WorldWideScience

Sample records for hoc analysis revealed

  1. Level of literacy and dementia: A secondary post-hoc analysis from North-West India

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Raina

    2014-01-01

    Full Text Available Introduction: A relation between literacy and dementia has been studied in past and an association has been documented. This is in spite of some studies pointing to the contrary. The current study was aimed at investigating the influence of level of literacy on dementia in a sample stratified by geography (Migrant, Urban, Rural and Tribal areas of sub-Himalayan state of Himachal Pradesh, India. Materials and Methods: The study was based on post-hoc analysis of data obtained from a study conducted on elderly population (60 years and above from selected geographical areas (Migrant, Urban, Rural and Tribal of Himachal Pradesh state in North-west India. Results: Analysis of variance revealed an effect of education on cognitive scores [F = 2.823, P =0.01], however, post-hoc Tukey′s HSD test did not reveal any significant pairwise comparisons. Discussion: The possibility that education effects dementia needs further evaluation, more so in Indian context.

  2. Analysis for Ad Hoc Network Attack-Defense Based on Stochastic Game Model

    Directory of Open Access Journals (Sweden)

    Yuanjie LI

    2014-06-01

    Full Text Available The attack actions analysis for Ad Hoc networks can provide a reference for the design security mechanisms. This paper presents an analysis method of security of Ad Hoc networks based on Stochastic Game Nets (SGN. This method can establish a SGN model of Ad Hoc networks and calculate to get the Nash equilibrium strategy. After transforming the SGN model into a continuous-time Markov Chain (CTMC, the security of Ad Hoc networks can be evaluated and analyzed quantitatively by calculating the stationary probability of CTMC. Finally, the Matlab simulation results show that the probability of successful attack is related to the attack intensity and expected payoffs, but not attack rate.

  3. Ad-hoc networking towards seamless communications

    CERN Document Server

    Gavrilovska, Liljana

    2006-01-01

    Ad-Hoc Networking Towards Seamless Communications is dedicated to an area that attracts growing interest in academia and industry and concentrates on wireless ad hoc networking paradigm. The persistent efforts to acquire the ability to establish dynamic wireless connections from anywhere to anyone with any device without prerequisite imbedded infrastructure move the communications boundaries towards ad-hoc networks. Recently, ad hoc networking has attracted growing interest due to advances in wireless communications, and developed framework for running IP based protocols. The expected degree of penetration of these networks will depend on the successful resolution of the key features. Ad-hoc networks pose many complex and open problems for researchers. Ad-Hoc Networking Towards Seamless Communications reveals the state-of-the-art in wireless ad-hoc networking and discusses some of the key research topics that are expected to promote and accelerate the commercial applications of these networks (e.g., MAC, rout...

  4. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  5. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  6. Ad hoc public disclosure obligations of public companies on the capital market

    Directory of Open Access Journals (Sweden)

    Marjanski Vladimir

    2012-01-01

    Full Text Available The author gives a comprehensive analysis of the obligations of public companies regarding the provision of periodical (ad hoc information to the public on the capital market. Ad hoc disclosure is to achieve a number of aims. It is one of the devices to secure the market's functional abilities. By means of regularly fulfilling this obligation, the market is provided with all the relevant information necessary to form adequate prices of market materials - i.e. securities and other financial instruments (the function of market protection. Investors are thus being able to aptly respond to modified circumstances and deliver investment decisions whether to buy or sell market materials the price of which are being changed (the function of investor protection. Due to the fact that the duty of ad hoc disclosure encompasses the obligation to reveal insider information directly affecting the emitter, ad hoc disclosure serves as a preventive measure, i.e. as a protection against illicit trade with insider information (the function of prevention against the abuse of insider information.

  7. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  8. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-08-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical and virtual carrier sense networks, which reveals counter-intuitively that receivers in large dense networks with directional antennas can experience larger interference than in omnidirectional networks unless the beamwidth is sufficiently small. Validity of mathematical analysis is confirmed using simulations.

  9. Ad hoc supervision of general practice registrars as a 'community of practice': analysis, interpretation and re-presentation.

    Science.gov (United States)

    Clement, T; Brown, J; Morrison, J; Nestel, D

    2016-05-01

    General practice registrars in Australia undertake most of their vocational training in accredited general practices. They typically see patients alone from the start of their community-based training and are expected to seek timely ad hoc support from their supervisor. Such ad hoc encounters are a mechanism for ensuring patient safety, but also provide an opportunity for learning and teaching. Wenger's (Communities of practice: learning, meaning, and identity. Cambridge University Press, New York, 1998) social theory of learning ('communities of practice') guided a secondary analysis of audio-recordings of ad hoc encounters. Data from one encounter is re-presented as an extended sequence to maintain congruence with the theoretical perspective and enhance vicariousness. An interpretive commentary communicates key features of Wenger's theory and highlights the researchers' interpretations. We argue that one encounter can reveal universal understandings of clinical supervision and that the process of naturalistic generalisation allows readers to transfer others' experiences to their own contexts. The paper raises significant analytic, interpretive, and representational issues. We highlight that report writing is an important, but infrequently discussed, part of research design. We discuss the challenges of supporting the learning and teaching that arises from adopting a socio-cultural lens and argue that such a perspective importantly captures the complex range of issues that work-based practitioners have to grapple with. This offers a challenge to how we research and seek to influence work-based learning and teaching in health care settings.

  10. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  11. Performance Analysis of Ad Hoc Dispersed Spectrum Cognitive Radio Networks over Fading Channels

    Directory of Open Access Journals (Sweden)

    Mohammad Muneer

    2011-01-01

    Full Text Available Cognitive radio systems can utilize dispersed spectrum, and thus such approach is known as dispersed spectrum cognitive radio systems. In this paper, we first provide the performance analysis of such systems over fading channels. We derive the average symbol error probability of dispersed spectrum cognitive radio systems for two cases, where the channel for each frequency diversity band experiences independent and dependent Nakagami- fading. In addition, the derivation is extended to include the effects of modulation type and order by considering M-ary phase-shift keying ( -PSK and M-ary quadrature amplitude modulation -QAM schemes. We then consider the deployment of such cognitive radio systems in an ad hoc fashion. We consider an ad hoc dispersed spectrum cognitive radio network, where the nodes are assumed to be distributed in three dimension (3D. We derive the effective transport capacity considering a cubic grid distribution. Numerical results are presented to verify the theoretical analysis and show the performance of such networks.

  12. Broadcast design in cognitive radio ad hoc networks

    CERN Document Server

    Song, Yi

    2014-01-01

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broa

  13. Does Ad Hoc Coronary Intervention Reduce Radiation Exposure? – Analysis of 568 Patients

    Energy Technology Data Exchange (ETDEWEB)

    Truffa, Márcio A. M., E-mail: marciotruffa@yahoo.com.br; Alves, Gustavo M.P.; Bernardi, Fernando; Esteves Filho, Antonio; Ribeiro, Expedito; Galon, Micheli Z.; Spadaro, André; Kajita, Luiz J.; Arrieta, Raul; Lemos, Pedro A. [Instituto do Coração - Hospital das Clínicas - Faculdade de Medicina da Universidade de São Paulo (USP), São Paulo, SP (Brazil)

    2015-11-15

    Advantages and disadvantages of ad hoc percutaneous coronary intervention have been described. However little is known about the radiation exposure of that procedure as compared with the staged intervention. To compare the radiation dose of the ad hoc percutaneous coronary intervention with that of the staged procedure The dose-area product and total Kerma were measured, and the doses of the diagnostic and therapeutic procedures were added. In addition, total fluoroscopic time and number of acquisitions were evaluated. A total of 568 consecutive patients were treated with ad hoc percutaneous coronary intervention (n = 320) or staged percutaneous coronary intervention (n = 248). On admission, the ad hoc group had less hypertension (74.1% vs 81.9%; p = 0.035), dyslipidemia (57.8% vs. 67.7%; p = 0.02) and three-vessel disease (38.8% vs. 50.4%; p = 0.015). The ad hoc group was exposed to significantly lower radiation doses, even after baseline characteristic adjustment between both groups. The ad hoc group was exposed to a total dose-area product of 119.7 ± 70.7 Gycm{sup 2}, while the staged group, to 139.2 ± 75.3 Gycm{sup 2} (p < 0.001). Ad hoc percutaneous coronary intervention reduced radiation exposure as compared with diagnostic and therapeutic procedures performed at two separate times.

  14. Does Ad Hoc Coronary Intervention Reduce Radiation Exposure? – Analysis of 568 Patients

    International Nuclear Information System (INIS)

    Truffa, Márcio A. M.; Alves, Gustavo M.P.; Bernardi, Fernando; Esteves Filho, Antonio; Ribeiro, Expedito; Galon, Micheli Z.; Spadaro, André; Kajita, Luiz J.; Arrieta, Raul; Lemos, Pedro A.

    2015-01-01

    Advantages and disadvantages of ad hoc percutaneous coronary intervention have been described. However little is known about the radiation exposure of that procedure as compared with the staged intervention. To compare the radiation dose of the ad hoc percutaneous coronary intervention with that of the staged procedure The dose-area product and total Kerma were measured, and the doses of the diagnostic and therapeutic procedures were added. In addition, total fluoroscopic time and number of acquisitions were evaluated. A total of 568 consecutive patients were treated with ad hoc percutaneous coronary intervention (n = 320) or staged percutaneous coronary intervention (n = 248). On admission, the ad hoc group had less hypertension (74.1% vs 81.9%; p = 0.035), dyslipidemia (57.8% vs. 67.7%; p = 0.02) and three-vessel disease (38.8% vs. 50.4%; p = 0.015). The ad hoc group was exposed to significantly lower radiation doses, even after baseline characteristic adjustment between both groups. The ad hoc group was exposed to a total dose-area product of 119.7 ± 70.7 Gycm 2 , while the staged group, to 139.2 ± 75.3 Gycm 2 (p < 0.001). Ad hoc percutaneous coronary intervention reduced radiation exposure as compared with diagnostic and therapeutic procedures performed at two separate times

  15. Cytoarchitecture of the human lateral occipital cortex: mapping of two extrastriate areas hOc4la and hOc4lp.

    Science.gov (United States)

    Malikovic, Aleksandar; Amunts, Katrin; Schleicher, Axel; Mohlberg, Hartmut; Kujovic, Milenko; Palomero-Gallagher, Nicola; Eickhoff, Simon B; Zilles, Karl

    2016-05-01

    The microstructural correlates of the functional segregation of the human lateral occipital cortex are largely unknown. Therefore, we analyzed the cytoarchitecture of this region in ten human post-mortem brains using an observer-independent and statistically testable parcellation method to define the position and extent of areas in the lateral occipital cortex. Two new cytoarchitectonic areas were found: an anterior area hOc4la and a posterior area hOc4lp. hOc4la was located behind the anterior occipital sulcus in rostral and ventral portions of this region where it occupies the anterior third of the middle and inferior lateral occipital gyri. hOc4lp was found in caudal and dorsal portions of this region where it extends along the superior and middle lateral occipital gyri. The cytoarchitectonic areas were registered to 3D reconstructions of the corresponding brains, which were subsequently spatially normalized to the Montreal Neurological Institute reference space. Continuous probabilistic maps of both areas based on the analysis of ten brains were generated to characterize their inter-subject variability in location and size. The maps of hOc4la and hOc4lp were then used as seeds for meta-analytic connectivity modeling and quantitative functional decoding to identify their co-activation patterns and assignment to functional domains. Convergent evidence from their location, topography, size, functional domains and connectivity indicates that hOc4la and hOc4lp are the potential anatomical correlates of the functionally defined lateral occipital areas LO-1 and LO-2.

  16. Performance Analysis of a Cluster-Based MAC Protocol for Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jesús Alonso-Zárate

    2010-01-01

    Full Text Available An analytical model to evaluate the non-saturated performance of the Distributed Queuing Medium Access Control Protocol for Ad Hoc Networks (DQMANs in single-hop networks is presented in this paper. DQMAN is comprised of a spontaneous, temporary, and dynamic clustering mechanism integrated with a near-optimum distributed queuing Medium Access Control (MAC protocol. Clustering is executed in a distributed manner using a mechanism inspired by the Distributed Coordination Function (DCF of the IEEE 802.11. Once a station seizes the channel, it becomes the temporary clusterhead of a spontaneous cluster and it coordinates the peer-to-peer communications between the clustermembers. Within each cluster, a near-optimum distributed queuing MAC protocol is executed. The theoretical performance analysis of DQMAN in single-hop networks under non-saturation conditions is presented in this paper. The approach integrates the analysis of the clustering mechanism into the MAC layer model. Up to the knowledge of the authors, this approach is novel in the literature. In addition, the performance of an ad hoc network using DQMAN is compared to that obtained when using the DCF of the IEEE 802.11, as a benchmark reference.

  17. Ad hoc laser networks component technology for modular spacecraft

    Science.gov (United States)

    Huang, Xiujun; Shi, Dele; Shen, Jingshi

    2017-10-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  18. The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2012)

    NARCIS (Netherlands)

    Pitsillides, A.; Douligeris, C.; Vassiliou, V.; Heijenk, Geert; Cavalcante de Oliveira, J.

    Message from the General Chairs Welcome to the 2012 Mediterranean Ad Hoc Networking Workshop in Ayia Napa, Cyprus. We are excited to host Med-Hoc-Net. As a major annual international workshop, following recent successful workshops in Sicily (2006), Corfu (2007), Palma de Mallorca (2008), Haifa

  19. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  20. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  1. Voice Communications over 802.11 Ad Hoc Networks: Modeling, Optimization and Call Admission Control

    Science.gov (United States)

    Xu, Changchun; Xu, Yanyi; Liu, Gan; Liu, Kezhong

    Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MAC layer. The model is applied for performance analysis of voice communications over IEEE 802.11 single-hop ad hoc networks. By using the model, we finish the performance optimization of IEEE MAC layer and obtain the maximum number of voice calls in IEEE 802.11 ad hoc networks as well as the statistical performance bounds. Furthermore, we design a fully distributed call admission control (CAC) algorithm which can provide strict statistical QoS guarantee for voice communications over IEEE 802.11 ad hoc networks. Extensive simulations indicate the accuracy of the analytical model and the CAC scheme.

  2. Reliability analysis of cluster-based ad-hoc networks

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2008-01-01

    The mobile ad-hoc wireless network (MAWN) is a new and emerging network scheme that is being employed in a variety of applications. The MAWN varies from traditional networks because it is a self-forming and dynamic network. The MAWN is free of infrastructure and, as such, only the mobile nodes comprise the network. Pairs of nodes communicate either directly or through other nodes. To do so, each node acts, in turn, as a source, destination, and relay of messages. The virtue of a MAWN is the flexibility this provides; however, the challenge for reliability analyses is also brought about by this unique feature. The variability and volatility of the MAWN configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate because no single structure or configuration represents all manifestations of a MAWN. For this reason, new methods are being developed to analyze the reliability of this new networking technology. New published methods adapt to this feature by treating the configuration probabilistically or by inclusion of embedded mobility models. This paper joins both methods together and expands upon these works by modifying the problem formulation to address the reliability analysis of a cluster-based MAWN. The cluster-based MAWN is deployed in applications with constraints on networking resources such as bandwidth and energy. This paper presents the problem's formulation, a discussion of applicable reliability metrics for the MAWN, and illustration of a Monte Carlo simulation method through the analysis of several example networks

  3. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  4. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  5. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  6. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  7. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  8. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  9. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  10. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  11. VMQL: A Visual Language for Ad-Hoc Model Querying

    DEFF Research Database (Denmark)

    Störrle, Harald

    2011-01-01

    In large scale model based development, analysis level models are more like knowledge bases than engineering artifacts. Their effectiveness depends, to a large degree, on the ability of domain experts to retrieve information from them ad hoc. For large scale models, however, existing query...

  12. AD HOC TEAMWORK BEHAVIORS FOR INFLUENCING A FLOCK

    Directory of Open Access Journals (Sweden)

    Katie Genter

    2016-02-01

    Full Text Available Ad hoc teamwork refers to the challenge of designing agents that can influence the behavior of a team, without prior coordination with its teammates. This paper considers influencing a flock of simple robotic agents to adopt a desired behavior within the context of ad hoc teamwork. Specifically, we examine how the ad hoc agents should behave in order to orient a flock towards a target heading as quickly as possible when given knowledge of, but no direct control over, the behavior of the flock. We introduce three algorithms which the ad hoc agents can use to influence the flock, and we examine the relative importance of coordinating the ad hoc agents versus planning farther ahead when given fixed computational resources. We present detailed experimental results for each of these algorithms, concluding that in this setting, inter-agent coordination and deeper lookahead planning are no more beneficial than short-term lookahead planning.

  13. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  14. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  15. Assured Resource Sharing in Ad-Hoc Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Gail-Joon [Arizona State Univ., Tempe, AZ (United States)

    2015-12-19

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  16. Ad-hoc Content-based Queries and Data Analysis for Virtual Observatories, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Aquilent, Inc. proposes to support ad-hoc, content-based query and data retrieval from virtual observatories (VxO) by developing 1) Higher Order Query Services that...

  17. Game Theory in Wireless Ad-Hoc Opportunistic Radios

    OpenAIRE

    Mumtaz, Shahid; Gameiro, Atilio

    2010-01-01

    Emerging research in game theory based power control applied to ad hoc opportunist networks shows much promise to help understand the complex interactions between OR nodes in this highly dynamic and distributed environment. Also, the employment of game theory in modeling dynamic situations for opportunist ad hoc networks where OR nodes have incomplete information has led to the application of largely unexplored games such as games of imperfect monitoring. Ad hoc security using game theory is ...

  18. The Ex hoc Architecture

    DEFF Research Database (Denmark)

    2006-01-01

    Developed in the LIWAS project which develops technology for measuring road surfaces and communicating this data in an ad hoc environment. The communication part is built upon OOVM Resilient technology....

  19. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  20. A tandem queueing model for delay analysis in disconnected ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; de Haan, Roland; Boucherie, Richardus J.; van Ommeren, Jan C.W.

    2007-01-01

    Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called opportunistic networking which exploits the mobility of the nodes by letting them operate as relays according to the

  1. Protective effect of yerba mate intake on the cardiovascular system: a post hoc analysis study in postmenopausal women

    OpenAIRE

    da Veiga, D.T.A.; Bringhenti, R.; Copes, R.; Tatsch, E.; Moresco, R.N.; Comim, F.V.; Premaor, M.O.

    2018-01-01

    The prevalence of cardiovascular and metabolic diseases is increased in postmenopausal women, which contributes to the burden of illnesses in this period of life. Yerba mate (Ilex paraguariensis) is a native bush from Southern South America. Its leaves are rich in phenolic components, which may have antioxidant, vasodilating, hypocholesterolemic, and hypoglycemic proprieties. This post hoc analysis of the case-control study nested in the Obesity and Bone Fracture Cohort evaluated the consumpt...

  2. Performance analysis of differentiated resource-sharing in a wireless ad-hoc network

    NARCIS (Netherlands)

    Roijers, F.; van den Berg, H.; Mandjes, M.

    2010-01-01

    In this paper we model and analyze a relay node in a wireless ad-hoc network; the capacity available at this node is used to both transmit traffic from the source nodes (towards the relay node), and to serve traffic at the relay node (so that it can be forwarded to successor nodes). Clearly, a

  3. Taxonomic and ad hoc categorization within the two cerebral hemispheres.

    Science.gov (United States)

    Shen, Yeshayahu; Aharoni, Bat-El; Mashal, Nira

    2015-01-01

    A typicality effect refers to categorization which is performed more quickly or more accurately for typical than for atypical members of a given category. Previous studies reported a typicality effect for category members presented in the left visual field/right hemisphere (RH), suggesting that the RH applies a similarity-based categorization strategy. However, findings regarding the typicality effect within the left hemisphere (LH) are less conclusive. The current study tested the pattern of typicality effects within each hemisphere for both taxonomic and ad hoc categories, using words presented to the left or right visual fields. Experiment 1 tested typical and atypical members of taxonomic categories as well as non-members, and Experiment 2 tested typical and atypical members of ad hoc categories as well as non-members. The results revealed a typicality effect in both hemispheres and in both types of categories. Furthermore, the RH categorized atypical stimuli more accurately than did the LH. Our findings suggest that both hemispheres rely on a similarity-based categorization strategy, but the coarse semantic coding of the RH seems to facilitate the categorization of atypical members.

  4. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from

  5. Enhanced WWTP effluent organic matter removal in hybrid ozonation-coagulation (HOC) process catalyzed by Al-based coagulant

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Xin [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an, Shaanxi Province, 710055 (China); Jin, Pengkang, E-mail: pkjin@hotmail.com [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an, Shaanxi Province, 710055 (China); Hou, Rui [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an, Shaanxi Province, 710055 (China); Yang, Lei [Department of Materials Science and Engineering, Monash University, Clayton, VIC, 3800 (Australia); Wang, Xiaochang C., E-mail: xcwang@xauat.edu.cn [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an, Shaanxi Province, 710055 (China)

    2017-04-05

    Highlights: • A novel HOC process was firstly put forward to apply in wastewater reclamation. • Interactions between ozone and Al-based coagulants was found in the HOC process. • Ozonation can be catalyzed and enhanced by Al-based coagulants in the HOC process. • HOC process showed better organics removal than pre-ozonation-coagulation process. - Abstract: A novel hybrid ozonation-coagulation (HOC) process was developed for application in wastewater reclamation. In this process, ozonation and coagulation occurred simultaneously within a single unit. Compared with the conventional pre-ozonation-coagulation process, the HOC process exhibited much better performance in removing dissolved organic matters. In particular, the maximal organic matters removal efficiency was obtained at the ozone dosage of 1 mgO{sub 3}/mg DOC at each pH value (pH 5, 7 and 9). In order to interpret the mechanism of the HOC process, ozone decomposition was monitored. The results indicated that ozone decomposed much faster in the HOC process. Moreover, by using the reagent of O{sub 3}-resistant hydroxyl radical (·OH) probe compound, para-chlorobenzoic acid (pCBA), and electron paramagnetic resonance (EPR) analysis, it was observed that the HOC process generated higher content of ·OH compared with pre-ozonation process. This indicates that the ·OH oxidation reaction as the key step can be catalyzed and enhanced by Al-based coagulants and their hydrolyzed products in this developed process. Thus, based on the catalytic effects of Al-based coagulants on ozonation, the HOC process provides a promising alternative to the conventional technology for wastewater reclamation in terms of higher efficiency.

  6. Ad-Hoc vs. Standardized and Optimized Arthropod Diversity Sampling

    Directory of Open Access Journals (Sweden)

    Pedro Cardoso

    2009-09-01

    Full Text Available The use of standardized and optimized protocols has been recently advocated for different arthropod taxa instead of ad-hoc sampling or sampling with protocols defined on a case-by-case basis. We present a comparison of both sampling approaches applied for spiders in a natural area of Portugal. Tests were made to their efficiency, over-collection of common species, singletons proportions, species abundance distributions, average specimen size, average taxonomic distinctness and behavior of richness estimators. The standardized protocol revealed three main advantages: (1 higher efficiency; (2 more reliable estimations of true richness; and (3 meaningful comparisons between undersampled areas.

  7. Post hoc analysis of Japanese patients from the placebo-controlled PREVAIL trial of enzalutamide in patients with chemotherapy-naive, metastatic castration-resistant prostate cancer—updated results

    Science.gov (United States)

    Ueda, Takeshi

    2017-01-01

    Abstract A post hoc analysis of interim results from PREVAIL, a Phase III, double-blind, placebo-controlled trial of men with metastatic castration-resistant prostate cancer, demonstrated that the treatment effects, safety and pharmacokinetics of enzalutamide in Japanese patients were generally consistent with those of the overall population. A recent longer term analysis of PREVAIL demonstrated continued benefit of enzalutamide treatment over placebo. Here, we report results from a post hoc analysis of Japanese patients enrolled in PREVAIL at the prespecified number of deaths for the final analysis. In Japanese patients, enzalutamide reduced the risk of death by 35% (hazard ratio, 0.65; 95% confidence interval, 0.28–1.51) and the risk of investigator-assessed radiographic progression or death by 60% (hazard ratio, 0.40; 95% confidence interval, 0.18–0.90). These results show that treatment effects and safety in Japanese patients in the final analysis of PREVAIL continued to be generally consistent with those of the overall population. PMID:28003320

  8. Lenient vs. strict rate control in patients with atrial fibrillation and heart failure: a post-hoc analysis of the RACE II study

    NARCIS (Netherlands)

    Mulder, Bart A.; van Veldhuisen, Dirk J.; Crijns, Harry J. G. M.; Tijssen, Jan G. P.; Hillege, Hans L.; Alings, Marco; Rienstra, Michiel; Groenveld, Hessel F.; van den Berg, Maarten P.; van Gelder, Isabelle C.

    2013-01-01

    It is unknown whether lenient rate control is an acceptable strategy in patients with AF and heart failure. We evaluated differences in outcome in patients with AF and heart failure treated with lenient or strict rate control. This post-hoc analysis of the RACE II trial included patients with an

  9. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  10. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  11. Outcome when adrenaline (epinephrine) was actually given vs. not given - post hoc analysis of a randomized clinical trial.

    Science.gov (United States)

    Olasveengen, Theresa M; Wik, Lars; Sunde, Kjetil; Steen, Petter A

    2012-03-01

    IV line insertion and drugs did not affect long-term survival in an out-of-hospital cardiac arrest (OHCA) randomized clinical trial (RCT). In a previous large registry study adrenaline was negatively associated with survival from OHCA. The present post hoc analysis on the RCT data compares outcomes for patients actually receiving adrenaline to those not receiving adrenaline. Patients from a RCT performed May 2003 to April 2008 were included. Three patients from the original intention-to-treat analysis were excluded due to insufficient documentation of adrenaline administration. Quality of cardiopulmonary resuscitation (CPR) and clinical outcomes were compared. Clinical characteristics were similar and CPR quality comparable and within guideline recommendations for 367 patients receiving adrenaline and 481 patients not receiving adrenaline. Odds ratio (OR) for being admitted to hospital, being discharged from hospital and surviving with favourable neurological outcome for the adrenaline vs. no-adrenaline group was 2.5 (CI 1.9, 3.4), 0.5 (CI 0.3, 0.8) and 0.4 (CI 0.2, 0.7), respectively. Ventricular fibrillation, response interval, witnessed arrest, gender, age and endotracheal intubation were confounders in multivariate logistic regression analysis. OR for survival for adrenaline vs. no-adrenaline adjusted for confounders was 0.52 (95% CI: 0.29, 0.92). Receiving adrenaline was associated with improved short-term survival, but decreased survival to hospital discharge and survival with favourable neurological outcome after OHCA. This post hoc survival analysis is in contrast to the previous intention-to-treat analysis of the same data, but agrees with previous non-randomized registry data. This shows limitations of non-randomized or non-intention-to-treat analyses. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  12. Post-hoc principal component analysis on a largely illiterate elderly population from North-west India to identify important elements of mini-mental state examination.

    Science.gov (United States)

    Raina, Sunil Kumar; Chander, Vishav; Raina, Sujeet; Grover, Ashoo

    2016-01-01

    Mini-mental state examination (MMSE) scale measures cognition using specific elements that can be isolated, defined, and subsequently measured. This study was conducted with the aim to analyze the factorial structure of MMSE in a largely, illiterate, elderly population in India and to reduce the number of variables to a few meaningful and interpretable combinations. Principal component analysis (PCA) was performed post-hoc on the data generated by a research project conducted to estimate the prevalence of dementia in four geographically defined habitations in Himachal Pradesh state of India. Questions on orientation and registration account for high percentage of cumulative variance in comparison to other questions. The PCA conducted on the data derived from a largely, illiterate population reveals that the most important components to consider for the estimation of cognitive impairment in illiterate Indian population are temporal orientation, spatial orientation, and immediate memory.

  13. Post-hoc principal component analysis on a largely illiterate elderly population from North-west India to identify important elements of mini-mental state examination

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Raina

    2016-01-01

    Full Text Available Background: Mini-mental state examination (MMSE scale measures cognition using specific elements that can be isolated, defined, and subsequently measured. This study was conducted with the aim to analyze the factorial structure of MMSE in a largely, illiterate, elderly population in India and to reduce the number of variables to a few meaningful and interpretable combinations. Methodology: Principal component analysis (PCA was performed post-hoc on the data generated by a research project conducted to estimate the prevalence of dementia in four geographically defined habitations in Himachal Pradesh state of India. Results: Questions on orientation and registration account for high percentage of cumulative variance in comparison to other questions. Discussion: The PCA conducted on the data derived from a largely, illiterate population reveals that the most important components to consider for the estimation of cognitive impairment in illiterate Indian population are temporal orientation, spatial orientation, and immediate memory.

  14. Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

    Directory of Open Access Journals (Sweden)

    L. Gavrilovska

    2009-06-01

    Full Text Available Ad-hoc and sensor networks are becoming an increasingly popular wireless networking concepts lately. This paper analyzes and compares prominent routing schemes in these networking environments. The knowledge obtained can serve users to better understand short range wireless network solutions thus leading to options for implementation in various scenarios. In addition, it should aid researchers develop protocol improvements reliable for the technologies of interest.

  15. Reduced sick leave in multiple sclerosis after one year of natalizumab treatment. A prospective ad hoc analysis of the TYNERGY trial.

    Science.gov (United States)

    Wickström, Anne; Dahle, Charlotte; Vrethem, Magnus; Svenningsson, Anders

    2014-07-01

    In a retrospective study, we have previously shown that work ability was improved after the initiation of natalizumab treatment in relapsing-remitting multiple sclerosis (RRMS). In another prospective trial (TYNERGY) the effect on MS-related fatigue was evaluated after 12 months of treatment with natalizumab. A comprehensive Capacity for Work Questionnaire (CWQ) was used to collect data regarding number of working hours and sickness absence. The predefined intention-to-treat analysis regarding work ability did not, however, show significant results. The objective of this paper is to assess the amount of sick leave in RRMS before and after one year of natalizumab treatment and correlate it to fatigue and walking ability. This is a post-hoc analysis of the complete data from the CWQ used in the TYNERGY trial. MS patients receiving sickness benefit before start of treatment reduced their sickness benefit by an absolute change of 33% after one year of natalizumab treatment. Younger age and improvement of walking ability correlated significantly with reduction of sick leave. This ad-hoc analysis of prospectively collected data supported our previous retrospective study and thus indicates a positive relationship between natalizumab treatment and improvement in work ability. © The Author(s) 2013.

  16. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  17. On Throughput Improvement of Wireless Ad Hoc Networks with Hidden Nodes

    Science.gov (United States)

    Choi, Hong-Seok; Lim, Jong-Tae

    In this letter, we present the throughput analysis of the wireless ad hoc networks based on the IEEE 802.11 MAC (Medium Access Control). Especially, our analysis includes the case with the hidden node problem so that it can be applied to the multi-hop networks. In addition, we suggest a new channel access control algorithm to maximize the network throughput and show the usefulness of the proposed algorithm through simulations.

  18. Post hoc analysis of Japanese patients from the placebo-controlled PREVAIL trial of enzalutamide in patients with chemotherapy-naive, metastatic castration-resistant prostate cancer-updated results.

    Science.gov (United States)

    Kimura, Go; Ueda, Takeshi

    2017-03-01

    A post hoc analysis of interim results from PREVAIL, a Phase III, double-blind, placebo-controlled trial of men with metastatic castration-resistant prostate cancer, demonstrated that the treatment effects, safety and pharmacokinetics of enzalutamide in Japanese patients were generally consistent with those of the overall population. A recent longer term analysis of PREVAIL demonstrated continued benefit of enzalutamide treatment over placebo. Here, we report results from a post hoc analysis of Japanese patients enrolled in PREVAIL at the prespecified number of deaths for the final analysis. In Japanese patients, enzalutamide reduced the risk of death by 35% (hazard ratio, 0.65; 95% confidence interval, 0.28-1.51) and the risk of investigator-assessed radiographic progression or death by 60% (hazard ratio, 0.40; 95% confidence interval, 0.18-0.90). These results show that treatment effects and safety in Japanese patients in the final analysis of PREVAIL continued to be generally consistent with those of the overall population. © The Author 2016. Published by Oxford University Press.

  19. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  20. Research on Propagation Model of Malicious Programs in Ad Hoc Wireless Network

    Directory of Open Access Journals (Sweden)

    Weimin GAO

    2014-01-01

    Full Text Available Ad Hoc wireless network faces more security threats than traditional network due to its P2P system structure and the limited node resources. In recent years, malicious program has become one of the most important researches on international network security and information security. The research of malicious programs on wireless network has become a new research hotspot in the field of malicious programs. This paper first analyzed the Ad Hoc network system structure, security threats, the common classification of malicious programs and the bionic propagation model. Then starting from the differential equations of the SEIR virus propagation model, the question caused by introducing the SEIR virus propagation model in Ad Hoc wireless network was analyzed. This paper improved the malicious program propagation model through introducing the network topology features and concepts such as immunization delay, and designed an improved algorithm combined with the dynamic evolution of malware propagation process. Considering of the network virus propagation characteristics, network characteristics and immunization strategy to improve simulation model experiment analysis, the experimental results show that both the immunization strategy and the degrees of node can affect the propagation of malicious program.

  1. agradecimento aos consultores ad hoc

    Directory of Open Access Journals (Sweden)

    REA Editor

    2012-02-01

    Full Text Available Agradecemos aos professores Nildo Viana (UFG e Flavio Sofiati (UFG, organizadores do DOSSIÊ JUVENTUDE & SOCIEDADE, e aos Consultores Ad hoc pela leitura e apreciação crítica dos artigos submetidos e publicados nesta edição.

  2. Ad hoc networks telecommunications and game theory

    CERN Document Server

    Benslama, Malek; Batatia, Hadj

    2015-01-01

    Random SALOHA and CSMA protocols that are used to access MAC in ad hoc networks are very small compared to the multiple and spontaneous use of the transmission channel. So they have low immunity to the problems of packet collisions. Indeed, the transmission time is the critical factor in the operation of such networks. The simulations demonstrate the positive impact of erasure codes on the throughput of the transmission in ad hoc networks. However, the network still suffers from the intermittency and volatility of its efficiency throughout its operation, and it switches quickly to the satura

  3. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  4. Optimal channel choice for collaborative ad-hoc dissemination

    DEFF Research Database (Denmark)

    Hu, Liang; Boudec, J-Y. L.; Vojnovic, M.

    2010-01-01

    Collaborative ad-hoc dissemination of information has been proposed as an efficient means to disseminate information among devices in a wireless ad-hoc network. Devices help in forwarding the information channels to the entire network, by disseminating the channels they subscribe to, plus others...... by a Metropolis-Hastings sampling algorithm. We also give a variant that accounts for battery level. This leads to a practical channel selection and re-selection algorithm that can be implemented without any central control....

  5. Les Protocoles de routage dans les réseaux mobiles Ad Hoc ...

    African Journals Online (AJOL)

    Dans cet article nous présentons un état de l'art sur les protocoles de routage dans les réseaux mobiles Ad hoc. Mots clés : Réseaux mobiles ad hoc/, Protocoles de routage. Routing protocols in wireless mobile ad hoc networks. Abstract:The communication between users with handheld computers interconnected through ...

  6. A SAS(®) macro implementation of a multiple comparison post hoc test for a Kruskal-Wallis analysis.

    Science.gov (United States)

    Elliott, Alan C; Hynan, Linda S

    2011-04-01

    The Kruskal-Wallis (KW) nonparametric analysis of variance is often used instead of a standard one-way ANOVA when data are from a suspected non-normal population. The KW omnibus procedure tests for some differences between groups, but provides no specific post hoc pair wise comparisons. This paper provides a SAS(®) macro implementation of a multiple comparison test based on significant Kruskal-Wallis results from the SAS NPAR1WAY procedure. The implementation is designed for up to 20 groups at a user-specified alpha significance level. A Monte-Carlo simulation compared this nonparametric procedure to commonly used parametric multiple comparison tests. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  7. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  8. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  9. SURVEI TEKNIK CLUSTERING ROUTING BERDASARKAN MOBILITAS PADA WIRELESS AD-HOC NETWORK

    Directory of Open Access Journals (Sweden)

    I Nyoman Trisna Wirawan

    2016-01-01

    Full Text Available Wireless ad-hoc merupakan sebuah skema jaringan yang didesain supaya mampu beroperasi tanpa membutuhkan infrastruktur tetap serta bersifat otonom. Teknik flooding pada proses path discovery dalam kasus wireless ad-hoc network dapat menimbulkan masalah beban jaringan yang berlebihan. Oleh karena itu, sebuah skema clustering diusulkan untuk mengurangi adanya flooding paket yang berlebihan dengan membagi node-node dalam jaringan menjadi beberapa bagian berdasarkan parameter tertentu. Teknik ini efektifuntuk mengurangi paket yang harus dilewatkan dalam jaringan. Namun masalah muncul ketika sebuah jaringan wireless ad-hoc harus membentuk sebuah cluster dengan mempertimbangkan beberapa parameter khusus. Parameter tersebut harus disesuaikan dengan kasus yang dihadapi. Pada tulisan ini akan dibahas secara khusus mengenai penerapan skema clustering dalam lingkungan wireless ad-hoc network, baik pada MANETdan penyesuaian skema clustering yang harus dilakukan pada VANET berdasarkan mobilitasnya.

  10. New grid based test bed environment for carrying out ad-hoc networking experiments

    CSIR Research Space (South Africa)

    Johnson, D

    2006-09-01

    Full Text Available and the third is to do analysis on a real test bed network which has implemented the ad-hoc networking protocol. This paper concerns the third option. Most researchers who have done work on test bed environments have used either indoor Wifi inter-office links...

  11. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  12. Maximization of Energy Efficiency in Wireless ad hoc and Sensor Networks With SERENA

    Directory of Open Access Journals (Sweden)

    Saoucene Mahfoudh

    2009-01-01

    Full Text Available In wireless ad hoc and sensor networks, an analysis of the node energy consumption distribution shows that the largest part is due to the time spent in the idle state. This result is at the origin of SERENA, an algorithm to SchEdule RoutEr Nodes Activity. SERENA allows router nodes to sleep, while ensuring end-to-end communication in the wireless network. It is a localized and decentralized algorithm assigning time slots to nodes. Any node stays awake only during its slot and the slots assigned to its neighbors, it sleeps the remaining time. Simulation results show that SERENA enables us to maximize network lifetime while increasing the number of user messages delivered. SERENA is based on a two-hop coloring algorithm, whose complexity in terms of colors and rounds is evaluated. We then quantify the slot reuse. Finally, we show how SERENA improves the node energy consumption distribution and maximizes the energy efficiency of wireless ad hoc and sensor networks. We compare SERENA with classical TDMA and optimized variants such as USAP in wireless ad hoc and sensor networks.

  13. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    aerial vehicle VANET vehicular ad hoc network VoIP Voice over Internet Protocol VRR Virtual Ring Routing xiii EFFECTS OF DATA REPLICATION ON DATA...ad hoc networks in mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and flying ad hoc net- works (FANETs). Much of the research...metric, such as capacity, congestion , power, or combinations thereof. Caro refers to two different types of ants, FANTs and BANTs which are analogous to

  14. Atomoxetine treatment outcomes in adolescents and young adults with attention-deficit/hyperactivity disorder: results from a post hoc, pooled analysis.

    Science.gov (United States)

    Adler, Lenard A; Wilens, Timothy; Zhang, Shuyu; Dittmann, Ralf W; D'Souza, Deborah N; Schuh, Leslie; Durell, Todd M

    2012-02-01

    Many children with attention-deficit/hyperactivity disorder (ADHD) continue to experience this disorder as adults, which may, in part, be due to the discontinuity of health care that often occurs during the transition period between late adolescence and young adulthood. Although atomoxetine is reported to be efficacious in both adolescents and young adults, no longitudinal studies have been designed to assess directly the effects of atomoxetine treatment during this transition period. As a first step, we present the results of a post hoc, pooled analysis that compared the efficacy and safety profile of atomoxetine in these 2 patient populations. The aim of the present study was to assess the efficacy and safety profile of atomoxetine treatment in adolescents and young adults with ADHD. A post hoc, pooled analysis was conducted by combining data from 6 double-blind trials (6-9 weeks in duration) that studied adolescents (12-17 years of age; atomoxetine, n = 154; placebo, n = 88; mean final dose = 1.38 mg/kg) and 3 trials (10 weeks in duration) that studied young adults (18-30 years of age; atomoxetine, n = 117; placebo, n = 125; mean final dose = 1.21 mg/kg). Efficacy measures used in these analyses were ADHD Rating Scale (ADHDRS) for adolescents, Conners' Adult ADHD Rating Scale (CAARS) for young adults, and Clinical Global Impressions-ADHD-Severity (CGI-ADHD-S) for both age groups. Treatment response was defined as ≥30% reduction from baseline in total ADHD symptom score. In adolescents (mean age, 13.4 years), atomoxetine improved ADHD significantly compared with placebo (ADHDRS total score change, -12.9 vs -7.5; P young adults (mean age, 24.7 years), atomoxetine improved ADHD significantly (CAARS total score change, -13.6 vs -7.7; P young adults (13.7% vs 4.8%, respectively; P = 0.024); in adolescents no statistically significant differences were observed in frequency of nausea between atomoxetine and placebo treatment (4.5% vs 10.2%, respectively; P = 0

  15. Sensor and ad-hoc networks theoretical and algorithmic aspects

    CERN Document Server

    Makki, S Kami; Pissinou, Niki; Makki, Shamila; Karimi, Masoumeh; Makki, Kia

    2008-01-01

    This book brings together leading researchers and developers in the field of wireless sensor networks to explain the special problems and challenges of the algorithmic aspects of sensor and ad-hoc networks. The book also fosters communication not only between the different sensor and ad-hoc communities, but also between those communities and the distributed systems and information systems communities. The topics addressed pertain to the sensors and mobile environment.

