WorldWideScience

Sample records for ieee began writing

  1. The IEEE guide to writing in the engineering and technical fields

    CERN Document Server

    Kmiec, David

    2017-01-01

    This book introduces students and practicing engineers to all the components of writing in the workplace. It teaches readers how considerations of audience and purpose govern the structure of their documents within particular work settings. The IEEE Guide to Writing in the Engineering and Technical Fields is broken up into two sections: "Writing in Engineering Organizations" and "What Can You Do With Writing?" The first section helps readers approach their writing in a logical and persuasive way as well as analyze their purpose for writing. The second section demonstrates how to distinguish rhetorical situations and the generic forms to inform, train, persuade, and collaborate. The emergence of the global workplace has brought with it an increasingly important role for effective technical communication. Engineers more often need to work in cross-functional teams with people in different disciplines, in different countries, and in different parts of the world. Engineers must know how to communicate in a rapid...

  2. How nuclear power began

    International Nuclear Information System (INIS)

    Gowing, M.

    1987-01-01

    Many of the features of the story of nuclear power, both in nuclear weapons and nuclear power stations, derive from their timing. Usually, in the history of science the precise timing of discovery does not make much difference, but in the case of nuclear fission there was the coincidence that crucial discoveries were made and openly published in the same year, 1939, as the outbreak of the Second World War. It is these events of the 1930s and the early post-war era that are mainly discussed. However, the story began a lot earlier and even in the early 1900s the potential power within the atom had been foreseen by Soddy and Rutherford. In the 1930s Enrico Fermi and his team saw the technological importance of their discoveries and took out a patent on their process to produce artificial radioactivity from slow neutron beams. The need for secrecy because of the war, and the personal trusts and mistrusts run through the story of nuclear power. (UK)

  3. Satisfying story of how it all began

    Energy Technology Data Exchange (ETDEWEB)

    Liddle, Andrew

    2004-12-01

    {sup N}ow this 'Big Bang' idea seemed to me to be unsatisfactory...for it is an irrational process that cannot be described in scientific terms.' With this rather derisory remark (or at least so intended) in a 1950 radio broadcast, Fred Hoyle named the theory that rivalled his steady-state theory. The Big Bang has subsequently become the dominant paradigm in attempts to understand our universe. It is also one of the dominant ways in which popular-science writing seeks to persuade people to part with their cash. Simon Singh has rapidly made a name for himself as one of the leading popularizers of science, with his previous books Fermat's Last Theorem and The Code Book bringing accessible science to a wide audience . Big Bang brings him to a much busier marketplace, where he must compete both with other science writers and with working scientists. (U.K.)

  4. IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Basso, T.; DeBlasio, R.

    2012-04-01

    The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

  5. Eleanor McElwee and the Formation of IEEE PCS

    Science.gov (United States)

    Malone, Edward A.

    2015-01-01

    This article examines the historical professional project that created the Institute of Radio Engineers' Professional Group on Engineering Writing an Speech (IRE PGEWS)--now called the Institute of Electrical and Electronics Engineers' Professional Communication Society (IEEE PCS)--and recounts the group's early history in detail. It also traces…

  6. IEEE Prize for Lucio Rossi

    CERN Multimedia

    IEEE Council on Superconductivity

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity's Awards Committee (right).

  7. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  8. Reading Violence in Boys' Writing.

    Science.gov (United States)

    Anderson, Michael

    2003-01-01

    Describes how a teacher finds value in popular culture and violent writing by closely examining the writing of a student who laces his stories with explosions and battles. Finds that once he began to see the similarities between the media his student experiences, the writing the student prefers, and his own favorite media and writing, the teacher…

  9. IEEE Conference Publications in Libraries.

    Science.gov (United States)

    Johnson, Karl E.

    1984-01-01

    Conclusions of surveys (63 libraries, OCLC database, University of Rhode Island users) assessing handling of Institute of Electrical and Electronics Engineers (IEEE) conference publications indicate that most libraries fully catalog these publications using LC cataloging, and library patrons frequently require series access to publications. Eight…

  10. Researching the roots of IEEE Region 8

    NARCIS (Netherlands)

    Bastiaans, M.J.

    2013-01-01

    This paper describes the preliminary steps towards the foundation and the early history of IRE Region 9 / IEEE Region 8. The information has been gathered mainly from the archives of the IEEE Benelux Section.

  11. 2012 IEEE Vehicular Networking Conference (VNC)

    NARCIS (Netherlands)

    Altintas, Onur; Chen, Wai; Heijenk, Geert; Oh, Hyun Seo; Chung, Jong-Moon; Dressler, Falko; Kargl, Frank; Pau, Giovanni; Schoch, Elmar

    2012-01-01

    On behalf of the Organizing Committee, we would like to welcome you to the fourth edition of the IEEE Vehicular Networking Conference in Seoul, Korea. IEEE VNC is a unique conference sponsored by both IEEE Communications Society and Intelligent Transportation Systems Society. It brings together

  12. IEEE Prize for Lucio Rossi

    CERN Multimedia

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity’s Awards Committee (right). (Photo: IEEE Council on Superconductivity)With the magnets installed in the tunnel and work on the interconnections almost completed, Lucio Rossi has reaped the rewards of fifteen years of work. And yet, when the physicist from Milan arrived to take charge of the group responsible for the superconducting magnets in 2001, success seemed far from assured. Endowed with surprising levels of energy, Lucio Rossi, together with his team, ensured that production of these highly complex magnets got underway. Today, that achievement earns them the recognition not only of CERN but also of the international superconducting community. It is for this achievement that Lucio Rossi was awarded the prize by the IEEE’s (Institute of Electrical an...

  13. Before time began the Big Bang and the emerging universe

    CERN Document Server

    Satz, Helmut

    2017-01-01

    What is the origin of the universe? What was there before the universe appeared? We are currently witnessing a second Copernican revolution: neither our Earth and Sun, nor our galaxy, nor even our universe, are the end of all things. Beyond our world, in an endless multiverse, are innumerable other universes, coming and going, like ours or different. Fourteen billion years ago, one of the many bubbles constantly appearing and vanishing in the multiverse exploded to form our universe. The energy liberated in the explosion provided the basis for all the matter our universe now contains. But how could this hot, primordial plasma eventually produce the complex structure of our present world? Does not order eventually always lead to disorder, to an increase of entropy? Modern cosmology is beginning to find out how it all came about and where it all might lead. Before Time Began tells that story.

  14. The IEEE Milestone event at CERN

    CERN Multimedia

    2005-01-01

    On the initiative of its French and Swiss Sections, the IEEE has honoured CERN with an 'IEEE Milestone in the history of electricity and electronics' for the invention of the multi-wire proportional chamber in 1968. The IEEE established the Electrical Engineering Milestones programe in 1983 to honour significant achievements in the history of electrical and electronics engineering. To be designated, an achievement must be at least 25 years old, must have involved a unique solution to an engineering problem, and must have had at least regional impact. Currently there are more than  50 IEEE Milestones around the world. http://www.ieee.org/organizations/history_center/cern.html The installation and unveiling of this IEEE Milestone will provide the opportunity to emphasize the close relationship between science, technology, industry and well-being in society.  A ceremony, organised with the support of a group of IEEE members working at CERN, will be held at the CERN Globe of Science and Inn...

  15. Return of IEEE Std 627 and its Value to Equipment Qualification Programs

    International Nuclear Information System (INIS)

    Horvath, D.A.

    2012-01-01

    IEEE Std 627 ''Design Qualification of Safety Systems Equipment Used in Nuclear Power Generating Stations'' was issued to more generically establish qualification requirements in the form of a high level umbrella document. Efforts on this standard began in late 1975 at the request of the IEEE Nuclear Standards Management Board. In 1977 a joint ASME/IEEE agreement established responsibility for qualification and quality assurance standards preparation. ASME accepted responsibility for Quality Assurance and IEEE for qualification. In accordance with that agreement, IEEE completed the generic qualification standard in 1980. This document provided high level approaches, criteria, guidance, and principles for qualification of both electrical and mechanical equipment that at that time appeared in no other industry standard. IEEE Std 627-1980 was later reaffirmed in 1996. In 1986, ASME's Board on Nuclear Codes and Standards directed its Committee on Qualification of Mechanical Equipment (QME) to develop a standard for qualifying mechanical equipment. This task was completed in several parts during the time frame from 1992 to 1994. Partly in response to this activity, IEEE Std 627 was withdrawn in 2002. Later although withdrawn, it was found that IEEE Std 627 was continuing to be used and referenced by many entities both in the US and other countries including in ASME's QME-1-2002 ''Qualification of Active Mechanical Equipment Used in Nuclear Power Plants'', US NRC's NUREG-0800 Standard Review Plan Section 3.11, at least one reactor vendor's Design Certification Document (DCD), several international licensing documents, and elsewhere. As a result, in 2007, the IEEE Standards Board authorized Working Group 2.10 of Subcommittee 2 (Qualification) of the Power and Energy Society's Nuclear Power Engineering Committee to resurrect and update IEEE Std 627-1980 (Reaff 1996). The result was the culmination IEEE Std 627 in 2010. This paper will report on the eight improvements made

  16. The trail to Leduc began in the North

    Energy Technology Data Exchange (ETDEWEB)

    McKenzie-Brown, P.

    2000-06-01

    A milestone event in the history of the petroleum industry in Canada occurred in 1914 with the expedition down the Mackenzie River by Dr. T. O. Bosworth, a British geologist, which rivals in importance two better known events, namely the Dingman No. 1 discovery which began disgorging wet gas at Turner Valley in 1914, and the beginning of the modern era with the discovery of oil at Leduc, Alberta in 1947. The Bosworth expedition was commissioned by two Calgary businessmen to investigate the petroleum potential of northern Alberta and beyond, and to stake the most promising claims. That Dr. Bosworth did not disappoint his sponsors is evident from his 70-page long report which he produced upon his return, indicating excellent exploration prospects in three general regions, namely the Mackenzie River between Old Fort Good Hope and Fort Norman, the Tar Springs District on the Great Slave Lake, and the Tar Sand District on the Athabasca River. Exploration was postponed by the exigencies of World War I, but Imperial Oil drilled on one of Bosworth's claims after the war ended and oil was found in 1920. Because of lack of infrastructure to get the oil to major markets, development was lagging until after the Japanese attack on Pearl Harbor in 1941, when Norman Wells was developed with American help, primarily to supply oil to the Pacific Fleet. Imperial drilled, while construction crews built a 1,000-km oil pipeline over the Mackenzie Mountains to a newly constructed refiner in Whitehorse. Despite a total cost to the U.S. taxpayers of $134 million, the Canol project (as it was known) contributed little to the war effort. Total production was 1.98 million barrels of oil, of which 46,000 barrels were spilled along the poorly constructed pipeline. Refined petroleum product output was just 866,670 barrels. The appalling disposal and clean up practices eventually led to having the Whitehorse site declared an environmentally contaminated site in 1998. The Maxwell Tar Pit is

  17. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    At a ceremony at CERN, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally a Milestone plaque in recognition of the invention of electronic particle detectors at CERN

  18. Editorial for IEEE Transactions on Power Electronics, January 2013

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Lehman, Brad

    2013-01-01

    should increase the impact factor of the IEEE TRANSACTIONS ON POWER ELECTRONICS (TPEL). In 2007, TPEL published 2600 pages, and it has gradually been increased to 4000 pages in 2011, 5000 pages in 2012, and 5500 pages are projected for 2013. We have decided to publish 12 printed issues so every month...... a new issue will be printed. A graph is provided showing the number of regular papers received in the past years as well as the number of published pages in the TPEL. Finally they note that in 2008, TPEL obtained a record high value for the impact factor (as shown in a figure) but in 2009 it was reduced...... the papers to be read over a longer time span; 2) Web of Science (ISI Thomsen Reuter) began to register new power electronics conferences in their database, and citations from conferences counts and contributes to a higher impact factor....

  19. When Writing Predicts Violence

    Science.gov (United States)

    Oltman, Gretchen

    2010-01-01

    The author began her public school English teaching career shortly after Dylan Klebold and Eric Harris shot and killed 15 people, including themselves, and wounded 34 others at Columbine High School. Shortly after the shootings, she ran across a "New York Times" article discussing the Columbine shooters and, in particular, their writing for…

  20. A Pink Writing Experiment

    Directory of Open Access Journals (Sweden)

    Teija Löytönen

    2015-10-01

    Full Text Available This article addresses a collaborative writing experiment that explores spaces of diverse encounters that began at a research conference held in the Flamingo hotel in Las Vegas; spaces where knowings emerge in the (shared moment, in-between (ourselves, prompted by different (research questions and entanglements of matter and meaning. Through these multiple and emergent writing encounters we explore ways towards collaborative scholarly writing and accessible ways of working and knowing beyond the immediately known or sensed. In addition, this collaborative writing experiment serves to inspire and engage participants (qualitative researchers and ethnographers alike to explore, share, and disseminate knowledge across contexts differently. We call for writing in qualitative research that senses, figures out, and “reveals” via moving and sensuous bodies, and emerging embodied encounters within particular spaces.

  1. IEEE International Symposium on Biomedical Imaging.

    Science.gov (United States)

    2017-01-01

    The IEEE International Symposium on Biomedical Imaging (ISBI) is a scientific conference dedicated to mathematical, algorithmic, and computational aspects of biological and biomedical imaging, across all scales of observation. It fosters knowledge transfer among different imaging communities and contributes to an integrative approach to biomedical imaging. ISBI is a joint initiative from the IEEE Signal Processing Society (SPS) and the IEEE Engineering in Medicine and Biology Society (EMBS). The 2018 meeting will include tutorials, and a scientific program composed of plenary talks, invited special sessions, challenges, as well as oral and poster presentations of peer-reviewed papers. High-quality papers are requested containing original contributions to the topics of interest including image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological, and statistical modeling. Accepted 4-page regular papers will be published in the symposium proceedings published by IEEE and included in IEEE Xplore. To encourage attendance by a broader audience of imaging scientists and offer additional presentation opportunities, ISBI 2018 will continue to have a second track featuring posters selected from 1-page abstract submissions without subsequent archival publication.

  2. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    The Nobel prize winner Georges Charpak and W. Cleon Anderson, IEEE President, unveil the Milestone bronze plaques. At a ceremony on 26 September at the Globe of Science and Innovation, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally dedicated Milestone plaques recognising the invention of electronic particle detectors at CERN. The plaque were unveiled by Mr Anderson and Georges Charpak, the Nobel-prize winning inventor of wire chamber technology at CERN in 1968. The IEEE is the world's largest professional association dedicated to the advancement of technology with 365,000 individual members in over 150 countries. Established in 1983, there are currently over 60 Milestones around the world. They honour momentous achievements in the history of electrical and electronics engineering, such as the landing of the first transatlantic cable, code breaking at Bletchley Park during World War II, and the development of the Japanese Bullet train, the Tokaido Shin...

