WorldWideScience

Sample records for hoc analyses revealed

  1. Ad-hoc networking towards seamless communications

    CERN Document Server

    Gavrilovska, Liljana

    2006-01-01

    Ad-Hoc Networking Towards Seamless Communications is dedicated to an area that attracts growing interest in academia and industry and concentrates on wireless ad hoc networking paradigm. The persistent efforts to acquire the ability to establish dynamic wireless connections from anywhere to anyone with any device without prerequisite imbedded infrastructure move the communications boundaries towards ad-hoc networks. Recently, ad hoc networking has attracted growing interest due to advances in wireless communications, and developed framework for running IP based protocols. The expected degree of penetration of these networks will depend on the successful resolution of the key features. Ad-hoc networks pose many complex and open problems for researchers. Ad-Hoc Networking Towards Seamless Communications reveals the state-of-the-art in wireless ad-hoc networking and discusses some of the key research topics that are expected to promote and accelerate the commercial applications of these networks (e.g., MAC, rout...

  2. Switching to olanzapine long-acting injection from either oral olanzapine or any other antipsychotic: comparative post hoc analyses

    Directory of Open Access Journals (Sweden)

    Ciudad A

    2013-11-01

    Full Text Available Antonio Ciudad,1 Ernie Anand,2 Lovisa Berggren,3 Marta Casillas,4 Alexander Schacht,3 Elena Perrin5 1Department of Clinical Research and Development, Eli Lilly & Co, Madrid, Spain; 2Neuroscience Medical Affairs – EU, Lilly Research Centre, Windlesham, Surrey, UK; 3Global Statistical Sciences, Eli Lilly & Co, Bad Homburg, Germany; 4European Scientific Communications, Eli Lilly & Co, Madrid, Spain; 5Medical Department, Eli Lilly & Co, Suresnes, Paris, France Background: A considerable proportion of patients suffering from schizophrenia show suboptimal responses to oral antipsychotics due to inadequate adherence. Hence, they are likely to benefit from switching to a long-acting injectable formulation. These post hoc analyses assessed the clinical effects of switching to olanzapine long-acting injection (OLAI from either oral olanzapine (OLZ or other antipsychotics (non-OLZ. Methods: Post hoc analyses were done based on two randomized studies (one short-term, one long-term conducted in patients suffering from schizophrenia and treated with OLAI. The short-term study was an 8-week placebo-controlled, double-blind trial in acute patients, and the long-term study was a 2-year, oral olanzapine-controlled, open-label, follow-up of stabilized outpatients. Results: These analyses used data from 62 OLAI-treated patients (12 switched from OLZ, 50 from non-OLZ from the short-term study and 190 OLAI-treated patients (56 switched from OLZ, 134 from non-OLZ from the long-term study. Kaplan–Meier survival analyses of time to all-cause discontinuation of OLAI treatment did not differ significantly between OLZ and non-OLZ patients in the short-term study (P=0.209 or long-term study (P=0.448. Similarly, the proportions of OLZ and non-OLZ patients that discontinued OLAI were not statistically different in the short-term (16.7% versus 36.0%, respectively; P=0.198 or long-term (57.1% versus 47.8% respectively; P=0.238 studies. In the short-term study, no

  3. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  4. Anti-Vascular Endothelial Growth Factor Comparative Effectiveness Trial for Diabetic Macular Edema: Additional Efficacy Post Hoc Analyses of a Randomized Clinical Trial.

    Science.gov (United States)

    Jampol, Lee M; Glassman, Adam R; Bressler, Neil M; Wells, John A; Ayala, Allison R

    2016-12-01

    Post hoc analyses from the Diabetic Retinopathy Clinical Research Network randomized clinical trial comparing aflibercept, bevacizumab, and ranibizumab for diabetic macular edema (DME) might influence interpretation of study results. To provide additional outcomes comparing 3 anti-vascular endothelial growth factor (VEGF) agents for DME. Post hoc analyses performed from May 3, 2016, to June 21, 2016, of a randomized clinical trial performed from August 22, 2012, to September 23, 2015, of 660 participants comparing 3 anti-VEGF treatments in eyes with center-involved DME causing vision impairment. Randomization to intravitreous aflibercept (2.0 mg), bevacizumab (1.25 mg), or ranibizumab (0.3 mg) administered up to monthly based on a structured retreatment regimen. Focal/grid laser treatment was added after 6 months for the treatment of persistent DME. Change in visual acuity (VA) area under the curve and change in central subfield thickness (CST) within subgroups based on whether an eye received laser treatment for DME during the study. Post hoc analyses were performed for 660 participants (mean [SD] age, 61 [10] years; 47% female, 65% white, 16% black or African American, 16% Hispanic, and 3% other). For eyes with an initial VA of 20/50 or worse, VA improvement was greater with aflibercept than the other agents at 1 year but superior only to bevacizumab at 2 years. Mean (SD) letter change in VA over 2 years (area under curve) was greater with aflibercept (+17.1 [9.7]) than with bevacizumab (+12.1 [9.4]; 95% CI, +1.6 to +7.3; P grid laser treatment was performed for DME, the only participants to have a substantial reduction in mean CST between 1 and 2 years were those with a baseline VA of 20/50 or worse receiving bevacizumab and laser treatment (mean [SD], -55 [108] µm; 95% CI, -82 to -28 µm; P grid laser treatment, ceiling and floor effects, or both may account for mean thickness reductions noted only in bevacizumab-treated eyes between 1 and 2 years

  5. Symptomatic efficacy of rasagiline monotherapy in early Parkinson's disease: post-hoc analyses from the ADAGIO trial.

    Science.gov (United States)

    Jankovic, Joseph; Berkovich, Elijahu; Eyal, Eli; Tolosa, Eduardo

    2014-06-01

    The ADAGIO study included a large cohort of patients with early PD (baseline total-UPDRS = 20) who were initially randomized to rasagiline and placebo, thereby allowing analyses of symptomatic efficacy. Post-hoc analyses comparing the efficacy of rasagiline 1 mg/day (n = 288) versus placebo (n = 588) on key symptoms at 36 weeks, and on total-UPDRS scores over 72 weeks (completer population: rasagiline 1 mg/day n = 221, placebo n = 392) were performed. Treatment with rasagiline resulted in significantly better tremor, bradykinesia, rigidity and postural-instability-gait-difficulty scores at week 36 versus placebo. Whereas the placebo group experienced progressive deterioration from baseline (2.6 UPDRS points at week 36), patients in the rasagiline group were maintained at baseline values at week 60 (UPDRS-change of 0.3 points). At week 72, patients who had received continuous monotherapy with rasagiline experienced a worsening of only 1.6 points. Treatment with rasagiline maintained motor function to baseline values for at least a year with significant benefits observed in all key PD motor symptoms. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2012)

    NARCIS (Netherlands)

    Pitsillides, A.; Douligeris, C.; Vassiliou, V.; Heijenk, Geert; Cavalcante de Oliveira, J.

    Message from the General Chairs Welcome to the 2012 Mediterranean Ad Hoc Networking Workshop in Ayia Napa, Cyprus. We are excited to host Med-Hoc-Net. As a major annual international workshop, following recent successful workshops in Sicily (2006), Corfu (2007), Palma de Mallorca (2008), Haifa

  7. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  8. Algorithmic, LOCS and HOCS (chemistry) exam questions: performance and attitudes of college students

    Science.gov (United States)

    Zoller, Uri

    2002-02-01

    The performance of freshmen biology and physics-mathematics majors and chemistry majors as well as pre- and in-service chemistry teachers in two Israeli universities on algorithmic (ALG), lower-order cognitive skills (LOCS), and higher-order cognitive skills (HOCS) chemistry exam questions were studied. The driving force for the study was an interest in moving science and chemistry instruction from an algorithmic and factual recall orientation dominated by LOCS, to a decision-making, problem-solving and critical system thinking approach, dominated by HOCS. College students' responses to the specially designed ALG, LOCS and HOCS chemistry exam questions were scored and analysed for differences and correlation between the performance means within and across universities by the questions' category. This was followed by a combined student interview - 'speaking aloud' problem solving session for assessing the thinking processes involved in solving these types of questions and the students' attitudes towards them. The main findings were: (1) students in both universities performed consistently in each of the three categories in the order of ALG > LOCS > HOCS; their 'ideological' preference, was HOCS > algorithmic/LOCS, - referred to as 'computational questions', but their pragmatic preference was the reverse; (2) success on algorithmic/LOCS does not imply success on HOCS questions; algorithmic questions constitute a category on its own as far as students success in solving them is concerned. Our study and its results support the effort being made, worldwide, to integrate HOCS-fostering teaching and assessment strategies and, to develop HOCS-oriented science-technology-environment-society (STES)-type curricula within science and chemistry education.

  9. TMAP ad hoc Working Group Fish Progress report 2007

    NARCIS (Netherlands)

    Bolle, L.J.; Damm, U.; Diederichs, B.; Jager, Z.; Overzee, van H.M.J.

    2007-01-01

    Building on previous work done by the TMAP ad hoc Working Group Fish, a meeting and a workshop were held in Hamburg in June and October 2007. The most important aim of both was to come to an agreement on how to proceed with the data preparations and analyses, and to facilitate the exchange of data

  10. Ad hoc public disclosure obligations of public companies on the capital market

    Directory of Open Access Journals (Sweden)

    Marjanski Vladimir

    2012-01-01

    Full Text Available The author gives a comprehensive analysis of the obligations of public companies regarding the provision of periodical (ad hoc information to the public on the capital market. Ad hoc disclosure is to achieve a number of aims. It is one of the devices to secure the market's functional abilities. By means of regularly fulfilling this obligation, the market is provided with all the relevant information necessary to form adequate prices of market materials - i.e. securities and other financial instruments (the function of market protection. Investors are thus being able to aptly respond to modified circumstances and deliver investment decisions whether to buy or sell market materials the price of which are being changed (the function of investor protection. Due to the fact that the duty of ad hoc disclosure encompasses the obligation to reveal insider information directly affecting the emitter, ad hoc disclosure serves as a preventive measure, i.e. as a protection against illicit trade with insider information (the function of prevention against the abuse of insider information.

  11. Deconstructing tolerance with clobazam: Post hoc analyses from an open-label extension study.

    Science.gov (United States)

    Gidal, Barry E; Wechsler, Robert T; Sankar, Raman; Montouris, Georgia D; White, H Steve; Cloyd, James C; Kane, Mary Clare; Peng, Guangbin; Tworek, David M; Shen, Vivienne; Isojarvi, Jouko

    2016-10-25

    To evaluate potential development of tolerance to adjunctive clobazam in patients with Lennox-Gastaut syndrome. Eligible patients enrolled in open-label extension study OV-1004, which continued until clobazam was commercially available in the United States or for a maximum of 2 years outside the United States. Enrolled patients started at 0.5 mg·kg -1 ·d -1 clobazam, not to exceed 40 mg/d. After 48 hours, dosages could be adjusted up to 2.0 mg·kg -1 ·d -1 (maximum 80 mg/d) on the basis of efficacy and tolerability. Post hoc analyses evaluated mean dosages and drop-seizure rates for the first 2 years of the open-label extension based on responder categories and baseline seizure quartiles in OV-1012. Individual patient listings were reviewed for dosage increases ≥40% and increasing seizure rates. Data from 200 patients were included. For patients free of drop seizures, there was no notable change in dosage over 24 months. For responder groups still exhibiting drop seizures, dosages were increased. Weekly drop-seizure rates for 100% and ≥75% responders demonstrated a consistent response over time. Few patients had a dosage increase ≥40% associated with an increase in seizure rates. Two-year findings suggest that the majority of patients do not develop tolerance to the antiseizure actions of clobazam. Observed dosage increases may reflect best efforts to achieve seizure freedom. It is possible that the clinical development of tolerance to clobazam has been overstated. NCT00518713 and NCT01160770. This study provides Class III evidence that the majority of patients do not develop tolerance to clobazam over 2 years of treatment. © 2016 American Academy of Neurology.

  12. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  13. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  14. Effects of memantine on cognition in patients with moderate to severe Alzheimer's disease: post-hoc analyses of ADAS-cog and SIB total and single-item scores from six randomized, double-blind, placebo-controlled studies.

    Science.gov (United States)

    Mecocci, Patrizia; Bladström, Anna; Stender, Karina

    2009-05-01

    The post-hoc analyses reported here evaluate the specific effects of memantine treatment on ADAS-cog single-items or SIB subscales for patients with moderate to severe AD. Data from six multicentre, randomised, placebo-controlled, parallel-group, double-blind, 6-month studies were used as the basis for these post-hoc analyses. All patients with a Mini-Mental State Examination (MMSE) score of less than 20 were included. Analyses of patients with moderate AD (MMSE: 10-19), evaluated with the Alzheimer's disease Assessment Scale (ADAS-cog) and analyses of patients with moderate to severe AD (MMSE: 3-14), evaluated using the Severe Impairment Battery (SIB), were performed separately. The mean change from baseline showed a significant benefit of memantine treatment on both the ADAS-cog (p ADAS-cog single-item analyses showed significant benefits of memantine treatment, compared to placebo, for mean change from baseline for commands (p < 0.001), ideational praxis (p < 0.05), orientation (p < 0.01), comprehension (p < 0.05), and remembering test instructions (p < 0.05) for observed cases (OC). The SIB subscale analyses showed significant benefits of memantine, compared to placebo, for mean change from baseline for language (p < 0.05), memory (p < 0.05), orientation (p < 0.01), praxis (p < 0.001), and visuospatial ability (p < 0.01) for OC. Memantine shows significant benefits on overall cognitive abilities as well as on specific key cognitive domains for patients with moderate to severe AD. (c) 2009 John Wiley & Sons, Ltd.

  15. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  16. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  17. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  18. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-08-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical and virtual carrier sense networks, which reveals counter-intuitively that receivers in large dense networks with directional antennas can experience larger interference than in omnidirectional networks unless the beamwidth is sufficiently small. Validity of mathematical analysis is confirmed using simulations.

  19. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  20. Cytoarchitecture of the human lateral occipital cortex: mapping of two extrastriate areas hOc4la and hOc4lp.

    Science.gov (United States)

    Malikovic, Aleksandar; Amunts, Katrin; Schleicher, Axel; Mohlberg, Hartmut; Kujovic, Milenko; Palomero-Gallagher, Nicola; Eickhoff, Simon B; Zilles, Karl

    2016-05-01

    The microstructural correlates of the functional segregation of the human lateral occipital cortex are largely unknown. Therefore, we analyzed the cytoarchitecture of this region in ten human post-mortem brains using an observer-independent and statistically testable parcellation method to define the position and extent of areas in the lateral occipital cortex. Two new cytoarchitectonic areas were found: an anterior area hOc4la and a posterior area hOc4lp. hOc4la was located behind the anterior occipital sulcus in rostral and ventral portions of this region where it occupies the anterior third of the middle and inferior lateral occipital gyri. hOc4lp was found in caudal and dorsal portions of this region where it extends along the superior and middle lateral occipital gyri. The cytoarchitectonic areas were registered to 3D reconstructions of the corresponding brains, which were subsequently spatially normalized to the Montreal Neurological Institute reference space. Continuous probabilistic maps of both areas based on the analysis of ten brains were generated to characterize their inter-subject variability in location and size. The maps of hOc4la and hOc4lp were then used as seeds for meta-analytic connectivity modeling and quantitative functional decoding to identify their co-activation patterns and assignment to functional domains. Convergent evidence from their location, topography, size, functional domains and connectivity indicates that hOc4la and hOc4lp are the potential anatomical correlates of the functionally defined lateral occipital areas LO-1 and LO-2.

  1. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  2. AD HOC TEAMWORK BEHAVIORS FOR INFLUENCING A FLOCK

    Directory of Open Access Journals (Sweden)

    Katie Genter

    2016-02-01

    Full Text Available Ad hoc teamwork refers to the challenge of designing agents that can influence the behavior of a team, without prior coordination with its teammates. This paper considers influencing a flock of simple robotic agents to adopt a desired behavior within the context of ad hoc teamwork. Specifically, we examine how the ad hoc agents should behave in order to orient a flock towards a target heading as quickly as possible when given knowledge of, but no direct control over, the behavior of the flock. We introduce three algorithms which the ad hoc agents can use to influence the flock, and we examine the relative importance of coordinating the ad hoc agents versus planning farther ahead when given fixed computational resources. We present detailed experimental results for each of these algorithms, concluding that in this setting, inter-agent coordination and deeper lookahead planning are no more beneficial than short-term lookahead planning.

  3. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  4. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  5. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  6. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  7. Assured Resource Sharing in Ad-Hoc Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Gail-Joon [Arizona State Univ., Tempe, AZ (United States)

    2015-12-19

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  8. Game Theory in Wireless Ad-Hoc Opportunistic Radios

    OpenAIRE

    Mumtaz, Shahid; Gameiro, Atilio

    2010-01-01

    Emerging research in game theory based power control applied to ad hoc opportunist networks shows much promise to help understand the complex interactions between OR nodes in this highly dynamic and distributed environment. Also, the employment of game theory in modeling dynamic situations for opportunist ad hoc networks where OR nodes have incomplete information has led to the application of largely unexplored games such as games of imperfect monitoring. Ad hoc security using game theory is ...

  9. The Ex hoc Architecture

    DEFF Research Database (Denmark)

    2006-01-01

    Developed in the LIWAS project which develops technology for measuring road surfaces and communicating this data in an ad hoc environment. The communication part is built upon OOVM Resilient technology....

  10. Level of literacy and dementia: A secondary post-hoc analysis from North-West India

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Raina

    2014-01-01

    Full Text Available Introduction: A relation between literacy and dementia has been studied in past and an association has been documented. This is in spite of some studies pointing to the contrary. The current study was aimed at investigating the influence of level of literacy on dementia in a sample stratified by geography (Migrant, Urban, Rural and Tribal areas of sub-Himalayan state of Himachal Pradesh, India. Materials and Methods: The study was based on post-hoc analysis of data obtained from a study conducted on elderly population (60 years and above from selected geographical areas (Migrant, Urban, Rural and Tribal of Himachal Pradesh state in North-west India. Results: Analysis of variance revealed an effect of education on cognitive scores [F = 2.823, P =0.01], however, post-hoc Tukey′s HSD test did not reveal any significant pairwise comparisons. Discussion: The possibility that education effects dementia needs further evaluation, more so in Indian context.

  11. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  12. Broadcast design in cognitive radio ad hoc networks

    CERN Document Server

    Song, Yi

    2014-01-01

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broa

  13. Taxonomic and ad hoc categorization within the two cerebral hemispheres.

    Science.gov (United States)

    Shen, Yeshayahu; Aharoni, Bat-El; Mashal, Nira

    2015-01-01

    A typicality effect refers to categorization which is performed more quickly or more accurately for typical than for atypical members of a given category. Previous studies reported a typicality effect for category members presented in the left visual field/right hemisphere (RH), suggesting that the RH applies a similarity-based categorization strategy. However, findings regarding the typicality effect within the left hemisphere (LH) are less conclusive. The current study tested the pattern of typicality effects within each hemisphere for both taxonomic and ad hoc categories, using words presented to the left or right visual fields. Experiment 1 tested typical and atypical members of taxonomic categories as well as non-members, and Experiment 2 tested typical and atypical members of ad hoc categories as well as non-members. The results revealed a typicality effect in both hemispheres and in both types of categories. Furthermore, the RH categorized atypical stimuli more accurately than did the LH. Our findings suggest that both hemispheres rely on a similarity-based categorization strategy, but the coarse semantic coding of the RH seems to facilitate the categorization of atypical members.

  14. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from

  15. Ad-Hoc vs. Standardized and Optimized Arthropod Diversity Sampling

    Directory of Open Access Journals (Sweden)

    Pedro Cardoso

    2009-09-01

    Full Text Available The use of standardized and optimized protocols has been recently advocated for different arthropod taxa instead of ad-hoc sampling or sampling with protocols defined on a case-by-case basis. We present a comparison of both sampling approaches applied for spiders in a natural area of Portugal. Tests were made to their efficiency, over-collection of common species, singletons proportions, species abundance distributions, average specimen size, average taxonomic distinctness and behavior of richness estimators. The standardized protocol revealed three main advantages: (1 higher efficiency; (2 more reliable estimations of true richness; and (3 meaningful comparisons between undersampled areas.

  16. The post hoc use of randomised controlled trials to explore drug associated cancer outcomes

    DEFF Research Database (Denmark)

    Stefansdottir, Gudrun; Zoungas, Sophia; Chalmers, John

    2013-01-01

    on public health before proper regulatory action can be taken. This paper aims to discuss challenges of exploring drug-associated cancer outcomes by post-hoc analyses of Randomised controlled trials (RCTs) designed for other purposes. METHODOLOGICAL CHALLENGES TO CONSIDER: We set out to perform a post......-hoc nested case-control analysis in the ADVANCE trial in order to examine the association between insulin use and cancer. We encountered several methodological challenges that made the results difficult to interpret, including short duration of exposure of interest, lack of power, and correlation between...... exposure and potential confounders. Considering these challenges, we concluded that using the data would not enlighten the discussion about insulin use and cancer risk and only serve to further complicate any understanding. Therefore, we decided to use our experience to illustrate methodological challenges...

  17. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  18. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  19. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  20. Sigsearch: a new term for post hoc unplanned search for statistically significant relationships with the intent to create publishable findings.

    Science.gov (United States)

    Hashim, Muhammad Jawad

    2010-09-01

    Post-hoc secondary data analysis with no prespecified hypotheses has been discouraged by textbook authors and journal editors alike. Unfortunately no single term describes this phenomenon succinctly. I would like to coin the term "sigsearch" to define this practice and bring it within the teaching lexicon of statistics courses. Sigsearch would include any unplanned, post-hoc search for statistical significance using multiple comparisons of subgroups. It would also include data analysis with outcomes other than the prespecified primary outcome measure of a study as well as secondary data analyses of earlier research.

  1. Ad hoc laser networks component technology for modular spacecraft

    Science.gov (United States)

    Huang, Xiujun; Shi, Dele; Shen, Jingshi

    2017-10-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  2. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  3. agradecimento aos consultores ad hoc

    Directory of Open Access Journals (Sweden)

    REA Editor

    2012-02-01

    Full Text Available Agradecemos aos professores Nildo Viana (UFG e Flavio Sofiati (UFG, organizadores do DOSSIÊ JUVENTUDE & SOCIEDADE, e aos Consultores Ad hoc pela leitura e apreciação crítica dos artigos submetidos e publicados nesta edição.

  4. Ad hoc networks telecommunications and game theory

    CERN Document Server

    Benslama, Malek; Batatia, Hadj

    2015-01-01

    Random SALOHA and CSMA protocols that are used to access MAC in ad hoc networks are very small compared to the multiple and spontaneous use of the transmission channel. So they have low immunity to the problems of packet collisions. Indeed, the transmission time is the critical factor in the operation of such networks. The simulations demonstrate the positive impact of erasure codes on the throughput of the transmission in ad hoc networks. However, the network still suffers from the intermittency and volatility of its efficiency throughout its operation, and it switches quickly to the satura

  5. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  6. Optimal channel choice for collaborative ad-hoc dissemination

    DEFF Research Database (Denmark)

    Hu, Liang; Boudec, J-Y. L.; Vojnovic, M.

    2010-01-01

    Collaborative ad-hoc dissemination of information has been proposed as an efficient means to disseminate information among devices in a wireless ad-hoc network. Devices help in forwarding the information channels to the entire network, by disseminating the channels they subscribe to, plus others...... by a Metropolis-Hastings sampling algorithm. We also give a variant that accounts for battery level. This leads to a practical channel selection and re-selection algorithm that can be implemented without any central control....

  7. Les Protocoles de routage dans les réseaux mobiles Ad Hoc ...

    African Journals Online (AJOL)

    Dans cet article nous présentons un état de l'art sur les protocoles de routage dans les réseaux mobiles Ad hoc. Mots clés : Réseaux mobiles ad hoc/, Protocoles de routage. Routing protocols in wireless mobile ad hoc networks. Abstract:The communication between users with handheld computers interconnected through ...

  8. Estimated medical expenditure and risk of job loss among rheumatoid arthritis patients undergoing tofacitinib treatment: post hoc analyses of two randomized clinical trials.

    Science.gov (United States)

    Rendas-Baum, Regina; Kosinski, Mark; Singh, Amitabh; Mebus, Charles A; Wilkinson, Bethany E; Wallenstein, Gene V

    2017-08-01

    RA causes high disability levels and reduces health-related quality of life, triggering increased costs and risk of unemployment. Tofacitinib is an oral Janus kinase inhibitor for the treatment of RA. These post hoc analyses of phase 3 data aimed to assess monthly medical expenditure (MME) and risk of job loss for tofacitinib treatment vs placebo. Data analysed were from two randomized phase 3 studies of RA patients (n = 1115) with inadequate response to MTX or TNF inhibitors (TNFi) receiving tofacitinib 5 or 10 mg twice daily, adalimumab (one study only) or placebo, in combination with MTX. Short Form 36 version 2 Health Survey physical and mental component summary scores were translated into predicted MME via an algorithm and concurrent inability to work and job loss risks at 6, 12 and 24 months, using Medical Outcomes Study data. MME reduction by month 3 was $100 greater for tofacitinib- than placebo-treated TNFi inadequate responders (P 20 and 6% reductions from baseline, respectively. By month 3 of tofacitinib treatment, the odds of inability to work decreased ⩾16%, and risk of future job loss decreased ∼20% (P tofacitinib- than placebo-treated MTX inadequate responders (P tofacitinib treatment, the odds of inability to work decreased ⩾31% and risk of future job loss decreased ⩾25% (P Tofacitinib treatment had a positive impact on estimated medical expenditure and risk of job loss for RA patients with inadequate response to MTX or TNFi. © The Author 2017. Published by Oxford University Press on behalf of the British Society for Rheumatology.

  9. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  10. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  11. SURVEI TEKNIK CLUSTERING ROUTING BERDASARKAN MOBILITAS PADA WIRELESS AD-HOC NETWORK

    Directory of Open Access Journals (Sweden)

    I Nyoman Trisna Wirawan

    2016-01-01

    Full Text Available Wireless ad-hoc merupakan sebuah skema jaringan yang didesain supaya mampu beroperasi tanpa membutuhkan infrastruktur tetap serta bersifat otonom. Teknik flooding pada proses path discovery dalam kasus wireless ad-hoc network dapat menimbulkan masalah beban jaringan yang berlebihan. Oleh karena itu, sebuah skema clustering diusulkan untuk mengurangi adanya flooding paket yang berlebihan dengan membagi node-node dalam jaringan menjadi beberapa bagian berdasarkan parameter tertentu. Teknik ini efektifuntuk mengurangi paket yang harus dilewatkan dalam jaringan. Namun masalah muncul ketika sebuah jaringan wireless ad-hoc harus membentuk sebuah cluster dengan mempertimbangkan beberapa parameter khusus. Parameter tersebut harus disesuaikan dengan kasus yang dihadapi. Pada tulisan ini akan dibahas secara khusus mengenai penerapan skema clustering dalam lingkungan wireless ad-hoc network, baik pada MANETdan penyesuaian skema clustering yang harus dilakukan pada VANET berdasarkan mobilitasnya.

  12. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  13. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    aerial vehicle VANET vehicular ad hoc network VoIP Voice over Internet Protocol VRR Virtual Ring Routing xiii EFFECTS OF DATA REPLICATION ON DATA...ad hoc networks in mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and flying ad hoc net- works (FANETs). Much of the research...metric, such as capacity, congestion , power, or combinations thereof. Caro refers to two different types of ants, FANTs and BANTs which are analogous to

  14. Sensor and ad-hoc networks theoretical and algorithmic aspects

    CERN Document Server

    Makki, S Kami; Pissinou, Niki; Makki, Shamila; Karimi, Masoumeh; Makki, Kia

    2008-01-01

    This book brings together leading researchers and developers in the field of wireless sensor networks to explain the special problems and challenges of the algorithmic aspects of sensor and ad-hoc networks. The book also fosters communication not only between the different sensor and ad-hoc communities, but also between those communities and the distributed systems and information systems communities. The topics addressed pertain to the sensors and mobile environment.

  15. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  16. Does Ad Hoc Coronary Intervention Reduce Radiation Exposure? – Analysis of 568 Patients

    Energy Technology Data Exchange (ETDEWEB)

    Truffa, Márcio A. M., E-mail: marciotruffa@yahoo.com.br; Alves, Gustavo M.P.; Bernardi, Fernando; Esteves Filho, Antonio; Ribeiro, Expedito; Galon, Micheli Z.; Spadaro, André; Kajita, Luiz J.; Arrieta, Raul; Lemos, Pedro A. [Instituto do Coração - Hospital das Clínicas - Faculdade de Medicina da Universidade de São Paulo (USP), São Paulo, SP (Brazil)

    2015-11-15

    Advantages and disadvantages of ad hoc percutaneous coronary intervention have been described. However little is known about the radiation exposure of that procedure as compared with the staged intervention. To compare the radiation dose of the ad hoc percutaneous coronary intervention with that of the staged procedure The dose-area product and total Kerma were measured, and the doses of the diagnostic and therapeutic procedures were added. In addition, total fluoroscopic time and number of acquisitions were evaluated. A total of 568 consecutive patients were treated with ad hoc percutaneous coronary intervention (n = 320) or staged percutaneous coronary intervention (n = 248). On admission, the ad hoc group had less hypertension (74.1% vs 81.9%; p = 0.035), dyslipidemia (57.8% vs. 67.7%; p = 0.02) and three-vessel disease (38.8% vs. 50.4%; p = 0.015). The ad hoc group was exposed to significantly lower radiation doses, even after baseline characteristic adjustment between both groups. The ad hoc group was exposed to a total dose-area product of 119.7 ± 70.7 Gycm{sup 2}, while the staged group, to 139.2 ± 75.3 Gycm{sup 2} (p < 0.001). Ad hoc percutaneous coronary intervention reduced radiation exposure as compared with diagnostic and therapeutic procedures performed at two separate times.

  17. Does Ad Hoc Coronary Intervention Reduce Radiation Exposure? – Analysis of 568 Patients

    International Nuclear Information System (INIS)

    Truffa, Márcio A. M.; Alves, Gustavo M.P.; Bernardi, Fernando; Esteves Filho, Antonio; Ribeiro, Expedito; Galon, Micheli Z.; Spadaro, André; Kajita, Luiz J.; Arrieta, Raul; Lemos, Pedro A.

    2015-01-01

    Advantages and disadvantages of ad hoc percutaneous coronary intervention have been described. However little is known about the radiation exposure of that procedure as compared with the staged intervention. To compare the radiation dose of the ad hoc percutaneous coronary intervention with that of the staged procedure The dose-area product and total Kerma were measured, and the doses of the diagnostic and therapeutic procedures were added. In addition, total fluoroscopic time and number of acquisitions were evaluated. A total of 568 consecutive patients were treated with ad hoc percutaneous coronary intervention (n = 320) or staged percutaneous coronary intervention (n = 248). On admission, the ad hoc group had less hypertension (74.1% vs 81.9%; p = 0.035), dyslipidemia (57.8% vs. 67.7%; p = 0.02) and three-vessel disease (38.8% vs. 50.4%; p = 0.015). The ad hoc group was exposed to significantly lower radiation doses, even after baseline characteristic adjustment between both groups. The ad hoc group was exposed to a total dose-area product of 119.7 ± 70.7 Gycm 2 , while the staged group, to 139.2 ± 75.3 Gycm 2 (p < 0.001). Ad hoc percutaneous coronary intervention reduced radiation exposure as compared with diagnostic and therapeutic procedures performed at two separate times

  18. Analysis for Ad Hoc Network Attack-Defense Based on Stochastic Game Model

    Directory of Open Access Journals (Sweden)

    Yuanjie LI

    2014-06-01

    Full Text Available The attack actions analysis for Ad Hoc networks can provide a reference for the design security mechanisms. This paper presents an analysis method of security of Ad Hoc networks based on Stochastic Game Nets (SGN. This method can establish a SGN model of Ad Hoc networks and calculate to get the Nash equilibrium strategy. After transforming the SGN model into a continuous-time Markov Chain (CTMC, the security of Ad Hoc networks can be evaluated and analyzed quantitatively by calculating the stationary probability of CTMC. Finally, the Matlab simulation results show that the probability of successful attack is related to the attack intensity and expected payoffs, but not attack rate.

  19. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  20. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  1. Preventive Ceftriaxone in Patients with Stroke Treated with Intravenous Thrombolysis: Post Hoc Analysis of the Preventive Antibiotics in Stroke Study

    NARCIS (Netherlands)

    Vermeij, Jan-Dirk; Westendorp, Willeke F.; Roos, Yvo B.; Brouwer, Matthijs C.; van de Beek, Diederik; Nederkoorn, Paul J.

    2016-01-01

    The Preventive Antibiotics in Stroke Study (PASS), a randomized open-label masked endpoint trial, showed that preventive ceftriaxone did not improve functional outcome at 3 months in patients with acute stroke (adjusted common OR 0.95; 95% CI 0.82-1.09). Post-hoc analyses showed that among patients

  2. MWAHCA: a multimedia wireless ad hoc cluster architecture.

    Science.gov (United States)

    Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  3. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    Directory of Open Access Journals (Sweden)

    Juan R. Diaz

    2014-01-01

    Full Text Available Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node’s capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss. The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  4. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  5. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  6. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  7. DESAIN ALGORITMA DAN SIMULASI ROUTING UNTUK GATEWAY AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Nixson Meok

    2009-12-01

    Full Text Available   Routing protocol to the wireless ad hoc networks is very needed in the communication process between some terminals, to send the data packet through one or several node(s to the destination address where the network typology is always changing. Many previous works that discussed about routing ad hoc both for manet (mobile ad hoc networks and wireless networks, but the emphasis have more focus on comparing the performance of several routing ad hoc. While in this work, there is a bulding of routing algorithm model to gateway in land to the nodes that analogized as a boat that move on the sea. With the assumption that the communication inter terminals to radio band of Very High Frequency, thus algorithm that built in the simulation based on the range gap of the HF frequency. The result of this simulation will be developed as the platform to implement the service development of multiuser communication

  8. Student Self-Assessment in HOCS Science Examinations: Is There a Problem?

    Science.gov (United States)

    Zoller, Uri; Ben-Chaim, David

    1998-06-01

    A specially-designed self-assessment questionnaire (SAQHOCS), containing higher-order cognitive skills (HOCS)-type questions, was administered to 71 biology majors, enrolled in a four-year college program. The gap between students' self-assessment marking, and that of their HOCS-biased teachers (the authors), is accounted for by the prevailing LOCS-orientation and the "testing culture"—a total separation between testing and learning—in contemporary science teaching. The majority of the students in the study evaluated themselves as capable of self-assessment, and felt reasonably confident in doing so. They were quite reserved as far as the applicability of the self-assessment method to nonalgorithmic ("correct/incorrect") questions is concerned. The results of this study suggest that the potential for student self-assessment within college science teaching and learning exists. However, still a great purposed effort in HOCS-oriented teaching and learning is required in order for the student self-assessment practice to become a routine integral component of HOCS science examinations.

  9. Quantum load balancing in ad hoc networks

    Science.gov (United States)

    Hasanpour, M.; Shariat, S.; Barnaghi, P.; Hoseinitabatabaei, S. A.; Vahid, S.; Tafazolli, R.

    2017-06-01

    This paper presents a novel approach in targeting load balancing in ad hoc networks utilizing the properties of quantum game theory. This approach benefits from the instantaneous and information-less capability of entangled particles to synchronize the load balancing strategies in ad hoc networks. The quantum load balancing (QLB) algorithm proposed by this work is implemented on top of OLSR as the baseline routing protocol; its performance is analyzed against the baseline OLSR, and considerable gain is reported regarding some of the main QoS metrics such as delay and jitter. Furthermore, it is shown that QLB algorithm supports a solid stability gain in terms of throughput which stands a proof of concept for the load balancing properties of the proposed theory.

  10. Recent development in wireless sensor and ad-hoc networks

    CERN Document Server

    Li, Xiaolong; Yang, Yeon-Mo

    2015-01-01

    Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based C...

  11. A flow level model for wireless multihop ad hoc network throughput

    NARCIS (Netherlands)

    Coenen, Tom Johannes Maria; van den Berg, Hans Leo; Boucherie, Richardus J.

    2005-01-01

    A flow level model for multihop wireless ad hoc networks is presented in this paper. Using a flow level view, we show the main properties and modeling challenges for ad hoc networks. Considering different scenarios, a multihop WLAN and a serial network with a TCP-like flow control protocol, we

  12. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  13. Supporting Dynamic Ad hoc Collaboration Capabilities

    CERN Document Server

    Agarwal, D

    2003-01-01

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

  14. Supporting Dynamic Ad hoc Collaboration Capabilities

    International Nuclear Information System (INIS)

    Agarwal, Deborah A.; Berket, Karlo

    2003-01-01

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment

  15. Twenty-One at TREC-7: ad-hoc and cross-language track

    NARCIS (Netherlands)

    Hiemstra, Djoerd; Kraaij, Wessel; Voorhees, E.M; Harman, D.K.

    1999-01-01

    This paper describes the official runs of the Twenty-One group for TREC-7. The Twenty-One group participated in the ad-hoc and the cross-language track and made the following accomplishments: We developed a new weighting algorithm, which outperforms the popular Cornell version of BM25 on the ad-hoc

  16. NDN-CRAHNs: Named Data Networking for Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Rana Asif Rehman

    2015-01-01

    Full Text Available Named data networking (NDN is a newly proposed paradigm for future Internet, in which communication among nodes is based on data names, decoupling from their locations. In dynamic and self-organized cognitive radio ad hoc networks (CRAHNs, it is difficult to maintain end-to-end connectivity between ad hoc nodes especially in the presence of licensed users and intermittent wireless channels. Moreover, IP-based CRAHNs have several issues like scalability, inefficient-mapping, poor resource utilization, and location dependence. By leveraging the advantages of NDN, in this paper, we propose a new cross layer fine-grained architecture called named data networking for cognitive radio ad hoc networks (NDN-CRAHNs. The proposed architecture provides distinct features such as in-networking caching, security, scalability, and multipath routing. The performances of the proposed scheme are evaluated comparing to IP-based scheme in terms of average end-to-end delay and packet delivery ratio. Simulation results show that the proposed scheme is effective in terms of average contents download time and packet delivery ratios comparing to conventional cognitive radio ad hoc networks.

  17. Packets Distributing Evolutionary Algorithm Based on PSO for Ad Hoc Network

    Science.gov (United States)

    Xu, Xiao-Feng

    2018-03-01

    Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, a wireless packets distributing Evolutionary algorithm based on PSO (DPSO)for Ad Hoc Network is proposed. Firstly, parameters impact on performance of network are analyzed and researched to obtain network performance effective function. Secondly, the improved PSO Evolutionary Algorithm is used to solve the optimization problem from local to global in the process of network packets distributing. The simulation results show that the algorithm can ensure fairness and timeliness of network transmission, as well as improve ad hoc network resource integrated utilization efficiency.

  18. A Framework for Speech Enhancement with Ad Hoc Microphone Arrays

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Christensen, Mads Græsbøll

    2016-01-01

    Speech enhancement is vital for improved listening practices. Ad hoc microphone arrays are promising assets for this purpose. Most well-established enhancement techniques with conventional arrays can be adapted into ad hoc scenarios. Despite recent efforts to introduce various ad hoc speech...... enhancement apparatus, a common framework for integration of conventional methods into this new scheme is still missing. This paper establishes such an abstraction based on inter and intra sub-array speech coherencies. Along with measures for signal quality at the input of sub-arrays, a measure of coherency...... is proposed both for sub-array selection in local enhancement approaches, and also for selecting a proper global reference when more than one sub-array are used. Proposed methods within this framework are evaluated with regard to quantitative and qualitative measures, including array gains, the speech...

  19. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  20. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  1. INDEPENDENSI HAKIM AD-HOC PADA LINGKUNGAN PERADILAN HUBUNGAN INDUSTRIAL / THE JUDICIAL INDEPENDENCE OF AD-HOC JUDGES IN INDUSTRIAL RELATION COURT

    Directory of Open Access Journals (Sweden)

    Muhammad Ishar Helmi

    2017-08-01

    Full Text Available Undang-Undang PPHI mengatur asas penyelesaian perselisihan hubungan industrial dilakukan secara musyawarah mufakat, dengan berprinsip jika terjadi perselisihan antara pekerja/buruh dan pengusaha maka tahap pertama penyelesaian perselisihan tersebut diserahkan pada pihak yang berselisih (bipartit. Ketentuan Pasal 63 ayat (2 dan Pasal 67 ayat (1 huruf f Undang-Undang tersebut mengakibatkan hakim ad-hoc Pengadilan Hubungan Industrial, dalam menjalankan tugas dan tanggung jawabnya memeriksa dan memutus suatu perkara harus mandiri dan lepas dari segala bentuk intervensi lembaga/instansi manapun menjadi terbatasi dan tidak optimal. Hakim ad-hoc Peradilan Hubungan Industrial merupakan hakim yang diusulkan oleh serikat pekerja/serikat buruh, organisasi pengusaha, juga diberhentikan secara hormat oleh serikat pekerja/serikat buruh, organisasi pengusaha tersebut. Hal ini tentunya akan menciderai sistem peradilan yang bebas, tidak memihak dan bersih yang diimpikan karena para hakim akan dikuasai oleh para pihak yang berperkara, karena keberadaan hakim diangkat dan diberhentikan oleh pihak yang akan disidangkan di peradilan hubungan industrial tersebut. PPHI (Industrial Relations Disputes Settlement Act regulates the principle of settlement of industrial relations disputes by consensus, if there is a dispute between employee/workers and employers, the first stage of dispute settlement shall be submitted to disputing party (bipartite settlement. The provisions of Article 63 paragraph (2 and Article 67 paragraph (1 sub-paragraph f of the Act shall result in the ad-hoc judges of the Industrial Relations Court, in carrying out their duties and responsibilities to examine and decide a case shall be independent and kept away from any intervention of any institution. The ad-hoc judges of the Industrial Relations Court is a judge proposed by a trade union, employers organization, also dismissed respectfully by the trade union and the employers organization. This

  2. Bardoxolone Methyl Improves Kidney Function in Patients with Chronic Kidney Disease Stage 4 and Type 2 Diabetes: Post-Hoc Analyses from Bardoxolone Methyl Evaluation in Patients with Chronic Kidney Disease and Type 2 Diabetes Study

    Science.gov (United States)

    Chin, Melanie P.; Bakris, George L.; Block, Geoffrey A.; Chertow, Glenn M.; Goldsberry, Angie; Inker, Lesley A.; Heerspink, Hiddo J.L.; O'Grady, Megan; Pergola, Pablo E.; Wanner, Christoph; Warnock, David G.; Meyer, Colin J.