  16. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  17. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  18. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  19. Sustained disease-activity-free status in patients with relapsing-remitting multiple sclerosis treated with cladribine tablets in the CLARITY study: a post-hoc and subgroup analysis

    DEFF Research Database (Denmark)

    Giovannoni, Gavin; Cook, Stuart; Rammohan, Kottil

    2011-01-01

    /kg over 96 weeks was more effective than placebo. Achieving sustained freedom from disease activity is becoming a viable treatment goal in RRMS; we therefore aimed to assess the effects of cladribine on this composite outcome measure by doing a post-hoc analysis of data from the CLARITY study....

  20. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  1. Sigsearch: a new term for post hoc unplanned search for statistically significant relationships with the intent to create publishable findings.

    Science.gov (United States)

    Hashim, Muhammad Jawad

    2010-09-01

    Post-hoc secondary data analysis with no prespecified hypotheses has been discouraged by textbook authors and journal editors alike. Unfortunately no single term describes this phenomenon succinctly. I would like to coin the term "sigsearch" to define this practice and bring it within the teaching lexicon of statistics courses. Sigsearch would include any unplanned, post-hoc search for statistical significance using multiple comparisons of subgroups. It would also include data analysis with outcomes other than the prespecified primary outcome measure of a study as well as secondary data analyses of earlier research.

  2. Post-hoc analysis of randomised, placebo-controlled, double-blind study (MCI186-19) of edaravone (MCI-186) in amyotrophic lateral sclerosis.

    Science.gov (United States)

    Takei, Koji; Takahashi, Fumihiro; Liu, Shawn; Tsuda, Kikumi; Palumbo, Joseph

    2017-10-01

    Post-hoc analyses of the ALS Functional Rating Scale-Revised (ALSFRS-R) score data, the primary endpoint in the 24-week double-blind placebo-controlled study of edaravone (MCI186-19, NCT01492686), were performed to confirm statistical robustness of the result. The previously reported original analysis had used a last observation carried forward (LOCF) method and also excluded patients with fewer than three completed treatment cycles. The post-hoc sensitivity analyses used different statistical methods as follows: 1) including all patients regardless of treatment cycles received (ALL LOCF); 2) a mixed model for repeated measurements (MMRM) analysis; and 3) the Combined Assessment of Function and Survival (CAFS) endpoint. Findings were consistent with the original primary analysis in showing superiority of edaravone over placebo. We also investigated the distribution of change in ALSFRS-R total score across all patients in the study as well as which ALSFRS-R items and domains may have contributed to the overall efficacy findings. The distribution of changes in ALSFRS-R total score from baseline to the end of cycle 6 (ALL LOCF) shifted in favour of edaravone compared to placebo. Edaravone was descriptively favoured for each ALSFRS-R item and each of the four ALSFRS-R domains at the end of cycle 6 (ALL LOCF), suggesting a generalised effect of edaravone in slowing functional decline across all anatomical regions. The effect of edaravone appeared to be similar in patients with bulbar onset and limb onset. Together, these observations would be consistent with its putative neuroprotective effects against the development of oxidative damage unspecific to anatomical regions.

  3. A post-hoc subgroup analysis of outcomes in the first phase III clinical study of edaravone (MCI-186) in amyotrophic lateral sclerosis.

    Science.gov (United States)

    2017-10-01

    Our first phase III study failed to demonstrate efficacy of edaravone for amyotrophic lateral sclerosis (ALS) compared to placebo. Here, we performed post-hoc subgroup analysis to identify a subgroup in which edaravone might be expected to show efficacy. We focussed on two newly defined subgroups, EESP and dpEESP2y. The EESP was defined as the efficacy-expected subpopulation with % forced vital capacity of ≥80%, and ≥2 points for all item scores in the revised ALS functional rating scale (ALSFRS-R) score before treatment. The dpEESP2y was defined as the greater-efficacy-expected subpopulation within EESP having a diagnosis of 'definite' or 'probable' ALS according to the El Escorial revised Airlie House diagnostic criteria and onset of disease within two years. The primary endpoint of the post-hoc analysis was the change in the ALSFRS-R score during the 24-week treatment period. The intergroup differences of the least-squares mean change in the ALSFRS-R score ± standard error during treatment were 0.65 ± 0.78 (p = 0.4108) in the full analysis set, 2.20 ± 1.03 (p = 0.0360) in the EESP, and 3.01 ± 1.33 (p = 0.0270) in the dpEESP2y. Edaravone exhibited efficacy in the dpEESP2y subgroup. A further clinical study in patients meeting dpEESP2y criteria is warranted.

  4. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  5. MWAHCA: a multimedia wireless ad hoc cluster architecture.

    Science.gov (United States)

    Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  6. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    Directory of Open Access Journals (Sweden)

    Juan R. Diaz

    2014-01-01

    Full Text Available Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node’s capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss. The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  7. Algorithmic, LOCS and HOCS (chemistry) exam questions: performance and attitudes of college students

    Science.gov (United States)

    Zoller, Uri

    2002-02-01

    The performance of freshmen biology and physics-mathematics majors and chemistry majors as well as pre- and in-service chemistry teachers in two Israeli universities on algorithmic (ALG), lower-order cognitive skills (LOCS), and higher-order cognitive skills (HOCS) chemistry exam questions were studied. The driving force for the study was an interest in moving science and chemistry instruction from an algorithmic and factual recall orientation dominated by LOCS, to a decision-making, problem-solving and critical system thinking approach, dominated by HOCS. College students' responses to the specially designed ALG, LOCS and HOCS chemistry exam questions were scored and analysed for differences and correlation between the performance means within and across universities by the questions' category. This was followed by a combined student interview - 'speaking aloud' problem solving session for assessing the thinking processes involved in solving these types of questions and the students' attitudes towards them. The main findings were: (1) students in both universities performed consistently in each of the three categories in the order of ALG > LOCS > HOCS; their 'ideological' preference, was HOCS > algorithmic/LOCS, - referred to as 'computational questions', but their pragmatic preference was the reverse; (2) success on algorithmic/LOCS does not imply success on HOCS questions; algorithmic questions constitute a category on its own as far as students success in solving them is concerned. Our study and its results support the effort being made, worldwide, to integrate HOCS-fostering teaching and assessment strategies and, to develop HOCS-oriented science-technology-environment-society (STES)-type curricula within science and chemistry education.

  8. Neuromathematical Trichotomous Mixed Methods Analysis: Using the Neuroscientific Tri-Squared Test Statistical Metric as a Post Hoc Analytic to Determine North Carolina School of Science and Mathematics Leadership Efficacy

    Science.gov (United States)

    Osler, James Edward, II; Mason, Letita R.

    2016-01-01

    This study examines the leadership efficacy amongst graduates of The North Carolina School of Science and Mathematics (NCSSM) for the classes of 2000 through 2007 from a neuroscientific and neuromathematic perspective. NCSSM alumni (as the primary unit of analysis) were examined using a novel neuromathematic post hoc method of analysis. This study…

  9. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  10. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  11. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  12. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  13. DESAIN ALGORITMA DAN SIMULASI ROUTING UNTUK GATEWAY AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Nixson Meok

    2009-12-01

    Full Text Available   Routing protocol to the wireless ad hoc networks is very needed in the communication process between some terminals, to send the data packet through one or several node(s to the destination address where the network typology is always changing. Many previous works that discussed about routing ad hoc both for manet (mobile ad hoc networks and wireless networks, but the emphasis have more focus on comparing the performance of several routing ad hoc. While in this work, there is a bulding of routing algorithm model to gateway in land to the nodes that analogized as a boat that move on the sea. With the assumption that the communication inter terminals to radio band of Very High Frequency, thus algorithm that built in the simulation based on the range gap of the HF frequency. The result of this simulation will be developed as the platform to implement the service development of multiuser communication

  14. Student Self-Assessment in HOCS Science Examinations: Is There a Problem?

    Science.gov (United States)

    Zoller, Uri; Ben-Chaim, David

    1998-06-01

    A specially-designed self-assessment questionnaire (SAQHOCS), containing higher-order cognitive skills (HOCS)-type questions, was administered to 71 biology majors, enrolled in a four-year college program. The gap between students' self-assessment marking, and that of their HOCS-biased teachers (the authors), is accounted for by the prevailing LOCS-orientation and the "testing culture"—a total separation between testing and learning—in contemporary science teaching. The majority of the students in the study evaluated themselves as capable of self-assessment, and felt reasonably confident in doing so. They were quite reserved as far as the applicability of the self-assessment method to nonalgorithmic ("correct/incorrect") questions is concerned. The results of this study suggest that the potential for student self-assessment within college science teaching and learning exists. However, still a great purposed effort in HOCS-oriented teaching and learning is required in order for the student self-assessment practice to become a routine integral component of HOCS science examinations.

  15. Quantum load balancing in ad hoc networks

    Science.gov (United States)

    Hasanpour, M.; Shariat, S.; Barnaghi, P.; Hoseinitabatabaei, S. A.; Vahid, S.; Tafazolli, R.

    2017-06-01

    This paper presents a novel approach in targeting load balancing in ad hoc networks utilizing the properties of quantum game theory. This approach benefits from the instantaneous and information-less capability of entangled particles to synchronize the load balancing strategies in ad hoc networks. The quantum load balancing (QLB) algorithm proposed by this work is implemented on top of OLSR as the baseline routing protocol; its performance is analyzed against the baseline OLSR, and considerable gain is reported regarding some of the main QoS metrics such as delay and jitter. Furthermore, it is shown that QLB algorithm supports a solid stability gain in terms of throughput which stands a proof of concept for the load balancing properties of the proposed theory.

  16. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  17. Further Development of Synchronous Array Method for Ad Hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yingbo Hua

    2008-09-01

    Full Text Available A further development of the synchronous array method (SAM as a medium access control scheme for large-scale ad hoc wireless networks is presented. Under SAM, all transmissions of data packets between adjacent nodes are synchronized on a frame-by-frame basis, and the spacing between concurrent cochannel transmissions of data packets is properly controlled. An opportunistic SAM (O-SAM is presented which allows concurrent cochannel transmissions to be locally adaptive to channel gain variations. A distributed SAM (D-SAM is discussed that schedules all concurrent cochannel transmissions in a distributed fashion. For networks of low mobility, the control overhead required by SAM can be made much smaller than the payload. By analysis and simulation, the intranetwork throughput of O-SAM and D-SAM is evaluated. The effects of traffic load and multiple antennas on the intranetwork throughput are studied. The throughput of ALOHA is also analyzed and compared with that of O-SAM and D-SAM. By a distance-weighted throughput, a comparison of long distance transmission versus short distance transmission is also presented. The study of D-SAM reveals an important insight into the MSH-DSCH protocol adopted in IEEE 802.16 standards.

  18. Recent development in wireless sensor and ad-hoc networks

    CERN Document Server

    Li, Xiaolong; Yang, Yeon-Mo

    2015-01-01

    Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based C...

  19. A flow level model for wireless multihop ad hoc network throughput

    NARCIS (Netherlands)

    Coenen, Tom Johannes Maria; van den Berg, Hans Leo; Boucherie, Richardus J.

    2005-01-01

    A flow level model for multihop wireless ad hoc networks is presented in this paper. Using a flow level view, we show the main properties and modeling challenges for ad hoc networks. Considering different scenarios, a multihop WLAN and a serial network with a TCP-like flow control protocol, we

  20. Supporting Dynamic Ad hoc Collaboration Capabilities

    CERN Document Server

    Agarwal, D

    2003-01-01

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

  1. Supporting Dynamic Ad hoc Collaboration Capabilities

    International Nuclear Information System (INIS)

    Agarwal, Deborah A.; Berket, Karlo

    2003-01-01

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment

  2. Does the effect of one-day simulation team training in obstetric emergencies decline within one year? A post-hoc analysis of a multicentre cluster randomised controlled trial

    NARCIS (Netherlands)

    van de Ven, J.; Fransen, A F; Schuit, E.; van Runnard Heimel, P.J.; Mol, Ben W.; Oei, Swan G.

    2017-01-01

    Does the effect of one-day simulation team training in obstetric emergencies decline within one year? A post-hoc analysis of a multicentre cluster randomised controlled trial. J van de Ven, AF Fransen, E Schuit, PJ van Runnard Heimel, BW Mol, SG Oei Objective To investigate whether the effect of a

  3. Twenty-One at TREC-7: ad-hoc and cross-language track

    NARCIS (Netherlands)

    Hiemstra, Djoerd; Kraaij, Wessel; Voorhees, E.M; Harman, D.K.

    1999-01-01

    This paper describes the official runs of the Twenty-One group for TREC-7. The Twenty-One group participated in the ad-hoc and the cross-language track and made the following accomplishments: We developed a new weighting algorithm, which outperforms the popular Cornell version of BM25 on the ad-hoc

  4. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  5. Regressive research: The pitfalls of post hoc data selection in the study of unconscious mental processes.

    Science.gov (United States)

    Shanks, David R

    2017-06-01

    Many studies of unconscious processing involve comparing a performance measure (e.g., some assessment of perception or memory) with an awareness measure (such as a verbal report or a forced-choice response) taken either concurrently or separately. Unconscious processing is inferred when above-chance performance is combined with null awareness. Often, however, aggregate awareness is better than chance, and data analysis therefore employs a form of extreme group analysis focusing post hoc on participants, trials, or items where awareness is absent or at chance. The pitfalls of this analytic approach are described with particular reference to recent research on implicit learning and subliminal perception. Because of regression to the mean, the approach can mislead researchers into erroneous conclusions concerning unconscious influences on behavior. Recommendations are made about future use of post hoc selection in research on unconscious cognition.

  6. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  7. NDN-CRAHNs: Named Data Networking for Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Rana Asif Rehman

    2015-01-01

    Full Text Available Named data networking (NDN is a newly proposed paradigm for future Internet, in which communication among nodes is based on data names, decoupling from their locations. In dynamic and self-organized cognitive radio ad hoc networks (CRAHNs, it is difficult to maintain end-to-end connectivity between ad hoc nodes especially in the presence of licensed users and intermittent wireless channels. Moreover, IP-based CRAHNs have several issues like scalability, inefficient-mapping, poor resource utilization, and location dependence. By leveraging the advantages of NDN, in this paper, we propose a new cross layer fine-grained architecture called named data networking for cognitive radio ad hoc networks (NDN-CRAHNs. The proposed architecture provides distinct features such as in-networking caching, security, scalability, and multipath routing. The performances of the proposed scheme are evaluated comparing to IP-based scheme in terms of average end-to-end delay and packet delivery ratio. Simulation results show that the proposed scheme is effective in terms of average contents download time and packet delivery ratios comparing to conventional cognitive radio ad hoc networks.

  8. An Analysis of the Readability of Financial Accounting Textbooks.

    Science.gov (United States)

    Smith, Gerald; And Others

    1981-01-01

    The Flesch formula was used to calculate the readability of 15 financial accounting textbooks. The 15 textbooks represented introductory, intermediate, and advanced levels and also were classified by five different publishers. Two-way analysis of variance and Tukey's post hoc analysis revealed some significant differences. (Author/CT)

  9. Packets Distributing Evolutionary Algorithm Based on PSO for Ad Hoc Network

    Science.gov (United States)

    Xu, Xiao-Feng

    2018-03-01

    Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc network has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, a wireless packets distributing Evolutionary algorithm based on PSO (DPSO)for Ad Hoc Network is proposed. Firstly, parameters impact on performance of network are analyzed and researched to obtain network performance effective function. Secondly, the improved PSO Evolutionary Algorithm is used to solve the optimization problem from local to global in the process of network packets distributing. The simulation results show that the algorithm can ensure fairness and timeliness of network transmission, as well as improve ad hoc network resource integrated utilization efficiency.

  10. The post hoc use of randomised controlled trials to explore drug associated cancer outcomes

    DEFF Research Database (Denmark)

    Stefansdottir, Gudrun; Zoungas, Sophia; Chalmers, John

    2013-01-01

    on public health before proper regulatory action can be taken. This paper aims to discuss challenges of exploring drug-associated cancer outcomes by post-hoc analyses of Randomised controlled trials (RCTs) designed for other purposes. METHODOLOGICAL CHALLENGES TO CONSIDER: We set out to perform a post......-hoc nested case-control analysis in the ADVANCE trial in order to examine the association between insulin use and cancer. We encountered several methodological challenges that made the results difficult to interpret, including short duration of exposure of interest, lack of power, and correlation between...... exposure and potential confounders. Considering these challenges, we concluded that using the data would not enlighten the discussion about insulin use and cancer risk and only serve to further complicate any understanding. Therefore, we decided to use our experience to illustrate methodological challenges...

  11. A Framework for Speech Enhancement with Ad Hoc Microphone Arrays

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Christensen, Mads Græsbøll

    2016-01-01

    Speech enhancement is vital for improved listening practices. Ad hoc microphone arrays are promising assets for this purpose. Most well-established enhancement techniques with conventional arrays can be adapted into ad hoc scenarios. Despite recent efforts to introduce various ad hoc speech...... enhancement apparatus, a common framework for integration of conventional methods into this new scheme is still missing. This paper establishes such an abstraction based on inter and intra sub-array speech coherencies. Along with measures for signal quality at the input of sub-arrays, a measure of coherency...... is proposed both for sub-array selection in local enhancement approaches, and also for selecting a proper global reference when more than one sub-array are used. Proposed methods within this framework are evaluated with regard to quantitative and qualitative measures, including array gains, the speech...

  12. Illustrating, Quantifying, and Correcting for Bias in Post-hoc Analysis of Gene-Based Rare Variant Tests of Association

    Directory of Open Access Journals (Sweden)

    Kelsey E. Grinde

    2017-09-01

    Full Text Available To date, gene-based rare variant testing approaches have focused on aggregating information across sets of variants to maximize statistical power in identifying genes showing significant association with diseases. Beyond identifying genes that are associated with diseases, the identification of causal variant(s in those genes and estimation of their effect is crucial for planning replication studies and characterizing the genetic architecture of the locus. However, we illustrate that straightforward single-marker association statistics can suffer from substantial bias introduced by conditioning on gene-based test significance, due to the phenomenon often referred to as “winner's curse.” We illustrate the ramifications of this bias on variant effect size estimation and variant prioritization/ranking approaches, outline parameters of genetic architecture that affect this bias, and propose a bootstrap resampling method to correct for this bias. We find that our correction method significantly reduces the bias due to winner's curse (average two-fold decrease in bias, p < 2.2 × 10−6 and, consequently, substantially improves mean squared error and variant prioritization/ranking. The method is particularly helpful in adjustment for winner's curse effects when the initial gene-based test has low power and for relatively more common, non-causal variants. Adjustment for winner's curse is recommended for all post-hoc estimation and ranking of variants after a gene-based test. Further work is necessary to continue seeking ways to reduce bias and improve inference in post-hoc analysis of gene-based tests under a wide variety of genetic architectures.

  13. A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS Attacks in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Raenu Kolandaisamy

    2018-01-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs are rapidly gaining attention due to the diversity of services that they can potentially offer. However, VANET communication is vulnerable to numerous security threats such as Distributed Denial of Service (DDoS attacks. Dealing with these attacks in VANET is a challenging problem. Most of the existing DDoS detection techniques suffer from poor accuracy and high computational overhead. To cope with these problems, we present a novel Multivariant Stream Analysis (MVSA approach. The proposed MVSA approach maintains the multiple stages for detection DDoS attack in network. The Multivariant Stream Analysis gives unique result based on the Vehicle-to-Vehicle communication through Road Side Unit. The approach observes the traffic in different situations and time frames and maintains different rules for various traffic classes in various time windows. The performance of the MVSA is evaluated using an NS2 simulator. Simulation results demonstrate the effectiveness and efficiency of the MVSA regarding detection accuracy and reducing the impact on VANET communication.

  14. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  15. Assessment of direct analgesic effect of duloxetine for chronic low back pain: post hoc path analysis of double-blind, placebo-controlled studies

    Directory of Open Access Journals (Sweden)

    Enomoto H

    2017-06-01

    Full Text Available Hiroyuki Enomoto,1 Shinji Fujikoshi,2 Jumpei Funai,3 Nao Sasaki,4 Michael H Ossipov,5 Toshinaga Tsuji,6 Levent Alev,7 Takahiro Ushida8 1Medical Science, Eli Lilly Japan K.K., Tokyo, 2Statistical Science, 3Science Communications, 4Medical Science, Eli Lilly Japan K.K., Kobe, Japan; 5Clinical Division, inVentiv Health, LLC, Blue Bell, PA, USA; 6Medical Affairs Department, Shionogi & Co., Ltd., Osaka, Japan; 7Medical Department, Lilly Turkey, Istanbul, Turkey; 8Multidisciplinary Pain Center, Aichi Medical University, Nagakute, Aichi, Japan Background: Comorbid depression and depressive symptoms are common in patients with chronic low back pain (CLBP. Duloxetine is clinically effective in major depressive disorder and several chronic pain states, including CLBP. The objective of this post hoc meta-analysis was to assess direct and indirect analgesic efficacy of duloxetine for patients with CLBP in previous clinical trials. Methods: Post hoc path analyses were conducted of 3 randomized, double-blind, clinical studies of patients receiving duloxetine or placebo for CLBP. The primary outcome measure for pain was the Brief Pain Inventory, average pain score. A secondary outcome measure, the Beck Depression Inventory-II, was used for depressive symptoms. The changes in score from baseline to endpoint were determined for each index. Path analyses were employed to calculate the proportion of analgesia that may be attributed to a direct effect of duloxetine on pain.Results: A total of 851 patients (400 duloxetine and 451 placebo were included in this analysis. Duloxetine significantly improved pain scores compared with placebo (p<0.001. It also significantly improved depressive scores compared with placebo (p=0.015. Path analyses showed that 91.1% of the analgesic effect of duloxetine could be attributed to a direct analgesic effect, and 8.9% to its antidepressant effect. Similar results were obtained when data were evaluated at weeks 4 and 7, and when

  16. Análisis de la aplicación de un sistema de actividad ad hoc para la promoción de habilidades metacognitivas de alfabetización académica Analysis Of Results Of Application Of System Of Activity Ad Hoc For The Promotion Of Abilities Metacognition Of Academic Alphabetization

    Directory of Open Access Journals (Sweden)

    María Elena Colombo

    2008-12-01

    Full Text Available Nuestro proyecto de investigación aborda una de las problemáticas de la enseñanza universitaria: la promoción de habilidades metacognitivas de alfabetización académica (PHMAA. El marco teórico adoptado corresponde a la Psicología Histórico-Cultural. Es una investigación cualitativa, según el modelo de investigación "estudio evolutivo del trabajo"que se realizó en contextos naturales de interacción áulica universitaria con un diseño longitudinal que abordó el estudio de los mismos grupos de alumnos en un lapso cuatrimestral para la misma cohorte 2006. La unidad de análisis escogida fue el "sistema de actividad áulico universitario". Se trabajó con dos muestras: una para el sistema de actividad artificial ad hoc y otra para el sistema de actividad tradicional, las que fueron analizadas y comparadas. Se utilizaron artefactos mediadores dentro del sistema ad hoc para la PHMAA. En el presente artículo se exponen los resultados del análisis y la comparación de evaluaciones escritas de los alumnos de ambos grupos.In our research project we examine one of the main issues on university level teaching: the promotion of metacognitive skills in academic literacy process (PHMAA in Spanish. The theoretical framework used is Historical - Cultural Psychology. It is a qualitative research, along the lines of investigation "evolutionary study of work" that took place in contexts of natural interaction classroom university with a design that addressed the longitudinal study of the same groups of students within four months for the same cohort 2006. The unit of analysis is chosen the "system activity classroom university." We worked with two samples: one for the system of artificial ad hoc activity and one for the traditional system, which were analyzed and compared. Mediators devices were used within the ad hoc system for PHMAA. In this article outlines the results of the analysis and comparison of written assessments of students in both

  17. Traffic Agents for Improving QoS in Mixed Infrastructure and Ad Hoc Modes Wireless LAN

    Directory of Open Access Journals (Sweden)

    Yuan Hai-Feng

    2006-01-01

    Full Text Available As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN, which can offer high data-rate wireless multimedia services to the mobile stations (MSs in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light.

  18. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  19. INDEPENDENSI HAKIM AD-HOC PADA LINGKUNGAN PERADILAN HUBUNGAN INDUSTRIAL / THE JUDICIAL INDEPENDENCE OF AD-HOC JUDGES IN INDUSTRIAL RELATION COURT

    Directory of Open Access Journals (Sweden)

    Muhammad Ishar Helmi

    2017-08-01

    Full Text Available Undang-Undang PPHI mengatur asas penyelesaian perselisihan hubungan industrial dilakukan secara musyawarah mufakat, dengan berprinsip jika terjadi perselisihan antara pekerja/buruh dan pengusaha maka tahap pertama penyelesaian perselisihan tersebut diserahkan pada pihak yang berselisih (bipartit. Ketentuan Pasal 63 ayat (2 dan Pasal 67 ayat (1 huruf f Undang-Undang tersebut mengakibatkan hakim ad-hoc Pengadilan Hubungan Industrial, dalam menjalankan tugas dan tanggung jawabnya memeriksa dan memutus suatu perkara harus mandiri dan lepas dari segala bentuk intervensi lembaga/instansi manapun menjadi terbatasi dan tidak optimal. Hakim ad-hoc Peradilan Hubungan Industrial merupakan hakim yang diusulkan oleh serikat pekerja/serikat buruh, organisasi pengusaha, juga diberhentikan secara hormat oleh serikat pekerja/serikat buruh, organisasi pengusaha tersebut. Hal ini tentunya akan menciderai sistem peradilan yang bebas, tidak memihak dan bersih yang diimpikan karena para hakim akan dikuasai oleh para pihak yang berperkara, karena keberadaan hakim diangkat dan diberhentikan oleh pihak yang akan disidangkan di peradilan hubungan industrial tersebut. PPHI (Industrial Relations Disputes Settlement Act regulates the principle of settlement of industrial relations disputes by consensus, if there is a dispute between employee/workers and employers, the first stage of dispute settlement shall be submitted to disputing party (bipartite settlement. The provisions of Article 63 paragraph (2 and Article 67 paragraph (1 sub-paragraph f of the Act shall result in the ad-hoc judges of the Industrial Relations Court, in carrying out their duties and responsibilities to examine and decide a case shall be independent and kept away from any intervention of any institution. The ad-hoc judges of the Industrial Relations Court is a judge proposed by a trade union, employers organization, also dismissed respectfully by the trade union and the employers organization. This

  20. Dynamic functional connectivity analysis reveals transient states of dysconnectivity in schizophrenia

    Directory of Open Access Journals (Sweden)

    E. Damaraju

    2014-01-01

    . Group differences are weak or absent during other connectivity states. Dynamic analysis also revealed hypoconnectivity between the putamen and sensory networks during the same states of thalamic hyperconnectivity; notably, this finding cannot be observed in the static connectivity analysis. Finally, in post-hoc analyses we observed that the relationships between sub-cortical low frequency power and connectivity with sensory networks is altered in patients, suggesting different functional interactions between sub-cortical nuclei and sensorimotor cortex during specific connectivity states. While important differences between patients with schizophrenia and healthy controls have been identified, one should interpret the results with caution given the history of medication in patients. Taken together, our results support and expand current knowledge regarding dysconnectivity in schizophrenia, and strongly advocate the use of dynamic analyses to better account for and understand functional connectivity differences.

  1. The Survival Processing Effect with Intentional Learning of Ad Hoc Categories

    Directory of Open Access Journals (Sweden)

    Anastasiya Savchenko

    2014-04-01

    Full Text Available Previous studies have shown that memory is adapted to remember information when it is processed in a survival context. This study investigates how procedural changes in Marinho (2012 study might have led to her failure to replicate the survival mnemonic advantage. In two between-subjects design experiments, participants were instructed to learn words from ad hoc categories and to rate their relevance to a survival or a control scenario. No survival advantage was obtained in either experiment. The Adjusted Ratio of Clustering (ARC scores revealed that including the category labels made the participants rely more on the category structure of the list. Various procedural aspects of the conducted experiments are discussed as possible reasons underlying the absence of the survival effect.

  2. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  3. Decentralized session initiation protocol solution in ad hoc networks

    Science.gov (United States)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  4. Nausea and Vomiting following Balanced Xenon Anesthesia Compared to Sevoflurane: A Post-Hoc Explorative Analysis of a Randomized Controlled Trial.

    Directory of Open Access Journals (Sweden)

    Astrid V Fahlenkamp

    Full Text Available Like other inhalational anesthetics xenon seems to be associated with post-operative nausea and vomiting (PONV. We assessed nausea incidence following balanced xenon anesthesia compared to sevoflurane, and dexamethasone for its prophylaxis in a randomized controlled trial with post-hoc explorative analysis.220 subjects with elevated PONV risk (Apfel score ≥2 undergoing elective abdominal surgery were randomized to receive xenon or sevoflurane anesthesia and dexamethasone or placebo after written informed consent. 93 subjects in the xenon group and 94 subjects in the sevoflurane group completed the trial. General anesthesia was maintained with 60% xenon or 2.0% sevoflurane. Dexamethasone 4mg or placebo was administered in the first hour. Subjects were analyzed for nausea and vomiting in predefined intervals during a 24h post-anesthesia follow-up.Logistic regression, controlled for dexamethasone and anesthesia/dexamethasone interaction, showed a significant risk to develop nausea following xenon anesthesia (OR 2.30, 95% CI 1.02-5.19, p = 0.044. Early-onset nausea incidence was 46% after xenon and 35% after sevoflurane anesthesia (p = 0.138. After xenon, nausea occurred significantly earlier (p = 0.014, was more frequent and rated worse in the beginning. Dexamethasone did not markedly reduce nausea occurrence in both groups. Late-onset nausea showed no considerable difference between the groups.In our study setting, xenon anesthesia was associated with an elevated risk to develop nausea in sensitive subjects. Dexamethasone 4mg was not effective preventing nausea in our study. Group size or dosage might have been too small, and change of statistical analysis parameters in the post-hoc evaluation might have further contributed to a limitation of our results. Further trials will be needed to address prophylaxis of xenon-induced nausea.EU Clinical Trials EudraCT-2008-004132-20 ClinicalTrials.gov NCT00793663.

  5. Node counting in wireless ad-hoc networks

    NARCIS (Netherlands)

    Evers, J.H.M.; Kiss, D.; Kowalczyk, W.; Navilarekallu, T.; Renger, D.R.M.; Sella, L.; Timperio, V.; Viorel, A.; Wijk, van A.C.C.; Yzelman, A.J.; Planqué, B.; Bhulai, S.; Hulshof, J.; Kager, W.; Rot, T.

    2012-01-01

    We study wireless ad-hoc networks consisting of small microprocessors with limited memory, where the wireless communication between the processors can be highly unreliable. For this setting, we propose a number of algorithms to estimate the number of nodes in the network, and the number of direct

  6. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  7. An implementation of traffic light system using multi-hop Ad hoc networks

    KAUST Repository

    Ansari, Imran Shafique

    2009-08-01

    In ad hoc networks nodes cooperate with each other to form a temporary network without the aid of any centralized administration. No wired base station or infrastructure is supported, and each host communicates via radio packets. Each host must act as a router, since routes are mostly multi-hop, due to the limited power transmission set by government agencies, (e.g. the Federal Communication Commission (FCC), which is 1 Watt in Industrial Scientific and Medical (ISM) band. The natures of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance constraint. Therefore, radio resource and power management is an important issue of any wireless network. In this paper, a design for traffic light system employing ad hoc networks is proposed. The traffic light system runs automatically based on signals sent through a multi-hop ad hoc network of \\'n\\' number of nodes utilizing the Token Ring protocol, which is efficient for this application from the energy prospective. The experiment consists of a graphical user interface that simulates the traffic lights and laptops (which have wireless network adapters) are used to run the graphical user interface and are responsible for setting up the ad hoc network between them. The traffic light system has been implemented utilizing A Mesh Driver (which allows for more than one wireless device to be connected simultaneously) and Java-based client-server programs. © 2009 IEEE.

  8. Ad Hoc on-Demand Distance Vector (AODV Routing Protocol Performance Evaluation on Hybrid Ad Hoc Network: Comparison of Result of Ns-2 Simulation and Implementation on Testbed using PDA

    Directory of Open Access Journals (Sweden)

    Riri Sari

    2010-10-01

    Full Text Available In Mobile Ad hoc NETwork (MANET, node supplemented with wireless equipment has the capacity to manage and organise autonomously, without the presence of network infrastructures. Hybrid ad hoc network, enable several nodes to move freely (mobile to create instant communication. Independent from infrastructure. They could access the Local Area Network (LAN or the Internet. Functionalities of ad hoc network very much dependent on the routing protocol that determines the routing around node. Ad hoc On-demand Distance Vector (AODV is one of routing protocols in ad hoc network which has a reactive characteristic. This protocol is the most common protocol being researched and used. In this Research, AODV protocol investigation was conducted by developing a testbed using Personal Computer, several Laptops (the Linux Red Hat operation system 9.0 and Fedora Core 2, and Personal Digital Assistant (PDA. This research also made a complete package by mean of cross compilation for PDA iPAQ. In general, results obtained from the simulation of AODV protocol using Network Simulator NS-2 are packet delivery ratio 99.89%, end-to-end delay of 0.14 seconds and routing overhead of 1,756.61 byte per second. Afterwards results from simulation were compared to results from testbed. Results obtained from testbed are as follows: the packet delivery ratio is 99.57%, the end-to-end delay is 1.004 seconds and the routing overhead is 1,360.36 byte per second.

  9. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    The constant mobility of people, the growing need to be always connected, the large number of vehicles that nowadays can be found in the roads and the advances in technology make Vehicular Ad hoc Networks (VANETs) be a major area of research. Vehicular Ad hoc Networks are a special type of wireless Mobile Ad hoc Networks (MANETs), which allow a group of mobile nodes configure a temporary network and maintain it without the need of a fixed infrastructure. A vehicular network presents some spec...

  10. Proposal of interference reduction routing for ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Katsuhiro Naito

    2010-10-01

    Full Text Available In this paper, we propose an interference reduction routing protocol for ad-hoc networks. The interference is one of the degradation factors in wireless communications. In the ad-hoc network, some nodes communicate simultaneously. Therefore, these communications cause interference each other, and some packets are corrupted due to interference from another node. In the proposed protocol, each node estimates required transmission power according to hello messages. Therefore, the node can transmit a data packet with minimum required transmission power. Consequently, the interference against neighbor nodes can be reduced. From simulation results, we can find that the proposed protocol can reduce the number of control messages and can improve the throughput performance.

  11. History of early abuse as a predictor of treatment response in patients with fibromyalgia : A post-hoc analysis of a 12-week, randomized, double-blind, placebo-controlled trial of paroxetine controlled release

    NARCIS (Netherlands)

    Pae, Chi-Un; Masand, Prakash S.; Marks, David M.; Krulewicz, Stan; Han, Changsu; Peindl, Kathleen; Mannelli, Paolo; Patkar, Ashwin A.

    2009-01-01

    Objectives. We conducted a post-hoc analysis to determine whether a history of physical or sexual abuse was associated with response to treatment in a double-blind, randomized, placebo-controlled trial of paroxetine controlled release (CR) in fibromyalgia. Methods. A randomized, double-blind,

  12. Ad Hoc Wireless Networking and Shared Computation for Autonomous Multirobot Systems

    OpenAIRE

    Bevilacqua, Riccardo; Hall, Jason S.; Horning, James; Romano, Marcello

    2009-01-01

    The article of record as published may be located at http://dx.doi.org/10.2514/1.40734 A wireless ad hoc network is introduced that enables inter-robot communication and shared computation among multiple robots with PC/104-based single board computers running the real-time application interface patched Linux operating system. Through the use of IEEE 802.11 ad hoc technology and User Datagram Protocol, each robot is able to exchange data without the need of a centralized router ...

  13. The Ex Hoc Infrastructure - Enhancing Traffic Safety through LIfe WArning Systems

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius; Kristensen, Lars Michael; Eskildsen, Toke

    2004-01-01

    New pervasive computing technologies for sensing and communication open up novel possibilities for enhancing traffic safety. We are currently designing and implementing the Ex Hoc infrastructure framework for communication among mobile and stationary units including vehicles. The infrastructure...... will connect sensing devices on vehicles with sensing devices on other vehicles and with stationary communication units placed alongside roads. The current application of Ex Hoc is to enable the collection and dissemination of information on road condition through LIfe Warning Systems (LIWAS) units....

  14. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    Science.gov (United States)

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  15. Investigating the Reliability and Factor Structure of Kalichman's "Survey 2: Research Misconduct" Questionnaire: A Post Hoc Analysis Among Biomedical Doctoral Students in Scandinavia.

    Science.gov (United States)

    Holm, Søren; Hofmann, Bjørn

    2017-10-01

    A precondition for reducing scientific misconduct is evidence about scientists' attitudes. We need reliable survey instruments, and this study investigates the reliability of Kalichman's "Survey 2: research misconduct" questionnaire. The study is a post hoc analysis of data from three surveys among biomedical doctoral students in Scandinavia (2010-2015). We perform reliability analysis, and exploratory and confirmatory factor analysis using a split-sample design as a partial validation. The results indicate that a reliable 13-item scale can be formed (Cronbach's α = .705), and factor analysis indicates that there are four reliable subscales each tapping a different construct: (a) general attitude to misconduct (α = .768), (b) attitude to personal misconduct (α = .784), (c) attitude to whistleblowing (α = .841), and (d) attitude to blameworthiness/punishment (α = .877). A full validation of the questionnaire requires further research. We, nevertheless, hope that the results will facilitate the increased use of the questionnaire in research.

  16. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  17. Insight and Treatment Outcomes in Schizophrenia: Post-hoc Analysis of a Long-term, Double-blind Study Comparing Lurasidone and Quetiapine XR.

    Science.gov (United States)

    Harvey, Philip D; Siu, Cynthia O; Loebel, Antony D

    2017-12-01

    Objective: The objective of this post-hoc analysis was to evaluate the effect of lurasidone and quetiapine extended-release (XR) on insight and judgment and assess the longitudinal relationships between improvement in insight and cognitive performance, functional capacity, quality of well-being, and depressive symptoms in patients with schizophrenia. Design: Clinically unstable patients with schizophrenia (N=488) were randomized to once-daily, fixed-dose treatment with lurasidone 80mg, lurasidone 160mg, quetiapine XR 600mg, or placebo, followed by a long-term, double-blind, flexible-dose continuation study involving these agents. Results: Significantly greater improvement in insight and judgment (assessed by the Positive and Negative Syndrome Scale G12 item) for the lurasidone and quetiapine XR groups, compared to the placebo group, was observed at Week 6. Over a subsequent six-month continuation period, the flexible dose lurasidone group showed significantly greater improvement in insight from acute phase baseline compared to the flexible-dose quetiapine XR group (QXR-QXR) (p=0.032). Improvement in insight was significantly correlated with improvement in cognition ( p =0.014), functional capacity (p=0.006, UPSA-B), quality of well-being ( p =0.033, QWB), and depressive symptoms ( p =0.05, Montgomery-Åsberg Depression Rating Scale [MADRS] score) across treatment groups and study periods. Conclusion: In this post-hoc analysis, flexibly dosed lurasidone 40 to 160mg/d was found to be associated with significantly greater improvement in insight compared to flexibly dosed quetiapine XR 200 to 800mg/d over long-term treatment in patients with schizophrenia. Across treatment groups, improvement in insight and judgment was significantly associated with improvement in cognition, functional capacity, quality of well-being, and depressive symptoms over time.

  18. Cognitive radio application for vehicular ad hoc networks (VANETS

    Directory of Open Access Journals (Sweden)

    Miladić Suzana D.

    2016-01-01

    Full Text Available This paper presents the application of cognitive radio technology in vehicular ad-hoc networks aimed to improve the communications between vehicles themselves as well as between vehicles and roadside infrastructure. Due to dynamic approach of spectrum access, cognitive radio is a technology that enables more efficient usage of radio-frequency spectrum. We review actual approaches and discuss research challenges related to the use of cognitive radio technology in vehicular ad hoc networks with emphasis on architecture, spectrum management as well as QoS optimization. The researching on cognitive radio application in vehicular networks is still developing and there are not many experimental platforms due to their complex setups. Some related research projects and cognitive radio realizations are provided in this paper.

  19. Ad Hoc Physical Hilbert Spaces in Quantum Mechanics

    Czech Academy of Sciences Publication Activity Database

    Fernandez, F. M.; Garcia, J.; Semorádová, Iveta; Znojil, Miloslav

    2015-01-01

    Roč. 54, č. 12 (2015), s. 4187-4203 ISSN 0020-7748 Institutional support: RVO:61389005 Keywords : quantum mechanics * physical Hilbert spaces * ad hoc inner product * singular potentials regularized * low lying energies Subject RIV: BE - Theoretical Physics Impact factor: 1.041, year: 2015

  20. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  1. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    La movilidad constante de las personas y la creciente necesidad de estar conectados en todo momento ha hecho de las redes vehiculares un área cuyo interés ha ido en aumento. La gran cantidad de vehículos que hay en la actualidad, y los avances tecnológicos han hecho de las redes vehiculares (VANETS, Vehicular Ad hoc Networks) un gran campo de investigación. Las redes vehiculares son un tipo especial de redes móviles ad hoc inalámbricas, las cuales, al igual que las redes MANET (Mobile Ad hoc ...

  2. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  3. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  4. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  5. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  6. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  7. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  8. A peer-to-peer file search and download protocol for wireless ad-hoc networks

    NARCIS (Netherlands)

    Sözer, Hasan; Tekkalmaz, M.; Korpeoglu, I.

