting the MANET. The maintenance of topology in a mobile ad–hoc network is of primary importance because the routing techniques can only work if we have a connected network. Thus of the burning issues at present is to device algorithms which ensure that the network topology is always maintained. The basic philosophy behind our algorithm is to isolate two coordinators amongst the system based on positional data. Once elected, they are entrusted with the responsibility to emit signals of different frequencies while the other nodes individually decide the logic they need to follow in order to maintain the topology, thereby greatly reducing the overhead. As far as our knowledge goes, we are the first ones to introduce the concept of multiple coordinators which not only reduces the workload of the coordinator, but also eliminates the need of different signal ranges thereby ensuring greater efficiency. We have simulated the algorithm with the help of a number of robots using embedded systems. The results we have obtained have been quite encouraging.

  14. Understanding and Capturing People’s Mobile App Privacy Preferences

    Science.gov (United States)

    2013-10-28

    The entire apps’ metadata takes up about 500MB of storage space when stored in a MySQL database and all the binary files take approximately 300GB of...functionality that can de- compile Dalvik bytecodes to Java source code faster than other de-compilers. Given the scale of the app analysis we planned on... java libraries, such as parser, sql connectors, etc Targeted Ads 137 admob, adwhirl, greystripe… Provided by mobile behavioral ads company to

  15. Optimal design of cluster-based ad-hoc networks using probabilistic solution discovery

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2009-01-01

    The reliability of ad-hoc networks is gaining popularity in two areas: as a topic of academic interest and as a key performance parameter for defense systems employing this type of network. The ad-hoc network is dynamic and scalable and these descriptions are what attract its users. However, these descriptions are also synonymous for undefined and unpredictable when considering the impacts to the reliability of the system. The configuration of an ad-hoc network changes continuously and this fact implies that no single mathematical expression or graphical depiction can describe the system reliability-wise. Previous research has used mobility and stochastic models to address this challenge successfully. In this paper, the authors leverage the stochastic approach and build upon it a probabilistic solution discovery (PSD) algorithm to optimize the topology for a cluster-based mobile ad-hoc wireless network (MAWN). Specifically, the membership of nodes within the back-bone network or networks will be assigned in such as way as to maximize reliability subject to a constraint on cost. The constraint may also be considered as a non-monetary cost, such as weight, volume, power, or the like. When a cost is assigned to each component, a maximum cost threshold is assigned to the network, and the method is run; the result is an optimized allocation of the radios enabling back-bone network(s) to provide the most reliable network possible without exceeding the allowable cost. The method is intended for use directly as part of the architectural design process of a cluster-based MAWN to efficiently determine an optimal or near-optimal design solution. It is capable of optimizing the topology based upon all-terminal reliability (ATR), all-operating terminal reliability (AoTR), or two-terminal reliability (2TR)

  16. Synergy between Software Product Line and Intelligent Mobile Middleware

    DEFF Research Database (Denmark)

    Zhang, Weishan; Hansen, Klaus Marius

    2007-01-01

    with OWL ontology reasoning enhanced BDI (belief-desire-intention) agents in an ongoing research project called PLIMM (product line enabled intelligent mobile middleware), in which Frame based software product line techniques are applied. Besides the advantages of a software product line, our approach can...... handle ontology evolution and keep all related assets in a consistent state. Ontology evolution is a problem that has not been addressed by current mobile middleware. Another advantage is the ability to configure Jadex BDI agents for different purpose and enhance agent intelligence by adding logic...

  17. Dense time discretization technique for verification of real time systems

    International Nuclear Information System (INIS)

    Makackas, Dalius; Miseviciene, Regina

    2016-01-01

    Verifying the real-time system there are two different models to control the time: discrete and dense time based models. This paper argues a novel verification technique, which calculates discrete time intervals from dense time in order to create all the system states that can be reached from the initial system state. The technique is designed for real-time systems specified by a piece-linear aggregate approach. Key words: real-time system, dense time, verification, model checking, piece-linear aggregate

  18. About chiral models of dense matter and its magnetic properties

    International Nuclear Information System (INIS)

    Kutschera, M.

    1990-12-01

    The chiral models of dense nucleon matter are discussed. The quark matter with broken chiral symmetry is described. The magnetic properties of dense matter are presented and conclusions are given. 37 refs. (A.S.)

  19. Rheology of dense suspensions of non colloidal particles

    OpenAIRE

    Guazzelli , Elisabeth

    2017-01-01

    International audience; Dense suspensions are materials with broad applications both in industrial processes (e.g. waste disposal, concrete, drilling muds, metalworking chip transport, and food processing) and in natural phenomena (e.g. flows of slurries, debris, and lava). Despite its long research history and its practical relevance, the mechanics of dense suspensions remain poorly understood. The major difficulty is that the grains interact both by hydrodynamic interactions through the liq...

  20. The group approach to AdS space propagators

    International Nuclear Information System (INIS)

    Leonhardt, Thorsten; Manvelyan, Ruben; Ruehl, Werner

    2003-01-01

    We show that AdS two-point functions can be obtained by connecting two points in the interior of AdS space with one point on its boundary by a dual pair of Dobrev's boundary-to-bulk intertwiners and integrating over the boundary point

  1. Mobihealth: Wireless mobile services and applications for healthcare

    NARCIS (Netherlands)

    Konstantas, D.; Jones, Valerie M.; Bults, Richard G.A.; Herzog, R.

    2002-01-01

    The MobiHealth IST project aims in the integration of existing and forthcoming technologies in developing and trial new mobile value-added services in the area of healthcare, based on 2.5 (GPRS) and 3G (UMTS) technologies. The target is to develope the means contributing to the reduction of costs in

  2. Effect of nano-ZrO2 addition on microstructure, mechanical property and thermal shock behaviour of dense chromic oxide refractory material

    International Nuclear Information System (INIS)

    Lu, Lixia; Ding, Chunhui; Zhanga, Chi; Yanga, De'an; Di, Lizhi

    2015-01-01

    To obtain a good performance hot-face lining material in gasifier, nano-ZrO 2 , up to 5 wt %, was added into chromic oxide powder with 3 wt % TiO 2 followed by sintering at 1500°C for 2.5 h. The effect of nano-ZrO 2 addition on microstructure, mechanical property and thermal shock behaviour was studied. ZrO 2 promoted densification at contents higher than 1 wt %. Microcracks and phase transformation toughened the dense chromic oxide refractory material. The main reason for decrease of strength was the existence microcracks in specimens and weakening of intergranular fracture. Dense chromic oxide refractory material with 2∼3 wt % nano-ZrO 2 possessed good densification, uniform microstructure, normal mechanical property and proper thermal shock resistance. The rupture strength retention ratio was nearly twice than that of chromic oxide material without ZrO 2 after three cycles of quenching test from 950°C to cold water. (author)

  3. The numerical simulation study of hemodynamics of the new dense-mesh stent

    Science.gov (United States)

    Ma, Jiali; Yuan, Zhishan; Yu, Xuebao; Feng, Zhaowei; Miao, Weidong; Xu, Xueli; Li, Juntao

    2017-09-01

    The treatment of aortic aneurysm in new dense mesh stent is based on the principle of hemodynamic changes. But the mechanism is not yet very clear. This paper analyzed and calculated the hemodynamic situation before and after the new dense mesh stent implanting by the method of numerical simulation. The results show the dense mesh stent changed and impacted the blood flow in the aortic aneurysm. The changes include significant decrement of blood velocity, pressure and shear forces, while ensuring blood can supply branches, which means the new dense mesh stent's hemodynamic mechanism in the treatment of aortic aneurysm is clearer. It has very important significance in developing new dense mesh stent in order to cure aortic aneurysm.