    2018-01-01

    Background Increases in measured inulin clearance, measured creatinine clearance, and estimated glomerular filtration rate (eGFR) have been observed with bardoxolone methyl in 7 studies enrolling approximately 2,600 patients with type 2 diabetes (T2D) and chronic kidney disease (CKD). The largest of these studies was Bardoxolone Methyl Evaluation in Patients with Chronic Kidney Disease and Type 2 Diabetes (BEACON), a multinational, randomized, double-blind, placebo-controlled phase 3 trial which enrolled patients with T2D and CKD stage 4. The BEACON trial was terminated after preliminary analyses showed that patients randomized to bardoxolone methyl experienced significantly higher rates of heart failure events. We performed post-hoc analyses to characterize changes in kidney function induced by bardoxolone methyl. Methods Patients in ­BEACON (n = 2,185) were randomized 1: 1 to receive once-daily bardoxolone methyl (20 mg) or placebo. We compared the effects of bardoxolone methyl and placebo on a post-hoc composite renal endpoint consisting of ≥30% decline from baseline in eGFR, eGFR <15 mL/min/1.73 m2, and end-stage renal disease (ESRD) events (provision of dialysis or kidney transplantation). Results Consistent with prior studies, patients randomized to bardoxolone methyl experienced mean increases in eGFR that were sustained through study week 48. Moreover, increases in eGFR from baseline were sustained 4 weeks after cessation of treatment. Patients randomized to bardoxolone methyl were significantly less likely to experience the composite renal endpoint (hazards ratio 0.48 [95% CI 0.36–0.64]; p < 0.0001). Conclusions Bardoxolone methyl preserves kidney function and may delay the onset of ESRD in patients with T2D and stage 4 CKD. PMID:29402767

  3. The Survival Processing Effect with Intentional Learning of Ad Hoc Categories

    Directory of Open Access Journals (Sweden)

    Anastasiya Savchenko

    2014-04-01

    Full Text Available Previous studies have shown that memory is adapted to remember information when it is processed in a survival context. This study investigates how procedural changes in Marinho (2012 study might have led to her failure to replicate the survival mnemonic advantage. In two between-subjects design experiments, participants were instructed to learn words from ad hoc categories and to rate their relevance to a survival or a control scenario. No survival advantage was obtained in either experiment. The Adjusted Ratio of Clustering (ARC scores revealed that including the category labels made the participants rely more on the category structure of the list. Various procedural aspects of the conducted experiments are discussed as possible reasons underlying the absence of the survival effect.

  4. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  5. Decentralized session initiation protocol solution in ad hoc networks

    Science.gov (United States)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  6. Genomic Analyses Reveal the Influence of Geographic Origin, Migration, and Hybridization on Modern Dog Breed Development

    Directory of Open Access Journals (Sweden)

    Heidi G. Parker

    2017-04-01

    Full Text Available There are nearly 400 modern domestic dog breeds with a unique histories and genetic profiles. To track the genetic signatures of breed development, we have assembled the most diverse dataset of dog breeds, reflecting their extensive phenotypic variation and heritage. Combining genetic distance, migration, and genome-wide haplotype sharing analyses, we uncover geographic patterns of development and independent origins of common traits. Our analyses reveal the hybrid history of breeds and elucidate the effects of immigration, revealing for the first time a suggestion of New World dog within some modern breeds. Finally, we used cladistics and haplotype sharing to show that some common traits have arisen more than once in the history of the dog. These analyses characterize the complexities of breed development, resolving longstanding questions regarding individual breed origination, the effect of migration on geographically distinct breeds, and, by inference, transfer of trait and disease alleles among dog breeds.

  7. Node counting in wireless ad-hoc networks

    NARCIS (Netherlands)

    Evers, J.H.M.; Kiss, D.; Kowalczyk, W.; Navilarekallu, T.; Renger, D.R.M.; Sella, L.; Timperio, V.; Viorel, A.; Wijk, van A.C.C.; Yzelman, A.J.; Planqué, B.; Bhulai, S.; Hulshof, J.; Kager, W.; Rot, T.

    2012-01-01

    We study wireless ad-hoc networks consisting of small microprocessors with limited memory, where the wireless communication between the processors can be highly unreliable. For this setting, we propose a number of algorithms to estimate the number of nodes in the network, and the number of direct

  8. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  9. An implementation of traffic light system using multi-hop Ad hoc networks

    KAUST Repository

    Ansari, Imran Shafique

    2009-08-01

    In ad hoc networks nodes cooperate with each other to form a temporary network without the aid of any centralized administration. No wired base station or infrastructure is supported, and each host communicates via radio packets. Each host must act as a router, since routes are mostly multi-hop, due to the limited power transmission set by government agencies, (e.g. the Federal Communication Commission (FCC), which is 1 Watt in Industrial Scientific and Medical (ISM) band. The natures of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance constraint. Therefore, radio resource and power management is an important issue of any wireless network. In this paper, a design for traffic light system employing ad hoc networks is proposed. The traffic light system runs automatically based on signals sent through a multi-hop ad hoc network of \\'n\\' number of nodes utilizing the Token Ring protocol, which is efficient for this application from the energy prospective. The experiment consists of a graphical user interface that simulates the traffic lights and laptops (which have wireless network adapters) are used to run the graphical user interface and are responsible for setting up the ad hoc network between them. The traffic light system has been implemented utilizing A Mesh Driver (which allows for more than one wireless device to be connected simultaneously) and Java-based client-server programs. © 2009 IEEE.

  10. Comparative genomics analyses revealed two virulent Listeria monocytogenes strains isolated from ready-to-eat food.

    Science.gov (United States)

    Lim, Shu Yong; Yap, Kien-Pong; Thong, Kwai Lin

    2016-01-01

    Listeria monocytogenes is an important foodborne pathogen that causes considerable morbidity in humans with high mortality rates. In this study, we have sequenced the genomes and performed comparative genomics analyses on two strains, LM115 and LM41, isolated from ready-to-eat food in Malaysia. The genome size of LM115 and LM41 was 2,959,041 and 2,963,111 bp, respectively. These two strains shared approximately 90% homologous genes. Comparative genomics and phylogenomic analyses revealed that LM115 and LM41 were more closely related to the reference strains F2365 and EGD-e, respectively. Our virulence profiling indicated a total of 31 virulence genes shared by both analysed strains. These shared genes included those that encode for internalins and L. monocytogenes pathogenicity island 1 (LIPI-1). Both the Malaysian L. monocytogenes strains also harboured several genes associated with stress tolerance to counter the adverse conditions. Seven antibiotic and efflux pump related genes which may confer resistance against lincomycin, erythromycin, fosfomycin, quinolone, tetracycline, and penicillin, and macrolides were identified in the genomes of both strains. Whole genome sequencing and comparative genomics analyses revealed two virulent L. monocytogenes strains isolated from ready-to-eat foods in Malaysia. The identification of strains with pathogenic, persistent, and antibiotic resistant potentials from minimally processed food warrant close attention from both healthcare and food industry.

  11. Enhanced WWTP effluent organic matter removal in hybrid ozonation-coagulation (HOC) process catalyzed by Al-based coagulant

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Xin [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an, Shaanxi Province, 710055 (China); Jin, Pengkang, E-mail: pkjin@hotmail.com [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an, Shaanxi Province, 710055 (China); Hou, Rui [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an, Shaanxi Province, 710055 (China); Yang, Lei [Department of Materials Science and Engineering, Monash University, Clayton, VIC, 3800 (Australia); Wang, Xiaochang C., E-mail: xcwang@xauat.edu.cn [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an, Shaanxi Province, 710055 (China)

    2017-04-05

    Highlights: • A novel HOC process was firstly put forward to apply in wastewater reclamation. • Interactions between ozone and Al-based coagulants was found in the HOC process. • Ozonation can be catalyzed and enhanced by Al-based coagulants in the HOC process. • HOC process showed better organics removal than pre-ozonation-coagulation process. - Abstract: A novel hybrid ozonation-coagulation (HOC) process was developed for application in wastewater reclamation. In this process, ozonation and coagulation occurred simultaneously within a single unit. Compared with the conventional pre-ozonation-coagulation process, the HOC process exhibited much better performance in removing dissolved organic matters. In particular, the maximal organic matters removal efficiency was obtained at the ozone dosage of 1 mgO{sub 3}/mg DOC at each pH value (pH 5, 7 and 9). In order to interpret the mechanism of the HOC process, ozone decomposition was monitored. The results indicated that ozone decomposed much faster in the HOC process. Moreover, by using the reagent of O{sub 3}-resistant hydroxyl radical (·OH) probe compound, para-chlorobenzoic acid (pCBA), and electron paramagnetic resonance (EPR) analysis, it was observed that the HOC process generated higher content of ·OH compared with pre-ozonation process. This indicates that the ·OH oxidation reaction as the key step can be catalyzed and enhanced by Al-based coagulants and their hydrolyzed products in this developed process. Thus, based on the catalytic effects of Al-based coagulants on ozonation, the HOC process provides a promising alternative to the conventional technology for wastewater reclamation in terms of higher efficiency.

  12. Ad Hoc on-Demand Distance Vector (AODV Routing Protocol Performance Evaluation on Hybrid Ad Hoc Network: Comparison of Result of Ns-2 Simulation and Implementation on Testbed using PDA

    Directory of Open Access Journals (Sweden)

    Riri Sari

    2010-10-01

    Full Text Available In Mobile Ad hoc NETwork (MANET, node supplemented with wireless equipment has the capacity to manage and organise autonomously, without the presence of network infrastructures. Hybrid ad hoc network, enable several nodes to move freely (mobile to create instant communication. Independent from infrastructure. They could access the Local Area Network (LAN or the Internet. Functionalities of ad hoc network very much dependent on the routing protocol that determines the routing around node. Ad hoc On-demand Distance Vector (AODV is one of routing protocols in ad hoc network which has a reactive characteristic. This protocol is the most common protocol being researched and used. In this Research, AODV protocol investigation was conducted by developing a testbed using Personal Computer, several Laptops (the Linux Red Hat operation system 9.0 and Fedora Core 2, and Personal Digital Assistant (PDA. This research also made a complete package by mean of cross compilation for PDA iPAQ. In general, results obtained from the simulation of AODV protocol using Network Simulator NS-2 are packet delivery ratio 99.89%, end-to-end delay of 0.14 seconds and routing overhead of 1,756.61 byte per second. Afterwards results from simulation were compared to results from testbed. Results obtained from testbed are as follows: the packet delivery ratio is 99.57%, the end-to-end delay is 1.004 seconds and the routing overhead is 1,360.36 byte per second.

  13. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    The constant mobility of people, the growing need to be always connected, the large number of vehicles that nowadays can be found in the roads and the advances in technology make Vehicular Ad hoc Networks (VANETs) be a major area of research. Vehicular Ad hoc Networks are a special type of wireless Mobile Ad hoc Networks (MANETs), which allow a group of mobile nodes configure a temporary network and maintain it without the need of a fixed infrastructure. A vehicular network presents some spec...

  14. Proposal of interference reduction routing for ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Katsuhiro Naito

    2010-10-01

    Full Text Available In this paper, we propose an interference reduction routing protocol for ad-hoc networks. The interference is one of the degradation factors in wireless communications. In the ad-hoc network, some nodes communicate simultaneously. Therefore, these communications cause interference each other, and some packets are corrupted due to interference from another node. In the proposed protocol, each node estimates required transmission power according to hello messages. Therefore, the node can transmit a data packet with minimum required transmission power. Consequently, the interference against neighbor nodes can be reduced. From simulation results, we can find that the proposed protocol can reduce the number of control messages and can improve the throughput performance.

  15. Ad hoc supervision of general practice registrars as a 'community of practice': analysis, interpretation and re-presentation.

    Science.gov (United States)

    Clement, T; Brown, J; Morrison, J; Nestel, D

    2016-05-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also provide an opportunity for learning and teaching. Wenger's (Communities of practice: learning, meaning, and identity. Cambridge University Press, New York, 1998) social theory of learning ('communities of practice') guided a secondary analysis of audio-recordings of ad hoc encounters. Data from one encounter is re-presented as an extended sequence to maintain congruence with the theoretical perspective and enhance vicariousness. An interpretive commentary communicates key features of Wenger's theory and highlights the researchers' interpretations. We argue that one encounter can reveal universal understandings of clinical supervision and that the process of naturalistic generalisation allows readers to transfer others' experiences to their own contexts. The paper raises significant analytic, interpretive, and representational issues. We highlight that report writing is an important, but infrequently discussed, part of research design. We discuss the challenges of supporting the learning and teaching that arises from adopting a socio-cultural lens and argue that such a perspective importantly captures the complex range of issues that work-based practitioners have to grapple with. This offers a challenge to how we research and seek to influence work-based learning and teaching in health care settings.

  16. Voice Communications over 802.11 Ad Hoc Networks: Modeling, Optimization and Call Admission Control

    Science.gov (United States)

    Xu, Changchun; Xu, Yanyi; Liu, Gan; Liu, Kezhong

    Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MAC layer. The model is applied for performance analysis of voice communications over IEEE 802.11 single-hop ad hoc networks. By using the model, we finish the performance optimization of IEEE MAC layer and obtain the maximum number of voice calls in IEEE 802.11 ad hoc networks as well as the statistical performance bounds. Furthermore, we design a fully distributed call admission control (CAC) algorithm which can provide strict statistical QoS guarantee for voice communications over IEEE 802.11 ad hoc networks. Extensive simulations indicate the accuracy of the analytical model and the CAC scheme.

  17. Ad Hoc Wireless Networking and Shared Computation for Autonomous Multirobot Systems

    OpenAIRE

    Bevilacqua, Riccardo; Hall, Jason S.; Horning, James; Romano, Marcello

    2009-01-01

    The article of record as published may be located at http://dx.doi.org/10.2514/1.40734 A wireless ad hoc network is introduced that enables inter-robot communication and shared computation among multiple robots with PC/104-based single board computers running the real-time application interface patched Linux operating system. Through the use of IEEE 802.11 ad hoc technology and User Datagram Protocol, each robot is able to exchange data without the need of a centralized router ...

  18. The Ex Hoc Infrastructure - Enhancing Traffic Safety through LIfe WArning Systems

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius; Kristensen, Lars Michael; Eskildsen, Toke

    2004-01-01

    New pervasive computing technologies for sensing and communication open up novel possibilities for enhancing traffic safety. We are currently designing and implementing the Ex Hoc infrastructure framework for communication among mobile and stationary units including vehicles. The infrastructure...... will connect sensing devices on vehicles with sensing devices on other vehicles and with stationary communication units placed alongside roads. The current application of Ex Hoc is to enable the collection and dissemination of information on road condition through LIfe Warning Systems (LIWAS) units....

  19. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  20. Cognitive radio application for vehicular ad hoc networks (VANETS

    Directory of Open Access Journals (Sweden)

    Miladić Suzana D.

    2016-01-01

    Full Text Available This paper presents the application of cognitive radio technology in vehicular ad-hoc networks aimed to improve the communications between vehicles themselves as well as between vehicles and roadside infrastructure. Due to dynamic approach of spectrum access, cognitive radio is a technology that enables more efficient usage of radio-frequency spectrum. We review actual approaches and discuss research challenges related to the use of cognitive radio technology in vehicular ad hoc networks with emphasis on architecture, spectrum management as well as QoS optimization. The researching on cognitive radio application in vehicular networks is still developing and there are not many experimental platforms due to their complex setups. Some related research projects and cognitive radio realizations are provided in this paper.

  1. Ad Hoc Physical Hilbert Spaces in Quantum Mechanics

    Czech Academy of Sciences Publication Activity Database

    Fernandez, F. M.; Garcia, J.; Semorádová, Iveta; Znojil, Miloslav

    2015-01-01

    Roč. 54, č. 12 (2015), s. 4187-4203 ISSN 0020-7748 Institutional support: RVO:61389005 Keywords : quantum mechanics * physical Hilbert spaces * ad hoc inner product * singular potentials regularized * low lying energies Subject RIV: BE - Theoretical Physics Impact factor: 1.041, year: 2015

  2. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  3. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    La movilidad constante de las personas y la creciente necesidad de estar conectados en todo momento ha hecho de las redes vehiculares un área cuyo interés ha ido en aumento. La gran cantidad de vehículos que hay en la actualidad, y los avances tecnológicos han hecho de las redes vehiculares (VANETS, Vehicular Ad hoc Networks) un gran campo de investigación. Las redes vehiculares son un tipo especial de redes móviles ad hoc inalámbricas, las cuales, al igual que las redes MANET (Mobile Ad hoc ...

  4. Single-Cell Analyses of ESCs Reveal Alternative Pluripotent Cell States and Molecular Mechanisms that Control Self-Renewal

    Directory of Open Access Journals (Sweden)

    Dmitri Papatsenko

    2015-08-01

    Full Text Available Analyses of gene expression in single mouse embryonic stem cells (mESCs cultured in serum and LIF revealed the presence of two distinct cell subpopulations with individual gene expression signatures. Comparisons with published data revealed that cells in the first subpopulation are phenotypically similar to cells isolated from the inner cell mass (ICM. In contrast, cells in the second subpopulation appear to be more mature. Pluripotency Gene Regulatory Network (PGRN reconstruction based on single-cell data and published data suggested antagonistic roles for Oct4 and Nanog in the maintenance of pluripotency states. Integrated analyses of published genomic binding (ChIP data strongly supported this observation. Certain target genes alternatively regulated by OCT4 and NANOG, such as Sall4 and Zscan10, feed back into the top hierarchical regulator Oct4. Analyses of such incoherent feedforward loops with feedback (iFFL-FB suggest a dynamic model for the maintenance of mESC pluripotency and self-renewal.

  5. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  6. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  7. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  8. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  9. A peer-to-peer file search and download protocol for wireless ad-hoc networks

    NARCIS (Netherlands)

    Sözer, Hasan; Tekkalmaz, M.; Korpeoglu, I.

    Deployment of traditional peer-to-peer file sharing systems on a wireless ad-hoc network introduces several challenges. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only aware of their immediate neighborhood. In this

  10. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  11. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  12. Centralized cooperative spectrum sensing for ad-hoc disaster relief network clusters

    DEFF Research Database (Denmark)

    Pratas, Nuno; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Disaster relief networks have to be highly adaptable and resilient. Cognitive radio enhanced ad-hoc architecture have been put forward as a candidate to enable such networks. Spectrum sensing is the cornerstone of the cognitive radio paradigm, and it has been the target of intensive research....... The main common conclusion was that the achievable spectrum sensing accuracy can be greatly enhanced through the use of cooperative sensing schemes. When considering applying Cognitive Radio to ad-hoc disaster relief networks, spectrum sensing cooperative schemes are paramount. A centralized cluster...

  13. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  14. Trial sequential analysis reveals insufficient information size and potentially false positive results in many meta-analyses

    DEFF Research Database (Denmark)

    Brok, J.; Thorlund, K.; Gluud, C.

    2008-01-01

    in 80% (insufficient information size). TSA(15%) and TSA(LBHIS) found that 95% and 91% had absence of evidence. The remaining nonsignificant meta-analyses had evidence of lack of effect. CONCLUSION: TSA reveals insufficient information size and potentially false positive results in many meta......OBJECTIVES: To evaluate meta-analyses with trial sequential analysis (TSA). TSA adjusts for random error risk and provides the required number of participants (information size) in a meta-analysis. Meta-analyses not reaching information size are analyzed with trial sequential monitoring boundaries...... analogous to interim monitoring boundaries in a single trial. STUDY DESIGN AND SETTING: We applied TSA on meta-analyses performed in Cochrane Neonatal reviews. We calculated information sizes and monitoring boundaries with three different anticipated intervention effects of 30% relative risk reduction (TSA...

  15. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    Science.gov (United States)

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  16. On the impact of network dynamics on a discovery protocol for ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.; Heijenk, Geert

    A very promising approach to discovering services and context information in ad-hoc networks is based on the use of Attenuated Bloom filters. In this paper we analyze the impact of changes in the connectivity of an ad-hoc network on this approach. We evaluate the performance of the discovery

  17. Time-Series Analyses of Transcriptomes and Proteomes Reveal Molecular Networks Underlying Oil Accumulation in Canola.

    Science.gov (United States)

    Wan, Huafang; Cui, Yixin; Ding, Yijuan; Mei, Jiaqin; Dong, Hongli; Zhang, Wenxin; Wu, Shiqi; Liang, Ying; Zhang, Chunyu; Li, Jiana; Xiong, Qing; Qian, Wei

    2016-01-01

    Understanding the regulation of lipid metabolism is vital for genetic engineering of canola ( Brassica napus L.) to increase oil yield or modify oil composition. We conducted time-series analyses of transcriptomes and proteomes to uncover the molecular networks associated with oil accumulation and dynamic changes in these networks in canola. The expression levels of genes and proteins were measured at 2, 4, 6, and 8 weeks after pollination (WAP). Our results show that the biosynthesis of fatty acids is a dominant cellular process from 2 to 6 WAP, while the degradation mainly happens after 6 WAP. We found that genes in almost every node of fatty acid synthesis pathway were significantly up-regulated during oil accumulation. Moreover, significant expression changes of two genes, acetyl-CoA carboxylase and acyl-ACP desaturase, were detected on both transcriptomic and proteomic levels. We confirmed the temporal expression patterns revealed by the transcriptomic analyses using quantitative real-time PCR experiments. The gene set association analysis show that the biosynthesis of fatty acids and unsaturated fatty acids are the most significant biological processes from 2-4 WAP and 4-6 WAP, respectively, which is consistent with the results of time-series analyses. These results not only provide insight into the mechanisms underlying lipid metabolism, but also reveal novel candidate genes that are worth further investigation for their values in the genetic engineering of canola.

  18. Metabolomic Analyses of Leishmania Reveal Multiple Species Differences and Large Differences in Amino Acid Metabolism.

    Directory of Open Access Journals (Sweden)

    Gareth D Westrop

    Full Text Available Comparative genomic analyses of Leishmania species have revealed relatively minor heterogeneity amongst recognised housekeeping genes and yet the species cause distinct infections and pathogenesis in their mammalian hosts. To gain greater information on the biochemical variation between species, and insights into possible metabolic mechanisms underpinning visceral and cutaneous leishmaniasis, we have undertaken in this study a comparative analysis of the metabolomes of promastigotes of L. donovani, L. major and L. mexicana. The analysis revealed 64 metabolites with confirmed identity differing 3-fold or more between the cell extracts of species, with 161 putatively identified metabolites differing similarly. Analysis of the media from cultures revealed an at least 3-fold difference in use or excretion of 43 metabolites of confirmed identity and 87 putatively identified metabolites that differed to a similar extent. Strikingly large differences were detected in their extent of amino acid use and metabolism, especially for tryptophan, aspartate, arginine and proline. Major pathways of tryptophan and arginine catabolism were shown to be to indole-3-lactate and arginic acid, respectively, which were excreted. The data presented provide clear evidence on the value of global metabolomic analyses in detecting species-specific metabolic features, thus application of this technology should be a major contributor to gaining greater understanding of how pathogens are adapted to infecting their hosts.

  19. What Is the Problem of Ad Hoc Hypotheses?

    Science.gov (United States)

    Bamford, Greg

    1999-01-01

    Philosophers' attempts to convincingly explicate the received view of an ad hoc hypothesis--that it accounts for only the observations it was designed to account for--have been unsuccessful. Familiar and firmer criteria for evaluating the hypotheses or modified theories so classified are characteristically available. Contains 41 references.…

  20. Individual-based analyses reveal limited functional overlap in a coral reef fish community.

    Science.gov (United States)

    Brandl, Simon J; Bellwood, David R

    2014-05-01

    Detailed knowledge of a species' functional niche is crucial for the study of ecological communities and processes. The extent of niche overlap, functional redundancy and functional complementarity is of particular importance if we are to understand ecosystem processes and their vulnerability to disturbances. Coral reefs are among the most threatened marine systems, and anthropogenic activity is changing the functional composition of reefs. The loss of herbivorous fishes is particularly concerning as the removal of algae is crucial for the growth and survival of corals. Yet, the foraging patterns of the various herbivorous fish species are poorly understood. Using a multidimensional framework, we present novel individual-based analyses of species' realized functional niches, which we apply to a herbivorous coral reef fish community. In calculating niche volumes for 21 species, based on their microhabitat utilization patterns during foraging, and computing functional overlaps, we provide a measurement of functional redundancy or complementarity. Complementarity is the inverse of redundancy and is defined as less than 50% overlap in niche volumes. The analyses reveal extensive complementarity with an average functional overlap of just 15.2%. Furthermore, the analyses divide herbivorous reef fishes into two broad groups. The first group (predominantly surgeonfishes and parrotfishes) comprises species feeding on exposed surfaces and predominantly open reef matrix or sandy substrata, resulting in small niche volumes and extensive complementarity. In contrast, the second group consists of species (predominantly rabbitfishes) that feed over a wider range of microhabitats, penetrating the reef matrix to exploit concealed surfaces of various substratum types. These species show high variation among individuals, leading to large niche volumes, more overlap and less complementarity. These results may have crucial consequences for our understanding of herbivorous processes on

  1. Post hoc subgroups in clinical trials: Anathema or analytics?

    Science.gov (United States)

    Weisberg, Herbert I; Pontes, Victor P

    2015-08-01

    There is currently much interest in generating more individualized estimates of treatment effects. However, traditional statistical methods are not well suited to this task. Post hoc subgroup analyses of clinical trials are fraught with methodological problems. We suggest that the alternative research paradigm of predictive analytics, widely used in many business contexts, can be adapted to help. We compare the statistical and analytics perspectives and suggest that predictive modeling should often replace subgroup analysis. We then introduce a new approach, cadit modeling, that can be useful to identify and test individualized causal effects. The cadit technique is particularly useful in the context of selecting from among a large number of potential predictors. We describe a new variable-selection algorithm that has been applied in conjunction with cadit. The cadit approach is illustrated through a reanalysis of data from the Randomized Aldactone Evaluation Study trial, which studied the efficacy of spironolactone in heart-failure patients. The trial was successful, but a serious adverse effect (hyperkalemia) was subsequently discovered. Our reanalysis suggests that it may be possible to predict the degree of hyperkalemia based on a logistic model and to identify a subgroup in which the effect is negligible. Cadit modeling is a promising alternative to subgroup analyses. Cadit regression is relatively straightforward to implement, generates results that are easy to present and explain, and can mesh straightforwardly with many variable-selection algorithms. © The Author(s) 2015.

  2. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  3. Multiplayer Game for DDoS Attacks Resilience in Ad Hoc Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles. We divide requests from nodes into separate groups which decreases the ability of malicious nodes to cooperate...... with one another in order to effectively make a DDoS attack. Finally, through our experiments we have shown that the total overhead of the multiplayer game as well as the the total time that each node needs to be served is affordable for devices that have limited resources and for environments like ad hoc...

  4. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-01-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical

  5. Ad Hoc Human Information Nets for Asymmetric Threat Surveillance

    National Research Council Canada - National Science Library

    Thiruvathukal, George

    2003-01-01

    ...: Hybrid-Hierarchical Micro-Databases, Query Optimization, and XML for Embedded Systems. After meeting with the program manager, Tom Armour, in Washington, DC, we were able to get a better perspective on the ad hoc nature of the solicitation...

  6. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  7. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  8. Ad Hoc Categories and False Memories: Memory Illusions for Categories Created On-The-Spot

    Science.gov (United States)

    Soro, Jerônimo C.; Ferreira, Mário B.; Semin, Gün R.; Mata, André; Carneiro, Paula

    2017-01-01

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment…

  9. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  10. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  11. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  12. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zahariadis Theodore

    2010-01-01

    Full Text Available Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN, which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

  13. Modern foreign language teachers - don't leave those kids alone! Linguistic-cultural "give and take" in an ad-hoc tutoring scheme

    Science.gov (United States)

    Leroy, Norah

    2017-08-01

    This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of the younger pupils, feedback reports indicated that it also had a positive impact on the relationship between the British migrant pupils and their French peers. Teachers believed that those involved participated more fully in class, and appeared more self-assured and generally happy thanks to the interpersonal relationships this scheme helped to forge. This study demonstrates the necessity of analysing the socio-cultural context migrants may find themselves in, in order to identify potential challenges. The ad-hoc tutoring scheme described here is an example of how language learning can support the integration and inclusion of "new generation" migrants into everyday school life.

  14. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  15. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  16. Authentication and consensus overhead in vehicular ad hoc networks

    NARCIS (Netherlands)

    Petit, Jonathan; Mammeri, Zoubir

    Vehicular ad hoc networks aim at increasing passenger safety by exchanging warning messages between vehicles wirelessly. A main challenge is to resist to various malicious abuses and security attacks. However, any security mechanism comes with overhead. We analyze how the authentication algorithm

  17. Challenges of evidence acquisition in wireless ad-hoc networks

    CSIR Research Space (South Africa)

    Mutanga, MB

    2010-05-01

    Full Text Available a big challenge. Thus, the aim of this paper is to explore the challenges of acquiring live evidence in wireless ad-hoc networks. We also give some legal requirements of evidence admissibility as outlined in the Communications and Transactions Act...

  18. A New Hybrid Channel Access Scheme for Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2002-01-01

    Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated...

  19. History of the research ad hoc committee on 'dissemination of information' and the special ad hoc committee on 'dissemination of information' of the Atomic Energy Society of Japan

    Energy Technology Data Exchange (ETDEWEB)

    Itabashi, Keizo [Japan Atomic Energy Agency, Intellectual Resources Department, Tokai, Ibaraki (Japan)

    2010-06-15

    The Research ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 15 times from Oct. 1970 to Mar 1973. After that, The Special ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 115 times from Apr. 1973 to Mar 2009. The history of these two committees is described. Activity report is arranged including the information on change of the member and topics of the meeting, and the minutes. Furthermore, the document list on International Nuclear Information System (INIS) from Japan is included. (author)

  20. History of the research ad hoc committee on 'dissemination of information' and the special ad hoc committee on 'dissemination of information' of the Atomic Energy Society of Japan

    International Nuclear Information System (INIS)

    Itabashi, Keizo

    2010-06-01

    The Research ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 15 times from Oct. 1970 to Mar 1973. After that, The Special ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 115 times from Apr. 1973 to Mar 2009. The history of these two committees is described. Activity report is arranged including the information on change of the member and topics of the meeting, and the minutes. Furthermore, the document list on International Nuclear Information System (INIS) from Japan is included. (author)

  1. On the Geometrical Characteristics of Three-Dimensional Wireless Ad Hoc Networks and Their Applications

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available In a wireless ad hoc network, messages are transmitted, received, and forwarded in a finite geometrical region and the transmission of messages is highly dependent on the locations of the nodes. Therefore the study of geometrical relationship between nodes in wireless ad hoc networks is of fundamental importance in the network architecture design and performance evaluation. However, most previous works concentrated on the networks deployed in the two-dimensional region or in the infinite three-dimensional space, while in many cases wireless ad hoc networks are deployed in the finite three-dimensional space. In this paper, we analyze the geometrical characteristics of the three-dimensional wireless ad hoc network in a finite space in the framework of random graph and deduce an expression to calculate the distance probability distribution between network nodes that are independently and uniformly distributed in a finite cuboid space. Based on the theoretical result, we present some meaningful results on the finite three-dimensional network performance, including the node degree and the max-flow capacity. Furthermore, we investigate some approximation properties of the distance probability distribution function derived in the paper.

  2. VMQL: A Visual Language for Ad-Hoc Model Querying

    DEFF Research Database (Denmark)

    Störrle, Harald

    2011-01-01

    In large scale model based development, analysis level models are more like knowledge bases than engineering artifacts. Their effectiveness depends, to a large degree, on the ability of domain experts to retrieve information from them ad hoc. For large scale models, however, existing query...

  3. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  4. FRAMEWORK FOR AD HOC NETWORK COMMUNICATION IN MULTI-ROBOT SYSTEMS

    Directory of Open Access Journals (Sweden)

    Khilda Slyusar

    2016-11-01

    Full Text Available Assume a team of mobile robots operating in environments where no communication infrastructure like routers or access points is available. The robots have to create a mobile ad hoc network, in that case, it provides communication on peer-to-peer basis. The paper gives an overview of existing solutions how to route messages in such ad hoc networks between robots that are not directly connected and introduces a design of a software framework for realization of such communication. Feasibility of the proposed framework is shown on the example of distributed multi-robot exploration of an a priori unknown environment. Testing of developed functionality in an exploration scenario is based on results of several experiments with various input conditions of the exploration process and various sizes of a team and is described herein.

  5. Special analyses reveal coke-deposit structure

    International Nuclear Information System (INIS)

    Albright, L.F.

    1988-01-01

    A scanning electron microscope (SEM) and an energy dispersive X-ray analyzer (EDAX) have been used to obtain information that clarifies the three mechanisms of coke formation in ethylene furnaces, and to analyze the metal condition at the exit of furnace. The results can be used to examine furnace operations and develop improved ethylene plant practices. In this first of four articles on the analyses of coke and metal samples, the coking mechanisms and coke deposits in a section of tube from an actual ethylene furnace (Furnace A) from a plant on the Texas Gulf Coast are discussed. The second articles in the series will analyze the condition of the tube metal in the same furnace. To show how coke deposition and metal condition dependent on the operating parameters of an ethylene furnace, the third article in the series will show the coke deposition in a Texas Gulf Coast furnace tube (Furnace B) that operated at shorter residence time. The fourth article discusses the metal condition in that furnace. Some recommendations, based on the analyses and findings, are offered in the fourth article that could help extend the life of ethylene furnace tubes, and also improve overall ethylene plant operations

  6. A Novel Routing Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Raúl Aquino Santos

    2008-01-01

    Full Text Available Este trabajo examina la importancia de las redes inalámbricas ad hoc y el algoritmo de enrutamiento con inundación basada en grupos (LORA-CBF para la comunicación inter-vehicular con la finalidad de optimizar el flujo de tráfico e incrementar la seguridad en las autopistas. Se discute el algoritmo de enrutamiento LORA-CBF y se presentan los resultados de simulaciones realizadas en OPNET de una autopista con alta movilidad vehicular. Primero, el modelo de simulación propuesto se valida a pequeña escala con resultados experimentales. Posteriormente, se emplean simulaciones de nuestro modelo comparándolos con Ad Hoc On-Demand Distance Vector (AODV y Dynamic Source Routing (DSR. Finalmente, se emplea un modelo de tráfico microscópico desarrollado en OPNET para simular la movilidad de 250 vehículos en una autopista y se aplica el algoritmo de enrutamiento LORA-CBF en un escenario vehicular.

  7. simulate_CAT: A Computer Program for Post-Hoc Simulation for Computerized Adaptive Testing

    Directory of Open Access Journals (Sweden)

    İlker Kalender

    2015-06-01

    Full Text Available This paper presents a computer software developed by the author. The software conducts post-hoc simulations for computerized adaptive testing based on real responses of examinees to paper and pencil tests under different parameters that can be defined by user. In this paper, short information is given about post-hoc simulations. After that, the working principle of the software is provided and a sample simulation with required input files is shown. And last, output files are described

  8. Assessment of direct analgesic effect of duloxetine for chronic low back pain: post hoc path analysis of double-blind, placebo-controlled studies

    Directory of Open Access Journals (Sweden)

    Enomoto H

    2017-06-01

    Full Text Available Hiroyuki Enomoto,1 Shinji Fujikoshi,2 Jumpei Funai,3 Nao Sasaki,4 Michael H Ossipov,5 Toshinaga Tsuji,6 Levent Alev,7 Takahiro Ushida8 1Medical Science, Eli Lilly Japan K.K., Tokyo, 2Statistical Science, 3Science Communications, 4Medical Science, Eli Lilly Japan K.K., Kobe, Japan; 5Clinical Division, inVentiv Health, LLC, Blue Bell, PA, USA; 6Medical Affairs Department, Shionogi & Co., Ltd., Osaka, Japan; 7Medical Department, Lilly Turkey, Istanbul, Turkey; 8Multidisciplinary Pain Center, Aichi Medical University, Nagakute, Aichi, Japan Background: Comorbid depression and depressive symptoms are common in patients with chronic low back pain (CLBP. Duloxetine is clinically effective in major depressive disorder and several chronic pain states, including CLBP. The objective of this post hoc meta-analysis was to assess direct and indirect analgesic efficacy of duloxetine for patients with CLBP in previous clinical trials. Methods: Post hoc path analyses were conducted of 3 randomized, double-blind, clinical studies of patients receiving duloxetine or placebo for CLBP. The primary outcome measure for pain was the Brief Pain Inventory, average pain score. A secondary outcome measure, the Beck Depression Inventory-II, was used for depressive symptoms. The changes in score from baseline to endpoint were determined for each index. Path analyses were employed to calculate the proportion of analgesia that may be attributed to a direct effect of duloxetine on pain.Results: A total of 851 patients (400 duloxetine and 451 placebo were included in this analysis. Duloxetine significantly improved pain scores compared with placebo (p<0.001. It also significantly improved depressive scores compared with placebo (p=0.015. Path analyses showed that 91.1% of the analgesic effect of duloxetine could be attributed to a direct analgesic effect, and 8.9% to its antidepressant effect. Similar results were obtained when data were evaluated at weeks 4 and 7, and when

  9. UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna

    Science.gov (United States)

    Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang

    2018-01-01

    This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.

  10. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...

  11. Distributed optimization of a multisubchannel Ad Hoc cognitive radio network

    KAUST Repository

    Leith, Alex

    2012-05-01

    In this paper, we study the distributed-duality-based optimization of a multisubchannel ad hoc cognitive radio network (CRN) that coexists with a multicell primary radio network (PRN). For radio resource allocation in multiuser orthogonal frequency-division multiplexing (MU-OFDM) systems, the orthogonal-access-based exclusive subchannel assignment (ESA) technique has been a popular method, but it is suboptimal in ad hoc networks, because nonorthogonal access between multiple secondary-user links by using shared subchannel assignment (SSA) can bring a higher weighted sum rate. We utilize the Lagrangian dual composition tool and design low-complexity near-optimal SSA resource allocation methods, assuming practical discrete-rate modulation and that the CRN-to-PRN interference constraint has to strictly be satisfied. However, available SSA methods for CRNs are either suboptimal or involve high complexity and suffer from slow convergence. To address this problem, we design fast-convergence SSA duality schemes and introduce several novel methods to increase the speed of convergence and to satisfy various system constraints with low complexity. For practical implementation in ad hoc CRNs, we design distributed-duality schemes that involve only a small number of CRN local information exchanges for dual update. The effects of many system parameters are presented through simulation results, which show that the near-optimal SSA duality scheme can perform significantly better than the suboptimal ESA duality and SSA-iterative waterfilling schemes and that the performance loss of the distributed schemes is small, compared with their centralized counterparts. © 2012 IEEE.

  12. Genome-wide analyses reveal a role for peptide hormones in planarian germline development.

    Directory of Open Access Journals (Sweden)

    James J Collins

    Full Text Available Bioactive peptides (i.e., neuropeptides or peptide hormones represent the largest class of cell-cell signaling molecules in metazoans and are potent regulators of neural and physiological function. In vertebrates, peptide hormones play an integral role in endocrine signaling between the brain and the gonads that controls reproductive development, yet few of these molecules have been shown to influence reproductive development in invertebrates. Here, we define a role for peptide hormones in controlling reproductive physiology of the model flatworm, the planarian Schmidtea mediterranea. Based on our observation that defective neuropeptide processing results in defects in reproductive system development, we employed peptidomic and functional genomic approaches to characterize the planarian peptide hormone complement, identifying 51 prohormone genes and validating 142 peptides biochemically. Comprehensive in situ hybridization analyses of prohormone gene expression revealed the unanticipated complexity of the flatworm nervous system and identified a prohormone specifically expressed in the nervous system of sexually reproducing planarians. We show that this member of the neuropeptide Y superfamily is required for the maintenance of mature reproductive organs and differentiated germ cells in the testes. Additionally, comparative analyses of our biochemically validated prohormones with the genomes of the parasitic flatworms Schistosoma mansoni and Schistosoma japonicum identified new schistosome prohormones and validated half of all predicted peptide-encoding genes in these parasites. These studies describe the peptide hormone complement of a flatworm on a genome-wide scale and reveal a previously uncharacterized role for peptide hormones in flatworm reproduction. Furthermore, they suggest new opportunities for using planarians as free-living models for understanding the reproductive biology of flatworm parasites.

  13. Comparative Genomics and Transcriptomics Analyses Reveal Divergent Lifestyle Features of Nematode Endoparasitic Fungus Hirsutella minnesotensis

    Science.gov (United States)

    Lai, Yiling; Liu, Keke; Zhang, Xinyu; Zhang, Xiaoling; Li, Kuan; Wang, Niuniu; Shu, Chi; Wu, Yunpeng; Wang, Chengshu; Bushley, Kathryn E.; Xiang, Meichun; Liu, Xingzhong

    2014-01-01

    Hirsutella minnesotensis [Ophiocordycipitaceae (Hypocreales, Ascomycota)] is a dominant endoparasitic fungus by using conidia that adhere to and penetrate the secondary stage juveniles of soybean cyst nematode. Its genome was de novo sequenced and compared with five entomopathogenic fungi in the Hypocreales and three nematode-trapping fungi in the Orbiliales (Ascomycota). The genome of H. minnesotensis is 51.4 Mb and encodes 12,702 genes enriched with transposable elements up to 32%. Phylogenomic analysis revealed that H. minnesotensis was diverged from entomopathogenic fungi in Hypocreales. Genome of H. minnesotensis is similar to those of entomopathogenic fungi to have fewer genes encoding lectins for adhesion and glycoside hydrolases for cellulose degradation, but is different from those of nematode-trapping fungi to possess more genes for protein degradation, signal transduction, and secondary metabolism. Those results indicate that H. minnesotensis has evolved different mechanism for nematode endoparasitism compared with nematode-trapping fungi. Transcriptomics analyses for the time-scale parasitism revealed the upregulations of lectins, secreted proteases and the genes for biosynthesis of secondary metabolites that could be putatively involved in host surface adhesion, cuticle degradation, and host manipulation. Genome and transcriptome analyses provided comprehensive understanding of the evolution and lifestyle of nematode endoparasitism. PMID:25359922

  14. Phylogeographic analyses of the pampas cat (Leopardus colocola; Carnivora, Felidae) reveal a complex demographic history

    Science.gov (United States)

    da Silva Santos, Anelisie; Trigo, Tatiane Campos; de Oliveira, Tadeu Gomes; Silveira, Leandro

    2018-01-01

    Abstract The pampas cat is a small felid that occurs in open habitats throughout much of South America. Previous studies have revealed intriguing patterns of morphological differentiation and genetic structure among its populations, as well as molecular evidence for hybridization with the closely related L. tigrinus. Here we report phylogeographic analyses encompassing most of its distribution (focusing particularly on Brazilian specimens, which had been poorly sampled in previous studies), using a novel dataset comprising 2,143 bp of the mitogenome, along with previously reported mtDNA sequences. Our data revealed strong population strutucture and supported a west-to-east colonization process in this species’ history. We detected two population expansion events, one older (ca. 200 thousand years ago [kya]) in western South America and another more recent (ca. 60-50 kya) in eastern areas, coinciding with the expansion of savanna environments in Brazil. Analyses including L. tigrinus individuals bearing introgressed mtDNA from L. colocola showed a complete lack of shared haplotypes between species, indicating that their hybridization was ancient. Finally, we observed a close relationship between Brazilian/Uruguayan L. colocola haplotypes and those sampled in L. tigrinus, indicating that their hybridization was likely related to the demographic expansion of L. colocola into eastern South America. PMID:29668017

  15. Minimizing Broadcast Expenses in Clustered Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Zeeshan Hussain

    2018-01-01

    Full Text Available One way to minimize the broadcast expenses of routing protocols is to cluster the network. In clustered ad-hoc networks, all resources can be managed easily by resolving scalability issues. However, blind query broadcast is a major issue that leads to the broadcast storm problem in clustered ad-hoc networks. This query broadcast is done to carry out the route-search task that leads to the unnecessary propagation of route-query even after route has been found. Hence, this query propagation poses the problem of congestion in the network. In particular this motivates us to propose a query-control technique in such networks which works based on broadcast repealing. A huge amount of work has been devoted to propose the query control broadcasting techniques. However, such techniques used in traditional broadcasting mechanisms need to be properly extended for use in the cluster based routing architecture. In this paper, query-control technique is proposed for cluster based routing technique to reduce the broadcast expenses. Finally, we report some experiments which compare the proposed technique to other commonly used techniques including standard one-class AODV that follows TTL-sequence based broadcasting technique.