  3. The scalable coherent interface, IEEE P1596

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1990-01-01

    IEEE P1596, the scalable coherent interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960--1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics

  4. Editorial for IEEE Transactions on Power Electronics

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2007-01-01

    Our IEEE transactions on power electronics has had some very positive progress these past years under the leadership of Dr. Daan van Wyk. Papers have been processed efficiently both in review time and publication time. This success has spread throughout the whole power electronics community which...

  5. The IEEE 802.11a standards

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. The IEEE 802.11a standards. Provides higher data rate and system capacities and uses OFDM in Physical Layer to mitigate the multi path effects;. Supports multiple 20Mhz channel. Each channel being an OFDM Modulated;; 52 Carriers. 48 data carrier; 4 Carry pilot ...

  6. Passionate Writing

    DEFF Research Database (Denmark)

    Borgström, Benedikte

    With care of writing as a method of inquiry, this paper engages in academic writing such as responsible knowledge development drawing on emotion, thought and reason. The aim of the paper is to better understand emancipatory knowledge development. Bodily experiences and responses shape academic...... writing and there are possibilities for responsible academic writing in that iterative process. I propose that academic writing can be seen as possibilities of passionate as well as passive writing....

  7. Writing Inspired

    Science.gov (United States)

    Tischhauser, Karen

    2015-01-01

    Students need inspiration to write. Assigning is not teaching. In order to inspire students to write fiction worth reading, teachers must take them through the process of writing. Physical objects inspire good writing with depth. In this article, the reader will be taken through the process of inspiring young writers through the use of boxes.…

  8. Writing Workshop.

    Science.gov (United States)

    Novelli, Joan

    2001-01-01

    Six ideas for writing autobiographies with elementary school students include: model the writing process to get students started; read examples of autobiographies; brainstorm writing ideas; free-write the first draft; edit and revise; and publish the stories. Suggestions for mini-lessons are included. A student reproducible offers an editing…

  9. University writing

    Directory of Open Access Journals (Sweden)

    Miguel Zabalza Beraza

    2013-01-01

    Full Text Available Writing in the University is a basic necessity and a long-range educational purpose. One of the basic characteristics of the university context is that it requires writing both as a tool of communication and as a source of intellectual stimulation. After establishing the basic features of academic writing, this article analyzes the role of writing for students (writing to learn and for teachers (write to plan, to reflect, to document what has been done. The article also discusses the contributions of writing for both students and teachers together: writing to investigate. Finally, going beyond what writing is as academic tool, we conclude with a more playful and creative position: writing for pleasure and enjoyment.

  10. Academic writing

    Science.gov (United States)

    Eremina, Svetlana V.

    2003-10-01

    The series of workshops on academic writing have been developed by academic writing instructors from Language Teaching Centre, Central European University and presented at the Samara Academic Writing Workshops in November 2001. This paper presents only the part dealing with strucutre of an argumentative essay.

  11. 7th IEEE International Conference Intelligent Systems

    CERN Document Server

    Atanassov, KT; Doukovska, L; Hadjiski, M; Jotsov, V; Kacprzyk, J; Kasabov, N; Sotirov, S; Szmidt, E; Zadrożny, S; Filev, D; Jabłkowski, J; Kacprzyk, J; Krawczak, M; Popchev, I; Rutkowski, L; Sgurev, V; Sotirova, E; Szynkarczyk, P

    2015-01-01

    This two volume set of books constitutes the proceedings of the 2014  7th IEEE International Conference Intelligent Systems (IS), or IEEE IS’2014 for short, held on September 24‐26, 2014 in Warsaw, Poland. Moreover, it contains some selected papers from the collocated IWIFSGN'2014-Thirteenth International Workshop on Intuitionistic Fuzzy Sets and Generalized Nets.The conference was organized by the Systems Research Institute, Polish Academy of Sciences, Department IV of Engineering Sciences, Polish Academy of Sciences, and Industrial Institute of Automation and Measurements - PIAP.The papers included in the two proceedings volumes have been subject to a thorough review process by three highly qualified peer reviewers.Comments and suggestions from them have considerable helped improve the quality of the papers but also the division of the volumes into parts, and assignment of the papers to the best suited parts.  

  12. IEEE 802.11 ECG monitoring system.

    Science.gov (United States)

    Tejero-Calado, Juan; Lopez-Casado, Carmen; Bernal-Martin, Antonio; Lopez-Gomez, Miguel; Romero-Romero, Marco; Quesada, Guillermo; Lorca, Julio; Rivas, Ramon

    2005-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. This kind of devices favours at-home hospitalization, reducing the affluence to sanitary assistance centers to make routine controls. This fact causes a really favourable social impact, especially for elder people, rural-zone inhabitant, chronic patients and handicapped people. Furthermore, it offers new functionalities to physicians and will reduce the sanitary cost. Among these functionalities, biomedical signals can be sent to other devices (screen, PDA, PC...) or processing centers, without restricting the patients' mobility. The aim of this project is the development and implementation of a reduced size multi-channel electrocardiograph based on IEEE 802.11, which allows wireless monitoring of patients, and the insertion of the information into the TCP/IP Hospital network.

  13. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  14. IEEE International Workshop on Machine Learning for Signal Processing: Preface

    DEFF Research Database (Denmark)

    Tao, Jianhua

    The 21st IEEE International Workshop on Machine Learning for Signal Processing will be held in Beijing, China, on September 18–21, 2011. The workshop series is the major annual technical event of the IEEE Signal Processing Society's Technical Committee on Machine Learning for Signal Processing...

  15. Proceedings of IEEE Machine Learning for Signal Processing Workshop XV

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the Fifteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP’2005), held in Mystic, Connecticut, USA, September 28-30, 2005. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP) organized...... by the NNSP Technical Committee of the IEEE Signal Processing Society. The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized...... by the Machine Learning for Signal Processing Technical Committee with sponsorship of the IEEE Signal Processing Society. Following the practice started two years ago, the bound volume of the proceedings is going to be published by IEEE following the Workshop, and we are pleased to offer to conference attendees...

  16. Performance comparison of IEEE 802.11g and IEEE 802.11n in the presence of interference from 802.15.4 networks

    OpenAIRE

    Masood, Syed Haani

    2013-01-01

    In this paper we compare the packet error rate (PER) and maximum throughput of IEEE 802.11n and IEEE 802.11g under interference from IEEE 802.15.4 by using MATLAB to simulate the IEEE PHY for 802.11n and 802.11g networks.

  17. A coexistence model of IEEE 802.15.4 and IEEE 802.1 lbIg

    NARCIS (Netherlands)

    Yuan, Wei; Wang, Xiangyu; Linnartz, J.P.M.G.

    2007-01-01

    IEEE 802.15.4 was developed to meet the needs for low-rate wireless communication. However, due to its low power, IEEE 802.15.4 is potentially vulnerable to interference by other wireless technologies having much higher power and working in the same industrial, scientific, and medical (ISM) band

  18. Active Channel Reservation for Coexistence Mechanism (ACROS) for IEEE 802.15.4 and IEEE 802.11

    Science.gov (United States)

    Shin, Soo Young; Woo, Dong Hyuk; Lee, Jong Wook; Park, Hong Seong; Kwon, Wook Hyun

    In this paper, a coexistence mechanism between IEEE 802.15.4 and IEEE 802.11b, Active Channel Reservation for cOexiStence (ACROS), is proposed. The key idea underlining ACROS is to reserve the channel for IEEE 802.15.4 transmission, where IEEE 802.11 transmissions are forbidden. The request-to-send (RTS)/clear-to send (CTS) mechanism within IEEE 802.11 is used to reserve a channel. The proposed ACROS mechanism is implemented into a PC based prototype. The embedded version of ACROS is also developed to mitigate the timing drift problem in the PC-based ACROS. The efficiency of ACROS is shown using the throughput and packet error rate achieved in actual experiments.

  19. My Career and the "Rhetoric of" Technical Writing and Communication

    Science.gov (United States)

    Schuster, Mary Lay

    2015-01-01

    This article traces the history of Mary Schuster's career in technical writing and communication from 1968 when she took a position in the Publications Department at the Institute of Electrical and Electronics Engineers (IEEE) to her work at "Technical Communication Quarterly" ("TCQ") in 2003 and forward. She discusses the…

  20. Ever Since the World Began: A Reading & Interview with Masha Tupitsyn

    Directory of Open Access Journals (Sweden)

    Masha Tupitsyn

    2013-07-01

    Full Text Available Writer and cultural critic Masha Tupitsyn is interviewed on her audio recording of her reading Ever Since This World Began, produced specially for this issue of continent. and adapted from her recently published Love Dog (Success and Failure out from Penny-Ante Editions.

  1. Ever Since the World Began: A Reading & Interview with Masha Tupitsyn

    OpenAIRE

    Masha Tupitsyn

    2013-01-01

    Writer and cultural critic Masha Tupitsyn is interviewed on her audio recording of her reading Ever Since This World Began, produced specially for this issue of continent. and adapted from her recently published Love Dog (Success and Failure) out from Penny-Ante Editions.

  2. Writing Editorials.

    Science.gov (United States)

    Pappas, Marjorie L.

    2003-01-01

    Presents a thematic unit for middle schools on editorial writing, or persuasive writing, based on the Pathways Model for information skills lessons. Includes assessing other editorials; student research process journals; information literacy and process skills; and two lesson plans that involve library media specialists as well as teachers. (LRW)

  3. Business Writing.

    Science.gov (United States)

    Burt, Lorna; Lewandowski, Carol

    This workbook, designed for workplace literacy courses, contains materials for a business writing course. The course presents the fundamentals of effective business letter writing, focusing on logical organization, word choice, style, tone, and clarity. The course uses students' own examples as well as practice exercises for reinforcement.…

  4. Write Soon!

    Science.gov (United States)

    Rasinski, Timothy; Padak, Nancy

    2009-01-01

    This article explores the possibilities of using natural writing opportunities that occur in family life to nurture children's literacy development. From notes to lists to journals to parodies, families can use writing to nurture personal relationships and simultaneously improve literacy. Specific tips for teachers to share with parents in making…

  5. Mathematical writing

    CERN Document Server

    Vivaldi, Franco

    2014-01-01

    This book teaches the art of writing mathematics, an essential -and difficult- skill for any mathematics student.   The book begins with an informal introduction on basic writing principles and a review of the essential dictionary for mathematics. Writing techniques are developed gradually, from the small to the large: words, phrases, sentences, paragraphs, to end with short compositions. These may represent the introduction of a concept, the abstract of a presentation or the proof of a theorem. Along the way the student will learn how to establish a coherent notation, mix words and symbols effectively, write neat formulae, and structure a definition.   Some elements of logic and all common methods of proofs are featured, including various versions of induction and existence proofs. The book concludes with advice on specific aspects of thesis writing (choosing of a title, composing an abstract, compiling a bibliography) illustrated by large number of real-life examples. Many exercises are included; over 150...

  6. Writing Nature

    Directory of Open Access Journals (Sweden)

    Kristin Asdal

    2014-06-01

    Full Text Available This special issue of the Nordic Journal of Science and Technology Studies is interested in how nature, in different versions and forms, is invited into our studies, analyses, and stories. How is it that we “write nature”? How is it that we provide space for, and actually describe the actors, agents, or surroundings, in our stories and analyses? The articles in the issue each deal with different understandings of both the practices of writing and the introduction of various natures into these. In this introduction to the issue the editors engage with actor-network theory as a material semiotic resource for writing nature. We propose to foreground actor-network theory as a writing tool, at the expense of actor-network theory as a distinct vocabulary. In doing this and pointing out the semiotic origins to material-semiotics we also want to problematize a clear-cut material approach to writing nature.

  7. Guest editors' introduction : Highlights from IEEE Pacific Visualization

    NARCIS (Netherlands)

    Wijk, van J.J.; North, S.; Shen, H.-W.

    2010-01-01

    This article looks briefly at four articles based on papers from the 2010 IEEE Pacific Visualization Symposium. These articles, which strongly focus on visual design and applications, cover a range of applications in scientific visualization, information visualization, and graph visualization,

  8. IEEE Conference Record - Abstracts. 1997 IEEE International Conference on Plasma Science, 19 - 22 May 1997 San Diego, California

    National Research Council Canada - National Science Library

    Hyman, Julius

    1997-01-01

    This 360 page softbound publication includes the following major sections. An invitation to ICOPS'97, Catamaran Resort Hotel Floor Pinas, Officers of the IEEE Nuclear and Plasma Sciences Society, Conference Information...

  9. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications

    Science.gov (United States)

    Mišić, Jelena; (Sherman) Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184

  10. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications.

    Science.gov (United States)

    Misić, Jelena; Sherman Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

  11. Simulasi Kinerja Jaringan Nirkabel IEEE-802.11a dan IEEE-802.11g Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Helm Fitriawan

    2014-03-01

    Full Text Available Wireless network uses transmission media based on radio waves. This type of networks is mainly useddue to its efficiency and mobility in data exchanging. This paper reports the modeling and simulation of wirelessnetworks based on Cisco Aironet 1130ag access point devices with IEEE 802.11a and IEEE 802.11g standards. Themodeling and simulation are performed using network simulator version 2 (NS-2 that is installed on operationsystem Linux Ubuntu v.10.10. The NS-2 is commonly used and works well in numerous types of network simulation. From simulation, we obtain quality of service parameters by employing several simulation scenarios in terms ofnumber of nodes, distances, and packet data sizes. It can be concluded from simulation results that the IEEE 802.11gnetworks transfer data with better quality than those of IEEE 802.11a networks.  Furthermore, the IEEE 802.11gnetworks provide a higher throughput, with smaller amount of delay and packet loss percentage compared to thoseof IEEE 802.11a networks.

  12. IEEE Std 101-1987: IEEE guide for the statistical analysis of thermal life test data

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This revision of IEEE Std 101-1972 describes statistical analyses for data from thermally accelerated aging tests. It explains the basis and use of statistical calculations for an engineer or scientist. Accelerated test procedures usually call for a number of specimens to be aged at each of several temperatures appreciably above normal operating temperatures. High temperatures are chosen to produce specimen failures (according to specified failure criteria) in typically one week to one year. The test objective is to determine the dependence of median life on temperature from the data, and to estimate, by extrapolation, the median life to be expected at service temperature. This guide presents methods for analyzing such data and for comparing test data on different materials

  13. Stop. Write! Writing Grounded Theory

    Directory of Open Access Journals (Sweden)

    Barney G. Glaser, PhD, Hon. PhD

    2012-06-01

    Full Text Available The message in this book, the dictum in this book, is to stop and write when the Grounded Theory (GT methodology puts you in that ready position. Stop unending conceptualization, unending data coverage, and unending listening to others who would egg you on with additional data, ideas and/or requirements or simply wait too long. I will discuss these ideas in detail. My experience with PhD candidates is that for the few who write when ready, many do not and SHOULD. Simply put, many write-up, but many more should.