    Deployment of traditional peer-to-peer file sharing systems on a wireless ad-hoc network introduces several challenges. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only aware of their immediate neighborhood. In this

  9. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  10. EEG Spectral Analysis in Serious Gaming: An Ad Hoc Experimental Application

    Directory of Open Access Journals (Sweden)

    Minchev Z.

    2009-12-01

    Full Text Available The application of serious gaming technology in different areas of human knowledge for learning is raising the question of quantitative measurement of the training process quality. In the present paper a pilot study of 10 healthy volunteers' EEG spectra is performed for ad hoc selected game events ('win' and 'lose' via continuous wavelet transform (real and complex on the basis of the Morlet mother wavelet function and S-transformation. The results have shown a general decrease of the alpha rhythms power spectra frequencies for the 'lose' events and increase for the 'win' events. This fact corresponds to an opposite behaviour of the theta rhythm of the players for the same 'win' and 'lose' events. Additionally, the frequency changes in the alpha1 (8-10.5 Hz, alpha2 (10.5-13 Hz and theta2 rhythms (6-8 Hz were supposed to be a phenomena related to positive and negative emotions appearance in the EEG activity of the players regarding the selected 'win' and 'lose' states.

  11. Centralized cooperative spectrum sensing for ad-hoc disaster relief network clusters

    DEFF Research Database (Denmark)

    Pratas, Nuno; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Disaster relief networks have to be highly adaptable and resilient. Cognitive radio enhanced ad-hoc architecture have been put forward as a candidate to enable such networks. Spectrum sensing is the cornerstone of the cognitive radio paradigm, and it has been the target of intensive research....... The main common conclusion was that the achievable spectrum sensing accuracy can be greatly enhanced through the use of cooperative sensing schemes. When considering applying Cognitive Radio to ad-hoc disaster relief networks, spectrum sensing cooperative schemes are paramount. A centralized cluster...

  12. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    Science.gov (United States)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  13. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    Science.gov (United States)

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  14. On the impact of network dynamics on a discovery protocol for ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.; Heijenk, Geert

    A very promising approach to discovering services and context information in ad-hoc networks is based on the use of Attenuated Bloom filters. In this paper we analyze the impact of changes in the connectivity of an ad-hoc network on this approach. We evaluate the performance of the discovery

  15. What Is the Problem of Ad Hoc Hypotheses?

    Science.gov (United States)

    Bamford, Greg

    1999-01-01

    Philosophers' attempts to convincingly explicate the received view of an ad hoc hypothesis--that it accounts for only the observations it was designed to account for--have been unsuccessful. Familiar and firmer criteria for evaluating the hypotheses or modified theories so classified are characteristically available. Contains 41 references.…

  16. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  17. Multiplayer Game for DDoS Attacks Resilience in Ad Hoc Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles. We divide requests from nodes into separate groups which decreases the ability of malicious nodes to cooperate...... with one another in order to effectively make a DDoS attack. Finally, through our experiments we have shown that the total overhead of the multiplayer game as well as the the total time that each node needs to be served is affordable for devices that have limited resources and for environments like ad hoc...

  18. Recreating the seawater mixture composition of HOCs in toxicity tests with Artemia franciscana by passive dosing

    Energy Technology Data Exchange (ETDEWEB)

    Rojo-Nieto, E., E-mail: elisa.rojo@uca.es [Andalusian Centre of Marine Science and Technology (CACYTMAR), Department of Environmental Technologies, University of Cadiz, 11510 Puerto Real (Spain); Smith, K.E.C. [Department of Environmental Science, Aarhus University, DK-4000 Roskilde (Denmark); Perales, J.A. [Andalusian Centre of Marine Science and Technology (CACYTMAR), Department of Environmental Technologies, University of Cadiz, 11510 Puerto Real (Spain); Mayer, P. [Department of Environmental Science, Aarhus University, DK-4000 Roskilde (Denmark)

    2012-09-15

    The toxicity testing of hydrophobic organic compounds (HOCs) in aquatic media is generally challenging, and this is even more problematic for mixtures. The hydrophobic properties of these compounds make them difficult to dissolve, and subsequently to maintain constant exposure concentrations. Evaporative and sorptive losses are highly compound-specific, which can alter not only total concentrations, but also the proportions between the compounds in the mixture. Therefore, the general aim of this study was to explore the potential of passive dosing for testing the toxicity of a PAH mixture that recreates the mixture composition found in seawater from a coastal area of Spain, the Bay of Algeciras. First, solvent spiking and passive dosing were compared for their suitability to determine the acute toxicity to Artemia franciscana nauplii of several PAHs at their respective solubility limits. Second, passive dosing was applied to recreate the seawater mixture composition of PAHs measured in a Spanish monitoring program, to test the toxicity of this mixture at different levels. HPLC analysis was used to confirm the reproducibility of the dissolved exposure concentrations for the individual PAHs and mixtures. This study shows that passive dosing has some important benefits in comparison with solvent spiking for testing HOCs in aquatic media. These include maintaining constant exposure concentrations, leading to higher reproducibility and a relative increase in toxicity. Passive dosing is also able to faithfully reproduce real mixtures of HOCs such as PAHs, in toxicity tests, reproducing both the levels and proportions of the different compounds. This provides a useful approach for studying the toxicity of environmental mixtures of HOCs, both with a view to investigating their toxicity but also for determining safety factors before such mixtures result in detrimental effects.

  19. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-01-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical

  20. Ad Hoc Human Information Nets for Asymmetric Threat Surveillance

    National Research Council Canada - National Science Library

    Thiruvathukal, George

    2003-01-01

    ...: Hybrid-Hierarchical Micro-Databases, Query Optimization, and XML for Embedded Systems. After meeting with the program manager, Tom Armour, in Washington, DC, we were able to get a better perspective on the ad hoc nature of the solicitation...

  1. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  2. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  3. Ad Hoc Categories and False Memories: Memory Illusions for Categories Created On-The-Spot

    Science.gov (United States)

    Soro, Jerônimo C.; Ferreira, Mário B.; Semin, Gün R.; Mata, André; Carneiro, Paula

    2017-01-01

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment…

  4. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  5. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  6. Impulse control disorder related behaviours during long-term rotigotine treatment: a post hoc analysis.

    Science.gov (United States)

    Antonini, A; Chaudhuri, K R; Boroojerdi, B; Asgharnejad, M; Bauer, L; Grieger, F; Weintraub, D

    2016-10-01

    Dopamine agonists in Parkinson's disease (PD) are associated with impulse control disorders (ICDs) and other compulsive behaviours (together called ICD behaviours). The frequency of ICD behaviours reported as adverse events (AEs) in long-term studies of rotigotine transdermal patch in PD was evaluated. This was a post hoc analysis of six open-label extension studies up to 6 years in duration. Analyses included patients treated with rotigotine for at least 6 months and administered the modified Minnesota Impulse Disorders Interview. ICD behaviours reported as AEs were identified and categorized. For 786 patients, the mean (±SD) exposure to rotigotine was 49.4 ± 17.6 months. 71 (9.0%) patients reported 106 ICD AEs cumulatively. Occurrence was similar across categories: 2.5% patients reported 'compulsive sexual behaviour', 2.3% 'buying disorder', 2.0% 'compulsive gambling', 1.7% 'compulsive eating' and 1.7% 'punding behaviour'. Examining at 6-month intervals, the incidence was relatively low during the first 30 months; it was higher over the next 30 months, peaking in the 54-60-month period. No ICD AEs were serious, and 97% were mild or moderate in intensity. Study discontinuation occurred in seven (9.9%) patients with ICD AEs; these then resolved in five patients. Dose reduction occurred for 23 AEs, with the majority (73.9%) resolving. In this analysis of >750 patients with PD treated with rotigotine, the frequency of ICD behaviour AEs was 9.0%, with a specific incidence timeline observed. Active surveillance as duration of treatment increases may help early identification and management; once ICD behaviours are present rotigotine dose reduction may be considered. © 2016 The Authors. European Journal of Neurology published by John Wiley & Sons Ltd on behalf of European Academy of Neurology.

  7. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  8. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zahariadis Theodore

    2010-01-01

    Full Text Available Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN, which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

  9. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  10. Fluoxetine-clonazepam cotherapy for anxious depression: an exploratory, post-hoc analysis of a randomized, double blind study.

    Science.gov (United States)

    Papakostas, George I; Clain, Alisabet; Ameral, Victoria E; Baer, Lee; Brintz, Carrie; Smith, Ward T; Londborg, Peter D; Glaudin, Vincent; Painter, John R; Fava, Maurizio

    2010-01-01

    Anxious depression, defined as major depressive disorder (MDD) accompanied by high levels of anxiety, seems to be both common and difficult to treat, with antidepressant monotherapy often yielding modest results. We sought to examine the relative benefits of antidepressant-anxiolytic cotherapy versus antidepressant monotherapy for patients with anxious depression versus without anxious depression. We conducted a post-hoc analysis of an existing dataset (N=80), from a 3-week, randomized, double-blind trial which demonstrated cotherapy with fluoxetine and clonazepam to result in superior efficacy than fluoxetine monotherapy in MDD. The present analysis involved examining whether anxious depression status served as a predictor and moderator of symptom improvement. Anxious depression status was not found to predict symptom improvement, or serve as a moderator of clinical improvement to cotherapy versus monotherapy. However, the advantage in remission rates in favor of cotherapy versus monotherapy was, numerically, much larger for patients with anxious depression (32.2%) than it was for patients without anxious MDD (9.7%). The respective number needed to treat statistic for these two differences in response rates were, approximately, one in three for patients with anxious depression versus one in 10 for patients without anxious depression. The efficacy of fluoxetine-clonazepam cotherapy compared with fluoxetine monotherapy was numerically but not statistically enhanced for patients with anxious depression than those without anxious depression.

  11. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  12. Authentication and consensus overhead in vehicular ad hoc networks

    NARCIS (Netherlands)

    Petit, Jonathan; Mammeri, Zoubir

    Vehicular ad hoc networks aim at increasing passenger safety by exchanging warning messages between vehicles wirelessly. A main challenge is to resist to various malicious abuses and security attacks. However, any security mechanism comes with overhead. We analyze how the authentication algorithm

  13. Challenges of evidence acquisition in wireless ad-hoc networks

    CSIR Research Space (South Africa)

    Mutanga, MB

    2010-05-01

    Full Text Available a big challenge. Thus, the aim of this paper is to explore the challenges of acquiring live evidence in wireless ad-hoc networks. We also give some legal requirements of evidence admissibility as outlined in the Communications and Transactions Act...

  14. A New Hybrid Channel Access Scheme for Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2002-01-01

    Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated...

  15. History of the research ad hoc committee on 'dissemination of information' and the special ad hoc committee on 'dissemination of information' of the Atomic Energy Society of Japan

    Energy Technology Data Exchange (ETDEWEB)

    Itabashi, Keizo [Japan Atomic Energy Agency, Intellectual Resources Department, Tokai, Ibaraki (Japan)

    2010-06-15

    The Research ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 15 times from Oct. 1970 to Mar 1973. After that, The Special ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 115 times from Apr. 1973 to Mar 2009. The history of these two committees is described. Activity report is arranged including the information on change of the member and topics of the meeting, and the minutes. Furthermore, the document list on International Nuclear Information System (INIS) from Japan is included. (author)

  16. History of the research ad hoc committee on 'dissemination of information' and the special ad hoc committee on 'dissemination of information' of the Atomic Energy Society of Japan

    International Nuclear Information System (INIS)

    Itabashi, Keizo

    2010-06-01

    The Research ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 15 times from Oct. 1970 to Mar 1973. After that, The Special ad hoc committee on 'Dissemination of information' of the Atomic Energy Society of Japan was held 115 times from Apr. 1973 to Mar 2009. The history of these two committees is described. Activity report is arranged including the information on change of the member and topics of the meeting, and the minutes. Furthermore, the document list on International Nuclear Information System (INIS) from Japan is included. (author)

  17. On the Geometrical Characteristics of Three-Dimensional Wireless Ad Hoc Networks and Their Applications

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available In a wireless ad hoc network, messages are transmitted, received, and forwarded in a finite geometrical region and the transmission of messages is highly dependent on the locations of the nodes. Therefore the study of geometrical relationship between nodes in wireless ad hoc networks is of fundamental importance in the network architecture design and performance evaluation. However, most previous works concentrated on the networks deployed in the two-dimensional region or in the infinite three-dimensional space, while in many cases wireless ad hoc networks are deployed in the finite three-dimensional space. In this paper, we analyze the geometrical characteristics of the three-dimensional wireless ad hoc network in a finite space in the framework of random graph and deduce an expression to calculate the distance probability distribution between network nodes that are independently and uniformly distributed in a finite cuboid space. Based on the theoretical result, we present some meaningful results on the finite three-dimensional network performance, including the node degree and the max-flow capacity. Furthermore, we investigate some approximation properties of the distance probability distribution function derived in the paper.

  18. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  19. Subsequent Chemotherapy and Treatment Patterns After Abiraterone Acetate in Patients with Metastatic Castration-resistant Prostate Cancer: Post Hoc Analysis of COU-AA-302.

    Science.gov (United States)

    de Bono, Johann S; Smith, Matthew R; Saad, Fred; Rathkopf, Dana E; Mulders, Peter F A; Small, Eric J; Shore, Neal D; Fizazi, Karim; De Porre, Peter; Kheoh, Thian; Li, Jinhui; Todd, Mary B; Ryan, Charles J; Flaig, Thomas W

    2017-04-01

    Treatment patterns for metastatic castration-resistant prostate cancer (mCRPC) have changed substantially in the last few years. In trial COU-AA-302 (chemotherapy-naïve men with mCRPC), abiraterone acetate plus prednisone (AA) significantly improved radiographic progression-free survival and overall survival (OS) when compared to placebo plus prednisone (P). This post hoc analysis investigated clinical responses to docetaxel as first subsequent therapy (FST) among patients who progressed following protocol-specified treatment with AA, and characterized subsequent treatment patterns among older (≥75 yr) and younger (AA arm received subsequent treatment with one or more agents approved for mCRPC. Efficacy analysis was performed for patients for whom baseline and at least one post-baseline prostate-specific antigen (PSA) values were available. Baseline and at least one post-baseline PSA values were available for 100 AA patients who received docetaxel as FST. While acknowledging the limitations of post hoc analyses, 40% (40/100) of these patients had an unconfirmed ≥50% PSA decline with first subsequent docetaxel therapy, and 27% (27/100) had a confirmed ≥50% PSA decline. The median docetaxel treatment duration among these 100 patients was 4.2 mo. Docetaxel was the most common FST among older and younger patients from each treatment arm. However, 43% (79/185) of older patients who progressed on AA received no subsequent therapy for mCRPC, compared with 17% (60/361) of younger patients. Patients with mCRPC who progress with AA treatment may still derive benefit from subsequent docetaxel therapy. These data support further assessment of treatment patterns following AA treatment for mCRPC, particularly among older patients. ClinicalTrials.gov NCT00887198. Treatment patterns for advanced prostate cancer have changed substantially in the last few years. This additional analysis provides evidence of clinical benefit for subsequent chemotherapy in men with advanced

  20. FRAMEWORK FOR AD HOC NETWORK COMMUNICATION IN MULTI-ROBOT SYSTEMS

    Directory of Open Access Journals (Sweden)

    Khilda Slyusar

    2016-11-01

    Full Text Available Assume a team of mobile robots operating in environments where no communication infrastructure like routers or access points is available. The robots have to create a mobile ad hoc network, in that case, it provides communication on peer-to-peer basis. The paper gives an overview of existing solutions how to route messages in such ad hoc networks between robots that are not directly connected and introduces a design of a software framework for realization of such communication. Feasibility of the proposed framework is shown on the example of distributed multi-robot exploration of an a priori unknown environment. Testing of developed functionality in an exploration scenario is based on results of several experiments with various input conditions of the exploration process and various sizes of a team and is described herein.

  1. Asymptotic Delay Analysis for Cross-Layer Delay-Based Routing in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Philippe Jacquet

    2007-01-01

    Full Text Available This paper addresses the problem of the evaluation of the delay distribution via analytical means in IEEE 802.11 wireless ad hoc networks. We show that the asymptotic delay distribution can be expressed as a power law. Based on the latter result, we present a cross-layer delay estimation protocol and we derive new delay-distribution-based routing algorithms, which are well adapted to the QoS requirements of real-time multimedia applications. In fact, multimedia services are not sensitive to average delays, but rather to the asymptotic delay distributions. Indeed, video streaming applications drop frames when they are received beyond a delay threshold, determined by the buffer size. Although delay-distribution-based routing is an NP-hard problem, we show that it can be solved in polynomial time when the delay threshold is large, because of the asymptotic power law distribution of the link delays.

  2. Preventive Ceftriaxone in Patients with Stroke Treated with Intravenous Thrombolysis: Post Hoc Analysis of the Preventive Antibiotics in Stroke Study

    NARCIS (Netherlands)

    Vermeij, Jan-Dirk; Westendorp, Willeke F.; Roos, Yvo B.; Brouwer, Matthijs C.; van de Beek, Diederik; Nederkoorn, Paul J.

    2016-01-01

    The Preventive Antibiotics in Stroke Study (PASS), a randomized open-label masked endpoint trial, showed that preventive ceftriaxone did not improve functional outcome at 3 months in patients with acute stroke (adjusted common OR 0.95; 95% CI 0.82-1.09). Post-hoc analyses showed that among patients

  3. A Novel Routing Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Raúl Aquino Santos

    2008-01-01

    Full Text Available Este trabajo examina la importancia de las redes inalámbricas ad hoc y el algoritmo de enrutamiento con inundación basada en grupos (LORA-CBF para la comunicación inter-vehicular con la finalidad de optimizar el flujo de tráfico e incrementar la seguridad en las autopistas. Se discute el algoritmo de enrutamiento LORA-CBF y se presentan los resultados de simulaciones realizadas en OPNET de una autopista con alta movilidad vehicular. Primero, el modelo de simulación propuesto se valida a pequeña escala con resultados experimentales. Posteriormente, se emplean simulaciones de nuestro modelo comparándolos con Ad Hoc On-Demand Distance Vector (AODV y Dynamic Source Routing (DSR. Finalmente, se emplea un modelo de tráfico microscópico desarrollado en OPNET para simular la movilidad de 250 vehículos en una autopista y se aplica el algoritmo de enrutamiento LORA-CBF en un escenario vehicular.

  4. simulate_CAT: A Computer Program for Post-Hoc Simulation for Computerized Adaptive Testing

    Directory of Open Access Journals (Sweden)

    İlker Kalender

    2015-06-01

    Full Text Available This paper presents a computer software developed by the author. The software conducts post-hoc simulations for computerized adaptive testing based on real responses of examinees to paper and pencil tests under different parameters that can be defined by user. In this paper, short information is given about post-hoc simulations. After that, the working principle of the software is provided and a sample simulation with required input files is shown. And last, output files are described

  5. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  6. Illustrating, Quantifying, and Correcting for Bias in Post-hoc Analysis of Gene-Based Rare Variant Tests of Association

    Science.gov (United States)

    Grinde, Kelsey E.; Arbet, Jaron; Green, Alden; O'Connell, Michael; Valcarcel, Alessandra; Westra, Jason; Tintle, Nathan

    2017-01-01

    To date, gene-based rare variant testing approaches have focused on aggregating information across sets of variants to maximize statistical power in identifying genes showing significant association with diseases. Beyond identifying genes that are associated with diseases, the identification of causal variant(s) in those genes and estimation of their effect is crucial for planning replication studies and characterizing the genetic architecture of the locus. However, we illustrate that straightforward single-marker association statistics can suffer from substantial bias introduced by conditioning on gene-based test significance, due to the phenomenon often referred to as “winner's curse.” We illustrate the ramifications of this bias on variant effect size estimation and variant prioritization/ranking approaches, outline parameters of genetic architecture that affect this bias, and propose a bootstrap resampling method to correct for this bias. We find that our correction method significantly reduces the bias due to winner's curse (average two-fold decrease in bias, p bias and improve inference in post-hoc analysis of gene-based tests under a wide variety of genetic architectures. PMID:28959274

  7. UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna

    Science.gov (United States)

    Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang

    2018-01-01

    This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.

  8. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  9. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...

  10. Distributed optimization of a multisubchannel Ad Hoc cognitive radio network

    KAUST Repository

    Leith, Alex

    2012-05-01

    In this paper, we study the distributed-duality-based optimization of a multisubchannel ad hoc cognitive radio network (CRN) that coexists with a multicell primary radio network (PRN). For radio resource allocation in multiuser orthogonal frequency-division multiplexing (MU-OFDM) systems, the orthogonal-access-based exclusive subchannel assignment (ESA) technique has been a popular method, but it is suboptimal in ad hoc networks, because nonorthogonal access between multiple secondary-user links by using shared subchannel assignment (SSA) can bring a higher weighted sum rate. We utilize the Lagrangian dual composition tool and design low-complexity near-optimal SSA resource allocation methods, assuming practical discrete-rate modulation and that the CRN-to-PRN interference constraint has to strictly be satisfied. However, available SSA methods for CRNs are either suboptimal or involve high complexity and suffer from slow convergence. To address this problem, we design fast-convergence SSA duality schemes and introduce several novel methods to increase the speed of convergence and to satisfy various system constraints with low complexity. For practical implementation in ad hoc CRNs, we design distributed-duality schemes that involve only a small number of CRN local information exchanges for dual update. The effects of many system parameters are presented through simulation results, which show that the near-optimal SSA duality scheme can perform significantly better than the suboptimal ESA duality and SSA-iterative waterfilling schemes and that the performance loss of the distributed schemes is small, compared with their centralized counterparts. © 2012 IEEE.

  11. Minimizing Broadcast Expenses in Clustered Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Zeeshan Hussain

    2018-01-01

    Full Text Available One way to minimize the broadcast expenses of routing protocols is to cluster the network. In clustered ad-hoc networks, all resources can be managed easily by resolving scalability issues. However, blind query broadcast is a major issue that leads to the broadcast storm problem in clustered ad-hoc networks. This query broadcast is done to carry out the route-search task that leads to the unnecessary propagation of route-query even after route has been found. Hence, this query propagation poses the problem of congestion in the network. In particular this motivates us to propose a query-control technique in such networks which works based on broadcast repealing. A huge amount of work has been devoted to propose the query control broadcasting techniques. However, such techniques used in traditional broadcasting mechanisms need to be properly extended for use in the cluster based routing architecture. In this paper, query-control technique is proposed for cluster based routing technique to reduce the broadcast expenses. Finally, we report some experiments which compare the proposed technique to other commonly used techniques including standard one-class AODV that follows TTL-sequence based broadcasting technique.

  12. Service for fault tolerance in the Ad Hoc Networks based on Multi Agent Systems

    Directory of Open Access Journals (Sweden)

    Ghalem Belalem

    2011-02-01

    Full Text Available The Ad hoc networks are distributed networks, self-organized and does not require infrastructure. In such network, mobile infrastructures are subject of disconnections. This situation may concern a voluntary or involuntary disconnection of nodes caused by the high mobility in the Ad hoc network. In these problems we are trying through this work to contribute to solving these problems in order to ensure continuous service by proposing our service for faults tolerance based on Multi Agent Systems (MAS, which predict a problem and decision making in relation to critical nodes. Our work contributes to study the prediction of voluntary and involuntary disconnections in the Ad hoc network; therefore we propose our service for faults tolerance that allows for effective distribution of information in the Network by selecting some objects of the network to be duplicates of information.

  13. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  14. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  15. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  16. Throughput and Fairness of Collision Avoidance Protocols in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Garcia-Luna-Aceves, J. J; Wang, Yu

    2004-01-01

    .... In Section 1, The authors present an analytical modeling to derive the saturation throughput of these sender-initiated collision avoidance protocols in multi-hop ad hoc networks with nodes randomly...

  17. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  18. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  19. ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS – A SURVEY

    Directory of Open Access Journals (Sweden)

    K. Sankar

    2012-06-01

    Full Text Available Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in wireless communication. The performance of the medium access control (MAC scheme not only has a fairly significant end-result on the behaviour of the routing approach employed, but also on the energy consumption of the wireless network interface card (NIC. We investigate the inadequacies of the MAC schemes designed for ad hoc wireless networks in the context of power awareness herein. The topology changes due to uncontrollable factors such as node mobility, weather, interference, noise, as well as on controllable parameters such as transmission power and antenna direction results in significant amount of energy loss. Controlling rapid topology changes by minimizing the maximum transmission power used in ad hoc wireless networks, while still maintaining networks connectivity can prolong battery life and hence network lifetime considerably. In addition, we systematically explore the potential energy consumption pitfalls of non–power-based and power based routing schemes. We suggest a thorough energy-based performance survey of energy aware routing protocols for wireless mobile ad-hoc networks. We also present the statistical performance metrics measured by our simulations.

  20. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  1. Inherent Risk Factors for Nosocomial Infection in the Long Stay Critically Ill Child Without Known Baseline Immunocompromise: A Post Hoc Analysis of the CRISIS Trial.

    Science.gov (United States)

    Carcillo, Joseph A; Dean, J Michael; Holubkov, Richard; Berger, John; Meert, Kathleen L; Anand, Kanwaljeet J S; Zimmerman, Jerry; Newth, Christopher J; Harrison, Rick; Burr, Jeri; Willson, Douglas F; Nicholson, Carol; Bell, Michael J; Berg, Robert A; Shanley, Thomas P; Heidemann, Sabrina M; Dalton, Heidi; Jenkins, Tammara L; Doctor, Allan; Webster, Angie

    2016-11-01

    Nosocomial infection remains an important health problem in long stay (>3 days) pediatric intensive care unit (PICU) patients. Admission risk factors related to the development of nosocomial infection in long stay immune competent patients in particular are not known. Post-hoc analysis of the previously published Critical Illness Stress induced Immune Suppression (CRISIS) prevention trial database, to identify baseline risk factors for nosocomial infection. Because there was no difference between treatment arms of that study in nosocomial infection in the population without known baseline immunocompromise, both arms were combined and the cohort that developed nosocomial infection was compared with the cohort that did not. There were 254 long stay PICU patients without known baseline immunocompromise. Ninety (35%) developed nosocomial infection, and 164 (65%) did not. Admission characteristics associated with increased nosocomial infection risk were increased age, higher Pediatric Risk of Mortality version III score, the diagnoses of trauma or cardiac arrest and lymphopenia (P risk of developing nosocomial infection (P risk factors (P < 0.05); whereas trauma tended to be related to nosocomial infection development (P = 0.07). These data suggest that increasing age, cardiac arrest and lymphopenia predispose long stay PICU patients without known baseline immunocompromise to nosocomial infection. These findings may inform pre-hoc stratification randomization strategies for prospective studies designed to prevent nosocomial infection in this population.

  2. QoS Routing in Ad-Hoc Networks Using GA and Multi-Objective Optimization

    Directory of Open Access Journals (Sweden)

    Admir Barolli

    2011-01-01

    Full Text Available Much work has been done on routing in Ad-hoc networks, but the proposed routing solutions only deal with the best effort data traffic. Connections with Quality of Service (QoS requirements, such as voice channels with delay and bandwidth constraints, are not supported. The QoS routing has been receiving increasingly intensive attention, but searching for the shortest path with many metrics is an NP-complete problem. For this reason, approximated solutions and heuristic algorithms should be developed for multi-path constraints QoS routing. Also, the routing methods should be adaptive, flexible, and intelligent. In this paper, we use Genetic Algorithms (GAs and multi-objective optimization for QoS routing in Ad-hoc Networks. In order to reduce the search space of GA, we implemented a search space reduction algorithm, which reduces the search space for GAMAN (GA-based routing algorithm for Mobile Ad-hoc Networks to find a new route. We evaluate the performance of GAMAN by computer simulations and show that GAMAN has better behaviour than GLBR (Genetic Load Balancing Routing.

  3. Car-to-Pedestrian Communication Safety System Based on the Vehicular Ad-Hoc Network Environment: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Peng Jing

    2017-10-01

    Full Text Available With the unparalleled growth of motor vehicles, traffic accident between pedestrians and vehicles is one of the most serious issues in the word-wild. Plenty of injuries and fatalities are caused by the traffic accidents and crashes. The connected vehicular ad hoc network as an emerging approach which has the potential to reduce and even avoid accidents have been focused on by many researchers. A large number of car-to-pedestrian communication safety systems based on the vehicular ad hoc network are researching and developing. However, to our limited knowledge, a systematic review about the car-to-pedestrian communication safety system based on the vehicular ad-hoc network has not be written. The purpose and goal of this review is to systematically evaluate and access the reliability of car-to-pedestrian communication safety system based on the vehicular ad-hoc network environment and provide some recommendations for the future works according to throwing some light on the previous literatures. A quality evaluation was developed through established items and instruments tailored to this review. Future works are needed to focus on developing a valid as well as effective communication safety system based on the vehicular ad hoc network to protect the vulnerable road users.

  4. Studies on urban vehicular ad-hoc networks

    CERN Document Server

    Zhu, Hongzi

    2013-01-01

    With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing 'smart cities' and addressing many important transportation problems such as road safety, efficiency, and convenience.This brief provides an introduction to the large trace data set collected from thousands of taxis and buses in Shanghai, the largest metropolis in China. It also presents the challenges, design issues, performance modeling and evaluation of a wide spectrum of VANET research topics, ranging from realistic vehicular mobility models and opportunistic ro

  5. TMAP ad hoc Working Group Fish Progress report 2007

    NARCIS (Netherlands)

    Bolle, L.J.; Damm, U.; Diederichs, B.; Jager, Z.; Overzee, van H.M.J.

    2007-01-01

    Building on previous work done by the TMAP ad hoc Working Group Fish, a meeting and a workshop were held in Hamburg in June and October 2007. The most important aim of both was to come to an agreement on how to proceed with the data preparations and analyses, and to facilitate the exchange of data

  6. Optimal design of cluster-based ad-hoc networks using probabilistic solution discovery

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2009-01-01

    The reliability of ad-hoc networks is gaining popularity in two areas: as a topic of academic interest and as a key performance parameter for defense systems employing this type of network. The ad-hoc network is dynamic and scalable and these descriptions are what attract its users. However, these descriptions are also synonymous for undefined and unpredictable when considering the impacts to the reliability of the system. The configuration of an ad-hoc network changes continuously and this fact implies that no single mathematical expression or graphical depiction can describe the system reliability-wise. Previous research has used mobility and stochastic models to address this challenge successfully. In this paper, the authors leverage the stochastic approach and build upon it a probabilistic solution discovery (PSD) algorithm to optimize the topology for a cluster-based mobile ad-hoc wireless network (MAWN). Specifically, the membership of nodes within the back-bone network or networks will be assigned in such as way as to maximize reliability subject to a constraint on cost. The constraint may also be considered as a non-monetary cost, such as weight, volume, power, or the like. When a cost is assigned to each component, a maximum cost threshold is assigned to the network, and the method is run; the result is an optimized allocation of the radios enabling back-bone network(s) to provide the most reliable network possible without exceeding the allowable cost. The method is intended for use directly as part of the architectural design process of a cluster-based MAWN to efficiently determine an optimal or near-optimal design solution. It is capable of optimizing the topology based upon all-terminal reliability (ATR), all-operating terminal reliability (AoTR), or two-terminal reliability (2TR)

  7. A-priori and post-hoc segmentation in the design of healthy eating campaigns

    DEFF Research Database (Denmark)

    Kazbare, Laura; van Trijp, Hans C. M.; Eskildsen, Jacob Kjær

    2010-01-01

    . Although such practice may be justifiable from the practical point of view, it is unclear how effective these implicit segmentations are. In this study the authors argue that  it is important to transcend demographic boundaries and to further segment demographic groups. A study with 13-15-year-old...... and a post-hoc segmentation. The results of the study show that it is useful and also ethical to differentiate people using segmentation methods, since it facilitates reaching more vulnerable segments of society that in general resist change. It also demonstrates that post-hoc segmentation is more helpful...

  8. An Ad-Hoc Adaptive Pilot Model for Pitch Axis Gross Acquisition Tasks

    Science.gov (United States)

    Hanson, Curtis E.

    2012-01-01

    An ad-hoc algorithm is presented for real-time adaptation of the well-known crossover pilot model and applied to pitch axis gross acquisition tasks in a generic fighter aircraft. Off-line tuning of the crossover model to human pilot data gathered in a fixed-based high fidelity simulation is first accomplished for a series of changes in aircraft dynamics to provide expected values for model parameters. It is shown that in most cases, for this application, the traditional crossover model can be reduced to a gain and a time delay. The ad-hoc adaptive pilot gain algorithm is shown to have desirable convergence properties for most types of changes in aircraft dynamics.

  9. The Ad Hoc process to strengthen the framework convention on climate change

    Energy Technology Data Exchange (ETDEWEB)

    Ramakrishna, K.; Deutz, A.M.; Jacobsen, L.A. [eds.

    1995-11-01

    The Woods Hole Research Center convened an International Conference on The Ad Hoc Process to Strengthen the Framework Convention on Climate Change in Woods Hole, MA, on October 7-9, 1995. The conference was conducted to examine the prospects for successful adoption of a protocol to the Framework Convention on Climate Change by 1997. In preparation for the Second session of the Ad Hoc Group on the Berlin Mandate, several governmental and nongovernmental representatives met in Woods Hole to discuss the process and possible outcome of the Berlin Mandate negotiations for a protocol or other legal instrument to strengthen the Convention. The conference was by invitation and all participants attended in their personal capacities.

  10. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  11. An Economic Framework for Resource Allocation in Ad-hoc Grids

    NARCIS (Netherlands)

    Pourebrahimi, B.

    2009-01-01

    In this dissertation, we present an economic framework to study and develop different market-based mechanisms for resource allocation in an ad-hoc Grid. Such an economic framework helps to understand the impact of certain choices and explores what are the suitable mechanisms from Grid user/owner

  12. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  13. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    Simeone O

    2007-01-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  14. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    O. Simeone

    2007-03-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  15. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  16. A fault-tolerant small world topology control model in ad hoc networks for search and rescue

    Science.gov (United States)

    Tan, Mian; Fang, Ling; Wu, Yue; Zhang, Bo; Chang, Bowen; Holme, Petter; Zhao, Jing

    2018-02-01

    Due to their self-organized, multi-hop and distributed characteristics, ad hoc networks are useful in search and rescue. Topology control models need to be designed for energy-efficient, robust and fast communication in ad hoc networks. This paper proposes a topology control model which specializes for search and rescue-Compensation Small World-Repeated Game (CSWRG)-which integrates mobility models, constructing small world networks and a game-theoretic approach to the allocation of resources. Simulation results show that our mobility models can enhance the communication performance of the constructed small-world networks. Our strategy, based on repeated game, can suppress selfish behavior and compensate agents that encounter selfish or faulty neighbors. This model could be useful for the design of ad hoc communication networks.

  17. Report of the evaluation by the Ad Hoc Review Committee on Health Physics. Result evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Health Physics in accordance with the 'Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Department of Health Physics in Tokai Research Establishment and at related departments in other Establishments of JAERI. The Ad Hoc Review Committee consisted of six specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from October 2000 to January 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on October 10, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Health Physics. (author)

  18. Ad Hoc Transient Groups: Instruments for Awareness in Learning Networks

    NARCIS (Netherlands)

    Fetter, Sibren; Rajagopal, Kamakshi; Berlanga, Adriana; Sloep, Peter

    2011-01-01

    Fetter, S., Rajagopal, K., Berlanga, A. J., & Sloep, P. B. (2011). Ad Hoc Transient Groups: Instruments for Awareness in Learning Networks. In W. Reinhardt, T. D. Ullmann, P. Scott, V. Pammer, O. Conlan, & A. J. Berlanga (Eds.), Proceedings of the 1st European Workshop on Awareness and Reflection in

  19. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  20. Signaling-Free Max-Min Airtime Fairness in IEEE 802.11 Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Youngsoo Lee

    2016-01-01

    Full Text Available We propose a novel media access control (MAC protocol, referred to as signaling-free max-min airtime fair (SMAF MAC, to improve fairness and channel utilization in ad hoc networks based on IEEE 802.11 wireless local area networks (WLANs. We introduce busy time ratio (BTR as a measure for max-min airtime fairness. Each node estimates its BTR and adjusts the transmission duration by means of frame aggregation and fragmentation, so that it can implicitly announce the BTR to neighbor nodes. Based on the announced BTR, each of the neighbor nodes controls its contention window. In this way, the SMAF MAC works in a distributed manner without the need to know the max-min fair share of airtime, and it does not require exchanging explicit control messages among nodes to attain fairness. Moreover, we successfully incorporate the hidden node detection and resolution mechanisms into the SMAF MAC to deal with the hidden node problem in ad hoc networks. The simulation results confirm that the SMAF MAC enhances airtime fairness without degrading channel utilization, and it effectively resolves several serious problems in ad hoc networks such as the starvation, performance anomaly, and hidden node problems.

  1. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  2. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    Science.gov (United States)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  3. A Spontaneous Ad Hoc Network to Share WWW Access

    Directory of Open Access Journals (Sweden)

    Lloret Jaime

    2010-01-01

    Full Text Available In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.

  4. Clinical Outcomes from Androgen Signaling-directed Therapy after Treatment with Abiraterone Acetate and Prednisone in Patients with Metastatic Castration-resistant Prostate Cancer: Post Hoc Analysis of COU-AA-302.

    Science.gov (United States)

    Smith, Matthew R; Saad, Fred; Rathkopf, Dana E; Mulders, Peter F A; de Bono, Johann S; Small, Eric J; Shore, Neal D; Fizazi, Karim; Kheoh, Thian; Li, Jinhui; De Porre, Peter; Todd, Mary B; Yu, Margaret K; Ryan, Charles J

    2017-07-01

    In the COU-AA-302 trial, abiraterone acetate plus prednisone significantly increased overall survival for patients with chemotherapy-naïve metastatic castration-resistant prostate cancer (mCRPC). Limited information exists regarding response to subsequent androgen signaling-directed therapies following abiraterone acetate plus prednisone in patients with mCRPC. We investigated clinical outcomes associated with subsequent abiraterone acetate plus prednisone (55 patients) and enzalutamide (33 patients) in a post hoc analysis of COU-AA-302. Prostate-specific antigen (PSA) response was assessed. Median time to PSA progression was estimated using the Kaplan-Meier method. The PSA response rate (≥50% PSA decline, unconfirmed) was 44% and 67%, respectively. The median time to PSA progression was 3.9 mo (range 2.6-not estimable) for subsequent abiraterone acetate plus prednisone and 2.8 mo (range 1.8-not estimable) for subsequent enzalutamide. The majority of patients (68%) received intervening chemotherapy before subsequent abiraterone acetate plus prednisone or enzalutamide. While acknowledging the limitations of post hoc analyses and high censoring (>75%) in both treatment groups, these results suggest that subsequent therapy with abiraterone acetate plus prednisone or enzalutamide for patients who progressed on abiraterone acetate is associated with limited clinical benefit. This analysis showed limited clinical benefit for subsequent abiraterone acetate plus prednisone or enzalutamide in patients with metastatic castration-resistant prostate cancer following initial treatment with abiraterone acetate plus prednisone. This analysis does not support prioritization of subsequent abiraterone acetate plus prednisone or enzalutamide following initial therapy with abiraterone acetate plus prednisone. Copyright © 2017 European Association of Urology. Published by Elsevier B.V. All rights reserved.

  5. Ad hoc Sensor Networks to Support Maritime Interdiction Operations

    OpenAIRE

    Osmundson, John; Bordetsky, Alex

    2014-01-01

    Networking sensors, decision centers, and boarding parties supports success in Maritime Interdiction Operations. Led by a team from Naval Post-graduate School (NPS), experiments were conducted in 2012 to test the use of ad-hoc, self-forming communication networks to link sensors, people, and decision centers. The experiments involved international participants and successfully shared valuable biometric and radiological sensor data between boarding parties and decis...

  6. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  7. Intelligent Stale-Frame Discards for Real-Time Video Streaming over Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Sheu Tsang-Ling

    2009-01-01

    Full Text Available Abstract This paper presents intelligent early packet discards (I-EPD for real-time video streaming over a multihop wireless ad hoc network. In a multihop wireless ad hoc network, the quality of transferring real-time video streams could be seriously degraded, since every intermediate node (IN functionally like relay device does not possess large buffer and sufficient bandwidth. Even worse, a selected relay node could leave or power off unexpectedly, which breaks the route to destination. Thus, a stale video frame is useless even if it can reach destination after network traffic becomes smooth or failed route is reconfigured. In the proposed I-EPD, an IN can intelligently determine whether a buffered video packet should be early discarded. For the purpose of validation, we implement the I-EPD on Linux-based embedded systems. Via the comparisons of performance metrics (packet/frame discards ratios, PSNR, etc., we demonstrate that video quality over a wireless ad hoc network can be substantially improved and unnecessary bandwidth wastage is greatly reduced.