  4. Holographic description of AdS2 black holes

    International Nuclear Information System (INIS)

    Castro, Alejandra; Larsen, Finn; Grumiller, Daniel; McNees, Robert

    2008-01-01

    We develop the holographic renormalization of AdS 2 gravity systematically. We find that a bulk Maxwell term necessitates a boundary mass term for the gauge field and verify that this unusual term is invariant under gauge transformations that preserve the boundary conditions. We determine the energy-momentum tensor and the central charge, recovering recent results by Hartman and Strominger. We show that our expressions are consistent with dimensional reduction of the AdS 3 energy-momentum tensor and the Brown-Henneaux central charge. As an application of our results we interpret the entropy of AdS 2 black holes as the ground state entropy of a dual CFT.

  5. Mobility-Assisted on-Demand Routing Algorithm for MANETs in the Presence of Location Errors

    Directory of Open Access Journals (Sweden)

    Trung Kien Vu

    2014-01-01

    Full Text Available We propose a mobility-assisted on-demand routing algorithm for mobile ad hoc networks in the presence of location errors. Location awareness enables mobile nodes to predict their mobility and enhances routing performance by estimating link duration and selecting reliable routes. However, measured locations intrinsically include errors in measurement. Such errors degrade mobility prediction and have been ignored in previous work. To mitigate the impact of location errors on routing, we propose an on-demand routing algorithm taking into account location errors. To that end, we adopt the Kalman filter to estimate accurate locations and consider route confidence in discovering routes. Via simulations, we compare our algorithm and previous algorithms in various environments. Our proposed mobility prediction is robust to the location errors.

  6. Warm dense matter and Thomson scattering at FLASH

    International Nuclear Information System (INIS)

    Faeustlin, Roland Rainer

    2010-05-01

    X-ray free electron lasers are powerful tools to investigate moderately to strongly correlated solid density low temperature plasmas, named warm dense matter. These plasmas are of most interest for astrophysics and laser plasma interaction, particularly inertial confinement fusion. This work utilizes the ultrashort soft x-ray pulse duration and high brilliance of the free electron laser in Hamburg, FLASH, to generate warm dense matter and to study its ultrafast processes. The techniques applied are absorption measurement, emission spectroscopy and Thomson scattering. Radiative hydrodynamics and Thomson scattering simulations are used to investigate the impact of temperature and density gradients in the sample and to fit the experimental data. The measurements result in a comprehensive picture of soft x-ray matter interaction related to warm dense matter and yield insight into ultrafast equilibration and relaxation mechanisms, in particular impact ionization and radiative recombination. (orig.)

  7. Warm dense matter and Thomson scattering at FLASH

    Energy Technology Data Exchange (ETDEWEB)

    Faeustlin, Roland Rainer

    2010-05-15

    X-ray free electron lasers are powerful tools to investigate moderately to strongly correlated solid density low temperature plasmas, named warm dense matter. These plasmas are of most interest for astrophysics and laser plasma interaction, particularly inertial confinement fusion. This work utilizes the ultrashort soft x-ray pulse duration and high brilliance of the free electron laser in Hamburg, FLASH, to generate warm dense matter and to study its ultrafast processes. The techniques applied are absorption measurement, emission spectroscopy and Thomson scattering. Radiative hydrodynamics and Thomson scattering simulations are used to investigate the impact of temperature and density gradients in the sample and to fit the experimental data. The measurements result in a comprehensive picture of soft x-ray matter interaction related to warm dense matter and yield insight into ultrafast equilibration and relaxation mechanisms, in particular impact ionization and radiative recombination. (orig.)

  8. Light-cone AdS/CFT-adapted approach to AdS fields/currents, shadows, and conformal fields

    Energy Technology Data Exchange (ETDEWEB)

    Metsaev, R.R. [Department of Theoretical Physics, P.N. Lebedev Physical Institute, Leninsky prospect 53, Moscow 119991 (Russian Federation)

    2015-10-16

    Light-cone gauge formulation of fields in AdS space and conformal field theory in flat space adapted for the study of AdS/CFT correspondence is developed. Arbitrary spin mixed-symmetry fields in AdS space and arbitrary spin mixed-symmetry currents, shadows, and conformal fields in flat space are considered on an equal footing. For the massless and massive fields in AdS and the conformal fields in flat space, simple light-cone gauge actions leading to decoupled equations of motion are found. For the currents and shadows, simple expressions for all 2-point functions are also found. We demonstrate that representation of conformal algebra generators on space of currents, shadows, and conformal fields can be built in terms of spin operators entering the light-cone gauge formulation of AdS fields. This considerably simplifies the study of AdS/CFT correspondence. Light-cone gauge actions for totally symmetric arbitrary spin long conformal fields in flat space are presented. We apply our approach to the study of totally antisymmetric (one-column) and mixed-symmetry (two-column) fields in AdS space and currents, shadows, and conformal fields in flat space.

  9. Rheology of dense suspensions of non colloidal particles

    OpenAIRE

    Guazzelli Élisabeth

    2017-01-01

    Dense suspensions are materials with broad applications both in industrial processes (e.g. waste disposal, concrete, drilling muds, metalworking chip transport, and food processing) and in natural phenomena (e.g. flows of slurries, debris, and lava). Despite its long research history and its practical relevance, the mechanics of dense suspensions remain poorly understood. The major difficulty is that the grains interact both by hydrodynamic interactions through the liquid and by mechanical co...

  10. Dense Descriptors for Optical Flow Estimation: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Ahmadreza Baghaie

    2017-02-01

    Full Text Available Estimating the displacements of intensity patterns between sequential frames is a very well-studied problem, which is usually referred to as optical flow estimation. The first assumption among many of the methods in the field is the brightness constancy during movements of pixels between frames. This assumption is proven to be not true in general, and therefore, the use of photometric invariant constraints has been studied in the past. One other solution can be sought by use of structural descriptors rather than pixels for estimating the optical flow. Unlike sparse feature detection/description techniques and since the problem of optical flow estimation tries to find a dense flow field, a dense structural representation of individual pixels and their neighbors is computed and then used for matching and optical flow estimation. Here, a comparative study is carried out by extending the framework of SIFT-flow to include more dense descriptors, and comprehensive comparisons are given. Overall, the work can be considered as a baseline for stimulating more interest in the use of dense descriptors for optical flow estimation.

  11. Mobile marketing for mobile games

    OpenAIRE

    Vu, Giang

    2016-01-01

    Highly developed mobile technology and devices enable the rise of mobile game industry and mobile marketing. Hence mobile marketing for mobile game is an essential key for a mobile game success. Even though there are many articles on marketing for mobile games, there is a need of highly understanding mobile marketing strategies, how to launch a mobile campaign for a mobile game. Besides that, it is essential to understand the relationship between mobile advertising and users behaviours. There...