  14. Technical writing versus technical writing

    Science.gov (United States)

    Dillingham, J. W.

    1981-01-01

    Two terms, two job categories, 'technical writer' and 'technical author' are discussed in terms of industrial and business requirements and standards. A distinction between 'technical writing' and technical 'writing' is made. The term 'technical editor' is also considered. Problems inherent in the design of programs to prepare and train students for these jobs are discussed. A closer alliance between industry and academia is suggested as a means of preparing students with competent technical communication skills (especially writing and editing skills) and good technical skills.

  15. And so it all began: A personal tribute to the man behind the scientist

    Science.gov (United States)

    Aliotta, Marialuisa

    2018-01-01

    At the time I began my scientific career as a PhD student under the supervision of Claudio Spitaleri, the Trojan Horse Method was still in its infancy. Like with any new-born idea, it took time and passion and effort to plant the early seeds that would eventually develop into a now well-established method in nuclear astrophysics research. Here, I offer my own recollection of those early years as a personal homage to Claudio's unique mix of human traits that shaped our professional relationship for many years since.

  16. Fiber optics backbone for IEEE 802.3 networks

    Science.gov (United States)

    Shani, Ron

    1990-01-01

    In the last few years the IEEE 802.3 committee has developed fiber optics inter-repeater link standard called FOIRL. This standard defines the "Fiber Optics Media Access Unit" (FOMAU) which is used to connect two IEEE 802.3 repeaters that are up to 1Km apart. The IEEE 802.3 lOBaseF task force is currently standardizing a full F/O system in two directions: passive and active. The active approach is a compromise between the FOIRL (Asynchronous) approach and the Synchronous approach. As a result of this activity the IEEE 802.3 standard will define three different F/O interfaces and several devices that will not inter-operate. Such a standard will lower the credibility among the IEEE 802.3 user community, as customers will be confused amidst the many chapters and devices with no clear choice. This paper describes a method that can reduce the number of standards to two (passive and active), while proposing a solution for all the requirements of 802.3 F/O LAN. (The question of passive vs active approach will be discussed in this paper).

  17. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    Science.gov (United States)

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  18. IEEE guide for the analysis of human reliability

    International Nuclear Information System (INIS)

    Dougherty, E.M. Jr.

    1987-01-01

    The Institute of Electrical and Electronics Engineers (IEEE) working group 7.4 of the Human Factors and Control Facilities Subcommittee of the Nuclear Power Engineering Committee (NPEC) has released its fifth draft of a Guide for General Principles of Human Action Reliability Analysis for Nuclear Power Generating Stations, for approval of NPEC. A guide is the least mandating in the IEEE hierarchy of standards. The purpose is to enhance the performance of an human reliability analysis (HRA) as a part of a probabilistic risk assessment (PRA), to assure reproducible results, and to standardize documentation. The guide does not recommend or even discuss specific techniques, which are too rapidly evolving today. Considerable maturation in the analysis of human reliability in a PRA context has taken place in recent years. The IEEE guide on this subject is an initial step toward bringing HRA out of the research and development arena into the toolbox of standard engineering practices

  19. Writing Across the Curriculum -- An Online Course in Computer Security

    OpenAIRE

    Neelu Sinha

    2006-01-01

    Writing fosters both critical thinking and student learning, serving as one of the most effective ways to understand a topic. Writing across the Curriculum (WAC) began in the late 1970’s, as a pedagogical reform movement in response to a perceived deficiency in literacy among college students. Over the past two decades universities have worked to broaden the scope of student writing from composition classes to classes in the students’ major. This paper chronicles the application of WAC into t...

  20. "Reading to Write" in East Asian Studies

    Science.gov (United States)

    Freedman, Leora

    2013-01-01

    A reading-writing initiative began in 2011-12 at the University of Toronto as a partnership between an East Asian Studies (EAS) department and an English Language Learning (ELL) Program. In this institution, students are expected to enter into scholarly discussions in their first year essays, yet many (both native English speakers and non-native…

  1. A Quality Approach to Writing Assessment.

    Science.gov (United States)

    Andrade, Joanne; Ryley, Helen

    1992-01-01

    A Colorado elementary school began its Total Quality Management work about a year ago after several staff members participated in an IBM Leadership Training Program addressing applications of Deming's theories. The school's new writing assessment has increased collegiality and cross-grade collaboration. (MLH)

  2. Report Writing

    DEFF Research Database (Denmark)

    Behnke, Eric

    In a short and precise way this compendium guides how to write an Engineering Report. The compendium is primarily targeting Engineering Students in thier first and second semester but it might as well be used by students at other technical bachelor educations......In a short and precise way this compendium guides how to write an Engineering Report. The compendium is primarily targeting Engineering Students in thier first and second semester but it might as well be used by students at other technical bachelor educations...

  3. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The award was presented by the deputy programme chair Vince Cianciolo (left) at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November.

  4. IEEE C37.98-1987: IEEE standard seismic testing of relays

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in IEEE Std 344-1987. To define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general, they are (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay that constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new application, then proof testing must be performed for that new case

  5. IEEE C37.98-1978: IEEE standard seismic testing of relays

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in ANSI/IEEE Std 344-1975, Recommended Practices for Seismic Qualification of Class 1E Equipment for Nuclear Power Generating Stations. In order to define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general they are: (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay which constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new case

  6. Editorial for the IEEE Transactions on Power Electronics, January 2009

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2009-01-01

    I am entering the fourth year as the Editor in Chief of the IEEE TRANSACTIONS ON POWER ELECTRONICS. A position like this becomes more and more important for the technical field as publishing in a peer-reviewed highly ranked journal has influence on the industrial and academic career. It is a way...

  7. ARC Researchers at IEEE 2015 Vehicle Power and Propulsion Conference

    Science.gov (United States)

    Contacts Researchers News & Events Event Calendar Annual Program Review Research Seminars Press Room Event Archives ARC Researchers at the IEEE 2015 Vehicle Power and Propulsion Conference (October 19-22 Ballroom B P-SS4-2 Comparison of SOFC and PEM Fuel Cell Hybrid Power Management Strategies for Mobile

  8. 2011 IEEE Vehicular Networking Conference (VNC): Demo Summaries

    NARCIS (Netherlands)

    Altintas, O.; Chen, W.; Heijenk, Geert; Dressler, F.; Ekici, E.; Kargl, Frank; Shigeno, H.; Dietzel, Stefan

    2011-01-01

    Foreword For the first time in its history, IEEE VNC has included this year’s demonstrations in its program. Demonstrations play an important role to expose the research community to practical aspects of research and to foster cross-fertilization among researchers both in academia and in industry.

  9. 0011-0030.Data Representation amp Computer Arithmetic6 IEEE ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.Data Representation amp Computer Arithmetic6 IEEE Standard Double Precision FormatIn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.

  10. Dating the period when intensive anthropogenic activity began to influence the Sanjiang Plain, Northeast China

    Science.gov (United States)

    Cong, Jinxin; Gao, Chuanyu; Zhang, Yan; Zhang, Shaoqing; He, Jiabao; Wang, Guoping

    2016-02-01

    Dating the start of intensive anthropogenic influence on ecosystems is important for identifying the conditions necessary for ecosystem recovery. However, few studies have focused on determining when anthropogenic influences on wetland began through sedimentary archives. To fill this critical gap in our knowledge, combustion sources and emission intensities, reconstructed via black carbon (BC) and polycyclic aromatic hydrocarbons (PAHs) were analyzed in two wetlands in the Sanjiang Plain in Northeast China. 14C provided age control for the sedimentary records. By combining previous sedimentary and archaeological studies, we attempt to date the beginning of intensive anthropogenic influences on the Sanjiang Plain. Our results showed that BC deposition fluxes increased from 0.02 to 0.7 g C/m2.yr during the last 10,000 years. An upward trend was apparent during the last 500 years. Before 1200 cal yr BP, human activities were minor, such that the wetland ecosystem in the Sanjiang Plain before this period may represent the reference conditions that for the recovery of these wetlands. As the human population increased after 1200 cal yr BP, combustion sources changed and residential areas became a major source of BC and PAHs. In this way, the wetland ecosystem gradually became more heavily influenced by human activities.

  11. Dating the period when intensive anthropogenic activity began to influence the Sanjiang Plain, Northeast China

    Science.gov (United States)

    Cong, Jinxin; Gao, Chuanyu; Zhang, Yan; Zhang, Shaoqing; He, Jiabao; Wang, Guoping

    2016-01-01

    Dating the start of intensive anthropogenic influence on ecosystems is important for identifying the conditions necessary for ecosystem recovery. However, few studies have focused on determining when anthropogenic influences on wetland began through sedimentary archives. To fill this critical gap in our knowledge, combustion sources and emission intensities, reconstructed via black carbon (BC) and polycyclic aromatic hydrocarbons (PAHs) were analyzed in two wetlands in the Sanjiang Plain in Northeast China. 14C provided age control for the sedimentary records. By combining previous sedimentary and archaeological studies, we attempt to date the beginning of intensive anthropogenic influences on the Sanjiang Plain. Our results showed that BC deposition fluxes increased from 0.02 to 0.7 g C/m2.yr during the last 10,000 years. An upward trend was apparent during the last 500 years. Before 1200 cal yr BP, human activities were minor, such that the wetland ecosystem in the Sanjiang Plain before this period may represent the reference conditions that for the recovery of these wetlands. As the human population increased after 1200 cal yr BP, combustion sources changed and residential areas became a major source of BC and PAHs. In this way, the wetland ecosystem gradually became more heavily influenced by human activities. PMID:26907560

  12. Qualification test of Class 1E equipment based on IEEE323 Std 2003

    International Nuclear Information System (INIS)

    Kim, J. S.; Jung, S. C.; Kim, T. R.

    2004-01-01

    IEEE Standard for Qualifying Class 1E Equipment has been updated to 2003 edition since the issue of IEEE Std 323-1971, 1974, 1983. NRC approved the IEEE Std 323-1974 as Qualification standard of Class 1E Equipment in domestic nuclear power plant. IEEE Std 323-2003 was issued in September of 2003 and utility is waiting the approval of NRC. IEEE Std 323-2003 suggest a new qualification technique which adopts the condition monitoring. Performance of two transient during DBA test is no longer recommended in IEEE Std 323-2003. IEEE323 Std 2003 included a chapter of ''extension of Qualified life'' to make available the life extension of components during plant life extension. For the efficient control of preserving EQ in domestic nuclear power plant, IEEE323 Std 2003 is strongly recommended

  13. ENHANCING WRITING SKILL THROUGH WRITING PROCESS APPROACH

    OpenAIRE

    M. Zaini Miftah

    2015-01-01

    The study is aimed at developing the implementation of Writing Process Approach (WPA) to enhance the students’ skill in writing essay. The study employed Classroom Action Research. The subjects of the study were 15 university students enrolled in the writing class. The data were gained from writing task, observation and field notes. The findings show that the implementation of WPA with the proper model procedures developed can enhance the students’ skill in writing essay. Before the strategy ...

  14. Introduction to IEEE Std. 7-4.3.2 Annex D -- ''Qualification of existing commercial computers''

    International Nuclear Information System (INIS)

    Holmstrom, K.J.

    1995-01-01

    On September 15th of 1993 the IEEE standards board approved IEEE Std. 7-4.3.2-1993, IEEE Standard for Digital Computers in Safety Systems of Nuclear Power Generating Stations. This paper is an introduction to Annex D of this document which concerns the commercial grade dedication of existing computers or new non-1E computers

  15. IEEE C37.82-1987: IEEE standard for the qualification of switchgear assemblies for Class 1E applications in nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the methods and requirements for qualifying switchgear assemblies for indoor areas outside of the containment in nuclear power generating stations. These assemblies include (1) metal-enclosed low-voltage power circuit breaker switchgear assemblies, as defined in ANSI/IEEE C37.20.1-1987, (2) metal-clad switchgear assemblies, as defined in ANSI/IEEE C37.20.2-1987, (3) metal-enclosed bus, as defined in ANSI/IEEE C37.23-1987, and (4) metal-enclosed interrupter switchgear assemblies, as defined in ANSI/IEEE C37.20.3-1987. The purpose of this document is to provide amplification of the general requirements of ANSI/IEEE Std 323-1983 as they apply to the specific features of Class 1E switchgear assemblies. Where differences exist between this document and ANSI/IEEE Std 323-1983, this document takes precedence insofar as switchgear assemblies are concerned

  16. Proceedings of IEEE Machine Learning for Signal Processing Workshop XVI

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the sixteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP'2006), held in Maynooth, Co. Kildare, Ireland, September 6-8, 2006. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP......). The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized by the Machine Learning for Signal Processing Technical Committee...... the same standard as the printed version and facilitates the reading and searching of the papers. The field of machine learning has matured considerably in both methodology and real-world application domains and has become particularly important for solution of problems in signal processing. As reflected...

  17. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe (right) receives the Student Paper Award. Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The NPSS established this award in 2005 to encourage outstanding student contributions and greater student participation as principle or sole authors of papers. The prizes were presented at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November. The prototype chip was designed by Ballabriga based on ideas generated within the CERN Medipix team - part of the PH Microelectronics group. It could be used in various fields in the future, including medical imaging, neutron imaging, electron microscopy, radiation monitoring and other applications in high-energy physics. The novel aspe...

  18. IEEE 802.3 Fiber Optic Inter-Repeater Link

    Science.gov (United States)

    Tarrant, Peter J.

    1987-01-01

    This paper describes the implementation of a fiber optic inter-repeater link (FOIRL), used for connecting two remote copper segments of an IEEE 802.3 local area network. The rationale for the design, the signalling used and the collision detection mechanism is discussed. The evolution of the draft international standard for the FOIRL and the concurrence amongst various manufacturers is also presented. Finally some examples of typical applications, highlighting the ease of installation, are given.

  19. Basic security measures for IEEE 802.11 wireless networks

    OpenAIRE

    Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David

    2008-01-01

    This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educat...