  16. Service for fault tolerance in the Ad Hoc Networks based on Multi Agent Systems

    Directory of Open Access Journals (Sweden)

    Ghalem Belalem

    2011-02-01

    Full Text Available The Ad hoc networks are distributed networks, self-organized and does not require infrastructure. In such network, mobile infrastructures are subject of disconnections. This situation may concern a voluntary or involuntary disconnection of nodes caused by the high mobility in the Ad hoc network. In these problems we are trying through this work to contribute to solving these problems in order to ensure continuous service by proposing our service for faults tolerance based on Multi Agent Systems (MAS, which predict a problem and decision making in relation to critical nodes. Our work contributes to study the prediction of voluntary and involuntary disconnections in the Ad hoc network; therefore we propose our service for faults tolerance that allows for effective distribution of information in the Network by selecting some objects of the network to be duplicates of information.

  17. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  18. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  19. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  20. Throughput and Fairness of Collision Avoidance Protocols in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Garcia-Luna-Aceves, J. J; Wang, Yu

    2004-01-01

    .... In Section 1, The authors present an analytical modeling to derive the saturation throughput of these sender-initiated collision avoidance protocols in multi-hop ad hoc networks with nodes randomly...

  1. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  2. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  3. ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS – A SURVEY

    Directory of Open Access Journals (Sweden)

    K. Sankar

    2012-06-01

    Full Text Available Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in wireless communication. The performance of the medium access control (MAC scheme not only has a fairly significant end-result on the behaviour of the routing approach employed, but also on the energy consumption of the wireless network interface card (NIC. We investigate the inadequacies of the MAC schemes designed for ad hoc wireless networks in the context of power awareness herein. The topology changes due to uncontrollable factors such as node mobility, weather, interference, noise, as well as on controllable parameters such as transmission power and antenna direction results in significant amount of energy loss. Controlling rapid topology changes by minimizing the maximum transmission power used in ad hoc wireless networks, while still maintaining networks connectivity can prolong battery life and hence network lifetime considerably. In addition, we systematically explore the potential energy consumption pitfalls of non–power-based and power based routing schemes. We suggest a thorough energy-based performance survey of energy aware routing protocols for wireless mobile ad-hoc networks. We also present the statistical performance metrics measured by our simulations.

  4. Research on Propagation Model of Malicious Programs in Ad Hoc Wireless Network

    Directory of Open Access Journals (Sweden)

    Weimin GAO

    2014-01-01

    Full Text Available Ad Hoc wireless network faces more security threats than traditional network due to its P2P system structure and the limited node resources. In recent years, malicious program has become one of the most important researches on international network security and information security. The research of malicious programs on wireless network has become a new research hotspot in the field of malicious programs. This paper first analyzed the Ad Hoc network system structure, security threats, the common classification of malicious programs and the bionic propagation model. Then starting from the differential equations of the SEIR virus propagation model, the question caused by introducing the SEIR virus propagation model in Ad Hoc wireless network was analyzed. This paper improved the malicious program propagation model through introducing the network topology features and concepts such as immunization delay, and designed an improved algorithm combined with the dynamic evolution of malware propagation process. Considering of the network virus propagation characteristics, network characteristics and immunization strategy to improve simulation model experiment analysis, the experimental results show that both the immunization strategy and the degrees of node can affect the propagation of malicious program.

  5. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  6. QoS Routing in Ad-Hoc Networks Using GA and Multi-Objective Optimization

    Directory of Open Access Journals (Sweden)

    Admir Barolli

    2011-01-01

    Full Text Available Much work has been done on routing in Ad-hoc networks, but the proposed routing solutions only deal with the best effort data traffic. Connections with Quality of Service (QoS requirements, such as voice channels with delay and bandwidth constraints, are not supported. The QoS routing has been receiving increasingly intensive attention, but searching for the shortest path with many metrics is an NP-complete problem. For this reason, approximated solutions and heuristic algorithms should be developed for multi-path constraints QoS routing. Also, the routing methods should be adaptive, flexible, and intelligent. In this paper, we use Genetic Algorithms (GAs and multi-objective optimization for QoS routing in Ad-hoc Networks. In order to reduce the search space of GA, we implemented a search space reduction algorithm, which reduces the search space for GAMAN (GA-based routing algorithm for Mobile Ad-hoc Networks to find a new route. We evaluate the performance of GAMAN by computer simulations and show that GAMAN has better behaviour than GLBR (Genetic Load Balancing Routing.

  7. Car-to-Pedestrian Communication Safety System Based on the Vehicular Ad-Hoc Network Environment: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Peng Jing

    2017-10-01

    Full Text Available With the unparalleled growth of motor vehicles, traffic accident between pedestrians and vehicles is one of the most serious issues in the word-wild. Plenty of injuries and fatalities are caused by the traffic accidents and crashes. The connected vehicular ad hoc network as an emerging approach which has the potential to reduce and even avoid accidents have been focused on by many researchers. A large number of car-to-pedestrian communication safety systems based on the vehicular ad hoc network are researching and developing. However, to our limited knowledge, a systematic review about the car-to-pedestrian communication safety system based on the vehicular ad-hoc network has not be written. The purpose and goal of this review is to systematically evaluate and access the reliability of car-to-pedestrian communication safety system based on the vehicular ad-hoc network environment and provide some recommendations for the future works according to throwing some light on the previous literatures. A quality evaluation was developed through established items and instruments tailored to this review. Future works are needed to focus on developing a valid as well as effective communication safety system based on the vehicular ad hoc network to protect the vulnerable road users.

  8. Studies on urban vehicular ad-hoc networks

    CERN Document Server

    Zhu, Hongzi

    2013-01-01

    With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing 'smart cities' and addressing many important transportation problems such as road safety, efficiency, and convenience.This brief provides an introduction to the large trace data set collected from thousands of taxis and buses in Shanghai, the largest metropolis in China. It also presents the challenges, design issues, performance modeling and evaluation of a wide spectrum of VANET research topics, ranging from realistic vehicular mobility models and opportunistic ro

  9. Perioperative hyperoxia - Long-term impact on cardiovascular complications after abdominal surgery, a post hoc analysis of the PROXI trial

    DEFF Research Database (Denmark)

    Fonnes, Siv; Gogenur, Ismail; Sondergaard, Edith Smed

    2016-01-01

    BACKGROUND: Increased long-term mortality was found in patients exposed to perioperative hyperoxia in the PROXI trial, where patients undergoing laparotomy were randomised to 80% versus 30% oxygen during and after surgery. This post hoc follow-up study assessed the impact of perioperative hyperoxia...... included myocardial infarction, other heart disease, and acute coronary syndrome or death. Data were analysed in the Cox proportional hazards model. RESULTS: The primary outcome, acute coronary syndrome, occurred in 2.5% versus 1.3% in the 80% versus 30% oxygen group; HR 2.15 (95% CI 0.96-4.84). Patients...

  10. Optimal design of cluster-based ad-hoc networks using probabilistic solution discovery

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2009-01-01

    The reliability of ad-hoc networks is gaining popularity in two areas: as a topic of academic interest and as a key performance parameter for defense systems employing this type of network. The ad-hoc network is dynamic and scalable and these descriptions are what attract its users. However, these descriptions are also synonymous for undefined and unpredictable when considering the impacts to the reliability of the system. The configuration of an ad-hoc network changes continuously and this fact implies that no single mathematical expression or graphical depiction can describe the system reliability-wise. Previous research has used mobility and stochastic models to address this challenge successfully. In this paper, the authors leverage the stochastic approach and build upon it a probabilistic solution discovery (PSD) algorithm to optimize the topology for a cluster-based mobile ad-hoc wireless network (MAWN). Specifically, the membership of nodes within the back-bone network or networks will be assigned in such as way as to maximize reliability subject to a constraint on cost. The constraint may also be considered as a non-monetary cost, such as weight, volume, power, or the like. When a cost is assigned to each component, a maximum cost threshold is assigned to the network, and the method is run; the result is an optimized allocation of the radios enabling back-bone network(s) to provide the most reliable network possible without exceeding the allowable cost. The method is intended for use directly as part of the architectural design process of a cluster-based MAWN to efficiently determine an optimal or near-optimal design solution. It is capable of optimizing the topology based upon all-terminal reliability (ATR), all-operating terminal reliability (AoTR), or two-terminal reliability (2TR)

  11. A-priori and post-hoc segmentation in the design of healthy eating campaigns

    DEFF Research Database (Denmark)

    Kazbare, Laura; van Trijp, Hans C. M.; Eskildsen, Jacob Kjær

    2010-01-01

    . Although such practice may be justifiable from the practical point of view, it is unclear how effective these implicit segmentations are. In this study the authors argue that  it is important to transcend demographic boundaries and to further segment demographic groups. A study with 13-15-year-old...... and a post-hoc segmentation. The results of the study show that it is useful and also ethical to differentiate people using segmentation methods, since it facilitates reaching more vulnerable segments of society that in general resist change. It also demonstrates that post-hoc segmentation is more helpful...

  12. An Ad-Hoc Adaptive Pilot Model for Pitch Axis Gross Acquisition Tasks

    Science.gov (United States)

    Hanson, Curtis E.

    2012-01-01

    An ad-hoc algorithm is presented for real-time adaptation of the well-known crossover pilot model and applied to pitch axis gross acquisition tasks in a generic fighter aircraft. Off-line tuning of the crossover model to human pilot data gathered in a fixed-based high fidelity simulation is first accomplished for a series of changes in aircraft dynamics to provide expected values for model parameters. It is shown that in most cases, for this application, the traditional crossover model can be reduced to a gain and a time delay. The ad-hoc adaptive pilot gain algorithm is shown to have desirable convergence properties for most types of changes in aircraft dynamics.

  13. The Ad Hoc process to strengthen the framework convention on climate change

    Energy Technology Data Exchange (ETDEWEB)

    Ramakrishna, K.; Deutz, A.M.; Jacobsen, L.A. [eds.

    1995-11-01

    The Woods Hole Research Center convened an International Conference on The Ad Hoc Process to Strengthen the Framework Convention on Climate Change in Woods Hole, MA, on October 7-9, 1995. The conference was conducted to examine the prospects for successful adoption of a protocol to the Framework Convention on Climate Change by 1997. In preparation for the Second session of the Ad Hoc Group on the Berlin Mandate, several governmental and nongovernmental representatives met in Woods Hole to discuss the process and possible outcome of the Berlin Mandate negotiations for a protocol or other legal instrument to strengthen the Convention. The conference was by invitation and all participants attended in their personal capacities.

  14. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  15. An Economic Framework for Resource Allocation in Ad-hoc Grids

    NARCIS (Netherlands)

    Pourebrahimi, B.

    2009-01-01

    In this dissertation, we present an economic framework to study and develop different market-based mechanisms for resource allocation in an ad-hoc Grid. Such an economic framework helps to understand the impact of certain choices and explores what are the suitable mechanisms from Grid user/owner

  16. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  17. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    Simeone O

    2007-01-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  18. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    O. Simeone

    2007-03-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  19. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  20. A fault-tolerant small world topology control model in ad hoc networks for search and rescue

    Science.gov (United States)

    Tan, Mian; Fang, Ling; Wu, Yue; Zhang, Bo; Chang, Bowen; Holme, Petter; Zhao, Jing

    2018-02-01

    Due to their self-organized, multi-hop and distributed characteristics, ad hoc networks are useful in search and rescue. Topology control models need to be designed for energy-efficient, robust and fast communication in ad hoc networks. This paper proposes a topology control model which specializes for search and rescue-Compensation Small World-Repeated Game (CSWRG)-which integrates mobility models, constructing small world networks and a game-theoretic approach to the allocation of resources. Simulation results show that our mobility models can enhance the communication performance of the constructed small-world networks. Our strategy, based on repeated game, can suppress selfish behavior and compensate agents that encounter selfish or faulty neighbors. This model could be useful for the design of ad hoc communication networks.

  1. Report of the evaluation by the Ad Hoc Review Committee on Health Physics. Result evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Health Physics in accordance with the 'Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Department of Health Physics in Tokai Research Establishment and at related departments in other Establishments of JAERI. The Ad Hoc Review Committee consisted of six specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from October 2000 to January 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on October 10, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Health Physics. (author)

  2. Ad Hoc Transient Groups: Instruments for Awareness in Learning Networks

    NARCIS (Netherlands)

    Fetter, Sibren; Rajagopal, Kamakshi; Berlanga, Adriana; Sloep, Peter

    2011-01-01

    Fetter, S., Rajagopal, K., Berlanga, A. J., & Sloep, P. B. (2011). Ad Hoc Transient Groups: Instruments for Awareness in Learning Networks. In W. Reinhardt, T. D. Ullmann, P. Scott, V. Pammer, O. Conlan, & A. J. Berlanga (Eds.), Proceedings of the 1st European Workshop on Awareness and Reflection in

  3. Mitochondrial DNA analyses reveal low genetic diversity in Culex quinquefasciatus from residential areas in Malaysia.

    Science.gov (United States)

    Low, V L; Lim, P E; Chen, C D; Lim, Y A L; Tan, T K; Norma-Rashid, Y; Lee, H L; Sofian-Azirun, M

    2014-06-01

    The present study explored the intraspecific genetic diversity, dispersal patterns and phylogeographic relationships of Culex quinquefasciatus Say (Diptera: Culicidae) in Malaysia using reference data available in GenBank in order to reveal this species' phylogenetic relationships. A statistical parsimony network of 70 taxa aligned as 624 characters of the cytochrome c oxidase subunit I (COI) gene and 685 characters of the cytochrome c oxidase subunit II (COII) gene revealed three haplotypes (A1-A3) and four haplotypes (B1-B4), respectively. The concatenated sequences of both COI and COII genes with a total of 1309 characters revealed seven haplotypes (AB1-AB7). Analysis using tcs indicated that haplotype AB1 was the common ancestor and the most widespread haplotype in Malaysia. The genetic distance based on concatenated sequences of both COI and COII genes ranged from 0.00076 to 0.00229. Sequence alignment of Cx. quinquefasciatus from Malaysia and other countries revealed four haplotypes (AA1-AA4) by the COI gene and nine haplotypes (BB1-BB9) by the COII gene. Phylogenetic analyses demonstrated that Malaysian Cx. quinquefasciatus share the same genetic lineage as East African and Asian Cx. quinquefasciatus. This study has inferred the genetic lineages, dispersal patterns and hypothetical ancestral genotypes of Cx. quinquefasciatus. © 2013 The Royal Entomological Society.

  4. Maximization of Energy Efficiency in Wireless ad hoc and Sensor Networks With SERENA

    Directory of Open Access Journals (Sweden)

    Saoucene Mahfoudh

    2009-01-01

    Full Text Available In wireless ad hoc and sensor networks, an analysis of the node energy consumption distribution shows that the largest part is due to the time spent in the idle state. This result is at the origin of SERENA, an algorithm to SchEdule RoutEr Nodes Activity. SERENA allows router nodes to sleep, while ensuring end-to-end communication in the wireless network. It is a localized and decentralized algorithm assigning time slots to nodes. Any node stays awake only during its slot and the slots assigned to its neighbors, it sleeps the remaining time. Simulation results show that SERENA enables us to maximize network lifetime while increasing the number of user messages delivered. SERENA is based on a two-hop coloring algorithm, whose complexity in terms of colors and rounds is evaluated. We then quantify the slot reuse. Finally, we show how SERENA improves the node energy consumption distribution and maximizes the energy efficiency of wireless ad hoc and sensor networks. We compare SERENA with classical TDMA and optimized variants such as USAP in wireless ad hoc and sensor networks.

  5. Signaling-Free Max-Min Airtime Fairness in IEEE 802.11 Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Youngsoo Lee

    2016-01-01

    Full Text Available We propose a novel media access control (MAC protocol, referred to as signaling-free max-min airtime fair (SMAF MAC, to improve fairness and channel utilization in ad hoc networks based on IEEE 802.11 wireless local area networks (WLANs. We introduce busy time ratio (BTR as a measure for max-min airtime fairness. Each node estimates its BTR and adjusts the transmission duration by means of frame aggregation and fragmentation, so that it can implicitly announce the BTR to neighbor nodes. Based on the announced BTR, each of the neighbor nodes controls its contention window. In this way, the SMAF MAC works in a distributed manner without the need to know the max-min fair share of airtime, and it does not require exchanging explicit control messages among nodes to attain fairness. Moreover, we successfully incorporate the hidden node detection and resolution mechanisms into the SMAF MAC to deal with the hidden node problem in ad hoc networks. The simulation results confirm that the SMAF MAC enhances airtime fairness without degrading channel utilization, and it effectively resolves several serious problems in ad hoc networks such as the starvation, performance anomaly, and hidden node problems.

  6. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  7. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    Science.gov (United States)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  8. A Spontaneous Ad Hoc Network to Share WWW Access

    Directory of Open Access Journals (Sweden)

    Lloret Jaime

    2010-01-01

    Full Text Available In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.

  9. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  10. Reliability analysis of cluster-based ad-hoc networks

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2008-01-01

    The mobile ad-hoc wireless network (MAWN) is a new and emerging network scheme that is being employed in a variety of applications. The MAWN varies from traditional networks because it is a self-forming and dynamic network. The MAWN is free of infrastructure and, as such, only the mobile nodes comprise the network. Pairs of nodes communicate either directly or through other nodes. To do so, each node acts, in turn, as a source, destination, and relay of messages. The virtue of a MAWN is the flexibility this provides; however, the challenge for reliability analyses is also brought about by this unique feature. The variability and volatility of the MAWN configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate because no single structure or configuration represents all manifestations of a MAWN. For this reason, new methods are being developed to analyze the reliability of this new networking technology. New published methods adapt to this feature by treating the configuration probabilistically or by inclusion of embedded mobility models. This paper joins both methods together and expands upon these works by modifying the problem formulation to address the reliability analysis of a cluster-based MAWN. The cluster-based MAWN is deployed in applications with constraints on networking resources such as bandwidth and energy. This paper presents the problem's formulation, a discussion of applicable reliability metrics for the MAWN, and illustration of a Monte Carlo simulation method through the analysis of several example networks

  11. Ad hoc Sensor Networks to Support Maritime Interdiction Operations

    OpenAIRE

    Osmundson, John; Bordetsky, Alex

    2014-01-01

    Networking sensors, decision centers, and boarding parties supports success in Maritime Interdiction Operations. Led by a team from Naval Post-graduate School (NPS), experiments were conducted in 2012 to test the use of ad-hoc, self-forming communication networks to link sensors, people, and decision centers. The experiments involved international participants and successfully shared valuable biometric and radiological sensor data between boarding parties and decis...

  12. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  13. Intelligent Stale-Frame Discards for Real-Time Video Streaming over Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Sheu Tsang-Ling

    2009-01-01

    Full Text Available Abstract This paper presents intelligent early packet discards (I-EPD for real-time video streaming over a multihop wireless ad hoc network. In a multihop wireless ad hoc network, the quality of transferring real-time video streams could be seriously degraded, since every intermediate node (IN functionally like relay device does not possess large buffer and sufficient bandwidth. Even worse, a selected relay node could leave or power off unexpectedly, which breaks the route to destination. Thus, a stale video frame is useless even if it can reach destination after network traffic becomes smooth or failed route is reconfigured. In the proposed I-EPD, an IN can intelligently determine whether a buffered video packet should be early discarded. For the purpose of validation, we implement the I-EPD on Linux-based embedded systems. Via the comparisons of performance metrics (packet/frame discards ratios, PSNR, etc., we demonstrate that video quality over a wireless ad hoc network can be substantially improved and unnecessary bandwidth wastage is greatly reduced.

  14. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  15. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  16. Fossil-based comparative analyses reveal ancient marine ancestry erased by extinction in ray-finned fishes.

    Science.gov (United States)

    Betancur-R, Ricardo; Ortí, Guillermo; Pyron, Robert Alexander

    2015-05-01

    The marine-freshwater boundary is a major biodiversity gradient and few groups have colonised both systems successfully. Fishes have transitioned between habitats repeatedly, diversifying in rivers, lakes and oceans over evolutionary time. However, their history of habitat colonisation and diversification is unclear based on available fossil and phylogenetic data. We estimate ancestral habitats and diversification and transition rates using a large-scale phylogeny of extant fish taxa and one containing a massive number of extinct species. Extant-only phylogenetic analyses indicate freshwater ancestry, but inclusion of fossils reveal strong evidence of marine ancestry in lineages now restricted to freshwaters. Diversification and colonisation dynamics vary asymmetrically between habitats, as marine lineages colonise and flourish in rivers more frequently than the reverse. Our study highlights the importance of including fossils in comparative analyses, showing that freshwaters have played a role as refuges for ancient fish lineages, a signal erased by extinction in extant-only phylogenies. © 2015 John Wiley & Sons Ltd/CNRS.

  17. The accuracy of interpreting key psychiatric terms by ad hoc ...

    African Journals Online (AJOL)

    MacFarlane et al.15 note that a greater number of people have a preference for working with ad hoc interpreters in comparison to professional interpreters ... As part of a larger study, a cross-sectional qualitative interview design was used to ..... obstacle they would face if they would receive training. They had concerns over ...

  18. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  19. Post-hoc analysis of randomised, placebo-controlled, double-blind study (MCI186-19) of edaravone (MCI-186) in amyotrophic lateral sclerosis.

    Science.gov (United States)

    Takei, Koji; Takahashi, Fumihiro; Liu, Shawn; Tsuda, Kikumi; Palumbo, Joseph

    2017-10-01

    Post-hoc analyses of the ALS Functional Rating Scale-Revised (ALSFRS-R) score data, the primary endpoint in the 24-week double-blind placebo-controlled study of edaravone (MCI186-19, NCT01492686), were performed to confirm statistical robustness of the result. The previously reported original analysis had used a last observation carried forward (LOCF) method and also excluded patients with fewer than three completed treatment cycles. The post-hoc sensitivity analyses used different statistical methods as follows: 1) including all patients regardless of treatment cycles received (ALL LOCF); 2) a mixed model for repeated measurements (MMRM) analysis; and 3) the Combined Assessment of Function and Survival (CAFS) endpoint. Findings were consistent with the original primary analysis in showing superiority of edaravone over placebo. We also investigated the distribution of change in ALSFRS-R total score across all patients in the study as well as which ALSFRS-R items and domains may have contributed to the overall efficacy findings. The distribution of changes in ALSFRS-R total score from baseline to the end of cycle 6 (ALL LOCF) shifted in favour of edaravone compared to placebo. Edaravone was descriptively favoured for each ALSFRS-R item and each of the four ALSFRS-R domains at the end of cycle 6 (ALL LOCF), suggesting a generalised effect of edaravone in slowing functional decline across all anatomical regions. The effect of edaravone appeared to be similar in patients with bulbar onset and limb onset. Together, these observations would be consistent with its putative neuroprotective effects against the development of oxidative damage unspecific to anatomical regions.

  20. Report of the evaluation by the Ad Hoc Review Committee on Information Technology. In-advance evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Information Technology in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs pertaining to the establishment and utilization of the Information Technology Based Laboratory (ITBL) to be implemented for five years starting in Fiscal Year 2001 at Center for Promotion of Computational Science and Engineering and Department of Environmental Sciences of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from February to March 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on February 9, 2001, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Information Technology. (author)

  1. Report of the evaluation by the Ad Hoc Review Committee on Nuclear Safety Research. Result evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Nuclear Safety Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Department of Reactor Safety Research, Department of Fuel Cycle Safety Research, Department of Environmental Safety Research and Department of Safety Research Technical Support in Tokai Research Establishment at JAERI. The Ad Hoc Review Committee consisted of 11 specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from December 2000 to February 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on December 11, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Nuclear Safety Research. (author)

  2. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  3. An ad-hoc fretting wear tribotester design for thin steel wires

    Directory of Open Access Journals (Sweden)

    Llavori Iñigo

    2018-01-01

    Full Text Available Steel wire ropes experience fretting wear damage when the rope runs over a sheave promoting an oscillatory motion between the wires. Consequently, wear scars appear between the contacting wires leading to an increase of the stress field and the following rupture of the wires due to fatigue. That is why the understanding and prediction of the fretting wear phenomena of thin wires is fundamental in order to improve the performance of steel wire ropes. The present research deals with the design of an ad-hoc fretting wear test machine for thin wires. The test apparatus is designed for testing thin wires with a maximum diameter of 1.0 mm, at slip amplitudes ranging from 5 to 300 μm, crossing angle between 0-90°, and contacting force ranging from 0,5 to 5 N. The working principle of displacement amplitude and contacting force as well as the crossing angle between the wires are described. Preliminary studies for understanding the fretting wear characteristics are presented, analysing 0.45 mm diameter cold-drawn eutectoid carbon steel (0.8% C wires (tensile strength higher than 3000 MPa.

  4. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  5. Correctness-by-construction and post-hoc verification : a marriage of convenience?

    NARCIS (Netherlands)

    Watson, B.W.; Kourie, D.G.; Schaefer, I.; Cleophas, L.G.W.A.; Margaria, T.; Steffen, B.

    2016-01-01

    Correctness-by-construction (CbC), traditionally based on weakest precondition semantics, and post-hoc verification (PhV) aspire to ensure functional correctness. We argue for a lightweight approach to CbC where lack of formal rigour increases productivity. In order to mitigate the risk of

  6. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  7. Position-Based Packet Forwarding for Vehicular Ad-Hoc Networks

    OpenAIRE

    Füßler, Holger

    2007-01-01

    Mobile Ad-Hoc Networks, or MANETs, are data communication networks between (potentially) mobile computer systems equipped with wireless communication devices and — in their purest form — in complete absence of communication infrastructure. Usage scenarios for these systems include communication during disaster recovery or battlefield communications. One of the great research challenges concerning MANETs is the Packet Forwarding Problem, i.e., the question to which neighbor node a data packet ...

  8. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    Science.gov (United States)

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  9. Report of the evaluation by the Ad Hoc Review Committee on Materials Science Research. Ex-post evaluation in fiscal year 2003

    International Nuclear Information System (INIS)

    2004-06-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Materials Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D results achieved for five years until Fiscal Year 2002 at Department of Materials Science in Tokai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from October 2003 to February 2004. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on November 14, 2003, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 8, 2004. This report describes the result of the evaluation by the Ad Hoc Review Committee on Materials Science Research. (author)

  10. Report of the evaluation by the Ad Hoc Review Committee on Computational Science and Engineering. Result evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Computational Science and Engineering in accordance with the 'Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Center for Promotion of Computational Science and Engineering of JAERI. The Ad Hoc Review Committee consisted of seven specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from December 2000 to March 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on December 27, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Computational Science and Engineering. (author)

  11. Further Development of Synchronous Array Method for Ad Hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yingbo Hua

    2008-09-01

    Full Text Available A further development of the synchronous array method (SAM as a medium access control scheme for large-scale ad hoc wireless networks is presented. Under SAM, all transmissions of data packets between adjacent nodes are synchronized on a frame-by-frame basis, and the spacing between concurrent cochannel transmissions of data packets is properly controlled. An opportunistic SAM (O-SAM is presented which allows concurrent cochannel transmissions to be locally adaptive to channel gain variations. A distributed SAM (D-SAM is discussed that schedules all concurrent cochannel transmissions in a distributed fashion. For networks of low mobility, the control overhead required by SAM can be made much smaller than the payload. By analysis and simulation, the intranetwork throughput of O-SAM and D-SAM is evaluated. The effects of traffic load and multiple antennas on the intranetwork throughput are studied. The throughput of ALOHA is also analyzed and compared with that of O-SAM and D-SAM. By a distance-weighted throughput, a comparison of long distance transmission versus short distance transmission is also presented. The study of D-SAM reveals an important insight into the MSH-DSCH protocol adopted in IEEE 802.16 standards.

  12. An Ad-Hoc Opportunistic Dissemination Protocol for Smartphone-based Participatory Traffic Monitoring

    NARCIS (Netherlands)

    Türkes, Okan; Seraj, Fatjon; Scholten, Johan; Meratnia, Nirvana; Havinga, Paul J.M.

    2015-01-01

    This study introduces an ad-hoc opportunistic data dissemination protocol, called VADISS, that facilitates participatory traffic monitoring applications with smartphones. As a ubiquitous alternative to existing vehicular networking methods, VADISS uses the default WiFi interfaces universally adopted

  13. Onset of efficacy and tolerability following the initiation dosing of long-acting paliperidone palmitate: post-hoc analyses of a randomized, double-blind clinical trial

    Directory of Open Access Journals (Sweden)

    Fu Dong-Jing

    2011-05-01

    Full Text Available Abstract Background Paliperidone palmitate is a long-acting injectable atypical antipsychotic for the acute and maintenance treatment of adults with schizophrenia. The recommended initiation dosing regimen is 234 mg on Day 1 and 156 mg on Day 8 via intramuscular (deltoid injection; followed by 39 to 234 mg once-monthly thereafter (deltoid or gluteal. These post-hoc analyses addressed two commonly encountered clinical issues regarding the initiation dosing: the time to onset of efficacy and the associated tolerability. Methods In a 13-week double-blind trial, 652 subjects with schizophrenia were randomized to paliperidone palmitate 39, 156, or 234 mg (corresponding to 25, 100, or 150 mg equivalents of paliperidone, respectively or placebo (NCT#00590577. Subjects randomized to paliperidone palmitate received 234 mg on Day 1, followed by their randomized fixed dose on Day 8, and monthly thereafter, with no oral antipsychotic supplementation. The onset of efficacy was defined as the first timepoint where the paliperidone palmitate group showed significant improvement in the Positive and Negative Syndrome Scale (PANSS score compared to placebo (Analysis of Covariance [ANCOVA] models and Last Observation Carried Forward [LOCF] methodology without adjusting for multiplicity using data from the Days 4, 8, 22, and 36 assessments. Adverse event (AE rates and relative risks (RR with 95% confidence intervals (CI versus placebo were determined. Results Paliperidone palmitate 234 mg on Day 1 was associated with greater improvement than placebo on Least Squares (LS mean PANSS total score at Day 8 (p = 0.037. After the Day 8 injection of 156 mg, there was continued PANSS improvement at Day 22 (p ≤ 0.007 vs. placebo and Day 36 (p Conclusions Significantly greater symptom improvement was observed by Day 8 with paliperidone palmitate (234 mg on Day 1 compared to placebo; this effect was maintained after the 156 mg Day 8 injection, with a trend towards a dose

  14. Report of the evaluation by the Ad Hoc Review Committee on Nuclear Safety Research. Result evaluation in fiscal year 2000

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Nuclear Safety Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Department of Reactor Safety Research, Department of Fuel Cycle Safety Research, Department of Environmental Safety Research and Department of Safety Research Technical Support in Tokai Research Establishment at JAERI. The Ad Hoc Review Committee consisted of 11 specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from December 2000 to February 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on December 11, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Nuclear Safety Research. (author)

  15. Conflict Management in "Ad Hoc" Problem-Solving Groups: A Preliminary Investigation.

    Science.gov (United States)

    Wallace, Les; Baxter, Leslie

    Full study of small group communication must include consideration of task and socio-emotional dimensions, especially in relation to group problem solving. Thirty small groups were tested for their reactions in various "ad hoc" conflict resolution situations. Instructions to the groups were (1) no problem-solving instructions (control),…

  16. A multi-protocol framework for ad-hoc service discovery

    OpenAIRE

    Flores-Cortes, C.; Blair, Gordon S.; Grace, P.

    2006-01-01

    Discovering the appropriate services in ad-hoc computing environments where a great number of devices and software components collaborate discreetly and provide numerous services is an important challenge. Service discovery protocols make it possible for participating nodes in a network to locate and advertise services with minimum user intervention. However, because it is not possible to predict at design time which protocols will be used to advertise services in a given context/environment,...

  17. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  18. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  19. Integrated analyses resolve conflicts over squamate reptile phylogeny and reveal unexpected placements for fossil taxa.

    Directory of Open Access Journals (Sweden)

    Tod W Reeder

    Full Text Available Squamate reptiles (lizards and snakes are a pivotal group whose relationships have become increasingly controversial. Squamates include >9000 species, making them the second largest group of terrestrial vertebrates. They are important medicinally and as model systems for ecological and evolutionary research. However, studies of squamate biology are hindered by uncertainty over their relationships, and some consider squamate phylogeny unresolved, given recent conflicts between molecular and morphological results. To resolve these conflicts, we expand existing morphological and molecular datasets for squamates (691 morphological characters and 46 genes, for 161 living and 49 fossil taxa, including a new set of 81 morphological characters and adding two genes from published studies and perform integrated analyses. Our results resolve higher-level relationships as indicated by molecular analyses, and reveal hidden morphological support for the molecular hypothesis (but not vice-versa. Furthermore, we find that integrating molecular, morphological, and paleontological data leads to surprising placements for two major fossil clades (Mosasauria and Polyglyphanodontia. These results further demonstrate the importance of combining fossil and molecular information, and the potential problems of estimating the placement of fossil taxa from morphological data alone. Thus, our results caution against estimating fossil relationships without considering relevant molecular data, and against placing fossils into molecular trees (e.g. for dating analyses without considering the possible impact of molecular data on their placement.

  20. Integrated analyses resolve conflicts over squamate reptile phylogeny and reveal unexpected placements for fossil taxa.

    Science.gov (United States)

    Reeder, Tod W; Townsend, Ted M; Mulcahy, Daniel G; Noonan, Brice P; Wood, Perry L; Sites, Jack W; Wiens, John J

    2015-01-01

    Squamate reptiles (lizards and snakes) are a pivotal group whose relationships have become increasingly controversial. Squamates include >9000 species, making them the second largest group of terrestrial vertebrates. They are important medicinally and as model systems for ecological and evolutionary research. However, studies of squamate biology are hindered by uncertainty over their relationships, and some consider squamate phylogeny unresolved, given recent conflicts between molecular and morphological results. To resolve these conflicts, we expand existing morphological and molecular datasets for squamates (691 morphological characters and 46 genes, for 161 living and 49 fossil taxa, including a new set of 81 morphological characters and adding two genes from published studies) and perform integrated analyses. Our results resolve higher-level relationships as indicated by molecular analyses, and reveal hidden morphological support for the molecular hypothesis (but not vice-versa). Furthermore, we find that integrating molecular, morphological, and paleontological data leads to surprising placements for two major fossil clades (Mosasauria and Polyglyphanodontia). These results further demonstrate the importance of combining fossil and molecular information, and the potential problems of estimating the placement of fossil taxa from morphological data alone. Thus, our results caution against estimating fossil relationships without considering relevant molecular data, and against placing fossils into molecular trees (e.g. for dating analyses) without considering the possible impact of molecular data on their placement.

  1. Integrated Analyses Resolve Conflicts over Squamate Reptile Phylogeny and Reveal Unexpected Placements for Fossil Taxa

    Science.gov (United States)

    Reeder, Tod W.; Townsend, Ted M.; Mulcahy, Daniel G.; Noonan, Brice P.; Wood, Perry L.; Sites, Jack W.; Wiens, John J.

    2015-01-01

    Squamate reptiles (lizards and snakes) are a pivotal group whose relationships have become increasingly controversial. Squamates include >9000 species, making them the second largest group of terrestrial vertebrates. They are important medicinally and as model systems for ecological and evolutionary research. However, studies of squamate biology are hindered by uncertainty over their relationships, and some consider squamate phylogeny unresolved, given recent conflicts between molecular and morphological results. To resolve these conflicts, we expand existing morphological and molecular datasets for squamates (691 morphological characters and 46 genes, for 161 living and 49 fossil taxa, including a new set of 81 morphological characters and adding two genes from published studies) and perform integrated analyses. Our results resolve higher-level relationships as indicated by molecular analyses, and reveal hidden morphological support for the molecular hypothesis (but not vice-versa). Furthermore, we find that integrating molecular, morphological, and paleontological data leads to surprising placements for two major fossil clades (Mosasauria and Polyglyphanodontia). These results further demonstrate the importance of combining fossil and molecular information, and the potential problems of estimating the placement of fossil taxa from morphological data alone. Thus, our results caution against estimating fossil relationships without considering relevant molecular data, and against placing fossils into molecular trees (e.g. for dating analyses) without considering the possible impact of molecular data on their placement. PMID:25803280

  2. Post hoc analyses of the impact of previous medication on the efficacy of lisdexamfetamine dimesylate in the treatment of attention-deficit/hyperactivity disorder in a randomized, controlled trial

    Directory of Open Access Journals (Sweden)

    Coghill DR

    2014-10-01

    =317; LDX, -18.6 [-21.5, -15.7]; OROS- MPH, -13.0 [-15.9, -10.2] and treatment-naïve individuals (n=147; LDX, -15.1 [-19.4, -10.9]; OROS-MPH, -12.7 [-16.8, -8.5] or patients previously treated with any ADHD medication (n=170; LDX, -21.5 [-25.5, -17.6]; OROS-MPH, -14.2 [-18.1, -10.3]. In addition, similar proportions of patients receiving active treatment were categorized as improved based on CGI-I score (CGI-I of 1 or 2 in the overall study population and among treatment-naïve individuals or patients previously treated with any ADHD medication. Conclusion: In these post hoc analyses, the response to LDX treatment, and to the reference treatment OROS-MPH, was similar to that observed for the overall study population in subgroups of patients categorized according to whether or not they had previously received ADHD medication. Keywords: attention-deficit/hyperactivity disorder, lisdexamfetamine dimesylate, methylphenidate, central nervous system stimulants

  3. A Cross Layer Solution to Address TCP Intra-flow Performance Degradation in Multihop Ad hoc Networks

    OpenAIRE

    Rakocevic, V.; Hamadani, E.

    2008-01-01

    Incorporating the concept of TCP end-to-end congestion control for wireless networks is one of the primary concerns in designing ad hoc networks since TCP was primarily designed and optimized based on the assumptions for wired networks. In this study, our interest lies on tackling the TCP instability and in particular intra-flow instability problem since due to the nature of applications in multihop ad hoc networks, connection instability or starvation even for a short period of time can have...

  4. Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks

    National Research Council Canada - National Science Library

    Jetcheva, Jorjeta G

    2004-01-01

    ...) nodes that wish to communicate. Each node in the ad hoc network acts as a router and forwards packets on behalf of other nodes, allowing nodes that are not within wireless range of each other to communicate over multi-hop paths...

  5. Report of the evaluation by the Ad Hoc Review Committee on Materials Science Research. In-advance evaluation in fiscal year 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Materials Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs to be implemented for five years starting in Fiscal Year 2003 at Department of Materials Science in Tokai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from April 2002 to August 2002. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 5th, 2002, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on August 5th, 2002. This report describes the result of the evaluation by the Ad Hoc Review Committee on Materials Science Research. (author)

  6. Report of the evaluation by the Ad Hoc Review Committee on Materials Science Research. In-advance evaluation in fiscal year 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Materials Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs to be implemented for five years starting in Fiscal Year 2003 at Department of Materials Science in Tokai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from April 2002 to August 2002. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 5th, 2002, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on August 5th, 2002. This report describes the result of the evaluation by the Ad Hoc Review Committee on Materials Science Research. (author)

  7. Report of the evaluation by the ad hoc review committee on radiation application research. In-advance evaluation in fiscal year 2001

    International Nuclear Information System (INIS)

    2001-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Radiation Application Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs to be implemented for five years starting in Fiscal Year 2002 at Department of Material Development, at Department of Ion-Beam-Applied Biology and at Advanced Radiation Technology Center in Takasaki Radiation Chemistry Research Establishment of JAERI. The Ad Hoc Review Committee consisted of ten specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from May to July 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 25, 2001, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on July 12, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Radiation Application Research. (author)

  8. Sistem Verifikasi Tanda Tangan Off-Line Berdasar Ciri Histogram Of Oriented Gradient (HOG Dan Histogram Of Curvature (HoC

    Directory of Open Access Journals (Sweden)

    Agus Wahyu Widodo

    2015-08-01

    Full Text Available Abstrak Tanda tangan dengan sifat uniknya merupakan salah satu dari sekian banyak atribut personal yang diterima secara luas untuk verifikasi indentitas seseorang, alat pembuktian kepemilikan berbagai transaksi atau dokumen di dalam masyarakat. Keberhasilan penggunaan ciri gradien dan curvature dalam bidang-bidang penelitian pengenalan pola dan bahwa tanda tangan dapat dikatakan merupakan hasil tulisan tangan yang tersusun atas beragam garis dan lengkungan (curve yang memiliki arah atau orientasi merupakan alasan bahwa kedua ciri tersebut digunakan sebagai metoda verifikasi tanda tangan offline di penelitian ini. Berbagai implementasi dari pre-processing, ekstraksi dan representasi ciri, dan pembelajaran SVM serta usaha perbaikan yang telah dilakukan dalam penelitian ini menunjukkan hasil bahwa ciri HOG dan HoC mampu dimanfaatkan dalam proses verifikasi tanda tangan secara offline.  Pada basis data GPDS960Signature, HOG dan HoC yang dihitung pada ukuran sel 30 x 30 piksel memberikan dengan nilai %FRR terbaik 26,90 dan %FAR 37,56.  Sedangkan pada basis data FUM-PHSDB, HOG dn HoC yang dihitung pada ukuran 60 x 60 piksel memberikan nilai %FRR terbaik 4 dan %FAR 57. Kata kunci: verifikasi tanda tangan, curvature, orientation, gradient, histogram of curvature (HoC, histogram of oriented gradient (HOG Abstract Signature with unique properties is one of the many personal attributes that are widely accepted to verify a person's identity, proof of ownership transactions instrument or document in the community. The successful use of gradient and curvature feature in the research fields of pattern recognition is the reason that both of these features are used as an offline signature verification method in this study. Various implementations of preprocessing, feature extraction and representation, and SVM learning has been done in the study showed results that HOG and HoC feature can be utilized in the process of offline signature verification.  HOG and

  9. Ad-hoc Content-based Queries and Data Analysis for Virtual Observatories, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Aquilent, Inc. proposes to support ad-hoc, content-based query and data retrieval from virtual observatories (VxO) by developing 1) Higher Order Query Services that...

  10. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  11. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  12. Design of free patterns of nanocrystals with ad hoc features via templated dewetting

    Energy Technology Data Exchange (ETDEWEB)

    Aouassa, M.; Berbezier, I.; Favre, L.; Ronda, A. [IM2NP, CNRS, AMU, Marseille (France); Bollani, M.; Sordan, R. [LNES, Como (Italy); Delobbe, A.; Sudraud, P. [Orsay Physics, Fuveau (France)

    2012-07-02

    Design of monodisperse ultra-small nanocrystals (NCs) into large scale patterns with ad hoc features is demonstrated. The process makes use of solid state dewetting of a thin film templated through alloy liquid metal ion source focused ion beam (LMIS-FIB) nanopatterning. The solid state dewetting initiated at the edges of the patterns controllably creates the ordering of NCs with ad hoc placement and periodicity. The NC size is tuned by varying the nominal thickness of the film while their position results from the association of film retraction from the edges of the lay out and Rayleigh-like instability. The use of ultra-high resolution LMIS-FIB enables to produce monocrystalline NCs with size, periodicity, and placement tunable as well. It provides routes for the free design of nanostructures for generic applications in nanoelectronics.

  13. The impact of brief team communication, leadership and team behavior training on ad hoc team performance in trauma care settings.

    Science.gov (United States)

    Roberts, Nicole K; Williams, Reed G; Schwind, Cathy J; Sutyak, John A; McDowell, Christopher; Griffen, David; Wall, Jarrod; Sanfey, Hilary; Chestnut, Audra; Meier, Andreas H; Wohltmann, Christopher; Clark, Ted R; Wetter, Nathan

    2014-02-01

    Communication breakdowns and care coordination problems often cause preventable adverse patient care events, which can be especially acute in the trauma setting, in which ad hoc teams have little time for advanced planning. Existing teamwork curricula do not address the particular issues associated with ad hoc emergency teams providing trauma care. Ad hoc trauma teams completed a preinstruction simulated trauma encounter and were provided with instruction on appropriate team behaviors and team communication. Teams completed a postinstruction simulated trauma encounter immediately afterward and 3 weeks later, then completed a questionnaire. Blinded raters rated videotapes of the simulations. Participants expressed high levels of satisfaction and intent to change practice after the intervention. Participants changed teamwork and communication behavior on the posttest, and changes were sustained after a 3-week interval, though there was some loss of retention. Brief training exercises can change teamwork and communication behaviors on ad hoc trauma teams. Copyright © 2014 Elsevier Inc. All rights reserved.