  12. Central charge for AdS2 quantum gravity

    International Nuclear Information System (INIS)

    Hartman, Thomas; Strominger, Andrew

    2009-01-01

    Two-dimensional Maxwell-dilaton quantum gravity on AdS 2 with radius l and a constant electric field E is studied. In conformal gauge, this is equivalent to a CFT on a strip. In order to maintain consistent boundary conditions, the usual conformal diffeomorphisms must be accompanied by a certain U(1) gauge transformation. The resulting conformal transformations are generated by a twisted stress tensor, which has a central charge c = 3kE 2 l 4 /4 where k is the level of the U(1) current. This is an AdS 2 analog of the Brown-Henneaux formula c = 3l/2G for the central charge of quantum gravity on AdS 3 .

  13. ENcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments

    National Research Council Canada - National Science Library

    Ratsimor, Olga; Finin, Tim; Joshi, Anupam; Yesha, Yelena

    2005-01-01

    .... eNcentive facilitates peer-to-peer electronic marketing in mobile ad hoc environments. Our framework employs an intelligent marketing scheme, by providing users the capability to collect information like sales promotions and discounts...

  14. Impact of Mobile advertising on consumer attitudes in Algeria: case study of Ooredoo

    Directory of Open Access Journals (Sweden)

    Amina Merabet

    2017-04-01

    Full Text Available Mobile advertising is a perfect tool to build a relationship based on proximity between brand and consumer. It is tactile, interactive, and personalized. As few studies have focused on this con-cept, particularly in the Algerian context, we aim in this research to show the role of mobile ad-vertising on consumer attitudes. After a literature review, an empirical study is conducted among150 students in Tlemcen city. Results, using regression analysis, show that attitude to-wards mobile advertising had no influence on the attitude towards brand and purchase intention.

  15. Use of Speech Analyses within a Mobile Application for the Assessment of Cognitive Impairment in Elderly People.

    Science.gov (United States)

    Konig, Alexandra; Satt, Aharon; Sorin, Alex; Hoory, Ran; Derreumaux, Alexandre; David, Renaud; Robert, Phillippe H

    2018-01-01

    Various types of dementia and Mild Cognitive Impairment (MCI) are manifested as irregularities in human speech and language, which have proven to be strong predictors for the disease presence and progress ion. Therefore, automatic speech analytics provided by a mobile application may be a useful tool in providing additional indicators for assessment and detection of early stage dementia and MCI. 165 participants (subjects with subjective cognitive impairment (SCI), MCI patients, Alzheimer's disease (AD) and mixed dementia (MD) patients) were recorded with a mobile application while performing several short vocal cognitive tasks during a regular consultation. These tasks included verbal fluency, picture description, counting down and a free speech task. The voice recordings were processed in two steps: in the first step, vocal markers were extracted using speech signal processing techniques; in the second, the vocal markers were tested to assess their 'power' to distinguish between SCI, MCI, AD and MD. The second step included training automatic classifiers for detecting MCI and AD, based on machine learning methods, and testing the detection accuracy. The fluency and free speech tasks obtain the highest accuracy rates of classifying AD vs. MD vs. MCI vs. SCI. Using the data, we demonstrated classification accuracy as follows: SCI vs. AD = 92% accuracy; SCI vs. MD = 92% accuracy; SCI vs. MCI = 86% accuracy and MCI vs. AD = 86%. Our results indicate the potential value of vocal analytics and the use of a mobile application for accurate automatic differentiation between SCI, MCI and AD. This tool can provide the clinician with meaningful information for assessment and monitoring of people with MCI and AD based on a non-invasive, simple and low-cost method. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  16. AdS5 black holes with fermionic hair

    International Nuclear Information System (INIS)

    Burrington, Benjamin A.; Liu, James T.; Sabra, W. A.

    2005-01-01

    The study of new Bogomol'nyi-Prasad-Sommerfield (BPS) objects in AdS 5 has led to a deeper understanding of AdS/CFT. To help complete this picture, and to fully explore the consequences of the supersymmetry algebra, it is also important to obtain new solutions with bulk fermions turned on. In this paper we construct superpartners of the 1/2 BPS black hole in AdS 5 using a natural set of fermion zero modes. We demonstrate that these superpartners, carrying fermionic hair, have conserved charges differing from the original bosonic counterpart. To do so, we find the R-charge and dipole moment of the new system, as well as the mass and angular momentum, defined through the boundary stress tensor. The complete set of superpartners fits nicely into a chiral representation of AdS 5 supersymmetry, and the spinning solutions have the expected gyromagnetic ratio, g=1

  17. Phases of global AdS black holes

    International Nuclear Information System (INIS)

    Basu, Pallab; Krishnan, Chethan; Subramanian, P.N. Bala

    2016-01-01

    We study the phases of gravity coupled to a charged scalar and gauge field in an asymptotically Anti-de Sitter spacetime (AdS_4) in the grand canonical ensemble. For the conformally coupled scalar, an intricate phase diagram is charted out between the four relevant solutions: global AdS, boson star, Reissner-Nordstrom black hole and the hairy black hole. The nature of the phase diagram undergoes qualitative changes as the charge of the scalar is changed, which we discuss. We also discuss the new features that arise in the extremal limit.

  18. Dense Plasma Focus Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Li, Hui [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Li, Shengtai [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Jungman, Gerard [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Hayes-Sterbenz, Anna Catherine [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-31

    The mechanisms for pinch formation in Dense Plasma Focus (DPF) devices, with the generation of high-energy ions beams and subsequent neutron production over a relatively short distance, are not fully understood. Here we report on high-fidelity 2D and 3D numerical magnetohydrodynamic (MHD) simulations using the LA-COMPASS code to study the pinch formation dynamics and its associated instabilities and neutron production.

  19. Entropy-Based Privacy against Profiling of User Mobility

    Directory of Open Access Journals (Sweden)

    Alicia Rodriguez-Carrion

    2015-06-01

    Full Text Available Location-based services (LBSs flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by the LBS provider to build the user profile of visited locations, which might disclose sensitive data, such as work or home locations. The classic concept of entropy is widely used to evaluate privacy in these scenarios, where the information is represented as a sequence of independent samples of categorized data. However, since the LBS queries might be sent very frequently, location profiles can be improved by adding temporal dependencies, thus becoming mobility profiles, where location samples are not independent anymore and might disclose the user’s mobility patterns. Since the time dimension is factored in, the classic entropy concept falls short of evaluating the real privacy level, which depends also on the time component. Therefore, we propose to extend the entropy-based privacy metric to the use of the entropy rate to evaluate mobility profiles. Then, two perturbative mechanisms are considered to preserve locations and mobility profiles under gradual utility constraints. We further use the proposed privacy metric and compare it to classic ones to evaluate both synthetic and real mobility profiles when the perturbative methods proposed are applied. The results prove the usefulness of the proposed metric for mobility profiles and the need for tailoring the perturbative methods to the features of mobility profiles in order to improve privacy without completely loosing utility.

  20. Mobility of Hematite Submicron Particles in Water Solutions of Sugar

    International Nuclear Information System (INIS)

    Fornal, P.; Stanek, J.