  20. 17th IEEE NPSS Real Time Conference – RT-2010

    CERN Multimedia

    Carlos Varandas

    2010-01-01

    Congress Centre of “Instituto Superior Técnico”, Lisboa, Portugal, 24-28 May, 2010 ABSTRACT SUBMISSION OPEN Abstract Submission Deadline: March 1st, 2010 Dear Sir/Madam, We are pleased to announce that abstract submission for the 17th IEEE NPSS Real Time Conference is now open on our web site. The deadline for submitting an abstract is 1st March 2010. Full conference details General Chairman

  1. Finding Basic Writing's Place.

    Science.gov (United States)

    Sheridan-Rabideau, Mary P.; Brossell, Gordon

    1995-01-01

    Posits that basic writing serves a vital function by providing writing support for at-risk students and serves the needs of a growing student population that universities accept yet feel needs additional writing instruction. Concludes that the basic writing classroom is the most effective educational support for at-risk students and their writing.…

  2. Selected writings

    CERN Document Server

    Galilei, Galileo

    2012-01-01

    'Philosophy is written in this great book which is continually open before our eyes - I mean the universe...' Galileo's astronomical discoveries changed the way we look at the world, and our place in the universe. Threatened by the Inquisition for daring to contradict the literal truth of the Bible, Galileo ignited a scientific revolution when he asserted that the Earth moves. This generous selection from his writings contains all the essential texts for a reader to appreciate his lasting significance. Mark Davie's new translation renders Galileo's vigorous Italian prose into clear modern English, while William R. Shea's version of the Latin Sidereal Message makes accessible the book that created a sensation in 1610 with its account of Galileo's observations using the newly invented telescope. All Galileo's contributions to the debate on science and religion are included, as well as key documents from his trial before the Inquisition in 1633. A lively introduction and clear notes give an overview of Galileo's...

  3. Ideation in mathematical writing

    DEFF Research Database (Denmark)

    Misfeldt, Morten

    2007-01-01

    This paper considers idea generation during the mathematical writing process. Two contrasting explanations of the creative potential in connection to writing is presented; writing as a process of setting and obtaining rhetorical goals and writing as a process of discovery. These views...... are then related to two empirically found categories of functions that writing serves researchers in the field of mathematics, concluding that both views contributes to understanding the creative potential in relation to mathematical writing....

  4. Autobiographical Writing in the Technical Writing Course

    Science.gov (United States)

    Gellis, Mark

    2011-01-01

    Professionals in the workplace are rarely asked to write autobiographical essays. Such essays, however, are an excellent tool for helping students explore their growth as professionals. This article explores the use of such essays in a technical writing class.

  5. Proceedings IEEE Visualization Conference and IEEE Information Visualization Conference (VIS'07 and INFOVIS'07, Sacramento CA, USA, October 28-November 1, 2007)

    NARCIS (Netherlands)

    Chen, M.; Hansen, C.; North, C.; Pang, A.; Wijk, van J.J.

    2007-01-01

    These are the proceedings of the IEEE Visualization Conference 2007 (Vis 2007) and the IEEE Information Visualization Conference 2007 (InfoVis 2007) held during October 28 to November 1, 2007 in Sacramento, California. The power of using computing technology to create useful, effective imagery for

  6. Coexistence of IEEE 802.11b/g WLANs and IEEE 802.15.4 WSNs : Modeling and Protocol Enhancements

    NARCIS (Netherlands)

    Yuan, W.

    2011-01-01

    As an emerging short-range wireless technology, IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) are increasingly used in the fields of home control, industrial control, consumer electronics, energy management, building automation, telecom services, personal healthcare, etc. IEEE

  7. Learning to Write with Interactive Writing Instruction

    Science.gov (United States)

    Williams, Cheri

    2018-01-01

    Interactive writing is a process-oriented instructional approach designed to make the composing and encoding processes of writing overt and explicit for young students who are learning to write. It is particularly suitable for students who struggle with literacy learning. This article describes one first-grade teacher's use of interactive writing…

  8. 15th IEEE International Conference on Intelligent Engineering Systems

    CERN Document Server

    Živčák, Jozef; Aspects of Computational Intelligence Theory and Applications

    2013-01-01

    This volume covers the state-of-the art of the research and development in various aspects of computational intelligence and gives some perspective directions of development. Except the traditional engineering areas that contain theoretical knowledge, applications, designs and projects, the book includes the area of use of computational intelligence in biomedical engineering. „Aspects of Computational Intelligence: Theory and Applications” is a compilation of carefully selected extended papers written on the basis of original contributions presented at the 15th IEEE International Conference on Intelligent Engineering Systems 2011, INES 2011 held at June 23.-26. 2011 in AquaCity Poprad, Slovakia.    

  9. Status of the IEEE P896 Future Backplane Bus

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1983-10-01

    The IEEE P896 Future Backplane Bus project has been influenced by and has influenced FASTBUS and several other contemporary bus designs. This paper summarizes the current status of that project, which is directed toward the needs of modern 32-bit microprocessor systems with multiple processors. Some of the technology developed for P896 will be important for future non-ECL implementations of FASTBUS and other buses. In particular, new bus drivers and receivers should greatly improve the performance and reliability of backplane buses and cable buses. The current status of the P896 serial bus is also summarized

  10. Writing a Movie.

    Science.gov (United States)

    Hoffner, Helen

    2003-01-01

    Explains a reading and writing assignment called "Writing a Movie" in which students view a short film segment and write a script in which they describe the scene. Notes that this assignment uses films to develop fluency and helps students understand the reading and writing connections. Concludes that students learn to summarize a scene from film,…

  11. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  12. IEEE Std 649-1991: IEEE standard for qualifying Class 1E motor control centers for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    The basic principles, requirements, and methods for qualifying Class 1E motor control centers for both harsh and mild environment applications in nuclear power generating stations are described. In addition to defining specific qualification requirements for Class 1E motor control centers and their components in accordance with the more general qualification requirements of IEEE Std 323-1983, this standard is intended to provide guidance in establishing a qualification program for demonstrating the adequacy of Class 1E motor control centers in nuclear power generating station applications

  13. IEEE Standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1980-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1979 and IEEE Std 308-1978, can be demonstrated by using the procedures provided in this Standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other types batteries are beyond the scope of this Standard

  14. IEEE standard for qualification of class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    IEEE Std 323-1974, Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, was developed to provide guidance for demonstrating and documenting the adequacy of electrical equipment used in all Class 1E and interface systems. This standard, IEEE Std 535-1979, was developed to provide specific methods and type test procedures for lead storage batteries in reference to IEEE Std 323-1974

  15. Tomorrow Began Yesterday

    Directory of Open Access Journals (Sweden)

    Konstantin Lidin

    2014-01-01

    Full Text Available The phenomenon of the sixtiers was prepared by the previous historical period. The period after the World War II comprises a fundamental change of the world order – from a multipolar world to a confrontation of two superpowers and two ideological systems, and, at the same time, formation of a complex of international organizations on a global scale. In this context, the Soviet architecture made a sharp turn from Stalin’s Empire style to an extreme ascetism – the continuation of constructivism of the early XXth century. The Irkutsk architectural school, unlike the main flow of the 1960s, developed the style of Neo-Brutalism. The article draws parallels between Neo-Brutalism of the Irkutsk school and “a severe style” of the Soviet pictorial art of the same period.

  16. How life began.

    Science.gov (United States)

    Cloud, P

    1986-11-01

    Study of the origin of life has become a legitimate scientific inquiry, with an international, multidisciplinary membership and a cogent body of data. Experiments involving plausible early Earth conditions and biogeochemical analyses of carbonaceous meteorites imply a variety of available starting molecules. Biogeological evidence indicates microbial beginnings about 3800 million years (3.8 aeons) ago. By then the known universe had been in existence for perhaps 15 aeons and galaxies abundant for ten. Conditions suitable for the origin of life may require a long prior cosmic evolution. The natural origin of life on the early Earth is now widely agreed upon but not the pathways. The beginnings of catalysis, replication and a functional cell remain moot. Much discussion has centered on the templating role that crystals such as clays and zeolites might have played in prebiotic evolution. Recent discovery of the catalytic and replicative functions of RNA recommend it as the key molecule in the transition from chemical to biological evolution. Copyright © 1986. Published by Elsevier Ltd.

  17. How nonimaging optics began

    Science.gov (United States)

    Winston, Roland

    2016-09-01

    Classical optics was traditionally the mapping of point sources by lenses, mirrors and occasionally holograms , i.e. making an image. The subject has had many famous scientists associated with it; Fermat, Huygens, Descartes, Hamilton just to name a few. By the mid 20th Century it was a well-developed field as exemplified by such luminaries as Walter T. Welford, Emil Wolf and many others. The theory of aberrations which addresses the imperfections of the mapping codified the state of the art. Then arose the need to collect energy, not just images. To the author's knowledge it can be traced back to WWII Germany with collection of infra-red radiation (the work by D. E. Williamson, was not published until 1952). The radiation collector, a simple right-circular cone, was a harbinger of things to come.

  18. Writing and Publishing: The Ultimate Teen Guide. It Happened to Me #27

    Science.gov (United States)

    Schwartz, Tina P.

    2010-01-01

    Edgar Allen Poe, Langston Hughes, Louisa May Alcott, and Stephen King are just a handful of famous authors who began their publishing careers in their teens. Many young adults would like to write and publish but few know where to begin. While there are many books on how to write and how to get published, none are written specifically for teens.…

  19. (Re)membering Basic Writing at a Public Ivy: History for Institutional Redesign

    Science.gov (United States)

    Tassoni, John Paul

    2006-01-01

    This essay offers a history of a basic writing course that began at a public ivy campus in the 1970s. Relying on principles of universal design and on insights derived from his school's studio program about ways the institution's selective functions can impact curricular matters, the author describes how the basic writing course was merely…

  20. The Los Altos Writing Project.

    Science.gov (United States)

    Kraft, Richard F.

    The intent of this guide is to encourage teachers to have students write, both formally and informally, on a systematic basis. Three types of writing are emphasized: (1) journal writing; (2) research paper writing; and (3) essay writing. The section on journal writing includes a handout for the class explaining the purpose for journal writing and…

  1. ENHANCING WRITING SKILL THROUGH WRITING PROCESS APPROACH

    Directory of Open Access Journals (Sweden)

    M. Zaini Miftah

    2015-03-01

    Full Text Available The study is aimed at developing the implementation of Writing Process Approach (WPA to enhance the students’ skill in writing essay. The study employed Classroom Action Research. The subjects of the study were 15 university students enrolled in the writing class. The data were gained from writing task, observation and field notes. The findings show that the implementation of WPA with the proper model procedures developed can enhance the students’ skill in writing essay. Before the strategy was implemented, the percentage of the students achieving the score greater than or equal to C (56-70 was 40.00% (6 students of the class. However, after the strategy was implemented in Cycle I, it enhanced enough to 60.00% (9 students of the class, but this result did not meet the criteria of success set up in the study. Next, in Cycle II it increased slightly to 86.67% (13 students of the class. Thus, the enhancement of the students’ skill in writing essay can be reached but it should follow the proper model procedures of the implementation of WPA developed. Keywords: writing process approach, writing skill, essay writing

  2. Proceedings of the IEEE Machine Learning for Signal Processing XVII

    DEFF Research Database (Denmark)

    The seventeenth of a series of workshops sponsored by the IEEE Signal Processing Society and organized by the Machine Learning for Signal Processing Technical Committee (MLSP-TC). The field of machine learning has matured considerably in both methodology and real-world application domains and has...... become particularly important for solution of problems in signal processing. As reflected in this collection, machine learning for signal processing combines many ideas from adaptive signal/image processing, learning theory and models, and statistics in order to solve complex real-world signal processing......, and two papers from the winners of the Data Analysis Competition. The program included papers in the following areas: genomic signal processing, pattern recognition and classification, image and video processing, blind signal processing, models, learning algorithms, and applications of machine learning...

  3. Report of the 2017 IEEE Cyber Science and Technology Congress

    Directory of Open Access Journals (Sweden)

    Wenbing Zhao

    2017-12-01

    Full Text Available The modern digitized world has led to the emergence of a new paradigm on global information networks and infrastructures known as Cyberspace and the studies of Cybernetics, which bring seamless integration of physical, social and mental spaces. Cyberspace is becoming an integral part of our daily life from learning and entertainment to business and cultural activities. As expected, this whole concept of Cybernetics brings new challenges that need to be tackled. The 2017 IEEE Cyber Science and Technology Congress (CyberSciTech 2017 provided a forum for researchers to report their research findings and exchange ideas. The congress took place in Orlando, Florida, USA during 6–10 November 2017. Not counting poster papers, the congress accepted over fifty papers that are divided into nine sessions. In this report, we provide an overview of the research contributions of the papers in CyberSciTech 2017.

  4. WIH-based IEEE 802.11 ECG monitoring implementation.

    Science.gov (United States)

    Moein, A; Pouladian, M

    2007-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. It offers new functionalities to physicians and will reduce the costs. Among these functionalities, biomedical signals can be sent to other devices (PDA, PC . . . ) or processing centers, without restricting the patients' mobility. This article discusses the WIH (Ward-In-Hand) structure and the software required for its implementation before an operational example is presented with its results. The aim of this project is the development and implementation of a reduced size electrocardiograph based on IEEE 802.11 with high speed and more accuracy, which allows wireless monitoring of patients, and the insertion of the information into the Wi-Fi hospital networks.

  5. Basic security measures for IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Oscar P. Sarmiento

    2008-05-01

    Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.

  6. IEEE Std 535-1979: IEEE standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1971 and IEE Std 308-1978, can be demonstrated by using the procedures provided in this standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other type batteries are beyond the scope of this standard

  7. IEEE Std 535-1986: IEEE standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 308-1980 can be demonstrated by using the procedures provided in this standard in accordance with ANSI/IEEE Std 323-1983. Battery sizing, maintenance, capacity testing, installation, charging equipment, and consideration of other type batteries are beyond the scope of this standard

  8. IEEE Std 650-1990: IEEE standard for qualification of Class 1E static battery chargers and inverters for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    Methods for qualifying static battery chargers and inverters for Class 1E installations in a mild environment outside containment in nuclear power generating stations are described. The qualification methods set forth employ a combination of type testing and analysis, the latter including a justification of methods, theories, and assumptions used. These procedures meet the requirements of IEEE Std 323-1983, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations

  9. A formal analysis of ISO/IEEE P11073-20601 standard of medical device communication

    NARCIS (Netherlands)

    Goga, Nicolae; Costache, Stefania; Moldoveanu, Florica

    2009-01-01

    This article presents the formal work done for the ISO/IEEE P11073-20601 Draft Standard for Health informatics - Personal health device communication - Application profile Optimized exchange protocol. ISO/IEEE 11073 family defines standards for device communication between agents (e.g. blood

  10. Comparison Of Several Methods Of Implementing A Fiber Optic IEEE 802.3 Ethernet

    Science.gov (United States)

    Thompson, Geoffrey O.