  14. Report of the Ad Hoc Committee on SSC physics

    International Nuclear Information System (INIS)

    1990-04-01

    The Ad Hoc Committee on SSC Physics has reexamined the relationship between beam energy, machine luminosity, and physics capability. In the next section, the physics motivation for the SSC is reviewed in general terms. This is followed by a discussion of the ability to detect a number of specific processes as a function of the SSC energy and luminosity. The viability of various detector technologies is then assessed as a function of luminosity. The report ends with a brief summary and some conclusions

  15. Report of the evaluation by the Ad Hoc Review Committee on High-Temperature Engineering and Research. Result evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on High-Temperature Engineering and Research in accordance with the 'Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Department of HTTR Project and Department of Advanced Nuclear Heat Technology in Oarai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of nine specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from December 2000 to February 2001. The evaluation was performed on the basis of the materials submitted in advanced and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on December 8, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on High-Temperature Engineering and Research. (author)

  16. Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities

    NARCIS (Netherlands)

    Sloep, Peter; Kester, Liesbeth; Brouns, Francis; Van Rosmalen, Peter; De Vries, Fred; De Croock, Marcel; Koper, Rob

    2007-01-01

    Sloep, P.B., Kester, L., Brouns, F., Van Rosmalen, P., De Vries, F., De Croock, M., Koper, R. (2007). Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities. Presentation given at the Sixth IASTED International Conference on Web-based Education, 14-16 March,

  17. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  18. Traffic Agents for Improving QoS in Mixed Infrastructure and Ad Hoc Modes Wireless LAN

    Directory of Open Access Journals (Sweden)

    Yuan Hai-Feng

    2006-01-01

    Full Text Available As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN, which can offer high data-rate wireless multimedia services to the mobile stations (MSs in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light.

  19. On knowledge transfer management as a learning process for ad hoc teams

    Science.gov (United States)

    Iliescu, D.

    2017-08-01

    Knowledge management represents an emerging domain becoming more and more important. Concepts like knowledge codification and personalisation, knowledge life-cycle, social and technological dimensions, knowledge transfer and learning management are integral parts. Focus goes here in the process of knowledge transfer for the case of ad hoc teams. The social dimension of knowledge transfer plays an important role. No single individual actors involved in the process, but a collective one, representing the organisation. It is critically important for knowledge to be managed from the life-cycle point of view. A complex communication network needs to be in place to supports the process of knowledge transfer. Two particular concepts, the bridge tie and transactive memory, would eventually enhance the communication. The paper focuses on an informational communication platform supporting the collaborative work on knowledge transfer. The platform facilitates the creation of a topic language to be used in knowledge modelling, storage and reuse, by the ad hoc teams.

  20. Comparative proteomic analyses reveal that FlbA down-regulates gliT expression and SOD activity in Aspergillus fumigatus.

    Science.gov (United States)

    Shin, Kwang-Soo; Park, Hee-Soo; Kim, Young-Hwan; Yu, Jae-Hyuk

    2013-07-11

    FlbA is a regulator of G-protein signaling protein that plays a central role in attenuating heterotrimeric G-protein mediated vegetative growth signaling in Aspergillus. The deletion of flbA (∆flbA) in the opportunistic human pathogen Aspergillus fumigatus results in accelerated cell death and autolysis in submerged culture. To further investigate the effects of ∆flbA on intracellular protein levels we carried out 2-D proteome analyses of 2-day old submerged cultures of ∆flbA and wild type (WT) strains and observed 160 differentially expressed proteins. Via nano-LC-ESI-MS/MS analyses, we revealed the identity of 10 and 2 proteins exhibiting high and low level accumulation, respectively, in ∆flbA strain. Notably, the GliT protein is accumulated at about 1800-fold higher levels in ∆flbA than WT. Moreover, GliT is secreted at high levels from ∆flbA strain, whereas Sod1 (superoxide dismutase) is secreted at a higher level in WT. Northern blot analyses reveal that ∆flbA results in elevated accumulation of gliT mRNA. Consequently, ∆flbA strain exhibits enhanced tolerance to gliotoxin toxicity. Finally, ∆flbA strain displayed enhanced SOD activity and elevated resistance to menadione and paraquat. In summary, FlbA-mediated signaling control negatively affects cellular responses associated with detoxification of reactive oxygen species and of exogenous gliotoxin in A. fumigatus. Regulator of G protein Signaling (RGS) proteins play crucial roles in fundamental biological processes in filamentous fungi. FlbA is the first studied filamentous fungal RGS protein, yet much remains to be understood about its roles in the opportunistic human pathogen Aspergillus fumigatus. In the present study, we examined the effects of the deletion of flbA using comprehensive analyses of the intra- and extracellular proteomes of A. fumigatus wild type and the flbA deletion mutant. Via MS analyses, we identified 10 proteins exhibiting high level accumulation in the flbA deletion

  1. Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities

    NARCIS (Netherlands)

    Sloep, Peter; Kester, Liesbeth; Brouns, Francis; Van Rosmalen, Peter; De Vries, Fred; De Croock, Marcel; Koper, Rob

    2007-01-01

    Sloep, P.B., Kester, L. Brouns, F., Van Rosmalen, P., De Vries, F., De Croock, M., Koper, R. (2007) Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities. In V. Uskov (Ed.) The Sixth IASTED International Conference on Web-based Education WBE 2007, March 14-16,

  2. A tandem queueing model for delay analysis in disconnected ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; de Haan, Roland; Boucherie, Richardus J.; van Ommeren, Jan C.W.

    2007-01-01

    Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called opportunistic networking which exploits the mobility of the nodes by letting them operate as relays according to the

  3. Model-based prototyping of an interoperability protocol for mobile ad-hoc networks

    NARCIS (Netherlands)

    Kristensen, L.M.; Westergaard, M.; Norgaard, P.C.; Romijn, J.; Smith, G.; Pol, van de J.

    2005-01-01

    We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for the specification of an interoperability protocol for routing packets between fixed core networks and mobile ad-hoc networks. The

  4. Energy-aware architecture for multi-rate ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Yahya

    2010-06-01

    Full Text Available The backbone of ad hoc network design is energy performance and bandwidth resources limitations. Multi-rate adaptation architectures have been proposed to reduce the control overhead and to increase bandwidth utilization efficiency. In this paper, we propose a multi-rate protocol to provide the highest network performance under very low control overhead. The efficiency of the proposed auto multi-rate protocol is validated extensive simulations using QualNet network simulator. The simulation results demonstrate that our solution significantly improves the overall network performance.

  5. Adjusting Sensing Range to Maximize Throughput on Ad-Hoc Multi-Hop Wireless Networks

    National Research Council Canada - National Science Library

    Roberts, Christopher

    2003-01-01

    .... Such a network is referred to as a multi-hop ad-hoc network, or simply a multi-hop network. Most multi-hop network protocols use some form of carrier sensing to determine if the wireless channel is in use...

  6. Energy-Aware Broadcasting and Multicasting in Wireless Ad Hoc Networks: A Cross-Layering Approach

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2004-01-01

    ...) problems, especially when energy-aware operation is required. To address the specific problem of energy-aware tree construction in wireless ad hoc networks, we have developed the Broadcast Incremental Power (BIP...

  7. Functional assays and metagenomic analyses reveals differences between the microbial communities inhabiting the soil horizons of a Norway spruce plantation.

    Directory of Open Access Journals (Sweden)

    Stéphane Uroz

    Full Text Available In temperate ecosystems, acidic forest soils are among the most nutrient-poor terrestrial environments. In this context, the long-term differentiation of the forest soils into horizons may impact the assembly and the functions of the soil microbial communities. To gain a more comprehensive understanding of the ecology and functional potentials of these microbial communities, a suite of analyses including comparative metagenomics was applied on independent soil samples from a spruce plantation (Breuil-Chenue, France. The objectives were to assess whether the decreasing nutrient bioavailability and pH variations that naturally occurs between the organic and mineral horizons affects the soil microbial functional biodiversity. The 14 Gbp of pyrosequencing and Illumina sequences generated in this study revealed complex microbial communities dominated by bacteria. Detailed analyses showed that the organic soil horizon was significantly enriched in sequences related to Bacteria, Chordata, Arthropoda and Ascomycota. On the contrary the mineral horizon was significantly enriched in sequences related to Archaea. Our analyses also highlighted that the microbial communities inhabiting the two soil horizons differed significantly in their functional potentials according to functional assays and MG-RAST analyses, suggesting a functional specialisation of these microbial communities. Consistent with this specialisation, our shotgun metagenomic approach revealed a significant increase in the relative abundance of sequences related glycoside hydrolases in the organic horizon compared to the mineral horizon that was significantly enriched in glycoside transferases. This functional stratification according to the soil horizon was also confirmed by a significant correlation between the functional assays performed in this study and the functional metagenomic analyses. Together, our results suggest that the soil stratification and particularly the soil resource

  8. Built-In Device Orientation Sensors for Ad-Hoc Pairing and Spatial Awareness

    DEFF Research Database (Denmark)

    Grønbæk, Jens Emil; O'Hara, Kenton

    Mobile devices are equipped with multiple sensors. The ubiquity of these sensors is key in their ability to support in-the-wild application and use. Building on the ubiquity we look at how we can use this existing sensing infrastructure combined with user mediation to support ad-hoc sharing with ...

  9. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  10. Improving the Usability of OCL as an Ad-hoc Model Querying Language

    DEFF Research Database (Denmark)

    Störrle, Harald

    2013-01-01

    from our research and make it accessible to the OCL community, we propose the OCL Query API (OQAPI), a library of query-predicates to improve the user-friendliness of OCL for ad-hoc querying. The usability of OQAPI is studied using controlled experiments. We nd considerable evidence to support our...

  11. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  12. RAILWAY INFRASTRUCTURE CAPACITY MANAGEMENT FOR AD-HOC TRAINS ON THE SŽDC NETWORK

    Directory of Open Access Journals (Sweden)

    Petr Nachtigall

    2016-09-01

    Full Text Available The paper describes basic principles of ad-hoc routes assignment. Each carrier has its own interface called information system KADR with SŽDC for capacity requests management. The paper describes all steps which must be done before train departure.

  13. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Directory of Open Access Journals (Sweden)

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  14. Selective epidemic broadcast algorithm to suppress broadcast storm in vehicular ad hoc networks

    Directory of Open Access Journals (Sweden)

    M. Chitra

    2018-03-01

    Full Text Available Broadcasting in Vehicular Ad Hoc Networks is the best way to spread emergency messages all over the network. With the dynamic nature of vehicular ad hoc networks, simple broadcast or flooding faces the problem called as Broadcast Storm Problem (BSP. The issue of the BSP will degrade the performance of a message broadcasting process like increased overhead, collision and dissemination delay. The paper is motivated to solve the problems in the existing Broadcast Strom Suppression Algorithms (BSSAs like p-Persistence, TLO, VSPB, G-SAB and SIR. This paper proposes to suppress the Broadcast Storm Problem and to improve the Emergency Safety message dissemination rate through a new BSSA based on Selective Epidemic Broadcast Algorithm (SEB. The simulation results clearly show that the SEB outperforms the existing algorithms in terms of ESM Delivery Ratio, Message Overhead, Collision Ratio, Broadcast Storm Ratio and Redundant Rebroadcast Ratio with decreased Dissemination Delay.

  15. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  16. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  17. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Science.gov (United States)

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  18. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Xin Yang

    Full Text Available Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  19. A game-theoretic approach to optimize ad hoc networks inspired by small-world network topology

    Science.gov (United States)

    Tan, Mian; Yang, Tinghong; Chen, Xing; Yang, Gang; Zhu, Guoqing; Holme, Petter; Zhao, Jing

    2018-03-01

    Nodes in ad hoc networks are connected in a self-organized manner. Limited communication radius makes information transmit in multi-hop mode, and each forwarding needs to consume the energy of nodes. Insufficient communication radius or exhaustion of energy may cause the absence of some relay nodes and links, further breaking network connectivity. On the other hand, nodes in the network may refuse to cooperate due to objective faulty or personal selfish, hindering regular communication in the network. This paper proposes a model called Repeated Game in Small World Networks (RGSWN). In this model, we first construct ad hoc networks with small-world feature by forming "communication shortcuts" between multiple-radio nodes. Small characteristic path length reduces average forwarding times in networks; meanwhile high clustering coefficient enhances network robustness. Such networks still maintain relative low global power consumption, which is beneficial to extend the network survival time. Then we use MTTFT strategy (Mend-Tolerance Tit-for-Tat) for repeated game as a rule for the interactions between neighbors in the small-world networks. Compared with other five strategies of repeated game, this strategy not only punishes the nodes' selfishness more reasonably, but also has the best tolerance to the network failure. This work is insightful for designing an efficient and robust ad hoc network.

  20. Accurate 3D Localization Method for Public Safety Applications in Vehicular Ad-hoc Networks

    KAUST Repository

    Ansari, Abdul Rahim; Saeed, Nasir; Haq, Mian Imtiaz Ul; Cho, Sunghyun

    2018-01-01

    Vehicular ad hoc networks (VANETs) represent a very promising research area because of their ever increasing demand, especially for public safety applications. In VANETs vehicles communicate with each other to exchange road maps and traffic

  1. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model....... The predictive accuracy of the model is monitored and used to update the model dynamically. The results indicate the framework may be useful for the optimization of dynamic systems of high dimension....

  2. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    Science.gov (United States)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  3. Molecular analyses reveal high species diversity of trematodes in a sub-Arctic lake

    Science.gov (United States)

    Soldánová, Miroslava; Georgieva, Simona; Roháčováa, Jana; Knudsen, Rune; Kuhn, Jesper A.; Henriksen, Eirik H.; Siwertsson, Anna; Shaw, Jenny C.; Kuris, Armand M.; Amundsen, Per-Arne; Scholz, Tomáš; Lafferty, Kevin D.; Kostadinova, Aneta

    2017-01-01

    To identify trematode diversity and life-cycles in the sub-Arctic Lake Takvatn, Norway, we characterised 120 trematode isolates from mollusc first intermediate hosts, metacercariae from second intermediate host fishes and invertebrates, and adults from fish and invertebrate definitive hosts, using molecular techniques. Phylogenies based on nuclear and/or mtDNA revealed high species richness (24 species or species-level genetic lineages), and uncovered trematode diversity (16 putative new species) from five families typical in lake ecosystems (Allocreadiidae, Diplostomidae, Plagiorchiidae, Schistosomatidae and Strigeidae). Sampling potential invertebrate hosts allowed matching of sequence data for different stages, thus achieving molecular elucidation of trematode life-cycles and exploration of host-parasite interactions. Phylogenetic analyses also helped identify three major mollusc intermediate hosts (Radix balthica, Pisidium casertanum and Sphaerium sp.) in the lake. Our findings increase the known trematode diversity at the sub-Arctic Lake Takvatn, showing that digenean diversity is high in this otherwise depauperate sub-Arctic freshwater ecosystem, and indicating that sub-Arctic and Arctic ecosystems may be characterised by unique trematode assemblages.

  4. Performance analysis of differentiated resource-sharing in a wireless ad-hoc network

    NARCIS (Netherlands)

    Roijers, F.; van den Berg, H.; Mandjes, M.

    2010-01-01

    In this paper we model and analyze a relay node in a wireless ad-hoc network; the capacity available at this node is used to both transmit traffic from the source nodes (towards the relay node), and to serve traffic at the relay node (so that it can be forwarded to successor nodes). Clearly, a

  5. Fault Tolerant Mechanism for Multimedia Flows in Wireless Ad Hoc Networks Based on Fast Switching Paths

    Directory of Open Access Journals (Sweden)

    Juan R. Diaz

    2014-01-01

    Full Text Available Multimedia traffic can be forwarded through a wireless ad hoc network using the available resources of the nodes. Several models and protocols have been designed in order to organize and arrange the nodes to improve transmissions along the network. We use a cluster-based framework, called MWAHCA architecture, which optimizes multimedia transmissions over a wireless ad hoc network. It was proposed by us in a previous research work. This architecture is focused on decreasing quality of service (QoS parameters like latency, jitter, and packet loss, but other network features were not developed, like load balance or fault tolerance. In this paper, we propose a new fault tolerance mechanism, using as a base the MWAHCA architecture, in order to recover any multimedia flow crossing the wireless ad hoc network when there is a node failure. The algorithm can run independently for each multimedia flow. The main objective is to keep the QoS parameters as low as possible. To achieve this goal, the convergence time must be controlled and reduced. This paper provides the designed protocol, the analytical model of the algorithm, and a software application developed to test its performance in a real laboratory.

  6. Report of the independent Ad Hoc Group for the Davis-Besse incident

    International Nuclear Information System (INIS)

    1986-06-01

    The Nuclear Regulatory Commission established an independent Ad Hoc Group in January 1986 to review issues subsequent to a complete loss of feedwater event at Davis-Besse Nuclear Power Station on June 9, 1985, including the NRC Incident Investigation Team (IIT) investigation of that event. The Commission asked the Group to identify additional lessons that might be learned and from these to make recommendations to improve NRC oversight of reactor licensees. To fulfill its charter, the Ad Hoc Group examined the following: (1) pre-event interactions between the licensee and NRC concerning reliability of the auxiliary feedwater system and associated systems; (2) pre-event probabilistic assessments of the reliability of plant safety systems, NRC's review of them, and their use in regulatory decisionmaking; (3) licensee management, operation and maintenance programs as they may have contributed to equipment failures and NRC oversight of such programs; and (4) the mandate, capabilities of members, operation, and results of the NRC Davis-Besse IIT, and the use to which its report was put by the regulatory staff

  7. Genetic Diversity among Rhizobium leguminosarum bv. Trifolii Strains Revealed by Allozyme and Restriction Fragment Length Polymorphism Analyses

    Science.gov (United States)

    Demezas, David H.; Reardon, Terry B.; Watson, John M.; Gibson, Alan H.

    1991-01-01

    Allozyme electrophoresis and restriction fragment length polymorphism (RFLP) analyses were used to examine the genetic diversity of a collection of 18 Rhizobium leguminosarum bv. trifolii, 1 R. leguminosarum bv. viciae, and 2 R. meliloti strains. Allozyme analysis at 28 loci revealed 16 electrophoretic types. The mean genetic distance between electrophoretic types of R. leguminosarum and R. meliloti was 0.83. Within R. leguminosarum, the single strain of bv. viciae differed at an average of 0.65 from strains of bv. trifolii, while electrophoretic types of bv. trifolii differed at a range of 0.23 to 0.62. Analysis of RFLPs around two chromosomal DNA probes also delineated 16 unique RFLP patterns and yielded genetic diversity similar to that revealed by the allozyme data. Analysis of RFLPs around three Sym (symbiotic) plasmid-derived probes demonstrated that the Sym plasmids reflect genetic divergence similar to that of their bacterial hosts. The large genetic distances between many strains precluded reliable estimates of their genetic relationships. PMID:16348600

  8. Dose-related beneficial and harmful effects of gabapentin in postoperative pain management – post hoc analyses from a systematic review with meta-analyses and trial sequential analyses

    Directory of Open Access Journals (Sweden)

    Fabritius ML

    2017-11-01

    Full Text Available Maria Louise Fabritius,1 Jørn Wetterslev,2 Ole Mathiesen,3 Jørgen B Dahl1 1Department of Anaesthesiology and Intensive Care, Bispebjerg and Frederiksberg Hospitals, Copenhagen, Denmark; 2Copenhagen Trial Unit, Centre for Clinical Intervention Research, Copenhagen University Hospital, Copenhagen, Denmark; 3Department of Anaesthesiology, Zealand University Hospital, Køge, Denmark Background: During the last 15 years, gabapentin has become an established component of postoperative pain treatment. Gabapentin has been employed in a wide range of doses, but little is known about the optimal dose, providing the best balance between benefit and harm. This systematic review with meta-analyses aimed to explore the beneficial and harmful effects of various doses of gabapentin administered to surgical patients.Materials and methods: Data in this paper were derived from an original review, and the subgroup analyses were predefined in an International Prospective Register of Systematic Reviews published protocol: PROSPERO (ID: CRD42013006538. The methods followed Cochrane guidelines. The Cochrane Library’s CENTRAL, PubMed, EMBASE, Science Citation Index Expanded, Google Scholar, and FDA database were searched for relevant trials. Randomized clinical trials comparing gabapentin versus placebo were included. Four different dose intervals were investigated: 0–350, 351–700, 701–1050, and >1050 mg. Primary co-outcomes were 24-hour morphine consumption and serious adverse events (SAEs, with emphasis put on trials with low risk of bias. Results: One hundred and twenty-two randomized clinical trials, with 8466 patients, were included. Sixteen were overall low risk of bias. No consistent increase in morphine-sparing effect was observed with increasing doses of gabapentin from the trials with low risk of bias. Analyzing all trials, the smallest and the highest dose subgroups demonstrated numerically the most prominent reduction in morphine consumption

  9. A comparative study of first and all-author co-citation counting, and two different matrix generation approaches applied for author co-citation analyses

    DEFF Research Database (Denmark)

    Schneider, Jesper Wiborg; Larsen, Birger; Ingwersen, Peter

    2009-01-01

    XML documents extracted from the IEEE collection. These data allow the construction of ad-hoc citation indexes, which enables us to carry out the hitherto largest all-author co-citation study. Four ACA are made, combining the different units of analyses with the different matrix generation approaches...

  10. Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities

    OpenAIRE

    Sloep, Peter; Kester, Liesbeth; Brouns, Francis; Van Rosmalen, Peter; De Vries, Fred; De Croock, Marcel; Koper, Rob

    2007-01-01

    Sloep, P.B., Kester, L. Brouns, F., Van Rosmalen, P., De Vries, F., De Croock, M., Koper, R. (2007) Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities. In V. Uskov (Ed.) The Sixth IASTED International Conference on Web-based Education WBE 2007, March 14-16, Chamonix, France (pp. 549-554). Calgary, Canada: Acta Press.

  11. Performance Analysis of Ad Hoc Dispersed Spectrum Cognitive Radio Networks over Fading Channels

    Directory of Open Access Journals (Sweden)

    Mohammad Muneer

    2011-01-01

    Full Text Available Cognitive radio systems can utilize dispersed spectrum, and thus such approach is known as dispersed spectrum cognitive radio systems. In this paper, we first provide the performance analysis of such systems over fading channels. We derive the average symbol error probability of dispersed spectrum cognitive radio systems for two cases, where the channel for each frequency diversity band experiences independent and dependent Nakagami- fading. In addition, the derivation is extended to include the effects of modulation type and order by considering M-ary phase-shift keying ( -PSK and M-ary quadrature amplitude modulation -QAM schemes. We then consider the deployment of such cognitive radio systems in an ad hoc fashion. We consider an ad hoc dispersed spectrum cognitive radio network, where the nodes are assumed to be distributed in three dimension (3D. We derive the effective transport capacity considering a cubic grid distribution. Numerical results are presented to verify the theoretical analysis and show the performance of such networks.

  12. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    International Nuclear Information System (INIS)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-01-01

    We present an ad-hoc 'nearby' storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  13. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  14. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    Science.gov (United States)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  15. The effect of DAD timeout period on address autoconfiguration in wireless ad-hoc networks

    CSIR Research Space (South Africa)

    Mutanga, MB

    2011-09-01

    Full Text Available Lack of manual management mechanisms in wireless ad-hoc networks means that automatic configuration of IP addresses and other related network parameters are very crucial. Many IP address autoconfiguration mechanisms have been proposed in literature...

  16. An Economic Framework for Resource Allocation in Ad-hoc Grids

    OpenAIRE

    Pourebrahimi, B.

    2009-01-01

    In this dissertation, we present an economic framework to study and develop different market-based mechanisms for resource allocation in an ad-hoc Grid. Such an economic framework helps to understand the impact of certain choices and explores what are the suitable mechanisms from Grid user/owner perspectives under given circumstances. We focus on resource allocation in a Grid-based environment in the case where some resources are lying idle and could be linked with overloaded nodes in a netwo...

  17. Report of the evaluation by the ad hoc review committee on advanced photon and synchrotron radiation research. In-advance evaluation in fiscal year 2001

    International Nuclear Information System (INIS)

    2001-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Advanced Photon and Synchrotron Radiation Research in accordance with the 'Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs to be implemented for five years starting in Fiscal Year 2002 at Advanced Photon Research Center and at Synchrotron Radiation Research Center in Kansai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of ten specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from May to July 2001. The evaluation was performed on the basis of the materials submitted in advanced and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 21, 2001, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on July 12, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Advanced Photon and Synchrotron Radiation Research. (author)

  18. On Throughput Improvement of Wireless Ad Hoc Networks with Hidden Nodes

    Science.gov (United States)

    Choi, Hong-Seok; Lim, Jong-Tae

    In this letter, we present the throughput analysis of the wireless ad hoc networks based on the IEEE 802.11 MAC (Medium Access Control). Especially, our analysis includes the case with the hidden node problem so that it can be applied to the multi-hop networks. In addition, we suggest a new channel access control algorithm to maximize the network throughput and show the usefulness of the proposed algorithm through simulations.

  19. Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach

    OpenAIRE

    Gavalas, Damianos; Pantziou, Grammati; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this work, we introduce an efficient distributed clustering algorithm that uses both location and energy metrics for cluster formation. Our proposed solution mainly addresses cluster stability, manageability and energy efficiency i...

  20. Throughput Capacity of Ad Hoc Networks with Route Discovery

    Directory of Open Access Journals (Sweden)

    Blum Rick S

    2007-01-01

    Full Text Available Throughput capacity of large ad hoc networks has been shown to scale adversely with the size of network . However the need for the nodes to find or repair routes has not been analyzed in this context. In this paper, we explicitly take route discovery into account and obtain the scaling law for the throughput capacity under general assumptions on the network environment, node behavior, and the quality of route discovery algorithms. We also discuss a number of possible scenarios and show that the need for route discovery may change the scaling for the throughput capacity.

  1. New grid based test bed environment for carrying out ad-hoc networking experiments

    CSIR Research Space (South Africa)

    Johnson, D

    2006-09-01

    Full Text Available and the third is to do analysis on a real test bed network which has implemented the ad-hoc networking protocol. This paper concerns the third option. Most researchers who have done work on test bed environments have used either indoor Wifi inter-office links...

  2. Does rectal indomethacin eliminate the need for prophylactic pancreatic stent placement in patients undergoing high-risk ERCP? Post hoc efficacy and cost-benefit analyses using prospective clinical trial data.

    Science.gov (United States)

    Elmunzer, B Joseph; Higgins, Peter D R; Saini, Sameer D; Scheiman, James M; Parker, Robert A; Chak, Amitabh; Romagnuolo, Joseph; Mosler, Patrick; Hayward, Rodney A; Elta, Grace H; Korsnes, Sheryl J; Schmidt, Suzette E; Sherman, Stuart; Lehman, Glen A; Fogel, Evan L

    2013-03-01

    A recent large-scale randomized controlled trial (RCT) demonstrated that rectal indomethacin administration is effective in addition to pancreatic stent placement (PSP) for preventing post-endoscopic retrograde cholangiopancreatography (ERCP) pancreatitis (PEP) in high-risk cases. We performed a post hoc analysis of this RCT to explore whether rectal indomethacin can replace PSP in the prevention of PEP and to estimate the potential cost savings of such an approach. We retrospectively classified RCT subjects into four prevention groups: (1) no prophylaxis, (2) PSP alone, (3) rectal indomethacin alone, and (4) the combination of PSP and indomethacin. Multivariable logistic regression was used to adjust for imbalances in the prevalence of risk factors for PEP between the groups. Based on these adjusted PEP rates, we conducted an economic analysis comparing the costs associated with PEP prevention strategies employing rectal indomethacin alone, PSP alone, or the combination of both. After adjusting for risk using two different logistic regression models, rectal indomethacin alone appeared to be more effective for preventing PEP than no prophylaxis, PSP alone, and the combination of indomethacin and PSP. Economic analysis revealed that indomethacin alone was a cost-saving strategy in 96% of Monte Carlo trials. A prevention strategy employing rectal indomethacin alone could save approximately $150 million annually in the United States compared with a strategy of PSP alone, and $85 million compared with a strategy of indomethacin and PSP. This hypothesis-generating study suggests that prophylactic rectal indomethacin could replace PSP in patients undergoing high-risk ERCP, potentially improving clinical outcomes and reducing healthcare costs. A RCT comparing rectal indomethacin alone vs. indomethacin plus PSP is needed.

  3. Assessing Clinical Microbiology Practice Guidelines: American Society for Microbiology Ad Hoc Committee on Evidence-Based Laboratory Medicine Practice Guidelines Assessment.

    Science.gov (United States)

    Nachamkin, Irving; Kirn, Thomas J; Westblade, Lars F; Humphries, Romney

    2017-11-01

    As part of the American Society for Microbiology (ASM) Evidence-Based Laboratory Medicine Practice Guidelines Committee of the Professional Practice Committee, an ad hoc committee was formed in 2014 to assess guidelines published by the committee using an assessment tool, Appraisal of Guidelines for Research Evaluation II (AGREE II). The AGREE II assessment helps reviewers determine whether published guidelines are robust, transparent, and clear in presenting practice recommendations in a standardized manner. Identifying strengths and weaknesses of practice guidelines by ad hoc assessments helps with improving future guidelines through the participation of key stakeholders. This minireview describes the development of the ad hoc committee and results from their review of several ASM best practices guidelines and a non-ASM practice guideline from the Emergency Nurses Association. Copyright © 2017 American Society for Microbiology.

  4. Recreating the seawater mixture composition of HOCs in toxicity tests with Artemia franciscana by passive dosing

    Energy Technology Data Exchange (ETDEWEB)

    Rojo-Nieto, E., E-mail: elisa.rojo@uca.es [Andalusian Centre of Marine Science and Technology (CACYTMAR), Department of Environmental Technologies, University of Cadiz, 11510 Puerto Real (Spain); Smith, K.E.C. [Department of Environmental Science, Aarhus University, DK-4000 Roskilde (Denmark); Perales, J.A. [Andalusian Centre of Marine Science and Technology (CACYTMAR), Department of Environmental Technologies, University of Cadiz, 11510 Puerto Real (Spain); Mayer, P. [Department of Environmental Science, Aarhus University, DK-4000 Roskilde (Denmark)

    2012-09-15

    The toxicity testing of hydrophobic organic compounds (HOCs) in aquatic media is generally challenging, and this is even more problematic for mixtures. The hydrophobic properties of these compounds make them difficult to dissolve, and subsequently to maintain constant exposure concentrations. Evaporative and sorptive losses are highly compound-specific, which can alter not only total concentrations, but also the proportions between the compounds in the mixture. Therefore, the general aim of this study was to explore the potential of passive dosing for testing the toxicity of a PAH mixture that recreates the mixture composition found in seawater from a coastal area of Spain, the Bay of Algeciras. First, solvent spiking and passive dosing were compared for their suitability to determine the acute toxicity to Artemia franciscana nauplii of several PAHs at their respective solubility limits. Second, passive dosing was applied to recreate the seawater mixture composition of PAHs measured in a Spanish monitoring program, to test the toxicity of this mixture at different levels. HPLC analysis was used to confirm the reproducibility of the dissolved exposure concentrations for the individual PAHs and mixtures. This study shows that passive dosing has some important benefits in comparison with solvent spiking for testing HOCs in aquatic media. These include maintaining constant exposure concentrations, leading to higher reproducibility and a relative increase in toxicity. Passive dosing is also able to faithfully reproduce real mixtures of HOCs such as PAHs, in toxicity tests, reproducing both the levels and proportions of the different compounds. This provides a useful approach for studying the toxicity of environmental mixtures of HOCs, both with a view to investigating their toxicity but also for determining safety factors before such mixtures result in detrimental effects.

  5. Worm epidemics in wireless ad hoc networks

    Energy Technology Data Exchange (ETDEWEB)

    Nekovee, Maziar [BT Research, Polaris 134, Adastral Park, Martlesham, Suffolk IP5 3RE (United Kingdom); Centre for Computational Science, University College London, 20 Gordon Street, London WC1H 0AJ (United Kingdom)

    2007-06-15

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  6. Worm epidemics in wireless ad hoc networks

    Science.gov (United States)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  7. Worm epidemics in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  8. On Energy-Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Poor HVincent

    2007-01-01

    Full Text Available A hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  9. On Energy-Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Cristina Comaniciu

    2007-03-01

    Full Text Available A hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  10. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  11. PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks (VANET)

    NARCIS (Netherlands)

    Förster, David; Kargl, Frank; Löhr, Hans

    2014-01-01

    Envisioned vehicular ad-hoc networks (VANET) standards use pseudonym certificates to provide secure and privacy-friendly message authentication. Revocation of long-term credentials is required to remove participants from the system, e.g. in case of vehicle theft. However, the current approach to

  12. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  13. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  14. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  15. Report of the evaluation by the Ad Hoc Review Committee on advance science research. Result evaluation, interim evaluation, in-advance evaluation in fiscal year 2003

    International Nuclear Information System (INIS)

    2003-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Advanced Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the accomplishments of the research completed in Fiscal Year 2002, the accomplishments of the research started in Fiscal Year 2001, and the adequacy of the programs of the research to be started in Fiscal Year 2004 at Advanced Science Research Center of JAERI. The Ad Hoc Review Committee consisted of nine specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from May to July 2003. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 24, 2003, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on August 4, 2003. This report describes the result of the evaluation by the Ad Hoc Review Committee on Advanced Science Research. (author)

  16. Report of the evaluation by the Ad Hoc Review Committee on Advance Science Research. Result evaluation, interim evaluation, in-advance evaluation in fiscal year 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Advanced Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the accomplishments of the research completed in Fiscal Year 2001, the accomplishments of the research started in Fiscal Year 2000, and the adequacy of the programs of the research to be started in Fiscal Year 2003 at Advanced Science Research Center of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from May to July 2002. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 4, 2002, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on August 5, 2002. This report describes the result of the evaluation by the Ad Hoc Review Committee on Advanced Science Research. (author)

  17. How distributed processing produces false negatives in voxel-based lesion-deficit analyses.

    Science.gov (United States)

    Gajardo-Vidal, Andrea; Lorca-Puls, Diego L; Crinion, Jennifer T; White, Jitrachote; Seghier, Mohamed L; Leff, Alex P; Hope, Thomas M H; Ludersdorfer, Philipp; Green, David W; Bowman, Howard; Price, Cathy J

    2018-07-01

    In this study, we hypothesized that if the same deficit can be caused by damage to one or another part of a distributed neural system, then voxel-based analyses might miss critical lesion sites because preservation of each site will not be consistently associated with preserved function. The first part of our investigation used voxel-based multiple regression analyses of data from 359 right-handed stroke survivors to identify brain regions where lesion load is associated with picture naming abilities after factoring out variance related to object recognition, semantics and speech articulation so as to focus on deficits arising at the word retrieval level. A highly significant lesion-deficit relationship was identified in left temporal and frontal/premotor regions. Post-hoc analyses showed that damage to either of these sites caused the deficit of interest in less than half the affected patients (76/162 = 47%). After excluding all patients with damage to one or both of the identified regions, our second analysis revealed a new region, in the anterior part of the left putamen, which had not been previously detected because many patients had the deficit of interest after temporal or frontal damage that preserved the left putamen. The results illustrate how (i) false negative results arise when the same deficit can be caused by different lesion sites; (ii) some of the missed effects can be unveiled by adopting an iterative approach that systematically excludes patients with lesions to the areas identified in previous analyses, (iii) statistically significant voxel-based lesion-deficit mappings can be driven by a subset of patients; (iv) focal lesions to the identified regions are needed to determine whether the deficit of interest is the consequence of focal damage or much more extensive damage that includes the identified region; and, finally, (v) univariate voxel-based lesion-deficit mappings cannot, in isolation, be used to predict outcome in other patients

  18. Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

    Directory of Open Access Journals (Sweden)

    L. Gavrilovska

    2009-06-01

    Full Text Available Ad-hoc and sensor networks are becoming an increasingly popular wireless networking concepts lately. This paper analyzes and compares prominent routing schemes in these networking environments. The knowledge obtained can serve users to better understand short range wireless network solutions thus leading to options for implementation in various scenarios. In addition, it should aid researchers develop protocol improvements reliable for the technologies of interest.

  19. Cross-Layer QoS Control for Video Communications over Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Pei Yong

    2005-01-01

    Full Text Available Assuming a wireless ad hoc network consisting of homogeneous video users with each of them also serving as a possible relay node for other users, we propose a cross-layer rate-control scheme based on an analytical study of how the effective video transmission rate is affected by the prevailing operating parameters, such as the interference environment, the number of transmission hops to a destination, and the packet loss rate. Furthermore, in order to provide error-resilient video delivery over such wireless ad hoc networks, a cross-layer joint source-channel coding (JSCC approach, to be used in conjunction with rate-control, is proposed and investigated. This approach attempts to optimally apply the appropriate channel coding rate given the constraints imposed by the effective transmission rate obtained from the proposed rate-control scheme, the allowable real-time video play-out delay, and the prevailing channel conditions. Simulation results are provided which demonstrate the effectiveness of the proposed cross-layer combined rate-control and JSCC approach.

  20. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  1. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    Science.gov (United States)

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  2. Topology Control with Anisotropic and Sector Turning Antennas in Ad-hoc and Sensor Networks

    Directory of Open Access Journals (Sweden)

    V. Černý

    2011-01-01

    Full Text Available During the last several years, technological advances have allowed the development of small, cheap, embedded, independent and rather powerful radio devices that can self-organise into data networks. Such networks are usually called ad-hoc networks or, sometimes, depending on the application field, sensor networks. One of the first standards for ad-hoc networks to impose itself as a fully industrial framework for data gathering and control over such devices is IEEE 802.15.4 and, on top of it, its pair network architecture: ZigBee. In the case of multiple radio devices clamped into a small geographical area, the lack of radio bandwidth becomes a major problem, leading to multiple data losses and unnecessary power drain from the batteries of these small devices. This problem is usually perceived as interference. The deployment of appropriate topology control mechanisms (TC can solve interference. All of these algorithms calculate TC on the basis of isotropic antenna radiation patterns in the horizontal plane.

  3. Client-Server and Peer-to-Peer Ad-hoc Network for a Flexible Learning Environment

    Directory of Open Access Journals (Sweden)

    Ferial Khaddage

    2011-01-01

    Full Text Available Peer-to-Peer (P2P networking in a mobile learning environment has become a popular topic of research. One of the new emerging research ideas is on the ability to combine P2P network with server-based network to form a strong efficient portable and compatible network infrastructure. This paper describes a unique mobile network architecture, which reflects the on-campus students’ need for a mobile learning environment. This can be achieved by combining two different networks, client-server and peer-to-peer ad-hoc to form a sold and secure network. This is accomplished by employing one peer within the ad-hoc network to act as an agent-peer to facilitate communication and information sharing between the two networks. It can be implemented without any major changes to the current network technologies, and can combine any wireless protocols such as GPRS, Wi-Fi, Bluetooth, and 3G.

  4. Adhoc: an R package to calculate ad hoc distance thresholds for DNA barcoding identification

    Directory of Open Access Journals (Sweden)

    Gontran Sonet

    2013-12-01

    Full Text Available Identification by DNA barcoding is more likely to be erroneous when it is based on a large distance between the query (the barcode sequence of the specimen to identify and its best match in a reference barcode library. The number of such false positive identifications can be decreased by setting a distance threshold above which identification has to be rejected. To this end, we proposed recently to use an ad hoc distance threshold producing identifications with an estimated relative error probability that can be fixed by the user (e.g. 5%. Here we introduce two R functions that automate the calculation of ad hoc distance thresholds for reference libraries of DNA barcodes. The scripts of both functions, a user manual and an example file are available on the JEMU website (http://jemu.myspecies.info/computer-programs as well as on the comprehensive R archive network (CRAN, http://cran.r-project.org.

  5. Geophysical investigation of the June 6, 1944 D-Day invasion site at Pointe du Hoc, Normandy, France

    Science.gov (United States)

    Everett, M. E.; Pierce, C. J.; Warden, R. R.; Burt, R. A.

    2005-05-01

    A near-surface geophysical survey at the D-Day invasion site atop the cliffs at Pointe du Hoc, Normandy, France was carried out using ground-penetrating radar, electromagnetic induction, and magnetic gradiometry equipment. The subsurface targets of investigation are predominantly buried concrete and steel structures and earthworks associated with the German coastal fortifications at this stronpoint of Hitler's Atlantic Wall. The targets are readily detectable embedded within the vadose zone of a weakly magnetic, electrically resistive loess soil cover. The radar and electromagnetic induction responses lend themselves to plan-view imaging of the subsurface, while the magnetics data reveal the presence of buried magnetic bodies in a more subtle fashion. Several intriguing geophysical signatures were discovered, including what may be the buried remains of a railway turntable, ordnance fragments in the bomb craters, a buried steel-reinforced concrete trench, and a linear chain of machine gun firing positins. Geophysical prospecting is shown to be a very powerful tool for historical battlefield characterization.

  6. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  7. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  8. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  9. An Automated Tool for the Creation of Desired Emulated Topologies of a Mobile Ad-Hoc Network

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research effort that the U.S. Army Research Laboratory conducted in FY 2005 in support of the development of advanced technologies for tactical mobile ad hoc networks (MANET...

  10. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  11. Comparative analyses reveal different consequences of two oxidative stress inducers, gamma irradiation and potassium tellurite, in the extremophile Deinococcus radiodurans

    International Nuclear Information System (INIS)

    Narasimha, Anaganti; Basu, Bhakti; Apte, Shree Kumar

    2014-01-01

    Proteomic and mass spectrometric analyses revealed differential responses of D. radiodurans to two oxidative stressors. While both elicited oxidative stress alleviation response, major divergence was observed at the level of DNA repair, metabolic pathways and protein homeostasis. Response to gamma irradiation was focused on DNA repair and ROS scavenging but supported metabolism as well as protein homeostasis. Tellurite, induced oxidative stress alleviation but decreased reducing affected and adversely affected metabolism and protein homeostasis

  12. Ad Hoc Microphone Array Beamforming Using the Primal-Dual Method of Multipliers

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Heusdens, Richard

    2016-01-01

    In the recent years, there have been increasing amount of researches aiming at optimal beamforming with ad hoc microphone arrays, mostly with fusion-based schemes. However, huge amount of computational complexity and communication overhead impede many of these algorithms from being useful in prac...... the distributed linearly-constrained minimum variance beamformer using the the state of the art primal-dual method of multipliers. We study the proposed algorithm with an experiment....

  13. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  14. Protocolo W2LAN para transformar una red móvil 802.11 Ad-Hoc (MANET) en una LAN Ethernet

    OpenAIRE

    Burrull I Mestres, Francesco; García Haro, Juan; Malgosa Sanahuja, José María; Monzó Sánchez, Francisco Miguel

    2005-01-01

    Las redes MANET (Mobile Ad-Hoc Network) presentan el problema de la visibilidad parcial [1], por lo que hay que considerar protocolos de encaminamiento de nivel de enlace (capa 2 OSI) o superior. Algunos ejemplos de protocolos de encaminamiento en uso podrían ser el protocolo AODV (Ad Hoc On-demand Distance Vector[2]) -reactivo- y DSDV (Destination-Sequenced Distance Vector [3]) -proactivo-. En [4] se puede encontrar una comparativa extensa sobre protocolos de encaminamiento en redes MANET, o...