    2008-01-01

    The mobility of the 100 nm Fe 2 O 3 particles in dense water solutions of sugar (sucrose) was determined from the analysis of the resonance absorption line shape of the Moessbauer spectra recorded in the -5 o C to 40 o C temperature range for different sugar concentrations. The discrepancy between the experimental data and the prediction of the classical theory of Brownian movement are interpreted in the term of the short observation time and the interaction between the solid particles in fluids, which extends in water up to 300 nm. The sedimentation process in the studied colloids was observed. (authors)

  1. New Massive Gravity and AdS4 Counterterms

    International Nuclear Information System (INIS)

    Jatkar, Dileep P.; Sinha, Aninda

    2011-01-01

    We show that the recently proposed Dirac-Born-Infeld extension of new massive gravity emerges naturally as a counterterm in four-dimensional anti-de Sitter space (AdS 4 ). The resulting on-shell Euclidean action is independent of the cutoff at zero temperature. We also find that the same choice of counterterm gives the usual area law for the AdS 4 Schwarzschild black hole entropy in a cutoff-independent manner. The parameter values of the resulting counterterm action correspond to a c=0 theory in the context of the duality between AdS 3 gravity and two-dimensional conformal field theory. We rewrite this theory in terms of the gauge field that is used to recast 3D gravity as a Chern-Simons theory.

  2. Skyrmions, dense matter and nuclear forces

    International Nuclear Information System (INIS)

    Pethick, C.J.

    1984-12-01

    A simple introduction to a number of properties of Skyrme's chiral soliton model of baryons is given. Some implications of the model for dense matter and for nuclear interactions are discussed. (orig.)

  3. Antismoking Ads at the Point of Sale: The Influence of Ad Type and Context on Ad Reactions.

    Science.gov (United States)

    Kim, Annice; Nonnemaker, James; Guillory, Jamie; Shafer, Paul; Parvanta, Sarah; Holloway, John; Farrelly, Matthew

    2017-06-01

    Efforts are underway to educate consumers about the dangers of smoking at the point of sale (POS). Research is limited about the efficacy of POS antismoking ads to guide campaign development. This study experimentally tests whether the type of antismoking ad and the context in which ads are viewed influence people's reactions to the ads. A national convenience sample of 7,812 adult current smokers and recent quitters was randomized to 1 of 39 conditions. Participants viewed one of the four types of antismoking ads (negative health consequences-graphic, negative social consequences-intended emotive, benefits of quitting-informational, benefits of quitting-graphic) in one of the three contexts (alone, next to a cigarette ad, POS tobacco display). We assessed participants' reactions to the ads, including perceived effectiveness, negative emotion, affective dissonance, and motivational reaction. Graphic ads elicited more negative emotion and affective dissonance than benefits of quitting ads. Graphic ads elicited higher perceived effectiveness and more affective dissonance than intended emotive ads. Antismoking ads fared best when viewed alone, and graphic ads were least influenced by the context in which they were viewed. These results suggest that in developing POS campaigns, it is important to consider the competitive pro-tobacco context in which antismoking ads will be viewed.

  4. Hyperons in dense matter

    International Nuclear Information System (INIS)

    Dapo, Haris

    2009-01-01

    The hyperon-nucleon YN low momentum effective interaction (V low k ) allows for an extensive study of the behavior of hyperons in dense matter, together with an investigation of effects of the presence of hyperons on dense matter. The first step towards this goal is the construction of the matrix elements for the hyperon-nucleon low momentum potential. In order to assess the different properties of hyperons within these potentials we calculate the hyperon single-particle potentials in the Hartree-Fock approximation for all of the interactions. Their dependence on both momentum and density, is studied. The single-particle potentials are then used to determine the chemical potential of hyperons in neutron stars. For nucleonic properties, the nucleon-nucleon V low k can be used with the caveat that the calculation of the ground-state energy of symmetric nuclear matter does not correctly reproduce the properties of matter at saturation. With the nucleon-nucleon V low k one is unable to reach the densities needed for the calculation of neutron star masses. To circumvent this problem we use two approaches: in the first one, we parametrize the entire nucleonic sector. In the second one, we replace only the three-body force. The former will enable us to study neutron star masses, and the latter for studying the medium's response to the external probe. In this thesis we take the external probe to be the neutrino. By combining this parametrization with the YN V low k potential, we calculate the equation of state of equilibrated matter. Performing the calculation in the Hartree-Fock approximation at zero temperature, the concentrations of all particles are calculated. From these we can ascertain at which densities hyperons appear for a wide range of parameters. Finally, we calculate the masses of neutron stars with these concentrations. For the calculation of the medium's response to an external probe, we replace the three-body force with a density-dependent interaction. This

  5. Cameras in mobile phones

    Science.gov (United States)

    Nummela, Ville; Viinikanoja, Jarkko; Alakarhu, Juha

    2006-04-01

    One of the fastest growing markets in consumer markets today are camera phones. During past few years total volume has been growing fast and today millions of mobile phones with camera will be sold. At the same time resolution and functionality of the cameras has been growing from CIF towards DSC level. From camera point of view the mobile world is an extremely challenging field. Cameras should have good image quality but in small size. They also need to be reliable and their construction should be suitable for mass manufacturing. All components of the imaging chain should be well optimized in this environment. Image quality and usability are the most important parameters to user. The current trend of adding more megapixels to cameras and at the same time using smaller pixels is affecting both. On the other hand reliability and miniaturization are key drivers for product development as well as the cost. In optimized solution all parameters are in balance but the process of finding the right trade-offs is not an easy task. In this paper trade-offs related to optics and their effects to image quality and usability of cameras are discussed. Key development areas from mobile phone camera point of view are also listed.

  6. Appetite and food intake after consumption of sausages with 10% fat and added wheat or rye bran.

    Science.gov (United States)

    Vuholm, Stine; Arildsen Jakobsen, Louise Margrethe; Vejrum Sørensen, Karina; Kehlet, Ursula; Raben, Anne; Kristensen, Mette

    2014-02-01

    The use of dietary fibers as fat-replacers in sausages gives less energy-dense and thereby healthier foods. Also, dietary fibers have been shown to induce satiety. The objectives of this study were to investigate if appetite sensations and energy intake was affected by (1) addition of dietary fibers to sausages, (2) type of dietary fibers and (3) the food matrix of the dietary fibers. In this randomized cross-over study 25 young men were served four test meals; wheat bran sausages, rye bran sausages, rye bran bread and wheat flour sausages. The test meals were served as breakfast after an overnight fast. Appetite sensations were evaluated by visual analogue scales (VAS) assessed every 30 min for 240 min followed by an ad libitum lunch meal where energy intake was calculated. Both rye bran and wheat bran sausages increased satiety (P appetite sensations and thereby has a potential added health benefit beyond the role as fat-replacer. The satisfying effect of dietary fibers appears to be more pronounced when added to sausages than when added to bread, stressing the importance of food matrix and food processing.