    1987-01-01

    Several different methods of implementing a fiber optic version of IEEE 802.3 10BASE LANs have been proposed as a candidate for standardization by IEEE. There have been extensive discussions as to the relative merits and features of the several systems. This paper will discuss the merits of each for this particular application on a comparative basis.

  11. 0011-0030.How to make an abstract in IEEE Format for ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.How to make an abstract in IEEE Format for AvishkarMulticultural Night in IEEE R10 Student Congress 2009Performances.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook ...

  12. 0011-0030.What is IEEE 754 StandardHow to convert real number ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.What is IEEE 754 StandardHow to convert real number in binary format using IEEE 754 StandardAn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.

  13. Science + Writing = Super Learning. Writing Workshop.

    Science.gov (United States)

    Bower, Paula Rogovin

    1993-01-01

    Article presents suggestions for motivating elementary students to learn by combining science and writing. The strategies include planning the right environment; teaching the scientific method; establishing a link to literature; and making time for students to observe, experiment, and write. (SM)

  14. IEEE Std 323-1983: IEEE standard for qualifying Class 1E equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic requirements for qualifying Class 1E equipment with interfaces that are to be used in nuclear power generating stations. The requirements presented include the principles, procedures, and methods of qualification. These qualification requirements, when met, will confirm the adequacy of the equipment design under normal, abnormal, design basis event, post design basis event, and in-service test conditions for the performance of safety function(s). The purpose of this standard is to identify requirements for the qualification of Class 1E equipment, including those interfaces whose failure could adversely affect the performance of Class 1E equipment and systems. The methods described shall be used for qualifying equipment, extending qualification, and updating qualification if the equipment is modified. Other issued IEEE standards which present qualification methods for specific equipment or components, or both, and those that deal with parts of the qualification program, may be used to supplement this standard, as applicable

  15. IEEE Std 649-1980: IEEE standard for qualifying Class 1E motor control centers for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic principles, requirements, and methods for qualifying Class 1E motor control centers for outside containment applications in nuclear power generating stations. Qualification of motor control centers located inside containment in a nuclear power generating station is beyond the scope of this standard. The purpose of this standard is (1) to define specific qualification requirements for Class 1E motor control centers in accordance with the more general qualification requirements of IEEE Std 323-1974, IEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations; (2) to provide guidance in establishing a qualification program for demonstrating the design adequacy of Class 1E motor control centers in nuclear power generating station applications

  16. Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCA in Non-saturation Condition

    Science.gov (United States)

    Kim, Tae Ok; Kim, Kyung Jae; Choi, Bong Dae

    We analyze the MAC performance of the IEEE 802.11 DCF and 802.11e EDCA in non-saturation condition where device does not have packets to transmit sometimes. We assume that a flow is not generated while the previous flow is in service and the number of packets in a flow is geometrically distributed. In this paper, we take into account the feature of non-saturation condition in standards: possibility of transmission performed without preceding backoff procedure for the first packet arriving at the idle station. Our approach is to model a stochastic behavior of one station as a discrete time Markov chain. We obtain four performance measures: normalized channel throughput, average packet HoL (head of line) delay, expected time to complete transmission of a flow and packet loss probability. Our results can be used for admission control to find the optimal number of stations with some constraints on these measures.

  17. Technical report writing

    Science.gov (United States)

    Vidoli, Carol A.

    1992-01-01

    This manual covers the fundamentals of organizing, writing, and reviewing NASA technical reports. It was written to improve the writing skills of LeRC technical authors and the overall quality of their reports.

  18. Writing Research Reports.

    Science.gov (United States)

    Sessler, Daniel I; Shafer, Steven

    2018-01-01

    Clear writing makes manuscripts easier to understand. Clear writing enhances research reports, increasing clinical adoption and scientific impact. We discuss styles and organization to help junior investigators present their findings and avoid common errors.

  19. Writing successfully in science

    National Research Council Canada - National Science Library

    O'Connor, M; Gretton, J

    1991-01-01

    ... - from planning the initial framework of an article, preparing references and illustrative material and writing a first draft, to choosing suitable journals, writing to the editor and dealing with proofs of the final draft...

  20. Writing as Praxis

    Science.gov (United States)

    Yagelski, Robert P.

    2012-01-01

    In 2003, the National Commission on Writing released "The Neglected "R,"" its report on the state of writing instruction in the nation's schools. The report identified an apparent paradox: writing, which the Commission defines as an essential skill for the many that has helped transform the world, is nevertheless increasingly…

  1. Writing and Science Literacy

    Science.gov (United States)

    Weiss-Magasic, Coleen

    2012-01-01

    Writing activities are a sure way to assess and enhance students' science literacy. Sometimes the author's students use technical writing to communicate their lab experiences, just as practicing scientists do. Other times, they use creative writing to make connections to the topics they're learning. This article describes both types of writing…

  2. The Writing Mathematician

    Science.gov (United States)

    Yoon, Caroline

    2017-01-01

    Popular culture casts mathematics and writing as opposites--a false dichotomy, which can be harmful for our discipline of mathematics education. Positioning writing outside the domain of the mathematician's abilities and cultivated skill set can create doubt in the mathematician wishing to write--not that one cannot be both writer and…

  3. Technical Writing in Hydrogeology.

    Science.gov (United States)

    Tinker, John R., Jr.

    1986-01-01

    A project for Writing Across the Curriculum at the University of Wisconsin-Eau Claire is described as a method to relate the process of writing to the process of learning hydrology. The project focuses on an actual groundwater contamination case and is designed to improve the technical writing skills of students. (JN)

  4. Improving Writing through Stages

    Science.gov (United States)

    Rivera Barreto, Adriana Maritza

    2011-01-01

    Writing as a means of communication is one of the basic skills students must master at the university level. Although it is not an easy task because students are usually reluctant to correct, teachers have great responsibility at the time of guiding a writing process. For that reason, this study aimed at improving the writing process in fourth…

  5. Teaching the Writing Process

    Science.gov (United States)

    Keen, John

    2017-01-01

    This article outlines some cognitive process models of writing composition. Possible reasons why students' writing capabilities do not match their abilities in some other school subjects are explored. Research findings on the efficacy of process approaches to teaching writing are presented and potential shortcomings are discussed. Product-based…

  6. IEEE Std 730 Software Quality Assurance: Supporting CMMI-DEV v1.3, Product and Process Quality Assurance

    Science.gov (United States)

    2011-05-27

    frameworks 4 CMMI-DEV IEEE / ISO / IEC 15288 / 12207 Quality Assurance ©2011 Walz IEEE Life Cycle Processes & Artifacts • Systems Life Cycle Processes...TAG to ISO TC 176 Quality Management • Quality: ASQ, work experience • Software: three books, consulting, work experience • Systems: Telecom & DoD...and IEEE 730 SQA need to align. The P730 IEEE standards working group has expanded the scope of the SQA process standard to align with IS 12207

  7. Language Literacy in Writing

    Directory of Open Access Journals (Sweden)

    Saeideh Ahangari

    2008-05-01

    Full Text Available This paper explores the ways in which the transfer of assumptions from first language (L1 writing can help the process of writing in second language (L2. In learning second language writing skills, learners have two primary sources from which they construct a second language system: knowledge and skills from first language and input from second language. To investigate the relative impact of first language literacy skills on second language writing ability, 60 EFL students from Tabriz Islamic Azad University were chosen as participants of this study, based on their language proficiency scores. The subjects were given two topics to write about: the experimental group subjects were asked to write in Persian and then translate their writing into English. The control group wrote in English. The results obtained in this study indicate that the content and vocabulary components of the compositions were mostly affected by the use of first language.

  8. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  9. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false IEEE 1680 Standard for the... CONTRACT CLAUSES Text of Provisions and Clauses 52.223-16 IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE...

  10. An Asynchronous IEEE Floating-Point Arithmetic Unit

    Directory of Open Access Journals (Sweden)

    Joel R. Noche

    2007-12-01

    Full Text Available An asynchronous floating-point arithmetic unit is designed and tested at the transistor level usingCadence software. It uses CMOS (complementary metal oxide semiconductor and DCVS (differentialcascode voltage switch logic in a 0.35 µm process using a 3.3 V supply voltage, with dual-rail data andsingle-rail control signals using four-phase handshaking.Using 17,085 transistors, the unit handles single-precision (32-bit addition/subtraction, multiplication,division, and remainder using the IEEE 754-1985 Standard for Binary Floating-Point Arithmetic, withrounding and other operations to be handled by separate hardware or software. Division and remainderare done using a restoring subtractive algorithm; multiplication uses an additive algorithm. Exceptionsare noted by flags (and not trap handlers and the output is in single-precision.Previous work on asynchronous floating-point arithmetic units have mostly focused on single operationssuch as division. This is the first work to the authors' knowledge that can perform floating-point addition,multiplication, division, and remainder using a common datapath.

  11. Augmenting the Energy-Saving Impact of IEEE 802.3az via the Control Plane

    OpenAIRE

    Thaenchaikun , Chakadkit; Jakllari , Gentian; Paillassa , Béatrice

    2015-01-01

    International audience; IEEE 802.3az, the recent standard for Energy Efficient Ethernet, is one of the main contributions of the ICT industry to the global quest for energy efficiency. Energy consumption reduction is accomplished by essentially replacing the continuous IDLE of legacy IEEE 802.3 cards with a Low Power Idle. While this is an important step in the right direction, studies have shown that the energy saving with IEEE 802.3az highly depends on the traffic load and stops for link ut...

  12. Energy Harvesting - Wireless Sensor Networks for Indoors Applications Using IEEE 802.11

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Sørensen, Thomas; Madsen, Jan

    2014-01-01

    The paper investigates the feasibility of using IEEE 802.11 in energy harvesting low-power sensing applications. The investigation is based on a prototype carbon dioxide sensor node that is powered by artificial indoors light. The wireless communication module of the sensor node is based on the RTX......4100 module. RTX4100 incorporates a wireless protocol that duty-cycles the radio while being compatible with IEEE 802.11 access points. The presented experiments demonstrate sustainable operation but indicate a trade-off between the benefits of using IEEE 802.11 in energy harvesting applications...

  13. Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards

    Science.gov (United States)

    Sharma, V.; Singh, H.; Malhotra, J.

    2012-12-01

    Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

  14. Analysis of Adaptive Control Scheme in IEEE 802.11 and IEEE 802.11e Wireless LANs

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Hui-Cheng

    In order to achieve the prioritized quality of service (QoS) guarantee, the IEEE 802.11e EDCAF (the enhanced distributed channel access function) provides the distinguished services by configuring the different QoS parameters to different access categories (ACs). An admission control scheme is needed to maximize the utilization of wireless channel. Most of papers study throughput improvement by solving the complicated multidimensional Markov-chain model. In this paper, we introduce a back-off model to study the transmission probability of the different arbitration interframe space number (AIFSN) and the minimum contention window size (CWmin). We propose an adaptive control scheme (ACS) to dynamically update AIFSN and CWmin based on the periodical monitoring of current channel status and QoS requirements to achieve the specific service differentiation at access points (AP). This paper provides an effective tuning mechanism for improving QoS in WLAN. Analytical and simulation results show that the proposed scheme outperforms the basic EDCAF in terms of throughput and service differentiation especially at high collision rate.

  15. Teaching Writing Strategies

    Directory of Open Access Journals (Sweden)

    Zaououi,Merbouh

    2010-03-01

    Full Text Available Developing learners’ writing skills has been of concern for a long time in education. Students studying English in our educational institutions have been found to face problems mainly in writing, making them unable to cope with the institution’s literacy expectations. However, these students may be able to develop writing skills significantly with positive instructional attitudes towards the errors they make and awareness on the teachers’ part of learner problems. That is why they should improve classroom writing instruction to address the serious problem of students writing difficult. Teaching strategies has shown a dramatic effect on the quality of students’ writing. Strategy instruction involves explicitly and systematically teaching steps necessary to use strategies independently. The following table will explain the above ideas.

  16. Writing lives in sport

    DEFF Research Database (Denmark)

    Christensen, Mette Krogh

    dealing with anonymous individuals, whose anonymity results from the confidentiality requirements of a social scientific research methodology, to those leaning more towards the literary-historical traditions of 'conventional' biographical writing. However, these examples are polar extremes and none...... in the academis world of sport studies. It does not set out to be a methodological treatise but through the writing of lives in sports does raise questions of method. Each essay in this collection deals with problems of writing sports-people's lives. These essays could be said to fall along a spectrum from those......Writing lives in sport is a book of stories about sports-persons. The people concerned include sports stars, sports people who are not quite so famous, and relatively unknown physical education teachers and sports scientists.Writing lives in sport raises questions about writing biographies...

  17. IEEE 1588 Time Synchronization Board in MTCA.4 Form Factor

    Science.gov (United States)

    Jabłoński, G.; Makowski, D.; Mielczarek, A.; Orlikowski, M.; Perek, P.; Napieralski, A.; Makijarvi, P.; Simrock, S.

    2015-06-01

    Distributed data acquisition and control systems in large-scale scientific experiments, like e.g. ITER, require time synchronization with nanosecond precision. A protocol commonly used for that purpose is the Precise Timing Protocol (PTP), also known as IEEE 1588 standard. It uses the standard Ethernet signalling and protocols and allows obtaining timing accuracy of the order of tens of nanoseconds. The MTCA.4 is gradually becoming the platform of choice for building such systems. Currently there is no commercially available implementation of the PTP receiver on that platform. In this paper, we present a module in the MTCA.4 form factor supporting this standard. The module may be used as a timing receiver providing reference clocks in an MTCA.4 chassis, generating a Pulse Per Second (PPS) signal and allowing generation of triggers and timestamping of events on 8 configurable backplane lines and two front panel connectors. The module is based on the Xilinx Spartan 6 FPGA and thermally stabilized Voltage Controlled Oscillator controlled by the digital-to-analog converter. The board supports standalone operation, without the support from the host operating system, as the entire control algorithm is run on a Microblaze CPU implemented in the FPGA. The software support for the card includes the low-level API in the form of Linux driver, user-mode library, high-level API: ITER Nominal Device Support and EPICS IOC. The device has been tested in the ITER timing distribution network (TCN) with three cascaded PTP-enabled Hirschmann switches and a GPS reference clock source. An RMS synchronization accuracy, measured by direct comparison of the PPS signals, better than 20 ns has been obtained.