  8. Are we drawing the right conclusions from randomised placebo-controlled trials? A post-hoc analysis of data from a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Bone Kerry M

    2009-06-01

    Full Text Available Abstract Background Assumptions underlying placebo controlled trials include that the placebo effect impacts on all study arms equally, and that treatment effects are additional to the placebo effect. However, these assumptions have recently been challenged, and different mechanisms may potentially be operating in the placebo and treatment arms. The objective of the current study was to explore the nature of placebo versus pharmacological effects by comparing predictors of the placebo response with predictors of the treatment response in a randomised, placebo-controlled trial of a phytotherapeutic combination for the treatment of menopausal symptoms. A substantial placebo response was observed but no significant difference in efficacy between the two arms. Methods A post hoc analysis was conducted on data from 93 participants who completed this previously published study. Variables at baseline were investigated as potential predictors of the response on any of the endpoints of flushing, overall menopausal symptoms and depression. Focused tests were conducted using hierarchical linear regression analyses. Based on these findings, analyses were conducted for both groups separately. These findings are discussed in relation to existing literature on placebo effects. Results Distinct differences in predictors were observed between the placebo and active groups. A significant difference was found for study entry anxiety, and Greene Climacteric Scale (GCS scores, on all three endpoints. Attitude to menopause was found to differ significantly between the two groups for GCS scores. Examination of the individual arms found anxiety at study entry to predict placebo response on all three outcome measures individually. In contrast, low anxiety was significantly associated with improvement in the active treatment group. None of the variables found to predict the placebo response was relevant to the treatment arm. Conclusion This study was a post hoc analysis

  9. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  10. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  11. Improvement in 24-hour bronchodilation and symptom control with aclidinium bromide versus tiotropium and placebo in symptomatic patients with COPD: post hoc analysis of a Phase IIIb study

    Directory of Open Access Journals (Sweden)

    Beier J

    2017-06-01

    Full Text Available Jutta Beier,1 Robert Mroz,2,3 Anne-Marie Kirsten,4 Ferran Chuecos,5 Esther Garcia Gil5 1insaf Respiratory Research Institute, Wiesbaden, Germany; 2Centrum Medycyny Oddechowej, 3Medical University of Białystok, Białystok, Poland; 4Pulmonary Research Institute at LungenClinic Grosshansdorf, Airway Research Center North, German Center for Lung Research, Grosshansdorf, Germany; 5AstraZeneca PLC, Barcelona, Spain Background: A previous Phase IIIb study (NCT01462929 in patients with moderate to severe COPD demonstrated that 6 weeks of treatment with aclidinium led to improvements in 24-hour bronchodilation comparable to those with tiotropium, and improvement of symptoms versus placebo. This post hoc analysis was performed to assess the effect of treatment in the symptomatic patient group participating in the study. Methods: Symptomatic patients (defined as those with Evaluating Respiratory Symptoms [E-RS™] in COPD baseline score ≥10 units received aclidinium bromide 400 µg twice daily (BID, tiotropium 18 µg once daily (QD, or placebo, for 6 weeks. Lung function, COPD respiratory symptoms, and incidence of adverse events (AEs were assessed. Results: In all, 277 symptomatic patients were included in this post hoc analysis. Aclidinium and tiotropium treatment improved forced expiratory volume in 1 second (FEV1 from baseline to week 6 at all time points over 24 hours versus placebo. In addition, improvements in FEV1 from baseline during the nighttime period were observed for aclidinium versus tiotropium on day 1 (aclidinium 157 mL, tiotropium 67 mL; P<0.001 and week 6 (aclidinium 153 mL, tiotropium 90 mL; P<0.05. Aclidinium improved trough FEV1 from baseline versus placebo and tiotropium at day 1 (aclidinium 136 mL, tiotropium 68 mL; P<0.05 and week 6 (aclidinium 137 mL, tiotropium 71 mL; P<0.05. Aclidinium also improved early-morning and nighttime symptom severity, limitation of early-morning activities, and E-RS Total and domain scores versus

  12. The accuracy of interpreting key psychiatric terms by ad hoc ...

    African Journals Online (AJOL)

    MacFarlane et al.15 note that a greater number of people have a preference for working with ad hoc interpreters in comparison to professional interpreters ... As part of a larger study, a cross-sectional qualitative interview design was used to ..... obstacle they would face if they would receive training. They had concerns over ...

  13. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  14. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  15. Report of the evaluation by the Ad Hoc Review Committee on Information Technology. In-advance evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Information Technology in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs pertaining to the establishment and utilization of the Information Technology Based Laboratory (ITBL) to be implemented for five years starting in Fiscal Year 2001 at Center for Promotion of Computational Science and Engineering and Department of Environmental Sciences of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from February to March 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on February 9, 2001, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Information Technology. (author)

  16. Report of the evaluation by the Ad Hoc Review Committee on Nuclear Safety Research. Result evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Nuclear Safety Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Department of Reactor Safety Research, Department of Fuel Cycle Safety Research, Department of Environmental Safety Research and Department of Safety Research Technical Support in Tokai Research Establishment at JAERI. The Ad Hoc Review Committee consisted of 11 specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from December 2000 to February 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on December 11, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Nuclear Safety Research. (author)

  17. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  18. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad

    2016-07-01

    Full Text Available The blind flooding of query packets in route discovery more often characterizes the broadcast storm problem, exponentially increases energy consumption of intermediate nodes and congests the entire network. In such a congested network, the task of establishing the path between resources may become very complex and unwieldy. An extensive research work has been done in this area to improve the route discovery phase of routing protocols by reducing broadcast expenses. The purpose of this study is to provide a comparative analysis of existing broadcasting techniques for the route discovery phase, in order to bring about an efficient broadcasting technique for determining the route with minimum conveying nodes in ad-hoc networks. The study is designed to highlight the collective merits and demerits of such broadcasting techniques along with certain conclusions that would contribute to the choice of broadcasting techniques.

  19. Cognitive radio network in vehicular ad-hoc network (VANET: A survey

    Directory of Open Access Journals (Sweden)

    Joanne Mun-Yee Lim

    2016-05-01

    Full Text Available Cognitive radio network and Vehicular Ad hoc Network (VANET are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges and performance metrics, for different cognitive radio VANET applications.

  20. Correctness-by-construction and post-hoc verification : a marriage of convenience?

    NARCIS (Netherlands)

    Watson, B.W.; Kourie, D.G.; Schaefer, I.; Cleophas, L.G.W.A.; Margaria, T.; Steffen, B.

    2016-01-01

    Correctness-by-construction (CbC), traditionally based on weakest precondition semantics, and post-hoc verification (PhV) aspire to ensure functional correctness. We argue for a lightweight approach to CbC where lack of formal rigour increases productivity. In order to mitigate the risk of

  1. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  2. Position-Based Packet Forwarding for Vehicular Ad-Hoc Networks

    OpenAIRE

    Füßler, Holger

    2007-01-01

    Mobile Ad-Hoc Networks, or MANETs, are data communication networks between (potentially) mobile computer systems equipped with wireless communication devices and — in their purest form — in complete absence of communication infrastructure. Usage scenarios for these systems include communication during disaster recovery or battlefield communications. One of the great research challenges concerning MANETs is the Packet Forwarding Problem, i.e., the question to which neighbor node a data packet ...

  3. Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks

    Science.gov (United States)

    Hayajneh, Thaier Saleh

    2009-01-01

    Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…

  4. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  5. Report of the evaluation by the Ad Hoc Review Committee on Materials Science Research. Ex-post evaluation in fiscal year 2003

    International Nuclear Information System (INIS)

    2004-06-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Materials Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D results achieved for five years until Fiscal Year 2002 at Department of Materials Science in Tokai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from October 2003 to February 2004. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on November 14, 2003, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 8, 2004. This report describes the result of the evaluation by the Ad Hoc Review Committee on Materials Science Research. (author)

  6. Report of the evaluation by the Ad Hoc Review Committee on Computational Science and Engineering. Result evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Computational Science and Engineering in accordance with the 'Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Center for Promotion of Computational Science and Engineering of JAERI. The Ad Hoc Review Committee consisted of seven specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from December 2000 to March 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on December 27, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Computational Science and Engineering. (author)

  7. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    Science.gov (United States)

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  8. Structural effects of sprifermin in knee osteoarthritis: a post-hoc analysis on cartilage and non-cartilaginous tissue alterations in a randomized controlled trial.

    Science.gov (United States)

    Roemer, Frank W; Aydemir, Aida; Lohmander, Stefan; Crema, Michel D; Marra, Monica Dias; Muurahainen, Norma; Felson, David T; Eckstein, Felix; Guermazi, Ali

    2016-07-09

    A recent publication on efficacy of Sprifermin for knee osteoarthritis (OA) using quantitatively MRI-defined central medial tibio-femoral compartment cartilage thickness as the structural primary endpoint reported no statistically significant dose response. However, Sprifermin was associated with statistically significant, dose-dependent reductions in loss of total and lateral tibio-femoral cartilage thickness. Based on these preliminary promising data a post-hoc analysis of secondary assessment and endpoints was performed to evaluate potential effects of Sprifermin on semi-quantitatively evaluated structural MRI parameters. Aim of the present analysis was to determine effects of sprifermin on several knee joint tissues over a 12 month period. 1.5 T or 3 T MRIs were acquired at baseline and 12 months follow-up using a standard protocol. MRIs were read according to the Whole-Organ Magnetic Resonance Imaging Score (WORMS) scoring system (in 14 articular subregions) by four muskuloskeletal radiologists independently. Analyses focused on semiquantitative changes in the 100 μg subgroup and matching placebo of multiple MRI-defined structural alterations. Analyses included a delta-subregional and delta-sum approach for the whole knee and the medial and lateral tibio-femoral (MTFJ, LTFJ), and patello-femoral (PFJ) compartments, taking into account number of subregions showing no change, improvement or worsening and changes in the sum of subregional scores. Mann-Whitney - Wilcoxon tests assessed differences between groups. Fifty-seven and 18 patients were included in the treatment and matched placebo subgroups. Less worsening of cartilage damage was observed from baseline to 12 months in the PFJ (0.02, 95 % confidence interval (CI) (-0.04, 0.08) vs. placebo 0.22, 95 % CI (-0.05, 0.49), p = 0.046). For bone marrow lesions (BMLs), more improvement was observed from 6 to 12 months for whole knee analyses (-0.14, 95 % CI (-0.48, 0.19) vs. placebo 0.44, 95

  9. The association of the effect of lithium in the maintenance treatment of bipolar disorder with lithium plasma levels : a post hoc analysis of a double-blind study comparing switching to lithium or placebo in patients who responded to quetiapine (Trial 144)

    NARCIS (Netherlands)

    Nolen, Willem A.; Weisler, Richard H.

    Nolen WA, Weisler RH. The association of the effect of lithium in the maintenance treatment of bipolar disorder with lithium plasma levels: a post hoc analysis of a double-blind study comparing switching to lithium or placebo in patients who responded to quetiapine (Trial 144). Bipolar Disord 2012:

  10. An Ad-Hoc Opportunistic Dissemination Protocol for Smartphone-based Participatory Traffic Monitoring

    NARCIS (Netherlands)

    Türkes, Okan; Seraj, Fatjon; Scholten, Johan; Meratnia, Nirvana; Havinga, Paul J.M.

    2015-01-01

    This study introduces an ad-hoc opportunistic data dissemination protocol, called VADISS, that facilitates participatory traffic monitoring applications with smartphones. As a ubiquitous alternative to existing vehicular networking methods, VADISS uses the default WiFi interfaces universally adopted

  11. Report of the evaluation by the Ad Hoc Review Committee on Nuclear Safety Research. Result evaluation in fiscal year 2000

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Nuclear Safety Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Department of Reactor Safety Research, Department of Fuel Cycle Safety Research, Department of Environmental Safety Research and Department of Safety Research Technical Support in Tokai Research Establishment at JAERI. The Ad Hoc Review Committee consisted of 11 specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from December 2000 to February 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on December 11, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Nuclear Safety Research. (author)

  12. Conflict Management in "Ad Hoc" Problem-Solving Groups: A Preliminary Investigation.

    Science.gov (United States)

    Wallace, Les; Baxter, Leslie

    Full study of small group communication must include consideration of task and socio-emotional dimensions, especially in relation to group problem solving. Thirty small groups were tested for their reactions in various "ad hoc" conflict resolution situations. Instructions to the groups were (1) no problem-solving instructions (control),…

  13. A multi-protocol framework for ad-hoc service discovery

    OpenAIRE

    Flores-Cortes, C.; Blair, Gordon S.; Grace, P.

    2006-01-01

    Discovering the appropriate services in ad-hoc computing environments where a great number of devices and software components collaborate discreetly and provide numerous services is an important challenge. Service discovery protocols make it possible for participating nodes in a network to locate and advertise services with minimum user intervention. However, because it is not possible to predict at design time which protocols will be used to advertise services in a given context/environment,...

  14. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  15. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  16. Post hoc support vector machine learning for impedimetric biosensors based on weak protein-ligand interactions.

    Science.gov (United States)

    Rong, Y; Padron, A V; Hagerty, K J; Nelson, N; Chi, S; Keyhani, N O; Katz, J; Datta, S P A; Gomes, C; McLamore, E S

    2018-04-30

    Impedimetric biosensors for measuring small molecules based on weak/transient interactions between bioreceptors and target analytes are a challenge for detection electronics, particularly in field studies or in the analysis of complex matrices. Protein-ligand binding sensors have enormous potential for biosensing, but achieving accuracy in complex solutions is a major challenge. There is a need for simple post hoc analytical tools that are not computationally expensive, yet provide near real time feedback on data derived from impedance spectra. Here, we show the use of a simple, open source support vector machine learning algorithm for analyzing impedimetric data in lieu of using equivalent circuit analysis. We demonstrate two different protein-based biosensors to show that the tool can be used for various applications. We conclude with a mobile phone-based demonstration focused on the measurement of acetone, an important biomarker related to the onset of diabetic ketoacidosis. In all conditions tested, the open source classifier was capable of performing as well as, or better, than the equivalent circuit analysis for characterizing weak/transient interactions between a model ligand (acetone) and a small chemosensory protein derived from the tsetse fly. In addition, the tool has a low computational requirement, facilitating use for mobile acquisition systems such as mobile phones. The protocol is deployed through Jupyter notebook (an open source computing environment available for mobile phone, tablet or computer use) and the code was written in Python. For each of the applications, we provide step-by-step instructions in English, Spanish, Mandarin and Portuguese to facilitate widespread use. All codes were based on scikit-learn, an open source software machine learning library in the Python language, and were processed in Jupyter notebook, an open-source web application for Python. The tool can easily be integrated with the mobile biosensor equipment for rapid

  17. A Cross Layer Solution to Address TCP Intra-flow Performance Degradation in Multihop Ad hoc Networks

    OpenAIRE

    Rakocevic, V.; Hamadani, E.

    2008-01-01

    Incorporating the concept of TCP end-to-end congestion control for wireless networks is one of the primary concerns in designing ad hoc networks since TCP was primarily designed and optimized based on the assumptions for wired networks. In this study, our interest lies on tackling the TCP instability and in particular intra-flow instability problem since due to the nature of applications in multihop ad hoc networks, connection instability or starvation even for a short period of time can have...

  18. Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks

    National Research Council Canada - National Science Library

    Jetcheva, Jorjeta G

    2004-01-01

    ...) nodes that wish to communicate. Each node in the ad hoc network acts as a router and forwards packets on behalf of other nodes, allowing nodes that are not within wireless range of each other to communicate over multi-hop paths...

  19. Report of the evaluation by the Ad Hoc Review Committee on Materials Science Research. In-advance evaluation in fiscal year 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Materials Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs to be implemented for five years starting in Fiscal Year 2003 at Department of Materials Science in Tokai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from April 2002 to August 2002. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 5th, 2002, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on August 5th, 2002. This report describes the result of the evaluation by the Ad Hoc Review Committee on Materials Science Research. (author)

  20. Report of the evaluation by the Ad Hoc Review Committee on Materials Science Research. In-advance evaluation in fiscal year 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Materials Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs to be implemented for five years starting in Fiscal Year 2003 at Department of Materials Science in Tokai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from April 2002 to August 2002. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 5th, 2002, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on August 5th, 2002. This report describes the result of the evaluation by the Ad Hoc Review Committee on Materials Science Research. (author)

  1. Report of the evaluation by the ad hoc review committee on radiation application research. In-advance evaluation in fiscal year 2001

    International Nuclear Information System (INIS)

    2001-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Radiation Application Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs to be implemented for five years starting in Fiscal Year 2002 at Department of Material Development, at Department of Ion-Beam-Applied Biology and at Advanced Radiation Technology Center in Takasaki Radiation Chemistry Research Establishment of JAERI. The Ad Hoc Review Committee consisted of ten specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from May to July 2001. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 25, 2001, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on July 12, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Radiation Application Research. (author)

  2. Sistem Verifikasi Tanda Tangan Off-Line Berdasar Ciri Histogram Of Oriented Gradient (HOG Dan Histogram Of Curvature (HoC

    Directory of Open Access Journals (Sweden)

    Agus Wahyu Widodo

    2015-08-01

    Full Text Available Abstrak Tanda tangan dengan sifat uniknya merupakan salah satu dari sekian banyak atribut personal yang diterima secara luas untuk verifikasi indentitas seseorang, alat pembuktian kepemilikan berbagai transaksi atau dokumen di dalam masyarakat. Keberhasilan penggunaan ciri gradien dan curvature dalam bidang-bidang penelitian pengenalan pola dan bahwa tanda tangan dapat dikatakan merupakan hasil tulisan tangan yang tersusun atas beragam garis dan lengkungan (curve yang memiliki arah atau orientasi merupakan alasan bahwa kedua ciri tersebut digunakan sebagai metoda verifikasi tanda tangan offline di penelitian ini. Berbagai implementasi dari pre-processing, ekstraksi dan representasi ciri, dan pembelajaran SVM serta usaha perbaikan yang telah dilakukan dalam penelitian ini menunjukkan hasil bahwa ciri HOG dan HoC mampu dimanfaatkan dalam proses verifikasi tanda tangan secara offline.  Pada basis data GPDS960Signature, HOG dan HoC yang dihitung pada ukuran sel 30 x 30 piksel memberikan dengan nilai %FRR terbaik 26,90 dan %FAR 37,56.  Sedangkan pada basis data FUM-PHSDB, HOG dn HoC yang dihitung pada ukuran 60 x 60 piksel memberikan nilai %FRR terbaik 4 dan %FAR 57. Kata kunci: verifikasi tanda tangan, curvature, orientation, gradient, histogram of curvature (HoC, histogram of oriented gradient (HOG Abstract Signature with unique properties is one of the many personal attributes that are widely accepted to verify a person's identity, proof of ownership transactions instrument or document in the community. The successful use of gradient and curvature feature in the research fields of pattern recognition is the reason that both of these features are used as an offline signature verification method in this study. Various implementations of preprocessing, feature extraction and representation, and SVM learning has been done in the study showed results that HOG and HoC feature can be utilized in the process of offline signature verification.  HOG and

  3. Using Social Media Sentiment Analysis to Understand Audiences

    DEFF Research Database (Denmark)

    McGuire, Mark; Kampf, Constance Elizabeth

    2015-01-01

    approach for contextually understanding social media posts. The human interaction step in ad-hoc corpus analysis is central to this methodology as it provides a means to ask critical questions of the content curated through the ad-hoc corpus directly. Results of ad-hoc corpus analysis from this critical......Social media communication is changing the opportunities for technical communicators to really understand audiences when these audiences are active about issues on social media platforms. Through applying ad-hoc corpus building processes to create word lists relevant to specific organizational...... projects, technical communicators can listen to their external users and identify areas of importance with greater accuracy. While other methods of sentiment analysis look for a solution that leads to artificial intelligence in the program, this paper identifies the present needs of a human interaction...

  4. Protective effect of yerba mate intake on the cardiovascular system: a post hoc analysis study in postmenopausal women.

    Science.gov (United States)

    da Veiga, D T A; Bringhenti, R; Copes, R; Tatsch, E; Moresco, R N; Comim, F V; Premaor, M O

    2018-01-01

    The prevalence of cardiovascular and metabolic diseases is increased in postmenopausal women, which contributes to the burden of illnesses in this period of life. Yerba mate (Ilex paraguariensis) is a native bush from Southern South America. Its leaves are rich in phenolic components, which may have antioxidant, vasodilating, hypocholesterolemic, and hypoglycemic proprieties. This post hoc analysis of the case-control study nested in the Obesity and Bone Fracture Cohort evaluated the consumption of yerba mate and the prevalence of hypertension, dyslipidemia, and coronary diseases in postmenopausal women. Ninety-five postmenopausal women were included in this analysis. A questionnaire was applied to evaluate the risk factors and diagnosis of cardiovascular diseases and consumption of yerba mate infusion. Student's t-test and chi-square test were used to assess significant differences between groups. The group that consumed more than 1 L/day of mate infusion had significantly fewer diagnoses of coronary disease, dyslipidemia, and hypertension (P<0.049, P<0.048, and P<0.016, respectively). Furthermore, the serum levels of glucose were lower in the group with a higher consumption of yerba mate infusion (P<0.013). The serum levels of total cholesterol, LDL-cholesterol, HDL-cholesterol, and triglycerides were similar between the groups. This pragmatic study points out the benefits of yerba mate consumption for the cardiovascular and metabolic systems. The ingestion of more than 1 L/day of mate infusion was associated with fewer self-reported cardiovascular diseases and lower serum levels of glucose. Longitudinal studies are needed to evaluate the association between yerba mate infusion and reduction of cardiovascular diseases in postmenopausal women.

  5. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  6. Design of free patterns of nanocrystals with ad hoc features via templated dewetting

    Energy Technology Data Exchange (ETDEWEB)

    Aouassa, M.; Berbezier, I.; Favre, L.; Ronda, A. [IM2NP, CNRS, AMU, Marseille (France); Bollani, M.; Sordan, R. [LNES, Como (Italy); Delobbe, A.; Sudraud, P. [Orsay Physics, Fuveau (France)

    2012-07-02

    Design of monodisperse ultra-small nanocrystals (NCs) into large scale patterns with ad hoc features is demonstrated. The process makes use of solid state dewetting of a thin film templated through alloy liquid metal ion source focused ion beam (LMIS-FIB) nanopatterning. The solid state dewetting initiated at the edges of the patterns controllably creates the ordering of NCs with ad hoc placement and periodicity. The NC size is tuned by varying the nominal thickness of the film while their position results from the association of film retraction from the edges of the lay out and Rayleigh-like instability. The use of ultra-high resolution LMIS-FIB enables to produce monocrystalline NCs with size, periodicity, and placement tunable as well. It provides routes for the free design of nanostructures for generic applications in nanoelectronics.

  7. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  8. The impact of brief team communication, leadership and team behavior training on ad hoc team performance in trauma care settings.

    Science.gov (United States)

    Roberts, Nicole K; Williams, Reed G; Schwind, Cathy J; Sutyak, John A; McDowell, Christopher; Griffen, David; Wall, Jarrod; Sanfey, Hilary; Chestnut, Audra; Meier, Andreas H; Wohltmann, Christopher; Clark, Ted R; Wetter, Nathan

    2014-02-01

    Communication breakdowns and care coordination problems often cause preventable adverse patient care events, which can be especially acute in the trauma setting, in which ad hoc teams have little time for advanced planning. Existing teamwork curricula do not address the particular issues associated with ad hoc emergency teams providing trauma care. Ad hoc trauma teams completed a preinstruction simulated trauma encounter and were provided with instruction on appropriate team behaviors and team communication. Teams completed a postinstruction simulated trauma encounter immediately afterward and 3 weeks later, then completed a questionnaire. Blinded raters rated videotapes of the simulations. Participants expressed high levels of satisfaction and intent to change practice after the intervention. Participants changed teamwork and communication behavior on the posttest, and changes were sustained after a 3-week interval, though there was some loss of retention. Brief training exercises can change teamwork and communication behaviors on ad hoc trauma teams. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. Report of the Ad Hoc Committee on SSC physics

    International Nuclear Information System (INIS)

    1990-04-01

    The Ad Hoc Committee on SSC Physics has reexamined the relationship between beam energy, machine luminosity, and physics capability. In the next section, the physics motivation for the SSC is reviewed in general terms. This is followed by a discussion of the ability to detect a number of specific processes as a function of the SSC energy and luminosity. The viability of various detector technologies is then assessed as a function of luminosity. The report ends with a brief summary and some conclusions

  10. Report of the evaluation by the Ad Hoc Review Committee on High-Temperature Engineering and Research. Result evaluation in fiscal year 2000

    International Nuclear Information System (INIS)

    2001-06-01

    The Research Evaluation Committee, which consisted of 14 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on High-Temperature Engineering and Research in accordance with the 'Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the R and D accomplishments achieved for five years from Fiscal Year 1995 to Fiscal Year 1999 at Department of HTTR Project and Department of Advanced Nuclear Heat Technology in Oarai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of nine specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from December 2000 to February 2001. The evaluation was performed on the basis of the materials submitted in advanced and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on December 8, 2000, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on March 16, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on High-Temperature Engineering and Research. (author)

  11. Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities

    NARCIS (Netherlands)

    Sloep, Peter; Kester, Liesbeth; Brouns, Francis; Van Rosmalen, Peter; De Vries, Fred; De Croock, Marcel; Koper, Rob

    2007-01-01

    Sloep, P.B., Kester, L., Brouns, F., Van Rosmalen, P., De Vries, F., De Croock, M., Koper, R. (2007). Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities. Presentation given at the Sixth IASTED International Conference on Web-based Education, 14-16 March,

  12. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  13. On knowledge transfer management as a learning process for ad hoc teams

    Science.gov (United States)

    Iliescu, D.

    2017-08-01

    Knowledge management represents an emerging domain becoming more and more important. Concepts like knowledge codification and personalisation, knowledge life-cycle, social and technological dimensions, knowledge transfer and learning management are integral parts. Focus goes here in the process of knowledge transfer for the case of ad hoc teams. The social dimension of knowledge transfer plays an important role. No single individual actors involved in the process, but a collective one, representing the organisation. It is critically important for knowledge to be managed from the life-cycle point of view. A complex communication network needs to be in place to supports the process of knowledge transfer. Two particular concepts, the bridge tie and transactive memory, would eventually enhance the communication. The paper focuses on an informational communication platform supporting the collaborative work on knowledge transfer. The platform facilitates the creation of a topic language to be used in knowledge modelling, storage and reuse, by the ad hoc teams.

  14. Perioperative hyperoxia - Long-term impact on cardiovascular complications after abdominal surgery, a post hoc analysis of the PROXI trial

    DEFF Research Database (Denmark)

    Fonnes, Siv; Gogenur, Ismail; Sondergaard, Edith Smed

    2016-01-01

    BACKGROUND: Increased long-term mortality was found in patients exposed to perioperative hyperoxia in the PROXI trial, where patients undergoing laparotomy were randomised to 80% versus 30% oxygen during and after surgery. This post hoc follow-up study assessed the impact of perioperative hyperoxia...... included myocardial infarction, other heart disease, and acute coronary syndrome or death. Data were analysed in the Cox proportional hazards model. RESULTS: The primary outcome, acute coronary syndrome, occurred in 2.5% versus 1.3% in the 80% versus 30% oxygen group; HR 2.15 (95% CI 0.96-4.84). Patients...

  15. Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities

    NARCIS (Netherlands)

    Sloep, Peter; Kester, Liesbeth; Brouns, Francis; Van Rosmalen, Peter; De Vries, Fred; De Croock, Marcel; Koper, Rob

    2007-01-01

    Sloep, P.B., Kester, L. Brouns, F., Van Rosmalen, P., De Vries, F., De Croock, M., Koper, R. (2007) Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities. In V. Uskov (Ed.) The Sixth IASTED International Conference on Web-based Education WBE 2007, March 14-16,

  16. Model-based prototyping of an interoperability protocol for mobile ad-hoc networks

    NARCIS (Netherlands)

    Kristensen, L.M.; Westergaard, M.; Norgaard, P.C.; Romijn, J.; Smith, G.; Pol, van de J.

    2005-01-01

    We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for the specification of an interoperability protocol for routing packets between fixed core networks and mobile ad-hoc networks. The

  17. Energy-aware architecture for multi-rate ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Yahya

    2010-06-01

    Full Text Available The backbone of ad hoc network design is energy performance and bandwidth resources limitations. Multi-rate adaptation architectures have been proposed to reduce the control overhead and to increase bandwidth utilization efficiency. In this paper, we propose a multi-rate protocol to provide the highest network performance under very low control overhead. The efficiency of the proposed auto multi-rate protocol is validated extensive simulations using QualNet network simulator. The simulation results demonstrate that our solution significantly improves the overall network performance.

  18. Adjusting Sensing Range to Maximize Throughput on Ad-Hoc Multi-Hop Wireless Networks

    National Research Council Canada - National Science Library

    Roberts, Christopher

    2003-01-01

    .... Such a network is referred to as a multi-hop ad-hoc network, or simply a multi-hop network. Most multi-hop network protocols use some form of carrier sensing to determine if the wireless channel is in use...

  19. Energy-Aware Broadcasting and Multicasting in Wireless Ad Hoc Networks: A Cross-Layering Approach

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2004-01-01

    ...) problems, especially when energy-aware operation is required. To address the specific problem of energy-aware tree construction in wireless ad hoc networks, we have developed the Broadcast Incremental Power (BIP...

  20. Built-In Device Orientation Sensors for Ad-Hoc Pairing and Spatial Awareness

    DEFF Research Database (Denmark)

    Grønbæk, Jens Emil; O'Hara, Kenton

    Mobile devices are equipped with multiple sensors. The ubiquity of these sensors is key in their ability to support in-the-wild application and use. Building on the ubiquity we look at how we can use this existing sensing infrastructure combined with user mediation to support ad-hoc sharing with ...

  1. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  2. Improving the Usability of OCL as an Ad-hoc Model Querying Language

    DEFF Research Database (Denmark)

    Störrle, Harald

    2013-01-01

    from our research and make it accessible to the OCL community, we propose the OCL Query API (OQAPI), a library of query-predicates to improve the user-friendliness of OCL for ad-hoc querying. The usability of OQAPI is studied using controlled experiments. We nd considerable evidence to support our...

  3. Tiotropium and Salmeterol in COPD Patients at Risk of Exacerbations: A Post Hoc Analysis from POET-COPD(®).

    Science.gov (United States)

    Vogelmeier, Claus F; Asijee, Guus M; Kupas, Katrin; Beeh, Kai M

    2015-06-01

    Among patients with chronic obstructive pulmonary disease (COPD), the frequency and severity of past exacerbations potentiates future events. The impact of current therapies on exacerbation frequency and severity in patients with different exacerbation risks is not well known. A post hoc analysis of patients at low (≤1 exacerbation [oral steroids/antibiotics requirement] and no COPD-related hospitalization in the year preceding trial entry) or high (≥2 exacerbations [oral steroids/antibiotics requirement] or ≥1 COPD-related hospitalization[s] in the year preceding trial entry) exacerbation risk, from the Prevention of Exacerbations with Tiotropium in Chronic Obstructive Pulmonary Disease (POET-COPD(®)) database. Compared with salmeterol, tiotropium significantly increased time to first COPD exacerbation (hazard ratio 0.84; 95% confidence interval [CI] 0.76-0.92; p = 0.0002) and reduced the number of COPD exacerbations (rate ratio 0.90; 95% CI 0.81-0.99; p = 0.0383) in patients at high exacerbation risk. With treatment, the risk of remaining in the high-risk exacerbator subgroup was statistically lower with tiotropium versus salmeterol (risk ratio [RR] 0.89; 95% CI 0.80-1.00; p = 0.0478). For low-risk patients, time to first COPD exacerbation and number of COPD exacerbations were numerically lower with tiotropium versus salmeterol. With treatment, the risk of transitioning from a low to a high exacerbation risk was lower with tiotropium versus salmeterol (RR 0.87; 95% CI 0.71-1.07; p = 0.1968). This analysis confirms the higher efficacy of tiotropium versus salmeterol in prolonging time to first COPD exacerbation and reducing number of exacerbations in patients both at low and high exacerbation risk. Boehringer Ingelheim and Pfizer. ClinicalTrials.gov NCT00563381.

  4. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  5. RAILWAY INFRASTRUCTURE CAPACITY MANAGEMENT FOR AD-HOC TRAINS ON THE SŽDC NETWORK

    Directory of Open Access Journals (Sweden)

    Petr Nachtigall

    2016-09-01

    Full Text Available The paper describes basic principles of ad-hoc routes assignment. Each carrier has its own interface called information system KADR with SŽDC for capacity requests management. The paper describes all steps which must be done before train departure.

  6. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Directory of Open Access Journals (Sweden)

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  7. Selective epidemic broadcast algorithm to suppress broadcast storm in vehicular ad hoc networks

    Directory of Open Access Journals (Sweden)

    M. Chitra

    2018-03-01

    Full Text Available Broadcasting in Vehicular Ad Hoc Networks is the best way to spread emergency messages all over the network. With the dynamic nature of vehicular ad hoc networks, simple broadcast or flooding faces the problem called as Broadcast Storm Problem (BSP. The issue of the BSP will degrade the performance of a message broadcasting process like increased overhead, collision and dissemination delay. The paper is motivated to solve the problems in the existing Broadcast Strom Suppression Algorithms (BSSAs like p-Persistence, TLO, VSPB, G-SAB and SIR. This paper proposes to suppress the Broadcast Storm Problem and to improve the Emergency Safety message dissemination rate through a new BSSA based on Selective Epidemic Broadcast Algorithm (SEB. The simulation results clearly show that the SEB outperforms the existing algorithms in terms of ESM Delivery Ratio, Message Overhead, Collision Ratio, Broadcast Storm Ratio and Redundant Rebroadcast Ratio with decreased Dissemination Delay.

  8. Post-hoc analysis of MCI186-17, the extension study to MCI186-16, the confirmatory double-blind, parallel-group, placebo-controlled study of edaravone in amyotrophic lateral sclerosis.

    Science.gov (United States)

    Takahashi, Fumihiro; Takei, Koji; Tsuda, Kikumi; Palumbo, Joseph

    2017-10-01

    In the 24-week double-blind study of edaravone in ALS (MCI186-16), edaravone did not show a statistically significant difference versus placebo for the primary efficacy endpoint. For post-hoc analyses, two subpopulations were identified in which edaravone might be expected to show efficacy: the efficacy-expected subpopulation (EESP), defined by scores of ≥2 points on all 12 items of the ALS Functional Rating Scale-Revised (ALSFRS-R) and a percent predicted forced vital capacity (%FVC) ≥80% at baseline; and the definite/probable EESP 2 years (dpEESP2y) subpopulation which, in addition to EESP criteria, had definite or probable ALS diagnosed by El Escorial revised criteria, and disease duration of ≤2 years. In the 36-week extension study of MCI186-16, a 24-week double-blind comparison followed by 12 weeks of open-label edaravone (MCI186-17; NCT00424463), analyses of ALSFRS-R scores of the edaravone-edaravone group and edaravone-placebo group for the full analysis set (FAS) and EESP, as prospectively defined, were reported in a previous article. Here we additionally report results in patients who met dpEESP2y criteria at the baseline of MCI186-16. In the dpEESP2y, the difference in ALSFRS-R changes from 24 to 48 weeks between the edaravone-edaravone and edaravone-placebo groups was 2.79 (p = 0.0719), which was greater than the differences previously reported for the EESP and the FAS. The pattern of adverse events in the dpEESP2y did not show any additional safety findings to those from the earlier prospective study. In conclusion, this post-hoc analysis suggests a potential effect of edaravone between 24 and 48 weeks in patients meeting dpEESP2y criteria at baseline.

  9. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Science.gov (United States)

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  10. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Xin Yang

    Full Text Available Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  11. A game-theoretic approach to optimize ad hoc networks inspired by small-world network topology

    Science.gov (United States)

    Tan, Mian; Yang, Tinghong; Chen, Xing; Yang, Gang; Zhu, Guoqing; Holme, Petter; Zhao, Jing

    2018-03-01

    Nodes in ad hoc networks are connected in a self-organized manner. Limited communication radius makes information transmit in multi-hop mode, and each forwarding needs to consume the energy of nodes. Insufficient communication radius or exhaustion of energy may cause the absence of some relay nodes and links, further breaking network connectivity. On the other hand, nodes in the network may refuse to cooperate due to objective faulty or personal selfish, hindering regular communication in the network. This paper proposes a model called Repeated Game in Small World Networks (RGSWN). In this model, we first construct ad hoc networks with small-world feature by forming "communication shortcuts" between multiple-radio nodes. Small characteristic path length reduces average forwarding times in networks; meanwhile high clustering coefficient enhances network robustness. Such networks still maintain relative low global power consumption, which is beneficial to extend the network survival time. Then we use MTTFT strategy (Mend-Tolerance Tit-for-Tat) for repeated game as a rule for the interactions between neighbors in the small-world networks. Compared with other five strategies of repeated game, this strategy not only punishes the nodes' selfishness more reasonably, but also has the best tolerance to the network failure. This work is insightful for designing an efficient and robust ad hoc network.

  12. Accurate 3D Localization Method for Public Safety Applications in Vehicular Ad-hoc Networks

    KAUST Repository

    Ansari, Abdul Rahim; Saeed, Nasir; Haq, Mian Imtiaz Ul; Cho, Sunghyun

    2018-01-01

    Vehicular ad hoc networks (VANETs) represent a very promising research area because of their ever increasing demand, especially for public safety applications. In VANETs vehicles communicate with each other to exchange road maps and traffic

  13. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model....... The predictive accuracy of the model is monitored and used to update the model dynamically. The results indicate the framework may be useful for the optimization of dynamic systems of high dimension....

  14. Risk reductions for cardiovascular disease with pravastatin treatment by dyslipidemia phenotype: a post hoc analysis of the MEGA Study.

    Science.gov (United States)

    Nishiwaki, Masato; Ikewaki, Katsunori; Ayaori, Makoto; Mizuno, Kyoichi; Ohashi, Yasuo; Ohsuzu, Fumitaka; Ishikawa, Toshitsugu; Nakamura, Haruo

    2013-03-01

    The beneficial effect of statins for cardiovascular disease (CVD) prevention has been well established. However, the effectiveness among different phenotypes of dyslipidemia has not been confirmed. We evaluated the effect of pravastatin on the incidence of CVD in relation to the phenotype of dyslipidemia. The MEGA Study evaluated the effect of low-dose pravastatin on primary prevention of CVD in 7832 Japanese patients, who were randomized to diet alone or diet plus pravastatin and followed for more than 5 years. These patients were classified into phenotype IIa (n=5589) and IIb (n=2041) based on the electrophoretic pattern for this post hoc analysis. In the diet group there was no significant difference in the incidence of coronary heart disease (CHD), stroke, CVD, and total mortality between the two phenotypes. Phenotype IIb patients, compared to phenotype IIa, had lower levels of high-density lipoprotein cholesterol (HDL-C) and a significantly higher incidence of CVD in relation to a low HDL-C level (dyslipidemia. Significant risk reductions were observed for CHD by 38% (p=0.04) and CVD by 31% (p=0.02) in type IIa dyslipidemia but not in phenotype IIb. Pravastatin therapy provided significant risk reductions for CHD and CVD in patients with phenotype IIa dyslipidemia, but not in those with phenotype IIb dyslipidemia. Copyright © 2012 Japanese College of Cardiology. Published by Elsevier Ltd. All rights reserved.

  15. Does the effect of one-day simulation team training in obstetric emergencies decline within one year? A post-hoc analysis of a multicentre cluster randomised controlled trial.

    Science.gov (United States)

    van de Ven, J; Fransen, A F; Schuit, E; van Runnard Heimel, P J; Mol, B W; Oei, S G

    2017-09-01

    Does the effect of one-day simulation team training in obstetric emergencies decline within one year? A post-hoc analysis of a multicentre cluster randomised controlled trial. J van de Ven, AF Fransen, E Schuit, PJ van Runnard Heimel, BW Mol, SG Oei OBJECTIVE: To investigate whether the effect of a one-day simulation-based obstetric team training on patient outcome changes over time. Post-hoc analysis of a multicentre, open, randomised controlled trial that evaluated team training in obstetrics (TOSTI study).We studied women with a singleton pregnancy beyond 24 weeks of gestation in 24 obstetric units. Included obstetric units were randomised to either a one-day, multi-professional simulation-based team training focusing on crew resource management in a medical simulation centre (12 units) or to no team training (12 units). We assessed whether outcomes differed between both groups in each of the first four quarters following the team training and compared the effect of team training over quarters. Primary outcome was a composite outcome of low Apgar score, severe postpartum haemorrhage, trauma due to shoulder dystocia, eclampsia and hypoxic-ischemic encephalopathy. During a one year period after the team training the rate of obstetric complications, both on the composite level and the individual component level, did not differ between any of the quarters. For trauma due to shoulder dystocia team training led to a significant decrease in the first quarter (0.06% versus 0.26%, OR 0.19, 95% CI 0.03 to 0.98) but in the subsequent quarters no significant reductions were observed. Similar results were found for invasive treatment for severe postpartum haemorrhage where a significant increase was only seen in the first quarter (0.4% versus 0.03%, OR 19, 95% CI 2.5-147), and not thereafter. The beneficial effect of a one-day, simulation-based, multiprofessional, obstetric team training seems to decline after three months. If team training is further evaluated or

  16. Fault Tolerant Mechanism for Multimedia Flows in Wireless Ad Hoc Networks Based on Fast Switching Paths

    Directory of Open Access Journals (Sweden)

    Juan R. Diaz

    2014-01-01

    Full Text Available Multimedia traffic can be forwarded through a wireless ad hoc network using the available resources of the nodes. Several models and protocols have been designed in order to organize and arrange the nodes to improve transmissions along the network. We use a cluster-based framework, called MWAHCA architecture, which optimizes multimedia transmissions over a wireless ad hoc network. It was proposed by us in a previous research work. This architecture is focused on decreasing quality of service (QoS parameters like latency, jitter, and packet loss, but other network features were not developed, like load balance or fault tolerance. In this paper, we propose a new fault tolerance mechanism, using as a base the MWAHCA architecture, in order to recover any multimedia flow crossing the wireless ad hoc network when there is a node failure. The algorithm can run independently for each multimedia flow. The main objective is to keep the QoS parameters as low as possible. To achieve this goal, the convergence time must be controlled and reduced. This paper provides the designed protocol, the analytical model of the algorithm, and a software application developed to test its performance in a real laboratory.