  7. Intake of total and added sugars and nutrient dilution in Australian children and adolescents.

    Science.gov (United States)

    Louie, Jimmy Chun Yu; Tapsell, Linda C

    2015-12-14

    This analysis aimed to examine the association between intake of sugars (total or added) and nutrient intake with data from a recent Australian national nutrition survey, the 2007 Australian National Children's Nutrition and Physical Activity Survey (2007ANCNPAS). Data from participants (n 4140; 51 % male) who provided 2×plausible 24-h recalls were included in the analysis. The values on added sugars for foods were estimated using a previously published ten-step systematic methodology. Reported intakes of nutrients and foods defined in the 2007ANCNPAS were analysed by age- and sex-specific quintiles of %energy from added sugars (%EAS) or %energy from total sugars (%ETS) using ANCOVA. Linear trends across the quintiles were examined using multiple linear regression. Logistic regression analysis was used to calculate the OR of not meeting a specified nutrient reference values for Australia and New Zealand per unit in %EAS or %ETS. Analyses were adjusted for age, sex, BMI z-score and total energy intake. Small but significant negative associations were seen between %EAS and the intakes of most nutrient intakes (all Padded sugars were associated with lower intakes of most nutrient-rich, 'core' food groups and higher intakes of energy-dense, nutrient-poor 'extra' foods. In conclusion, assessing intakes of added sugars may be a better approach for addressing issues of diet quality compared with intakes of total sugars.

  8. Dense Crowds of Virtual Humans

    NARCIS (Netherlands)

    Stüvel, S.A.

    2016-01-01

    This thesis presents a novel crowd simulation method `Torso Crowds', aimed at the simulation of dense crowds. The method is based on the results of user studies and a motion capture experiment, which are also described in this thesis. Torso Crowds introduces a capsule shape to represent people in

  9. Mobility of pyroclastic flows and surges at the Soufriere Hills Volcano, Montserrat

    Science.gov (United States)

    Calder, E.S.; Cole, P.D.; Dade, W.B.; Druitt, T.H.; Hoblitt, R.P.; Huppert, H.E.; Ritchie, L.; Sparks, R.S.J.; Young, S.R.

    1999-01-01

    The Soufriere Hills Volcano on Montserrat has produced avalanche-like pyroclastic flows formed by collapse of the unstable lava dome or explosive activity. Pyroclastic flows associated with dome collapse generate overlying dilute surges which detach from and travel beyond their parent flows. The largest surges partially transform by rapid sedimentation into dense secondary pyroclastic flows that pose significant hazards to distal areas. Different kinds of pyroclastic density currents display contrasting mobilities indicated by ratios of total height of fall H, run-out distance L, area inundated A and volume transported V. Dome-collapse flow mobilities (characterised by either L/H or A/V 2/3) resemble those of terrestrial and extraterrestrial cold-rockfalls (Dade and Huppert, 1998). In contrast, fountain-fed pumice flows and fine-grained, secondary pyroclastic flows travel slower but, for comparable initial volumes and heights, can inundate greater areas.

  10. Breast cancer detection using sonography in women with mammographically dense breasts

    International Nuclear Information System (INIS)

    Okello, Jimmy; Kisembo, Harriet; Bugeza, Sam; Galukande, Moses

    2014-01-01

    Mammography, the gold standard for breast cancer screening misses some cancers, especially in women with dense breasts. Breast ultrasonography as a supplementary imaging tool for further evaluation of symptomatic women with mammographically dense breasts may improve the detection of mass lesions otherwise missed at mammography. The purpose of this study was to determine the incremental breast cancer detection rate using US scanning in symptomatic women with mammographically dense breasts in a resource poor environment. A cross sectional descriptive study. Women referred for mammography underwent bilateral breast ultrasound, and mammography for symptom evaluation. The lesions seen by both modalities were described using sonographic BI-RADS lexicon and categorized. Ultrasound guided core biopsies were performed. IRB approval was obtained and all participants provided informed written consent. In total 148 women with mammographically dense breasts were recruited over six months. The prevalence of breast cancer in symptomatic women with mammographically dense breasts was 22/148 (15%). Mammography detected 16/22 (73%) of these cases and missed 6/22 (27%). The six breast cancer cases missed were correctly diagnosed on breast ultrasonography. Sonographic features typical of breast malignancy were irregular shape, non-parallel orientation, non circumscribed margin, echogenic halo, and increased lesion vascularity (p values < 0.005). Typical sonofeatures of benign mass lesions were: oval shape, parallel orientation and circumscribed margin (p values <0.005). Breast ultrasound scan as a supplementary imaging tool detected 27% more malignant mass lesions otherwise missed by mammography among these symptomatic women with mammographically dense breasts. We recommend that ultra sound scanning in routine evaluation of symptomatic women with mammographically dense breasts

  11. Interparticle interaction and transport processes in dense semiclassical plasmas

    International Nuclear Information System (INIS)

    Baimbetov, F.B.; Giniyatova, Sh.G.

    2005-01-01

    On the basis of the density response formalism an expression for the pseudopotential of dense semiclassical plasma, which takes account of quantum-mechanical effects, local field corrections, and electronic screening effects is obtained. The static structure factors taking into account both local fields and quantum-mechanical effects are calculated. An electrical conductivity, thermal conductivity, and viscosity of dense semiclassical plasma are studied

  12. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    Science.gov (United States)

    2014-02-26

    4 develops a novel model-based approach to de- scribe dynamic behaviors of nodes in MANETs in the pres- ence of misbehaving nodes with the objective...bile node to subjectively yet informatively assess the trust levels of other mobile nodes. Further, SQTrust is resilient against misbehaving nodes. Given...objective trust’’ despite the presence of misbehaving nodes. The desirable output is to achieve high accuracy in peer-to-peer subjective trust evaluation

  13. A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mobile Ad Hoc and Sensor Networks

    OpenAIRE

    Francesco Beritelli; Aurelio La Corte; Corrado Rametta; Francesco Scaglione

    2018-01-01

    As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are...

  14. New Evidence of the Effect of Transaction Costs on Residential Mobility

    NARCIS (Netherlands)

    Ommeren, van Jos; Leuvensteijn, van Michiel

    2002-01-01

    Transaction costs have attracted considerably attention in the theoretical literature on residential mobility. In many European countries, these costs mainly consist of ad-valorem transaction costs. In the current paper, we demonstrate empirically for the Netherlands that the transaction costs have

  15. Dense interstellar cloud chemistry: Basic issues and possible dynamical solution

    International Nuclear Information System (INIS)

    Prasad, S.S.; Heere, K.R.; Tarafdar, S.P.

    1989-01-01

    Standing at crossroad of enthusiasm and frustration, dense intertellar cloud chemistry has a squarely posed fundamental problem: Why do the grains appear to play at best a minor role in the chemistry? Grain surface chemistry creates considerable difficulties when the authors treat dense clouds as static objects and ignore the implications of the processes by which the clouds became dense in the first place. A new generation of models which treat chemical and dynamical evolutions concurrently are therefore presented as possible solution to the current frustrations. The proposed modeling philosophy and agenda could make the next decade quite exciting for interstellar chemistry

  16. Mobile technology and its use in clinical nursing education: a literature review.

    Science.gov (United States)

    O'Connor, Siobhan; Andrews, Tom

    2015-03-01

    Nursing students face a variety of challenges to learning in clinical practice, from the theory-practice gap, to a lack of clinical supervision and the ad hoc nature of learning in clinical environments. Mobile technology is proposed as one way to address these challenges. This article comprehensively summarizes and critically reviews the available literature on mobile technology used in undergraduate clinical nursing education. It identifies the lack of clear definitions and theory in the current body of evidence; the variety of mobile devices and applications used; the benefits of mobile platforms in nursing education; and the complexity of sociotechnical factors, such as the cost, usability, portability, and quality of mobile tools, that affect their use in undergraduate clinical nursing education. Implications for nursing education and practice are outlined, and recommendations for future research are discussed. Copyright 2015, SLACK Incorporated.