  18. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger

    2012-01-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall

  19. Harmonization of IEEE323 and IEC60780 standards For Environmental Qualificaiton of Electric Equipment

    International Nuclear Information System (INIS)

    Kim, Jong Seog

    2009-01-01

    IEEE323 standard has been widely used for the qualification of electric equipment in Asian pacific area while IEC6070 has been mostly used in European area. Since each plant use different standard for environmental qualification, manufacturer has to perform the qualification test twice in accordance with each standard. Problem also can be happened in the plant site when they are going to purchase equipment qualified by different qualification standard which are not used in his plant. The need of harmonization of each standard has been raised several years and it is known that some studies are in progress by IEEE committee. KEPRI has a plan of comparing EQ relative standards of IEEE, IEC and RCC in 2009. In this paper, brief comparing result between IEEE323 and IEC60780 and the proper harmonization method is introduced

  20. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    The convenience of IEEE 8O2.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors However, this use is predicated on an implicit assumption of confidentiality...

  1. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  2. Book Review: Stop, Write!

    Directory of Open Access Journals (Sweden)

    Hans Thulesius

    2013-06-01

    Full Text Available This book on writing grounded theory is intended for the empirical GT researcher who wants to pursue his/her research until publication. It is the first book devoted entirely to such a crucial issue as writing grounded theory. Thus, Stop, Write: Writing Grounded Theory, is a practical book that fills a gap in GT methodology. In the first chapter of the book, Dr. Glaser says, “Stop unending conceptualization, unending data coverage, and unending listening to others who would egg you on with additional data, ideas and/or requirements or simply wait too long”. The book teaches the reader how to actually write a grounded theory by “simply” writing up the sorted memos. This requires efficient sorting that is dealt with in chapter two on Sorting Memos, which includes precious repetition from Theoretical Sensitivity (1978. How writing can be done effectively is outlined in chapter three The Working Paper. Then follows chapter four on how to rework the first draft with the different tasks of editing for language and professionalism. Thereafter Dr. Glaser discusses Writing Problems in chapter five where he gives useful guidance on how to overcome writing blocks and problems with supervisors and dissertation committees. The book also deals with publishing and with collaboration as experienced between Barney Glaser and the cofounder of grounded theory, Anselm Strauss.

  3. The Writing Suitcase.

    Science.gov (United States)

    Rich, Susan J.

    1985-01-01

    Discusses one teacher's method for encouraging young children's literacy developemnt. Offers practical suggestions for involving parents in stimulating their child's early reading and writing skills. (DT)

  4. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    ...) attacks targeting its management and media access protocols Computer simulation models have proven to be effective tools in the study of cause and effect in numerous fields This thesis involved the design and implementation of a IEEE 8O2.11-based simulation model using OMNeT++, to investigate the effects of different types of DoS attacks on a IEEE 8O2.11 network, and the effectiveness of corresponding countermeasures.

  5. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  6. Performance of the IEEE 802.3 EPON registration scheme under high load

    Science.gov (United States)

    Bhatia, Swapnil P.; Bartos, Radim

    2004-09-01

    The proposed standard for the IEEE 802.3 Ethernet Passive Optical Network includes a random delayed transmission scheme for registration of new nodes. Although the scheme performs well on low loads, our simulation demonstrates the degraded and undesirable performance of the scheme at higher loads. We propose a simple modification to the current scheme that increases its range of operation and is compatible with the IEEE draft standard. We demonstrate the improvement in performance gained without any significant increase in registration delay.

  7. Isolan - A Fibre Optic Network Conforming To IEEE 802.3 Standards

    Science.gov (United States)

    Roworth, D. A. A.; Howe, N.

    1986-10-01

    The progress of the IEEE 802.3 standard for fibre optic LANs is indicated with reference to both mixed media networks and full fibre networks. For a fibre optic network the most suitable layout is a "snowflake" topology composed of multiport repeaters and active fibre hubs. A range of components is described which enables the realisation of such a topology in conformance with the IEEE 802.3 standard.

  8. Validation of IEEE P1547.1 Interconnection Test Procedures: ASCO 7000 Soft Load Transfer System

    Energy Technology Data Exchange (ETDEWEB)

    Kroposki, B.; Englebretson, S.; Pink, C.; Daley, J.; Siciliano, R.; Hinton, D.

    2003-09-01

    This report presents the preliminary results of testing the ASCO 7000 Soft Load Transfer System according to IEEE P1547.1 procedures. The ASCO system interconnects synchronous generators with the electric power system and provides monitoring and control for the generator and grid connection through extensive protective functions. The purpose of this testing is to evaluate and give feedback on the contents of IEEE Draft Standard P1547.1 Conformance Tests Procedures for Equipment Interconnecting Distributed Resources With Electric Power Systems.

  9. Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks

    OpenAIRE

    Kuo-Feng Huang; Shih-Jung Wu

    2013-01-01

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services is the primary concern for IEEE802.16j networks. A scheduling scheme that satisfies the QoS requirements has become more important for wireless communications. We proposed an adaptive nontransparent-based distributed scheduling scheme (ANDS) for IEEE 802.16j networks. ANDS comprises three major components: Priority Assignment, Resource Allocation, Preserved Bandwidth Adjustment. Different service-type connections p...

  10. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  11. Radio Frequency Fingerprinting Techniques Through Preamble Modification in IEEE 802.11B

    Science.gov (United States)

    2014-06-30

    4.2.1 Wald–Wolfowitz Runs Test . . . . . . . . . . . . . . . . . . . . . . 41 4.2.2 Wald–Wolfowitz Application to SXS System . . . . . . . . . . . . 42...Station SXS Signals eXploitation System USB Universal Serial Bus xiv Acronym Definition USRP Universal Software Radio Peripheral WLAN Wireless Local...Electronics Engineers (IEEE) defines standards applicable to the IEEE 802.11 protocol, however the standard does not reach the level of specificity to dictate

  12. Writing for Change — An Interactive Guide to Effective Writing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In Writing for Change, you will learn the core skills of effective writing, how to write ... It is full of practical exercises and examples from the field of international development. ... Climate Change, Vulnerability, and Health in Colombia and Bolivia.

  13. LEARNING TO TEACH WRITING THROUGH WRITING

    Directory of Open Access Journals (Sweden)

    Svetlana Suchkova

    2013-01-01

    Full Text Available This paper discusses some major issues concerning teaching writing to future teachers. There are a lot of EFL/ESL textbooks focused on teaching writing. However, those that are intended for trainee teachers are rare on the market. The goal of this paper is to share the result of several years of work on the writing syllabus and materials that is effective in the process of teaching future teachers. It contains sample of tasks based on certain principles that may promote teachers to become effective writers for themselves and, at the same time, to acquire initial professional skills necessary in their future career. A course book can not address any audience in general. It must focus on a particular learner, the objectives, and content of the process of learning. In the situation when no textbook meets these requirements, the problem of providing students with an appropriate textbook must be solved by creating new textbooks.

  14. Investigation of Writing Strategies, Writing Apprehension, and Writing Achievement among Saudi EFL-Major Students

    Science.gov (United States)

    Al Asmari, AbdulRahman

    2013-01-01

    The tenet of this study is to investigate the use of writing strategies in reducing writing apprehension and uncovering its effect on EFL students' writing achievement. It also attempts to explore associations between foreign language apprehension, writing achievement and writing strategies. The primary aims of the study were to explore the…

  15. Creating Tension in Writing.

    Science.gov (United States)

    Folta, Bernarr

    This paper discusses the rationale and teaching methods for a six-week unit, for a high school freshman English Class, on perception, semantics, and writing, which places special focus on developing tension in student writing. The first four objectives of the course focus on perception and the next two focus on semantics. The seventh…

  16. Teaching Writing in Economics

    Science.gov (United States)

    Schmeiser, Katherine

    2017-01-01

    In this article, the author provides motivation and a template for integrating and teaching writing in a variety of economics courses: core theory or introductory courses, topic courses, and economic writing/research courses. For each assignment, pedagogical reasoning and syllabus integration are discussed. Additionally, the author shows that…

  17. Writing that Works.

    Science.gov (United States)

    Roman, Kenneth; Raphaelson, Joel

    Intended for use by nonprofessional writers who must use the written word to communicate and get results, this book offers practical suggestions on how to write business letters, memos, sales and fund raising letters, plans, and reports. The book covers general principles of good writing and emphasizes the importance of editing. In addition, it…

  18. Children's Advertisement Writing

    Science.gov (United States)

    Burrell, Andrew; Beard, Roger

    2010-01-01

    This paper explores primary school children's ability to engage with "the power of the text" by tackling persuasive writing in the form of an advertisement. It is eclectically framed within genre theory and rhetorical studies and makes use of linguistic tools and concepts. The paper argues that writing research has not built upon earlier…

  19. The Cybernetic Writing Program.

    Science.gov (United States)

    Lowe, Kelly Fisher

    This paper looks at the role of a Writing Program Administrator, and applies the idea of a cybernetic system to the administration of the program. In this cybernetic model, the Writing Program Administrator (WPA) works as both a problem solver and problem causer, with the responsibility of keeping the program in proper balance. A cybernetic…

  20. Dream and Creative Writing

    Institute of Scientific and Technical Information of China (English)

    杨公建

    2015-01-01

    Freud asserts that the unconscious will express its suppressed wishes and desires. The unconscious will then redirect andreshape these concealed wishes into acceptable social activities, presenting them in the form of images or symbols in our dreams and/or our writings. Dream is the unconscious which promotes the creative writing.

  1. Computers in writing instruction

    NARCIS (Netherlands)

    Schwartz, Helen J.; van der Geest, Thea; Smit-Kreuzen, Marlies

    1992-01-01

    For computers to be useful in writing instruction, innovations should be valuable for students and feasible for teachers to implement. Research findings yield contradictory results in measuring the effects of different uses of computers in writing, in part because of the methodological complexity of

  2. Writing with Phineas

    DEFF Research Database (Denmark)

    Wegener, Charlotte

    2014-01-01

    This article describes a collaborative writing strategy when you are alone. It is the story of how I came to bring Phineas, the protagonist in A. S. Byatt’s The Biographer’s Tale, into my writing process as a third voice in my dialogue with my data. It is a self-reflective text that shows how co...

  3. Democracy and Historical Writing

    NARCIS (Netherlands)

    de Baets, Antoon

    2015-01-01

    In this essay, we try to clarify the relationship between democracy and historical writing. The strategy is first exploring the general relationship between democracy and historical awareness, and then, studying the relationship between democracy and historical writing itself to find out whether

  4. Technical Writing Tips

    Science.gov (United States)

    Kennedy, Patrick M.

    2004-01-01

    The main reason engineers, technicians, and programmers write poor technical documents is because they have had little training or experience in that area. This article addresses some of the basics that students can use to master technical writing tasks. The article covers the most common problems writers make and offers suggestions for improving…

  5. "Righting" the Writing Problem.

    Science.gov (United States)

    Shaughnessy, Michael F.; Eastham, Nicholas

    The problem of college students' writing skills or lack thereof is generally agreed upon in academia. One cause is the inordinate amount of multiple choice/true false/fill in the blank type of tests that students take in high school and college. Not only is there is a dearth of actual classes in writing available, few students recognize the need…

  6. Let's Write a Script.

    Science.gov (United States)

    Harding, T. E.

    Some problems of writing scripts for radio and/or television are discussed, with examples provided to illustrate the rules. Writing both fictional scripts and documentaries are considered. Notes are also included to help the freelance writer who wishes to sell his work. (RH)

  7. Writing History in Exile

    NARCIS (Netherlands)

    de Baets, Antoon; Berger, Stefan

    2016-01-01

    WRITING HISTORY IN EXILE * Stefan Berger and Antoon De Baets, Reflections on Exile Historiography 11 * Antoon De Baets, Plutarch’s Thesis : the Contribution of Refugee Historians to Historical Writing (1945-2015) 27 * Peter Burke, Silver Lining : on Some Intellectual Benefits of Exile 39 * Ragnar

  8. Writing in Preliterate Children.

    Science.gov (United States)

    Gombert, Jean Emile; Fayol, Michel

    1992-01-01

    Dictated words and pictures by 48 young French children, aged 3 to 6 years, demonstrated that young children have the capacity to produce graphics that exhibit some of the characteristics of writing. Developmental stages in children's recognition that their own efforts were not true writing were identified. (SLD)

  9. Technical report writing today

    CERN Document Server

    Riordan, Daniel G

    2014-01-01

    "Technical Report Writing Today" provides thorough coverage of technical writing basics, techniques, and applications. Through a practical focus with varied examples and exercises, students internalize the skills necessary to produce clear and effective documents and reports. Project worksheets help students organize their thoughts and prepare for assignments, and focus boxes highlight key information and recent developments in technical communication. Extensive individual and collaborative exercises expose students to different kinds of technical writing problems and solutions. Annotated student examples - more than 100 in all - illustrate different writing styles and approaches to problems. Numerous short and long examples throughout the text demonstrate solutions for handling writing assignments in current career situations. The four-color artwork in the chapter on creating visuals keeps pace with contemporary workplace capabilities. The Tenth Edition offers the latest information on using electronic resum...

  10. Writing-to-Learn

    Science.gov (United States)

    Balachandran, Shreedevi; Venkatesaperumal, Ramesh; Clara, Jothi; Shukri, Raghda K.

    2014-01-01

    Objectives: The objectives of this study were to assess the attitude of Omani nursing students towards writing-to-learn (WTL) and its relationship to demographic variables, self-efficacy and the writing process Methods: A cross-sectional design was used to evaluate attitudes towards WTL by Sultan Qaboos University nursing students. A convenience sample of 106 students was used and data collected between October 2009 and March 2010. A modified version of the WTL attitude scale developed by Dobie and Poirrier was used to collect the data. Descriptive and inferential statistics were used for analysis. Results: Senior and junior students had more positive attitudes to WTL than mid-level students who tended to have negative attitudes towards writing. Although 52.8% students had negative attitudes towards the writing process, the median was higher for attitudes to the writing process compared to the median for self-efficacy. There was a positive correlation between self-efficacy and writing process scores. Conclusion: Overall, students had negative attitudes towards WTL. Attitudes are learnt or formed through previous experiences. The incorporation of WTL strategies into teaching can transform students’ negative attitudes towards writing into positive ones. PMID:24516740

  11. Life Writing After Empire

    DEFF Research Database (Denmark)

    A watershed moment of the twentieth century, the end of empire saw upheavals to global power structures and national identities. However, decolonisation profoundly affected individual subjectivities too. Life Writing After Empire examines how people around the globe have made sense of the post...... in order to understand how individual life writing reflects broader societal changes. From far-flung corners of the former British Empire, people have turned to life writing to manage painful or nostalgic memories, as well as to think about the past and future of the nation anew through the personal...