  17. Report of the independent Ad Hoc Group for the Davis-Besse incident

    International Nuclear Information System (INIS)

    1986-06-01

    The Nuclear Regulatory Commission established an independent Ad Hoc Group in January 1986 to review issues subsequent to a complete loss of feedwater event at Davis-Besse Nuclear Power Station on June 9, 1985, including the NRC Incident Investigation Team (IIT) investigation of that event. The Commission asked the Group to identify additional lessons that might be learned and from these to make recommendations to improve NRC oversight of reactor licensees. To fulfill its charter, the Ad Hoc Group examined the following: (1) pre-event interactions between the licensee and NRC concerning reliability of the auxiliary feedwater system and associated systems; (2) pre-event probabilistic assessments of the reliability of plant safety systems, NRC's review of them, and their use in regulatory decisionmaking; (3) licensee management, operation and maintenance programs as they may have contributed to equipment failures and NRC oversight of such programs; and (4) the mandate, capabilities of members, operation, and results of the NRC Davis-Besse IIT, and the use to which its report was put by the regulatory staff

  18. Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities

    OpenAIRE

    Sloep, Peter; Kester, Liesbeth; Brouns, Francis; Van Rosmalen, Peter; De Vries, Fred; De Croock, Marcel; Koper, Rob

    2007-01-01

    Sloep, P.B., Kester, L. Brouns, F., Van Rosmalen, P., De Vries, F., De Croock, M., Koper, R. (2007) Ad Hoc Transient Communities to Enhance Social Interaction and Spread Tutor Responsibilities. In V. Uskov (Ed.) The Sixth IASTED International Conference on Web-based Education WBE 2007, March 14-16, Chamonix, France (pp. 549-554). Calgary, Canada: Acta Press.

  19. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    International Nuclear Information System (INIS)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-01-01

    We present an ad-hoc 'nearby' storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  20. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  1. Forming an ad-hoc nearby storage, based on IKAROS and social networking services

    Science.gov (United States)

    Filippidis, Christos; Cotronis, Yiannis; Markou, Christos

    2014-06-01

    We present an ad-hoc "nearby" storage, based on IKAROS and social networking services, such as Facebook. By design, IKAROS is capable to increase or decrease the number of nodes of the I/O system instance on the fly, without bringing everything down or losing data. IKAROS is capable to decide the file partition distribution schema, by taking on account requests from the user or an application, as well as a domain or a Virtual Organization policy. In this way, it is possible to form multiple instances of smaller capacity higher bandwidth storage utilities capable to respond in an ad-hoc manner. This approach, focusing on flexibility, can scale both up and down and so can provide more cost effective infrastructures for both large scale and smaller size systems. A set of experiments is performed comparing IKAROS with PVFS2 by using multiple clients requests under HPC IOR benchmark and MPICH2.

  2. The effect of DAD timeout period on address autoconfiguration in wireless ad-hoc networks

    CSIR Research Space (South Africa)

    Mutanga, MB

    2011-09-01

    Full Text Available Lack of manual management mechanisms in wireless ad-hoc networks means that automatic configuration of IP addresses and other related network parameters are very crucial. Many IP address autoconfiguration mechanisms have been proposed in literature...

  3. Clinical Factors Associated with Dose of Loop Diuretics After Pediatric Cardiac Surgery: Post Hoc Analysis.

    Science.gov (United States)

    Haiberger, Roberta; Favia, Isabella; Romagnoli, Stefano; Cogo, Paola; Ricci, Zaccaria

    2016-06-01

    A post hoc analysis of a randomized controlled trial comparing the clinical effects of furosemide and ethacrynic acid was conducted. Infants undergoing cardiac surgery with cardiopulmonary bypass were included in order to explore which clinical factors are associated with diuretic dose in infants with congenital heart disease. Overall, 67 patients with median (interquartile range) age of 48 (13-139) days were enrolled. Median diuretic dose was 0.34 (0.25-0.4) mg/kg/h at the end of postoperative day (POD) 0 and it significantly decreased (p = 0.04) over the following PODs; during this period, the ratio between urine output and diuretic dose increased significantly (p = 0.04). Age (r -0.26, p = 0.02), weight (r -0.28, p = 0.01), cross-clamp time (r 0.27, p = 0.03), administration of ethacrynic acid (OR 0.01, p = 0.03), and, at the end of POD0, creatinine levels (r 0.3, p = 0.009), renal near-infrared spectroscopy saturation (-0.44, p = 0.008), whole-blood neutrophil gelatinase-associated lipocalin levels (r 0.30, p = 0.01), pH (r -0.26, p = 0.02), urinary volume (r -0.2755, p = 0.03), and fluid balance (r 0.2577, p = 0.0266) showed a significant association with diuretic dose. At multivariable logistic regression cross-clamp time (OR 1.007, p = 0.04), use of ethacrynic acid (OR 0.2, p = 0.01) and blood pH at the end of POD0 (OR 0.0001, p = 0.03) was independently associated with diuretic dose. Early resistance to loop diuretics continuous infusion is evident in post-cardiac surgery infants: Higher doses are administered to patients with lower urinary output. Independently associated variables with diuretic dose in our population appeared to be cross-clamping time, the administration of ethacrynic acid, and blood pH.

  4. An Economic Framework for Resource Allocation in Ad-hoc Grids

    OpenAIRE

    Pourebrahimi, B.

    2009-01-01

    In this dissertation, we present an economic framework to study and develop different market-based mechanisms for resource allocation in an ad-hoc Grid. Such an economic framework helps to understand the impact of certain choices and explores what are the suitable mechanisms from Grid user/owner perspectives under given circumstances. We focus on resource allocation in a Grid-based environment in the case where some resources are lying idle and could be linked with overloaded nodes in a netwo...

  5. Report of the evaluation by the ad hoc review committee on advanced photon and synchrotron radiation research. In-advance evaluation in fiscal year 2001

    International Nuclear Information System (INIS)

    2001-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Advanced Photon and Synchrotron Radiation Research in accordance with the 'Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the adequacy of the R and D programs to be implemented for five years starting in Fiscal Year 2002 at Advanced Photon Research Center and at Synchrotron Radiation Research Center in Kansai Research Establishment of JAERI. The Ad Hoc Review Committee consisted of ten specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from May to July 2001. The evaluation was performed on the basis of the materials submitted in advanced and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 21, 2001, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on July 12, 2001. This report describes the result of the evaluation by the Ad Hoc Review Committee on Advanced Photon and Synchrotron Radiation Research. (author)

  6. Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach

    OpenAIRE

    Gavalas, Damianos; Pantziou, Grammati; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this work, we introduce an efficient distributed clustering algorithm that uses both location and energy metrics for cluster formation. Our proposed solution mainly addresses cluster stability, manageability and energy efficiency i...

  7. Throughput Capacity of Ad Hoc Networks with Route Discovery

    Directory of Open Access Journals (Sweden)

    Blum Rick S

    2007-01-01

    Full Text Available Throughput capacity of large ad hoc networks has been shown to scale adversely with the size of network . However the need for the nodes to find or repair routes has not been analyzed in this context. In this paper, we explicitly take route discovery into account and obtain the scaling law for the throughput capacity under general assumptions on the network environment, node behavior, and the quality of route discovery algorithms. We also discuss a number of possible scenarios and show that the need for route discovery may change the scaling for the throughput capacity.

  8. Post hoc analysis of plasma amino acid profiles: towards a specific pattern in autism spectrum disorder and intellectual disability.

    Science.gov (United States)

    Delaye, Jean-Baptiste; Patin, Franck; Lagrue, Emmanuelle; Le Tilly, Olivier; Bruno, Clement; Vuillaume, Marie-Laure; Raynaud, Martine; Benz-De Bretagne, Isabelle; Laumonnier, Frederic; Vourc'h, Patrick; Andres, Christian; Blasco, Helene

    2018-01-01

    Objectives Autism spectrum disorders and intellectual disability present a challenge for therapeutic and dietary management. We performed a re-analysis of plasma amino acid chromatography of children with autism spectrum disorders ( n = 22) or intellectual disability ( n = 29) to search for a metabolic signature that can distinguish individuals with these disorders from controls ( n = 30). Methods We performed univariate and multivariate analyses using different machine learning strategies, from the raw data of the amino acid chromatography. Finally, we analysed the metabolic pathways associated with discriminant biomarkers. Results Multivariate analysis revealed models to discriminate patients with autism spectrum disorders or intellectual disability and controls from plasma amino acid profiles ( P intellectual disability patients shared similar differences relative to controls, including lower glutamate ( P intellectual disability revealed the involvement of urea, 3-methyl-histidine and histidine metabolism. Biosigner analysis and univariate analysis confirmed the role of 3-methylhistidine ( P = 0.004), histidine ( P = 0.003), urea ( P = 0.0006) and lysine ( P = 0.002). Conclusions We revealed discriminant metabolic patterns between autism spectrum disorders, intellectual disability and controls. Amino acids known to play a role in neurotransmission were discriminant in the models comparing autism spectrum disorders or intellectual disability to controls, and histidine and b-alanine metabolism was specifically highlighted in the model.

  9. Perampanel with concomitant levetiracetam and topiramate: Post hoc analysis of adverse events related to hostility and aggression.

    Science.gov (United States)

    Chung, Steve; Williams, Betsy; Dobrinsky, Cindy; Patten, Anna; Yang, Haichen; Laurenza, Antonio

    2017-10-01

    In 4 Phase III registration trials (3 in patients with partial seizures, N=1480; 1 in patients with PGTCS, N=163), perampanel administered to patients already receiving 1-3 concomitant antiepileptic drugs (AEDs) demonstrated statistically superior efficacy compared to placebo in reducing seizure frequency. However, use of perampanel in these studies was associated with a risk of psychiatric and behavioral adverse reactions, including aggression, hostility, irritability, anger, and homicidal ideation and threats. The present study is a post hoc analysis of pooled data from these 4 trials to determine if concomitant treatment with levetiracetam and/or topiramate increased the risk of hostility- and aggression-related AEs. Treatment-emergent AEs (TEAEs) were determined using a "Narrow & Broad" search based on the Medical Dictionary for Regulatory Activities (MedDRA) standard MedDRA query (SMQ) for hostility- and aggression-related events. The rate of hostility- and aggression-related TEAEs was observed to be similar among perampanel-treated patients: a) receiving levetiracetam (N=340) compared to those not receiving levetiracetam (N=779); b) receiving topiramate (N=223) compared to those not receiving topiramate (N=896); and c) receiving both levetiracetam and topiramate (N=47) compared to those not receiving levetiracetam and topiramate (N=1072). Severe and serious TEAEs related to hostility and aggression were rare and occurred at a similar rate regardless of concomitant levetiracetam and/or topiramate therapy. Taken together, these results suggest that concomitant treatment with levetiracetam and/or topiramate has no appreciable effect on the occurrence of hostility- or aggression-related TEAEs in patients receiving perampanel. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  10. Assessing Clinical Microbiology Practice Guidelines: American Society for Microbiology Ad Hoc Committee on Evidence-Based Laboratory Medicine Practice Guidelines Assessment.

    Science.gov (United States)

    Nachamkin, Irving; Kirn, Thomas J; Westblade, Lars F; Humphries, Romney

    2017-11-01

    As part of the American Society for Microbiology (ASM) Evidence-Based Laboratory Medicine Practice Guidelines Committee of the Professional Practice Committee, an ad hoc committee was formed in 2014 to assess guidelines published by the committee using an assessment tool, Appraisal of Guidelines for Research Evaluation II (AGREE II). The AGREE II assessment helps reviewers determine whether published guidelines are robust, transparent, and clear in presenting practice recommendations in a standardized manner. Identifying strengths and weaknesses of practice guidelines by ad hoc assessments helps with improving future guidelines through the participation of key stakeholders. This minireview describes the development of the ad hoc committee and results from their review of several ASM best practices guidelines and a non-ASM practice guideline from the Emergency Nurses Association. Copyright © 2017 American Society for Microbiology.

  11. Worm epidemics in wireless ad hoc networks

    Energy Technology Data Exchange (ETDEWEB)

    Nekovee, Maziar [BT Research, Polaris 134, Adastral Park, Martlesham, Suffolk IP5 3RE (United Kingdom); Centre for Computational Science, University College London, 20 Gordon Street, London WC1H 0AJ (United Kingdom)

    2007-06-15

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  12. Worm epidemics in wireless ad hoc networks

    Science.gov (United States)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  13. Worm epidemics in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  14. On Energy-Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Poor HVincent

    2007-01-01

    Full Text Available A hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  15. On Energy-Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Cristina Comaniciu

    2007-03-01

    Full Text Available A hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  16. PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks (VANET)

    NARCIS (Netherlands)

    Förster, David; Kargl, Frank; Löhr, Hans

    2014-01-01

    Envisioned vehicular ad-hoc networks (VANET) standards use pseudonym certificates to provide secure and privacy-friendly message authentication. Revocation of long-term credentials is required to remove participants from the system, e.g. in case of vehicle theft. However, the current approach to

  17. Characteristics of the tomato chromoplast revealed by proteomic analysis

    OpenAIRE

    Barsan, Cristina; Sanchez-Bel, Paloma; Rombaldi, César Valmor; Egea, Isabel; Rossignol, Michel; Kuntz, Marcel; Zouine, Mohamed; Latché, Alain; Bouzayen, Mondher; Pech, Jean-Claude

    2010-01-01

    Chromoplasts are non-photosynthetic specialized plastids that are important in ripening tomato fruit (Solanum lycopersicum) since, among other functions, they are the site of accumulation of coloured compounds. Analysis of the proteome of red fruit chromoplasts revealed the presence of 988 proteins corresponding to 802 Arabidopsis unigenes, among which 209 had not been listed so far in plastidial databanks. These data revealed several features of the chromoplast. Proteins of lipid metabolism ...

  18. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  19. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  20. Report of the evaluation by the Ad Hoc Review Committee on advance science research. Result evaluation, interim evaluation, in-advance evaluation in fiscal year 2003

    International Nuclear Information System (INIS)

    2003-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Advanced Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the accomplishments of the research completed in Fiscal Year 2002, the accomplishments of the research started in Fiscal Year 2001, and the adequacy of the programs of the research to be started in Fiscal Year 2004 at Advanced Science Research Center of JAERI. The Ad Hoc Review Committee consisted of nine specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from May to July 2003. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 24, 2003, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on August 4, 2003. This report describes the result of the evaluation by the Ad Hoc Review Committee on Advanced Science Research. (author)

  1. Report of the evaluation by the Ad Hoc Review Committee on Advance Science Research. Result evaluation, interim evaluation, in-advance evaluation in fiscal year 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-11-01

    The Research Evaluation Committee, which consisted of 13 members from outside of the Japan Atomic Energy Research Institute (JAERI), set up an Ad Hoc Review Committee on Advanced Science Research in accordance with the Fundamental Guideline for the Evaluation of Research and Development (R and D) at JAERI' and its subsidiary regulations in order to evaluate the accomplishments of the research completed in Fiscal Year 2001, the accomplishments of the research started in Fiscal Year 2000, and the adequacy of the programs of the research to be started in Fiscal Year 2003 at Advanced Science Research Center of JAERI. The Ad Hoc Review Committee consisted of eight specialists from outside of JAERI. The Ad Hoc Review Committee conducted its activities from May to July 2002. The evaluation was performed on the basis of the materials submitted in advance and of the oral presentations made at the Ad Hoc Review Committee meeting which was held on June 4, 2002, in line with the items, viewpoints, and criteria for the evaluation specified by the Research Evaluation Committee. The result of the evaluation by the Ad Hoc Review Committee was submitted to the Research Evaluation Committee, and was judged to be appropriate at its meeting held on August 5, 2002. This report describes the result of the evaluation by the Ad Hoc Review Committee on Advanced Science Research. (author)

  2. An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting

    Directory of Open Access Journals (Sweden)

    Gianmarco Baldini

    2017-01-01

    Full Text Available In Vehicular Ad Hoc Networks (VANETs used in the road transportation sector, privacy risks may arise because vehicles could be tracked on the basis of the information transmitted by the Vehicle to Vehicle (V2V and Vehicle to Infrastructure (V2I communications implemented with the Dedicated Short Range Communications (DSRC standards operating at 5.9 GHz. Various techniques have been proposed in the literature to mitigate these privacy risks including the use of pseudonym schemes, but they are mostly focused on data anonymization at the network and application layer. At the physical layer, the capability to accurately identify and fingerprint wireless devices through their radio frequency (RF emissions has been demonstrated in the literature. This capability may generate a privacy threat because vehicles can be tracked using the RF emissions of their DSRC devices. This paper investigates the privacy risks related to RF fingerprinting to determine if privacy breaches are feasible in practice. In particular, this paper analyzes the tracking accuracy in challenging RF environments with high attenuation and fading.

  3. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    Science.gov (United States)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  4. Relationship of Glucose Variability With Glycated Hemoglobin and Daily Mean Glucose: A Post Hoc Analysis of Data From 5 Phase 3 Studies.

    Science.gov (United States)

    Luo, Junxiang; Qu, Yongming; Zhang, Qianyi; Chang, Annette M; Jacober, Scott J

    2018-03-01

    The association of glucose variability (GV) with other glycemic measures is emerging as a topic of interest. The aim of this analysis is to study the correlation between GV and measures of glycemic control, such as glycated hemoglobin (HbA1c) and daily mean glucose (DMG). Data from 5 phase 3 trials were pooled into 3 analysis groups: type 2 diabetes (T2D) treated with basal insulin only, T2D treated with basal-bolus therapy, and type 1 diabetes (T1D). A generalized boosted model was used post hoc to assess the relationship of the following variables with glycemic control parameters (HbA1c and DMG): within-day GV, between-day GV (calculated using self-monitored blood glucose and fasting blood glucose [FBG]), hypoglycemia rate, and certain baseline characteristics. Within-day GV (calculated using standard deviation [SD]) was found to have a significant influence on endpoints HbA1c and DMG in all 3 patient groups. Between-day GV from FBG (calculated using SD), within-day GV (calculated using coefficient of variation), and hypoglycemia rate were found to significantly influence the endpoint HbA1c in the T2D basal-only group. Lower within-day GV was significantly associated with improvement in DMG and HbA1c. This finding suggests that GV could be a marker in the early phases of new antihyperglycemic therapy development for predicting clinical outcomes in terms of HbA1c and DMG.

  5. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    International Nuclear Information System (INIS)

    Yang Juan; Yang Dan; Zhang Xiao-Hong; Huang Bin; Luo Jian-Lu

    2014-01-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm. (general)

  6. Cross-Layer QoS Control for Video Communications over Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Pei Yong

    2005-01-01

    Full Text Available Assuming a wireless ad hoc network consisting of homogeneous video users with each of them also serving as a possible relay node for other users, we propose a cross-layer rate-control scheme based on an analytical study of how the effective video transmission rate is affected by the prevailing operating parameters, such as the interference environment, the number of transmission hops to a destination, and the packet loss rate. Furthermore, in order to provide error-resilient video delivery over such wireless ad hoc networks, a cross-layer joint source-channel coding (JSCC approach, to be used in conjunction with rate-control, is proposed and investigated. This approach attempts to optimally apply the appropriate channel coding rate given the constraints imposed by the effective transmission rate obtained from the proposed rate-control scheme, the allowable real-time video play-out delay, and the prevailing channel conditions. Simulation results are provided which demonstrate the effectiveness of the proposed cross-layer combined rate-control and JSCC approach.

  7. Residual symptoms and functioning in depression, does the type of residual symptom matter? A post-hoc analysis

    Directory of Open Access Journals (Sweden)

    Romera Irene

    2013-02-01

    Full Text Available Abstract Background The degrees to which residual symptoms in major depressive disorder (MDD adversely affect patient functioning is not known. This post-hoc analysis explored the association between different residual symptoms and patient functioning. Methods Patients with MDD who responded (≥50% on the 17-item Hamilton Rating Scale for Depression; HAMD-17 after 3 months of treatment (624/930 were included. Residual core mood-symptoms (HAMD-17 core symptom subscale ≥1, residual insomnia-symptoms (HAMD-17 sleep subscale ≥1, residual anxiety-symptoms (HAMD-17-anxiety subscale ≥1, residual somatic-symptoms (HAMD-17 Item 13 ≥1, pain (Visual Analogue Scale ≥30, and functioning were assessed after 3 months treatment. A stepwise logistic regression model with normal functioning (Social and Occupational Functioning Assessment Scale ≥80 as the dependent variable was used. Results After 3 months, 59.5% of patients (371/624 achieved normal functioning and 66.0% (412/624 were in remission. Residual symptom prevalence was: core mood symptoms 72%; insomnia 63%; anxiety 78%; and somatic symptoms 41%. Pain reported in 18%. Factors associated with normal functioning were absence of core mood symptoms (odds ratio [OR] 8.7; 95% confidence interval [CI], 4.6–16.7, absence of insomnia symptoms (OR 1.8; 95% CI, 1.2–2.7, episode length (4–24 weeks vs. ≥24 weeks [OR 2.0; 95% CI, 1.1–3.6] and better baseline functioning (OR 1.0; 95% CI, 1.0–1.1. A significant interaction between residual anxiety symptoms and pain was found (p = 0.0080. Conclusions Different residual symptoms are associated to different degrees with patient functioning. To achieve normal functioning, specific residual symptoms domains might be targeted for treatment.

  8. Topology Control with Anisotropic and Sector Turning Antennas in Ad-hoc and Sensor Networks

    Directory of Open Access Journals (Sweden)

    V. Černý

    2011-01-01

    Full Text Available During the last several years, technological advances have allowed the development of small, cheap, embedded, independent and rather powerful radio devices that can self-organise into data networks. Such networks are usually called ad-hoc networks or, sometimes, depending on the application field, sensor networks. One of the first standards for ad-hoc networks to impose itself as a fully industrial framework for data gathering and control over such devices is IEEE 802.15.4 and, on top of it, its pair network architecture: ZigBee. In the case of multiple radio devices clamped into a small geographical area, the lack of radio bandwidth becomes a major problem, leading to multiple data losses and unnecessary power drain from the batteries of these small devices. This problem is usually perceived as interference. The deployment of appropriate topology control mechanisms (TC can solve interference. All of these algorithms calculate TC on the basis of isotropic antenna radiation patterns in the horizontal plane.

  9. Client-Server and Peer-to-Peer Ad-hoc Network for a Flexible Learning Environment

    Directory of Open Access Journals (Sweden)

    Ferial Khaddage

    2011-01-01

    Full Text Available Peer-to-Peer (P2P networking in a mobile learning environment has become a popular topic of research. One of the new emerging research ideas is on the ability to combine P2P network with server-based network to form a strong efficient portable and compatible network infrastructure. This paper describes a unique mobile network architecture, which reflects the on-campus students’ need for a mobile learning environment. This can be achieved by combining two different networks, client-server and peer-to-peer ad-hoc to form a sold and secure network. This is accomplished by employing one peer within the ad-hoc network to act as an agent-peer to facilitate communication and information sharing between the two networks. It can be implemented without any major changes to the current network technologies, and can combine any wireless protocols such as GPRS, Wi-Fi, Bluetooth, and 3G.

  10. Adhoc: an R package to calculate ad hoc distance thresholds for DNA barcoding identification

    Directory of Open Access Journals (Sweden)

    Gontran Sonet

    2013-12-01

    Full Text Available Identification by DNA barcoding is more likely to be erroneous when it is based on a large distance between the query (the barcode sequence of the specimen to identify and its best match in a reference barcode library. The number of such false positive identifications can be decreased by setting a distance threshold above which identification has to be rejected. To this end, we proposed recently to use an ad hoc distance threshold producing identifications with an estimated relative error probability that can be fixed by the user (e.g. 5%. Here we introduce two R functions that automate the calculation of ad hoc distance thresholds for reference libraries of DNA barcodes. The scripts of both functions, a user manual and an example file are available on the JEMU website (http://jemu.myspecies.info/computer-programs as well as on the comprehensive R archive network (CRAN, http://cran.r-project.org.

  11. Geophysical investigation of the June 6, 1944 D-Day invasion site at Pointe du Hoc, Normandy, France

    Science.gov (United States)

    Everett, M. E.; Pierce, C. J.; Warden, R. R.; Burt, R. A.

    2005-05-01

    A near-surface geophysical survey at the D-Day invasion site atop the cliffs at Pointe du Hoc, Normandy, France was carried out using ground-penetrating radar, electromagnetic induction, and magnetic gradiometry equipment. The subsurface targets of investigation are predominantly buried concrete and steel structures and earthworks associated with the German coastal fortifications at this stronpoint of Hitler's Atlantic Wall. The targets are readily detectable embedded within the vadose zone of a weakly magnetic, electrically resistive loess soil cover. The radar and electromagnetic induction responses lend themselves to plan-view imaging of the subsurface, while the magnetics data reveal the presence of buried magnetic bodies in a more subtle fashion. Several intriguing geophysical signatures were discovered, including what may be the buried remains of a railway turntable, ordnance fragments in the bomb craters, a buried steel-reinforced concrete trench, and a linear chain of machine gun firing positins. Geophysical prospecting is shown to be a very powerful tool for historical battlefield characterization.

  12. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  13. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  14. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  15. An Automated Tool for the Creation of Desired Emulated Topologies of a Mobile Ad-Hoc Network

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research effort that the U.S. Army Research Laboratory conducted in FY 2005 in support of the development of advanced technologies for tactical mobile ad hoc networks (MANET...

  16. An ad hoc wireless sensor network for tele medicine applications

    International Nuclear Information System (INIS)

    Sheltami, Tarek R.; Mahmoud, Ashraf S.; Abu-Amara, Marwan H.

    2007-01-01

    Recent advances in embedded computing systems have led to the emergence of wireless sensor networks (SNETs), consisting of small, battery-powered motes with limited computation and radio communication capabilities. SNETs permit data gathering and computation to be deeply embedded in the physical environment. Large scale ad hoc sensor networks (ASNET), when deployed among mobile patients, can provide dynamic data query architecture to allow medical specialists to monitor patients at any place via the web or cellular network. In case of an emergency, doctors and/or nurses will be contacted automatically through their handheld personal digital assistants (PDAs) or cellular phones. In specific, the proposed network consists of sensor nodes at the first layer whose responsibility is to measure, collect and communicate, via wired or wireless interface, readings to a microcontroller presenting the second layer of architecture. Deployed microcontrollers process incoming readings and report to a central system via a wireless interface. The implemented network distinguishes between periodic sensor readings and critical or event driven readings where higher priorities is given for the latter. In this paper we implement 3 special cases for tracking and monitoring patients and doctors using SNETs. In addition, the performance of a large scale of our implementation has been tested by means of mathematical analysis. (author)

  17. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  18. Ad Hoc Microphone Array Beamforming Using the Primal-Dual Method of Multipliers

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Heusdens, Richard

    2016-01-01

    In the recent years, there have been increasing amount of researches aiming at optimal beamforming with ad hoc microphone arrays, mostly with fusion-based schemes. However, huge amount of computational complexity and communication overhead impede many of these algorithms from being useful in prac...... the distributed linearly-constrained minimum variance beamformer using the the state of the art primal-dual method of multipliers. We study the proposed algorithm with an experiment....

  19. A Bioinspired Adaptive Congestion-Avoidance Routing for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Qiong

    2014-01-01

    Full Text Available Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.

  20. Protocolo W2LAN para transformar una red móvil 802.11 Ad-Hoc (MANET) en una LAN Ethernet

    OpenAIRE

    Burrull I Mestres, Francesco; García Haro, Juan; Malgosa Sanahuja, José María; Monzó Sánchez, Francisco Miguel

    2005-01-01

    Las redes MANET (Mobile Ad-Hoc Network) presentan el problema de la visibilidad parcial [1], por lo que hay que considerar protocolos de encaminamiento de nivel de enlace (capa 2 OSI) o superior. Algunos ejemplos de protocolos de encaminamiento en uso podrían ser el protocolo AODV (Ad Hoc On-demand Distance Vector[2]) -reactivo- y DSDV (Destination-Sequenced Distance Vector [3]) -proactivo-. En [4] se puede encontrar una comparativa extensa sobre protocolos de encaminamiento en redes MANET, o...

  1. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  2. Ad hoc committee on reactor physics benchmarks

    International Nuclear Information System (INIS)

    Diamond, D.J.; Mosteller, R.D.; Gehin, J.C.

    1996-01-01

    In the spring of 1994, an ad hoc committee on reactor physics benchmarks was formed under the leadership of two American Nuclear Society (ANS) organizations. The ANS-19 Standards Subcommittee of the Reactor Physics Division and the Computational Benchmark Problem Committee of the Mathematics and Computation Division had both seen a need for additional benchmarks to help validate computer codes used for light water reactor (LWR) neutronics calculations. Although individual organizations had employed various means to validate the reactor physics methods that they used for fuel management, operations, and safety, additional work in code development and refinement is under way, and to increase accuracy, there is a need for a corresponding increase in validation. Both organizations thought that there was a need to promulgate benchmarks based on measured data to supplement the LWR computational benchmarks that have been published in the past. By having an organized benchmark activity, the participants also gain by being able to discuss their problems and achievements with others traveling the same route

  3. Costs and health resources utilization following switching to pregabalin in individuals with gabapentin-refractory neuropathic pain: a post hoc analysis.

    Science.gov (United States)

    Navarro, Ana; Saldaña, María T; Pérez, Concepción; Masramón, Xavier; Rejas, Javier

    2012-06-01

    To analyze the changes in pain severity and associated costs resulting from resource utilization and reduced productivity in patients with gabapentin-refractory peripheral neuropathic pain who switched to pregabalin therapy in primary care settings in Spain. This is a post hoc analysis of a 12-week, multicentre, noninterventional cost-of-illness study. Patients were included in the study if they were over 18 years of age and had a diagnosis of chronic, treatment-refractory peripheral neuropathic pain. The analysis included all pregabalin-naïve patients who had previously shown an inadequate response to gabapentin and switched to pregabalin. Severity of pain before and after treatment with pregabalin, alone or as an add-on therapy, was assessed using the Short-Form McGill Pain Questionnaire (SF-MPQ) and its related visual analogue scale (VA). Healthcare resource utilization, productivity (including lost-workday equivalents [LWDE]), and related costs were assessed at baseline and after pregabalin treatment. A total of 174 patients switched to pregabalin had significant and clinically relevant reductions in pain severity (mean [SD] change on SF-MPQ VA scale, -31.9 [22.1]; P use [in pregabalin add-on group], ancillary tests, and unscheduled medical visits) were observed at the end of trial. Additionally, there were substantial improvements in productivity, including a reduction in the number of LWDE following pregabalin treatment (-18.9 [26.0]; P < 0.0001). These changes correlated with substantial reductions in both direct (-652.9 ± 1622.4 €; P < 0.0001) and indirect healthcare costs (-851.6 [1259.6] €; P < 0.0001). The cost of care in patients with gabapentin-refractory peripheral neuropathic pain appeared to be significantly reduced after switching to pregabalin treatment, alone or in combination with other analgesic drugs, in a real-life setting. © 2011 The Authors. Pain Practice © 2011 World Institute of Pain.

  4. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...

  5. Impact of mobility on the performance of relaying in ad hoc networks (Extended version)

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E.

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  6. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  7. System optimization for peer-to-peer multi hop video broadcasting in wireless ad hoc networks

    NARCIS (Netherlands)

    Dedeoglu, V.; Atici, C.; Salman, F.S.; Sunay, M.O.

    2008-01-01

    We consider peer-to-peer video broadcasting using cooperation among peers in an ad hoc wireless network. As opposed to the traditional single hop broadcasting, multiple hops cause an increase in broadcast video quality while creating interference and increasing transmission delay. We develop

  8. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  9. An Incentivized Approach for Fair Participation in Wireless Ad hoc Networks

    OpenAIRE

    Choudhuri, Arka Rai; S, Kalyanasundaram; Sridhar, Shriyak; B, Annappa

    2015-01-01

    In Wireless Ad hoc networks (WANETs), nodes separated by considerable distance communicate with each other by relaying their messages through other nodes. However, it might not be in the best interests of a node to forward the message of another node due to power constraints. In addition, all nodes being rational, some nodes may be selfish, i.e. they might not relay data from other nodes so as to increase their lifetime. In this paper, we present a fair and incentivized approach for participa...

  10. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  11. Comparison of Efficacy and Safety of Liraglutide 3.0 mg in Individuals with BMI above and below 35 kg/m²: A Post-hoc Analysis

    Science.gov (United States)

    le Roux, Carel; Aroda, Vanita; Hemmingsson, Joanna; Cancino, Ana Paula; Christensen, Rune; Pi-Sunyer, Xavier

    2018-01-01

    Objective To investigate whether the efficacy and safety of liraglutide 3.0 mg differed between two subgroups, BMI 27 to 3.0 mg were evaluated by testing the interaction between treatment group and baseline BMI subgroup. Results Significantly greater weight loss (0–56 weeks) was observed with liraglutide 3.0 mg versus placebo in all patient groups while on treatment. There was no evidence that the weight-lowering effect of liraglutide 3.0 mg differed between BMI subgroups (interaction p > 0.05). Similarly, for most secondary endpoints significantly greater improvements were observed with liraglutide 3.0 mg versus placebo, with no indication treatment effects differing between subgroups. The safety profile of liraglutide 3.0 mg was broadly similar across BMI subgroups. Conclusion This post-hoc analysis did not indicate any differences in the treatment effects, or safety profile, of liraglutide 3.0 mg for individuals with BMI 27 to 3.0 mg can therefore be considered for individuals with a BMI of ≥35 as well as for those with a BMI of 27 to <35 kg/m². PMID:29145215

  12. Post hoc subgroups in clinical trials: Anathema or analytics?

    Science.gov (United States)

    Weisberg, Herbert I; Pontes, Victor P

    2015-08-01

    There is currently much interest in generating more individualized estimates of treatment effects. However, traditional statistical methods are not well suited to this task. Post hoc subgroup analyses of clinical trials are fraught with methodological problems. We suggest that the alternative research paradigm of predictive analytics, widely used in many business contexts, can be adapted to help. We compare the statistical and analytics perspectives and suggest that predictive modeling should often replace subgroup analysis. We then introduce a new approach, cadit modeling, that can be useful to identify and test individualized causal effects. The cadit technique is particularly useful in the context of selecting from among a large number of potential predictors. We describe a new variable-selection algorithm that has been applied in conjunction with cadit. The cadit approach is illustrated through a reanalysis of data from the Randomized Aldactone Evaluation Study trial, which studied the efficacy of spironolactone in heart-failure patients. The trial was successful, but a serious adverse effect (hyperkalemia) was subsequently discovered. Our reanalysis suggests that it may be possible to predict the degree of hyperkalemia based on a logistic model and to identify a subgroup in which the effect is negligible. Cadit modeling is a promising alternative to subgroup analyses. Cadit regression is relatively straightforward to implement, generates results that are easy to present and explain, and can mesh straightforwardly with many variable-selection algorithms. © The Author(s) 2015.

  13. PROTOCOLS FOR INCREASING THE LIFETIME OF NODES OF AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    B.Malarkodi

    2010-03-01

    Full Text Available Power consumption of nodes in ad hoc networks is a critical issue as they predominantly operate on batteries. In order to improve the lifetime of an ad hoc network, all the nodes must be utilized evenly and the power required for connections must be minimized. Energy management deals with the process of managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources so as to increase the lifetime of the nodes of an ad hoc wireless network. In this paper, two protocols are proposed to improve the lifetime of the nodes. The first protocol assumes smart battery packages with L cells and uses dynamic programming (DP to optimally select the set of cells used to satisfy a request for power. The second one proposes a MAC layer protocol denoted as Power Aware medium Access Control (PAMAC protocol which enables the network layer to select a route with minimum total power requirement among the possible routes between a source and a destination provided all nodes in the routes have battery capacity above a threshold. The life time of the nodes using the DP based scheduling policy is found through simulation and compared with that obtained using the techniques reported in the literature. It is found that DP based policy increases the lifetime of the mobile nodes by a factor of 1.15 to 1.8. The life expectancy, the average power consumption and throughput of the network using PAMAC protocol are computed through simulation and compared with that of the other MAC layer protocols 802.11, MACA, and CSMA. Besides this, the life expectancy and average power consumption of the network for different values of threshold are also compared. From the simulation results, it is observed that PAMAC consumes the least power and provides the longest lifetime among the various MAC Layer protocols. Moreover, using PAMAC as the MAC layer protocol, the performance obtained using different routing layer

  14. Comunicaciones seguras sobre redes móviles ad hoc

    OpenAIRE

    Rocabado Moreno, Sergio Hernán; Arias Figueroa, Daniel; Sánchez, Ernesto

    2011-01-01

    En este proyecto se ha planteado investigar diferentes mecanismos para realizar comunicaciones seguras utilizando redes móviles ad-hoc, esto permitirá aprovechar las características inherentes de este tipo de redes, para llevar información crítica de forma segura a lugares donde no se disponga de acceso a redes de infraestructura. El resultado final será una propuesta que servirá de base para el desarrollo e implementación de sistemas móviles para emergencias médicas y también como material d...

  15. A Partitioned Approach to Signal Separation with Microphone Ad Hoc Arrays

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Benesty, Jacob

    2016-01-01

    In this paper, a blind algorithm is proposed for speech enhancement in multi-speaker scenarios, in which interference rejection is the main objective. Here, the ad hoc array is broken into microphone duples which are used to partition the array into local sub-arrays. The core algorithm takes...... advantage of differences in signal structure in each duple. A geometric mean filter is then used to merge the output signals obtained with different duples, and to form a global broadband maximum signal-to-interference ratio (SIR) enhancement apparatus. The resulting filter outputs are enhanced acoustic...

  16. Increased longevity of wireless Ad hoc network through fuzzy system

    Directory of Open Access Journals (Sweden)

    Fawzia Abdali Larki

    2014-06-01

    Full Text Available The Ad hoc network is one of the multistep-based self-organizing networks, which are dynamically changing and are taken more into account as the ways of connecting the terminals through the development of wireless communication terminals. We are faced with numerous challenges in designing a wireless network such as the dynamic topology, common and limited bandwidth, and the limited energy. The nodes are moving according to the continuous changes in the topology and the source-to-destination paths are completely broken. Therefore, the repeated route discovery enhances the delay and overload of routing. Thus, it is essential to consider the link stability while designing the path in order to choose the routing protocol. Providing the multiple paths may lead to the better performance than a path. The transmission energy control in the wireless Ad hoc networks is the option for the level of transmission energy in order to transmit each node packet in this system. Therefore, transmission energy control affects the wireless medium interface. Because of choosing the appropriate protocol, the routing operation can be improved and the energy consumption can be controlled properly as well as enhancing the durability and longevity of network. The main objective of this study is to enhance the network longevity. The proposed algorithm in this research considers the combination of 2 parameters including the rate of node energy and number of steps in Fuzzy System applied on AOMDV Protocol, which is a Multipath Routing Protocol. The results of simulation also indicate the improved performance of proposed algorithm (AOMDV-F compared to AODV and AOMDV Protocols in NS2 simulator.

  17. Undilatable Stent Neoatherosclerosis Treated with Ad Hoc Rotational Atherectomy

    Directory of Open Access Journals (Sweden)

    Michael Koutouzis

    2017-01-01

    Full Text Available A middle age woman with known ischemic heart disease and old stents in proximal left anterior descending coronary artery (LAD was admitted to Coronary Care Unit with acute coronary syndrome. The coronary angiography showed one vessel disease with significant restenosis within the previously implanted stents. The lesion was tough and remained undilatable despite high pressure balloon inflation. Eventually, the balloon ruptured creating a massive dissection of the LAD beginning immediately after the distal part of the undilatable lesion. We proceeded with a challenging ad hoc rotational atherectomy of the lesion and finally stenting of the lesion. In-stent restenosis many years after stent implantation is considered to be mainly due to neoatheromatosis compared to intimal hyperplasia, making lesion treatment more difficult and unpredictable.

  18. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  19. Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks

    Science.gov (United States)

    Banani, Sam; Thiemjarus, Surapa; Kittipiyakul, Somsak

    2018-01-01

    In high-density road networks, with each vehicle broadcasting multiple messages per second, the arrival rate of safety messages can easily exceed the rate at which digital signatures can be verified. Since not all messages can be verified, algorithms for selecting which messages to verify are required to ensure that each vehicle receives appropriate awareness about neighbouring vehicles. This paper presents a novel scheme to select important safety messages for verification in vehicular ad hoc networks (VANETs). The proposed scheme uses location and direction of the sender, as well as proximity and relative-time between vehicles, to reduce the number of irrelevant messages verified (i.e., messages from vehicles that are unlikely to cause an accident). Compared with other existing schemes, the analysis results show that the proposed scheme can verify messages from nearby vehicles with lower inter-message delay and reduced packet loss and thus provides high level of awareness of the nearby vehicles. PMID:29652840

  20. Ad-hoc Network of Smart Sensors for Mechanical Load Measurement

    Directory of Open Access Journals (Sweden)

    Manuel A. Vieira

    2016-07-01

    Full Text Available Strain gauges load cells are transducers devices capable of converting changes in applied mechanical load into an electrical analog signal. Those devices have a large spectrum of applications ranging from domestic to industrial or even medical appliances just to name a few. In this work, they are used in the electronic instrumentation of a force platform that will be used to carry out the analysis and characterization of human biomechanical walking. In this platform, four load cells are installed, each one capable of measuring forces along two different axis. A total of eight strain-gauges per load cell are employed. Hence, analog signal transmission, besides requiring a large number of connection wires, is prone to interference and noise. Moreover, with this solution, scalability requires severe changes in the connection topology. In order to circumvent those problems, an alternative in-situ signal conditioning and digital data transmission system was devised. This approach, as far as investigated, presents an innovative solution to signal conditioning and data transmission for load-cells. In particular, the presented solution allows the creation of an ad-hoc network of load cells, using the I²C protocol with a master interface that allows the users to interact and change the parameters of each load cell. This instrumentation structure has been successfully tested and the obtained results are documented in this article.