  17. Dietary intake of energy-dense, nutrient-poor and nutrient-dense food sources in children with cystic fibrosis.

    Science.gov (United States)

    Sutherland, Rosie; Katz, Tamarah; Liu, Victoria; Quintano, Justine; Brunner, Rebecca; Tong, Chai Wei; Collins, Clare E; Ooi, Chee Y

    2018-04-30

    Prescription of a high-energy, high-fat diet is a mainstay of nutrition management in cystic fibrosis (CF). However, families may be relying on energy-dense, nutrient-poor (EDNP) foods rather than nutrient-dense (ND) foods to meet dietary targets. We aimed to evaluate the relative contribution of EDNP and ND foods to the usual diets of children with CF and identify sociodemographic factors associated with higher EDNP intakes. This is a cross-sectional comparison of children with CF aged 2-18 years and age- and gender-matched controls. Dietary intake was assessed using the Australian Child and Adolescent Eating Survey (ACAES) food frequency questionnaire. Children with CF (n = 80: 37 males; mean age 9.3 years) consumed significantly more EDNP foods than controls (mean age 9.8 years) in terms of both total energy (median [IQR]: 1301 kcal/day (843-1860) vs. 686 kcal/day (480-1032); p energy intake (median [IQR]: 44% (34-51) vs. 31% (24-43); p energy requirements (median [IQR]: 158% (124-187) vs. 112% (90-137); p energy- and fat-dense CF diet is primarily achieved by overconsumption of EDNP foods, rather than ND sources. This dietary pattern may not be optimal for the future health of children with CF, who are now expected to survive well into adulthood. Copyright © 2018 European Cystic Fibrosis Society. All rights reserved.

  18. PHOTOCHEMICAL HEATING OF DENSE MOLECULAR GAS

    Energy Technology Data Exchange (ETDEWEB)

    Glassgold, A. E. [Astronomy Department, University of California, Berkeley, CA 94720 (United States); Najita, J. R. [National Optical Astronomy Observatory, 950 North Cherry Avenue, Tucson, AZ 85719 (United States)

    2015-09-10

    Photochemical heating is analyzed with an emphasis on the heating generated by chemical reactions initiated by the products of photodissociation and photoionization. The immediate products are slowed down by collisions with the ambient gas and then heat the gas. In addition to this direct process, heating is also produced by the subsequent chemical reactions initiated by these products. Some of this chemical heating comes from the kinetic energy of the reaction products and the rest from collisional de-excitation of the product atoms and molecules. In considering dense gas dominated by molecular hydrogen, we find that the chemical heating is sometimes as large, if not much larger than, the direct heating. In very dense gas, the total photochemical heating approaches 10 eV per photodissociation (or photoionization), competitive with other ways of heating molecular gas.

  19. Current status of AdS instability

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    arXiv:1403.6471 and thoroughly developed in arXiv:1407.6273. On the other hand the negative cosmological constant allows for the existence of stable, time-periodic, asymptotically AdS solutions of Einstein equations [arXiv:1303.3186].

  20. Loops in AdS from conformal field theory

    Science.gov (United States)

    Aharony, Ofer; Alday, Luis F.; Bissi, Agnese; Perlmutter, Eric

    2017-07-01

    We propose and demonstrate a new use for conformal field theory (CFT) crossing equations in the context of AdS/CFT: the computation of loop amplitudes in AdS, dual to non-planar correlators in holographic CFTs. Loops in AdS are largely unexplored, mostly due to technical difficulties in direct calculations. We revisit this problem, and the dual 1 /N expansion of CFTs, in two independent ways. The first is to show how to explicitly solve the crossing equations to the first subleading order in 1 /N 2, given a leading order solution. This is done as a systematic expansion in inverse powers of the spin, to all orders. These expansions can be resummed, leading to the CFT data for finite values of the spin. Our second approach involves Mellin space. We show how the polar part of the four-point, loop-level Mellin amplitudes can be fully reconstructed from the leading-order data. The anomalous dimensions computed with both methods agree. In the case of ϕ 4 theory in AdS, our crossing solution reproduces a previous computation of the one-loop bubble diagram. We can go further, deriving the four-point scalar triangle diagram in AdS, which had never been computed. In the process, we show how to analytically derive anomalous dimensions from Mellin amplitudes with an infinite series of poles, and discuss applications to more complicated cases such as the N = 4 super-Yang-Mills theory.

  1. Supersymmetric warped AdS in extended topologically massive supergravity

    International Nuclear Information System (INIS)

    Deger, N.S.; Kaya, A.; Samtleben, H.; Sezgin, E.

    2014-01-01

    We determine the most general form of off-shell N=(1,1) supergravity field configurations in three dimensions by requiring that at least one off-shell Killing spinor exists. We then impose the field equations of the topologically massive off-shell supergravity and find a class of solutions whose properties crucially depend on the norm of the auxiliary vector field. These are spacelike-squashed and timelike-stretched AdS 3 for the spacelike and timelike norms, respectively. At the transition point where the norm vanishes, the solution is null warped AdS 3 . This occurs when the coefficient of the Lorentz–Chern–Simons term is related to the AdS radius by μℓ=2. We find that the spacelike-squashed AdS 3 can be modded out by a suitable discrete subgroup of the isometry group, yielding an extremal black hole solution which avoids closed timelike curves

  2. New supersymmetric AdS4 type II vacua

    International Nuclear Information System (INIS)

    Tsimpis, D.

    2010-01-01

    We review the supersymmetric AdS 4 x w M 6 backgrounds of type IIA/IIB supergravity constructed in[1]. In type IIA the supersymmetry is N=2, and the six-dimensional internal space is locally an S 2 bundle over a four-dimensional Kaehler-Einstein base; in IIB the internal space is the direct product of a circle and a five-dimensional squashed Sasaki-Einstein manifold. These backgrounds do not contain any sources, all fluxes (including the Romans mass in IIA) are generally non-zero, and the dilaton and warp factor are non-constant. The IIA solutions include the massive deformations of the IIA reduction of the eleven-dimensional AdS 4 x Y p,q solutions, and had been predicted to exist on the basis of the AdS 4 /CFT 3 correspondence. (Abstract Copyright [2010], Wiley Periodicals, Inc.)

  3. Instantons from geodesics in AdS moduli spaces

    Science.gov (United States)

    Ruggeri, Daniele; Trigiante, Mario; Van Riet, Thomas

    2018-03-01

    We investigate supergravity instantons in Euclidean AdS5 × S5/ℤk. These solutions are expected to be dual to instantons of N = 2 quiver gauge theories. On the supergravity side the (extremal) instanton solutions are neatly described by the (lightlike) geodesics on the AdS moduli space for which we find the explicit expression and compute the on-shell actions in terms of the quantised charges. The lightlike geodesics fall into two categories depending on the degree of nilpotency of the Noether charge matrix carried by the geodesic: for degree 2 the instantons preserve 8 supercharges and for degree 3 they are non-SUSY. We expect that these findings should apply to more general situations in the sense that there is a map between geodesics on moduli-spaces of Euclidean AdS vacua and instantons with holographic counterparts.

  4. Consumer value of context aware and location based mobile services

    NARCIS (Netherlands)

    De Vos, Henny; Haaker, Timber; Teerling, Marije; Kleijnen, M.H.P.