  12. Writing for Impact

    DEFF Research Database (Denmark)

    Meier, Ninna

    2016-01-01

    Academic work may have impact in a variety of ways, depending on purpose, audience and field, but this is most likely to happen when your work resonates in meaningful ways with people. Ninna Meier encourages a more systematic investigation of the role of writing in achieving impact. Impact through...... writing means getting your readers to understand and remember your message and leave the reading experience changed. The challenge is to make what you write resonate with an audience’s reservoir of experiential knowledge. If the words do not connect to anything tangible, interest can be quickly lost....

  13. IEEE 1547 and 2030 Standards for Distributed Energy Resources Interconnection and Interoperability with the Electricity Grid

    Energy Technology Data Exchange (ETDEWEB)

    Basso, T.

    2014-12-01

    Public-private partnerships have been a mainstay of the U.S. Department of Energy and the National Renewable Energy Laboratory (DOE/NREL) approach to research and development. These partnerships also include technology development that enables grid modernization and distributed energy resources (DER) advancement, especially renewable energy systems integration with the grid. Through DOE/NREL and industry support of Institute of Electrical and Electronics Engineers (IEEE) standards development, the IEEE 1547 series of standards has helped shape the way utilities and other businesses have worked together to realize increasing amounts of DER interconnected with the distribution grid. And more recently, the IEEE 2030 series of standards is helping to further realize greater implementation of communications and information technologies that provide interoperability solutions for enhanced integration of DER and loads with the grid. For these standards development partnerships, for approximately $1 of federal funding, industry partnering has contributed $5. In this report, the status update is presented for the American National Standards IEEE 1547 and IEEE 2030 series of standards. A short synopsis of the history of the 1547 standards is first presented, then the current status and future direction of the ongoing standards development activities are discussed.

  14. Writing anxiety: an affective filter for essay writing instruction among ...

    African Journals Online (AJOL)

    This study which adopted the descriptive research design investigated the relationship between writing anxiety and students' achievement in essay writing. SS2 Students from six schools in Ibadan Metropolis were used for the study. The instruments used were Essay Writing Achievement Test(r=0.81) and Writing Anxiety ...

  15. Writing by the Book, Writing beyond the Book

    Science.gov (United States)

    Johnson, Kristine

    2017-01-01

    Writing has become more visible in academia through writing advice manuals and the faculty development activities they inspire. In this article, I examine writing advice manuals and argue they are epistemologically current traditional, which limits how well and how far they can support scholarly writers. Writing advice manuals and composition…

  16. Influence of Writing Ability and Computation Skill on Mathematics Writing

    Science.gov (United States)

    Powell, Sarah R.; Hebert, Michael A.

    2016-01-01

    Mathematics standards expect students to communicate about mathematics using oral and written methods, and some high-stakes assessments ask students to answer mathematics questions by writing. Assumptions about mathematics communication via writing include (a) students possess writing skill, (b) students can transfer this writing skill to…

  17. See, Say, Write: A Writing Routine for the Preschool Classroom

    Science.gov (United States)

    Copp, Stefanie B.; Cabell, Sonia Q.; Tortorelli, Laura S.

    2016-01-01

    See, Say, Write is an adaptable classroom writing routine that teachers can use across a range of activities in the preschool classroom. This preschool writing routine offers an opportunity for teachers to build on a shared experience through engagement in rich conversation and writing. After a shared experience, teachers will provide a visual…

  18. Power of Writing

    Science.gov (United States)

    ... to write in a journal or post on social media, it is important to express the way you ... far you've come. Tags: communication coping emotions social media tips Related Resources: Managing Emotions Guest Posting Policies ...

  19. Physics, writing and attainment

    Science.gov (United States)

    Farrell, Martin Peter

    2001-01-01

    A study of the examination scripts of A-level students in Malta reveals that a significant number of students lose marks because they fail to express themselves clearly. Practice in writing science is suggested.

  20. Writing Blocks and Tacit Knowledge.

    Science.gov (United States)

    Boice, Robert

    1993-01-01

    A review of the literature on writing block looks at two kinds: inability to write in a timely, fluent fashion, and reluctance by academicians to assist others in writing. Obstacles to fluent writing are outlined, four historical trends in treating blocks are discussed, and implications are examined. (MSE)

  1. The New Interface for Writing

    Science.gov (United States)

    Hadi-Tabassum, Samina

    2014-01-01

    Schools are scrambling to prepare their students for the writing assessments in correlation with the Common Core tests. In some states, writing has not been assessed for more than a decade. Yet, with the use of computerized grading of the students' writing, many teachers are wondering how to best prepare students for the writing assessments,…

  2. The Quotation Theory of Writing

    Science.gov (United States)

    Olson, David R.; Oatley, Keith

    2014-01-01

    Learning to read and write is seen as both the acquisition of skills useful in a modern society and an introduction to a world increasingly organized around the reading and writing of authoritative texts. While most agree on the importance of writing, insufficient attention has been given to the more basic question of just what writing is, that…

  3. IEEE C37.105-1987: IEEE standard for qualifying Class 1E protective relays and auxiliaries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic principles, requirements, and methods for qualifying Class 1E protective relays and auxiliaries such as test and control switches, terminal blocks, and indicating lamps for applications in nuclear power generating stations. When properly employed it can be used to demonstrate the design adequacy of such equipment under normal, abnormal, design basis event and post design basis event conditions in accordance with ANSI/IEEE Std 323-1983. When protective relays and auxiliaries are located in areas not subject to harsh environments, environmental qualification is not required. Protective relays and auxiliaries located inside primary containment in a nuclear power generating station present special conditions beyond the scope of this document. The qualification procedure presented is generic in nature. Other methods may be used at the discretion of the qualifier, provided the basic precepts of ANSI/IEEE Std 32301983 are satisfied

  4. IEEE No. 323, IEEE trial-use standard: General guide for qualifying Class I electric equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the basic requirements for the qualification of Class I electric equipment. This is equipment which is essential to the safe shutdown and isolation of the reactor or whose failure or damage could result in significant release of radioactive material. The purpose of this document is to provide guidance for demonstrating the qualifications of electrical equipment as required in the IEEE Std 279 -- Criteria for Nuclear Power Generating Station Protection Systems, and IEEE Std 308 -- Criteria for Class 1E Electric Systems for Nuclear Power Generating Stations. The qualification methods described may be used in conjunction with the Guides for qualifying specific types of equipment, (see Foreword), for updating qualification following modifications or for qualifying equipment for which no applicable Guide exists

  5. Design of handoff procedures for broadband wireless access IEEE 802.16 based networks

    Directory of Open Access Journals (Sweden)

    V. Rangel–Licea

    2008-01-01

    Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.

  6. An Extended IEEE 118-Bus Test System With High Renewable Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Pena, Ivonne; Martinez-Anido, Carlo Brancucci; Hodge, Bri-Mathias

    2018-01-01

    This article describes a new publicly available version of the IEEE 118-bus test system, named NREL-118. The database is based on the transmission representation (buses and lines) of the IEEE 118-bus test system, with a reconfigured generation representation using three regions of the US Western Interconnection from the latest Western Electricity Coordination Council (WECC) 2024 Common Case [1]. Time-synchronous hourly load, wind, and solar time series are provided for over one year (8784 hours). The public database presented and described in this manuscript will allow researchers to model a test power system using detailed transmission, generation, load, wind, and solar data. This database includes key additional features that add to the current IEEE 118-bus test model, such as: the inclusion of 10 generation technologies with different heat rate functions, minimum stable levels and ramping rates, GHG emissions rates, regulation and contingency reserves, and hourly time series data for one full year for load, wind and solar generation.

  7. PERFORMANCE STUDY OF DISTRIBUTED COORDINATION FUNCTION OVER IEEE 802.11A PHYSICAL LAYER

    Directory of Open Access Journals (Sweden)

    S. SELVAKENEDDY

    2006-06-01

    Full Text Available IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802 for wireless LANs. It has specified an additional physical layer (PHY to support higher data rates, and is termed as the orthogonal frequency division multiplexing (OFDM. In order to exploit its benefits, one of the medium access control (MAC protocols specified in the IEEE 802.11 specification is called distributed coordination function (DCF. DCF is a carrier sense multiple access with collision avoidance (CSMA/CA scheme with slotted binary exponential backoff. The frames can be transmitted using the basic access scheme or the RTS/CTS scheme in DCF. It was demonstrated previously that the RTS/CTS mechanism works well in most scenarios for the previously specified PHYs. In this work, a simple simulator is developed to verify the scalability of the RTS/CTS mechanism over OFDM PHY, which supports much higher data rates.

  8. IEEE 1451.2 based Smart sensor system using ADuc847

    Science.gov (United States)

    Sreejithlal, A.; Ajith, Jose

    IEEE 1451 standard defines a standard interface for connecting transducers to microprocessor based data acquisition systems, instrumentation systems, control and field networks. Smart transducer interface module (STIM) acts as a unit which provides signal conditioning, digitization and data packet generation functions to the transducers connected to it. This paper describes the implementation of a microcontroller based smart transducer interface module based on IEEE 1451.2 standard. The module, implemented using ADuc847 microcontroller has 2 transducer channels and is programmed using Embedded C language. The Sensor system consists of a Network Controlled Application Processor (NCAP) module which controls the Smart transducer interface module (STIM) over an IEEE1451.2-RS232 bus. The NCAP module is implemented as a software module in C# language. The hardware details, control principles involved and the software implementation for the STIM are described in detail.

  9. The scalable coherent interface, IEEE P1596, status and possible applications to data acquisition and physics

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1990-01-01

    IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960-1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics. 7 refs

  10. Application of IEEE 1588 to the real-time control system of accelerator

    International Nuclear Information System (INIS)

    Ma Mingchao; Chen Jianfeng; Shen Liren; Jiang Geyang

    2014-01-01

    Background: Time synchronization is one of the core technology of realizing the real-time control of accelerator under the distributed control system architecture. The ordinary crystal frequency deviation of IEEE 1588 causes low synchronous accuracy, which doesn't meet the needs of high precision synchronization. Purpose: This paper proposes an algorithm to improve the synchronization precision caused by the crystal frequency deviation. Methods: According to the basic principle of IEEE 1588 time synchronization, a dynamic frequency compensation (DFC) algorithm module was designed and a test platform was built to verify the feasibility and practicability of the algorithm. The influence of the synchronous cycle and delay jitter of the switch on the synchronization accuracy were analyzed. Results: Experimental results showed the great precision improvement of synchronization after using DFC algorithm. Conclusion: Low synchronous accuracy caused by the crystal frequency deviation can be improved by using DFC algorithm implemented for precision time protocol (PTP) of IEEE 1588. (authors)

  11. An analytical model for the performance analysis of concurrent transmission in IEEE 802.15.4.

    Science.gov (United States)

    Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto

    2014-03-20

    Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.

  12. Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.

    Science.gov (United States)

    Ullah, Sana; Chen, Min; Kwak, Kyung Sup

    2012-12-01

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.

  13. Writing Across the Curriculum -- An Online Course in Computer Security

    Directory of Open Access Journals (Sweden)

    Neelu Sinha, Ph.D.

    2006-07-01

    Full Text Available Writing fosters both critical thinking and student learning, serving as one of the most effective ways to understand a topic. Writing across the Curriculum (WAC began in the late 1970’s, as a pedagogical reform movement in response to a perceived deficiency in literacy among college students. Over the past two decades universities have worked to broaden the scope of student writing from composition classes to classes in the students’ major. This paper chronicles the application of WAC into the discipline of Computer Science. The purpose of this study is to develop an online Computer Security course (for sophomores and juniors in Computer Science, under the umbrella of WAC, to help improve the students’ writing overall and focus on skills students require in upper level courses in the major. Developing this course as an online course (rather than a traditional face-to-face course offers flexible configurability and scalability, features that are useful to prepare students for constantly changing real world security challenges. This paper includes all aspects of course design and insight into lessons learned. Results indicate that both the faculty and students benefit from such a writing intensive course. Reading and responding to the students’ writing enables faculty to gain valuable insights into the students’ thoughts, ideas, problems, and other issues. Students reported increased knowledge and comprehension of the subject material, deeper understanding of the conventions within Computer Science, improved analysis and reporting skills, ability to understand and present abstract concepts effectively, and skill in producing professional documents.

  14. The science writing tool

    Science.gov (United States)

    Schuhart, Arthur L.

    This is a two-part dissertation. The primary part is the text of a science-based composition rhetoric and reader called The Science Writing Tool. This textbook has seven chapters dealing with topics in Science Rhetoric. Each chapter includes a variety of examples of science writing, discussion questions, writing assignments, and instructional resources. The purpose of this text is to introduce lower-division college science majors to the role that rhetoric and communication plays in the conduct of Science, and how these skills contribute to a successful career in Science. The text is designed as a "tool kit," for use by an instructor constructing a science-based composition course or a writing-intensive Science course. The second part of this part of this dissertation reports on student reactions to draft portions of The Science Writing Tool text. In this report, students of English Composition II at Northern Virginia Community College-Annandale were surveyed about their attitudes toward course materials and topics included. The findings were used to revise and expand The Science Writing Tool.

  15. An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes

    Directory of Open Access Journals (Sweden)

    Szott Szymon

    2010-01-01

    Full Text Available We present a novel model of IEEE 802.11 EDCA with support for analysing networks with misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the model by extensive simulation analysis and by comparing it to three other IEEE 802.11 models. The results show that our model behaves satisfactorily and outperforms other widely acknowledged models. Secondly, a comparison with simulation results in several scenarios with misbehaving nodes proves that our model performs correctly for these scenarios. The proposed model can, therefore, be considered as an original contribution to the area of EDCA models and backoff misbehaviour.

  16. Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4

    Directory of Open Access Journals (Sweden)

    Mukhtar Azeem

    2014-01-01

    by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.

  17. Analysis Of Impact Of Various Parameters On BER Performance For IEEE 802.11b

    Directory of Open Access Journals (Sweden)

    Nilesh B. Kalani

    2015-08-01

    Full Text Available Abstract This paper discusses about IEEE 802.11b simulation model implemented using LabVIEW software and its analyses for impact on bit error rate BER for different parameters as channel type channel number data transmission rate and packet size. Audio file is being transmitted processed and analyzed using the model for various parameters. This paper gives analysis of BER verses ESN0 for various parameter like data rate packet size and communication channel for the IEEE 802.11b simulation model generated using LabVIEW. It is proved that BER can be optimized by tweaking different parameters of wireless communication system.

  18. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    OpenAIRE

    V. Balaji; S. Anand; C.R. Hota; G. Raghurama

    2016-01-01

    In this paper we present a Cooperative Spectrum Sensing (CSS) algorithm for Cognitive Radios (CR) based on IEEE 802.22Wireless Regional Area Network (WRAN) standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration) to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22) within a time constraint (channel sensing time). To meet this objectiv...