  1. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    Science.gov (United States)

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  2. Estudio de la topología y protocolos de una red móvil ad-hoc

    OpenAIRE

    Albalat Montenegro, Bruno

    2010-01-01

    This project intends to describe how a basic messaging application that, using ad-hoc networks, supports delay tolerance, has been created. Its purpose is to serve as a basis for research groups to be able to work over it for their testing purposes.

  3. MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    K.G. Santhiya

    2012-12-01

    Full Text Available MANET (Mobile Ad-hoc Network is an infra structure less wireless ad-hoc network that does not require any basic central control. The topology of the network changes drastically due to very fast mobility of nodes. So an adaptive routing protocol is needed for routing in MANET. AODV (Ad-hoc On-demand Distance Vector routing is the effective and prominent on-demand Ad-hoc routing protocols. During route establishment phase in traditional AODV, only one route reply message will be sent in the reverse path to establish routing path. The high mobility of nodes may affect the reply messages which lead to the retransmission of route request message by the sender which in turn leads to higher communication delay, power consumption and the reduction in the ratio of packets delivered. Sending multiple route reply messages and establishing multiple paths in a single path discovery will reduce the routing overhead involved in maintaining the connection between source and destination nodes. Multipath routing can render high scalability, end-to-end throughput and provide load balancing in MANET. The new proposed novel Multipath QoS aware reliable routing protocol establishes two routes of maximum node disjoint paths and the data transfer is carried out in the two paths simultaneously. To select best paths, the new proposed protocol uses three parameters Link Eminence, MAC overhead and node residual energy. The experimental values prove that the MQARR-AODV protocol achieves high reliability, stability, low latency and outperforms AODV by the less energy consumption, overhead and delay.

  4. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  5. Neuroprotection as initial therapy in acute stroke - Third report of an Ad Hoc Consensus Group Meeting

    NARCIS (Netherlands)

    Bogousslavsky, J; De Keyser, J; Diener, HC; Fieschi, C; Hacke, W; Kaste, M; Orgogozo, JM; Pulsinelli, W; Wahlgren, NG

    1998-01-01

    Although a considerable body of scientific data is now available on neuroprotection in acute ischaemic stroke, this field is not yet established in clinical practice. At its third meeting, the European Ad Hoc Consensus Group considered the potential for neuroprotection in acute stroke and the

  6. The doctrine of joint criminal action in the ad hoc tribunals and its scope in the Rome Statute

    Directory of Open Access Journals (Sweden)

    Miren Odriozola-Gurrutxaga

    2014-03-01

    Full Text Available The first judgment of the International Criminal Court has confirmed that article 25 (3 of the Rome Statute adopts the theory of control of the act to distinguish between principals and accessories. On the contrary, since 2003, the ad hoc tribunals’ case law bases the notion of co-perpetration on the Joint Criminal Enterprise doctrine, using a subjective criterion approach. In this article we will first analyze the problems raised by that case law of the ad hoc tribunals, and then, we will study the article of the Rome Statute which apparently most resembles the Joint Criminal Enterprise doctrine: article 25 (3 (d. The article concludes that none of the three categories of that doctrine is included in the said provision.

  7. Adaptive Probabilistic Broadcasting over Dense Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Victor Gau

    2010-01-01

    Full Text Available We propose an idle probability-based broadcasting method, iPro, which employs an adaptive probabilistic mechanism to improve performance of data broadcasting over dense wireless ad hoc networks. In multisource one-hop broadcast scenarios, the modeling and simulation results of the proposed iPro are shown to significantly outperform the standard IEEE 802.11 under saturated condition. Moreover, the results also show that without estimating the number of competing nodes and changing the contention window size, the performance of the proposed iPro can still approach the theoretical bound. We further apply iPro to multihop broadcasting scenarios, and the experiment results show that within the same elapsed time after the broadcasting, the proposed iPro has significantly higher Packet-Delivery Ratios (PDR than traditional methods.

  8. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  9. Efficacy of lisdexamfetamine dimesylate in children with attention-deficit/hyperactivity disorder previously treated with methylphenidate: a post hoc analysis

    Directory of Open Access Journals (Sweden)

    Jain Rakesh

    2011-11-01

    Full Text Available Abstract Background Attention-deficit/hyperactivity disorder (ADHD is a common neurobehavioral psychiatric disorder that afflicts children, with a reported prevalence of 2.4% to 19.8% worldwide. Stimulants (methylphenidate [MPH] and amphetamine are considered first-line ADHD pharmacotherapy. MPH is a catecholamine reuptake inhibitor, whereas amphetamines have additional presynaptic activity. Although MPH and amphetamine can effectively manage ADHD symptoms in most pediatric patients, many still fail to respond optimally to either. After administration, the prodrug stimulant lisdexamfetamine dimesylate (LDX is converted to l-lysine and therapeutically active d-amphetamine in the blood. The objective of this study was to evaluate the clinical efficacy of LDX in children with ADHD who remained symptomatic (ie, nonremitters; ADHD Rating Scale IV [ADHD-RS-IV] total score > 18 on MPH therapy prior to enrollment in a 4-week placebo-controlled LDX trial, compared with the overall population. Methods In this post hoc analysis of data from a multicenter, randomized, double-blind, forced-dose titration study, we evaluated the clinical efficacy of LDX in children aged 6-12 years with and without prior MPH treatment at screening. ADHD symptoms were assessed using the ADHD-RS-IV scale, Conners' Parent Rating Scale-Revised short form (CPRS-R, and Clinical Global Impressions-Improvement scale, at screening, baseline, and endpoint. ADHD-RS-IV total and CPRS-R ADHD Index scores were summarized as mean (SD. Clinical response for the subgroup analysis was defined as a ≥ 30% reduction from baseline in ADHD-RS-IV score and a CGI-I score of 1 or 2. Dunnett test was used to compare change from baseline in all groups. Number needed to treat to achieve one clinical responder or one symptomatic remitter was calculated as the reciprocal of the difference in their proportions on active treatment and placebo at endpoint. Results Of 290 randomized participants enrolled, 28

  10. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  11. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  12. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    Science.gov (United States)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  13. Pregabalin versus SSRIs and SNRIs in benzodiazepine-refractory outpatients with generalized anxiety disorder: a post hoc cost-effectiveness analysis in usual medical practice in Spain

    Directory of Open Access Journals (Sweden)

    De Salas-Cansado M

    2012-06-01

    Full Text Available Marina De Salas-Cansado,1 José M Olivares,2 Enrique Álvarez,3 Jose L Carrasco,4 Andoni Barrueta,5 Javier Rejas,51Trial Form Support Spain, Madrid; 2Department of Psychiatry, Hospital Meixoeiro, Complejo Hospitalario Universitario, Vigo; 3Department of Psychiatry, Hospital de la Santa Creu i San Pau, Barcelona; 4Department of Psychiatry, Hospital Clínico San Carlos, Madrid; 5Health Outcomes Research Department, Medical Unit, Pfizer Spain, Alcobendas, Madrid, SpainBackground: Generalized anxiety disorder (GAD is a prevalent health condition which seriously affects both patient quality of life and the National Health System. The aim of this research was to carry out a post hoc cost-effectiveness analysis of the effect of pregabalin versus selective serotonin reuptake inhibitors (SSRIs/serotonin norepinephrine reuptake inhibitors (SNRIs in treated benzodiazepine-refractory outpatients with GAD.Methods: This post hoc cost-effectiveness analysis used secondary data extracted from the 6-month cohort, prospective, noninterventional ADAN study, which was conducted to ascertain the cost of illness in GAD subjects diagnosed according to Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition criteria. Benzodiazepine-refractory subjects were those who claimed persistent symptoms of anxiety and showed a suboptimal response (Hamilton Anxiety Rating Scale ≥16 to benzodiazepines, alone or in combination, over 6 months. Patients could switch to pregabalin (as monotherapy or addon or to an SSRI or SNRI, alone or in combination. Effectiveness was expressed as quality-adjusted life years gained, and the perspective was that of the National Health System in the year 2008. A sensitivity analysis was performed using bootstrapping techniques (10,000 resamples were obtained in order to obtain a cost-effectiveness plane and a corresponding acceptability curve.Results: A total of 282 subjects (mean Hamilton Anxiety Rating Scale score 25.8 were

  14. Enabling Real-Time Video Services over Ad-Hoc Networks Opens the Gates for E-learning in Areas Lacking Infrastructure

    Directory of Open Access Journals (Sweden)

    Johannes Karlsson

    2009-10-01

    Full Text Available In this paper we suggest a promising solution to come over the problems of delivering e-learning to areas with lack or deficiencies in infrastructure for Internet and mobile communication. We present a simple, reasonably priced and efficient communication platform for providing e-learning. This platform is based on wireless ad-hoc networks. We also present a preemptive routing protocol suitable for real-time video communication over wireless ad-hoc networks. Our results show that this routing protocol can significantly improve the quality of the received video. This makes our suggested system not only good to overcome the infrastructure barrier but even capable of delivering a high quality e-learning material.

  15. Vehicular ad hoc networks standards, solutions, and research

    CERN Document Server

    Molinaro, Antonella; Scopigno, Riccardo

    2015-01-01

    This book presents vehicular ad-hoc networks (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and timely content; the invited authors were carefully selected from a list of who’s who in the respective field of interest: there are as many from Academia as from Standardization and Industry sectors from around the world. The covered topics are organized around five Parts starting from an historical overview of vehicular communications and standardization/harmonization activities (Part I), then progressing to the theoretical foundations of VANETs and a description of the day-one standard-compliant solutions (Part II), hence going into details of vehicular networking and security (Part III) and to the tools to study VANETs, from mobility and channel models, to network simulators and field trial methodologies (Part IV), and fi...

  16. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  17. Comparison of Efficacy and Safety of Liraglutide 3.0 mg in Individuals with BMI above and below 35 kg/m²: A Post-hoc Analysis.

    Science.gov (United States)

    le Roux, Carel; Aroda, Vanita; Hemmingsson, Joanna; Cancino, Ana Paula; Christensen, Rune; Pi-Sunyer, Xavier

    2017-01-01

    To investigate whether the efficacy and safety of liraglutide 3.0 mg differed between two subgroups, BMI 27 to 3.0 mg were evaluated by testing the interaction between treatment group and baseline BMI subgroup. Significantly greater weight loss (0-56 weeks) was observed with liraglutide 3.0 mg versus placebo in all patient groups while on treatment. There was no evidence that the weight-lowering effect of liraglutide 3.0 mg differed between BMI subgroups (interaction p > 0.05). Similarly, for most secondary endpoints significantly greater improvements were observed with liraglutide 3.0 mg versus placebo, with no indication treatment effects differing between subgroups. The safety profile of liraglutide 3.0 mg was broadly similar across BMI subgroups. This post-hoc analysis did not indicate any differences in the treatment effects, or safety profile, of liraglutide 3.0 mg for individuals with BMI 27 to 3.0 mg can therefore be considered for individuals with a BMI of ≥35 as well as for those with a BMI of 27 to <35 kg/m². © 2017 The Author(s) Published by S. Karger GmbH, Freiburg.

  18. Intelligent self-organization methods for wireless ad hoc sensor networks based on limited resources

    Science.gov (United States)

    Hortos, William S.

    2006-05-01

    A wireless ad hoc sensor network (WSN) is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. To a greater degree than the terminals found in mobile ad hoc networks (MANETs) for communications, sensor nodes are resource-constrained, with limited computational processing, bandwidth, memory, and power, and are typically unattended once in operation. Consequently, the level of information exchange among nodes, to support any complex adaptive algorithms to establish network connectivity and optimize throughput, not only deplete those limited resources and creates high overhead in narrowband communications, but also increase network vulnerability to eavesdropping by malicious nodes. Cooperation among nodes, critical to the mission of sensor networks, can thus be disrupted by the inappropriate choice of the method for self-organization. Recent published contributions to the self-configuration of ad hoc sensor networks, e.g., self-organizing mapping and swarm intelligence techniques, have been based on the adaptive control of the cross-layer interactions found in MANET protocols to achieve one or more performance objectives: connectivity, intrusion resistance, power control, throughput, and delay. However, few studies have examined the performance of these algorithms when implemented with the limited resources of WSNs. In this paper, self-organization algorithms for the initiation, operation and maintenance of a network topology from a collection of wireless sensor nodes are proposed that improve the performance metrics significant to WSNs. The intelligent algorithm approach emphasizes low computational complexity, energy efficiency and robust adaptation to change, allowing distributed implementation with the actual limited resources of the cooperative nodes of the network. Extensions of the

  19. A Game Theory Based Approach for Power Efficient Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kun Hua

    2017-01-01

    Full Text Available Green communications are playing critical roles in vehicular ad hoc networks (VANETs, while the deployment of a power efficient VANET is quite challenging in practice. To add more greens into such kind of complicated and time-varying mobile network, we specifically investigate the throughput and transmission delay performances for real-time and delay sensitive services through a repeated game theoretic solution. This paper has employed Nash Equilibrium in the noncooperative game model and analyzes its efficiency. Simulation results have shown an obvious improvement on power efficiency through such efforts.

  20. Routine training is not enough: structured training in family planning and abortion improves residents' competency scores and intentions to provide abortion after graduation more than ad hoc training.

    Science.gov (United States)

    Macisaac, Laura; Vickery, Zevidah

    2012-03-01

    Abortion provision remains threatened by the paucity of physicians trained to provide them. Lack of training during residency has been cited by obstetrician and gynecologist (ob-gyn) physicians as a reason for not including abortion in their practice. We administered surveys on interest, competency and intention to provide abortions to two groups of ob-gyn residents: one experiencing a new comprehensive and structured family planning rotation, and another group at our affiliate hospital's residency program receiving "ad hoc" training during their routine gynecology rotations. Surveys were anonymous and blinded to investigator. The structured family planning rotation group compared to the ad hoc group reported significantly increased competency score using a Likert scale in manual vacuum aspiration (MVA) (4.5 vs. 1; p=.003) and had a higher proportion reporting intent to provide office MVA postresidency (100% vs. 39%; p=.01) and being trained to 22.5 weeks' vs. 12 weeks' gestation (p=.005). In bivariate analysis, competency in MVA was associated with higher intentions to provide MVA after residency (p=.007). A structured rotation in family planning and abortion for obstetrics/gynecology residents results in increases in competency and intentions to provide abortion, and an association between the two. In-hospital structured training proved to be superior to ad hoc training in our affiliate institution in improving competency and intention to provide abortion after residency. Copyright © 2012 Elsevier Inc. All rights reserved.

  1. Transcriptome analysis reveals key differentially expressed genes involved in wheat grain development

    Directory of Open Access Journals (Sweden)

    Yonglong Yu

    2016-04-01

    Full Text Available Wheat seed development is an important physiological process of seed maturation and directly affects wheat yield and quality. In this study, we performed dynamic transcriptome microarray analysis of an elite Chinese bread wheat cultivar (Jimai 20 during grain development using the GeneChip Wheat Genome Array. Grain morphology and scanning electron microscope observations showed that the period of 11–15 days post-anthesis (DPA was a key stage for the synthesis and accumulation of seed starch. Genome-wide transcriptional profiling and significance analysis of microarrays revealed that the period from 11 to 15 DPA was more important than the 15–20 DPA stage for the synthesis and accumulation of nutritive reserves. Series test of cluster analysis of differential genes revealed five statistically significant gene expression profiles. Gene ontology annotation and enrichment analysis gave further information about differentially expressed genes, and MapMan analysis revealed expression changes within functional groups during seed development. Metabolic pathway network analysis showed that major and minor metabolic pathways regulate one another to ensure regular seed development and nutritive reserve accumulation. We performed gene co-expression network analysis to identify genes that play vital roles in seed development and identified several key genes involved in important metabolic pathways. The transcriptional expression of eight key genes involved in starch and protein synthesis and stress defense was further validated by qRT-PCR. Our results provide new insight into the molecular mechanisms of wheat seed development and the determinants of yield and quality.

  2. Implementation and Evaluation of Multichannel Multi-Interface Routing Mechanism with QoS-Consideration for Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Satoh Hiroki

    2010-01-01

    Full Text Available To accommodate real-time multimedia application while satisfying application-level QoS requirements in a wireless ad-hoc network, we need QoS control mechanisms. We proposed a new routing mechanism for a wireless ad-hoc network composed of nodes equipped with multiple network interfaces. By embedding information about channel usage in control messages of OLSRv2, each node obtains a view of topology and bandwidth information of the whole network. Based on the obtained information, a source node determines a logical path with the maximum available bandwidth to satisfy application-level QoS requirements. In this paper, we evaluated feasibility of the proposal through simulation and practical experiments and confirmed that our proposal effectively transferred multimedia packets over a logical path avoiding congested links. The load on a network is well distributed and the network can accommodate more sessions than OLSRv2 and QOLSR.

  3. Impact of mobility on the performance7 of relaying in ad hoc networks – Extended version

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  4. Intelligent Networks Data Fusion Web-based Services for Ad-hoc Integrated WSNs-RFID

    Directory of Open Access Journals (Sweden)

    Falah Alshahrany

    2016-01-01

    Full Text Available The use of variety of data fusion tools and techniques for big data processing poses the problem of the data and information integration called data fusion having objectives which can differ from one application to another. The design of network data fusion systems aimed at meeting these objectives, need to take into account of the necessary synergy that can result from distributed data processing within the data networks and data centres, involving increased computation and communication. This papers reports on how this processing distribution is functionally structured as configurable integrated web-based support services, in the context of an ad-hoc wireless sensor network used for sensing and tracking, in the context of distributed detection based on complete observations to support real rime decision making. The interrelated functional and hardware RFID-WSN integration is an essential aspect of the data fusion framework that focuses on multi-sensor collaboration as an innovative approach to extend the heterogeneity of the devices and sensor nodes of ad-hoc networks generating a huge amount of heterogeneous soft and hard raw data. The deployment and configuration of these networks require data fusion processing that includes network and service management and enhances the performance and reliability of networks data fusion support systems providing intelligent capabilities for real-time control access and fire detection.

  5. Optimalization of Beacon Selection for Localization in Wireless AD-HOC Networks

    Directory of Open Access Journals (Sweden)

    Martin Matula

    2008-01-01

    Full Text Available In this paper we engage in optimalization of convenient beacons for localization position of a node in the ad-hoc network. An algorithm designed by us localizes position of moving or static node by RSS (Received Signal Strength method and trilateration. At first, localization of unknown node runs by combination of all beacons. Than optimalizating algorithmreduces the number of beacons (and repeats localization, while only three left. Its reduction is based on highest levels of received signal strength. It is only when signals are from the nearest beacons. Position localizating exactness is statistically interpreted from all localization by beacons combination and its repeating.

  6. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  7. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  8. Using team cognitive work analysis to reveal healthcare team interactions in a birthing unit.

    Science.gov (United States)

    Ashoori, Maryam; Burns, Catherine M; d'Entremont, Barbara; Momtahan, Kathryn

    2014-01-01

    Cognitive work analysis (CWA) as an analytical approach for examining complex sociotechnical systems has shown success in modelling the work of single operators. The CWA approach incorporates social and team interactions, but a more explicit analysis of team aspects can reveal more information for systems design. In this paper, Team CWA is explored to understand teamwork within a birthing unit at a hospital. Team CWA models are derived from theories and models of teamwork and leverage the existing CWA approaches to analyse team interactions. Team CWA is explained and contrasted with prior approaches to CWA. Team CWA does not replace CWA, but supplements traditional CWA to more easily reveal team information. As a result, Team CWA may be a useful approach to enhance CWA in complex environments where effective teamwork is required. This paper looks at ways of analysing cognitive work in healthcare teams. Team Cognitive Work Analysis, when used to supplement traditional Cognitive Work Analysis, revealed more team information than traditional Cognitive Work Analysis. Team Cognitive Work Analysis should be considered when studying teams.

  9. Using team cognitive work analysis to reveal healthcare team interactions in a birthing unit

    Science.gov (United States)

    Ashoori, Maryam; Burns, Catherine M.; d'Entremont, Barbara; Momtahan, Kathryn

    2014-01-01

    Cognitive work analysis (CWA) as an analytical approach for examining complex sociotechnical systems has shown success in modelling the work of single operators. The CWA approach incorporates social and team interactions, but a more explicit analysis of team aspects can reveal more information for systems design. In this paper, Team CWA is explored to understand teamwork within a birthing unit at a hospital. Team CWA models are derived from theories and models of teamworkand leverage the existing CWA approaches to analyse team interactions. Team CWA is explained and contrasted with prior approaches to CWA. Team CWA does not replace CWA, but supplements traditional CWA to more easily reveal team information. As a result, Team CWA may be a useful approach to enhance CWA in complex environments where effective teamwork is required. Practitioner Summary: This paper looks at ways of analysing cognitive work in healthcare teams. Team Cognitive Work Analysis, when used to supplement traditional Cognitive Work Analysis, revealed more team information than traditional Cognitive Work Analysis. Team Cognitive Work Analysis should be considered when studying teams PMID:24837514

  10. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  11. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  12. Non-ad-hoc decision rule for the Dempster-Shafer method of evidential reasoning

    Science.gov (United States)

    Cheaito, Ali; Lecours, Michael; Bosse, Eloi

    1998-03-01

    This paper is concerned with the fusion of identity information through the use of statistical analysis rooted in Dempster-Shafer theory of evidence to provide automatic identification aboard a platform. An identity information process for a baseline Multi-Source Data Fusion (MSDF) system is defined. The MSDF system is applied to information sources which include a number of radars, IFF systems, an ESM system, and a remote track source. We use a comprehensive Platform Data Base (PDB) containing all the possible identity values that the potential target may take, and we use the fuzzy logic strategies which enable the fusion of subjective attribute information from sensor and the PDB to make the derivation of target identity more quickly, more precisely, and with statistically quantifiable measures of confidence. The conventional Dempster-Shafer lacks a formal basis upon which decision can be made in the face of ambiguity. We define a non-ad hoc decision rule based on the expected utility interval for pruning the `unessential' propositions which would otherwise overload the real-time data fusion systems. An example has been selected to demonstrate the implementation of our modified Dempster-Shafer method of evidential reasoning.

  13. Embedded Disposable Functionalized Electrochemical Biosensor with a 3D-Printed Flow Cell for Detection of Hepatic Oval Cells (HOCs

    Directory of Open Access Journals (Sweden)

    Samar Damiati

    2018-02-01

    Full Text Available Hepatic oval cells (HOCs are considered the progeny of the intrahepatic stem cells that are found in a small population in the liver after hepatocyte proliferation is inhibited. Due to their small number, isolation and capture of these cells constitute a challenging task for immunosensor technology. This work describes the development of a 3D-printed continuous flow system and exploits disposable screen-printed electrodes for the rapid detection of HOCs that over-express the OV6 marker on their membrane. Multiwall carbon nanotube (MWCNT electrodes have a chitosan film that serves as a scaffold for the immobilization of oval cell marker antibodies (anti-OV6-Ab, which enhance the sensitivity of the biomarker and makes the designed sensor specific for oval cells. The developed sensor can be easily embedded into the 3D-printed flow cell to allow cells to be exposed continuously to the functionalized surface. The continuous flow is intended to increase capture of most of the target cells in the specimen. Contact angle measurements were performed to characterize the nature and quality of the modified sensor surface, and electrochemical measurements (cyclic voltammetry (CV and square wave voltammetry (SWV were performed to confirm the efficiency and selectivity of the fabricated sensor to detect HOCs. The proposed method is valuable for capturing rare cells and could provide an effective tool for cancer diagnosis and detection.

  14. Embedded Disposable Functionalized Electrochemical Biosensor with a 3D-Printed Flow Cell for Detection of Hepatic Oval Cells (HOCs)

    Science.gov (United States)

    Peacock, Martin; Leonhardt, Stefan; Damiati, Laila; Baghdadi, Mohammed A.; Schuster, Bernhard

    2018-01-01

    Hepatic oval cells (HOCs) are considered the progeny of the intrahepatic stem cells that are found in a small population in the liver after hepatocyte proliferation is inhibited. Due to their small number, isolation and capture of these cells constitute a challenging task for immunosensor technology. This work describes the development of a 3D-printed continuous flow system and exploits disposable screen-printed electrodes for the rapid detection of HOCs that over-express the OV6 marker on their membrane. Multiwall carbon nanotube (MWCNT) electrodes have a chitosan film that serves as a scaffold for the immobilization of oval cell marker antibodies (anti-OV6-Ab), which enhance the sensitivity of the biomarker and makes the designed sensor specific for oval cells. The developed sensor can be easily embedded into the 3D-printed flow cell to allow cells to be exposed continuously to the functionalized surface. The continuous flow is intended to increase capture of most of the target cells in the specimen. Contact angle measurements were performed to characterize the nature and quality of the modified sensor surface, and electrochemical measurements (cyclic voltammetry (CV) and square wave voltammetry (SWV)) were performed to confirm the efficiency and selectivity of the fabricated sensor to detect HOCs. The proposed method is valuable for capturing rare cells and could provide an effective tool for cancer diagnosis and detection. PMID:29443890

  15. Embedded Disposable Functionalized Electrochemical Biosensor with a 3D-Printed Flow Cell for Detection of Hepatic Oval Cells (HOCs).

    Science.gov (United States)

    Damiati, Samar; Peacock, Martin; Leonhardt, Stefan; Damiati, Laila; Baghdadi, Mohammed A; Becker, Holger; Kodzius, Rimantas; Schuster, Bernhard

    2018-02-14

    Hepatic oval cells (HOCs) are considered the progeny of the intrahepatic stem cells that are found in a small population in the liver after hepatocyte proliferation is inhibited. Due to their small number, isolation and capture of these cells constitute a challenging task for immunosensor technology. This work describes the development of a 3D-printed continuous flow system and exploits disposable screen-printed electrodes for the rapid detection of HOCs that over-express the OV6 marker on their membrane. Multiwall carbon nanotube (MWCNT) electrodes have a chitosan film that serves as a scaffold for the immobilization of oval cell marker antibodies (anti-OV6-Ab), which enhance the sensitivity of the biomarker and makes the designed sensor specific for oval cells. The developed sensor can be easily embedded into the 3D-printed flow cell to allow cells to be exposed continuously to the functionalized surface. The continuous flow is intended to increase capture of most of the target cells in the specimen. Contact angle measurements were performed to characterize the nature and quality of the modified sensor surface, and electrochemical measurements (cyclic voltammetry (CV) and square wave voltammetry (SWV)) were performed to confirm the efficiency and selectivity of the fabricated sensor to detect HOCs. The proposed method is valuable for capturing rare cells and could provide an effective tool for cancer diagnosis and detection.

  16. Reducing Congestion in Obstructed Highways with Traffic Data Dissemination Using Ad hoc Vehicular Networks

    OpenAIRE

    Thomas D. Hewer; Maziar Nekovee; Peter V. Coveney

    2010-01-01

    Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITSs) and location-aware services. The ability to disseminate information in an ad hoc fashion allows pertinent information to propagate faster through a network. In the realm of ITS, the ability to spread warning information faster and further is of great advantage to receivers. In this paper we propose and present a message-dissemination procedure that uses vehicular wireless protocols to influence...

  17. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  18. EFECTO DE LOS OBSTÁCULOS TIPO POLIMERO RESINA EN RENDIMIENTO DE REDES TCP/IP/IEEE 802.11g MODO AD-HOC

    OpenAIRE

    Márquez Barriobero, David

    2011-01-01

    La investigación tiene como objetivo primordial el desarrollo de un modelo matemático para evaluar el efecto de los obstáculos de tipo polímero resina en el rendimiento de redes TCP/IP/IEEE 802.11g modo ad-hoc; esto con el propósito de establecer la relación existente entre el diámetro de los obstáculos de tipo polímero resina y el rendimiento de una red inalámbrica en modo ad-hoc, al transmitir datos vía protocolo FTP. El tipo de investigación es explicativa con un diseño experimental. Los t...

  19. Pseudo-Coherence-Based MVDR Beamformer for Speech Enhancement with Ad Hoc Microphone Arrays

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Christensen, Mads Græsbøll

    2015-01-01

    Speech enhancement with distributed arrays has been met with various methods. On the one hand, data independent methods require information about the position of sensors, so they are not suitable for dynamic geometries. On the other hand, Wiener-based methods cannot assure a distortionless output....... This paper proposes minimum variance distortionless response filtering based on multichannel pseudo-coherence for speech enhancement with ad hoc microphone arrays. This method requires neither position information nor control of the trade-off used in the distortion weighted methods. Furthermore, certain...

  20. A time-based admission control mechanism for IEEE 802.11 ad Hoc networks

    OpenAIRE

    Costa, Luís Henrique M. K.; Cerveira, Carlos Rodrigo

    2006-01-01

    This paper presents a time-based admission control mechanism (TAC) for IEEE 802.11 ad hoc networks. The proposed mechanism was adapted to the QoS AODV routing protocol, which takes the quality of service requirements of the data flow into account in the route discovery process. TAC-AODV estimates the idle time of the physical medium based on the frames listened. The incoming traffic is admitted according to the offered load as well as the intra-flow interference, calculated based on the numbe...

  1. A patient post hoc perspective on advantages and disadvantages of blended cognitive behaviour therapy for depression: A qualitative content analysis.

    Science.gov (United States)

    Urech, Antoine; Krieger, Tobias; Möseneder, Laura; Biaggi, Adriana; Vincent, Alessia; Poppe, Christine; Meyer, Björn; Riper, Heleen; Berger, Thomas

    2018-01-31

    Blended cognitive behavioural therapy (bCBT), which combines face-to-face (FtF), and internet-based cognitive behavioural therapy (iCBT), may be a particularly promising approach, but little is known about the effectiveness and patients' subjective evaluations of the bCBT format. The aim of this qualitative study is to explore perceived advantages and disadvantages of bCBT from the patients' perspective in specialized mental health care. Semi-structured interviews were conducted with 15 patients suffering from major depression who underwent treatment in a bCBT format. The interview data were processed by means of a qualitative content analysis. The content analysis generated 18 advantages and 15 disadvantages which were grouped into 6 main topics. In general, bCBT was perceived as purposive and effective for treating depression. The patients perceived the combined treatment as complementary and emphasized the advantage of the constant availability of the online programme. Furthermore, a segment analysis revealed that patients reported different advantages and disadvantages of bCBT as a function of the severity of their depressive episode. The findings of the present study reveal advantages and disadvantages of bCBT, which should be taken into account in the further implementation of this new treatment format.

  2. A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Niranjan Kumar Ray

    2016-01-01

    Full Text Available We proposed an energy conservation technique called Location Based Topology Control with Sleep Scheduling for ad hoc networks. It uses the feature of both topology control approach and power management approach. Like the topology control approach, it attempts to reduce the transmission power of a node, which is determined from its neighborhood location information. A node goes to sleep state based on the traffic condition as that of power management approach. In the proposed scheme, a node goes to sleep state only when its absence does not create local partition in its neighborhood. We preformed extensive simulation to compare the proposed scheme with existing ones. Simulation results show that the energy consumption is lower with increase in the network lifetime and higher throughput in the proposed scheme.

  3. Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yen-Chieh Ouyang

    2010-02-01

    Full Text Available This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks.

  4. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  5. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  6. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  7. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  8. Robotic disaster recovery efforts with ad-hoc deployable cloud computing

    Science.gov (United States)

    Straub, Jeremy; Marsh, Ronald; Mohammad, Atif F.

    2013-06-01

    Autonomous operations of search and rescue (SaR) robots is an ill posed problem, which is complexified by the dynamic disaster recovery environment. In a typical SaR response scenario, responder robots will require different levels of processing capabilities during various parts of the response effort and will need to utilize multiple algorithms. Placing these capabilities onboard the robot is a mediocre solution that precludes algorithm specific performance optimization and results in mediocre performance. Architecture for an ad-hoc, deployable cloud environment suitable for use in a disaster response scenario is presented. Under this model, each service provider is optimized for the task and maintains a database of situation-relevant information. This service-oriented architecture (SOA 3.0) compliant framework also serves as an example of the efficient use of SOA 3.0 in an actual cloud application.

  9. Making friends on the fly advances in ad hoc teamwork

    CERN Document Server

    Barrett, Samuel

    2015-01-01

    This book is devoted to the encounter and interaction of agents such as robots with other agents and describes how they cooperate with their previously unknown teammates, forming an Ad Hoc team. It presents a new algorithm, PLASTIC, that allows agents to quickly adapt to new teammates by reusing knowledge learned from previous teammates.  PLASTIC is instantiated in both a model-based approach, PLASTIC-Model, and a policy-based approach, PLASTIC-Policy.  In addition to reusing knowledge learned from previous teammates, PLASTIC also allows users to provide expert-knowledge and can use transfer learning (such as the new TwoStageTransfer algorithm) to quickly create models of new teammates when it has some information about its new teammates. The effectiveness of the algorithm is demonstrated on three domains, ranging from multi-armed bandits to simulated robot soccer games.

  10. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  11. A Routing Strategy for Non-Cooperation Wireless Multi-Hop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dung T. Tran

    2012-01-01

    Full Text Available Choosing routes such that the network lifetime is maximized in a wireless network with limited energy resources is a major routing problem in wireless multi-hop ad hoc networks. In this paper, we study the problem where participants are rationally selfish and non-cooperative. By selfish we designate the users who are ready to tamper with their source-routing (senders could choose intermediate nodes in the routing paths or next hop selection strategies in order to increase the total number of packets transmitted, but do not try to harm or drop packets of the other nodes. The problem therefore amounts to a non-cooperative game. In the works [2,6,19,23], the authors show that the game admits Nash equilibria [1]. Along this line, we first show that if the cost function is linear, this game has pure-strategy equilibrium flow even though participants have different demands. However, finding a Nash equilibrium for a normal game is computationally hard [9]. In this work, inspired by mixed-strategy equilibrium, we propose a simple local routing algorithm called MIxed Path Routing protocol (MiPR. Using analysis and simulations, we show that MiPR drives the system to an equilibrium state where selfish participants do not have incentive to deviate. Moreover, MiPR significantly improves the network lifetime as compared to original routing protocols.

  12. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  13. A Rate-Adaptive MAC Protocol Based on TCP throughput for Ad Hoc Networks in Fading Channels

    Directory of Open Access Journals (Sweden)

    Shoko Uchida

    2008-10-01

    Full Text Available Wireless technology is becoming a leading option for future Internet access. Transmission Control Protocol (TCP is one of the protocols designed on the basis of the transmission characteristics in wired networks. It is known that the TCP performance deteriorates drastically under a wireless communication environment. On the other hand, many wireless networking standards such as IEEE 802.11a, 802.11b, and 802.11g have multirate capability. Therefore, adaptive rate control methods have been proposed for ad hoc networks. However, almost methods require the modification of the request to send (RTS and clear to send (CTS packets. Therefore, the conventional methods are not compatible with the standardized system. In this paper, we propose adaptive rate control mechanisms for ad hoc networks. Our mechanisms are based on the RTS/CTS mechanisms. However, no modifications to the RTS and CTS packets are required in the proposed method. Therefore, our proposed method can attempt to satisfy the conventional IEEE 802.11 standards. Moreover, an adequate transmission rate is selected based on an estimated TCP throughput performance. From simulation results, it is observed that the proposed method can improve the throughput performance without any modification of packet structures.

  14. Relationship between intraoperative regional cerebral oxygen saturation trends and cognitive decline after total knee replacement: a post-hoc analysis.

    Science.gov (United States)

    Salazar, Fátima; Doñate, Marta; Boget, Teresa; Bogdanovich, Ana; Basora, Misericordia; Torres, Ferran; Gracia, Isabel; Fàbregas, Neus

    2014-01-01

    Bilateral regional brain oxygen saturation (rSO2) trends, reflecting intraoperative brain oxygen imbalance, could warn of brain dysfunction. Various types of cognitive impairment, such as memory decline, alterations in executive function or subjective complaints, have been described three months after surgery. Our aim was to explore the potential utility of rSO2 values as a warning sign for the development of different types of decline in postoperative psychological function. Observational post-hoc analysis of data for the patient sample (n = 125) of a previously conducted clinical trial in patients over the age of 65 years undergoing total knee replacement under spinal anesthesia. Demographic, hemodynamic and bilateral rSO2 intraoperative values were recorded. An absolute rSO2 value of 20% or >25% below baseline were chosen as relevant cutoffs. Composite function test scores were created from baseline to three months for each patient and adjusted for the mean (SD) score changes for a control group (n = 55). Tests were used to assess visual-motor coordination and executive function (VM-EF) (Wechsler Digit Symbol-Coding and Visual Reproduction, Trail Making Test) and memory (Auditory Verbal Learning, Wechsler Memory Scale); scales were used to assess psychological symptoms. We observed no differences in baseline rSO2 values; rSO2 decreased significantly in all patients during surgery (P Left and right rSO2 values were asymmetric in patients who had memory decline (mean [SD] left-right ratio of 95.03 [8.51] vs 101.29 [6.7] for patients with no changes, P = 0.0012). The mean right-left difference in rSO2 was also significant in these patients (-2.87% [4.73%], lower on the right, P = 0.0034). Detection of a trend to asymmetry in rSO2 values can warn of possible postoperative onset of memory decline. Psychological symptoms and memory decline were common three months after knee replacement in our patients over the age of 65 years.

  15. Validation of previously reported predictors for radiation-induced hypothyroidism in nasopharyngeal cancer patients treated with intensity-modulated radiation therapy, a post hoc analysis from a Phase III randomized trial.

    Science.gov (United States)

    Lertbutsayanukul, Chawalit; Kitpanit, Sarin; Prayongrat, Anussara; Kannarunimit, Danita; Netsawang, Buntipa; Chakkabat, Chakkapong

    2018-05-10

    This study aimed to validate previously reported dosimetric parameters, including thyroid volume, mean dose, and percentage thyroid volume, receiving at least 40, 45 and 50 Gy (V40, V45 and V50), absolute thyroid volume spared (VS) from 45, 50 and 60 Gy (VS45, VS50 and VS60), and clinical factors affecting the development of radiation-induced hypothyroidism (RHT). A post hoc analysis was performed in 178 euthyroid nasopharyngeal cancer (NPC) patients from a Phase III study comparing sequential versus simultaneous-integrated boost intensity-modulated radiation therapy. RHT was determined by increased thyroid-stimulating hormone (TSH) with or without reduced free thyroxin, regardless of symptoms. The median follow-up time was 42.5 months. The 1-, 2- and 3-year freedom from RHT rates were 78.4%, 56.4% and 43.4%, respectively. The median latency period was 21 months. The thyroid gland received a median mean dose of 53.5 Gy. Female gender, smaller thyroid volume, higher pretreatment TSH level (≥1.55 μU/ml) and VS60 treatment planning.

  16. Dating currency crises with ad hoc and extreme value-based thresholds : East Asia 1970-2002 [dating currency crises

    NARCIS (Netherlands)

    Lestano, L; Jacobs, Jan P. A. M.

    2007-01-01

    Generally a currency crisis is defined to occur if an index of currency pressure exceeds a threshold. This paper compares currency crisis dating methods. For two definitions of currency pressure we contrast ad hoc and extreme value-based thresholds. We illustrate the methods with data of six East

  17. Novel store–carry–forward scheme for message dissemination in vehicular ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Truc D.T. Nguyen

    2017-12-01

    Full Text Available To improve traffic safety in intelligent transportation systems, vehicles formed by vehicular ad-hoc networks (VANETs conventionally disseminate warning messages to their nearby vehicles as soon as a dangerous situation occurs. In this paper, we propose a novel scheme employing a novel story–carry–forward (SCF mechanism to tackle the network partition and broadcast storm problems, which are two major challenges in VANETs. The experimental result in the Veins simulation framework shows that the proposed SCF scheme significantly mitigates broadcast storms relative to other schemes, and maintains good coverage across various traffic densities.

  18. Vertical Coordination in Organic Food Chains: A Survey Based Analysis in France, Italy and Spain

    Directory of Open Access Journals (Sweden)

    Alessia Cavaliere

    2016-06-01

    Full Text Available The paper analyses characteristics of vertical relationships of organic supply chains with a specific focus on the processing and retailing sectors. The analysis takes into account different regions of the EU Mediterranean area. Data were collected through interviews using an ad hoc questionnaire. The survey was based on a sample of 306 firms, including processors and retailers. The analysis revealed that a relevant aspect for the processing firms of organic products concerns the guaranteeing of safety and quality levels for the products. The main tools to implement the quality management are based on the adoption of specific production regulations and quality controls. The premium price most frequently applied by processors ranges from 10% to 40% and similar values are revealed for retailers. The diffusion of supply contracts allows the vertical coordination between agriculture and processing firms in the organic supply chains. The main distribution channels for the processing firms are represented by specialised shops in organic products, direct sales and supermarkets.

  19. Sequence analysis of serum albumins reveals the molecular evolution of ligand recognition properties.

    Science.gov (United States)

    Fanali, Gabriella; Ascenzi, Paolo; Bernardi, Giorgio; Fasano, Mauro

    2012-01-01

    Serum albumin (SA) is a circulating protein providing a depot and carrier for many endogenous and exogenous compounds. At least seven major binding sites have been identified by structural and functional investigations mainly in human SA. SA is conserved in vertebrates, with at least 49 entries in protein sequence databases. The multiple sequence analysis of this set of entries leads to the definition of a cladistic tree for the molecular evolution of SA orthologs in vertebrates, thus showing the clustering of the considered species, with lamprey SAs (Lethenteron japonicum and Petromyzon marinus) in a separate outgroup. Sequence analysis aimed at searching conserved domains revealed that most SA sequences are made up by three repeated domains (about 600 residues), as extensively characterized for human SA. On the contrary, lamprey SAs are giant proteins (about 1400 residues) comprising seven repeated domains. The phylogenetic analysis of the SA family reveals a stringent correlation with the taxonomic classification of the species available in sequence databases. A focused inspection of the sequences of ligand binding sites in SA revealed that in all sites most residues involved in ligand binding are conserved, although the versatility towards different ligands could be peculiar of higher organisms. Moreover, the analysis of molecular links between the different sites suggests that allosteric modulation mechanisms could be restricted to higher vertebrates.