    2008-01-01

    Context aware services have the ability to utilize information about the user's context to adapt services to the user's current situation and needs. In this paper we consider users' perceptions of the added value of location awareness and presence information in mobile services. We use an

  5. Liquid Chromatography–Mass Spectrometry Based Metabolomics Study of Cloned versus Normal Pigs Fed Either Restricted or Ad Libitum High-Energy Diets

    DEFF Research Database (Denmark)

    Christensen, Kirstine Lykke; Hedemann, Mette Skou; Jørgensen, Henry

    2012-01-01

    Genetically identical cloned pigs should in principle eliminate biological variation and provide more pronounced effects when subjected to, e.g., dietary interventions, but little is known about how phenotype and phenotypic variation is affected by cloning. Therefore, an investigation...... of the metabolome of cloned pigs compared to normal control pigs was performed to elucidate the variation and possible differences in the metabolic phenotypes during a dietary intervention. A total of 19 control pigs and 17 cloned pigs were given the same high-energy dense diet either ad libitum or in a restricted...... manner (60% of ad libitum) for 6 months, and plasma was subjected to liquid chromatography–mass spectrometry nontargeted metabolomics and biochemical analyses. Low systemic levels of IGF-1 could indicate altered growth conditions and energy metabolism in cloned pigs. In response to ad libitum feeding...

  6. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  7. Nucleon structure and properties of dense matter

    International Nuclear Information System (INIS)

    Kutschera, M.; Pethick, C.J.; Illinois Univ., Urbana, IL

    1988-01-01

    We consider the properties of dense matter in a framework of the Skyrme soliton model and the chiral bag model. The influence of the nucleon structure on the equation of state of dense matter is emphasized. We find that in both models the energy per unit volume is proportional to n 4/3 , n being the baryon number density. We discuss the properties of neutron stars with a derived equation of state. The role of many-body effects is investigated. The effect of including higher order terms in the chiral lagrangian is examined. The phase transition to quark matter is studied. 29 refs., 6 figs. (author)

  8. Processing and properties of magnesium containing a dense uniform dispersion of nanoparticles.

    Science.gov (United States)

    Chen, Lian-Yi; Xu, Jia-Quan; Choi, Hongseok; Pozuelo, Marta; Ma, Xiaolong; Bhowmick, Sanjit; Yang, Jenn-Ming; Mathaudhu, Suveen; Li, Xiao-Chun

    2015-12-24

    Magnesium is a light metal, with a density two-thirds that of aluminium, is abundant on Earth and is biocompatible; it thus has the potential to improve energy efficiency and system performance in aerospace, automobile, defence, mobile electronics and biomedical applications. However, conventional synthesis and processing methods (alloying and thermomechanical processing) have reached certain limits in further improving the properties of magnesium and other metals. Ceramic particles have been introduced into metal matrices to improve the strength of the metals, but unfortunately, ceramic microparticles severely degrade the plasticity and machinability of metals, and nanoparticles, although they have the potential to improve strength while maintaining or even improving the plasticity of metals, are difficult to disperse uniformly in metal matrices. Here we show that a dense uniform dispersion of silicon carbide nanoparticles (14 per cent by volume) in magnesium can be achieved through a nanoparticle self-stabilization mechanism in molten metal. An enhancement of strength, stiffness, plasticity and high-temperature stability is simultaneously achieved, delivering a higher specific yield strength and higher specific modulus than almost all structural metals.

  9. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  10. Reliability analysis of cluster-based ad-hoc networks

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2008-01-01

    The mobile ad-hoc wireless network (MAWN) is a new and emerging network scheme that is being employed in a variety of applications. The MAWN varies from traditional networks because it is a self-forming and dynamic network. The MAWN is free of infrastructure and, as such, only the mobile nodes comprise the network. Pairs of nodes communicate either directly or through other nodes. To do so, each node acts, in turn, as a source, destination, and relay of messages. The virtue of a MAWN is the flexibility this provides; however, the challenge for reliability analyses is also brought about by this unique feature. The variability and volatility of the MAWN configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate because no single structure or configuration represents all manifestations of a MAWN. For this reason, new methods are being developed to analyze the reliability of this new networking technology. New published methods adapt to this feature by treating the configuration probabilistically or by inclusion of embedded mobility models. This paper joins both methods together and expands upon these works by modifying the problem formulation to address the reliability analysis of a cluster-based MAWN. The cluster-based MAWN is deployed in applications with constraints on networking resources such as bandwidth and energy. This paper presents the problem's formulation, a discussion of applicable reliability metrics for the MAWN, and illustration of a Monte Carlo simulation method through the analysis of several example networks

  11. Dry processing versus dense medium processing for preparing thermal coal

    CSIR Research Space (South Africa)

    De Korte, GJ

    2013-10-01

    Full Text Available of the final product. The separation efficiency of dry processes is, however, not nearly as good as that of dense medium and, as a result, it is difficult to effectively beneficiate coals with a high near-dense content. The product yield obtained from some raw...

  12. Constrained supermanifolds for AdS M-theory backgrounds

    International Nuclear Information System (INIS)

    Fre, Pietro; Grassi, Pietro Antonio

    2008-01-01

    A long standing problem is the supergauge completion of AdS 4 x ({G/H}) 7 or AdS 5 x ({G/H}) 5 backgrounds which preserve less then maximal supersymmetry. In parallel with the supersolvable realization of the AdS 4 x S 7 background based on κ-symmetry, we develop a technique which amounts to solving the above-mentioned problem in a way useful for pure spinor quantization for supermembranes and superstrings. Instead of gauge fixing some of the superspace coordinates using κ-symmetry, we impose an additional constraint on them reproducing the simplifications of the supersolvable representations. The constraints are quadratic, homogeneous, Sp(4,R)-covariant, and consistent from the quantum point of view in the pure spinor approach. Here we provide the geometrical solution which, in a subsequent work, will be applied to the membrane and the superstring sigma models

  13. The Effect of Current Trends in Mobile Marketing on Traditional Marketing Communications and Customer Relationship Management

    OpenAIRE

    Hoffmann, Kristina

    2011-01-01

    As consumers increasingly prefer mobile devices as their main communication and entertainment channel, it becomes more and more important for marketers as well. Mobile marketing today does not only include sending SMS and E-mail but rather is becoming a whole new interactive, rich-media marketing channel with possibilities for direct engagement with ads and brands like never before. This research attempts to provide a greater understanding about the effects of current trends in mobile mark...

  14. Efficient Online Aggregates in Dense-Region-Based Data Cube Representations

    Science.gov (United States)

    Haddadin, Kais; Lauer, Tobias

    In-memory OLAP systems require a space-efficient representation of sparse data cubes in order to accommodate large data sets. On the other hand, most efficient online aggregation techniques, such as prefix sums, are built on dense array-based representations. These are often not applicable to real-world data due to the size of the arrays which usually cannot be compressed well, as most sparsity is removed during pre-processing. A possible solution is to identify dense regions in a sparse cube and only represent those using arrays, while storing sparse data separately, e.g. in a spatial index structure. Previous dense-region-based approaches have concentrated mainly on the effectiveness of the dense-region detection (i.e. on the space-efficiency of the result). However, especially in higher-dimensional cubes, data is usually more cluttered, resulting in a potentially large number of small dense regions, which negatively affects query performance on such a structure. In this paper, our focus is not only on space-efficiency but also on time-efficiency, both for the initial dense-region extraction and for queries carried out in the resulting hybrid data structure. We describe two methods to trade available memory for increased aggregate query performance. In addition, optimizations in our approach significantly reduce the time to build the initial data structure compared to former systems. Also, we present a straightforward adaptation of our approach to support multi-core or multi-processor architectures, which can further enhance query performance. Experiments with different real-world data sets show how various parameter settings can be used to adjust the efficiency and effectiveness of our algorithms.