  15. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  16. Ad hoc committee on reactor physics benchmarks

    International Nuclear Information System (INIS)

    Diamond, D.J.; Mosteller, R.D.; Gehin, J.C.

    1996-01-01

    In the spring of 1994, an ad hoc committee on reactor physics benchmarks was formed under the leadership of two American Nuclear Society (ANS) organizations. The ANS-19 Standards Subcommittee of the Reactor Physics Division and the Computational Benchmark Problem Committee of the Mathematics and Computation Division had both seen a need for additional benchmarks to help validate computer codes used for light water reactor (LWR) neutronics calculations. Although individual organizations had employed various means to validate the reactor physics methods that they used for fuel management, operations, and safety, additional work in code development and refinement is under way, and to increase accuracy, there is a need for a corresponding increase in validation. Both organizations thought that there was a need to promulgate benchmarks based on measured data to supplement the LWR computational benchmarks that have been published in the past. By having an organized benchmark activity, the participants also gain by being able to discuss their problems and achievements with others traveling the same route

  17. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...

  18. Impact of mobility on the performance of relaying in ad hoc networks (Extended version)

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E.

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  19. Outcome when adrenaline (epinephrine) was actually given vs. not given - post hoc analysis of a randomized clinical trial.

    Science.gov (United States)

    Olasveengen, Theresa M; Wik, Lars; Sunde, Kjetil; Steen, Petter A

    2012-03-01

    IV line insertion and drugs did not affect long-term survival in an out-of-hospital cardiac arrest (OHCA) randomized clinical trial (RCT). In a previous large registry study adrenaline was negatively associated with survival from OHCA. The present post hoc analysis on the RCT data compares outcomes for patients actually receiving adrenaline to those not receiving adrenaline. Patients from a RCT performed May 2003 to April 2008 were included. Three patients from the original intention-to-treat analysis were excluded due to insufficient documentation of adrenaline administration. Quality of cardiopulmonary resuscitation (CPR) and clinical outcomes were compared. Clinical characteristics were similar and CPR quality comparable and within guideline recommendations for 367 patients receiving adrenaline and 481 patients not receiving adrenaline. Odds ratio (OR) for being admitted to hospital, being discharged from hospital and surviving with favourable neurological outcome for the adrenaline vs. no-adrenaline group was 2.5 (CI 1.9, 3.4), 0.5 (CI 0.3, 0.8) and 0.4 (CI 0.2, 0.7), respectively. Ventricular fibrillation, response interval, witnessed arrest, gender, age and endotracheal intubation were confounders in multivariate logistic regression analysis. OR for survival for adrenaline vs. no-adrenaline adjusted for confounders was 0.52 (95% CI: 0.29, 0.92). Receiving adrenaline was associated with improved short-term survival, but decreased survival to hospital discharge and survival with favourable neurological outcome after OHCA. This post hoc survival analysis is in contrast to the previous intention-to-treat analysis of the same data, but agrees with previous non-randomized registry data. This shows limitations of non-randomized or non-intention-to-treat analyses. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  20. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  1. System optimization for peer-to-peer multi hop video broadcasting in wireless ad hoc networks

    NARCIS (Netherlands)

    Dedeoglu, V.; Atici, C.; Salman, F.S.; Sunay, M.O.

    2008-01-01

    We consider peer-to-peer video broadcasting using cooperation among peers in an ad hoc wireless network. As opposed to the traditional single hop broadcasting, multiple hops cause an increase in broadcast video quality while creating interference and increasing transmission delay. We develop

  2. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  3. Global terrestrial water storage connectivity revealed using complex climate network analyses

    Science.gov (United States)

    Sun, A. Y.; Chen, J.; Donges, J.

    2015-07-01

    Terrestrial water storage (TWS) exerts a key control in global water, energy, and biogeochemical cycles. Although certain causal relationship exists between precipitation and TWS, the latter quantity also reflects impacts of anthropogenic activities. Thus, quantification of the spatial patterns of TWS will not only help to understand feedbacks between climate dynamics and the hydrologic cycle, but also provide new insights and model calibration constraints for improving the current land surface models. This work is the first attempt to quantify the spatial connectivity of TWS using the complex network theory, which has received broad attention in the climate modeling community in recent years. Complex networks of TWS anomalies are built using two global TWS data sets, a remote sensing product that is obtained from the Gravity Recovery and Climate Experiment (GRACE) satellite mission, and a model-generated data set from the global land data assimilation system's NOAH model (GLDAS-NOAH). Both data sets have 1° × 1° grid resolutions and cover most global land areas except for permafrost regions. TWS networks are built by first quantifying pairwise correlation among all valid TWS anomaly time series, and then applying a cutoff threshold derived from the edge-density function to retain only the most important features in the network. Basinwise network connectivity maps are used to illuminate connectivity of individual river basins with other regions. The constructed network degree centrality maps show the TWS anomaly hotspots around the globe and the patterns are consistent with recent GRACE studies. Parallel analyses of networks constructed using the two data sets reveal that the GLDAS-NOAH model captures many of the spatial patterns shown by GRACE, although significant discrepancies exist in some regions. Thus, our results provide further measures for constraining the current land surface models, especially in data sparse regions.

  4. An Incentivized Approach for Fair Participation in Wireless Ad hoc Networks

    OpenAIRE

    Choudhuri, Arka Rai; S, Kalyanasundaram; Sridhar, Shriyak; B, Annappa

    2015-01-01

    In Wireless Ad hoc networks (WANETs), nodes separated by considerable distance communicate with each other by relaying their messages through other nodes. However, it might not be in the best interests of a node to forward the message of another node due to power constraints. In addition, all nodes being rational, some nodes may be selfish, i.e. they might not relay data from other nodes so as to increase their lifetime. In this paper, we present a fair and incentivized approach for participa...

  5. Performance Analysis of a Cluster-Based MAC Protocol for Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jesús Alonso-Zárate

    2010-01-01

    Full Text Available An analytical model to evaluate the non-saturated performance of the Distributed Queuing Medium Access Control Protocol for Ad Hoc Networks (DQMANs in single-hop networks is presented in this paper. DQMAN is comprised of a spontaneous, temporary, and dynamic clustering mechanism integrated with a near-optimum distributed queuing Medium Access Control (MAC protocol. Clustering is executed in a distributed manner using a mechanism inspired by the Distributed Coordination Function (DCF of the IEEE 802.11. Once a station seizes the channel, it becomes the temporary clusterhead of a spontaneous cluster and it coordinates the peer-to-peer communications between the clustermembers. Within each cluster, a near-optimum distributed queuing MAC protocol is executed. The theoretical performance analysis of DQMAN in single-hop networks under non-saturation conditions is presented in this paper. The approach integrates the analysis of the clustering mechanism into the MAC layer model. Up to the knowledge of the authors, this approach is novel in the literature. In addition, the performance of an ad hoc network using DQMAN is compared to that obtained when using the DCF of the IEEE 802.11, as a benchmark reference.

  6. Regressive research: The pitfalls of post hoc data selection in the study of unconscious mental processes.

    Science.gov (United States)

    Shanks, David R

    2017-06-01

    Many studies of unconscious processing involve comparing a performance measure (e.g., some assessment of perception or memory) with an awareness measure (such as a verbal report or a forced-choice response) taken either concurrently or separately. Unconscious processing is inferred when above-chance performance is combined with null awareness. Often, however, aggregate awareness is better than chance, and data analysis therefore employs a form of extreme group analysis focusing post hoc on participants, trials, or items where awareness is absent or at chance. The pitfalls of this analytic approach are described with particular reference to recent research on implicit learning and subliminal perception. Because of regression to the mean, the approach can mislead researchers into erroneous conclusions concerning unconscious influences on behavior. Recommendations are made about future use of post hoc selection in research on unconscious cognition.

  7. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  8. PROTOCOLS FOR INCREASING THE LIFETIME OF NODES OF AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    B.Malarkodi

    2010-03-01

    Full Text Available Power consumption of nodes in ad hoc networks is a critical issue as they predominantly operate on batteries. In order to improve the lifetime of an ad hoc network, all the nodes must be utilized evenly and the power required for connections must be minimized. Energy management deals with the process of managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources so as to increase the lifetime of the nodes of an ad hoc wireless network. In this paper, two protocols are proposed to improve the lifetime of the nodes. The first protocol assumes smart battery packages with L cells and uses dynamic programming (DP to optimally select the set of cells used to satisfy a request for power. The second one proposes a MAC layer protocol denoted as Power Aware medium Access Control (PAMAC protocol which enables the network layer to select a route with minimum total power requirement among the possible routes between a source and a destination provided all nodes in the routes have battery capacity above a threshold. The life time of the nodes using the DP based scheduling policy is found through simulation and compared with that obtained using the techniques reported in the literature. It is found that DP based policy increases the lifetime of the mobile nodes by a factor of 1.15 to 1.8. The life expectancy, the average power consumption and throughput of the network using PAMAC protocol are computed through simulation and compared with that of the other MAC layer protocols 802.11, MACA, and CSMA. Besides this, the life expectancy and average power consumption of the network for different values of threshold are also compared. From the simulation results, it is observed that PAMAC consumes the least power and provides the longest lifetime among the various MAC Layer protocols. Moreover, using PAMAC as the MAC layer protocol, the performance obtained using different routing layer

  9. Comunicaciones seguras sobre redes móviles ad hoc

    OpenAIRE

    Rocabado Moreno, Sergio Hernán; Arias Figueroa, Daniel; Sánchez, Ernesto

    2011-01-01

    En este proyecto se ha planteado investigar diferentes mecanismos para realizar comunicaciones seguras utilizando redes móviles ad-hoc, esto permitirá aprovechar las características inherentes de este tipo de redes, para llevar información crítica de forma segura a lugares donde no se disponga de acceso a redes de infraestructura. El resultado final será una propuesta que servirá de base para el desarrollo e implementación de sistemas móviles para emergencias médicas y también como material d...

  10. A Partitioned Approach to Signal Separation with Microphone Ad Hoc Arrays

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Benesty, Jacob

    2016-01-01

    In this paper, a blind algorithm is proposed for speech enhancement in multi-speaker scenarios, in which interference rejection is the main objective. Here, the ad hoc array is broken into microphone duples which are used to partition the array into local sub-arrays. The core algorithm takes...... advantage of differences in signal structure in each duple. A geometric mean filter is then used to merge the output signals obtained with different duples, and to form a global broadband maximum signal-to-interference ratio (SIR) enhancement apparatus. The resulting filter outputs are enhanced acoustic...

  11. Increased longevity of wireless Ad hoc network through fuzzy system

    Directory of Open Access Journals (Sweden)

    Fawzia Abdali Larki

    2014-06-01

    Full Text Available The Ad hoc network is one of the multistep-based self-organizing networks, which are dynamically changing and are taken more into account as the ways of connecting the terminals through the development of wireless communication terminals. We are faced with numerous challenges in designing a wireless network such as the dynamic topology, common and limited bandwidth, and the limited energy. The nodes are moving according to the continuous changes in the topology and the source-to-destination paths are completely broken. Therefore, the repeated route discovery enhances the delay and overload of routing. Thus, it is essential to consider the link stability while designing the path in order to choose the routing protocol. Providing the multiple paths may lead to the better performance than a path. The transmission energy control in the wireless Ad hoc networks is the option for the level of transmission energy in order to transmit each node packet in this system. Therefore, transmission energy control affects the wireless medium interface. Because of choosing the appropriate protocol, the routing operation can be improved and the energy consumption can be controlled properly as well as enhancing the durability and longevity of network. The main objective of this study is to enhance the network longevity. The proposed algorithm in this research considers the combination of 2 parameters including the rate of node energy and number of steps in Fuzzy System applied on AOMDV Protocol, which is a Multipath Routing Protocol. The results of simulation also indicate the improved performance of proposed algorithm (AOMDV-F compared to AODV and AOMDV Protocols in NS2 simulator.

  12. Undilatable Stent Neoatherosclerosis Treated with Ad Hoc Rotational Atherectomy

    Directory of Open Access Journals (Sweden)

    Michael Koutouzis

    2017-01-01

    Full Text Available A middle age woman with known ischemic heart disease and old stents in proximal left anterior descending coronary artery (LAD was admitted to Coronary Care Unit with acute coronary syndrome. The coronary angiography showed one vessel disease with significant restenosis within the previously implanted stents. The lesion was tough and remained undilatable despite high pressure balloon inflation. Eventually, the balloon ruptured creating a massive dissection of the LAD beginning immediately after the distal part of the undilatable lesion. We proceeded with a challenging ad hoc rotational atherectomy of the lesion and finally stenting of the lesion. In-stent restenosis many years after stent implantation is considered to be mainly due to neoatheromatosis compared to intimal hyperplasia, making lesion treatment more difficult and unpredictable.

  13. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  14. Conserved regulators of nucleolar size revealed by global phenotypic analyses.

    Science.gov (United States)

    Neumüller, Ralph A; Gross, Thomas; Samsonova, Anastasia A; Vinayagam, Arunachalam; Buckner, Michael; Founk, Karen; Hu, Yanhui; Sharifpoor, Sara; Rosebrock, Adam P; Andrews, Brenda; Winston, Fred; Perrimon, Norbert

    2013-08-20

    Regulation of cell growth is a fundamental process in development and disease that integrates a vast array of extra- and intracellular information. A central player in this process is RNA polymerase I (Pol I), which transcribes ribosomal RNA (rRNA) genes in the nucleolus. Rapidly growing cancer cells are characterized by increased Pol I-mediated transcription and, consequently, nucleolar hypertrophy. To map the genetic network underlying the regulation of nucleolar size and of Pol I-mediated transcription, we performed comparative, genome-wide loss-of-function analyses of nucleolar size in Saccharomyces cerevisiae and Drosophila melanogaster coupled with mass spectrometry-based analyses of the ribosomal DNA (rDNA) promoter. With this approach, we identified a set of conserved and nonconserved molecular complexes that control nucleolar size. Furthermore, we characterized a direct role of the histone information regulator (HIR) complex in repressing rRNA transcription in yeast. Our study provides a full-genome, cross-species analysis of a nuclear subcompartment and shows that this approach can identify conserved molecular modules.

  15. Conserved Regulators of Nucleolar Size Revealed by Global Phenotypic Analyses

    Science.gov (United States)

    Neumüller, Ralph A.; Gross, Thomas; Samsonova, Anastasia A.; Vinayagam, Arunachalam; Buckner, Michael; Founk, Karen; Hu, Yanhui; Sharifpoor, Sara; Rosebrock, Adam P.; Andrews, Brenda; Winston, Fred; Perrimon, Norbert

    2014-01-01

    Regulation of cell growth is a fundamental process in development and disease that integrates a vast array of extra- and intracellular information. A central player in this process is RNA polymerase I (Pol I), which transcribes ribosomal RNA (rRNA) genes in the nucleolus. Rapidly growing cancer cells are characterized by increased Pol I–mediated transcription and, consequently, nucleolar hypertrophy. To map the genetic network underlying the regulation of nucleolar size and of Pol I–mediated transcription, we performed comparative, genome-wide loss-of-function analyses of nucleolar size in Saccharomyces cerevisiae and Drosophila melanogaster coupled with mass spectrometry–based analyses of the ribosomal DNA (rDNA) promoter. With this approach, we identified a set of conserved and nonconserved molecular complexes that control nucleolar size. Furthermore, we characterized a direct role of the histone information regulator (HIR) complex in repressing rRNA transcription in yeast. Our study provides a full-genome, cross-species analysis of a nuclear subcompartment and shows that this approach can identify conserved molecular modules. PMID:23962978

  16. Mitochondrial dysfunction, oxidative stress and apoptosis revealed by proteomic and transcriptomic analyses of the striata in two mouse models of Parkinson’s disease

    Energy Technology Data Exchange (ETDEWEB)

    Chin, Mark H.; Qian, Weijun; Wang, Haixing; Petyuk, Vladislav A.; Bloom, Joshua S.; Sforza, Daniel M.; Lacan, Goran; Liu, Dahai; Khan, Arshad H.; Cantor, Rita M.; Bigelow, Diana J.; Melega, William P.; Camp, David G.; Smith, Richard D.; Smith, Desmond J.

    2008-02-10

    The molecular mechanisms underlying the changes in the nigrostriatal pathway in Parkinson disease (PD) are not completely understood. Here we use mass spectrometry and microarrays to study the proteomic and transcriptomic changes in the striatum of two mouse models of PD, induced by the distinct neurotoxins 1-methyl-4-phenyl-1,2,3,6-tetrahydropyridine (MPTP) and methamphetamine (METH). Proteomic analyses resulted in the identification and relative quantification of 912 proteins with two or more unique peptides and 85 proteins with significant abundance changes following neurotoxin treatment. Similarly, microarray analyses revealed 181 genes with significant changes in mRNA following neurotoxin treatment. The combined protein and gene list provides a clearer picture of the potential mechanisms underlying neurodegeneration observed in PD. Functional analysis of this combined list revealed a number of significant categories, including mitochondrial dysfunction, oxidative stress response and apoptosis. Additionally, codon usage and miRNAs may play an important role in translational control in the striatum. These results constitute one of the largest datasets integrating protein and transcript changes for these neurotoxin models with many similar endpoint phenotypes but distinct mechanisms.

  17. Atomoxetine treatment outcomes in adolescents and young adults with attention-deficit/hyperactivity disorder: results from a post hoc, pooled analysis.

    Science.gov (United States)

    Adler, Lenard A; Wilens, Timothy; Zhang, Shuyu; Dittmann, Ralf W; D'Souza, Deborah N; Schuh, Leslie; Durell, Todd M

    2012-02-01

    Many children with attention-deficit/hyperactivity disorder (ADHD) continue to experience this disorder as adults, which may, in part, be due to the discontinuity of health care that often occurs during the transition period between late adolescence and young adulthood. Although atomoxetine is reported to be efficacious in both adolescents and young adults, no longitudinal studies have been designed to assess directly the effects of atomoxetine treatment during this transition period. As a first step, we present the results of a post hoc, pooled analysis that compared the efficacy and safety profile of atomoxetine in these 2 patient populations. The aim of the present study was to assess the efficacy and safety profile of atomoxetine treatment in adolescents and young adults with ADHD. A post hoc, pooled analysis was conducted by combining data from 6 double-blind trials (6-9 weeks in duration) that studied adolescents (12-17 years of age; atomoxetine, n = 154; placebo, n = 88; mean final dose = 1.38 mg/kg) and 3 trials (10 weeks in duration) that studied young adults (18-30 years of age; atomoxetine, n = 117; placebo, n = 125; mean final dose = 1.21 mg/kg). Efficacy measures used in these analyses were ADHD Rating Scale (ADHDRS) for adolescents, Conners' Adult ADHD Rating Scale (CAARS) for young adults, and Clinical Global Impressions-ADHD-Severity (CGI-ADHD-S) for both age groups. Treatment response was defined as ≥30% reduction from baseline in total ADHD symptom score. In adolescents (mean age, 13.4 years), atomoxetine improved ADHD significantly compared with placebo (ADHDRS total score change, -12.9 vs -7.5; P young adults (mean age, 24.7 years), atomoxetine improved ADHD significantly (CAARS total score change, -13.6 vs -7.7; P young adults (13.7% vs 4.8%, respectively; P = 0.024); in adolescents no statistically significant differences were observed in frequency of nausea between atomoxetine and placebo treatment (4.5% vs 10.2%, respectively; P = 0

  18. Deconstruction of Oncogenic K-RAS Signaling Reveals Focal Adhesion Kinase as a Novel Therapeutic Target in NSCLC

    Science.gov (United States)

    2016-12-01

    using the log-rank test using SPSS Statistics 17.0. One-way ANOVA followed by Tukey post hoc test was used to compare the pathologic stage among groups... Statistical analyses All data presented are the average standard deviations of experiments repeated three ormore times. Significance was deter- mined using ...understood [27]. Using single nucleotide polymorphism (SNPs) data, we discovered that PIAS1 and FAK are frequently co-amplified in lung cancer specimens. We

  19. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    Science.gov (United States)

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  20. Estudio de la topología y protocolos de una red móvil ad-hoc

    OpenAIRE

    Albalat Montenegro, Bruno

    2010-01-01

    This project intends to describe how a basic messaging application that, using ad-hoc networks, supports delay tolerance, has been created. Its purpose is to serve as a basis for research groups to be able to work over it for their testing purposes.

  1. MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    K.G. Santhiya

    2012-12-01

    Full Text Available MANET (Mobile Ad-hoc Network is an infra structure less wireless ad-hoc network that does not require any basic central control. The topology of the network changes drastically due to very fast mobility of nodes. So an adaptive routing protocol is needed for routing in MANET. AODV (Ad-hoc On-demand Distance Vector routing is the effective and prominent on-demand Ad-hoc routing protocols. During route establishment phase in traditional AODV, only one route reply message will be sent in the reverse path to establish routing path. The high mobility of nodes may affect the reply messages which lead to the retransmission of route request message by the sender which in turn leads to higher communication delay, power consumption and the reduction in the ratio of packets delivered. Sending multiple route reply messages and establishing multiple paths in a single path discovery will reduce the routing overhead involved in maintaining the connection between source and destination nodes. Multipath routing can render high scalability, end-to-end throughput and provide load balancing in MANET. The new proposed novel Multipath QoS aware reliable routing protocol establishes two routes of maximum node disjoint paths and the data transfer is carried out in the two paths simultaneously. To select best paths, the new proposed protocol uses three parameters Link Eminence, MAC overhead and node residual energy. The experimental values prove that the MQARR-AODV protocol achieves high reliability, stability, low latency and outperforms AODV by the less energy consumption, overhead and delay.

  2. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  3. Neuroprotection as initial therapy in acute stroke - Third report of an Ad Hoc Consensus Group Meeting

    NARCIS (Netherlands)

    Bogousslavsky, J; De Keyser, J; Diener, HC; Fieschi, C; Hacke, W; Kaste, M; Orgogozo, JM; Pulsinelli, W; Wahlgren, NG

    1998-01-01

    Although a considerable body of scientific data is now available on neuroprotection in acute ischaemic stroke, this field is not yet established in clinical practice. At its third meeting, the European Ad Hoc Consensus Group considered the potential for neuroprotection in acute stroke and the

  4. The doctrine of joint criminal action in the ad hoc tribunals and its scope in the Rome Statute

    Directory of Open Access Journals (Sweden)

    Miren Odriozola-Gurrutxaga

    2014-03-01

    Full Text Available The first judgment of the International Criminal Court has confirmed that article 25 (3 of the Rome Statute adopts the theory of control of the act to distinguish between principals and accessories. On the contrary, since 2003, the ad hoc tribunals’ case law bases the notion of co-perpetration on the Joint Criminal Enterprise doctrine, using a subjective criterion approach. In this article we will first analyze the problems raised by that case law of the ad hoc tribunals, and then, we will study the article of the Rome Statute which apparently most resembles the Joint Criminal Enterprise doctrine: article 25 (3 (d. The article concludes that none of the three categories of that doctrine is included in the said provision.

  5. Adaptive Probabilistic Broadcasting over Dense Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Victor Gau

    2010-01-01

    Full Text Available We propose an idle probability-based broadcasting method, iPro, which employs an adaptive probabilistic mechanism to improve performance of data broadcasting over dense wireless ad hoc networks. In multisource one-hop broadcast scenarios, the modeling and simulation results of the proposed iPro are shown to significantly outperform the standard IEEE 802.11 under saturated condition. Moreover, the results also show that without estimating the number of competing nodes and changing the contention window size, the performance of the proposed iPro can still approach the theoretical bound. We further apply iPro to multihop broadcasting scenarios, and the experiment results show that within the same elapsed time after the broadcasting, the proposed iPro has significantly higher Packet-Delivery Ratios (PDR than traditional methods.

  6. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  7. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  8. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    Science.gov (United States)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  9. Structural analyses of Legionella LepB reveal a new GAP fold that catalytically mimics eukaryotic RasGAP.

    Science.gov (United States)

    Yu, Qin; Hu, Liyan; Yao, Qing; Zhu, Yongqun; Dong, Na; Wang, Da-Cheng; Shao, Feng

    2013-06-01

    Rab GTPases are emerging targets of diverse bacterial pathogens. Here, we perform biochemical and structural analyses of LepB, a Rab GTPase-activating protein (GAP) effector from Legionella pneumophila. We map LepB GAP domain to residues 313-618 and show that the GAP domain is Rab1 specific with a catalytic activity higher than the canonical eukaryotic TBC GAP and the newly identified VirA/EspG family of bacterial RabGAP effectors. Exhaustive mutation analyses identify Arg444 as the arginine finger, but no catalytically essential glutamine residues. Crystal structures of LepB313-618 alone and the GAP domain of Legionella drancourtii LepB in complex with Rab1-GDP-AlF3 support the catalytic role of Arg444, and also further reveal a 3D architecture and a GTPase-binding mode distinct from all known GAPs. Glu449, structurally equivalent to TBC RabGAP glutamine finger in apo-LepB, undergoes a drastic movement upon Rab1 binding, which induces Rab1 Gln70 side-chain flipping towards GDP-AlF3 through a strong ionic interaction. This conformationally rearranged Gln70 acts as the catalytic cis-glutamine, therefore uncovering an unexpected RasGAP-like catalytic mechanism for LepB. Our studies highlight an extraordinary structural and catalytic diversity of RabGAPs, particularly those from bacterial pathogens.

  10. Enabling Real-Time Video Services over Ad-Hoc Networks Opens the Gates for E-learning in Areas Lacking Infrastructure

    Directory of Open Access Journals (Sweden)

    Johannes Karlsson

    2009-10-01

    Full Text Available In this paper we suggest a promising solution to come over the problems of delivering e-learning to areas with lack or deficiencies in infrastructure for Internet and mobile communication. We present a simple, reasonably priced and efficient communication platform for providing e-learning. This platform is based on wireless ad-hoc networks. We also present a preemptive routing protocol suitable for real-time video communication over wireless ad-hoc networks. Our results show that this routing protocol can significantly improve the quality of the received video. This makes our suggested system not only good to overcome the infrastructure barrier but even capable of delivering a high quality e-learning material.

  11. Vehicular ad hoc networks standards, solutions, and research

    CERN Document Server

    Molinaro, Antonella; Scopigno, Riccardo

    2015-01-01

    This book presents vehicular ad-hoc networks (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and timely content; the invited authors were carefully selected from a list of who’s who in the respective field of interest: there are as many from Academia as from Standardization and Industry sectors from around the world. The covered topics are organized around five Parts starting from an historical overview of vehicular communications and standardization/harmonization activities (Part I), then progressing to the theoretical foundations of VANETs and a description of the day-one standard-compliant solutions (Part II), hence going into details of vehicular networking and security (Part III) and to the tools to study VANETs, from mobility and channel models, to network simulators and field trial methodologies (Part IV), and fi...

  12. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  13. Multiple spectroscopic analyses reveal the fate and metabolism of sulfamide herbicide triafamone in agricultural environments

    International Nuclear Information System (INIS)

    Wang, Mengcen; Qian, Yuan; Liu, Xiaoyu; Wei, Peng; Deng, Man; Wang, Lei; Wu, Huiming; Zhu, Guonian

    2017-01-01

    Triafamone, a sulfamide herbicide, has been extensively utilized for weed control in rice paddies in Asia. However, its fate and transformation in the environment have not been established. Through a rice paddy microcosm-based simulation trial combined with multiple spectroscopic analyses, we isolated and identified three novel metabolites of triafamone, including hydroxyl triafamone (HTA), hydroxyl triafamone glycoside (HTAG), and oxazolidinedione triafamone (OTA). When triafamone was applied to rice paddies at a concentration of 34.2 g active ingredient/ha, this was predominantly distributed in the paddy soil and water, and then rapidly dissipated in accordance with the first-order rate model, with half-lives of 4.3–11.0 days. As the main transformation pathway, triafamone was assimilated by the rice plants and was detoxified into HTAG, whereas the rest was reduced into HTA with subsequent formation of OTA. At the senescence stage, brown rice had incurred triafamone at a concentration of 0.0016 mg/kg, but the hazard quotient was <1, suggesting that long-term consumption of the triafamone-containing brown rice is relatively safe. The findings of the present study indicate that triafamone is actively metabolized in the agricultural environment, and elucidation of the link between environmental exposure to these triazine or oxazolidinedione moieties that contain metabolites and their potential impacts is warranted. - Highlights: • Multiple spectroscopic analyses were applied to investigate agrochemicals transformation in environment. • Three novel compounds were isolated and identified as triafamone metabolites. • The fate and transformation pathway of triafamone in rice paddy were revealed. • Long-term consumption of the triafamone-containing brown rice is relatively safe. • Elucidation of environmental impacts by exposure to these triazine or oxazolidinedione metabolites is warranted. - Triafamone rapidly dissipates in agricultural environments

  14. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    Science.gov (United States)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the

  15. Structural effects of sprifermin in knee osteoarthritis: a post-hoc analysis on cartilage and non-cartilaginous tissue alterations in a randomized controlled trial.

    Science.gov (United States)

    Roemer, Frank W; Aydemir, Aida; Lohmander, Stefan; Crema, Michel D; Marra, Monica Dias; Muurahainen, Norma; Felson, David T; Eckstein, Felix; Guermazi, Ali

    2016-07-09

    A recent publication on efficacy of Sprifermin for knee osteoarthritis (OA) using quantitatively MRI-defined central medial tibio-femoral compartment cartilage thickness as the structural primary endpoint reported no statistically significant dose response. However, Sprifermin was associated with statistically significant, dose-dependent reductions in loss of total and lateral tibio-femoral cartilage thickness. Based on these preliminary promising data a post-hoc analysis of secondary assessment and endpoints was performed to evaluate potential effects of Sprifermin on semi-quantitatively evaluated structural MRI parameters. Aim of the present analysis was to determine effects of sprifermin on several knee joint tissues over a 12 month period. 1.5 T or 3 T MRIs were acquired at baseline and 12 months follow-up using a standard protocol. MRIs were read according to the Whole-Organ Magnetic Resonance Imaging Score (WORMS) scoring system (in 14 articular subregions) by four muskuloskeletal radiologists independently. Analyses focused on semiquantitative changes in the 100 μg subgroup and matching placebo of multiple MRI-defined structural alterations. Analyses included a delta-subregional and delta-sum approach for the whole knee and the medial and lateral tibio-femoral (MTFJ, LTFJ), and patello-femoral (PFJ) compartments, taking into account number of subregions showing no change, improvement or worsening and changes in the sum of subregional scores. Mann-Whitney - Wilcoxon tests assessed differences between groups. Fifty-seven and 18 patients were included in the treatment and matched placebo subgroups. Less worsening of cartilage damage was observed from baseline to 12 months in the PFJ (0.02, 95 % confidence interval (CI) (-0.04, 0.08) vs. placebo 0.22, 95 % CI (-0.05, 0.49), p = 0.046). For bone marrow lesions (BMLs), more improvement was observed from 6 to 12 months for whole knee analyses (-0.14, 95 % CI (-0.48, 0.19) vs. placebo 0.44, 95

  16. A Game Theory Based Approach for Power Efficient Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kun Hua

    2017-01-01

    Full Text Available Green communications are playing critical roles in vehicular ad hoc networks (VANETs, while the deployment of a power efficient VANET is quite challenging in practice. To add more greens into such kind of complicated and time-varying mobile network, we specifically investigate the throughput and transmission delay performances for real-time and delay sensitive services through a repeated game theoretic solution. This paper has employed Nash Equilibrium in the noncooperative game model and analyzes its efficiency. Simulation results have shown an obvious improvement on power efficiency through such efforts.

  17. Implementation and Evaluation of Multichannel Multi-Interface Routing Mechanism with QoS-Consideration for Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Satoh Hiroki

    2010-01-01

    Full Text Available To accommodate real-time multimedia application while satisfying application-level QoS requirements in a wireless ad-hoc network, we need QoS control mechanisms. We proposed a new routing mechanism for a wireless ad-hoc network composed of nodes equipped with multiple network interfaces. By embedding information about channel usage in control messages of OLSRv2, each node obtains a view of topology and bandwidth information of the whole network. Based on the obtained information, a source node determines a logical path with the maximum available bandwidth to satisfy application-level QoS requirements. In this paper, we evaluated feasibility of the proposal through simulation and practical experiments and confirmed that our proposal effectively transferred multimedia packets over a logical path avoiding congested links. The load on a network is well distributed and the network can accommodate more sessions than OLSRv2 and QOLSR.

  18. Impact of mobility on the performance7 of relaying in ad hoc networks – Extended version

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  19. Intelligent Networks Data Fusion Web-based Services for Ad-hoc Integrated WSNs-RFID

    Directory of Open Access Journals (Sweden)

    Falah Alshahrany

    2016-01-01

    Full Text Available The use of variety of data fusion tools and techniques for big data processing poses the problem of the data and information integration called data fusion having objectives which can differ from one application to another. The design of network data fusion systems aimed at meeting these objectives, need to take into account of the necessary synergy that can result from distributed data processing within the data networks and data centres, involving increased computation and communication. This papers reports on how this processing distribution is functionally structured as configurable integrated web-based support services, in the context of an ad-hoc wireless sensor network used for sensing and tracking, in the context of distributed detection based on complete observations to support real rime decision making. The interrelated functional and hardware RFID-WSN integration is an essential aspect of the data fusion framework that focuses on multi-sensor collaboration as an innovative approach to extend the heterogeneity of the devices and sensor nodes of ad-hoc networks generating a huge amount of heterogeneous soft and hard raw data. The deployment and configuration of these networks require data fusion processing that includes network and service management and enhances the performance and reliability of networks data fusion support systems providing intelligent capabilities for real-time control access and fire detection.

  20. Optimalization of Beacon Selection for Localization in Wireless AD-HOC Networks

    Directory of Open Access Journals (Sweden)

    Martin Matula

    2008-01-01

    Full Text Available In this paper we engage in optimalization of convenient beacons for localization position of a node in the ad-hoc network. An algorithm designed by us localizes position of moving or static node by RSS (Received Signal Strength method and trilateration. At first, localization of unknown node runs by combination of all beacons. Than optimalizating algorithmreduces the number of beacons (and repeats localization, while only three left. Its reduction is based on highest levels of received signal strength. It is only when signals are from the nearest beacons. Position localizating exactness is statistically interpreted from all localization by beacons combination and its repeating.

  1. Analysing task design and students' responses to context-based problems through different analytical frameworks

    Science.gov (United States)

    Broman, Karolina; Bernholt, Sascha; Parchmann, Ilka

    2015-05-01

    Background:Context-based learning approaches are used to enhance students' interest in, and knowledge about, science. According to different empirical studies, students' interest is improved by applying these more non-conventional approaches, while effects on learning outcomes are less coherent. Hence, further insights are needed into the structure of context-based problems in comparison to traditional problems, and into students' problem-solving strategies. Therefore, a suitable framework is necessary, both for the analysis of tasks and strategies. Purpose:The aim of this paper is to explore traditional and context-based tasks as well as students' responses to exemplary tasks to identify a suitable framework for future design and analyses of context-based problems. The paper discusses different established frameworks and applies the Higher-Order Cognitive Skills/Lower-Order Cognitive Skills (HOCS/LOCS) taxonomy and the Model of Hierarchical Complexity in Chemistry (MHC-C) to analyse traditional tasks and students' responses. Sample:Upper secondary students (n=236) at the Natural Science Programme, i.e. possible future scientists, are investigated to explore learning outcomes when they solve chemistry tasks, both more conventional as well as context-based chemistry problems. Design and methods:A typical chemistry examination test has been analysed, first the test items in themselves (n=36), and thereafter 236 students' responses to one representative context-based problem. Content analysis using HOCS/LOCS and MHC-C frameworks has been applied to analyse both quantitative and qualitative data, allowing us to describe different problem-solving strategies. Results:The empirical results show that both frameworks are suitable to identify students' strategies, mainly focusing on recall of memorized facts when solving chemistry test items. Almost all test items were also assessing lower order thinking. The combination of frameworks with the chemistry syllabus has been

  2. Are we drawing the right conclusions from randomised placebo-controlled trials? A post-hoc analysis of data from a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Bone Kerry M

    2009-06-01

    Full Text Available Abstract Background Assumptions underlying placebo controlled trials include that the placebo effect impacts on all study arms equally, and that treatment effects are additional to the placebo effect. However, these assumptions have recently been challenged, and different mechanisms may potentially be operating in the placebo and treatment arms. The objective of the current study was to explore the nature of placebo versus pharmacological effects by comparing predictors of the placebo response with predictors of the treatment response in a randomised, placebo-controlled trial of a phytotherapeutic combination for the treatment of menopausal symptoms. A substantial placebo response was observed but no significant difference in efficacy between the two arms. Methods A post hoc analysis was conducted on data from 93 participants who completed this previously published study. Variables at baseline were investigated as potential predictors of the response on any of the endpoints of flushing, overall menopausal symptoms and depression. Focused tests were conducted using hierarchical linear regression analyses. Based on these findings, analyses were conducted for both groups separately. These findings are discussed in relation to existing literature on placebo effects. Results Distinct differences in predictors were observed between the placebo and active groups. A significant difference was found for study entry anxiety, and Greene Climacteric Scale (GCS scores, on all three endpoints. Attitude to menopause was found to differ significantly between the two groups for GCS scores. Examination of the individual arms found anxiety at study entry to predict placebo response on all three outcome measures individually. In contrast, low anxiety was significantly associated with improvement in the active treatment group. None of the variables found to predict the placebo response was relevant to the treatment arm. Conclusion This study was a post hoc analysis

  3. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  4. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  5. Embedded Disposable Functionalized Electrochemical Biosensor with a 3D-Printed Flow Cell for Detection of Hepatic Oval Cells (HOCs

    Directory of Open Access Journals (Sweden)

    Samar Damiati

    2018-02-01

    Full Text Available Hepatic oval cells (HOCs are considered the progeny of the intrahepatic stem cells that are found in a small population in the liver after hepatocyte proliferation is inhibited. Due to their small number, isolation and capture of these cells constitute a challenging task for immunosensor technology. This work describes the development of a 3D-printed continuous flow system and exploits disposable screen-printed electrodes for the rapid detection of HOCs that over-express the OV6 marker on their membrane. Multiwall carbon nanotube (MWCNT electrodes have a chitosan film that serves as a scaffold for the immobilization of oval cell marker antibodies (anti-OV6-Ab, which enhance the sensitivity of the biomarker and makes the designed sensor specific for oval cells. The developed sensor can be easily embedded into the 3D-printed flow cell to allow cells to be exposed continuously to the functionalized surface. The continuous flow is intended to increase capture of most of the target cells in the specimen. Contact angle measurements were performed to characterize the nature and quality of the modified sensor surface, and electrochemical measurements (cyclic voltammetry (CV and square wave voltammetry (SWV were performed to confirm the efficiency and selectivity of the fabricated sensor to detect HOCs. The proposed method is valuable for capturing rare cells and could provide an effective tool for cancer diagnosis and detection.

  6. Embedded Disposable Functionalized Electrochemical Biosensor with a 3D-Printed Flow Cell for Detection of Hepatic Oval Cells (HOCs)

    Science.gov (United States)

    Peacock, Martin; Leonhardt, Stefan; Damiati, Laila; Baghdadi, Mohammed A.; Schuster, Bernhard

    2018-01-01

    Hepatic oval cells (HOCs) are considered the progeny of the intrahepatic stem cells that are found in a small population in the liver after hepatocyte proliferation is inhibited. Due to their small number, isolation and capture of these cells constitute a challenging task for immunosensor technology. This work describes the development of a 3D-printed continuous flow system and exploits disposable screen-printed electrodes for the rapid detection of HOCs that over-express the OV6 marker on their membrane. Multiwall carbon nanotube (MWCNT) electrodes have a chitosan film that serves as a scaffold for the immobilization of oval cell marker antibodies (anti-OV6-Ab), which enhance the sensitivity of the biomarker and makes the designed sensor specific for oval cells. The developed sensor can be easily embedded into the 3D-printed flow cell to allow cells to be exposed continuously to the functionalized surface. The continuous flow is intended to increase capture of most of the target cells in the specimen. Contact angle measurements were performed to characterize the nature and quality of the modified sensor surface, and electrochemical measurements (cyclic voltammetry (CV) and square wave voltammetry (SWV)) were performed to confirm the efficiency and selectivity of the fabricated sensor to detect HOCs. The proposed method is valuable for capturing rare cells and could provide an effective tool for cancer diagnosis and detection. PMID:29443890

  7. Embedded Disposable Functionalized Electrochemical Biosensor with a 3D-Printed Flow Cell for Detection of Hepatic Oval Cells (HOCs).

    Science.gov (United States)

    Damiati, Samar; Peacock, Martin; Leonhardt, Stefan; Damiati, Laila; Baghdadi, Mohammed A; Becker, Holger; Kodzius, Rimantas; Schuster, Bernhard

    2018-02-14

    Hepatic oval cells (HOCs) are considered the progeny of the intrahepatic stem cells that are found in a small population in the liver after hepatocyte proliferation is inhibited. Due to their small number, isolation and capture of these cells constitute a challenging task for immunosensor technology. This work describes the development of a 3D-printed continuous flow system and exploits disposable screen-printed electrodes for the rapid detection of HOCs that over-express the OV6 marker on their membrane. Multiwall carbon nanotube (MWCNT) electrodes have a chitosan film that serves as a scaffold for the immobilization of oval cell marker antibodies (anti-OV6-Ab), which enhance the sensitivity of the biomarker and makes the designed sensor specific for oval cells. The developed sensor can be easily embedded into the 3D-printed flow cell to allow cells to be exposed continuously to the functionalized surface. The continuous flow is intended to increase capture of most of the target cells in the specimen. Contact angle measurements were performed to characterize the nature and quality of the modified sensor surface, and electrochemical measurements (cyclic voltammetry (CV) and square wave voltammetry (SWV)) were performed to confirm the efficiency and selectivity of the fabricated sensor to detect HOCs. The proposed method is valuable for capturing rare cells and could provide an effective tool for cancer diagnosis and detection.

  8. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  9. Reducing Congestion in Obstructed Highways with Traffic Data Dissemination Using Ad hoc Vehicular Networks

    OpenAIRE

    Thomas D. Hewer; Maziar Nekovee; Peter V. Coveney

    2010-01-01

    Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITSs) and location-aware services. The ability to disseminate information in an ad hoc fashion allows pertinent information to propagate faster through a network. In the realm of ITS, the ability to spread warning information faster and further is of great advantage to receivers. In this paper we propose and present a message-dissemination procedure that uses vehicular wireless protocols to influence...

  10. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  11. EFECTO DE LOS OBSTÁCULOS TIPO POLIMERO RESINA EN RENDIMIENTO DE REDES TCP/IP/IEEE 802.11g MODO AD-HOC

    OpenAIRE

    Márquez Barriobero, David

    2011-01-01

    La investigación tiene como objetivo primordial el desarrollo de un modelo matemático para evaluar el efecto de los obstáculos de tipo polímero resina en el rendimiento de redes TCP/IP/IEEE 802.11g modo ad-hoc; esto con el propósito de establecer la relación existente entre el diámetro de los obstáculos de tipo polímero resina y el rendimiento de una red inalámbrica en modo ad-hoc, al transmitir datos vía protocolo FTP. El tipo de investigación es explicativa con un diseño experimental. Los t...

  12. Patterns and processes of Mycobacterium bovis evolution revealed by phylogenomic analyses

    Science.gov (United States)

    Mycobacterium bovis is an important animal pathogen worldwide that parasitizes wild and domesticated vertebrate livestock as well as humans. A comparison of the five M. bovis complete genomes from UK, South Korea, Brazil and USA revealed four novel large-scale structural variations of at least 2,000...