  20. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  1. TRIBUNALES PENALES INTERNACIONALES AD HOC DEL POST-GUERRA FRÍA: CAMBIANDO PARADIGMAS EN EL TRATAMIENTO DE CUESTIONES DE GÉNERO

    Directory of Open Access Journals (Sweden)

    Camila Soares Lippi

    2011-12-01

    Full Text Available Analizaremos como la jurisprudencia de los Tribunales Penales Internacionales ad hoc del post-Guerra Fría representa un cambio de paradigmas en cuestiones de género en el Derecho Penal Internacional y en el Derecho Internacional Humanitario. Para eso, partimos del concepto de género, o sea, las construcciones sociales cuanto a los roles masculino y femenino, como categoría central de análisis. Analizamos, primeramente, el post-Segunda Guerra Mundial. Ese momento histórico, ejemplificado por los Tribunales de Núremberg y de Tokio y por los Convenios de Ginebra de 1949. Después analizase los Tribunales Penales Internacionales ad hoc del post-Guerra Fría. Finalmente, analizamos la definición de género en el Estatuto de Roma, que instituye el Tribunal Penal Internacional.

  2. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  3. EXPLORATORY DATA ANALYSIS AND MULTIVARIATE STRATEGIES FOR REVEALING MULTIVARIATE STRUCTURES IN CLIMATE DATA

    Directory of Open Access Journals (Sweden)

    2016-12-01

    Full Text Available This paper is on data analysis strategy in a complex, multidimensional, and dynamic domain. The focus is on the use of data mining techniques to explore the importance of multivariate structures; using climate variables which influences climate change. Techniques involved in data mining exercise vary according to the data structures. The multivariate analysis strategy considered here involved choosing an appropriate tool to analyze a process. Factor analysis is introduced into data mining technique in order to reveal the influencing impacts of factors involved as well as solving for multicolinearity effect among the variables. The temporal nature and multidimensionality of the target variables is revealed in the model using multidimensional regression estimates. The strategy of integrating the method of several statistical techniques, using climate variables in Nigeria was employed. R2 of 0.518 was obtained from the ordinary least square regression analysis carried out and the test was not significant at 5% level of significance. However, factor analysis regression strategy gave a good fit with R2 of 0.811 and the test was significant at 5% level of significance. Based on this study, model building should go beyond the usual confirmatory data analysis (CDA, rather it should be complemented with exploratory data analysis (EDA in order to achieve a desired result.

  4. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  5. Atorvastatin in stroke: a review of SPARCL and subgroup analysis

    Directory of Open Access Journals (Sweden)

    Branko N Huisa

    2010-03-01

    Full Text Available Branko N Huisa, Andrew B Stemer, Justin A ZivinDepartment of Neuroscience University of California, San Diego, CA, USAAbstract: Statin therapy in patients with cardiovascular disease is associated with reduced incidence of stroke. The Stroke Prevention by Aggressive Reduction of Cholesterol Levels (SPARCL trial showed daily treatment with 80 mg of atorvastatin in patients with a recent stroke or transient ischemic attack (TIA reduced the incidence of fatal or nonfatal stroke by 16%. Several post hoc analyses of different subgroups followed the SPARCL study. They have not revealed any significant differences when patients were sorted by age, sex, presence of carotid disease or type of stroke, with the exception of intracranial hemorrhage as the entry event. Lower low-density lipoprotein cholesterol levels in addition to possible neuroprotective mechanisms due to atorvastatin treatment correlate with improved risk reduction. Although not predefined subgroups and subject to an insufficient power, these post hoc studies have generated new clinical questions. However, clinicians should avoid denying therapy based on such subgroup analysis. At this point, the best evidence powerfully demonstrates stroke and TIA patients should be prescribed high dose statin therapy for secondary stroke prevention.Keywords: statins, intracranial hemorrhage, neuroprotection, outcome, prevention, carotid stenosis, transient ischemic attack

  6. Analysis of global gene expression in Brachypodium distachyon reveals extensive network plasticity in response to abiotic stress.

    Directory of Open Access Journals (Sweden)

    Henry D Priest

    Full Text Available Brachypodium distachyon is a close relative of many important cereal crops. Abiotic stress tolerance has a significant impact on productivity of agriculturally important food and feedstock crops. Analysis of the transcriptome of Brachypodium after chilling, high-salinity, drought, and heat stresses revealed diverse differential expression of many transcripts. Weighted Gene Co-Expression Network Analysis revealed 22 distinct gene modules with specific profiles of expression under each stress. Promoter analysis implicated short DNA sequences directly upstream of module members in the regulation of 21 of 22 modules. Functional analysis of module members revealed enrichment in functional terms for 10 of 22 network modules. Analysis of condition-specific correlations between differentially expressed gene pairs revealed extensive plasticity in the expression relationships of gene pairs. Photosynthesis, cell cycle, and cell wall expression modules were down-regulated by all abiotic stresses. Modules which were up-regulated by each abiotic stress fell into diverse and unique gene ontology GO categories. This study provides genomics resources and improves our understanding of abiotic stress responses of Brachypodium.

  7. Treatment with macrolides and glucocorticosteroids in severe community-acquired pneumonia: A post-hoc exploratory analysis of a randomized controlled trial.

    Directory of Open Access Journals (Sweden)

    Adrian Ceccato

    Full Text Available Systemic corticosteroids have anti-inflammatory effects, whereas macrolides also have immunomodulatory activity in addition to their primary antimicrobial actions. We aimed to evaluate the potential interaction effect between corticosteroids and macrolides on the systemic inflammatory response in patients with severe community-acquired pneumonia to determine if combining these two immunomodulating agents was harmful, or possibly beneficial.We performed a post-hoc exploratory analysis of a randomized clinical trial conducted in three tertiary hospitals in Spain. This trial included patients with severe community-acquired pneumonia with high inflammatory response (C-reactive protein [CRP] >15 mg/dL who were randomized to receive methylprednisolone 0.5 mg/kg/tpd or placebo. The choice of antibiotic treatment was at the physician's discretion. One hundred and six patients were classified into four groups according to antimicrobial therapy combination (β-lactam plus macrolide or β-lactam plus fluoroquinolone and corticosteroid arm (placebo or corticosteroids. The primary outcome was treatment failure (composite outcome of early treatment failure, or of late treatment failure, or of both early and late treatment failure.The methylprednisolone with β-lactam plus macrolide group had more elderly patients, with comorbidities, and higher pneumonia severity index (PSI risk class V, but a lower proportion of intensive care unit admission, compared to the other groups. We found non differences in treatment failure between groups (overall p = 0.374; however, a significant difference in late treatment failure was observed (4 patients in the placebo with β-lactam plus macrolide group (31% vs. 9 patients in the placebo with β-lactam plus fluoroquinolone group (24% vs. 0 patients in the methylprednisolone with β-lactam plus macrolide group (0% vs. 2 patients [5%] in the methylprednisolone with β-lactam plus fluoroquinolone group overall p = 0.009. We found

  8. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Peng Li

    2014-11-01

    Full Text Available In vehicular ad hoc networks, roadside units (RSUs placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU and wireless RSU (w-RSU. c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods.

  9. Re-Analysis of Metagenomic Sequences from Acute Flaccidmyelitis Patients Reveals Alternatives to Enterovirus D68 Infection

    Science.gov (United States)

    2015-07-13

    caused in some cases by infection with enterovirus D68. We found that among the patients whose symptoms were previously attributed to enterovirus D68...distribution is unlimited. Re-analysis of metagenomic sequences from acute flaccidmyelitis patients reveals alternatives to enterovirus D68...Street Baltimore, MD 21218 -2685 ABSTRACT Re-analysis of metagenomic sequences from acute flaccidmyelitis patients reveals alternatives to enterovirus

  10. A regulação ad hoc nas decisões do CADE

    Directory of Open Access Journals (Sweden)

    Tereza Cristine Almeida Braga

    2017-10-01

    Full Text Available Purpose – The paper intends to enlighten the incipient debate concerning the Administrative Council for Economic Defense – CADE’s insertion in Brazilian agencies’ model and discuss the acknowledgement of the authority as a regulatory agency in Brazilian institutional panorama. Methodology/approach/design – Procedural regulatory theories and CADE’s decisions. Findings – CADE plays a regulatory role in the cases submitted to its jurisdiction. Practical implications – CADE being institutionally recognized as a regulatory agency may incur in a review of its role as a policy maker and add complimentary and interdisciplinary knowledge to the various fields of regulation. Originality/value – CADE has been increasingly required by Brazilian society to make interventions in economic domain regarding competition defense. CADE’s decisions are ways of State intervention that are not always considered regulation. Brazilian regulatory agencies governmental plan does not include CADE as a competition fostering agent and as a possible tool of regulation in more specific areas of the economy. However, when CADE applies behavioral and structural remedies in merger control or in analysis of anticompetitive practices the antitrust authority does an ad hoc regulation. Those interventions are able to model and, in some ways, regulate some markets without legal authorization or legal prohibition to CADE’s ruling. Recognizing CADE’s regulatory role may mean the changing from an auxiliary in Brazilian regulatory structure to an effective policy maker agent, process that is able to benefit the whole society.

  11. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    Science.gov (United States)

    Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  12. Optimum Combining for Rapidly Fading Channels in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Sonia Furman

    2003-10-01

    Full Text Available Research and technology in wireless communication systems such as radar and cellular networks have successfully implemented alternative design approaches that utilize antenna array techniques such as optimum combining, to mitigate the degradation effects of multipath in rapid fading channels. In ad hoc networks, these methods have not yet been exploited primarily due to the complexity inherent in the network's architecture. With the high demand for improved signal link quality, devices configured with omnidirectional antennas can no longer meet the growing need for link quality and spectrum efficiency. This study takes an empirical approach to determine an optimum combining antenna array based on 3 variants of interelement spacing. For rapid fading channels, the simulation results show that the performance in the network of devices retrofitted with our antenna arrays consistently exceeded those with an omnidirectional antenna. Further, with the optimum combiner, the performance increased by over 60% compared to that of an omnidirectional antenna in a rapid fading channel.

  13. What lies behind crop decisions?Coming to terms with revealing farmers' preferences

    Science.gov (United States)

    Gomez, C.; Gutierrez, C.; Pulido-Velazquez, M.; López Nicolás, A.

    2016-12-01

    The paper offers a fully-fledged applied revealed preference methodology to screen and represent farmers' choices as the solution of an optimal program involving trade-offs among the alternative welfare outcomes of crop decisions such as profits, income security and management easiness. The recursive two-stage method is proposed as an alternative to cope with the methodological problems inherent to common practice positive mathematical program methodologies (PMP). Differently from PMP, in the model proposed in this paper, the non-linear costs that are required for both calibration and smooth adjustment are not at odds with the assumptions of linear Leontief technologies and fixed crop prices and input costs. The method frees the model from ad-hoc assumptions about costs and then recovers the potential of economic analysis as a means to understand the rationale behind observed and forecasted farmers' decisions and then to enhance the potential of the model to support policy making in relevant domains such as agricultural policy, water management, risk management and climate change adaptation. After the introduction, where the methodological drawbacks and challenges are set up, section two presents the theoretical model, section three develops its empirical application and presents its implementation to a Spanish irrigation district and finally section four concludes and makes suggestions for further research.

  14. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  15. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  16. Validation test case generation based on safety analysis ontology

    International Nuclear Information System (INIS)

    Fan, Chin-Feng; Wang, Wen-Shing

    2012-01-01

    Highlights: ► Current practice in validation test case generation for nuclear system is mainly ad hoc. ► This study designs a systematic approach to generate validation test cases from a Safety Analysis Report. ► It is based on a domain-specific ontology. ► Test coverage criteria have been defined and satisfied. ► A computerized toolset has been implemented to assist the proposed approach. - Abstract: Validation tests in the current nuclear industry practice are typically performed in an ad hoc fashion. This study presents a systematic and objective method of generating validation test cases from a Safety Analysis Report (SAR). A domain-specific ontology was designed and used to mark up a SAR; relevant information was then extracted from the marked-up document for use in automatically generating validation test cases that satisfy the proposed test coverage criteria; namely, single parameter coverage, use case coverage, abnormal condition coverage, and scenario coverage. The novelty of this technique is its systematic rather than ad hoc test case generation from a SAR to achieve high test coverage.

  17. Halogenated organic contaminants (HOCs) in sediment from a highly eutrophicated lake, China: occurrence, distribution and mass inventories.

    Science.gov (United States)

    Wang, Ji-Zhong; Liu, Liang-Ying; Zhang, Kai; Liang, Bo; Li, Guo-Lian; Chen, Tian-Hu

    2012-11-01

    Halogenated organic contaminants (HOCs) including 16 polybrominated diphenyl ethers (PBDEs) and 37 polychlorinated biphenyls (PCBs) were determined in 49 surfacial sediments from Chaohu Lake, a highly eutrophicated lake, China. PBDEs were detected in almost samples with the range of the total concentration (defined as Σ(16)PBDEs) from 0.84 to 86.6 ng g(-1). Compared with the occurrence of PBDEs in Pearl River Delta and Yangtze River Delta in China, lower percentage of BDE-209 over the concentration of Σ(16)PBDEs was inferred by the high-volume application of penta-BDE mixture product for local domestic furniture purpose. The total concentration of 37 PCBs (Σ(37)PCBs) ranged from 0.05 to 3.36 ng g(-1) with the most detection of PCB-1, -4, -52 and -71. Both the concentrations of Σ(16)PBDE and Σ(37)PCB poorly correlated with total organic carbon (TOC), suggesting the significant contribution of phytoplankton organic carbons to sediment TOC. The contamination by PBDEs and PCBs in western region of the lake was significantly more serious than in eastern lake. Our findings about the higher residues of PBDEs and PCBs in sediments at the estuary of Nanfei River compared to the other estuaries also supported the conclusion that urban area (Hefei city) was the main source of PBDEs and PCBs. The comparison with the concentration of HOC in the present study with those in other lacustrine sediments around the world suggested the contamination by PBDEs in Chaohu Lake is at middle of the global concentration range, whereas PCBs is at low end of the global range which could be elucidated by local economic development and historical usage of PBDEs and PCBs. The mass inventories of HOCs in the lake were estimated at 561 and 38 kg, which corresponds to only 0.000006% and 0.0001% of these global historical produce volumes, respectively. Copyright © 2012 Elsevier Ltd. All rights reserved.

  18. Differential proteomic analysis reveals novel links between primary metabolism and antibiotic production in Amycolatopsis balhimycina

    DEFF Research Database (Denmark)

    Gallo, G.; Renzone, G.; Alduina, R.

    2010-01-01

    A differential proteomic analysis, based on 2-DE and MS procedures, was performed on Amycolatopsis balhimycina DSM5908, the actinomycete producing the vancomycin-like antibiotic balhimycin. A comparison of proteomic profiles before and during balhimycin production characterized differentially...... available over the World Wide Web as interactive web pages (http://www.unipa.it/ampuglia/Abal-proteome-maps). Functional clustering analysis revealed that differentially expressed proteins belong to functional groups involved in central carbon metabolism, amino acid metabolism and protein biosynthesis...... intermediates, were upregulated during antibiotic production. qRT-PCR analysis revealed that 8 out of 14 upregulated genes showed a positive correlation between changes at translational and transcriptional expression level. Furthermore, proteomic analysis of two nonproducing mutants, restricted to a sub...

  19. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  20. The Claim Tool Kit for ad hoc recognition of peer entities

    DEFF Research Database (Denmark)

    Seigneur, Jean-Marc; Jensen, Christian D.

    2005-01-01

    In ubiquitous/pervasive computing environments, it is envisaged that computing elements—entities—will start interacting in an ad hoc fashion. The peer-to-peer (p2p) paradigm is appealing for such types of interaction especially with JXTA, which supports the development of reusable p2p building...... blocks, which facilitate implementation on any smart device. However, the inability to rely on a centralised authentication infrastructure, the openness of the environment and the absence of an administrator (it is assumed to be too expensive to have a skilled administrator at hand due to the large...... number of peers) challenge the use of legacy authentication mechanisms. Supporting spontaneous interactions among previously unknown entities requires dynamic enrolment of strangers and unknown entities. Entity recognition (ER) is a process that is carried out each time an interaction happens between...

  1. 78 FR 8145 - Sequence 24 Findings of the EISA 436(h) Ad-Hoc Review Group on Green Building Certification Systems

    Science.gov (United States)

    2013-02-05

    ... EISA 436(h) Ad-Hoc Review Group on Green Building Certification Systems AGENCY: Office of Federal High-Performance Green Buildings; Office of Government-wide Policy, General Services Administration. ACTION... Secretary of Energy that identifies a green building certification system(s) most likely to encourage a...

  2. Radiographic progression with nonrising PSA in metastatic castration-resistant prostate cancer: post hoc analysis of PREVAIL.

    Science.gov (United States)

    Bryce, A H; Alumkal, J J; Armstrong, A; Higano, C S; Iversen, P; Sternberg, C N; Rathkopf, D; Loriot, Y; de Bono, J; Tombal, B; Abhyankar, S; Lin, P; Krivoshik, A; Phung, D; Beer, T M

    2017-06-01

    Advanced prostate cancer is a phenotypically diverse disease that evolves through multiple clinical courses. PSA level is the most widely used parameter for disease monitoring, but it has well-recognized limitations. Unlike in clinical trials, in practice, clinicians may rely on PSA monitoring alone to determine disease status on therapy. This approach has not been adequately tested. Chemotherapy-naive asymptomatic or mildly symptomatic men (n=872) with metastatic castration-resistant prostate cancer (mCRPC) who were treated with the androgen receptor inhibitor enzalutamide in the PREVAIL study were analyzed post hoc for rising versus nonrising PSA (empirically defined as >1.05 vs ⩽1.05 times the PSA level from 3 months earlier) at the time of radiographic progression. Clinical characteristics and disease outcomes were compared between the rising and nonrising PSA groups. Of 265 PREVAIL patients with radiographic progression and evaluable PSA levels on the enzalutamide arm, nearly one-quarter had a nonrising PSA. Median progression-free survival in this cohort was 8.3 months versus 11.1 months in the rising PSA cohort (hazard ratio 1.68; 95% confidence interval 1.26-2.23); overall survival was similar between the two groups, although less than half of patients in either group were still at risk at 24 months. Baseline clinical characteristics of the two groups were similar. Non-rising PSA at radiographic progression is a common phenomenon in mCRPC patients treated with enzalutamide. As restaging in advanced prostate cancer patients is often guided by increases in PSA levels, our results demonstrate that disease progression on enzalutamide can occur without rising PSA levels. Therefore, a disease monitoring strategy that includes imaging not entirely reliant on serial serum PSA measurement may more accurately identify disease progression.

  3. Response to duloxetine in chronic low back pain: exploratory post hoc analysis of a Japanese Phase III randomized study

    Directory of Open Access Journals (Sweden)

    Tsuji T

    2017-09-01

    Full Text Available Toshinaga Tsuji,1 Naohiro Itoh,1 Mitsuhiro Ishida,2 Toshimitsu Ochiai,3 Shinichi Konno4 1Medical Affairs Department, 2Clinical Research Development, 3Biostatistics Department, Shionogi & Co. Ltd, Osaka, 4Department of Orthopedic Surgery, Fukushima Medical University, Fukushima, Japan Purpose: Duloxetine is efficacious for chronic low back pain (CLBP. This post hoc analysis of a Japanese randomized, placebo-controlled trial (ClinicalTrials.gov, NCT01855919 assessed whether patients with CLBP with early pain reduction or treatment-related adverse events of special interest (TR-AESIs; nausea, somnolence, constipation have enhanced responses to duloxetine. Patients and methods: Patients (N = 456 with CLBP for ≥6 months and Brief Pain Inventory (BPI average pain severity score of ≥4 were randomized (1:1 to duloxetine 60 mg/day or placebo for 14 weeks. Primary outcome was change from baseline in BPI average pain severity score (pain reduction. Subgroup analyses included early pain reduction (≥30%, 10%–30%, or <10% at Week 4 and early TR-AESIs (with or without TR-AESIs by Week 2. Measures included changes from baseline in BPI average pain severity score and BPI Interference scores (quality of life; QOL, and response rate (≥30% or ≥50% pain reduction at Week 14. Results: Patients with ≥30% early pain reduction (n = 108 or early TR-AESIs (n = 50 had significantly greater improvements in pain and QOL than placebo-treated patients (n = 226, whereas patients with 10%–30% (n = 63 or <10% (n = 48 pain reduction did not; patients without early TR-AESIs (n = 180 had significant improvements in pain at Week 14. Response rates (≥30%/≥50% pain reduction were 94.4%/82.4%, 66.7%/49.2%, and 25.0%/18.8% for patients with ≥30%, 10%–30%, and <10% early pain reduction, respectively, 74.0%/64.0% for patients with early TR-AESIs, 67.2%/54.4% for patients without early TR-AESIs, and 52.2%/39.4% for placebo.Conclusion: Early pain reduction or TR

  4. Comparative analysis reveals that polyploidy does not decelerate diversification in fish.

    Science.gov (United States)

    Zhan, S H; Glick, L; Tsigenopoulos, C S; Otto, S P; Mayrose, I

    2014-02-01

    While the proliferation of the species-rich teleost fish has been ascribed to an ancient genome duplication event at the base of this group, the broader impact of polyploidy on fish evolution and diversification remains poorly understood. Here, we investigate the association between polyploidy and diversification in several fish lineages: the sturgeons (Acipenseridae: Acipenseriformes), the botiid loaches (Botiidae: Cypriniformes), Cyprininae fishes (Cyprinidae: Cypriniformes) and the salmonids (Salmonidae: Salmoniformes). Using likelihood-based evolutionary methodologies, we co-estimate speciation and extinction rates associated with polyploid vs. diploid fish lineages. Family-level analysis of Acipenseridae and Botiidae revealed no significant difference in diversification rates between polyploid and diploid relatives, while analysis of the subfamily Cyprininae revealed higher polyploid diversification. Additionally, order-level analysis of the polyploid Salmoniformes and its diploid sister clade, the Esociformes, did not support a significantly different net diversification rate between the two groups. Taken together, our results suggest that polyploidy is generally not associated with decreased diversification in fish - a pattern that stands in contrast to that previously observed in plants. While there are notable differences in the time frame examined in the two studies, our results suggest that polyploidy is associated with different diversification patterns in these two major branches of the eukaryote tree of life. © 2014 The Authors. Journal of Evolutionary Biology © 2014 European Society For Evolutionary Biology.

  5. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  6. Does rectal indomethacin eliminate the need for prophylactic pancreatic stent placement in patients undergoing high-risk ERCP? Post hoc efficacy and cost-benefit analyses using prospective clinical trial data.

    Science.gov (United States)

    Elmunzer, B Joseph; Higgins, Peter D R; Saini, Sameer D; Scheiman, James M; Parker, Robert A; Chak, Amitabh; Romagnuolo, Joseph; Mosler, Patrick; Hayward, Rodney A; Elta, Grace H; Korsnes, Sheryl J; Schmidt, Suzette E; Sherman, Stuart; Lehman, Glen A; Fogel, Evan L

    2013-03-01

    A recent large-scale randomized controlled trial (RCT) demonstrated that rectal indomethacin administration is effective in addition to pancreatic stent placement (PSP) for preventing post-endoscopic retrograde cholangiopancreatography (ERCP) pancreatitis (PEP) in high-risk cases. We performed a post hoc analysis of this RCT to explore whether rectal indomethacin can replace PSP in the prevention of PEP and to estimate the potential cost savings of such an approach. We retrospectively classified RCT subjects into four prevention groups: (1) no prophylaxis, (2) PSP alone, (3) rectal indomethacin alone, and (4) the combination of PSP and indomethacin. Multivariable logistic regression was used to adjust for imbalances in the prevalence of risk factors for PEP between the groups. Based on these adjusted PEP rates, we conducted an economic analysis comparing the costs associated with PEP prevention strategies employing rectal indomethacin alone, PSP alone, or the combination of both. After adjusting for risk using two different logistic regression models, rectal indomethacin alone appeared to be more effective for preventing PEP than no prophylaxis, PSP alone, and the combination of indomethacin and PSP. Economic analysis revealed that indomethacin alone was a cost-saving strategy in 96% of Monte Carlo trials. A prevention strategy employing rectal indomethacin alone could save approximately $150 million annually in the United States compared with a strategy of PSP alone, and $85 million compared with a strategy of indomethacin and PSP. This hypothesis-generating study suggests that prophylactic rectal indomethacin could replace PSP in patients undergoing high-risk ERCP, potentially improving clinical outcomes and reducing healthcare costs. A RCT comparing rectal indomethacin alone vs. indomethacin plus PSP is needed.

  7. Effect of fenofibrate on uric acid and gout in type 2 diabetes: a post-hoc analysis of the randomised, controlled FIELD study.

    Science.gov (United States)

    Waldman, Boris; Ansquer, Jean-Claude; Sullivan, David R; Jenkins, Alicia J; McGill, Neil; Buizen, Luke; Davis, Timothy M E; Best, James D; Li, Liping; Feher, Michael D; Foucher, Christelle; Kesaniemi, Y Antero; Flack, Jeffrey; d'Emden, Michael C; Scott, Russell S; Hedley, John; Gebski, Val; Keech, Anthony C

    2018-04-01

    Gout is a painful disorder and is common in type 2 diabetes. Fenofibrate lowers uric acid and reduces gout attacks in small, short-term studies. Whether fenofibrate produces sustained reductions in uric acid and gout attacks is unknown. In the Fenofibrate Intervention and Event Lowering in Diabetes (FIELD) trial, participants aged 50-75 years with type 2 diabetes were randomly assigned to receive either co-micronised fenofibrate 200 mg once per day or matching placebo for a median of 5 years follow-up. We did a post-hoc analysis of recorded on-study gout attacks and plasma uric acid concentrations according to treatment allocation. The outcomes of this analysis were change in uric acid concentrations and risk of on-study gout attacks. The FIELD study is registered with ISRCTN, number ISRCTN64783481. Between Feb 23, 1998, and Nov 3, 2000, 9795 patients were randomly assigned to fenofibrate (n=4895) or placebo (n=4900) in the FIELD study. Uric acid concentrations fell by 20·2% (95% CI 19·9-20·5) during the 6-week active fenofibrate run-in period immediately pre-randomisation (a reduction of 0·06 mmol/L or 1 mg/dL) and remained -20·1% (18·5-21·7, puric acid concentration higher than 0·36 mmol/L and 13·9% in those with baseline uric acid concentration higher than 0·42 mmol/L, compared with 3·4% and 5·7%, respectively, in the fenofibrate group. Risk reductions were similar among men and women and those with dyslipidaemia, on diuretics, and with elevated uric acid concentrations. For participants with elevated baseline uric acid concentrations despite taking allopurinol at study entry, there was no heterogeneity of the treatment effect of fenofibrate on gout risk. Taking account of all gout events, fenofibrate treatment halved the risk (HR 0·48, 95% CI 0·37-0·60; puric acid concentrations by 20%, and almost halved first on-study gout events over 5 years of treatment. Fenofibrate could be a useful adjunct for preventing gout in diabetes. None. Copyright

  8. Modelling of increased homocysteine in ischaemic stroke: post-hoc cross-sectional matched case-control analysis in young patients Aumento de homocisteína em acidente vascular cerebral isquêmico: análise post-hoc com casos controles em pacientes jovens

    Directory of Open Access Journals (Sweden)

    Penka A. Atanassova

    2007-03-01

    Full Text Available BACKGROUND & PURPOSE: Hyperhomocysteinaemia has been postulated to participate in pathogenesis of ischaemic stroke (IS. However, especially in young adults, there is possibility of significantly increased IS risk due to increased ‘normal’ homocysteinaemia, i.e., ‘hidden’ (‘pathologically dormant’ prevalence within a healthy, normally-defined range. We performed a post-hoc modelling investigation on plasma total homocysteinaemia (THCY in gender- and age-matched young patients in the acute IS phase. We evaluated relationships between THCY and prevalence of other potential risk factors in 41 patients vs. 41 healthy controls. METHOD: We used clinical methods, instrumental and neuroimmaging procedures, risk factors examination, total plasma homocysteine measurements and other laboratory and statistical modelling techniques. RESULTS: IS patients and healthy controls were similar not only for matching variables, but also for smoking, main vitamin status, serum creatinine and lipid profile. Patients with IS, however, had lower vitamin B6 levels and higher THCY, fibrinogen and triglycerides (TGL. At multivariate stepwise logistic regression only increased THCY and TGL were significantly and independently associated with the risk for stroke (72% model accuracy, p model=0.001. An increase of THCY with 1.0 µmol/L was associated with 22% higher risk of ischaemic stroke [adjusted OR=1.22 (95%CI 1.03?1.44]. In this way, novel lower cut-off value for HCY of 11.58 µmol/L in younger patients has been revealed (ROC AUC= 0.67, 95CI% 0.55-0.78, p=0.009. CONCLUSION: The new THCY cut-off clearly discriminated between absence and presence of IS (sensitivity>63%, specificity>68% irrespectively of age and gender and may be applied to better evaluate and more precisely define, as earlier as possible, the young patients at increased IS risk.OBJETIVO: Hiperhomocisteinemia tem sido postulada como um dos fatores de risco na patogênese do acidente vascular

  9. A comparison of two follow-up analyses after multiple analysis of variance, analysis of variance, and descriptive discriminant analysis: A case study of the program effects on education-abroad programs

    Science.gov (United States)

    Alvin H. Yu; Garry. Chick

    2010-01-01

    This study compared the utility of two different post-hoc tests after detecting significant differences within factors on multiple dependent variables using multivariate analysis of variance (MANOVA). We compared the univariate F test (the Scheffé method) to descriptive discriminant analysis (DDA) using an educational-tour survey of university study-...

  10. Context dependent off loading for cloudlet in mobile ad-hoc network

    Science.gov (United States)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  11. Robust On-Demand Multipath Routing with Dynamic Path Upgrade for Delay-Sensitive Data over Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Sunil Kumar

    2013-01-01

    Full Text Available Node mobility in mobile ad hoc networks (MANETs causes frequent route breakages and intermittent link stability. In this paper, we introduce a robust routing scheme, known as ad hoc on-demand multipath distance vector with dynamic path update (AOMDV-DPU, for delay-sensitive data transmission over MANET. The proposed scheme improves the AOMDV scheme by incorporating the following features: (i a routing metric based on the combination of minimum hops and received signal strength indicator (RSSI for discovery of reliable routes; (ii a local path update mechanism which strengthens the route, reduces the route breakage frequency, and increases the route longevity; (iii a keep alive mechanism for secondary route maintenance which enables smooth switching between routes and reduces the route discovery frequency; (iv a packet salvaging scheme to improve packet delivery in the event of a route breakage; and (v low HELLO packet overhead. The simulations are carried out in ns-2 for varying node speeds, number of sources, and traffic load conditions. Our AOMDV-DPU scheme achieves significantly higher throughput, lower delay, routing overhead, and route discovery frequency and latency compared to AOMDV. For H.264 compressed video traffic, AOMDV-DPU scheme achieves 3 dB or higher PSNR gain over AOMDV at both low and high node speeds.

  12. Reliable Ant Colony Routing Algorithm for Dual-Channel Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    YongQiang Li

    2018-01-01

    Full Text Available For the problem of poor link reliability caused by high-speed dynamic changes and congestion owing to low network bandwidth in ad hoc networks, an ant colony routing algorithm, based on reliable path under dual-channel condition (DSAR, is proposed. First, dual-channel communication mode is used to improve network bandwidth, and a hierarchical network model is proposed to optimize the dual-layer network. Thus, we reduce network congestion and communication delay. Second, a comprehensive reliable path selection strategy is designed, and the reliable path is selected ahead of time to reduce the probability of routing restart. Finally, the ant colony algorithm is used to improve the adaptability of the routing algorithm to changes of network topology. Simulation results show that DSAR improves the reliability of routing, packet delivery, and throughput.

  13. A high performance, ad-hoc, fuzzy query processing system for relational databases

    Science.gov (United States)

    Mansfield, William H., Jr.; Fleischman, Robert M.

    1992-01-01

    Database queries involving imprecise or fuzzy predicates are currently an evolving area of academic and industrial research. Such queries place severe stress on the indexing and I/O subsystems of conventional database environments since they involve the search of large numbers of records. The Datacycle architecture and research prototype is a database environment that uses filtering technology to perform an efficient, exhaustive search of an entire database. It has recently been modified to include fuzzy predicates in its query processing. The approach obviates the need for complex index structures, provides unlimited query throughput, permits the use of ad-hoc fuzzy membership functions, and provides a deterministic response time largely independent of query complexity and load. This paper describes the Datacycle prototype implementation of fuzzy queries and some recent performance results.

  14. Energy Aware Cluster-Based Routing in Flying Ad-Hoc Networks.

    Science.gov (United States)

    Aadil, Farhan; Raza, Ali; Khan, Muhammad Fahad; Maqsood, Muazzam; Mehmood, Irfan; Rho, Seungmin

    2018-05-03

    Flying ad-hoc networks (FANETs) are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs) represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR) and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.

  15. Energy Aware Cluster-Based Routing in Flying Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Farhan Aadil

    2018-05-01

    Full Text Available Flying ad-hoc networks (FANETs are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.

  16. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  17. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network.

    Science.gov (United States)

    Chen, Yuzhong; Weng, Shining; Guo, Wenzhong; Xiong, Naixue

    2016-02-19

    Vehicular ad hoc networks (VANETs) have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency.

  18. A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Yuzhong Chen

    2016-02-01

    Full Text Available Vehicular ad hoc networks (VANETs have an important role in urban management and planning. The effective integration of vehicle information in VANETs is critical to traffic analysis, large-scale vehicle route planning and intelligent transportation scheduling. However, given the limitations in the precision of the output information of a single sensor and the difficulty of information sharing among various sensors in a highly dynamic VANET, effectively performing data aggregation in VANETs remains a challenge. Moreover, current studies have mainly focused on data aggregation in large-scale environments but have rarely discussed the issue of intra-cluster data aggregation in VANETs. In this study, we propose a multi-player game theory algorithm for intra-cluster data aggregation in VANETs by analyzing the competitive and cooperative relationships among sensor nodes. Several sensor-centric metrics are proposed to measure the data redundancy and stability of a cluster. We then study the utility function to achieve efficient intra-cluster data aggregation by considering both data redundancy and cluster stability. In particular, we prove the existence of a unique Nash equilibrium in the game model, and conduct extensive experiments to validate the proposed algorithm. Results demonstrate that the proposed algorithm has advantages over typical data aggregation algorithms in both accuracy and efficiency.

  19. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

    OpenAIRE

    Shahram Behzad; Reza Fotohi; Shahram Jamali

    2013-01-01

    Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destination...

  20. Modern foreign language teachers - don't leave those kids alone! Linguistic-cultural "give and take" in an ad-hoc tutoring scheme

    Science.gov (United States)

    Leroy, Norah

    2017-08-01

    This paper addresses the theme of social inclusion through language learning. The focus is on an ad-hoc tutoring scheme set up between newly arrived British migrant pupils and French monolingual pupils in a small secondary school in the south-west of France. Though the original objective of this tutoring scheme was to improve the English skills of the younger pupils, feedback reports indicated that it also had a positive impact on the relationship between the British migrant pupils and their French peers. Teachers believed that those involved participated more fully in class, and appeared more self-assured and generally happy thanks to the interpersonal relationships this scheme helped to forge. This study demonstrates the necessity of analysing the socio-cultural context migrants may find themselves in, in order to identify potential challenges. The ad-hoc tutoring scheme described here is an example of how language learning can support the integration and inclusion of "new generation" migrants into everyday school life.

  1. The Impact of Conscious Sedation versus General Anesthesia for Stroke Thrombectomy on the Predictive Value of Collateral Status: A Post Hoc Analysis of the SIESTA Trial.

    Science.gov (United States)

    Schönenberger, S; Pfaff, J; Uhlmann, L; Klose, C; Nagel, S; Ringleb, P A; Hacke, W; Kieser, M; Bendszus, M; Möhlenbruch, M A; Bösel, J

    2017-08-01

    Radiologic selection criteria to identify patients likely to benefit from endovascular stroke treatment are still controversial. In this post hoc analysis of the recent randomized Sedation versus Intubation for Endovascular Stroke TreAtment (SIESTA) trial, we aimed to investigate the impact of sedation mode (conscious sedation versus general anesthesia) on the predictive value of collateral status. Using imaging data from SIESTA, we assessed collateral status with the collateral score of Tan et al and graded it from absent to good collaterals (0-3). We examined the association of collateral status with 24-hour improvement of the NIHSS score, infarct volume, and mRS at 3 months according to the sedation regimen. In a cohort of 104 patients, the NIHSS score improved significantly in patients with moderate or good collaterals (2-3) compared with patients with no or poor collaterals (0-1) ( P = .011; mean, -5.8 ± 7.6 versus -1.1 ± 10.7). Tan 2-3 was also associated with significantly higher ASPECTS before endovascular stroke treatment (median, 9 versus 7; P collateral status (0.1 versus 2.3), the sedation modes conscious sedation and general anesthesia were not associated with significant differences in the predictive value of collateral status regarding infarction size or functional outcome. The sedation mode, conscious sedation or general anesthesia, did not influence the predictive value of collaterals in patients with large-vessel occlusion anterior circulation stroke undergoing thrombectomy in the SIESTA trial. © 2017 by American Journal of Neuroradiology.

  2. Transcriptomic analysis of human retinal detachment reveals both inflammatory response and photoreceptor death.

    Directory of Open Access Journals (Sweden)

    Marie-Noëlle Delyfer

    Full Text Available BACKGROUND: Retinal detachment often leads to a severe and permanent loss of vision and its therapeutic management remains to this day exclusively surgical. We have used surgical specimens to perform a differential analysis of the transcriptome of human retinal tissues following detachment in order to identify new potential pharmacological targets that could be used in combination with surgery to further improve final outcome. METHODOLOGY/PRINCIPAL FINDINGS: Statistical analysis reveals major involvement of the immune response in the disease. Interestingly, using a novel approach relying on coordinated expression, the interindividual variation was monitored to unravel a second crucial aspect of the pathological process: the death of photoreceptor cells. Within the genes identified, the expression of the major histocompatibility complex I gene HLA-C enables diagnosis of the disease, while PKD2L1 and SLCO4A1 -which are both down-regulated- act synergistically to provide an estimate of the duration of the retinal detachment process. Our analysis thus reveals the two complementary cellular and molecular aspects linked to retinal detachment: an immune response and the degeneration of photoreceptor cells. We also reveal that the human specimens have a higher clinical value as compared to artificial models that point to IL6 and oxidative stress, not implicated in the surgical specimens studied here. CONCLUSIONS/SIGNIFICANCE: This systematic analysis confirmed the occurrence of both neurodegeneration and inflammation during retinal detachment, and further identifies precisely the modification of expression of the different genes implicated in these two phenomena. Our data henceforth give a new insight into the disease process and provide a rationale for therapeutic strategies aimed at limiting inflammation and photoreceptor damage associated with retinal detachment and, in turn, improving visual prognosis after retinal surgery.

  3. An epidemic model for biological data fusion in ad hoc sensor networks

    Science.gov (United States)

    Chang, K. C.; Kotari, Vikas

    2009-05-01

    Bio terrorism can be a very refined and a catastrophic approach of attacking a nation. This requires the development of a complete architecture dedicatedly designed for this purpose which includes but is not limited to Sensing/Detection, Tracking and Fusion, Communication, and others. In this paper we focus on one such architecture and evaluate its performance. Various sensors for this specific purpose have been studied. The accent has been on use of Distributed systems such as ad-hoc networks and on application of epidemic data fusion algorithms to better manage the bio threat data. The emphasis has been on understanding the performance characteristics of these algorithms under diversified real time scenarios which are implemented through extensive JAVA based simulations. Through comparative studies on communication and fusion the performance of channel filter algorithm for the purpose of biological sensor data fusion are validated.

  4. Revealing the equivalence of two clonal survival models by principal component analysis

    International Nuclear Information System (INIS)

    Lachet, Bernard; Dufour, Jacques

    1976-01-01

    The principal component analysis of 21 chlorella cell survival curves, adjusted by one-hit and two-hit target models, lead to quite similar projections on the principal plan: the homologous parameters of these models are linearly correlated; the reason for the statistical equivalence of these two models, in the present state of experimental inaccuracy, is revealed [fr

  5. Indomethacin reduces glomerular and tubular damage markers but not renal inflammation in chronic kidney disease patients: a post-hoc analysis.