  15. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad

    2016-07-01

    Full Text Available The blind flooding of query packets in route discovery more often characterizes the broadcast storm problem, exponentially increases energy consumption of intermediate nodes and congests the entire network. In such a congested network, the task of establishing the path between resources may become very complex and unwieldy. An extensive research work has been done in this area to improve the route discovery phase of routing protocols by reducing broadcast expenses. The purpose of this study is to provide a comparative analysis of existing broadcasting techniques for the route discovery phase, in order to bring about an efficient broadcasting technique for determining the route with minimum conveying nodes in ad-hoc networks. The study is designed to highlight the collective merits and demerits of such broadcasting techniques along with certain conclusions that would contribute to the choice of broadcasting techniques.

  16. School and district wellness councils and availability of low-nutrient, energy-dense vending fare in Minnesota middle and high schools.

    Science.gov (United States)

    Kubik, Martha Y; Lytle, Leslie A; Farbakhsh, Kian

    2011-01-01

    The Child Nutrition and WIC Reauthorization Act of 2004 required school districts participating in the federal school meals program to establish by the start of the 2006-2007 school year policies that included nutrition guidelines for all foods sold on school campus during the school day and policy development involving key stakeholders. For many schools, policy development was done by wellness councils. This study examined the association between having a wellness council and availability of low-nutrient, energy-dense foods/beverages in school vending machines following enactment of the federal legislation. In 2006-2007, Minnesota middle (n=35) and high (n=54) school principals reported whether their school and district had a wellness council. Trained research staff observed foods/beverages in vending machines accessible to students. Low-nutrient, energy-dense foods/beverages (snacks >3 g fat or >200 calories/serving, and soda, fruit/sport drinks and reduced-fat/whole milk) were grouped into seven categories (eg, high-fat baked goods) and a food score was calculated. Higher scores indicated more low-nutrient, energy-dense vending fare. Multivariate linear regression, adjusted for school characteristics, was used to examine associations between scores and a three-category council variable (district-only; district and school; no council). Among schools, 53% had district-only councils, 38% district and school councils, and 9% had no council. Schools with both a district and school council had a significantly lower mean food score than schools without councils (P=0.03). The potential of wellness councils to impact availability of low-nutrient, energy-dense vending fare is promising. There may be an added benefit to having both a school and district council. Copyright © 2011 American Dietetic Association. Published by Elsevier Inc. All rights reserved.

  17. Mobile English learning: an evidence-based study with fifth graders

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; de Geus, K.

    2011-01-01

    Three groups participated in a study on the added value of mobile technology for learning English as a second language for primary school students. The first group had classroom lessons in English about zoo animals and their characteristics. The second group took classroom lessons and worked with a

  18. Leader Election Protocol for Energy Efficient Mobile Sensor Networks (EYES)

    NARCIS (Netherlands)

    Dulman, S.O.; Havinga, Paul J.M.; Hurink, Johann L.

    In this paper we develop and analyze a wireless wave leader election protocol (WWLE) for wireless mobile ad hoc networks, with emphasis on the resulting energy consumption. Within the operating system of the EYES architecture we apply a power model to schedule tasks in order to minimize energy

  19. Noncommutative D-branes from covariant AdS superstring

    International Nuclear Information System (INIS)

    Sakaguchi, Makoto; Yoshida, Kentaroh

    2008-01-01

    We study noncommutative (NC) D-branes on AdS 5 xS 5 from κ-invariance of covariant Green-Schwarz action of an open string with a non-trivial world-volume flux. Finding boundary conditions to ensure the κ-invariance, we can see possible configurations of the NC D-branes. With this method 1/4 BPS NC D-branes are discussed. The resulting NC Dp-branes are 1/4 BPS at arbitrary position other than the p=1 case. The exceptional D-string is 1/2 BPS at the origin and 1/4 BPS outside the origin. Those are reduced to possible 1/4 BPS or 1/2 BPS AdS D-branes in the commutative limit. The same analysis is applied to an open superstring in a pp-wave and leads to 1/4 BPS configurations of NC D-branes. These D-branes are consistently obtained from AdS D-branes via the Penrose limit

  20. The Green Bank Ammonia Survey: Dense Cores under Pressure in Orion A

    Energy Technology Data Exchange (ETDEWEB)

    Kirk, Helen; Di Francesco, James [NRC Herzberg Astronomy and Astrophysics, 5071 West Saanich Rd, Victoria, BC, V9E 2E7 (Canada); Friesen, Rachel K. [Dunlap Institute for Astronomy and Astrophysics, University of Toronto, 50 St. George St., Toronto, Ontario M5S 3H4 (Canada); Pineda, Jaime E.; Caselli, Paola; Alves, Felipe O.; Chacón-Tanarro, Ana; Punanova, Anna [Max-Planck-Institut für extraterrestrische Physik, Giessenbachstrasse 1, D-85748, Garching (Germany); Rosolowsky, Erik [Department of Physics, University of Alberta, Edmonton, AB (Canada); Offner, Stella S. R. [Department of Astronomy, University of Massachusetts, Amherst, MA 01003 (United States); Matzner, Christopher D.; Singh, Ayushi [Department of Astronomy and Astrophysics, University of Toronto, 50 St. George St., Toronto, Ontario, M5S 3H4 (Canada); Myers, Philip C.; Chen, How-Huan [Harvard-Smithsonian Center for Astrophysics, 60 Garden St., Cambridge, MA 02138 (United States); Chen, Michael Chun-Yuan; Keown, Jared [Department of Physics and Astronomy, University of Victoria, 3800 Finnerty Rd., Victoria, BC, V8P 5C2 (Canada); Seo, Young Min [Jet Propulsion Laboratory, NASA, 4800 Oak Grove Dr., Pasadena, CA 91109 (United States); Shirley, Yancy [Steward Observatory, 933 North Cherry Ave., Tucson, AZ 85721 (United States); Ginsburg, Adam [National Radio Astronomy Observatory, Socorro, NM 87801 (United States); Hall, Christine [Department of Physics, Engineering Physics and Astronomy, Queen’s University, Kingston, Ontario, K7L 3N6 (Canada); and others

    2017-09-10

    We use data on gas temperature and velocity dispersion from the Green Bank Ammonia Survey and core masses and sizes from the James Clerk Maxwell Telescope Gould Belt Survey to estimate the virial states of dense cores within the Orion A molecular cloud. Surprisingly, we find that almost none of the dense cores are sufficiently massive to be bound when considering only the balance between self-gravity and the thermal and non-thermal motions present in the dense gas. Including the additional pressure binding imposed by the weight of the ambient molecular cloud material and additional smaller pressure terms, however, suggests that most of the dense cores are pressure-confined.