  13. Pseudo-Coherence-Based MVDR Beamformer for Speech Enhancement with Ad Hoc Microphone Arrays

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Christensen, Mads Græsbøll

    2015-01-01

    Speech enhancement with distributed arrays has been met with various methods. On the one hand, data independent methods require information about the position of sensors, so they are not suitable for dynamic geometries. On the other hand, Wiener-based methods cannot assure a distortionless output....... This paper proposes minimum variance distortionless response filtering based on multichannel pseudo-coherence for speech enhancement with ad hoc microphone arrays. This method requires neither position information nor control of the trade-off used in the distortion weighted methods. Furthermore, certain...

  14. A time-based admission control mechanism for IEEE 802.11 ad Hoc networks

    OpenAIRE

    Costa, Luís Henrique M. K.; Cerveira, Carlos Rodrigo

    2006-01-01

    This paper presents a time-based admission control mechanism (TAC) for IEEE 802.11 ad hoc networks. The proposed mechanism was adapted to the QoS AODV routing protocol, which takes the quality of service requirements of the data flow into account in the route discovery process. TAC-AODV estimates the idle time of the physical medium based on the frames listened. The incoming traffic is admitted according to the offered load as well as the intra-flow interference, calculated based on the numbe...

  15. Integrated in silico Analyses of Regulatory and Metabolic Networks of Synechococcus sp. PCC 7002 Reveal Relationships between Gene Centrality and Essentiality

    Directory of Open Access Journals (Sweden)

    Hyun-Seob Song

    2015-03-01

    Full Text Available Cyanobacteria dynamically relay environmental inputs to intracellular adaptations through a coordinated adjustment of photosynthetic efficiency and carbon processing rates. The output of such adaptations is reflected through changes in transcriptional patterns and metabolic flux distributions that ultimately define growth strategy. To address interrelationships between metabolism and regulation, we performed integrative analyses of metabolic and gene co-expression networks in a model cyanobacterium, Synechococcus sp. PCC 7002. Centrality analyses using the gene co-expression network identified a set of key genes, which were defined here as “topologically important.” Parallel in silico gene knock-out simulations, using the genome-scale metabolic network, classified what we termed as “functionally important” genes, deletion of which affected growth or metabolism. A strong positive correlation was observed between topologically and functionally important genes. Functionally important genes exhibited variable levels of topological centrality; however, the majority of topologically central genes were found to be functionally essential for growth. Subsequent functional enrichment analysis revealed that both functionally and topologically important genes in Synechococcus sp. PCC 7002 are predominantly associated with translation and energy metabolism, two cellular processes critical for growth. This research demonstrates how synergistic network-level analyses can be used for reconciliation of metabolic and gene expression data to uncover fundamental biological principles.

  16. Post-hoc analysis of MCI186-17, the extension study to MCI186-16, the confirmatory double-blind, parallel-group, placebo-controlled study of edaravone in amyotrophic lateral sclerosis.

    Science.gov (United States)

    Takahashi, Fumihiro; Takei, Koji; Tsuda, Kikumi; Palumbo, Joseph

    2017-10-01

    In the 24-week double-blind study of edaravone in ALS (MCI186-16), edaravone did not show a statistically significant difference versus placebo for the primary efficacy endpoint. For post-hoc analyses, two subpopulations were identified in which edaravone might be expected to show efficacy: the efficacy-expected subpopulation (EESP), defined by scores of ≥2 points on all 12 items of the ALS Functional Rating Scale-Revised (ALSFRS-R) and a percent predicted forced vital capacity (%FVC) ≥80% at baseline; and the definite/probable EESP 2 years (dpEESP2y) subpopulation which, in addition to EESP criteria, had definite or probable ALS diagnosed by El Escorial revised criteria, and disease duration of ≤2 years. In the 36-week extension study of MCI186-16, a 24-week double-blind comparison followed by 12 weeks of open-label edaravone (MCI186-17; NCT00424463), analyses of ALSFRS-R scores of the edaravone-edaravone group and edaravone-placebo group for the full analysis set (FAS) and EESP, as prospectively defined, were reported in a previous article. Here we additionally report results in patients who met dpEESP2y criteria at the baseline of MCI186-16. In the dpEESP2y, the difference in ALSFRS-R changes from 24 to 48 weeks between the edaravone-edaravone and edaravone-placebo groups was 2.79 (p = 0.0719), which was greater than the differences previously reported for the EESP and the FAS. The pattern of adverse events in the dpEESP2y did not show any additional safety findings to those from the earlier prospective study. In conclusion, this post-hoc analysis suggests a potential effect of edaravone between 24 and 48 weeks in patients meeting dpEESP2y criteria at baseline.

  17. A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Niranjan Kumar Ray

    2016-01-01

    Full Text Available We proposed an energy conservation technique called Location Based Topology Control with Sleep Scheduling for ad hoc networks. It uses the feature of both topology control approach and power management approach. Like the topology control approach, it attempts to reduce the transmission power of a node, which is determined from its neighborhood location information. A node goes to sleep state based on the traffic condition as that of power management approach. In the proposed scheme, a node goes to sleep state only when its absence does not create local partition in its neighborhood. We preformed extensive simulation to compare the proposed scheme with existing ones. Simulation results show that the energy consumption is lower with increase in the network lifetime and higher throughput in the proposed scheme.

  18. Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yen-Chieh Ouyang

    2010-02-01

    Full Text Available This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks.

  19. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  20. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  1. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  2. Revealing climate modes in steric sea levels: lessons learned from satellite geodesy, objective analyses and ocean reanalyses

    Science.gov (United States)

    Pfeffer, J.; Tregoning, P.; Purcell, A. P.

    2017-12-01

    Due to increased greenhouse gases emissions, the oceans are accumulating heat. In response to the ocean circulation and atmospheric forcing, the heat is irregularly redistributed within the oceans, causing sea level to rise at variable rates in space and time. These rates of steric expansion are extremely difficult to assess because of the sparsity of in-situ hydrographic observations available within the course of the 20th century. We compare here three methods to reconstruct the steric sea levels over the past 13, 25 and 58 years based on satellite geodesy, objective analyses and ocean reanalyses. The interannual to decadal variability of each dataset is explored with a model merging six climate indices representative of the natural variability of the ocean and climate system. Consistent regional patterns are identified for the Pacific Decadal Oscillation (PDO) and El Niño Southern Oscillation (ENSO) in all datasets at all timescales. Despite the short time coverage (13 years), the combination of satellite geodetic data (altimetry and GRACE) also reveals significant steric responses to the North Pacific Gyre Oscillation (NPGO), Indian Dipole (IOD) and Indian ocean basinwide (IOBM) mode. The richer information content in the ocean reanalyses allows us to recover the regional fingerprints of the PDO, ENSO, NPGO, IOD and IOBM, but also of the Atlantic Multidecadal Oscillation (AMO) acting over longer time scales (40 to 60 years). Therefore, ocean reanalyses, coupled with climate mode analyses, constitute innovative and promising tools to investigate the mechanisms triggering the variability of sea level rise over the past decades.

  3. Genome-wide Comparative Analyses Reveal the Dynamic Evolution of Nucleotide-Binding Leucine-Rich Repeat Gene Family among Solanaceae Plants

    Directory of Open Access Journals (Sweden)

    Eunyoung Seo

    2016-08-01

    Full Text Available Plants have evolved an elaborate innate immune system against invading pathogens. Within this system, intracellular nucleotide-binding leucine-rich repeat (NLR immune receptors are known play critical roles in effector-triggered immunity (ETI plant defense. We performed genome-wide identification and classification of NLR-coding sequences from the genomes of pepper, tomato, and potato using fixed criteria. We then compared genomic duplication and evolution features. We identified intact 267, 443, and 755 NLR-encoding genes in tomato, potato, and pepper genomes, respectively. Phylogenetic analyses and classification of Solanaceae NLRs revealed that the majority of NLR super family members fell into 14 subgroups, including a TIR-NLR (TNL subgroup and 13 non-TNL subgroups. Specific subgroups have expanded in each genome, with the expansion in pepper showing subgroup-specific physical clusters. Comparative analysis of duplications showed distinct duplication patterns within pepper and among Solanaceae plants suggesting subgroup- or species-specific gene duplication events after speciation, resulting in divergent evolution. Taken together, genome-wide analyses of NLR family members provide insights into their evolutionary history in Solanaceae. These findings also provide important foundational knowledge for understanding NLR evolution and will empower broader characterization of disease resistance genes to be used for crop breeding.

  4. Bibliometric Analyses Reveal Patterns of Collaboration between ASMS Members

    Science.gov (United States)

    Palmblad, Magnus; van Eck, Nees Jan

    2018-03-01

    We have explored the collaborative network of the current American Society for Mass Spectrometry (ASMS) membership using bibliometric methods. The analysis shows that 4249 members are connected in a single, large, co-authorship graph, including the majority of the most published authors in the field of mass spectrometry. The map reveals topographical differences between university groups and national laboratories, and that the co-authors with the strongest links have long worked together at the same location. We have collected and summarized information on the geographical distribution of members, showing a high coverage of active researchers in North America and Western Europe. Looking at research fields, we could also identify a number of new or `hot' topics among ASMS members. Interactive versions of the maps are available on-line at https://goo.gl/UBNFMQ (collaborative network) and https://goo.gl/WV25vm (research topics). [Figure not available: see fulltext.

  5. Iron homeostasis in Arabidopsis thaliana: transcriptomic analyses reveal novel FIT-regulated genes, iron deficiency marker genes and functional gene networks.

    Science.gov (United States)

    Mai, Hans-Jörg; Pateyron, Stéphanie; Bauer, Petra

    2016-10-03

    FIT (FER-LIKE IRON DEFICIENCY-INDUCED TRANSCRIPTION FACTOR) is the central regulator of iron uptake in Arabidopsis thaliana roots. We performed transcriptome analyses of six day-old seedlings and roots of six week-old plants using wild type, a fit knock-out mutant and a FIT over-expression line grown under iron-sufficient or iron-deficient conditions. We compared genes regulated in a FIT-dependent manner depending on the developmental stage of the plants. We assembled a high likelihood dataset which we used to perform co-expression and functional analysis of the most stably iron deficiency-induced genes. 448 genes were found FIT-regulated. Out of these, 34 genes were robustly FIT-regulated in root and seedling samples and included 13 novel FIT-dependent genes. Three hundred thirty-one genes showed differential regulation in response to the presence and absence of FIT only in the root samples, while this was the case for 83 genes in the seedling samples. We assembled a virtual dataset of iron-regulated genes based on a total of 14 transcriptomic analyses of iron-deficient and iron-sufficient wild-type plants to pinpoint the best marker genes for iron deficiency and analyzed this dataset in depth. Co-expression analysis of this dataset revealed 13 distinct regulons part of which predominantly contained functionally related genes. We could enlarge the list of FIT-dependent genes and discriminate between genes that are robustly FIT-regulated in roots and seedlings or only in one of those. FIT-regulated genes were mostly induced, few of them were repressed by FIT. With the analysis of a virtual dataset we could filter out and pinpoint new candidates among the most reliable marker genes for iron deficiency. Moreover, co-expression and functional analysis of this virtual dataset revealed iron deficiency-induced and functionally distinct regulons.

  6. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  7. Robotic disaster recovery efforts with ad-hoc deployable cloud computing

    Science.gov (United States)

    Straub, Jeremy; Marsh, Ronald; Mohammad, Atif F.

    2013-06-01

    Autonomous operations of search and rescue (SaR) robots is an ill posed problem, which is complexified by the dynamic disaster recovery environment. In a typical SaR response scenario, responder robots will require different levels of processing capabilities during various parts of the response effort and will need to utilize multiple algorithms. Placing these capabilities onboard the robot is a mediocre solution that precludes algorithm specific performance optimization and results in mediocre performance. Architecture for an ad-hoc, deployable cloud environment suitable for use in a disaster response scenario is presented. Under this model, each service provider is optimized for the task and maintains a database of situation-relevant information. This service-oriented architecture (SOA 3.0) compliant framework also serves as an example of the efficient use of SOA 3.0 in an actual cloud application.

  8. Making friends on the fly advances in ad hoc teamwork

    CERN Document Server

    Barrett, Samuel

    2015-01-01

    This book is devoted to the encounter and interaction of agents such as robots with other agents and describes how they cooperate with their previously unknown teammates, forming an Ad Hoc team. It presents a new algorithm, PLASTIC, that allows agents to quickly adapt to new teammates by reusing knowledge learned from previous teammates.  PLASTIC is instantiated in both a model-based approach, PLASTIC-Model, and a policy-based approach, PLASTIC-Policy.  In addition to reusing knowledge learned from previous teammates, PLASTIC also allows users to provide expert-knowledge and can use transfer learning (such as the new TwoStageTransfer algorithm) to quickly create models of new teammates when it has some information about its new teammates. The effectiveness of the algorithm is demonstrated on three domains, ranging from multi-armed bandits to simulated robot soccer games.

  9. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  10. Race Differences in Diet Quality of Urban Food-Insecure Blacks and Whites Reveals Resiliency in Blacks.

    Science.gov (United States)

    Allen, Allyssa J; Kuczmarski, Marie Fanelli; Evans, Michele K; Zonderman, Alan B; Waldstein, Shari R

    2016-12-01

    Evidence from epidemiological studies shows a link between food insecurity and diet intake or quality. However, the moderating effect of race in this relation has not yet been studied. Food insecurity (USDA Food Security Module) and diet quality (Healthy Eating Index-2010; HEI) were measured in 1741 participants from the Healthy Aging in Neighborhoods of Diversity across the Life Span (HANDLS) study. Data were collected from 2004 to 2009 and analyzed in 2014. Multivariable regression assessed the interaction of race and food insecurity on HEI scores, adjusting for age, sex, poverty status, single parent status, drug, alcohol and cigarette use, and comorbid diseases. The interaction of food insecurity and race was significantly associated with diet quality (p = 0.001). In the absence of food insecurity, HEI scores were similar across race. However, with each food insecurity item endorsed, HEI scores were substantially lower for Whites compared to Blacks. An ad hoc analysis revealed that Blacks were more likely than Whites to participate in SNAP (p race stratified analyses revealed that Blacks participating in SNAP showed diminished associations of food insecurity with diet quality. Study findings provide the first evidence that the influence of food insecurity on diet quality may be potentiated for Whites, but not Blacks. Additionally, results show that Blacks are more likely to participate in SNAP and show attendant buffering of the effects of food insecurity on diet quality. These findings may have important implications for understanding how food insecurity affects diet quality differentially by race.

  11. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  12. A Rate-Adaptive MAC Protocol Based on TCP throughput for Ad Hoc Networks in Fading Channels

    Directory of Open Access Journals (Sweden)

    Shoko Uchida

    2008-10-01

    Full Text Available Wireless technology is becoming a leading option for future Internet access. Transmission Control Protocol (TCP is one of the protocols designed on the basis of the transmission characteristics in wired networks. It is known that the TCP performance deteriorates drastically under a wireless communication environment. On the other hand, many wireless networking standards such as IEEE 802.11a, 802.11b, and 802.11g have multirate capability. Therefore, adaptive rate control methods have been proposed for ad hoc networks. However, almost methods require the modification of the request to send (RTS and clear to send (CTS packets. Therefore, the conventional methods are not compatible with the standardized system. In this paper, we propose adaptive rate control mechanisms for ad hoc networks. Our mechanisms are based on the RTS/CTS mechanisms. However, no modifications to the RTS and CTS packets are required in the proposed method. Therefore, our proposed method can attempt to satisfy the conventional IEEE 802.11 standards. Moreover, an adequate transmission rate is selected based on an estimated TCP throughput performance. From simulation results, it is observed that the proposed method can improve the throughput performance without any modification of packet structures.

  13. Dating currency crises with ad hoc and extreme value-based thresholds : East Asia 1970-2002 [dating currency crises

    NARCIS (Netherlands)

    Lestano, L; Jacobs, Jan P. A. M.

    2007-01-01

    Generally a currency crisis is defined to occur if an index of currency pressure exceeds a threshold. This paper compares currency crisis dating methods. For two definitions of currency pressure we contrast ad hoc and extreme value-based thresholds. We illustrate the methods with data of six East

  14. Interspecies introgressive hybridization in spiny frogs Quasipaa (Family Dicroglossidae) revealed by analyses on multiple mitochondrial and nuclear genes.

    Science.gov (United States)

    Zhang, Qi-Peng; Hu, Wen-Fang; Zhou, Ting-Ting; Kong, Shen-Shen; Liu, Zhi-Fang; Zheng, Rong-Quan

    2018-01-01

    Introgression may lead to discordant patterns of variation among loci and traits. For example, previous phylogeographic studies on the genus Quasipaa detected signs of genetic introgression from genetically and morphologically divergent Quasipaa shini or Quasipaa spinosa . In this study, we used mitochondrial and nuclear DNA sequence data to verify the widespread introgressive hybridization in the closely related species of the genus Quasipaa , evaluate the level of genetic diversity, and reveal the formation mechanism of introgressive hybridization. In Longsheng, Guangxi Province, signs of asymmetrical nuclear introgression were detected between Quasipaa boulengeri and Q. shini . Unidirectional mitochondrial introgression was revealed from Q. spinosa to Q. shini . By contrast, bidirectional mitochondrial gene introgression was detected between Q. spinosa and Q. shini in Lushan, Jiangxi Province. Our study also detected ancient hybridizations between a female Q. spinosa and a male Q. jiulongensis in Zhejiang Province. Analyses on mitochondrial and nuclear genes verified three candidate cryptic species in Q. spinosa , and a cryptic species may also exist in Q. boulengeri . However, no evidence of introgressive hybridization was found between Q. spinosa and Q. boulengeri . Quasipaa exilispinosa from all the sampling localities appeared to be deeply divergent from other communities. Our results suggest widespread introgressive hybridization in closely related species of Quasipaa and provide a fundamental basis for illumination of the forming mechanism of introgressive hybridization, classification of species, and biodiversity assessment in Quasipaa .

  15. Comprehensive analyses of imprinted differentially methylated regions reveal epigenetic and genetic characteristics in hepatoblastoma

    International Nuclear Information System (INIS)

    Rumbajan, Janette Mareska; Aoki, Shigehisa; Kohashi, Kenichi; Oda, Yoshinao; Hata, Kenichiro; Saji, Tsutomu; Taguchi, Tomoaki; Tajiri, Tatsuro; Soejima, Hidenobu; Joh, Keiichiro; Maeda, Toshiyuki; Souzaki, Ryota; Mitsui, Kazumasa; Higashimoto, Ken; Nakabayashi, Kazuhiko; Yatsuki, Hitomi; Nishioka, Kenichi; Harada, Ryoko

    2013-01-01

    Aberrant methylation at imprinted differentially methylated regions (DMRs) in human 11p15.5 has been reported in many tumors including hepatoblastoma. However, the methylation status of imprinted DMRs in imprinted loci scattered through the human genome has not been analyzed yet in any tumors. The methylation statuses of 33 imprinted DMRs were analyzed in 12 hepatoblastomas and adjacent normal liver tissue by MALDI-TOF MS and pyrosequencing. Uniparental disomy (UPD) and copy number abnormalities were investigated with DNA polymorphisms. Among 33 DMRs analyzed, 18 showed aberrant methylation in at least 1 tumor. There was large deviation in the incidence of aberrant methylation among the DMRs. KvDMR1 and IGF2-DMR0 were the most frequently hypomethylated DMRs. INPP5Fv2-DMR and RB1-DMR were hypermethylated with high frequencies. Hypomethylation was observed at certain DMRs not only in tumors but also in a small number of adjacent histologically normal liver tissue, whereas hypermethylation was observed only in tumor samples. The methylation levels of long interspersed nuclear element-1 (LINE-1) did not show large differences between tumor tissue and normal liver controls. Chromosomal abnormalities were also found in some tumors. 11p15.5 and 20q13.3 loci showed the frequent occurrence of both genetic and epigenetic alterations. Our analyses revealed tumor-specific aberrant hypermethylation at some imprinted DMRs in 12 hepatoblastomas with additional suggestion for the possibility of hypomethylation prior to tumor development. Some loci showed both genetic and epigenetic alterations with high frequencies. These findings will aid in understanding the development of hepatoblastoma

  16. Three genetic stocks of frigate tuna Auxis thazard thazard (Lacepede, 1800) along the Indian coast revealed from sequence analyses of mitochondrial DNA D-loop region

    Digital Repository Service at National Institute of Oceanography (India)

    GirishKumar; Kunal, S.P.; Menezes, M.R.; Meena, R.M.

    revealed from sequence analyses of mitochondrial DNA D-loop region Name of authors: 1. Girish Kumar* Biological Oceanography Division (BOD) National Institute of Oceanography (NIO) Dona Paula, Goa 403004, India. Email: girishkumar....nio@gmail.com Tel: +919766548060 2. Swaraj Priyaranjan Kunal Biological Oceanography Division (BOD) National Institute of Oceanography (NIO) Dona Paula, Goa 403004, India. Email: swar.mbt@gmail.com 3. Maria Rosalia Menezes Biological Oceanography...

  17. Novel store–carry–forward scheme for message dissemination in vehicular ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Truc D.T. Nguyen

    2017-12-01

    Full Text Available To improve traffic safety in intelligent transportation systems, vehicles formed by vehicular ad-hoc networks (VANETs conventionally disseminate warning messages to their nearby vehicles as soon as a dangerous situation occurs. In this paper, we propose a novel scheme employing a novel story–carry–forward (SCF mechanism to tackle the network partition and broadcast storm problems, which are two major challenges in VANETs. The experimental result in the Veins simulation framework shows that the proposed SCF scheme significantly mitigates broadcast storms relative to other schemes, and maintains good coverage across various traffic densities.

  18. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  19. TRIBUNALES PENALES INTERNACIONALES AD HOC DEL POST-GUERRA FRÍA: CAMBIANDO PARADIGMAS EN EL TRATAMIENTO DE CUESTIONES DE GÉNERO

    Directory of Open Access Journals (Sweden)

    Camila Soares Lippi

    2011-12-01

    Full Text Available Analizaremos como la jurisprudencia de los Tribunales Penales Internacionales ad hoc del post-Guerra Fría representa un cambio de paradigmas en cuestiones de género en el Derecho Penal Internacional y en el Derecho Internacional Humanitario. Para eso, partimos del concepto de género, o sea, las construcciones sociales cuanto a los roles masculino y femenino, como categoría central de análisis. Analizamos, primeramente, el post-Segunda Guerra Mundial. Ese momento histórico, ejemplificado por los Tribunales de Núremberg y de Tokio y por los Convenios de Ginebra de 1949. Después analizase los Tribunales Penales Internacionales ad hoc del post-Guerra Fría. Finalmente, analizamos la definición de género en el Estatuto de Roma, que instituye el Tribunal Penal Internacional.

  20. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  1. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  2. Post-hoc principal component analysis on a largely illiterate elderly population from North-west India to identify important elements of mini-mental state examination.

    Science.gov (United States)

    Raina, Sunil Kumar; Chander, Vishav; Raina, Sujeet; Grover, Ashoo

    2016-01-01

    Mini-mental state examination (MMSE) scale measures cognition using specific elements that can be isolated, defined, and subsequently measured. This study was conducted with the aim to analyze the factorial structure of MMSE in a largely, illiterate, elderly population in India and to reduce the number of variables to a few meaningful and interpretable combinations. Principal component analysis (PCA) was performed post-hoc on the data generated by a research project conducted to estimate the prevalence of dementia in four geographically defined habitations in Himachal Pradesh state of India. Questions on orientation and registration account for high percentage of cumulative variance in comparison to other questions. The PCA conducted on the data derived from a largely, illiterate population reveals that the most important components to consider for the estimation of cognitive impairment in illiterate Indian population are temporal orientation, spatial orientation, and immediate memory.

  3. Post-hoc principal component analysis on a largely illiterate elderly population from North-west India to identify important elements of mini-mental state examination

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Raina

    2016-01-01

    Full Text Available Background: Mini-mental state examination (MMSE scale measures cognition using specific elements that can be isolated, defined, and subsequently measured. This study was conducted with the aim to analyze the factorial structure of MMSE in a largely, illiterate, elderly population in India and to reduce the number of variables to a few meaningful and interpretable combinations. Methodology: Principal component analysis (PCA was performed post-hoc on the data generated by a research project conducted to estimate the prevalence of dementia in four geographically defined habitations in Himachal Pradesh state of India. Results: Questions on orientation and registration account for high percentage of cumulative variance in comparison to other questions. Discussion: The PCA conducted on the data derived from a largely, illiterate population reveals that the most important components to consider for the estimation of cognitive impairment in illiterate Indian population are temporal orientation, spatial orientation, and immediate memory.

  4. Genome and metagenome enabled analyses reveal new insight into the global biogeography and potential urea utilization in marine Thaumarchaeota.

    Science.gov (United States)

    Ahlgren, N.; Parada, A. E.; Fuhrman, J. A.

    2016-02-01

    Marine Thaumarchaea are an abundant, important group of marine microbial communities as they fix carbon, oxidize ammonium, and thus contribute to key N and C cycles in the oceans. From an enrichment culture, we have sequenced the complete genome of a new Thaumarchaeota strain, SPOT01. Analysis of this genome and other Thaumarchaeal genomes contributes new insight into its role in N cycling and clarifies the broader biogeography of marine Thaumarchaeal genera. Phylogenomics of Thaumarchaeota genomes reveal coherent separation into clusters roughly equivalent to the genus level, and SPOT01 represents a new genus of marine Thaumarchaea. Competitive fragment recruitment of globally distributed metagenomes from TARA, Ocean Sampling Day, and those generated from a station off California shows that the SPOT01 genus is often the most abundant genus, especially where total Thaumarchaea are most abundant in the overall community. The SPOT01 genome contains urease genes allowing it to use an alternative form of N. Genomic and metagenomic analysis also reveal that among planktonic genomes and populations, the urease genes in general are more frequently found in members of the SPOT01 genus and another genus dominant in deep waters, thus we predict these two genera contribute most significantly to urea utilization among marine Thaumarchaea. Recruitment also revealed broader biogeographic and ecological patterns of the putative genera. The SPOT01 genus was most abundant at colder temperatures (45 degrees). The genus containing Nitrosopumilus maritimus had the highest temperature range, and the genus containing Candidatus Nitrosopelagicus brevis was typically most abundant at intermediate temperatures and intermediate latitudes ( 35-45 degrees). Together these genome and metagenome enabled analyses provide significant new insight into the ecology and biogeochemical contributions of marine archaea.

  5. Proteomic and physiological analyses reveal the role of exogenous spermidine on cucumber roots in response to Ca(NO3)2 stress.

    Science.gov (United States)

    Du, Jing; Guo, Shirong; Sun, Jin; Shu, Sheng

    2018-05-01

    The mechanism of exogenous Spd-induced Ca(NO 3 ) 2 stress tolerance in cucumber was studied by proteomics and physiological analyses. Protein-protein interaction network revealed 13 key proteins involved in Spd-induced Ca(NO 3 ) 2 stress resistance. Ca(NO 3 ) 2 stress is one of the major reasons for secondary salinization that limits cucumber plant development in greenhouse. The conferred protective role of exogenous Spd on cucumber in response to Ca(NO 3 ) 2 stress cues involves changes at the cellular and physiological levels. To investigate the molecular foundation of exogenous Spd in Ca(NO 3 ) 2 stress tolerance, a proteomic approach was performed in our work. After a 9 days period of Ca(NO 3 ) 2 stress and/or exogenous Spd, 71 differential protein spots were confidently identified. The resulting proteins were enriched in seven different categories of biological processes, including protein metabolism, carbohydrate and energy metabolism, ROS homeostasis and stress defense, cell wall related, transcription, others and unknown. Protein metabolism (31.2%), carbohydrate and energy metabolism (15.6%), ROS homeostasis and stress defense (32.5%) were the three largest functional categories in cucumber root and most of them were significantly increased by exogenous Spd. The Spd-responsive protein interaction network revealed 13 key proteins, whose accumulation changes could be critical for Spd-induced resistance; all 13 proteins were upregulated by Spd at transcriptional and protein levels in response to Ca(NO 3 ) 2 stress. Furthermore, accumulation of antioxidant enzymes, non-enzymatic antioxidant and polyamines, along with reduction of H 2 O 2 and MDA, were detected after exogenous Spd application during Ca(NO 3 ) 2 stress. The results of these proteomic and physiological analyses in cucumber root may facilitate a better understanding of the underlying mechanism of Ca(NO 3 ) 2 stress tolerance mediated by exogenous Spd.

  6. Development of Super-Ensemble techniques for ocean analyses: the Mediterranean Sea case

    Science.gov (United States)

    Pistoia, Jenny; Pinardi, Nadia; Oddo, Paolo; Collins, Matthew; Korres, Gerasimos; Drillet, Yann

    2017-04-01

    Short-term ocean analyses for Sea Surface Temperature SST in the Mediterranean Sea can be improved by a statistical post-processing technique, called super-ensemble. This technique consists in a multi-linear regression algorithm applied to a Multi-Physics Multi-Model Super-Ensemble (MMSE) dataset, a collection of different operational forecasting analyses together with ad-hoc simulations produced by modifying selected numerical model parameterizations. A new linear regression algorithm based on Empirical Orthogonal Function filtering techniques is capable to prevent overfitting problems, even if best performances are achieved when we add correlation to the super-ensemble structure using a simple spatial filter applied after the linear regression. Our outcomes show that super-ensemble performances depend on the selection of an unbiased operator and the length of the learning period, but the quality of the generating MMSE dataset has the largest impact on the MMSE analysis Root Mean Square Error (RMSE) evaluated with respect to observed satellite SST. Lower RMSE analysis estimates result from the following choices: 15 days training period, an overconfident MMSE dataset (a subset with the higher quality ensemble members), and the least square algorithm being filtered a posteriori.

  7. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Peng Li

    2014-11-01

    Full Text Available In vehicular ad hoc networks, roadside units (RSUs placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU and wireless RSU (w-RSU. c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods.

  8. Dynamic functional connectivity analysis reveals transient states of dysconnectivity in schizophrenia

    Directory of Open Access Journals (Sweden)

    E. Damaraju

    2014-01-01

    . Group differences are weak or absent during other connectivity states. Dynamic analysis also revealed hypoconnectivity between the putamen and sensory networks during the same states of thalamic hyperconnectivity; notably, this finding cannot be observed in the static connectivity analysis. Finally, in post-hoc analyses we observed that the relationships between sub-cortical low frequency power and connectivity with sensory networks is altered in patients, suggesting different functional interactions between sub-cortical nuclei and sensorimotor cortex during specific connectivity states. While important differences between patients with schizophrenia and healthy controls have been identified, one should interpret the results with caution given the history of medication in patients. Taken together, our results support and expand current knowledge regarding dysconnectivity in schizophrenia, and strongly advocate the use of dynamic analyses to better account for and understand functional connectivity differences.

  9. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    Science.gov (United States)

    Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  10. Optimum Combining for Rapidly Fading Channels in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Sonia Furman

    2003-10-01

    Full Text Available Research and technology in wireless communication systems such as radar and cellular networks have successfully implemented alternative design approaches that utilize antenna array techniques such as optimum combining, to mitigate the degradation effects of multipath in rapid fading channels. In ad hoc networks, these methods have not yet been exploited primarily due to the complexity inherent in the network's architecture. With the high demand for improved signal link quality, devices configured with omnidirectional antennas can no longer meet the growing need for link quality and spectrum efficiency. This study takes an empirical approach to determine an optimum combining antenna array based on 3 variants of interelement spacing. For rapid fading channels, the simulation results show that the performance in the network of devices retrofitted with our antenna arrays consistently exceeded those with an omnidirectional antenna. Further, with the optimum combiner, the performance increased by over 60% compared to that of an omnidirectional antenna in a rapid fading channel.

  11. Comparative Analyses of Nonpathogenic, Opportunistic, and Totally Pathogenic Mycobacteria Reveal Genomic and Biochemical Variabilities and Highlight the Survival Attributes of Mycobacterium tuberculosis

    Science.gov (United States)

    Singh, Yadvir; Kohli, Sakshi; Ahmad, Javeed; Ehtesham, Nasreen Z.; Tyagi, Anil K.

    2014-01-01

    ABSTRACT Mycobacterial evolution involves various processes, such as genome reduction, gene cooption, and critical gene acquisition. Our comparative genome size analysis of 44 mycobacterial genomes revealed that the nonpathogenic (NP) genomes were bigger than those of opportunistic (OP) or totally pathogenic (TP) mycobacteria, with the TP genomes being smaller yet variable in size—their genomic plasticity reflected their ability to evolve and survive under various environmental conditions. From the 44 mycobacterial species, 13 species, representing TP, OP, and NP, were selected for genomic-relatedness analyses. Analysis of homologous protein-coding genes shared between Mycobacterium indicus pranii (NP), Mycobacterium intracellulare ATCC 13950 (OP), and Mycobacterium tuberculosis H37Rv (TP) revealed that 4,995 (i.e., ~95%) M. indicaus pranii proteins have homology with M. intracellulare, whereas the homologies among M. indicus pranii, M. intracellulare ATCC 13950, and M. tuberculosis H37Rv were significantly lower. A total of 4,153 (~79%) M. indicus pranii proteins and 4,093 (~79%) M. intracellulare ATCC 13950 proteins exhibited homology with the M. tuberculosis H37Rv proteome, while 3,301 (~82%) and 3,295 (~82%) M. tuberculosis H37Rv proteins showed homology with M. indicus pranii and M. intracellulare ATCC 13950 proteomes, respectively. Comparative metabolic pathway analyses of TP/OP/NP mycobacteria showed enzymatic plasticity between M. indicus pranii (NP) and M. intracellulare ATCC 13950 (OP), Mycobacterium avium 104 (OP), and M. tuberculosis H37Rv (TP). Mycobacterium tuberculosis seems to have acquired novel alternate pathways with possible roles in metabolism, host-pathogen interactions, virulence, and intracellular survival, and by implication some of these could be potential drug targets. PMID:25370496

  12. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  13. Bliss and Loewe interaction analyses of clinically relevant drug combinations in human colon cancer cell lines reveal complex patterns of synergy and antagonism.

    Science.gov (United States)

    Kashif, Muhammad; Andersson, Claes; Mansoori, Sharmineh; Larsson, Rolf; Nygren, Peter; Gustafsson, Mats G

    2017-11-28

    We analyzed survival effects for 15 different pairs of clinically relevant anti-cancer drugs in three iso-genic pairs of human colorectal cancer carcinoma cell lines, by applying for the first time our novel software (R package) called COMBIA. In our experiments iso-genic pairs of cell lines were used, differing only with respect to a single clinically important KRAS or BRAF mutation. Frequently, concentration dependent but mutation independent joint Bliss and Loewe synergy/antagonism was found statistically significant. Four combinations were found synergistic/antagonistic specifically to the parental (harboring KRAS or BRAF mutation) cell line of the corresponding iso-genic cell lines pair. COMBIA offers considerable improvements over established software for synergy analysis such as MacSynergy™ II as it includes both Bliss (independence) and Loewe (additivity) analyses, together with a tailored non-parametric statistical analysis employing heteroscedasticity, controlled resampling, and global (omnibus) testing. In many cases Loewe analyses found significant synergistic as well as antagonistic effects in a cell line at different concentrations of a tested drug combination. By contrast, Bliss analysis found only one type of significant effect per cell line. In conclusion, the integrated Bliss and Loewe interaction analysis based on non-parametric statistics may provide more robust interaction analyses and reveal complex patterns of synergy and antagonism.

  14. Halogenated organic contaminants (HOCs) in sediment from a highly eutrophicated lake, China: occurrence, distribution and mass inventories.

    Science.gov (United States)

    Wang, Ji-Zhong; Liu, Liang-Ying; Zhang, Kai; Liang, Bo; Li, Guo-Lian; Chen, Tian-Hu

    2012-11-01

    Halogenated organic contaminants (HOCs) including 16 polybrominated diphenyl ethers (PBDEs) and 37 polychlorinated biphenyls (PCBs) were determined in 49 surfacial sediments from Chaohu Lake, a highly eutrophicated lake, China. PBDEs were detected in almost samples with the range of the total concentration (defined as Σ(16)PBDEs) from 0.84 to 86.6 ng g(-1). Compared with the occurrence of PBDEs in Pearl River Delta and Yangtze River Delta in China, lower percentage of BDE-209 over the concentration of Σ(16)PBDEs was inferred by the high-volume application of penta-BDE mixture product for local domestic furniture purpose. The total concentration of 37 PCBs (Σ(37)PCBs) ranged from 0.05 to 3.36 ng g(-1) with the most detection of PCB-1, -4, -52 and -71. Both the concentrations of Σ(16)PBDE and Σ(37)PCB poorly correlated with total organic carbon (TOC), suggesting the significant contribution of phytoplankton organic carbons to sediment TOC. The contamination by PBDEs and PCBs in western region of the lake was significantly more serious than in eastern lake. Our findings about the higher residues of PBDEs and PCBs in sediments at the estuary of Nanfei River compared to the other estuaries also supported the conclusion that urban area (Hefei city) was the main source of PBDEs and PCBs. The comparison with the concentration of HOC in the present study with those in other lacustrine sediments around the world suggested the contamination by PBDEs in Chaohu Lake is at middle of the global concentration range, whereas PCBs is at low end of the global range which could be elucidated by local economic development and historical usage of PBDEs and PCBs. The mass inventories of HOCs in the lake were estimated at 561 and 38 kg, which corresponds to only 0.000006% and 0.0001% of these global historical produce volumes, respectively. Copyright © 2012 Elsevier Ltd. All rights reserved.

  15. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  16. The Claim Tool Kit for ad hoc recognition of peer entities

    DEFF Research Database (Denmark)

    Seigneur, Jean-Marc; Jensen, Christian D.

    2005-01-01

    In ubiquitous/pervasive computing environments, it is envisaged that computing elements—entities—will start interacting in an ad hoc fashion. The peer-to-peer (p2p) paradigm is appealing for such types of interaction especially with JXTA, which supports the development of reusable p2p building...... blocks, which facilitate implementation on any smart device. However, the inability to rely on a centralised authentication infrastructure, the openness of the environment and the absence of an administrator (it is assumed to be too expensive to have a skilled administrator at hand due to the large...... number of peers) challenge the use of legacy authentication mechanisms. Supporting spontaneous interactions among previously unknown entities requires dynamic enrolment of strangers and unknown entities. Entity recognition (ER) is a process that is carried out each time an interaction happens between...

  17. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad

    2016-07-01

    Full Text Available The blind flooding of query packets in route discovery more often characterizes the broadcast storm problem, exponentially increases energy consumption of intermediate nodes and congests the entire network. In such a congested network, the task of establishing the path between resources may become very complex and unwieldy. An extensive research work has been done in this area to improve the route discovery phase of routing protocols by reducing broadcast expenses. The purpose of this study is to provide a comparative analysis of existing broadcasting techniques for the route discovery phase, in order to bring about an efficient broadcasting technique for determining the route with minimum conveying nodes in ad-hoc networks. The study is designed to highlight the collective merits and demerits of such broadcasting techniques along with certain conclusions that would contribute to the choice of broadcasting techniques.

  18. Cognitive radio network in vehicular ad-hoc network (VANET: A survey

    Directory of Open Access Journals (Sweden)

    Joanne Mun-Yee Lim

    2016-05-01

    Full Text Available Cognitive radio network and Vehicular Ad hoc Network (VANET are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges and performance metrics, for different cognitive radio VANET applications.

  19. 78 FR 8145 - Sequence 24 Findings of the EISA 436(h) Ad-Hoc Review Group on Green Building Certification Systems

    Science.gov (United States)

    2013-02-05

    ... EISA 436(h) Ad-Hoc Review Group on Green Building Certification Systems AGENCY: Office of Federal High-Performance Green Buildings; Office of Government-wide Policy, General Services Administration. ACTION... Secretary of Energy that identifies a green building certification system(s) most likely to encourage a...

  20. ATHENA/INTRA analyses for ITER, NSSR-2

    International Nuclear Information System (INIS)

    Shen, Kecheng; Eriksson, John; Sjoeberg, A.

    1999-02-01

    The present report is a summary report including thermal-hydraulic analyses made at Studsvik Eco and Safety AB for the ITER NSSR-2 safety documentation. The objective of the analyses was to reveal the safety characteristics of various heat transfer systems at specified operating conditions and to indicate the conditions for which there were obvious risks of jeopardising the structural integrity of the coolant systems. In the latter case also some analyses were made to indicate conceivable mitigating measures for maintaining the integrity.The analyses were primarily concerned with the First Wall and Divertor heat transfer systems. Several enveloping transients were analysed with associated specific flow and heat load boundary conditions. The analyses were performed with the ATHENA and INTRA codes

  1. ATHENA/INTRA analyses for ITER, NSSR-2

    Energy Technology Data Exchange (ETDEWEB)

    Shen, Kecheng; Eriksson, John; Sjoeberg, A

    1999-02-01

    The present report is a summary report including thermal-hydraulic analyses made at Studsvik Eco and Safety AB for the ITER NSSR-2 safety documentation. The objective of the analyses was to reveal the safety characteristics of various heat transfer systems at specified operating conditions and to indicate the conditions for which there were obvious risks of jeopardising the structural integrity of the coolant systems. In the latter case also some analyses were made to indicate conceivable mitigating measures for maintaining the integrity.The analyses were primarily concerned with the First Wall and Divertor heat transfer systems. Several enveloping transients were analysed with associated specific flow and heat load boundary conditions. The analyses were performed with the ATHENA and INTRA codes 8 refs, 14 figs, 15 tabs

  2. Underestimation of species richness in neotropical frogs revealed by mtDNA analyses.

    Directory of Open Access Journals (Sweden)

    Antoine Fouquet

    2007-10-01

    Full Text Available Amphibians are rapidly vanishing. At the same time, it is most likely that the number of amphibian species is highly underestimated. Recent DNA barcoding work has attempted to define a threshold between intra- and inter-specific genetic distances to help identify candidate species. In groups with high extinction rates and poorly known species boundaries, like amphibians, such tools may provide a way to rapidly evaluate species richness.Here we analyse published and new 16S rDNA sequences from 60 frog species of Amazonia-Guianas to obtain a minimum estimate of the number of undescribed species in this region. We combined isolation by distance, phylogenetic analyses, and comparison of molecular distances to evaluate threshold values for the identification of candidate species among these frogs.In most cases, geographically distant populations belong to genetically highly distinct lineages that could be considered as candidate new species. This was not universal among the taxa studied and thus widespread species of Neotropical frogs really do exist, contrary to previous assumptions. Moreover, the many instances of paraphyly and the wide overlap between distributions of inter- and intra-specific distances reinforce the hypothesis that many cryptic species remain to be described. In our data set, pairwise genetic distances below 0.02 are strongly correlated with geographical distances. This correlation remains statistically significant until genetic distance is 0.05, with no such relation thereafter. This suggests that for higher distances allopatric and sympatric cryptic species prevail. Based on our analyses, we propose a more inclusive pairwise genetic distance of 0.03 between taxa to target lineages that could correspond to candidate species.Using this approach, we identify 129 candidate species, two-fold greater than the 60 species included in the current study. This leads to estimates of around 170 to 460 frog taxa unrecognized in Amazonia

  3. Metabarcoding and metabolome analyses of copepod grazing reveal feeding preference and linkage to metabolite classes in dynamic microbial plankton communities.