    Directory of Open Access Journals (Sweden)

    Martin H de Borst

    Full Text Available Under specific conditions non-steroidal anti-inflammatory drugs (NSAIDs may be used to lower therapy-resistant proteinuria. The potentially beneficial anti-proteinuric, tubulo-protective, and anti-inflammatory effects of NSAIDs may be offset by an increased risk of (renal side effects. We investigated the effect of indomethacin on urinary markers of glomerular and tubular damage and renal inflammation. We performed a post-hoc analysis of a prospective open-label crossover study in chronic kidney disease patients (n = 12 with mild renal function impairment and stable residual proteinuria of 4.7±4.1 g/d. After a wash-out period of six wks without any RAAS blocking agents or other therapy to lower proteinuria (untreated proteinuria (UP, patients subsequently received indomethacin 75 mg BID for 4 wks (NSAID. Healthy subjects (n = 10 screened for kidney donation served as controls. Urine and plasma levels of total IgG, IgG4, KIM-1, beta-2-microglobulin, H-FABP, MCP-1 and NGAL were determined using ELISA. Following NSAID treatment, 24 h -urinary excretion of glomerular and proximal tubular damage markers was reduced in comparison with the period without anti-proteinuric treatment (total IgG: UP 131[38-513] vs NSAID 38[17-218] mg/24 h, p<0.01; IgG4: 50[16-68] vs 10[1-38] mg/24 h, p<0.001; beta-2-microglobulin: 200[55-404] vs 50[28-110] ug/24 h, p = 0.03; KIM-1: 9[5]-[14] vs 5[2]-[9] ug/24 h, p = 0.01. Fractional excretions of these damage markers were also reduced by NSAID. The distal tubular marker H-FABP showed a trend to reduction following NSAID treatment. Surprisingly, NSAID treatment did not reduce urinary excretion of the inflammation markers MCP-1 and NGAL, but did reduce plasma MCP-1 levels, resulting in an increased fractional MCP-1 excretion. In conclusion, the anti-proteinuric effect of indomethacin is associated with reduced urinary excretion of glomerular and tubular damage markers, but not with reduced excretion of renal

  6. Evaluation of patient-rated stiffness associated with fibromyalgia: a post-hoc analysis of 4 pooled, randomized clinical trials of duloxetine.

    Science.gov (United States)

    Bennett, Robert; Russell, I Jon; Choy, Ernest; Spaeth, Michael; Mease, Philip; Kajdasz, Daniel; Walker, Daniel; Wang, Fujun; Chappell, Amy

    2012-04-01

    Patients with fibromyalgia (FM) rate stiffness as one of the most troublesome symptoms of the disorder. However, there are few published studies that have focused on better understanding the nature of stiffness in FM. The primary objectives of these analyses were to characterize the distribution of stiffness severity in patients at baseline, evaluate changes in stiffness after 12 weeks of treatment with duloxetine, and determine which outcomes were correlated with stiffness. These were post-hoc analyses of 3-month data from 4 randomized, double-blind, placebo-controlled studies that assessed efficacy of duloxetine in adults with FM. Severity of stiffness was assessed by using the Fibromyalgia Impact Questionnaire (FIQ) on a scale from 0 (no stiffness) to 10 (most severe stiffness). The association between changes in stiffness and other measures was evaluated by using Pearson's correlation coefficient. The FIQ total score and items, the Brief Pain Inventory (BPI-modified short form), the Clinical Global Impression-Severity scale, the Multidimensional Fatigue Inventory, the 17-item Hamilton Depression Rating Scale, the Sheehan Disability Scale, the 36-item Short-Form Health Survey, and the EuroQoL Questionnaire-5 Dimensions were evaluated in the correlation analyses. Stepwise linear regression was used to identify the variables that were most highly predictive of the changes in FIQ stiffness. The analysis included 1332 patients (mean age, 50.2 years; 94.7% female; and 87.8% white). The mean (SD) baseline FIQ stiffness score was 7.7 (2.0), and this score correlated with baseline BPI pain score and FIQ function. Duloxetine significantly improved the FIQ stiffness score compared with placebo (P FIQ pain and interference scores, FIQ nonrefreshing sleep, FIQ anxiety, 36-item Short-Form Health Survey bodily pain, and Sheehan Disability Scale total score. Variables related to severity of pain, pain interfering with daily activities, and physical functioning were predictors

  7. Changes in cod muscle proteins during frozen storage revealed by proteome analysis and multivariate data analysis

    DEFF Research Database (Denmark)

    Kjærsgård, Inger Vibeke Holst; Nørrelykke, M.R.; Jessen, Flemming

    2006-01-01

    Multivariate data analysis has been combined with proteomics to enhance the recovery of information from 2-DE of cod muscle proteins during different storage conditions. Proteins were extracted according to 11 different storage conditions and samples were resolved by 2-DE. Data generated by 2-DE...... was subjected to principal component analysis (PCA) and discriminant partial least squares regression (DPLSR). Applying PCA to 2-DE data revealed the samples to form groups according to frozen storage time, whereas differences due to different storage temperatures or chilled storage in modified atmosphere...... light chain 1, 2 and 3, triose-phosphate isomerase, glyceraldehyde-3-phosphate dehydrogenase, aldolase A and two ?-actin fragments, and a nuclease diphosphate kinase B fragment to change in concentration, during frozen storage. Application of proteomics, multivariate data analysis and MS/MS to analyse...

  8. The PREVAIL trial of enzalutamide in men with chemotherapy-naïve, metastatic castration-resistant prostate cancer: Post hoc analysis of Korean patients.

    Science.gov (United States)

    Kim, Choung-Soo; Theeuwes, Ad; Kwon, Dong Deuk; Choi, Young Deuk; Chung, Byung Ha; Lee, Hyun Moo; Lee, Kang Hyun; Lee, Sang Eun

    2016-05-01

    This post hoc analysis evaluated treatment effects, safety, and pharmacokinetics of enzalutamide in Korean patients in the phase 3, double-blind, placebo-controlled PREVAIL trial. Asymptomatic or mildly symptomatic chemotherapy-naive men with metastatic castration-resistant prostate cancer that progressed on androgen deprivation therapy received 160 mg/d oral enzalutamide or placebo (1:1) until death or discontinuation due to radiographic progression or skeletal-related event and initiation of subsequent therapy. Coprimary end points were centrally assessed radiographic progression-free survival (rPFS) and overall survival (OS). Secondary end points included investigator-assessed rPFS, time to initiation of chemotherapy, time to prostate-specific antigen (PSA) progression, PSA response (≥50% decline), and time to skeletal-related event. Of 1,717 total patients, 78 patients were enrolled in Korea (enzalutamide, n=40; placebo, n=38). Hazard ratios (95% confidence interval) for enzalutamide versus placebo were 0.23 (0.02-2.24) for centrally assessed rPFS, 0.77 (0.28-2.15) for OS, 0.21 (0.08-0.51) for time to chemotherapy, and 0.31 (0.17-0.56) for time to PSA progression. A PSA response was observed in 70.0% of enzalutamide-treated and 10.5% of placebo-treated Korean patients. Adverse events of grade ≥3 occurred in 33% of enzalutamide-treated and 11% of placebo-treated Korean patients, with median treatment durations of 13.0 and 5.1 months, respectively. At 13 weeks, the plasma concentration of enzalutamide plus N-desmethyl enzalutamide was similar in Korean and non-Korean patients (geometric mean ratio, 1.04; 90% confidence interval, 0.97-1.10). In Korean patients, treatment effects and safety of enzalutamide were consistent with those observed in the overall PREVAIL study population (ClinicalTrials.gov Identifier: NCT01212991).

  9. Automatically assessing properties of dynamic cameras for camera selection and rapid deployment of video content analysis tasks in large-scale ad-hoc networks

    Science.gov (United States)

    den Hollander, Richard J. M.; Bouma, Henri; van Rest, Jeroen H. C.; ten Hove, Johan-Martijn; ter Haar, Frank B.; Burghouts, Gertjan J.

    2017-10-01

    Video analytics is essential for managing large quantities of raw data that are produced by video surveillance systems (VSS) for the prevention, repression and investigation of crime and terrorism. Analytics is highly sensitive to changes in the scene, and for changes in the optical chain so a VSS with analytics needs careful configuration and prompt maintenance to avoid false alarms. However, there is a trend from static VSS consisting of fixed CCTV cameras towards more dynamic VSS deployments over public/private multi-organization networks, consisting of a wider variety of visual sensors, including pan-tilt-zoom (PTZ) cameras, body-worn cameras and cameras on moving platforms. This trend will lead to more dynamic scenes and more frequent changes in the optical chain, creating structural problems for analytics. If these problems are not adequately addressed, analytics will not be able to continue to meet end users' developing needs. In this paper, we present a three-part solution for managing the performance of complex analytics deployments. The first part is a register containing meta data describing relevant properties of the optical chain, such as intrinsic and extrinsic calibration, and parameters of the scene such as lighting conditions or measures for scene complexity (e.g. number of people). A second part frequently assesses these parameters in the deployed VSS, stores changes in the register, and signals relevant changes in the setup to the VSS administrator. A third part uses the information in the register to dynamically configure analytics tasks based on VSS operator input. In order to support the feasibility of this solution, we give an overview of related state-of-the-art technologies for autocalibration (self-calibration), scene recognition and lighting estimation in relation to person detection. The presented solution allows for rapid and robust deployment of Video Content Analysis (VCA) tasks in large scale ad-hoc networks.

  10. A Unified NET-MAC-PHY Cross-layer Framework for Performance Evaluation of Multi-hop Ad hoc WLANs

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2014-09-01

    Full Text Available Most of the existing works have been evaluated the performance of 802.11 multihop networks by considering the MAC layer or network layer separately. Knowing the nature of the multi-hop ad hoc networks, many factors in different layers are crucial for study the performance of MANET. In this paper we present a new analytic model for evaluating average end-to-end throughput in IEEE 802.11e multihop wireless networks. In particular, we investigate an intricate interaction among PHY, MAC and Network layers. For instance, we incorporate carrier sense threshold, transmission power, contention window size, retransmissions retry limit, multi rates, routing protocols and network topology together. We build a general cross-layered framework to represent multi-hop ad hoc networks with asymmetric topology and asymmetric traffic. We develop an analytical model to predict throughput of each connection as well as stability of forwarding queues at intermediate nodes in saturated networks. To the best of our knowledge, it seems that our work is the first wherein general topology and asymmetric parameters setup are considered in PHY/MAC/Network layers. Performance of such a system is also evaluated through simulation. We show that performance measures of the MAC layer are affected by the traffic intensity of flows to be forwarded. More precisely, attempt rate and collision probability are dependent on traffic flows, topology and routing.

  11. Application of Decision Analysis to Evaluate Alternative Research and Development Investments

    National Research Council Canada - National Science Library

    Artelli, Michael

    1998-01-01

    .... In contrast to the current ad hoc approach, decision analysis provides an explicit and easily explained rationale for investment choices, complete and consistent incorporation of multiple objectives...

  12. Comparative analysis of fungal genomes reveals different plant cell wall degrading capacity in fungi

    Science.gov (United States)

    2013-01-01

    Background Fungi produce a variety of carbohydrate activity enzymes (CAZymes) for the degradation of plant polysaccharide materials to facilitate infection and/or gain nutrition. Identifying and comparing CAZymes from fungi with different nutritional modes or infection mechanisms may provide information for better understanding of their life styles and infection models. To date, over hundreds of fungal genomes are publicly available. However, a systematic comparative analysis of fungal CAZymes across the entire fungal kingdom has not been reported. Results In this study, we systemically identified glycoside hydrolases (GHs), polysaccharide lyases (PLs), carbohydrate esterases (CEs), and glycosyltransferases (GTs) as well as carbohydrate-binding modules (CBMs) in the predicted proteomes of 103 representative fungi from Ascomycota, Basidiomycota, Chytridiomycota, and Zygomycota. Comparative analysis of these CAZymes that play major roles in plant polysaccharide degradation revealed that fungi exhibit tremendous diversity in the number and variety of CAZymes. Among them, some families of GHs and CEs are the most prevalent CAZymes that are distributed in all of the fungi analyzed. Importantly, cellulases of some GH families are present in fungi that are not known to have cellulose-degrading ability. In addition, our results also showed that in general, plant pathogenic fungi have the highest number of CAZymes. Biotrophic fungi tend to have fewer CAZymes than necrotrophic and hemibiotrophic fungi. Pathogens of dicots often contain more pectinases than fungi infecting monocots. Interestingly, besides yeasts, many saprophytic fungi that are highly active in degrading plant biomass contain fewer CAZymes than plant pathogenic fungi. Furthermore, analysis of the gene expression profile of the wheat scab fungus Fusarium graminearum revealed that most of the CAZyme genes related to cell wall degradation were up-regulated during plant infection. Phylogenetic analysis also

  13. Co-occurrence correlations of heavy metals in sediments revealed using network analysis.

    Science.gov (United States)

    Liu, Lili; Wang, Zhiping; Ju, Feng; Zhang, Tong

    2015-01-01

    In this study, the correlation-based study was used to identify the co-occurrence correlations among metals in marine sediment of Hong Kong, based on the long-term (from 1991 to 2011) temporal and spatial monitoring data. 14 stations out of the total 45 marine sediment monitoring stations were selected from three representative areas, including Deep Bay, Victoria Harbour and Mirs Bay. Firstly, Spearman's rank correlation-based network analysis was conducted as the first step to identify the co-occurrence correlations of metals from raw metadata, and then for further analysis using the normalized metadata. The correlations patterns obtained by network were consistent with those obtained by the other statistic normalization methods, including annual ratios, R-squared coefficient and Pearson correlation coefficient. Both Deep Bay and Victoria Harbour have been polluted by heavy metals, especially for Pb and Cu, which showed strong co-occurrence with other heavy metals (e.g. Cr, Ni, Zn and etc.) and little correlations with the reference parameters (Fe or Al). For Mirs Bay, which has better marine sediment quality compared with Deep Bay and Victoria Harbour, the co-occurrence patterns revealed by network analysis indicated that the metals in sediment dominantly followed the natural geography process. Besides the wide applications in biology, sociology and informatics, it is the first time to apply network analysis in the researches of environment pollutions. This study demonstrated its powerful application for revealing the co-occurrence correlations among heavy metals in marine sediments, which could be further applied for other pollutants in various environment systems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. Optical emissions from the dissociative recombination of N{sub 2}H{sup +}, HCO{sup +}, HOC{sup +}, and HNC{sup +}

    Energy Technology Data Exchange (ETDEWEB)

    Johnsen, R [Department of Physics and Astronomy University of Pittsburgh, Pittsburgh, PA 15260 (United States); Golde, M F [Department of Chemistry, University of Pittsburgh, Pittsburgh, PA 15260 (United States); Rosati, R E [Smithsonian Astrophysical Observatory, 60 Garden St. MS-50 Cambridge, MA, 02138 (United States); Pappas, D [Army Research Laboratory, 4600 Deer Creek Loop, Aberdeen Proving Ground, MD (United States); Skrzypkowski, M P, E-mail: rj@pitt.ed [Prometheus Energy Company, 3311 S. 120th Place Suite 100, Seattle, WA 98168 (United States)

    2009-11-15

    We present recent flowing-afterglow measurements of branching fractions for electronically and vibrationally excited products arising from the dissociative recombination of N{sub 2}H{sup +}, HCO{sup +}, HOC{sup +}, and HNC{sup +} ions with thermal electrons. State-specific yields were derived by fitting the observed, spatially resolved emission band intensities to models that simulate all ion-chemical processes, recombination, diffusion, and gas mixing.

  15. Data-Independent Acquisition-Based Quantitative Proteomic Analysis Reveals Potential Biomarkers of Kidney Cancer.

    Science.gov (United States)

    Song, Yimeng; Zhong, Lijun; Zhou, Juntuo; Lu, Min; Xing, Tianying; Ma, Lulin; Shen, Jing

    2017-12-01

    Renal cell carcinoma (RCC) is a malignant and metastatic cancer with 95% mortality, and clear cell RCC (ccRCC) is the most observed among the five major subtypes of RCC. Specific biomarkers that can distinguish cancer tissues from adjacent normal tissues should be developed to diagnose this disease in early stages and conduct a reliable prognostic evaluation. Data-independent acquisition (DIA) strategy has been widely employed in proteomic analysis because of various advantages, including enhanced protein coverage and reliable data acquisition. In this study, a DIA workflow is constructed on a quadrupole-Orbitrap LC-MS platform to reveal dysregulated proteins between ccRCC and adjacent normal tissues. More than 4000 proteins are identified, 436 of these proteins are dysregulated in ccRCC tissues. Bioinformatic analysis reveals that multiple pathways and Gene Ontology items are strongly associated with ccRCC. The expression levels of L-lactate dehydrogenase A chain, annexin A4, nicotinamide N-methyltransferase, and perilipin-2 examined through RT-qPCR, Western blot, and immunohistochemistry confirm the validity of the proteomic analysis results. The proposed DIA workflow yields optimum time efficiency and data reliability and provides a good choice for proteomic analysis in biological and clinical studies, and these dysregulated proteins might be potential biomarkers for ccRCC diagnosis. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. High-speed image analysis reveals chaotic vibratory behaviors of pathological vocal folds

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Yu, E-mail: yuzhang@xmu.edu.c [Key Laboratory of Underwater Acoustic Communication and Marine Information Technology of the Ministry of Education, Xiamen University, Xiamen Fujian 361005 (China); Shao Jun [Shanghai EENT Hospital of Fudan University, Shanghai (China); Krausert, Christopher R. [Department of Surgery, Division of Otolaryngology - Head and Neck Surgery, University of Wisconsin School of Medicine and Public Health, Madison, WI 53792-7375 (United States); Zhang Sai [Key Laboratory of Underwater Acoustic Communication and Marine Information Technology of the Ministry of Education, Xiamen University, Xiamen Fujian 361005 (China); Jiang, Jack J. [Shanghai EENT Hospital of Fudan University, Shanghai (China); Department of Surgery, Division of Otolaryngology - Head and Neck Surgery, University of Wisconsin School of Medicine and Public Health, Madison, WI 53792-7375 (United States)

    2011-01-15

    Research highlights: Low-dimensional human glottal area data. Evidence of chaos in human laryngeal activity from high-speed digital imaging. Traditional perturbation analysis should be cautiously applied to aperiodic high speed image signals. Nonlinear dynamic analysis may be helpful for understanding disordered behaviors in pathological laryngeal systems. - Abstract: Laryngeal pathology is usually associated with irregular dynamics of laryngeal activity. High-speed imaging facilitates direct observation and measurement of vocal fold vibrations. However, chaotic dynamic characteristics of aperiodic high-speed image data have not yet been investigated in previous studies. In this paper, we will apply nonlinear dynamic analysis and traditional perturbation methods to quantify high-speed image data from normal subjects and patients with various laryngeal pathologies including vocal fold nodules, polyps, bleeding, and polypoid degeneration. The results reveal the low-dimensional dynamic characteristics of human glottal area data. In comparison to periodic glottal area series from a normal subject, aperiodic glottal area series from pathological subjects show complex reconstructed phase space, fractal dimension, and positive Lyapunov exponents. The estimated positive Lyapunov exponents provide the direct evidence of chaos in pathological human vocal folds from high-speed digital imaging. Furthermore, significant differences between the normal and pathological groups are investigated for nonlinear dynamic and perturbation analyses. Jitter in the pathological group is significantly higher than in the normal group, but shimmer does not show such a difference. This finding suggests that the traditional perturbation analysis should be cautiously applied to high speed image signals. However, the correlation dimension and the maximal Lyapunov exponent reveal a statistically significant difference between normal and pathological groups. Nonlinear dynamic analysis is capable of

  17. High-speed image analysis reveals chaotic vibratory behaviors of pathological vocal folds

    International Nuclear Information System (INIS)

    Zhang Yu; Shao Jun; Krausert, Christopher R.; Zhang Sai; Jiang, Jack J.

    2011-01-01

    Research highlights: → Low-dimensional human glottal area data. → Evidence of chaos in human laryngeal activity from high-speed digital imaging. → Traditional perturbation analysis should be cautiously applied to aperiodic high speed image signals. → Nonlinear dynamic analysis may be helpful for understanding disordered behaviors in pathological laryngeal systems. - Abstract: Laryngeal pathology is usually associated with irregular dynamics of laryngeal activity. High-speed imaging facilitates direct observation and measurement of vocal fold vibrations. However, chaotic dynamic characteristics of aperiodic high-speed image data have not yet been investigated in previous studies. In this paper, we will apply nonlinear dynamic analysis and traditional perturbation methods to quantify high-speed image data from normal subjects and patients with various laryngeal pathologies including vocal fold nodules, polyps, bleeding, and polypoid degeneration. The results reveal the low-dimensional dynamic characteristics of human glottal area data. In comparison to periodic glottal area series from a normal subject, aperiodic glottal area series from pathological subjects show complex reconstructed phase space, fractal dimension, and positive Lyapunov exponents. The estimated positive Lyapunov exponents provide the direct evidence of chaos in pathological human vocal folds from high-speed digital imaging. Furthermore, significant differences between the normal and pathological groups are investigated for nonlinear dynamic and perturbation analyses. Jitter in the pathological group is significantly higher than in the normal group, but shimmer does not show such a difference. This finding suggests that the traditional perturbation analysis should be cautiously applied to high speed image signals. However, the correlation dimension and the maximal Lyapunov exponent reveal a statistically significant difference between normal and pathological groups. Nonlinear dynamic

  18. Content Downloading with the Assistance of Roadside Cars for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Haigang Gong

    2017-01-01

    Full Text Available Plenty of multimedia contents such as traffic images, music, and movies pose great challenges for content downloading due to the high mobility of vehicles and intermittent connectivity for vehicular ad hoc networks. Roadside units or APs can improve the efficiency of content downloading but with the cost of large investments. In this paper, an efficient content downloading scheme is proposed with the assistance of parking clusters, which are formed by roadside parked cars. After receiving the downloading request, the parking clusters, which the downloader will travel through according to the estimated trajectory, will make a download scheduling for the downloader. Then the downloader acquires the content chunks while it drives through the parking clusters. Simulation results show that the proposed scheme achieves better performance than intervehicle approach and RSU based approach.

  19. A Performance Evaluation Model for Mobile Ad Hoc Networks and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-03-01

    Full Text Available Potential applications in areas such as military sites and disaster relief fields that are characterized by absence of prefixed infrastructure justify the development of mobile ad hoc networks (MANETs and wireless sensor networks (WSNs. However, unfavorable wireless links and dynamic topology are still challenging, leading to the proposal of a collection of routing protocols for MANETs and WSNs. Nevertheless the performance of algorithms may vary with deployment scenario due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and WSNs is investigated and a novel performance ranking model, termed AHP-SAW, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies based on which ranking results are provided. Extensive simulations show that an overall 37.2 %, at most, gain may be achieved based on the AHP-SAW model.

  20. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  1. Implementing a Topology Management Algorithm for Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mrinal K. Naskar

    2008-01-01

    Full Text Available In this paper, we propose to maintain the topology of a MANET by suitably selecting multiple coordinators among the nodes constituting the MANET. The maintenance of topology in a mobile ad–hoc network is of primary importance because the routing techniques can only work if we have a connected network. Thus of the burning issues at present is to device algorithms which ensure that the network topology is always maintained. The basic philosophy behind our algorithm is to isolate two coordinators amongst the system based on positional data. Once elected, they are entrusted with the responsibility to emit signals of different frequencies while the other nodes individually decide the logic they need to follow in order to maintain the topology, thereby greatly reducing the overhead. As far as our knowledge goes, we are the first ones to introduce the concept of multiple coordinators which not only reduces the workload of the coordinator, but also eliminates the need of different signal ranges thereby ensuring greater efficiency. We have simulated the algorithm with the help of a number of robots using embedded systems. The results we have obtained have been quite encouraging.

  2. Combined Use of Systematic Conservation Planning, Species Distribution Modelling, and Connectivity Analysis Reveals Severe Conservation Gaps in a Megadiverse Country (Peru)

    Science.gov (United States)

    Fajardo, Javier; Lessmann, Janeth; Bonaccorso, Elisa; Devenish, Christian; Muñoz, Jesús

    2014-01-01

    Conservation planning is crucial for megadiverse countries where biodiversity is coupled with incomplete reserve systems and limited resources to invest in conservation. Using Peru as an example of a megadiverse country, we asked whether the national system of protected areas satisfies biodiversity conservation needs. Further, to complement the existing reserve system, we identified and prioritized potential conservation areas using a combination of species distribution modeling, conservation planning and connectivity analysis. Based on a set of 2,869 species, including mammals, birds, amphibians, reptiles, butterflies, and plants, we used species distribution models to represent species' geographic ranges to reduce the effect of biased sampling and partial knowledge about species' distributions. A site-selection algorithm then searched for efficient and complementary proposals, based on the above distributions, for a more representative system of protection. Finally, we incorporated connectivity among areas in an innovative post-hoc analysis to prioritize those areas maximizing connectivity within the system. Our results highlight severe conservation gaps in the Coastal and Andean regions, and we propose several areas, which are not currently covered by the existing network of protected areas. Our approach helps to find areas that contribute to creating a more representative, connected and efficient network. PMID:25479411

  3. Proteome-wide analysis of arginine monomethylation reveals widespread occurrence in human cells

    DEFF Research Database (Denmark)

    Larsen, Sara C; Sylvestersen, Kathrine B; Mund, Andreas

    2016-01-01

    to the frequency of somatic mutations at arginine methylation sites throughout the proteome, we observed that somatic mutations were common at arginine methylation sites in proteins involved in mRNA splicing. Furthermore, in HeLa and U2OS cells, we found that distinct arginine methyltransferases differentially...... kidney 293 cells, indicating that the occurrence of this modification is comparable to phosphorylation and ubiquitylation. A site-level conservation analysis revealed that arginine methylation sites are less evolutionarily conserved compared to arginines that were not identified as modified...... as coactivator-associated arginine methyltransferase 1 (CARM1)] or PRMT1 increased the RNA binding function of HNRNPUL1. High-content single-cell imaging additionally revealed that knocking down CARM1 promoted the nuclear accumulation of SRSF2, independent of cell cycle phase. Collectively, the presented human...

  4. Gap analysis methodology for business service engineering

    NARCIS (Netherlands)

    Nguyen, D.K.; van den Heuvel, W.J.A.M.; Papazoglou, M.; de Castro, V.; Marcos, E.; Hofreiter, B.; Werthner, H.

    2009-01-01

    Many of today’s service analysis and design techniques rely on ad-hoc and experience-based identification of value-creating business services and implicitly assume a “green-field” situation focusing on the development of completely new services while offering very limited support for discovering

  5. Minimizing Detection Probability Routing in Ad Hoc Networks Using Directional Antennas

    Directory of Open Access Journals (Sweden)

    Towsley Don

    2009-01-01

    Full Text Available In a hostile environment, it is important for a transmitter to make its wireless transmission invisible to adversaries because an adversary can detect the transmitter if the received power at its antennas is strong enough. This paper defines a detection probability model to compute the level of a transmitter being detected by a detection system at arbitrary location around the transmitter. Our study proves that the probability of detecting a directional antenna is much lower than that of detecting an omnidirectional antenna if both the directional and omnidirectional antennas provide the same Effective Isotropic Radiated Power (EIRP in the direction of the receiver. We propose a Minimizing Detection Probability (MinDP routing algorithm to find a secure routing path in ad hoc networks where nodes employ directional antennas to transmit data to decrease the probability of being detected by adversaries. Our study shows that the MinDP routing algorithm can reduce the total detection probability of deliveries from the source to the destination by over 74%.

  6. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  7. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  8. Recent adaptive events in human brain revealed by meta-analysis of positively selected genes.

    Directory of Open Access Journals (Sweden)

    Yue Huang

    Full Text Available BACKGROUND AND OBJECTIVES: Analysis of positively-selected genes can help us understand how human evolved, especially the evolution of highly developed cognitive functions. However, previous works have reached conflicting conclusions regarding whether human neuronal genes are over-represented among genes under positive selection. METHODS AND RESULTS: We divided positively-selected genes into four groups according to the identification approaches, compiling a comprehensive list from 27 previous studies. We showed that genes that are highly expressed in the central nervous system are enriched in recent positive selection events in human history identified by intra-species genomic scan, especially in brain regions related to cognitive functions. This pattern holds when different datasets, parameters and analysis pipelines were used. Functional category enrichment analysis supported these findings, showing that synapse-related functions are enriched in genes under recent positive selection. In contrast, immune-related functions, for instance, are enriched in genes under ancient positive selection revealed by inter-species coding region comparison. We further demonstrated that most of these patterns still hold even after controlling for genomic characteristics that might bias genome-wide identification of positively-selected genes including gene length, gene density, GC composition, and intensity of negative selection. CONCLUSION: Our rigorous analysis resolved previous conflicting conclusions and revealed recent adaptation of human brain functions.

  9. Enzalutamide in Japanese patients with chemotherapy-naïve, metastatic castration-resistant prostate cancer: A post-hoc analysis of the placebo-controlled PREVAIL trial.

    Science.gov (United States)

    Kimura, Go; Yonese, Junji; Fukagai, Takashi; Kamba, Tomomi; Nishimura, Kazuo; Nozawa, Masahiro; Mansbach, Hank; Theeuwes, Ad; Beer, Tomasz M; Tombal, Bertrand; Ueda, Takeshi

    2016-05-01

    To evaluate the treatment effects, safety and pharmacokinetics of enzalutamide in Japanese patients. This was a post-hoc analysis of the phase 3, double-blind, placebo-controlled PREVAIL trial. Asymptomatic or mildly symptomatic chemotherapy-naïve patients with metastatic castration-resistant prostate cancer progressing on androgen deprivation therapy were randomized one-to-one to 160 mg/day oral enzalutamide or placebo until discontinuation on radiographic progression or skeletal-related event and initiation of subsequent antineoplastic therapy. Coprimary end-points were centrally assessed radiographic progression-free survival and overall survival. Secondary end-points were investigator-assessed radiographic progression-free survival, time to initiation of chemotherapy, time to prostate-specific antigen progression, prostate-specific antigen response (≥50% decline) and time to skeletal-related event. Of 1717 patients, 61 were enrolled in Japan (enzalutamide, n = 28; placebo, n = 33); hazard ratios (95% confidence interval) of 0.30 for centrally assessed radiographic progression-free survival (0.03-2.95), 0.59 for overall survival (0.20-1.8), 0.46 for time to chemotherapy (0.22-0.96) and 0.36 for time to prostate-specific antigen progression (0.17-0.75) showed the treatment benefit of enzalutamide over the placebo. Prostate-specific antigen responses were observed in 60.7% of enzalutamide-treated men versus 21.2% of placebo-treated men. Plasma concentrations of enzalutamide were higher in Japanese patients: the geometric mean ratio of Japanese/non-Japanese patients was 1.126 (90% confidence interval 1.018-1.245) at 13 weeks. Treatment-related adverse events grade ≥3 occurred in 3.6% of enzalutamide- and 6.1% of placebo-treated Japanese patients. Treatment effects and safety in Japanese patients were generally consistent with the overall results from PREVAIL. © 2016 The Authors. International Journal of Urology published by John Wiley & Sons Australia, Ltd on

  10. Effectiveness of treat-to-target strategy for LDL-cholesterol control in type 2 diabetes: post-hoc analysis of data from the MIND.IT study.

    Science.gov (United States)

    Ardigò, Diego; Vaccaro, Olga; Cavalot, Franco; Rivellese, Albarosa Angela; Franzini, Laura; Miccoli, Roberto; Patti, Lidia; Boemi, Massimo; Trovati, Mariella; Zavaroni, Ivana

    2014-04-01

    The paper presents a post-hoc analysis of the intensity of dyslipidaemia care operated in the first 2 years of Multiple-Intervention-in-type-2-Diabetes.ITaly (MIND.IT) study. MIND.IT is a multicentric, randomized, two-parallel arm trial involving 1461 type 2 diabetic patients at high cardiovascular (CV) risk. The study compares the usual care (UC) of CV prevention with a multifactorial intensive care (IC) approach aiming at achieving target values for the main CV risk factors according to a step-wise treat-to-target approach. Proportion of patients on target for low-density lipoprotein cholesterol (LDL-C) was about 10% at baseline and increased significantly more with IC than UC (43 vs. 27%; p < 0.001). However, the majority (57%) of patients, in this intended intensively treated cohort, failed to achieve the proposed target. Average LDL-C decreased from 144 ± 35 to 108 ± 31 mg/dl with IC and from 142 ± 28 to 118 ± 32 with UC (p-for-interaction <0.0001). IC was associated with a significantly greater increase in statin prescription and lower withdrawal from treatment than UC (43 vs. 11% and 28 vs. 61%, respectively; both p < 0.001). However, the new treatments were characterized in both groups by the use of low starting doses (≤ 10 mg of atorvastatin, equivalent dose in more than 90% of patients) without increase in case of missed target. The application of a multifactorial treat-to-target intervention is associated with a significant improvement in LDL-C beyond usual practice. However, the change in LDL-C appears to be more related to an increased number of treated patients and a decreased treatment withdrawal than to a true treat-to-target approach.

  11. Analysis reveals potential rangeland impacts if Williamson Act eliminated

    Directory of Open Access Journals (Sweden)

    William C. Wetzel

    2012-10-01

    Full Text Available California budget cuts have resulted in dramatic reductions in state funding for the Williamson Act, a land protection program that reduces property taxes for the owners of 15 million acres of California farms and rangeland. With state reimbursements to counties eliminated, the decision to continue Williamson Act contracts lies with individual counties. We investigated the consequences of eliminating the Williamson Act, using a geospatial analysis and a mail questionnaire asking ranchers for plans under a hypothetical elimination scenario. The geospatial analysis revealed that 72% of rangeland parcels enrolled in Williamson Act contracts contained habitat important for statewide conservation goals. Presented with the elimination scenario, survey respondents reported an intention to sell 20% of their total 496,889 acres. The tendency of survey participants to respond that they would sell land was highest among full-time ranchers with low household incomes and without off-ranch employment. A majority (76% of the ranchers who reported that they would sell land predicted that the buyers would develop it for nonagricultural uses, suggesting substantial changes to California's landscape in a future without the Williamson Act.

  12. Reducing Congestion in Obstructed Highways with Traffic Data Dissemination Using Ad hoc Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Coveney PeterV

    2010-01-01

    Full Text Available Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITSs and location-aware services. The ability to disseminate information in an ad hoc fashion allows pertinent information to propagate faster through a network. In the realm of ITS, the ability to spread warning information faster and further is of great advantage to receivers. In this paper we propose and present a message-dissemination procedure that uses vehicular wireless protocols to influence vehicular flow, reducing congestion in road networks. The computational experiments we present show how a car-following model and lane-change algorithm can be adapted to "react" to the reception of information. This model also illustrates the advantages of coupling together with vehicular flow modelling tools and network simulation tools.

  13. Race Differences in Diet Quality of Urban Food-Insecure Blacks and Whites Reveals Resiliency in Blacks.

    Science.gov (United States)

    Allen, Allyssa J; Kuczmarski, Marie Fanelli; Evans, Michele K; Zonderman, Alan B; Waldstein, Shari R

    2016-12-01

    Evidence from epidemiological studies shows a link between food insecurity and diet intake or quality. However, the moderating effect of race in this relation has not yet been studied. Food insecurity (USDA Food Security Module) and diet quality (Healthy Eating Index-2010; HEI) were measured in 1741 participants from the Healthy Aging in Neighborhoods of Diversity across the Life Span (HANDLS) study. Data were collected from 2004 to 2009 and analyzed in 2014. Multivariable regression assessed the interaction of race and food insecurity on HEI scores, adjusting for age, sex, poverty status, single parent status, drug, alcohol and cigarette use, and comorbid diseases. The interaction of food insecurity and race was significantly associated with diet quality (p = 0.001). In the absence of food insecurity, HEI scores were similar across race. However, with each food insecurity item endorsed, HEI scores were substantially lower for Whites compared to Blacks. An ad hoc analysis revealed that Blacks were more likely than Whites to participate in SNAP (p race stratified analyses revealed that Blacks participating in SNAP showed diminished associations of food insecurity with diet quality. Study findings provide the first evidence that the influence of food insecurity on diet quality may be potentiated for Whites, but not Blacks. Additionally, results show that Blacks are more likely to participate in SNAP and show attendant buffering of the effects of food insecurity on diet quality. These findings may have important implications for understanding how food insecurity affects diet quality differentially by race.

  14. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  15. Multiobjective Reinforcement Learning for Traffic Signal Control Using Vehicular Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Houli Duan

    2010-01-01

    Full Text Available We propose a new multiobjective control algorithm based on reinforcement learning for urban traffic signal control, named multi-RL. A multiagent structure is used to describe the traffic system. A vehicular ad hoc network is used for the data exchange among agents. A reinforcement learning algorithm is applied to predict the overall value of the optimization objective given vehicles' states. The policy which minimizes the cumulative value of the optimization objective is regarded as the optimal one. In order to make the method adaptive to various traffic conditions, we also introduce a multiobjective control scheme in which the optimization objective is selected adaptively to real-time traffic states. The optimization objectives include the vehicle stops, the average waiting time, and the maximum queue length of the next intersection. In addition, we also accommodate a priority control to the buses and the emergency vehicles through our model. The simulation results indicated that our algorithm could perform more efficiently than traditional traffic light control methods.

  16. Genomic analysis of primordial dwarfism reveals novel disease genes.

    Science.gov (United States)

    Shaheen, Ranad; Faqeih, Eissa; Ansari, Shinu; Abdel-Salam, Ghada; Al-Hassnan, Zuhair N; Al-Shidi, Tarfa; Alomar, Rana; Sogaty, Sameera; Alkuraya, Fowzan S

    2014-02-01

    Primordial dwarfism (PD) is a disease in which severely impaired fetal growth persists throughout postnatal development and results in stunted adult size. The condition is highly heterogeneous clinically, but the use of certain phenotypic aspects such as head circumference and facial appearance has proven helpful in defining clinical subgroups. In this study, we present the results of clinical and genomic characterization of 16 new patients in whom a broad definition of PD was used (e.g., 3M syndrome was included). We report a novel PD syndrome with distinct facies in two unrelated patients, each with a different homozygous truncating mutation in CRIPT. Our analysis also reveals, in addition to mutations in known PD disease genes, the first instance of biallelic truncating BRCA2 mutation causing PD with normal bone marrow analysis. In addition, we have identified a novel locus for Seckel syndrome based on a consanguineous multiplex family and identified a homozygous truncating mutation in DNA2 as the likely cause. An additional novel PD disease candidate gene XRCC4 was identified by autozygome/exome analysis, and the knockout mouse phenotype is highly compatible with PD. Thus, we add a number of novel genes to the growing list of PD-linked genes, including one which we show to be linked to a novel PD syndrome with a distinct facial appearance. PD is extremely heterogeneous genetically and clinically, and genomic tools are often required to reach a molecular diagnosis.

  17. Using team cognitive work analysis to reveal healthcare team interactions in a birthing unit

    OpenAIRE

    Ashoori, Maryam; Burns, Catherine M.; d'Entremont, Barbara; Momtahan, Kathryn

    2014-01-01

    Cognitive work analysis (CWA) as an analytical approach for examining complex sociotechnical systems has shown success in modelling the work of single operators. The CWA approach incorporates social and team interactions, but a more explicit analysis of team aspects can reveal more information for systems design. In this paper, Team CWA is explored to understand teamwork within a birthing unit at a hospital. Team CWA models are derived from theories and models of teamworkand leverage the exis...

  18. Functional expression of a proton-coupled organic cation (H+/OC antiporter in human brain capillary endothelial cell line hCMEC/D3, a human blood–brain barrier model

    Directory of Open Access Journals (Sweden)

    Shimomura Keita

    2013-01-01

    Full Text Available Abstract Background Knowledge of the molecular basis and transport function of the human blood–brain barrier (BBB is important for not only understanding human cerebral physiology, but also development of new central nervous system (CNS-acting drugs. However, few studies have been done using human brain capillary endothelial cells, because human brain materials are difficult to obtain. The purpose of this study is to clarify the functional expression of a proton-coupled organic cation (H+/OC antiporter in human brain capillary endothelial cell line hCMEC/D3, which has been recently developed as an in vitro human BBB model. Methods Diphenhydramine, [3H]pyrilamine and oxycodone were used as cationic drugs that proved to be H+/OC antiporter substrates. The in vitro uptake experiments by hCMEC/D3 cells were carried out under several conditions. Results Diphenhydramine and [3H]pyrilamine were both transported into hCMEC/D3 cells in a time- and concentration-dependent manner with Km values of 59 μM and 19 μM, respectively. Each inhibited uptake of the other in a competitive manner, suggesting that a common mechanism is involved in their transport. The diphenhydramine uptake was significantly inhibited by amantadine and quinidine, but not tetraethylammonium and 1-methyl-4-phenylpyridinium (substrates for well-known organic cation transporters. The uptake was inhibited by metabolic inhibitors, but was insensitive to extracellular sodium and membrane potential. Further, the uptake was increased by extracellular alkalization and intracellular acidification. These transport properties are completely consistent with those of previously characterized H+/OC antiporter in rat BBB. Conclusions The present results suggest that H+/OC antiporter is functionally expressed in hCMEC/D3 cells.

  19. REVEAL - A tool for rule driven analysis of safety critical software

    International Nuclear Information System (INIS)

    Miedl, H.; Kersken, M.

    1998-01-01

    As the determination of ultrahigh reliability figures for safety critical software is hardly possible, national and international guidelines and standards give mainly requirements for the qualitative evaluation of software. An analysis whether all these requirements are fulfilled is time and effort consuming and prone to errors, if performed manually by analysts, and should instead be dedicated to tools as far as possible. There are many ''general-purpose'' software analysis tools, both static and dynamic, which help analyzing the source code. However, they are not designed to assess the adherence to specific requirements of guidelines and standards in the nuclear field. Against the background of the development of I and C systems in the nuclear field which are based on digital techniques and implemented in high level language, it is essential that the assessor or licenser has a tool with which he can automatically and uniformly qualify as many aspects as possible of the high level language software. For this purpose the software analysis tool REVEAL has been developed at ISTec and the Halden Reactor Project. (author)

  20. Analysis of characteristics associated with reinjection of icatibant

    DEFF Research Database (Denmark)

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence

    2015-01-01

    PURPOSE: Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I...