    Science.gov (United States)

    Ray, Jessica L; Althammer, Julia; Skaar, Katrine S; Simonelli, Paolo; Larsen, Aud; Stoecker, Diane; Sazhin, Andrey; Ijaz, Umer Z; Quince, Christopher; Nejstgaard, Jens C; Frischer, Marc; Pohnert, Georg; Troedsson, Christofer

    2016-11-01

    In order to characterize copepod feeding in relation to microbial plankton community dynamics, we combined metabarcoding and metabolome analyses during a 22-day seawater mesocosm experiment. Nutrient amendment of mesocosms promoted the development of haptophyte (Phaeocystis pouchetii)- and diatom (Skeletonema marinoi)-dominated plankton communities in mesocosms, in which Calanus sp. copepods were incubated for 24 h in flow-through chambers to allow access to prey particles (<500 μm). Copepods and mesocosm water sampled six times spanning the experiment were analysed using metabarcoding, while intracellular metabolite profiles of mesocosm plankton communities were generated for all experimental days. Taxon-specific metabarcoding ratios (ratio of consumed prey to available prey in the surrounding seawater) revealed diverse and dynamic copepod feeding selection, with positive selection on large diatoms, heterotrophic nanoflagellates and fungi, while smaller phytoplankton, including P. pouchetii, were passively consumed or even negatively selected according to our indicator. Our analysis of the relationship between Calanus grazing ratios and intracellular metabolite profiles indicates the importance of carbohydrates and lipids in plankton succession and copepod-prey interactions. This molecular characterization of Calanus sp. grazing therefore provides new evidence for selective feeding in mixed plankton assemblages and corroborates previous findings that copepod grazing may be coupled to the developmental and metabolic stage of the entire prey community rather than to individual prey abundances. © 2016 John Wiley & Sons Ltd.

  4. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  5. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  6. Análisis de la aplicación de un sistema de actividad ad hoc para la promoción de habilidades metacognitivas de alfabetización académica Analysis Of Results Of Application Of System Of Activity Ad Hoc For The Promotion Of Abilities Metacognition Of Academic Alphabetization

    Directory of Open Access Journals (Sweden)

    María Elena Colombo

    2008-12-01

    Full Text Available Nuestro proyecto de investigación aborda una de las problemáticas de la enseñanza universitaria: la promoción de habilidades metacognitivas de alfabetización académica (PHMAA. El marco teórico adoptado corresponde a la Psicología Histórico-Cultural. Es una investigación cualitativa, según el modelo de investigación "estudio evolutivo del trabajo"que se realizó en contextos naturales de interacción áulica universitaria con un diseño longitudinal que abordó el estudio de los mismos grupos de alumnos en un lapso cuatrimestral para la misma cohorte 2006. La unidad de análisis escogida fue el "sistema de actividad áulico universitario". Se trabajó con dos muestras: una para el sistema de actividad artificial ad hoc y otra para el sistema de actividad tradicional, las que fueron analizadas y comparadas. Se utilizaron artefactos mediadores dentro del sistema ad hoc para la PHMAA. En el presente artículo se exponen los resultados del análisis y la comparación de evaluaciones escritas de los alumnos de ambos grupos.In our research project we examine one of the main issues on university level teaching: the promotion of metacognitive skills in academic literacy process (PHMAA in Spanish. The theoretical framework used is Historical - Cultural Psychology. It is a qualitative research, along the lines of investigation "evolutionary study of work" that took place in contexts of natural interaction classroom university with a design that addressed the longitudinal study of the same groups of students within four months for the same cohort 2006. The unit of analysis is chosen the "system activity classroom university." We worked with two samples: one for the system of artificial ad hoc activity and one for the traditional system, which were analyzed and compared. Mediators devices were used within the ad hoc system for PHMAA. In this article outlines the results of the analysis and comparison of written assessments of students in both

  7. Context dependent off loading for cloudlet in mobile ad-hoc network

    Science.gov (United States)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  8. Robust On-Demand Multipath Routing with Dynamic Path Upgrade for Delay-Sensitive Data over Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Sunil Kumar

    2013-01-01

    Full Text Available Node mobility in mobile ad hoc networks (MANETs causes frequent route breakages and intermittent link stability. In this paper, we introduce a robust routing scheme, known as ad hoc on-demand multipath distance vector with dynamic path update (AOMDV-DPU, for delay-sensitive data transmission over MANET. The proposed scheme improves the AOMDV scheme by incorporating the following features: (i a routing metric based on the combination of minimum hops and received signal strength indicator (RSSI for discovery of reliable routes; (ii a local path update mechanism which strengthens the route, reduces the route breakage frequency, and increases the route longevity; (iii a keep alive mechanism for secondary route maintenance which enables smooth switching between routes and reduces the route discovery frequency; (iv a packet salvaging scheme to improve packet delivery in the event of a route breakage; and (v low HELLO packet overhead. The simulations are carried out in ns-2 for varying node speeds, number of sources, and traffic load conditions. Our AOMDV-DPU scheme achieves significantly higher throughput, lower delay, routing overhead, and route discovery frequency and latency compared to AOMDV. For H.264 compressed video traffic, AOMDV-DPU scheme achieves 3 dB or higher PSNR gain over AOMDV at both low and high node speeds.

  9. Reliable Ant Colony Routing Algorithm for Dual-Channel Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    YongQiang Li

    2018-01-01

    Full Text Available For the problem of poor link reliability caused by high-speed dynamic changes and congestion owing to low network bandwidth in ad hoc networks, an ant colony routing algorithm, based on reliable path under dual-channel condition (DSAR, is proposed. First, dual-channel communication mode is used to improve network bandwidth, and a hierarchical network model is proposed to optimize the dual-layer network. Thus, we reduce network congestion and communication delay. Second, a comprehensive reliable path selection strategy is designed, and the reliable path is selected ahead of time to reduce the probability of routing restart. Finally, the ant colony algorithm is used to improve the adaptability of the routing algorithm to changes of network topology. Simulation results show that DSAR improves the reliability of routing, packet delivery, and throughput.

  10. A high performance, ad-hoc, fuzzy query processing system for relational databases

    Science.gov (United States)

    Mansfield, William H., Jr.; Fleischman, Robert M.

    1992-01-01

    Database queries involving imprecise or fuzzy predicates are currently an evolving area of academic and industrial research. Such queries place severe stress on the indexing and I/O subsystems of conventional database environments since they involve the search of large numbers of records. The Datacycle architecture and research prototype is a database environment that uses filtering technology to perform an efficient, exhaustive search of an entire database. It has recently been modified to include fuzzy predicates in its query processing. The approach obviates the need for complex index structures, provides unlimited query throughput, permits the use of ad-hoc fuzzy membership functions, and provides a deterministic response time largely independent of query complexity and load. This paper describes the Datacycle prototype implementation of fuzzy queries and some recent performance results.

  11. Energy Aware Cluster-Based Routing in Flying Ad-Hoc Networks.

    Science.gov (United States)

    Aadil, Farhan; Raza, Ali; Khan, Muhammad Fahad; Maqsood, Muazzam; Mehmood, Irfan; Rho, Seungmin

    2018-05-03

    Flying ad-hoc networks (FANETs) are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs) represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR) and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.

  12. Energy Aware Cluster-Based Routing in Flying Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Farhan Aadil

    2018-05-01

    Full Text Available Flying ad-hoc networks (FANETs are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.

  13. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  14. Mitochondrial DNA analyses revealed low genetic diversity in the endangered Indian wild ass Equus hemionus khur.

    Science.gov (United States)

    Khaire, Devendra; Atkulwar, Ashwin; Farah, Sameera; Baig, Mumtaz

    2017-09-01

    The Indian wild ass Equus hemionus khur, belonging to ass-like equid branch, inhabits the dry and arid desert of the Little Rann of Kutch, Gujarat. The E. h. khur is the sole survivor of Asiatic wild ass species/subspecies in South Asia. To provide first ever insights into the genetic diversity, phylogeny, and demography of the endangered Indian wild ass, we sampled 52 free-ranging individuals from the Little Rann of Kutch by using a non-invasive methodology. The sequencing of 230 bp in cytochrome b (Cyt b) and displacement loop (D-loop) region revealed that current ∼4000 extant population of Indian wild ass harbours low genetic diversity. Phylogenetic analyses confirmed that E. h. khur, E. h. onager, and E. h. kulan belong to a single strict monophyletic clade. Therefore, we suggest the delimitation of the five E. hemionus subspecies in vogue to a single species E. hemionus. The application of molecular clock confirmed that the Asiatic wild ass had undergone diversification 0.65 Million years ago. Demographic measurements assessed using a Bayesian skyline plot demonstrated decline in the maternal effective population size of the Indian wild ass during different periods; these periods coincided with the origin and rise of the Indus civilization in the northwest of the Indian subcontinent during the Neolithic. In conclusion, maintaining high genetic diversity in the existing isolated population of 4000 Indian wild asses inhabiting the wild ass sanctuary is important compared with subspecies preservation alone.

  15. Regulatory complexity revealed by integrated cytological and RNA-seq analyses of meiotic substages in mouse spermatocytes.

    Science.gov (United States)

    Ball, Robyn L; Fujiwara, Yasuhiro; Sun, Fengyun; Hu, Jianjun; Hibbs, Matthew A; Handel, Mary Ann; Carter, Gregory W

    2016-08-12

    The continuous and non-synchronous nature of postnatal male germ-cell development has impeded stage-specific resolution of molecular events of mammalian meiotic prophase in the testis. Here the juvenile onset of spermatogenesis in mice is analyzed by combining cytological and transcriptomic data in a novel computational analysis that allows decomposition of the transcriptional programs of spermatogonia and meiotic prophase substages. Germ cells from testes of individual mice were obtained at two-day intervals from 8 to 18 days post-partum (dpp), prepared as surface-spread chromatin and immunolabeled for meiotic stage-specific protein markers (STRA8, SYCP3, phosphorylated H2AFX, and HISTH1T). Eight stages were discriminated cytologically by combinatorial antibody labeling, and RNA-seq was performed on the same samples. Independent principal component analyses of cytological and transcriptomic data yielded similar patterns for both data types, providing strong evidence for substage-specific gene expression signatures. A novel permutation-based maximum covariance analysis (PMCA) was developed to map co-expressed transcripts to one or more of the eight meiotic prophase substages, thereby linking distinct molecular programs to cytologically defined cell states. Expression of meiosis-specific genes is not substage-limited, suggesting regulation of substage transitions at other levels. This integrated analysis provides a general method for resolving complex cell populations. Here it revealed not only features of meiotic substage-specific gene expression, but also a network of substage-specific transcription factors and relationships to potential target genes.

  16. Subsequent Chemotherapy and Treatment Patterns After Abiraterone Acetate in Patients with Metastatic Castration-resistant Prostate Cancer: Post Hoc Analysis of COU-AA-302.

    Science.gov (United States)

    de Bono, Johann S; Smith, Matthew R; Saad, Fred; Rathkopf, Dana E; Mulders, Peter F A; Small, Eric J; Shore, Neal D; Fizazi, Karim; De Porre, Peter; Kheoh, Thian; Li, Jinhui; Todd, Mary B; Ryan, Charles J; Flaig, Thomas W

    2017-04-01

    Treatment patterns for metastatic castration-resistant prostate cancer (mCRPC) have changed substantially in the last few years. In trial COU-AA-302 (chemotherapy-naïve men with mCRPC), abiraterone acetate plus prednisone (AA) significantly improved radiographic progression-free survival and overall survival (OS) when compared to placebo plus prednisone (P). This post hoc analysis investigated clinical responses to docetaxel as first subsequent therapy (FST) among patients who progressed following protocol-specified treatment with AA, and characterized subsequent treatment patterns among older (≥75 yr) and younger (AA arm received subsequent treatment with one or more agents approved for mCRPC. Efficacy analysis was performed for patients for whom baseline and at least one post-baseline prostate-specific antigen (PSA) values were available. Baseline and at least one post-baseline PSA values were available for 100 AA patients who received docetaxel as FST. While acknowledging the limitations of post hoc analyses, 40% (40/100) of these patients had an unconfirmed ≥50% PSA decline with first subsequent docetaxel therapy, and 27% (27/100) had a confirmed ≥50% PSA decline. The median docetaxel treatment duration among these 100 patients was 4.2 mo. Docetaxel was the most common FST among older and younger patients from each treatment arm. However, 43% (79/185) of older patients who progressed on AA received no subsequent therapy for mCRPC, compared with 17% (60/361) of younger patients. Patients with mCRPC who progress with AA treatment may still derive benefit from subsequent docetaxel therapy. These data support further assessment of treatment patterns following AA treatment for mCRPC, particularly among older patients. ClinicalTrials.gov NCT00887198. Treatment patterns for advanced prostate cancer have changed substantially in the last few years. This additional analysis provides evidence of clinical benefit for subsequent chemotherapy in men with advanced

  17. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

    OpenAIRE

    Shahram Behzad; Reza Fotohi; Shahram Jamali

    2013-01-01

    Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destination...

  18. An epidemic model for biological data fusion in ad hoc sensor networks

    Science.gov (United States)

    Chang, K. C.; Kotari, Vikas

    2009-05-01

    Bio terrorism can be a very refined and a catastrophic approach of attacking a nation. This requires the development of a complete architecture dedicatedly designed for this purpose which includes but is not limited to Sensing/Detection, Tracking and Fusion, Communication, and others. In this paper we focus on one such architecture and evaluate its performance. Various sensors for this specific purpose have been studied. The accent has been on use of Distributed systems such as ad-hoc networks and on application of epidemic data fusion algorithms to better manage the bio threat data. The emphasis has been on understanding the performance characteristics of these algorithms under diversified real time scenarios which are implemented through extensive JAVA based simulations. Through comparative studies on communication and fusion the performance of channel filter algorithm for the purpose of biological sensor data fusion are validated.

  19. Phenotype specific analyses reveal distinct regulatory mechanism for chronically activated p53.

    Directory of Open Access Journals (Sweden)

    Kristina Kirschner

    2015-03-01

    Full Text Available The downstream functions of the DNA binding tumor suppressor p53 vary depending on the cellular context, and persistent p53 activation has recently been implicated in tumor suppression and senescence. However, genome-wide information about p53-target gene regulation has been derived mostly from acute genotoxic conditions. Using ChIP-seq and expression data, we have found distinct p53 binding profiles between acutely activated (through DNA damage and chronically activated (in senescent or pro-apoptotic conditions p53. Compared to the classical 'acute' p53 binding profile, 'chronic' p53 peaks were closely associated with CpG-islands. Furthermore, the chronic CpG-island binding of p53 conferred distinct expression patterns between senescent and pro-apoptotic conditions. Using the p53 targets seen in the chronic conditions together with external high-throughput datasets, we have built p53 networks that revealed extensive self-regulatory 'p53 hubs' where p53 and many p53 targets can physically interact with each other. Integrating these results with public clinical datasets identified the cancer-associated lipogenic enzyme, SCD, which we found to be directly repressed by p53 through the CpG-island promoter, providing a mechanistic link between p53 and the 'lipogenic phenotype', a hallmark of cancer. Our data reveal distinct phenotype associations of chronic p53 targets that underlie specific gene regulatory mechanisms.

  20. Big data analyses reveal patterns and drivers of the movements of southern elephant seals

    KAUST Repository

    Rodrí guez, J. P.; Ferná ndez-Gracia, Juan; Thums, Michele; Hindell, Mark A.; Sequeira, Ana M. M.; Meekan, Mark G.; Costa, Daniel P.; Guinet, Christophe; Harcourt, R.; McMahon, Clive R.; Muelbert, Monica; Duarte, Carlos M.; Eguí luz, V. M.

    2017-01-01

    The growing number of large databases of animal tracking provides an opportunity for analyses of movement patterns at the scales of populations and even species. We used analytical approaches, developed to cope with

  1. Big data analyses reveal patterns and drivers of the movements of southern elephant seals

    KAUST Repository

    Rodríguez, Jorge P.

    2017-03-02

    The growing number of large databases of animal tracking provides an opportunity for analyses of movement patterns at the scales of populations and even species. We used analytical approaches, developed to cope with

  2. Impulse control disorder related behaviours during long-term rotigotine treatment: a post hoc analysis.

    Science.gov (United States)

    Antonini, A; Chaudhuri, K R; Boroojerdi, B; Asgharnejad, M; Bauer, L; Grieger, F; Weintraub, D

    2016-10-01

    Dopamine agonists in Parkinson's disease (PD) are associated with impulse control disorders (ICDs) and other compulsive behaviours (together called ICD behaviours). The frequency of ICD behaviours reported as adverse events (AEs) in long-term studies of rotigotine transdermal patch in PD was evaluated. This was a post hoc analysis of six open-label extension studies up to 6 years in duration. Analyses included patients treated with rotigotine for at least 6 months and administered the modified Minnesota Impulse Disorders Interview. ICD behaviours reported as AEs were identified and categorized. For 786 patients, the mean (±SD) exposure to rotigotine was 49.4 ± 17.6 months. 71 (9.0%) patients reported 106 ICD AEs cumulatively. Occurrence was similar across categories: 2.5% patients reported 'compulsive sexual behaviour', 2.3% 'buying disorder', 2.0% 'compulsive gambling', 1.7% 'compulsive eating' and 1.7% 'punding behaviour'. Examining at 6-month intervals, the incidence was relatively low during the first 30 months; it was higher over the next 30 months, peaking in the 54-60-month period. No ICD AEs were serious, and 97% were mild or moderate in intensity. Study discontinuation occurred in seven (9.9%) patients with ICD AEs; these then resolved in five patients. Dose reduction occurred for 23 AEs, with the majority (73.9%) resolving. In this analysis of >750 patients with PD treated with rotigotine, the frequency of ICD behaviour AEs was 9.0%, with a specific incidence timeline observed. Active surveillance as duration of treatment increases may help early identification and management; once ICD behaviours are present rotigotine dose reduction may be considered. © 2016 The Authors. European Journal of Neurology published by John Wiley & Sons Ltd on behalf of European Academy of Neurology.

  3. A Unified NET-MAC-PHY Cross-layer Framework for Performance Evaluation of Multi-hop Ad hoc WLANs

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2014-09-01

    Full Text Available Most of the existing works have been evaluated the performance of 802.11 multihop networks by considering the MAC layer or network layer separately. Knowing the nature of the multi-hop ad hoc networks, many factors in different layers are crucial for study the performance of MANET. In this paper we present a new analytic model for evaluating average end-to-end throughput in IEEE 802.11e multihop wireless networks. In particular, we investigate an intricate interaction among PHY, MAC and Network layers. For instance, we incorporate carrier sense threshold, transmission power, contention window size, retransmissions retry limit, multi rates, routing protocols and network topology together. We build a general cross-layered framework to represent multi-hop ad hoc networks with asymmetric topology and asymmetric traffic. We develop an analytical model to predict throughput of each connection as well as stability of forwarding queues at intermediate nodes in saturated networks. To the best of our knowledge, it seems that our work is the first wherein general topology and asymmetric parameters setup are considered in PHY/MAC/Network layers. Performance of such a system is also evaluated through simulation. We show that performance measures of the MAC layer are affected by the traffic intensity of flows to be forwarded. More precisely, attempt rate and collision probability are dependent on traffic flows, topology and routing.

  4. Comparative physiological, metabolomic, and transcriptomic analyses reveal mechanisms of improved abiotic stress resistance in bermudagrass [Cynodon dactylon (L). Pers.] by exogenous melatonin

    Science.gov (United States)

    Shi, Haitao; Jiang, Chuan; Ye, Tiantian; Tan, Dun-xian; Reiter, Russel J.; Zhang, Heng; Liu, Renyi; Chan, Zhulong

    2015-01-01

    Melatonin (N-acetyl-5-methoxytryptamine), a well-known animal hormone, is also involved in plant development and abiotic stress responses. In this study, it is shown that exogenous application of melatonin conferred improved salt, drought, and cold stress resistances in bermudagrass. Moreover, exogenous melatonin treatment alleviated reactive oxygen species (ROS) burst and cell damage induced by abiotic stress; this involved activation of several antioxidants. Additionally, melatonin-pre-treated plants exhibited higher concentrations of 54 metabolites, including amino acids, organic acids, sugars, and sugar alcohols, than non-treated plants under abiotic stress conditions. Genome-wide transcriptomic profiling identified 3933 transcripts (2361 up-regulated and 1572 down-regulated) that were differentially expressed in melatonin-treated plants versus controls. Pathway and gene ontology (GO) term enrichment analyses revealed that genes involved in nitrogen metabolism, major carbohydrate metabolism, tricarboxylic acid (TCA)/org transformation, transport, hormone metabolism, metal handling, redox, and secondary metabolism were over-represented after melatonin pre-treatment. Taken together, this study provides the first evidence of the protective roles of exogenous melatonin in the bermudagrass response to abiotic stresses, partially via activation of antioxidants and modulation of metabolic homeostasis. Notably, metabolic and transcriptomic analyses showed that the underlying mechanisms of melatonin could involve major reorientation of photorespiratory and carbohydrate and nitrogen metabolism. PMID:25225478

  5. Integrative functional analyses using rainbow trout selected for tolerance to plant diets reveal nutrigenomic signatures for soy utilization without the concurrence of enteritis.

    Directory of Open Access Journals (Sweden)

    Jason Abernathy

    Full Text Available Finding suitable alternative protein sources for diets of carnivorous fish species remains a major concern for sustainable aquaculture. Through genetic selection, we created a strain of rainbow trout that outperforms parental lines in utilizing an all-plant protein diet and does not develop enteritis in the distal intestine, as is typical with salmonids on long-term plant protein-based feeds. By incorporating this strain into functional analyses, we set out to determine which genes are critical to plant protein utilization in the absence of gut inflammation. After a 12-week feeding trial with our selected strain and a control trout strain fed either a fishmeal-based diet or an all-plant protein diet, high-throughput RNA sequencing was completed on both liver and muscle tissues. Differential gene expression analyses, weighted correlation network analyses and further functional characterization were performed. A strain-by-diet design revealed differential expression ranging from a few dozen to over one thousand genes among the various comparisons and tissues. Major gene ontology groups identified between comparisons included those encompassing central, intermediary and foreign molecule metabolism, associated biosynthetic pathways as well as immunity. A systems approach indicated that genes involved in purine metabolism were highly perturbed. Systems analysis among the tissues tested further suggests the interplay between selection for growth, dietary utilization and protein tolerance may also have implications for nonspecific immunity. By combining data from differential gene expression and co-expression networks using selected trout, along with ontology and pathway analyses, a set of 63 candidate genes for plant diet tolerance was found. Risk loci in human inflammatory bowel diseases were also found in our datasets, indicating rainbow trout selected for plant-diet tolerance may have added utility as a potential biomedical model.

  6. RNA-seq analyses reveal insights into the function of respiratory nitrate reductase of the diazotroph Herbaspirillum seropedicae.

    Science.gov (United States)

    Bonato, Paloma; Batista, Marcelo B; Camilios-Neto, Doumit; Pankievicz, Vânia C S; Tadra-Sfeir, Michelle Z; Monteiro, Rose Adele; Pedrosa, Fabio O; Souza, Emanuel M; Chubatsu, Leda S; Wassem, Roseli; Rigo, Liu Un

    2016-09-01

    Herbaspirillum seropedicae is a nitrogen-fixing β-proteobacterium that associates with roots of gramineous plants. In silico analyses revealed that H. seropedicae genome has genes encoding a putative respiratory (NAR) and an assimilatory nitrate reductase (NAS). To date, little is known about nitrate metabolism in H. seropedicae, and, as this bacterium cannot respire nitrate, the function of NAR remains unknown. This study aimed to investigate the function of NAR in H. seropedicae and how it metabolizes nitrate in a low aerated-condition. RNA-seq transcriptional profiling in the presence of nitrate allowed us to pinpoint genes important for nitrate metabolism in H. seropedicae, including nitrate transporters and regulatory proteins. Additionally, both RNA-seq data and physiological characterization of a mutant in the catalytic subunit of NAR (narG mutant) showed that NAR is not required for nitrate assimilation but is required for: (i) production of high levels of nitrite, (ii) production of NO and (iii) dissipation of redox power, which in turn lead to an increase in carbon consumption. In addition, wheat plants showed an increase in shoot dry weight only when inoculated with H. seropedicae wild type, but not with the narG mutant, suggesting that NAR is important to H. seropedicae-wheat interaction. © 2016 Society for Applied Microbiology and John Wiley & Sons Ltd.

  7. Optical emissions from the dissociative recombination of N{sub 2}H{sup +}, HCO{sup +}, HOC{sup +}, and HNC{sup +}

    Energy Technology Data Exchange (ETDEWEB)

    Johnsen, R [Department of Physics and Astronomy University of Pittsburgh, Pittsburgh, PA 15260 (United States); Golde, M F [Department of Chemistry, University of Pittsburgh, Pittsburgh, PA 15260 (United States); Rosati, R E [Smithsonian Astrophysical Observatory, 60 Garden St. MS-50 Cambridge, MA, 02138 (United States); Pappas, D [Army Research Laboratory, 4600 Deer Creek Loop, Aberdeen Proving Ground, MD (United States); Skrzypkowski, M P, E-mail: rj@pitt.ed [Prometheus Energy Company, 3311 S. 120th Place Suite 100, Seattle, WA 98168 (United States)

    2009-11-15

    We present recent flowing-afterglow measurements of branching fractions for electronically and vibrationally excited products arising from the dissociative recombination of N{sub 2}H{sup +}, HCO{sup +}, HOC{sup +}, and HNC{sup +} ions with thermal electrons. State-specific yields were derived by fitting the observed, spatially resolved emission band intensities to models that simulate all ion-chemical processes, recombination, diffusion, and gas mixing.

  8. Protective effect of yerba mate intake on the cardiovascular system: a post hoc analysis study in postmenopausal women

    OpenAIRE

    da Veiga, D.T.A.; Bringhenti, R.; Copes, R.; Tatsch, E.; Moresco, R.N.; Comim, F.V.; Premaor, M.O.

    2018-01-01

    The prevalence of cardiovascular and metabolic diseases is increased in postmenopausal women, which contributes to the burden of illnesses in this period of life. Yerba mate (Ilex paraguariensis) is a native bush from Southern South America. Its leaves are rich in phenolic components, which may have antioxidant, vasodilating, hypocholesterolemic, and hypoglycemic proprieties. This post hoc analysis of the case-control study nested in the Obesity and Bone Fracture Cohort evaluated the consumpt...

  9. Clinical Outcomes from Androgen Signaling-directed Therapy after Treatment with Abiraterone Acetate and Prednisone in Patients with Metastatic Castration-resistant Prostate Cancer: Post Hoc Analysis of COU-AA-302.

    Science.gov (United States)

    Smith, Matthew R; Saad, Fred; Rathkopf, Dana E; Mulders, Peter F A; de Bono, Johann S; Small, Eric J; Shore, Neal D; Fizazi, Karim; Kheoh, Thian; Li, Jinhui; De Porre, Peter; Todd, Mary B; Yu, Margaret K; Ryan, Charles J

    2017-07-01

    In the COU-AA-302 trial, abiraterone acetate plus prednisone significantly increased overall survival for patients with chemotherapy-naïve metastatic castration-resistant prostate cancer (mCRPC). Limited information exists regarding response to subsequent androgen signaling-directed therapies following abiraterone acetate plus prednisone in patients with mCRPC. We investigated clinical outcomes associated with subsequent abiraterone acetate plus prednisone (55 patients) and enzalutamide (33 patients) in a post hoc analysis of COU-AA-302. Prostate-specific antigen (PSA) response was assessed. Median time to PSA progression was estimated using the Kaplan-Meier method. The PSA response rate (≥50% PSA decline, unconfirmed) was 44% and 67%, respectively. The median time to PSA progression was 3.9 mo (range 2.6-not estimable) for subsequent abiraterone acetate plus prednisone and 2.8 mo (range 1.8-not estimable) for subsequent enzalutamide. The majority of patients (68%) received intervening chemotherapy before subsequent abiraterone acetate plus prednisone or enzalutamide. While acknowledging the limitations of post hoc analyses and high censoring (>75%) in both treatment groups, these results suggest that subsequent therapy with abiraterone acetate plus prednisone or enzalutamide for patients who progressed on abiraterone acetate is associated with limited clinical benefit. This analysis showed limited clinical benefit for subsequent abiraterone acetate plus prednisone or enzalutamide in patients with metastatic castration-resistant prostate cancer following initial treatment with abiraterone acetate plus prednisone. This analysis does not support prioritization of subsequent abiraterone acetate plus prednisone or enzalutamide following initial therapy with abiraterone acetate plus prednisone. Copyright © 2017 European Association of Urology. Published by Elsevier B.V. All rights reserved.

  10. DNA sequence analyses reveal abundant diversity, endemism and evidence for Asian origin of the porcini mushrooms.

    Directory of Open Access Journals (Sweden)

    Bang Feng

    Full Text Available The wild gourmet mushroom Boletus edulis and its close allies are of significant ecological and economic importance. They are found throughout the Northern Hemisphere, but despite their ubiquity there are still many unresolved issues with regard to the taxonomy, systematics and biogeography of this group of mushrooms. Most phylogenetic studies of Boletus so far have characterized samples from North America and Europe and little information is available on samples from other areas, including the ecologically and geographically diverse regions of China. Here we analyzed DNA sequence variation in three gene markers from samples of these mushrooms from across China and compared our findings with those from other representative regions. Our results revealed fifteen novel phylogenetic species (about one-third of the known species and a newly identified lineage represented by Boletus sp. HKAS71346 from tropical Asia. The phylogenetic analyses support eastern Asia as the center of diversity for the porcini sensu stricto clade. Within this clade, B. edulis is the only known holarctic species. The majority of the other phylogenetic species are geographically restricted in their distributions. Furthermore, molecular dating and geological evidence suggest that this group of mushrooms originated during the Eocene in eastern Asia, followed by dispersal to and subsequent speciation in other parts of Asia, Europe, and the Americas from the middle Miocene through the early Pliocene. In contrast to the ancient dispersal of porcini in the strict sense in the Northern Hemisphere, the occurrence of B. reticulatus and B. edulis sensu lato in the Southern Hemisphere was probably due to recent human-mediated introductions.

  11. DNA Sequence Analyses Reveal Abundant Diversity, Endemism and Evidence for Asian Origin of the Porcini Mushrooms

    Science.gov (United States)

    Feng, Bang; Xu, Jianping; Wu, Gang; Zeng, Nian-Kai; Li, Yan-Chun; Tolgor, Bau; Kost, Gerhard W.; Yang, Zhu L.

    2012-01-01

    The wild gourmet mushroom Boletus edulis and its close allies are of significant ecological and economic importance. They are found throughout the Northern Hemisphere, but despite their ubiquity there are still many unresolved issues with regard to the taxonomy, systematics and biogeography of this group of mushrooms. Most phylogenetic studies of Boletus so far have characterized samples from North America and Europe and little information is available on samples from other areas, including the ecologically and geographically diverse regions of China. Here we analyzed DNA sequence variation in three gene markers from samples of these mushrooms from across China and compared our findings with those from other representative regions. Our results revealed fifteen novel phylogenetic species (about one-third of the known species) and a newly identified lineage represented by Boletus sp. HKAS71346 from tropical Asia. The phylogenetic analyses support eastern Asia as the center of diversity for the porcini sensu stricto clade. Within this clade, B. edulis is the only known holarctic species. The majority of the other phylogenetic species are geographically restricted in their distributions. Furthermore, molecular dating and geological evidence suggest that this group of mushrooms originated during the Eocene in eastern Asia, followed by dispersal to and subsequent speciation in other parts of Asia, Europe, and the Americas from the middle Miocene through the early Pliocene. In contrast to the ancient dispersal of porcini in the strict sense in the Northern Hemisphere, the occurrence of B. reticulatus and B. edulis sensu lato in the Southern Hemisphere was probably due to recent human-mediated introductions. PMID:22629418

  12. Content Downloading with the Assistance of Roadside Cars for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Haigang Gong

    2017-01-01

    Full Text Available Plenty of multimedia contents such as traffic images, music, and movies pose great challenges for content downloading due to the high mobility of vehicles and intermittent connectivity for vehicular ad hoc networks. Roadside units or APs can improve the efficiency of content downloading but with the cost of large investments. In this paper, an efficient content downloading scheme is proposed with the assistance of parking clusters, which are formed by roadside parked cars. After receiving the downloading request, the parking clusters, which the downloader will travel through according to the estimated trajectory, will make a download scheduling for the downloader. Then the downloader acquires the content chunks while it drives through the parking clusters. Simulation results show that the proposed scheme achieves better performance than intervehicle approach and RSU based approach.

  13. A Performance Evaluation Model for Mobile Ad Hoc Networks and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-03-01

    Full Text Available Potential applications in areas such as military sites and disaster relief fields that are characterized by absence of prefixed infrastructure justify the development of mobile ad hoc networks (MANETs and wireless sensor networks (WSNs. However, unfavorable wireless links and dynamic topology are still challenging, leading to the proposal of a collection of routing protocols for MANETs and WSNs. Nevertheless the performance of algorithms may vary with deployment scenario due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and WSNs is investigated and a novel performance ranking model, termed AHP-SAW, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies based on which ranking results are provided. Extensive simulations show that an overall 37.2 %, at most, gain may be achieved based on the AHP-SAW model.

  14. The 'revealed preferences' theory: Assumptions and conjectures

    International Nuclear Information System (INIS)

    Green, C.H.

    1983-01-01

    Being kind of intuitive psychology the 'Revealed-Preferences'- theory based approaches towards determining the acceptable risks are a useful method for the generation of hypotheses. In view of the fact that reliability engineering develops faster than methods for the determination of reliability aims the Revealed-Preferences approach is a necessary preliminary help. Some of the assumptions on which the 'Revealed-Preferences' theory is based will be identified and analysed and afterwards compared with experimentally obtained results. (orig./DG) [de

  15. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  16. Implementing a Topology Management Algorithm for Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mrinal K. Naskar

    2008-01-01

    Full Text Available In this paper, we propose to maintain the topology of a MANET by suitably selecting multiple coordinators among the nodes constituting the MANET. The maintenance of topology in a mobile ad–hoc network is of primary importance because the routing techniques can only work if we have a connected network. Thus of the burning issues at present is to device algorithms which ensure that the network topology is always maintained. The basic philosophy behind our algorithm is to isolate two coordinators amongst the system based on positional data. Once elected, they are entrusted with the responsibility to emit signals of different frequencies while the other nodes individually decide the logic they need to follow in order to maintain the topology, thereby greatly reducing the overhead. As far as our knowledge goes, we are the first ones to introduce the concept of multiple coordinators which not only reduces the workload of the coordinator, but also eliminates the need of different signal ranges thereby ensuring greater efficiency. We have simulated the algorithm with the help of a number of robots using embedded systems. The results we have obtained have been quite encouraging.

  17. Meta-analyses of KIF6 Trp719Arg in coronary heart disease and statin therapeutic effect.

    Directory of Open Access Journals (Sweden)

    Ping Peng

    Full Text Available The goal of our study is to assess the contribution of KIF6 Trp719Arg to both the risk of CHD and the efficacy of statin therapy in CHD patients.Meta-analysis of 8 prospective studies among 77,400 Caucasians provides evidence that 719Arg increases the risk of CHD (P<0.001, HR = 1.27, 95% CI = 1.15-1.41. However, another meta-analysis of 7 case-control studies among 65,200 individuals fails to find a significant relationship between Trp719Arg and the risk of CHD (P = 0.642, OR = 1.02, 95% CI = 0.95-1.08. This suggests that the contribution of Trp719Arg to CHD varies in different ethnic groups. Additional meta-analysis also shows that statin therapy only benefit the vascular patients carry 719Arg allele (P<0.001, relative ratio (RR = 0.60, 95% CI = 0.54-0.67. To examine the role of this genetic variant in CHD risk in Han Chinese, we have conducted a case-control study with 289 CHD cases, 193 non-CHD controls, and 329 unrelated healthy volunteers as healthy controls. On post hoc analysis, significant allele frequency difference of 719Arg is observed between female CHD cases and female total controls under the dominant model (P = 0.04, χ(2 = 4.228, df = 1, odd ratio (OR = 1.979, 95% confidence interval (CI = 1.023-3.828. Similar trends are observed for post hoc analysis between female CHD cases and female healthy controls (dominant model: P = 0.04, χ(2 = 4.231, df = 1, OR = 2.015, 95% CI = 1.024-3.964. Non-genetic CHD risk factors are not controlled in these analyses.Our meta-analysis demonstrates the role of Trp719Arg of KIF6 gene in the risk of CHD in Caucasians. The meta-analysis also suggests the role of this variant in statin therapeutic response in vascular diseases. Our case-control study suggests that Trp719Arg of KIF6 gene is associated with CHD in female Han Chinese through a post hoc analysis.

  18. Integrative analyses of human reprogramming reveal dynamic nature of induced pluripotency

    Science.gov (United States)

    Cacchiarelli, Davide; Trapnell, Cole; Ziller, Michael J.; Soumillon, Magali; Cesana, Marcella; Karnik, Rahul; Donaghey, Julie; Smith, Zachary D.; Ratanasirintrawoot, Sutheera; Zhang, Xiaolan; Ho Sui, Shannan J.; Wu, Zhaoting; Akopian, Veronika; Gifford, Casey A.; Doench, John; Rinn, John L.; Daley, George Q.; Meissner, Alexander; Lander, Eric S.; Mikkelsen, Tarjei S.

    2015-01-01

    Summary Induced pluripotency is a promising avenue for disease modeling and therapy, but the molecular principles underlying this process, particularly in human cells, remain poorly understood due to donor-to-donor variability and intercellular heterogeneity. Here we constructed and characterized a clonal, inducible human reprogramming system that provides a reliable source of cells at any stage of the process. This system enabled integrative transcriptional and epigenomic analysis across the human reprogramming timeline at high resolution. We observed distinct waves of gene network activation, including the ordered reactivation of broad developmental regulators followed by early embryonic patterning genes and culminating in the emergence of a signature reminiscent of pre-implantation stages. Moreover, complementary functional analyses allowed us to identify and validate novel regulators of the reprogramming process. Altogether, this study sheds light on the molecular underpinnings of induced pluripotency in human cells and provides a robust cell platform for further studies. PMID:26186193

  19. Minimizing Detection Probability Routing in Ad Hoc Networks Using Directional Antennas

    Directory of Open Access Journals (Sweden)

    Towsley Don

    2009-01-01

    Full Text Available In a hostile environment, it is important for a transmitter to make its wireless transmission invisible to adversaries because an adversary can detect the transmitter if the received power at its antennas is strong enough. This paper defines a detection probability model to compute the level of a transmitter being detected by a detection system at arbitrary location around the transmitter. Our study proves that the probability of detecting a directional antenna is much lower than that of detecting an omnidirectional antenna if both the directional and omnidirectional antennas provide the same Effective Isotropic Radiated Power (EIRP in the direction of the receiver. We propose a Minimizing Detection Probability (MinDP routing algorithm to find a secure routing path in ad hoc networks where nodes employ directional antennas to transmit data to decrease the probability of being detected by adversaries. Our study shows that the MinDP routing algorithm can reduce the total detection probability of deliveries from the source to the destination by over 74%.

  20. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  1. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  2. EEG Spectral Analysis in Serious Gaming: An Ad Hoc Experimental Application

    Directory of Open Access Journals (Sweden)

    Minchev Z.

    2009-12-01

    Full Text Available The application of serious gaming technology in different areas of human knowledge for learning is raising the question of quantitative measurement of the training process quality. In the present paper a pilot study of 10 healthy volunteers' EEG spectra is performed for ad hoc selected game events ('win' and 'lose' via continuous wavelet transform (real and complex on the basis of the Morlet mother wavelet function and S-transformation. The results have shown a general decrease of the alpha rhythms power spectra frequencies for the 'lose' events and increase for the 'win' events. This fact corresponds to an opposite behaviour of the theta rhythm of the players for the same 'win' and 'lose' events. Additionally, the frequency changes in the alpha1 (8-10.5 Hz, alpha2 (10.5-13 Hz and theta2 rhythms (6-8 Hz were supposed to be a phenomena related to positive and negative emotions appearance in the EEG activity of the players regarding the selected 'win' and 'lose' states.

  3. Combined metabonomic and quantitative real-time PCR analyses reveal systems metabolic changes in Jurkat T-cells treated with HIV-1 Tat protein.

    Science.gov (United States)

    Liao, Wenting; Tan, Guangguo; Zhu, Zhenyu; Chen, Qiuli; Lou, Ziyang; Dong, Xin; Zhang, Wei; Pan, Wei; Chai, Yifeng

    2012-11-02

    HIV-1 Tat protein is released by infected cells and can affect bystander uninfected T cells and induce numerous biological responses which contribute to its pathogenesis. To elucidate the complex pathogenic mechanism, we conducted a comprehensive investigation on Tat protein-related extracellular and intracellular metabolic changes in Jurkat T-cells using combined gas chromatography-mass spectrometry (GC-MS), reversed-phase liquid chromatography-mass spectrometry (RPLC-MS) and a hydrophilic interaction liquid chromatography-mass spectrometry (HILIC-MS)-based metabonomics approach. Quantitative real-time PCR (qRT-PCR) analyses were further employed to measure expressions of several relevant enzymes together with perturbed metabolic pathways. Combined metabonomic and qRT-PCR analyses revealed that HIV-1 Tat caused significant and comprehensive metabolic changes, as represented by significant changes of 37 metabolites and 10 relevant enzymes in HIV-1 Tat-treated cells. Using MetaboAnalyst 2.0, it was found that 11 pathways (Impact-value >0.10) among the regulated pathways were acutely perturbed, including sphingolipid metabolism, glycine, serine and threonine metabolism, pyruvate metabolism, inositol phosphate metabolism, arginine and proline metabolism, citrate cycle, phenylalanine metabolism, tryptophan metabolism, pentose phosphate pathway, glycerophospholipid metabolism, glycolysis or gluconeogenesis. These results provide metabolic evidence of the complex pathogenic mechanism of HIV-1 Tat protein as a "viral toxin", and would help obligate Tat protein as "an important target" for therapeutic intervention and vaccine development.

  4. Comparative physiological, metabolomic, and transcriptomic analyses reveal mechanisms of improved abiotic stress resistance in bermudagrass [Cynodon dactylon (L). Pers.] by exogenous melatonin.

    Science.gov (United States)

    Shi, Haitao; Jiang, Chuan; Ye, Tiantian; Tan, Dun-Xian; Reiter, Russel J; Zhang, Heng; Liu, Renyi; Chan, Zhulong

    2015-02-01

    Melatonin (N-acetyl-5-methoxytryptamine), a well-known animal hormone, is also involved in plant development and abiotic stress responses. In this study, it is shown that exogenous application of melatonin conferred improved salt, drought, and cold stress resistances in bermudagrass. Moreover, exogenous melatonin treatment alleviated reactive oxygen species (ROS) burst and cell damage induced by abiotic stress; this involved activation of several antioxidants. Additionally, melatonin-pre-treated plants exhibited higher concentrations of 54 metabolites, including amino acids, organic acids, sugars, and sugar alcohols, than non-treated plants under abiotic stress conditions. Genome-wide transcriptomic profiling identified 3933 transcripts (2361 up-regulated and 1572 down-regulated) that were differentially expressed in melatonin-treated plants versus controls. Pathway and gene ontology (GO) term enrichment analyses revealed that genes involved in nitrogen metabolism, major carbohydrate metabolism, tricarboxylic acid (TCA)/org transformation, transport, hormone metabolism, metal handling, redox, and secondary metabolism were over-represented after melatonin pre-treatment. Taken together, this study provides the first evidence of the protective roles of exogenous melatonin in the bermudagrass response to abiotic stresses, partially via activation of antioxidants and modulation of metabolic homeostasis. Notably, metabolic and transcriptomic analyses showed that the underlying mechanisms of melatonin could involve major reorientation of photorespiratory and carbohydrate and nitrogen metabolism. © The Author 2014. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  5. Lenient vs. strict rate control in patients with atrial fibrillation and heart failure: a post-hoc analysis of the RACE II study

    NARCIS (Netherlands)

    Mulder, Bart A.; van Veldhuisen, Dirk J.; Crijns, Harry J. G. M.; Tijssen, Jan G. P.; Hillege, Hans L.; Alings, Marco; Rienstra, Michiel; Groenveld, Hessel F.; van den Berg, Maarten P.; van Gelder, Isabelle C.

    2013-01-01

    It is unknown whether lenient rate control is an acceptable strategy in patients with AF and heart failure. We evaluated differences in outcome in patients with AF and heart failure treated with lenient or strict rate control. This post-hoc analysis of the RACE II trial included patients with an

  6. Reducing Congestion in Obstructed Highways with Traffic Data Dissemination Using Ad hoc Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Coveney PeterV

    2010-01-01

    Full Text Available Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITSs and location-aware services. The ability to disseminate information in an ad hoc fashion allows pertinent information to propagate faster through a network. In the realm of ITS, the ability to spread warning information faster and further is of great advantage to receivers. In this paper we propose and present a message-dissemination procedure that uses vehicular wireless protocols to influence vehicular flow, reducing congestion in road networks. The computational experiments we present show how a car-following model and lane-change algorithm can be adapted to "react" to the reception of information. This model also illustrates the advantages of coupling together with vehicular flow modelling tools and network simulation tools.

  7. Simple markers for subclinical inflammation in the different phases of bipolar affective disorder

    Directory of Open Access Journals (Sweden)

    Mesut Yildiz

    Full Text Available Abstract Background: Recently, a growing number of publications have suggested that the immune-inflammatory system may be involved in the etiology of bipolar disorder (BD. Objective: The aim of this study was to investigate neutrophil-lymphocyte ratio (NLR, platelet-lymphocyte ratio (PLR, and red cell distribution width (RDW in the three different phases of BD patients compared to each other and controls. Methods: One hundred eighty-seven bipolar patients (78 euthymic, 53 manic/hypomanic and 56 depressed, and 62 age and sex matched controls were enrolled. Sociodemographic variables and complete blood count parameters of the patients and the control group were recorded. Results: The groups did not differ from each other on the hematological parameters, except for NLR and RDW. Post-hoc analyses revealed that NLR values were significantly higher in the euthymic and manic/hypomanic bipolar groups compared to control group. In addition, post-hoc analyses revealed that RDW values were significantly higher in the manic/hypomanic bipolar group relative to the control group. Discussion: Longitudinal studies evaluating the levels of inflammatory markers in the early phases of the disorder, and their relationship with the development of different episodes and medical comorbidities may be useful to understand the role of inflammation in BD.

  8. Comparative analyses of population-scale phenomic data in electronic medical records reveal race-specific disease networks

    Science.gov (United States)

    Glicksberg, Benjamin S.; Li, Li; Badgeley, Marcus A.; Shameer, Khader; Kosoy, Roman; Beckmann, Noam D.; Pho, Nam; Hakenberg, Jörg; Ma, Meng; Ayers, Kristin L.; Hoffman, Gabriel E.; Dan Li, Shuyu; Schadt, Eric E.; Patel, Chirag J.; Chen, Rong; Dudley, Joel T.

    2016-01-01

    Motivation: Underrepresentation of racial groups represents an important challenge and major gap in phenomics research. Most of the current human phenomics research is based primarily on European populations; hence it is an important challenge to expand it to consider other population groups. One approach is to utilize data from EMR databases that contain patient data from diverse demographics and ancestries. The implications of this racial underrepresentation of data can be profound regarding effects on the healthcare delivery and actionability. To the best of our knowledge, our work is the first attempt to perform comparative, population-scale analyses of disease networks across three different populations, namely Caucasian (EA), African American (AA) and Hispanic/Latino (HL). Results: We compared susceptibility profiles and temporal connectivity patterns for 1988 diseases and 37 282 disease pairs represented in a clinical population of 1 025 573 patients. Accordingly, we revealed appreciable differences in disease susceptibility, temporal patterns, network structure and underlying disease connections between EA, AA and HL populations. We found 2158 significantly comorbid diseases for the EA cohort, 3265 for AA and 672 for HL. We further outlined key disease pair associations unique to each population as well as categorical enrichments of these pairs. Finally, we identified 51 key ‘hub’ diseases that are the focal points in the race-centric networks and of particular clinical importance. Incorporating race-specific disease comorbidity patterns will produce a more accurate and complete picture of the disease landscape overall and could support more precise understanding of disease relationships and patient management towards improved clinical outcomes. Contacts: rong.chen@mssm.edu or joel.dudley@mssm.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:27307606

  9. Exploratory Metabolomic Analyses Reveal Compounds Correlated with Lutein Concentration in Frontal Cortex, Hippocampus, and Occipital Cortex of Human Infant Brain.

    Directory of Open Access Journals (Sweden)

    Jacqueline C Lieblein-Boff

    Full Text Available Lutein is a dietary carotenoid well known for its role as an antioxidant in the macula, and recent reports implicate a role for lutein in cognitive function. Lutein is the dominant carotenoid in both pediatric and geriatric brain tissue. In addition, cognitive function in older adults correlated with macular and postmortem brain lutein concentrations. Furthermore, lutein was found to preferentially accumulate in the infant brain in comparison to other carotenoids that are predominant in diet. While lutein is consistently related to cognitive function, the mechanisms by which lutein may influence cognition are not clear. In an effort to identify potential mechanisms through which lutein might influence neurodevelopment, an exploratory study relating metabolite signatures and lutein was completed. Post-mortem metabolomic analyses were performed on human infant brain tissues in three regions important for learning and memory: the frontal cortex, hippocampus, and occipital cortex. Metabolomic profiles were compared to lutein concentration, and correlations were identified and reported here. A total of 1276 correlations were carried out across all brain regions. Of 427 metabolites analyzed, 257 were metabolites of known identity. Unidentified metabolite correlations (510 were excluded. In addition, moderate correlations with xenobiotic relationships (2 or those driven by single outliers (3 were excluded from further study. Lutein concentrations correlated with lipid pathway metabolites, energy pathway metabolites, brain osmolytes, amino acid neurotransmitters, and the antioxidant homocarnosine. These correlations were often brain region-specific. Revealing relationships between lutein and metabolic pathways may help identify potential candidates on which to complete further analyses and may shed light on important roles of lutein in the human brain during development.

  10. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  11. Multiobjective Reinforcement Learning for Traffic Signal Control Using Vehicular Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Houli Duan

    2010-01-01

    Full Text Available We propose a new multiobjective control algorithm based on reinforcement learning for urban traffic signal control, named multi-RL. A multiagent structure is used to describe the traffic system. A vehicular ad hoc network is used for the data exchange among agents. A reinforcement learning algorithm is applied to predict the overall value of the optimization objective given vehicles' states. The policy which minimizes the cumulative value of the optimization objective is regarded as the optimal one. In order to make the method adaptive to various traffic conditions, we also introduce a multiobjective control scheme in which the optimization objective is selected adaptively to real-time traffic states. The optimization objectives include the vehicle stops, the average waiting time, and the maximum queue length of the next intersection. In addition, we also accommodate a priority control to the buses and the emergency vehicles through our model. The simulation results indicated that our algorithm could perform more efficiently than traditional traffic light control methods.

  12. Comparative Genome Analyses of Serratia marcescens FS14 Reveals Its High Antagonistic Potential

    Science.gov (United States)

    Li, Pengpeng; Kwok, Amy H. Y.; Jiang, Jingwei; Ran, Tingting; Xu, Dongqing; Wang, Weiwu; Leung, Frederick C.

    2015-01-01

    S. marcescens FS14 was isolated from an Atractylodes macrocephala Koidz plant that was infected by Fusarium oxysporum and showed symptoms of root rot. With the completion of the genome sequence of FS14, the first comprehensive comparative-genomic analysis of the Serratia genus was performed. Pan-genome and COG analyses showed that the majority of the conserved core genes are involved in basic cellular functions, while genomic factors such as prophages contribute considerably to genome diversity. Additionally, a Type I restriction-modification system, a Type III secretion system and tellurium resistance genes are found in only some Serratia species. Comparative analysis further identified that S. marcescens FS14 possesses multiple mechanisms for antagonism against other microorganisms, including the production of prodigiosin, bacteriocins, and multi-antibiotic resistant determinants as well as chitinases. The presence of two evolutionarily distinct Type VI secretion systems (T6SSs) in FS14 may provide further competitive advantages for FS14 against other microbes. To our knowledge, this is the first report of comparative analysis on T6SSs in the genus, which identifies four types of T6SSs in Serratia spp.. Competition bioassays of FS14 against the vital plant pathogenic bacterium Ralstonia solanacearum and fungi Fusarium oxysporum and Sclerotinia sclerotiorum were performed to support our genomic analyses, in which FS14 demonstrated high antagonistic activities against both bacterial and fungal phytopathogens. PMID:25856195

  13. Comparative genome analyses of Serratia marcescens FS14 reveals its high antagonistic potential.

    Science.gov (United States)

    Li, Pengpeng; Kwok, Amy H Y; Jiang, Jingwei; Ran, Tingting; Xu, Dongqing; Wang, Weiwu; Leung, Frederick C

    2015-01-01

    S. marcescens FS14 was isolated from an Atractylodes macrocephala Koidz plant that was infected by Fusarium oxysporum and showed symptoms of root rot. With the completion of the genome sequence of FS14, the first comprehensive comparative-genomic analysis of the Serratia genus was performed. Pan-genome and COG analyses showed that the majority of the conserved core genes are involved in basic cellular functions, while genomic factors such as prophages contribute considerably to genome diversity. Additionally, a Type I restriction-modification system, a Type III secretion system and tellurium resistance genes are found in only some Serratia species. Comparative analysis further identified that S. marcescens FS14 possesses multiple mechanisms for antagonism against other microorganisms, including the production of prodigiosin, bacteriocins, and multi-antibiotic resistant determinants as well as chitinases. The presence of two evolutionarily distinct Type VI secretion systems (T6SSs) in FS14 may provide further competitive advantages for FS14 against other microbes. To our knowledge, this is the first report of comparative analysis on T6SSs in the genus, which identifies four types of T6SSs in Serratia spp.. Competition bioassays of FS14 against the vital plant pathogenic bacterium Ralstonia solanacearum and fungi Fusarium oxysporum and Sclerotinia sclerotiorum were performed to support our genomic analyses, in which FS14 demonstrated high antagonistic activities against both bacterial and fungal phytopathogens.

  14. Spatial genetic analyses reveal cryptic population structure and migration patterns in a continuously harvested grey wolf (Canis lupus population in north-eastern Europe.

    Directory of Open Access Journals (Sweden)

    Maris Hindrikson

    Full Text Available Spatial genetics is a relatively new field in wildlife and conservation biology that is becoming an essential tool for unravelling the complexities of animal population processes, and for designing effective strategies for conservation and management. Conceptual and methodological developments in this field are therefore critical. Here we present two novel methodological approaches that further the analytical possibilities of STRUCTURE and DResD. Using these approaches we analyse structure and migrations in a grey wolf (Canislupus population in north-eastern Europe. We genotyped 16 microsatellite loci in 166 individuals sampled from the wolf population in Estonia and Latvia that has been under strong and continuous hunting pressure for decades. Our analysis demonstrated that this relatively small wolf population is represented by four genetic groups. We also used a novel methodological approach that uses linear interpolation to statistically test the spatial separation of genetic groups. The new method, which is capable of using program STRUCTURE output, can be applied widely in population genetics to reveal both core areas and areas of low significance for genetic groups. We also used a recently developed spatially explicit individual-based method DResD, and applied it for the first time to microsatellite data, revealing a migration corridor and barriers, and several contact zones.

  15. Post-genomic analyses of fungal lignocellulosic biomass degradation reveal the unexpected potential of the plant pathogen Ustilago maydis

    Directory of Open Access Journals (Sweden)

    Couturier Marie

    2012-02-01

    Full Text Available Abstract Background Filamentous fungi are potent biomass degraders due to their ability to thrive in ligno(hemicellulose-rich environments. During the last decade, fungal genome sequencing initiatives have yielded abundant information on the genes that are putatively involved in lignocellulose degradation. At present, additional experimental studies are essential to provide insights into the fungal secreted enzymatic pools involved in lignocellulose degradation. Results In this study, we performed a wide analysis of 20 filamentous fungi for which genomic data are available to investigate their biomass-hydrolysis potential. A comparison of fungal genomes and secretomes using enzyme activity profiling revealed discrepancies in carbohydrate active enzymes (CAZymes sets dedicated to plant cell wall. Investigation of the contribution made by each secretome to the saccharification of wheat straw demonstrated that most of them individually supplemented the industrial Trichoderma reesei CL847 enzymatic cocktail. Unexpectedly, the most striking effect was obtained with the phytopathogen Ustilago maydis that improved the release of total sugars by 57% and of glucose by 22%. Proteomic analyses of the best-performing secretomes indicated a specific enzymatic mechanism of U. maydis that is likely to involve oxido-reductases and hemicellulases. Conclusion This study provides insight into the lignocellulose-degradation mechanisms by filamentous fungi and allows for the identification of a number of enzymes that are potentially useful to further improve the industrial lignocellulose bioconversion process.

  16. Analyses in zebrafish embryos reveal that nanotoxicity profiles are dependent on surface-functionalization controlled penetrance of biological membranes.

    Science.gov (United States)

    Paatero, Ilkka; Casals, Eudald; Niemi, Rasmus; Özliseli, Ezgi; Rosenholm, Jessica M; Sahlgren, Cecilia

    2017-08-21

    Mesoporous silica nanoparticles (MSNs) are extensively explored as drug delivery systems, but in depth understanding of design-toxicity relationships is still scarce. We used zebrafish (Danio rerio) embryos to study toxicity profiles of differently surface functionalized MSNs. Embryos with the chorion membrane intact, or dechoroniated embryos, were incubated or microinjected with amino (NH 2 -MSNs), polyethyleneimine (PEI-MSNs), succinic acid (SUCC-MSNs) or polyethyleneglycol (PEG-MSNs) functionalized MSNs. Toxicity was assessed by viability and cardiovascular function. NH 2 -MSNs, SUCC-MSNs and PEG-MSNs were well tolerated, 50 µg/ml PEI-MSNs induced 100% lethality 48 hours post fertilization (hpf). Dechoroniated embryos were more sensitive and 10 µg/ml PEI-MSNs reduced viability to 5% at 96hpf. Sensitivity to PEG- and SUCC-, but not NH 2 -MSNs, was also enhanced. Typically cardiovascular toxicity was evident prior to lethality. Confocal microscopy revealed that PEI-MSNs penetrated into the embryos whereas PEG-, NH2- and SUCC-MSNs remained aggregated on the skin surface. Direct exposure of inner organs by microinjecting NH 2 -MSNs and PEI-MSNs demonstrated that the particles displayed similar toxicity indicating that functionalization affects the toxicity profile by influencing penetrance through biological barriers. The data emphasize the need for careful analyses of toxicity mechanisms in relevant models and constitute an important knowledge step towards the development of safer and sustainable nanotherapies.

  17. Transcriptomic analyses reveal novel genes with sexually dimorphic expression in the zebrafish gonad and brain.

    Directory of Open Access Journals (Sweden)

    Rajini Sreenivasan

    Full Text Available BACKGROUND: Our knowledge on zebrafish reproduction is very limited. We generated a gonad-derived cDNA microarray from zebrafish and used it to analyze large-scale gene expression profiles in adult gonads and other organs. METHODOLOGY/PRINCIPAL FINDINGS: We have identified 116638 gonad-derived zebrafish expressed sequence tags (ESTs, 21% of which were isolated in our lab. Following in silico normalization, we constructed a gonad-derived microarray comprising 6370 unique, full-length cDNAs from differentiating and adult gonads. Labeled targets from adult gonad, brain, kidney and 'rest-of-body' from both sexes were hybridized onto the microarray. Our analyses revealed 1366, 881 and 656 differentially expressed transcripts (34.7% novel that showed highest expression in ovary, testis and both gonads respectively. Hierarchical clustering showed correlation of the two gonadal transcriptomes and their similarities to those of the brains. In addition, we have identified 276 genes showing sexually dimorphic expression both between the brains and between the gonads. By in situ hybridization, we showed that the gonadal transcripts with the strongest array signal intensities were germline-expressed. We found that five members of the GTP-binding septin gene family, from which only one member (septin 4 has previously been implicated in reproduction in mice, were all strongly expressed in the gonads. CONCLUSIONS/SIGNIFICANCE: We have generated a gonad-derived zebrafish cDNA microarray and demonstrated its usefulness in identifying genes with sexually dimorphic co-expression in both the gonads and the brains. We have also provided the first evidence of large-scale differential gene expression between female and male brains of a teleost. Our microarray would be useful for studying gonad development, differentiation and function not only in zebrafish but also in related teleosts via cross-species hybridizations. Since several genes have been shown to play similar

  18. Functional expression of a proton-coupled organic cation (H+/OC antiporter in human brain capillary endothelial cell line hCMEC/D3, a human blood–brain barrier model

    Directory of Open Access Journals (Sweden)

    Shimomura Keita

    2013-01-01

    Full Text Available Abstract Background Knowledge of the molecular basis and transport function of the human blood–brain barrier (BBB is important for not only understanding human cerebral physiology, but also development of new central nervous system (CNS-acting drugs. However, few studies have been done using human brain capillary endothelial cells, because human brain materials are difficult to obtain. The purpose of this study is to clarify the functional expression of a proton-coupled organic cation (H+/OC antiporter in human brain capillary endothelial cell line hCMEC/D3, which has been recently developed as an in vitro human BBB model. Methods Diphenhydramine, [3H]pyrilamine and oxycodone were used as cationic drugs that proved to be H+/OC antiporter substrates. The in vitro uptake experiments by hCMEC/D3 cells were carried out under several conditions. Results Diphenhydramine and [3H]pyrilamine were both transported into hCMEC/D3 cells in a time- and concentration-dependent manner with Km values of 59 μM and 19 μM, respectively. Each inhibited uptake of the other in a competitive manner, suggesting that a common mechanism is involved in their transport. The diphenhydramine uptake was significantly inhibited by amantadine and quinidine, but not tetraethylammonium and 1-methyl-4-phenylpyridinium (substrates for well-known organic cation transporters. The uptake was inhibited by metabolic inhibitors, but was insensitive to extracellular sodium and membrane potential. Further, the uptake was increased by extracellular alkalization and intracellular acidification. These transport properties are completely consistent with those of previously characterized H+/OC antiporter in rat BBB. Conclusions The present results suggest that H+/OC antiporter is functionally expressed in hCMEC/D3 cells.

  19. Comparative genome analyses of Serratia marcescens FS14 reveals its high antagonistic potential.

    Directory of Open Access Journals (Sweden)

    Pengpeng Li

    Full Text Available S. marcescens FS14 was isolated from an Atractylodes macrocephala Koidz plant that was infected by Fusarium oxysporum and showed symptoms of root rot. With the completion of the genome sequence of FS14, the first comprehensive comparative-genomic analysis of the Serratia genus was performed. Pan-genome and COG analyses showed that the majority of the conserved core genes are involved in basic cellular functions, while genomic factors such as prophages contribute considerably to genome diversity. Additionally, a Type I restriction-modification system, a Type III secretion system and tellurium resistance genes are found in only some Serratia species. Comparative analysis further identified that S. marcescens FS14 possesses multiple mechanisms for antagonism against other microorganisms, including the production of prodigiosin, bacteriocins, and multi-antibiotic resistant determinants as well as chitinases. The presence of two evolutionarily distinct Type VI secretion systems (T6SSs in FS14 may provide further competitive advantages for FS14 against other microbes. To our knowledge, this is the first report of comparative analysis on T6SSs in the genus, which identifies four types of T6SSs in Serratia spp.. Competition bioassays of FS14 against the vital plant pathogenic bacterium Ralstonia solanacearum and fungi Fusarium oxysporum and Sclerotinia sclerotiorum were performed to support our genomic analyses, in which FS14 demonstrated high antagonistic activities against both bacterial and fungal phytopathogens.

  20. An ad hoc wireless sensor network for tele medicine applications

    International Nuclear Information System (INIS)

    Sheltami, Tarek R.; Mahmoud, Ashraf S.; Abu-Amara, Marwan H.

    2007-01-01

    Recent advances in embedded computing systems have led to the emergence of wireless sensor networks (SNETs), consisting of small, battery-powered motes with limited computation and radio communication capabilities. SNETs permit data gathering and computation to be deeply embedded in the physical environment. Large scale ad hoc sensor networks (ASNET), when deployed among mobile patients, can provide dynamic data query architecture to allow medical specialists to monitor patients at any place via the web or cellular network. In case of an emergency, doctors and/or nurses will be contacted automatically through their handheld personal digital assistants (PDAs) or cellular phones. In specific, the proposed network consists of sensor nodes at the first layer whose responsibility is to measure, collect and communicate, via wired or wireless interface, readings to a microcontroller presenting the second layer of architecture. Deployed microcontrollers process incoming readings and report to a central system via a wireless interface. The implemented network distinguishes between periodic sensor readings and critical or event driven readings where higher priorities is given for the latter. In this paper we implement 3 special cases for tracking and monitoring patients and doctors using SNETs. In addition, the performance of a large scale of our implementation has been tested by means of mathematical analysis. (author)

  1. Concurrent growth rate and transcript analyses reveal essential gene stringency in Escherichia coli.

    Directory of Open Access Journals (Sweden)

    Shan Goh

    Full Text Available BACKGROUND: Genes essential for bacterial growth are of particular scientific interest. Many putative essential genes have been identified or predicted in several species, however, little is known about gene expression requirement stringency, which may be an important aspect of bacterial physiology and likely a determining factor in drug target development. METHODOLOGY/PRINCIPAL FINDINGS: Working from the premise that essential genes differ in absolute requirement for growth, we describe silencing of putative essential genes in E. coli to obtain a titration of declining growth rates and transcript levels by using antisense peptide nucleic acids (PNA and expressed antisense RNA. The relationship between mRNA decline and growth rate decline reflects the degree of essentiality, or stringency, of an essential gene, which is here defined by the minimum transcript level for a 50% reduction in growth rate (MTL(50. When applied to four growth essential genes, both RNA silencing methods resulted in MTL(50 values that reveal acpP as the most stringently required of the four genes examined, with ftsZ the next most stringently required. The established antibacterial targets murA and fabI were less stringently required. CONCLUSIONS: RNA silencing can reveal stringent requirements for gene expression with respect to growth. This method may be used to validate existing essential genes and to quantify drug target requirement.

  2. Comparative analyses of population-scale phenomic data in electronic medical records reveal race-specific disease networks.

    Science.gov (United States)

    Glicksberg, Benjamin S; Li, Li; Badgeley, Marcus A; Shameer, Khader; Kosoy, Roman; Beckmann, Noam D; Pho, Nam; Hakenberg, Jörg; Ma, Meng; Ayers, Kristin L; Hoffman, Gabriel E; Dan Li, Shuyu; Schadt, Eric E; Patel, Chirag J; Chen, Rong; Dudley, Joel T

    2016-06-15

    Underrepresentation of racial groups represents an important challenge and major gap in phenomics research. Most of the current human phenomics research is based primarily on European populations; hence it is an important challenge to expand it to consider other population groups. One approach is to utilize data from EMR databases that contain patient data from diverse demographics and ancestries. The implications of this racial underrepresentation of data can be profound regarding effects on the healthcare delivery and actionability. To the best of our knowledge, our work is the first attempt to perform comparative, population-scale analyses of disease networks across three different populations, namely Caucasian (EA), African American (AA) and Hispanic/Latino (HL). We compared susceptibility profiles and temporal connectivity patterns for 1988 diseases and 37 282 disease pairs represented in a clinical population of 1 025 573 patients. Accordingly, we revealed appreciable differences in disease susceptibility, temporal patterns, network structure and underlying disease connections between EA, AA and HL populations. We found 2158 significantly comorbid diseases for the EA cohort, 3265 for AA and 672 for HL. We further outlined key disease pair associations unique to each population as well as categorical enrichments of these pairs. Finally, we identified 51 key 'hub' diseases that are the focal points in the race-centric networks and of particular clinical importance. Incorporating race-specific disease comorbidity patterns will produce a more accurate and complete picture of the disease landscape overall and could support more precise understanding of disease relationships and patient management towards improved clinical outcomes. rong.chen@mssm.edu or joel.dudley@mssm.edu Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press.

  3. Unexpected associated microalgal diversity in the lichen Ramalina farinacea is uncovered by pyrosequencing analyses.

    Directory of Open Access Journals (Sweden)

    Patricia Moya

    Full Text Available The current literature reveals that the intrathalline coexistence of multiple microalgal taxa in lichens is more common than previously thought, and additional complexity is supported by the coexistence of bacteria and basidiomycete yeasts in lichen thalli. This replaces the old paradigm that lichen symbiosis occurs between a fungus and a single photobiont. The lichen Ramalina farinacea has proven to be a suitable model to study the multiplicity of microalgae in lichen thalli due to the constant coexistence of Trebouxia sp. TR9 and T. jamesii in long-distance populations. To date, studies involving phycobiont diversity within entire thalli are based on Sanger sequencing, but this method seems to underestimate the diversity. Here, we aim to analyze both the microalgal diversity and its community structure in a single thallus of the lichen R. farinacea by applying a 454 pyrosequencing approach coupled with a careful ad hoc-performed protocol for lichen sample processing prior to DNA extraction. To ascertain the reliability of the pyrosequencing results and the applied bioinformatics pipeline results, the thalli were divided into three sections (apical, middle and basal zones, and a mock community sample was used. The developed methodology allowed 40448 filtered algal reads to be obtained from a single lichen thallus, which encompassed 31 OTUs representative of different microalgae genera. In addition to corroborating the coexistence of the two Trebouxia sp. TR9 and T. jamesii taxa in the same thallus, this study showed a much higher microalgal diversity associated with the lichen. Along the thallus ramifications, we also detected variations in phycobiont distribution that might correlate with different microenvironmental conditions. These results highlight R. farinacea as a suitable material for studying microalgal diversity and further strengthen the concept of lichens as multispecies microecosystems. Future analyses will be relevant to

  4. Evaluation of patient-rated stiffness associated with fibromyalgia: a post-hoc analysis of 4 pooled, randomized clinical trials of duloxetine.

    Science.gov (United States)

    Bennett, Robert; Russell, I Jon; Choy, Ernest; Spaeth, Michael; Mease, Philip; Kajdasz, Daniel; Walker, Daniel; Wang, Fujun; Chappell, Amy

    2012-04-01

    Patients with fibromyalgia (FM) rate stiffness as one of the most troublesome symptoms of the disorder. However, there are few published studies that have focused on better understanding the nature of stiffness in FM. The primary objectives of these analyses were to characterize the distribution of stiffness severity in patients at baseline, evaluate changes in stiffness after 12 weeks of treatment with duloxetine, and determine which outcomes were correlated with stiffness. These were post-hoc analyses of 3-month data from 4 randomized, double-blind, placebo-controlled studies that assessed efficacy of duloxetine in adults with FM. Severity of stiffness was assessed by using the Fibromyalgia Impact Questionnaire (FIQ) on a scale from 0 (no stiffness) to 10 (most severe stiffness). The association between changes in stiffness and other measures was evaluated by using Pearson's correlation coefficient. The FIQ total score and items, the Brief Pain Inventory (BPI-modified short form), the Clinical Global Impression-Severity scale, the Multidimensional Fatigue Inventory, the 17-item Hamilton Depression Rating Scale, the Sheehan Disability Scale, the 36-item Short-Form Health Survey, and the EuroQoL Questionnaire-5 Dimensions were evaluated in the correlation analyses. Stepwise linear regression was used to identify the variables that were most highly predictive of the changes in FIQ stiffness. The analysis included 1332 patients (mean age, 50.2 years; 94.7% female; and 87.8% white). The mean (SD) baseline FIQ stiffness score was 7.7 (2.0), and this score correlated with baseline BPI pain score and FIQ function. Duloxetine significantly improved the FIQ stiffness score compared with placebo (P FIQ pain and interference scores, FIQ nonrefreshing sleep, FIQ anxiety, 36-item Short-Form Health Survey bodily pain, and Sheehan Disability Scale total score. Variables related to severity of pain, pain interfering with daily activities, and physical functioning were predictors

  5. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  6. Asymptotic Delay Analysis for Cross-Layer Delay-Based Routing in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Philippe Jacquet

    2007-01-01

    Full Text Available This paper addresses the problem of the evaluation of the delay distribution via analytical means in IEEE 802.11 wireless ad hoc networks. We show that the asymptotic delay distribution can be expressed as a power law. Based on the latter result, we present a cross-layer delay estimation protocol and we derive new delay-distribution-based routing algorithms, which are well adapted to the QoS requirements of real-time multimedia applications. In fact, multimedia services are not sensitive to average delays, but rather to the asymptotic delay distributions. Indeed, video streaming applications drop frames when they are received beyond a delay threshold, determined by the buffer size. Although delay-distribution-based routing is an NP-hard problem, we show that it can be solved in polynomial time when the delay threshold is large, because of the asymptotic power law distribution of the link delays.

  7. Impact of Beamforming on the Path Connectivity in Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Le The Dung

    2017-03-01

    Full Text Available This paper investigates the impact of using directional antennas and beamforming schemes on the connectivity of cognitive radio ad hoc networks (CRAHNs. Specifically, considering that secondary users use two kinds of directional antennas, i.e., uniform linear array (ULA and uniform circular array (UCA antennas, and two different beamforming schemes, i.e., randomized beamforming and center-directed to communicate with each other, we study the connectivity of all combination pairs of directional antennas and beamforming schemes and compare their performances to those of omnidirectional antennas. The results obtained in this paper show that, compared with omnidirectional transmission, beamforming transmission only benefits the connectivity when the density of secondary user is moderate. Moreover, the combination of UCA and randomized beamforming scheme gives the highest path connectivity in all evaluating scenarios. Finally, the number of antenna elements and degree of path loss greatly affect path connectivity in CRAHNs.

  8. Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm

    Directory of Open Access Journals (Sweden)

    Ahmad Maleki

    2014-09-01

    Full Text Available An important issue in ad-hoc on-demand distance vector (AODV routing protocols is route failure caused by node mobility in the MANETs. The AODV requires a new route discovery procedure whenever a route breaks and these frequent route discoveries increase transmission delays and routing overhead. The present study proposes a new method for AODVs using a genetic algorithm to improve the route recovery mechanism. When failure occurs in a route, the proposed method (GAAODV makes decisions regarding the QOS parameter to select source or local repair. The task of the genetic algorithm is to find an appropriate combination of weights to optimize end-to-end delay. This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. Comparison of the new algorithm and AODV (RFC 3561 using a NS-2 simulator shows that GAAODV obtains better results for the QOS parameters.

  9. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment

    Directory of Open Access Journals (Sweden)

    Muhammad Sohail

    2018-03-01

    Full Text Available Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing, which extends the widely used AODV (Ad hoc On-demand Distance Vector routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network. The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.

  10. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment.

    Science.gov (United States)

    Sohail, Muhammad; Wang, Liangmin

    2018-03-14

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.

  11. Combined Metabonomic and Quantitative RT-PCR Analyses Revealed Metabolic Reprogramming Associated with Fusarium graminearum Resistance in Transgenic Arabidopsis thaliana

    Directory of Open Access Journals (Sweden)

    Fangfang Chen

    2018-01-01

    Full Text Available Fusarium head blight disease resulting from Fusarium graminearum (FG infection causes huge losses in global production of cereals and development of FG-resistant plants is urgently needed. To understand biochemistry mechanisms for FG resistance, here, we have systematically investigated the plant metabolomic phenotypes associated with FG resistance for transgenic Arabidopsis thaliana expressing a class-I chitinase (Chi, a Fusarium-specific recombinant antibody gene (CWP2 and fused Chi-CWP2. Plant disease indices, mycotoxin levels, metabonomic characteristics, and expression levels of several key genes were measured together with their correlations. We found that A. thaliana expressing Chi-CWP2 showed higher FG resistance with much lower disease indices and mycotoxin levels than the wild-type and the plants expressing Chi or CWP2 alone. The combined metabonomic and quantitative RT-PCR analyses revealed that such FG-resistance was closely associated with the promoted biosynthesis of secondary metabolites (phenylpropanoids, alkanoids and organic osmolytes (proline, betaine, glucose, myo-inositol together with enhanced TCA cycle and GABA shunt. These suggest that the concurrently enhanced biosyntheses of the shikimate-mediated secondary metabolites and organic osmolytes be an important strategy for A. thaliana to develop and improve FG resistance. These findings provide essential biochemical information related to FG resistance which is important for developing FG-resistant cereals.

  12. A Bioinspired Adaptive Congestion-Avoidance Routing for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Qiong

    2014-01-01

    Full Text Available Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.

  13. Core microbial functional activities in ocean environments revealed by global metagenomic profiling analyses.

    KAUST Repository

    Ferreira, Ari J S

    2014-06-12

    Metagenomics-based functional profiling analysis is an effective means of gaining deeper insight into the composition of marine microbial populations and developing a better understanding of the interplay between the functional genome content of microbial communities and abiotic factors. Here we present a comprehensive analysis of 24 datasets covering surface and depth-related environments at 11 sites around the world\\'s oceans. The complete datasets comprises approximately 12 million sequences, totaling 5,358 Mb. Based on profiling patterns of Clusters of Orthologous Groups (COGs) of proteins, a core set of reference photic and aphotic depth-related COGs, and a collection of COGs that are associated with extreme oxygen limitation were defined. Their inferred functions were utilized as indicators to characterize the distribution of light- and oxygen-related biological activities in marine environments. The results reveal that, while light level in the water column is a major determinant of phenotypic adaptation in marine microorganisms, oxygen concentration in the aphotic zone has a significant impact only in extremely hypoxic waters. Phylogenetic profiling of the reference photic/aphotic gene sets revealed a greater variety of source organisms in the aphotic zone, although the majority of individual photic and aphotic depth-related COGs are assigned to the same taxa across the different sites. This increase in phylogenetic and functional diversity of the core aphotic related COGs most probably reflects selection for the utilization of a broad range of alternate energy sources in the absence of light.

  14. Core microbial functional activities in ocean environments revealed by global metagenomic profiling analyses.

    KAUST Repository

    Ferreira, Ari J S; Siam, Rania; Setubal, Joã o C; Moustafa, Ahmed; Sayed, Ahmed; Chambergo, Felipe S; Dawe, Adam S; Ghazy, Mohamed A; Sharaf, Hazem; Ouf, Amged; Alam, Intikhab; Abdel-Haleem, Alyaa M; Lehvä slaiho, Heikki; Ramadan, Eman; Antunes, André ; Stingl, Ulrich; Archer, John A.C.; Jankovic, Boris R; Sogin, Mitchell; Bajic, Vladimir B.; El-Dorry, Hamza

    2014-01-01

    Metagenomics-based functional profiling analysis is an effective means of gaining deeper insight into the composition of marine microbial populations and developing a better understanding of the interplay between the functional genome content of microbial communities and abiotic factors. Here we present a comprehensive analysis of 24 datasets covering surface and depth-related environments at 11 sites around the world's oceans. The complete datasets comprises approximately 12 million sequences, totaling 5,358 Mb. Based on profiling patterns of Clusters of Orthologous Groups (COGs) of proteins, a core set of reference photic and aphotic depth-related COGs, and a collection of COGs that are associated with extreme oxygen limitation were defined. Their inferred functions were utilized as indicators to characterize the distribution of light- and oxygen-related biological activities in marine environments. The results reveal that, while light level in the water column is a major determinant of phenotypic adaptation in marine microorganisms, oxygen concentration in the aphotic zone has a significant impact only in extremely hypoxic waters. Phylogenetic profiling of the reference photic/aphotic gene sets revealed a greater variety of source organisms in the aphotic zone, although the majority of individual photic and aphotic depth-related COGs are assigned to the same taxa across the different sites. This increase in phylogenetic and functional diversity of the core aphotic related COGs most probably reflects selection for the utilization of a broad range of alternate energy sources in the absence of light.

  15. Core microbial functional activities in ocean environments revealed by global metagenomic profiling analyses.

    Directory of Open Access Journals (Sweden)

    Ari J S Ferreira

    Full Text Available Metagenomics-based functional profiling analysis is an effective means of gaining deeper insight into the composition of marine microbial populations and developing a better understanding of the interplay between the functional genome content of microbial communities and abiotic factors. Here we present a comprehensive analysis of 24 datasets covering surface and depth-related environments at 11 sites around the world's oceans. The complete datasets comprises approximately 12 million sequences, totaling 5,358 Mb. Based on profiling patterns of Clusters of Orthologous Groups (COGs of proteins, a core set of reference photic and aphotic depth-related COGs, and a collection of COGs that are associated with extreme oxygen limitation were defined. Their inferred functions were utilized as indicators to characterize the distribution of light- and oxygen-related biological activities in marine environments. The results reveal that, while light level in the water column is a major determinant of phenotypic adaptation in marine microorganisms, oxygen concentration in the aphotic zone has a significant impact only in extremely hypoxic waters. Phylogenetic profiling of the reference photic/aphotic gene sets revealed a greater variety of source organisms in the aphotic zone, although the majority of individual photic and aphotic depth-related COGs are assigned to the same taxa across the different sites. This increase in phylogenetic and functional diversity of the core aphotic related COGs most probably reflects selection for the utilization of a broad range of alternate energy sources in the absence of light.

  16. Deciphering the Cryptic Genome: Genome-wide Analyses of the Rice Pathogen Fusarium fujikuroi Reveal Complex Regulation of Secondary Metabolism and Novel Metabolites

    Science.gov (United States)

    Studt, Lena; Niehaus, Eva-Maria; Espino, Jose J.; Huß, Kathleen; Michielse, Caroline B.; Albermann, Sabine; Wagner, Dominik; Bergner, Sonja V.; Connolly, Lanelle R.; Fischer, Andreas; Reuter, Gunter; Kleigrewe, Karin; Bald, Till; Wingfield, Brenda D.; Ophir, Ron; Freeman, Stanley; Hippler, Michael; Smith, Kristina M.; Brown, Daren W.; Proctor, Robert H.; Münsterkötter, Martin; Freitag, Michael; Humpf, Hans-Ulrich; Güldener, Ulrich; Tudzynski, Bettina

    2013-01-01

    The fungus Fusarium fujikuroi causes “bakanae” disease of rice due to its ability to produce gibberellins (GAs), but it is also known for producing harmful mycotoxins. However, the genetic capacity for the whole arsenal of natural compounds and their role in the fungus' interaction with rice remained unknown. Here, we present a high-quality genome sequence of F. fujikuroi that was assembled into 12 scaffolds corresponding to the 12 chromosomes described for the fungus. We used the genome sequence along with ChIP-seq, transcriptome, proteome, and HPLC-FTMS-based metabolome analyses to identify the potential secondary metabolite biosynthetic gene clusters and to examine their regulation in response to nitrogen availability and plant signals. The results indicate that expression of most but not all gene clusters correlate with proteome and ChIP-seq data. Comparison of the F. fujikuroi genome to those of six other fusaria revealed that only a small number of gene clusters are conserved among these species, thus providing new insights into the divergence of secondary metabolism in the genus Fusarium. Noteworthy, GA biosynthetic genes are present in some related species, but GA biosynthesis is limited to F. fujikuroi, suggesting that this provides a selective advantage during infection of the preferred host plant rice. Among the genome sequences analyzed, one cluster that includes a polyketide synthase gene (PKS19) and another that includes a non-ribosomal peptide synthetase gene (NRPS31) are unique to F. fujikuroi. The metabolites derived from these clusters were identified by HPLC-FTMS-based analyses of engineered F. fujikuroi strains overexpressing cluster genes. In planta expression studies suggest a specific role for the PKS19-derived product during rice infection. Thus, our results indicate that combined comparative genomics and genome-wide experimental analyses identified novel genes and secondary metabolites that contribute to the evolutionary success of F

  17. Post hoc analysis of plasma amino acid profiles: towards a specific pattern in autism spectrum disorder and intellectual disability.

    Science.gov (United States)

    Delaye, Jean-Baptiste; Patin, Franck; Lagrue, Emmanuelle; Le Tilly, Olivier; Bruno, Clement; Vuillaume, Marie-Laure; Raynaud, Martine; Benz-De Bretagne, Isabelle; Laumonnier, Frederic; Vourc'h, Patrick; Andres, Christian; Blasco, Helene

    2018-01-01

    Objectives Autism spectrum disorders and intellectual disability present a challenge for therapeutic and dietary management. We performed a re-analysis of plasma amino acid chromatography of children with autism spectrum disorders ( n = 22) or intellectual disability ( n = 29) to search for a metabolic signature that can distinguish individuals with these disorders from controls ( n = 30). Methods We performed univariate and multivariate analyses using different machine learning strategies, from the raw data of the amino acid chromatography. Finally, we analysed the metabolic pathways associated with discriminant biomarkers. Results Multivariate analysis revealed models to discriminate patients with autism spectrum disorders or intellectual disability and controls from plasma amino acid profiles ( P intellectual disability patients shared similar differences relative to controls, including lower glutamate ( P intellectual disability revealed the involvement of urea, 3-methyl-histidine and histidine metabolism. Biosigner analysis and univariate analysis confirmed the role of 3-methylhistidine ( P = 0.004), histidine ( P = 0.003), urea ( P = 0.0006) and lysine ( P = 0.002). Conclusions We revealed discriminant metabolic patterns between autism spectrum disorders, intellectual disability and controls. Amino acids known to play a role in neurotransmission were discriminant in the models comparing autism spectrum disorders or intellectual disability to controls, and histidine and b-alanine metabolism was specifically highlighted in the model.

  18. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  19. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  20. Diet and stable isotope analyses reveal the feeding ecology of the orangeback squid Sthenoteuthis pteropus (Steenstrup 1855 (Mollusca, Ommastrephidae in the eastern tropical Atlantic.

    Directory of Open Access Journals (Sweden)

    Véronique Merten

    Full Text Available In the eastern tropical Atlantic, the orangeback flying squid Sthenoteuthis pteropus (Steenstrup 1855 (Cephalopoda, Ommastrephidae is a dominant species of the epipelagic nekton community. This carnivore squid has a short lifespan and is one of the fastest-growing squids. In this study, we characterise the role of S. pteropus in the pelagic food web of the eastern tropical Atlantic by investigating its diet and the dynamics of its feeding habits throughout its ontogeny and migration. During three expeditions in the eastern tropical Atlantic in 2015, 129 specimens were caught by hand jigging. Stomach content analyses (via visual identification and DNA barcoding were combined with stable isotope data (∂15N and ∂13C of muscle tissue to describe diet, feeding habits and trophic ecology of S. pteropus. Additionally, stable isotope analyses of incremental samples along the squid's gladius-the chitinous spiniform structure supporting the muscles and organs-were carried out to explore possible diet shifts through ontogeny and migration. Our results show that S. pteropus preys mainly on myctophid fishes (e.g. Myctophum asperum, Myctophum nitidulum, Vinciguerria spp., but also on other teleost species, cephalopods (e.g. Enoploteuthidae, Bolitinidae, Ommastrephidae, crustaceans and possibly on gelatinous zooplankton as well. The squid shows a highly opportunistic feeding behaviour that includes cannibalism. Our study indicates that the trophic position of S. pteropus may increase by approximately one trophic level from a mantle length of 15 cm to 47 cm. The reconstructed isotope-based feeding chronologies of the gladii revealed high intra- and inter-individual variability in the squid's trophic position and foraging area. These findings are not revealed by diet or muscle tissue stable isotope analysis. This suggests a variable and complex life history involving individual variation and migration. The role of S. pteropus in transferring energy and