  19. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    OpenAIRE

    Sayef Azad Sakin; Md. Abdur Razzaque; Mohammad Mehedi Hassan; Atif Alamri; Nguyen H. Tran; Giancarlo Fortino

    2017-01-01

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a s...

  20. International Conference on Grey Systems and intelligent Services (IEEE GSIS 2009)

    CERN Document Server

    Liu, Sifeng; Advances in Grey Systems Research

    2010-01-01

    This book contains contributions by some of the leading researchers in the area of grey systems theory and applications. All the papers included in this volume are selected from the contributions physically presented at the 2009 IEEE International Conference on Grey Systems and Intelligent Services, November 11 – 12, 2009, Nanjing, Jiangsu, People’s Republic of China. This event was jointly sponsored by IEEE Systems, Man, and Cybernetics Society, Natural Science Foundation of China, and Grey Systems Society of China. Additionally, Nanjing University of Aeronautics and Astronautics also invested heavily in this event with its direct and indirect financial and administrative supports.

  1. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  2. Writing for Science Literacy

    Science.gov (United States)

    Chamberlin, Shannon Marie

    Scientific literacy is the foundation on which both California's currently adopted science standards and the recommended new standards for science are based (CDE, 2000; NRC, 2011). The Writing for Science Literacy (WSL) curriculum focuses on a series of writing and discussion tasks aimed at increasing students' scientific literacy. These tasks are based on three teaching and learning constructs: thought and language, scaffolding, and meta-cognition. To this end, WSL is focused on incorporating several strategies from the Rhetorical Approach to Reading, Writing, Listening and Speaking to engage students in activities designed to increase their scientific literacy; their ability to both identify an author's claim and evidence and to develop their own arguments based on a claim and evidence. Students participated in scaffolded activities designed to strengthen their written and oral discourse, hone their rhetorical skills and improve their meta-cognition. These activities required students to participate in both writing and discussion tasks to create meaning and build their science content knowledge. Students who participated in the WSL curriculum increased their written and oral fluency and were able to accurately write an evidence-based conclusion all while increasing their conceptual knowledge. This finding implies that a discourse rich curriculum can lead to an increase in scientific knowledge.

  3. Robots Learn Writing

    Directory of Open Access Journals (Sweden)

    Huan Tan

    2012-01-01

    Full Text Available This paper proposes a general method for robots to learn motions and corresponding semantic knowledge simultaneously. A modified ISOMAP algorithm is used to convert the sampled 6D vectors of joint angles into 2D trajectories, and the required movements for writing numbers are learned from this modified ISOMAP-based model. Using this algorithm, the knowledge models are established. Learned motion and knowledge models are stored in a 2D latent space. Gaussian Process (GP method is used to model and represent these models. Practical experiments are carried out on a humanoid robot, named ISAC, to learn the semantic representations of numbers and the movements of writing numbers through imitation and to verify the effectiveness of this framework. This framework is applied into training a humanoid robot, named ISAC. At the learning stage, ISAC not only learns the dynamics of the movement required to write the numbers, but also learns the semantic meaning of the numbers which are related to the writing movements from the same data set. Given speech commands, ISAC recognizes the words and generated corresponding motion trajectories to write the numbers. This imitation learning method is implemented on a cognitive architecture to provide robust cognitive information processing.

  4. The tree identify protocol of IEEE 1394 in uCRL

    NARCIS (Netherlands)

    C. Shankland; M.B. van der Zwaag

    1998-01-01

    textabstractWe specify the tree identify protocol of the IEEE 1394 high performance serial multimedia bus at three different levels of detail using $mu$CRL. We use the cones and foci verification technique of Groote and Springintveld to show that the descriptions are equivalent under branching

  5. A 1-GHz charge pump PLL frequency synthesizer for IEEE 1394b PHY

    DEFF Research Database (Denmark)

    Ji, J.; Liu, H.; Li, Q.

    2012-01-01

    This paper presents an implementation of multi-rate SerDes transceiver for IEEE 1394b applications. Simple and effective pre-emphasis and equalizer circuits are used at transmitter and receiver, respectively. A phase interpolator based clock and data recovery circuit with optimized linearity is a...

  6. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-01-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  7. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-08-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  8. IEEE 8023 ethernet, current status and future prospects at the LHC

    CERN Document Server

    Dobinson, Robert W; Haas, S; Martin, B; Le Vine, M J; Saka, F

    2000-01-01

    The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging. 8 Refs.

  9. IEEE 802.3 Ethernet, Current Status and Future Prospects at the LHC

    CERN Document Server

    Dobinson, Robert W; Haas, S W; Martin, B; Le Vine, M J; Saka, F

    2000-01-01

    The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging.

  10. Performance Evaluations for IEEE 802.15.4-based IoT Smart Home Solution

    Directory of Open Access Journals (Sweden)

    Nga Dinh

    2016-09-01

    Full Text Available The Internet of Things (IoT is going to be a market-changing force for a variety of real-time applications such as e-healthcare, home automation, environmental monitoring, and industrial automation. Low power wireless communication protocols offering long lifetime and high reliability such as the IEEE 802.15.4 standard have been a key enabling technology for IoT deployments and are deployed for home automation recently. The issues of the IEEE 802.15.4 networks have moved from theory to real world deployments. The work presented herein intends to demonstrate the use of the IEEE 802.15.4 standard in recent IoT commercial products for smart home applications: the Smart Home Starter Kit. The contributions of the paper are twofold. First, the paper presents how the IEEE 802.15.4 standard is employed in Smart Home Starter Kit. In particular, network topology, network operations, and data transfer mode are investigated. Second, network performance metrics such as end-to-end (E2E delay and frame reception ratio (FRR are evaluated by experiments. In addition, the paper discusses several directions for future improvements of home automation commercial products.

  11. The IEEE-SA patent policy update under the lens of EU competition law

    NARCIS (Netherlands)

    Kanevskaia, Olia; Zingales, Nicolo

    2016-01-01

    In 2015, the Institute of Electrical and Electronics Engineers (IEEE) Standardization Association made some controversial changes to its patent policy. The changes include a recommended method of calculation of FRAND royalty rates, and a request to members holding a standard essential patent (SEP)

  12. 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf | 01 ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News. IAS Logo. 29th Mid-year meeting. Posted on 19 ...

  13. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  14. Adaptive Radio Resource Allocation in Hierarchical QoS Scheduling for IEEE 802.16 Systems

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2007-01-01

    Future mobile communication systems such as IEEE 802.16 are expected to deliver a variety of multimedia services with diverse QoS requirements. To guarantee the QoS provision, appropriate scheduler architecture and scheduling algorithms have to be carefully designed. In this paper, we propose...

  15. Evaluation of H.264/AVC over IEEE 802.11p vehicular networks

    Science.gov (United States)

    Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

    2013-12-01

    The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

  16. IEEE Conference Record of 1980 Fourteenth Pulse Power Modulator Symposium, 3-5 June 1980.

    Science.gov (United States)

    1980-01-01

    Capacitor Discharges, Proc IEEE 113, p. able operation on Nova we are examing alter- 1549 (1966). nate switch gas (Ar:N 2 :SF 6 ) and electrode material...VOLTTA-KILOVOLTS PLATE VO LTAM --LOVLTS Figure 8. Constant Current Curve for the X2097U Figure 11. Constant Current Curve for the X2097V at 2000 Volt

  17. Oldest Packet Drop (OPD): a Buffering Mechanism for Beaconing in IEEE 802.11p VANETs

    NARCIS (Netherlands)

    van Eenennaam, Martijn; Hendriks, Luuk; Karagiannis, Georgios; Heijenk, Geert

    2011-01-01

    The IEEE 802.11p MAC technology can be used to provide connectivity for real-time vehicle control known as Cooperative Adaptive Cruise Control. Due to the real-time nature of this system, it is paramount the delay of the received information is as small as possible. This paper researches the Oldest

  18. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  19. Interference Measurements in IEEE 802.11 Communication Links Due to Different Types of Interference Sources

    NARCIS (Netherlands)

    van Bloem, J.W.H.; Schiphorst, Roelof; Kluwer, Taco; Slump, Cornelis H.

    2012-01-01

    The number of wireless devices (smartphones, laptops, sensors) that use the 2.4 GHz ISM band is rapidly increasing. The most common communication system in this band is Wi-Fi (IEEE 802.11b/g/n). For that reason coexistence between Wi-Fi and other systems becomes more and more important. In this

  20. Proceedings of the 1988 IEEE international conference on robotics and automation. Volume 1

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    These proceedings compile the papers presented at the international conference (1988) sponsored by IEEE Council on ''Robotics and Automation''. The subjects discussed were: automation and robots of nuclear power stations; algorithms of multiprocessors; parallel processing and computer architecture; and U.S. DOE research programs on nuclear power plants

  1. Performance Analysis of Non-saturated IEEE 802.11 DCF Networks

    Science.gov (United States)

    Zhai, Linbo; Zhang, Xiaomin; Xie, Gang

    This letter presents a model with queueing theory to analyze the performance of non-saturated IEEE 802.11 DCF networks. We use the closed queueing network model and derive an approximate representation of throughput which can reveal the relationship between the throughput and the total offered load under finite traffic load conditions. The accuracy of the model is verified by extensive simulations.

  2. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  3. Performance characterization of the IEEE 802.11 signal transmission over a multimode fiber PON

    Science.gov (United States)

    Maksymiuk, L.; Siuzdak, J.

    2014-11-01

    In this paper there are presented measurements concerning performance analysis of the IEEE 802.11 signal distribution over multimode fiber based passive optical network. In the paper there are addressed three main sources of impairments: modal noise, frequency response fluctuation of the multimode fiber and non-linear distortion of the signal in the receiver.

  4. Multitemporal Very High Resolution From Space: Outcome of the 2016 IEEE GRSS Data Fusion Contest

    NARCIS (Netherlands)

    Mou, L.; Zhu, X.; Vakalopoulou, M.; Karantzalos, K.; Paragios, N.; Saux, Le B.; Moser, G.; Tuia, D.

    2017-01-01

    In this paper, the scientific outcomes of the 2016 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society are discussed. The 2016 Contest was an open topic competition based on a multitemporal and multimodal dataset,

  5. Outdoor Long-Range WLANs : A Lesson for IEEE 802.11ah

    NARCIS (Netherlands)

    Aust, Stefan; Venkatesha Prasad, R.; Niemegeers, Ignas G M M

    2015-01-01

    Several service applications have been reported by many who proposed the use of wireless LANs (WLANs) over a wide variety of outdoor deployments. In particular, the upcoming IEEE 802.11ah WLAN protocol will enable a longer transmission range between WLAN access points (APs) and stations (STAs) up to

  6. Incorporating antenna beamswitching technique into drivers for IEEE802.11 WLAN devices

    CSIR Research Space (South Africa)

    Mofolo, M

    2015-11-23

    Full Text Available the beamswitching technique for switched parasitic array (SPA) and electronically steerable parasitic array radiator (ESPAR) antennas in the drivers for IEEE802.11 WLAN devices. The modifications of the open source drivers (ath5k and ath9k) to enable real...

  7. Writing and Retelling Multiple Ethnographic Tales of a Soup Kitchen for the Homeless.

    Science.gov (United States)

    Miller, Dana L.; Creswell, John W.; Olander, Lisa

    An ethnographic study narrated three tales about a soup kitchen for the homeless and the near-homeless. To provide a cultural, ethnographic analysis, and share fieldwork experiences the study began with realist and confessional tales. These two tales emerged from the initial writing and presenting of the soup kitchen ethnography to qualitative…

  8. TEACHING WRITING THROUGHT DICTOGLOSS

    Directory of Open Access Journals (Sweden)

    Ratna Sari Dewi

    2015-03-01

    Full Text Available The objective of this study is to help students in developing their ideas in writing due to their difficulties to arrange ideas. Although they do have ideas, they cannot structure their ideas well in their papers. Several factors could cause this problem such as lack of vocabulary and knowledge or strategies in arranging ideas in papers. Another factor is unclear explanation and insufficient guidance from the teachers. Based on literature review, dictoglos can be a guide for students to develop their ideas in writing. It is a teaching technique which incorporates various activities such listening, taking notes, discussing, and reconstructing which have some standard procedures and variations.

  9. Writing-A Torture

    Institute of Scientific and Technical Information of China (English)

    李; 菲

    2000-01-01

    Hey, "writing", are you kidding? Such an abstract, high-sounding, and completely academic title! Who do you think I am, Francis Bacon or William Shakespeare? If I really could elaborate on such a topic easily and clearly, why should I pay so much to sit here and study? I'd have gone and taught at Beijing University or Harvard University (if they accepted me). But, I believe that blue-eyed, big-nosed, blond American writing teacher must have his own reason for hurling such a topic upon me, so I'll try my bes...

  10. Writing and the 'Subject'

    DEFF Research Database (Denmark)

    Greve, Charlotte

    /page. It is, moreover, an index pointing to the painting/writing subject; it is a special deictic mode of painting/writing. The handwriting of the Russian avant-garde books, the poetics of handwriting, and the way handwriting is represented in poetry emphasize the way the subject (the speaking and the viewing...... in the early as well as the contemporary avant-garde, it becomes clear that the ‘subject’ is an unstable category that can be exposed to manipulation and play. Handwriting is performing as a signature (as an index), but is at the same time similar to the signature of a subject (an icon) and a verbal construct...

  11. Writing with resonance

    DEFF Research Database (Denmark)

    Meier, Ninna; Wegener, Charlotte

    2017-01-01

    In this article, we explore what organization and management scholars can do to write with resonance and to facilitate an emotional, bodily, or in other ways sensory connection between the text and the reader. We propose that resonance can be relevant for organization and management scholars in two......, and thus bring forward the field of research in question. We propose that writing with resonance may be a way to further the impact of academic work by extending the modalities with which our readers can relate to and experience our work....

  12. Writing on Multiple Journeys

    OpenAIRE

    Robbins, Sarah; Pullen, Ann Ellis

    2012-01-01

    In their beautifully researched study and critical edition, Nellie Arnott’s Writings on Angola, 1905–1913: Missionary Narratives Linking Africa and America (Parlor Press), authors Sarah Robbins and Ann Ellis Pullen examine in fine detail the historical record of the transnational network of literary work produced by Arnott. Tracing her legacy in the study’s third chapter, “Writing on Multiple Journeys,” the authors argue on behalf of Arnott’s capacity to create authority and celebrity as well...

  13. A versatile trigger and synchronization module with IEEE1588 capabilities and EPICS support

    International Nuclear Information System (INIS)

    Lopez, J.M.; Ruiz, M.; Borrego, J.; Arcas, G. de; Barrera, E.; Vega, J.

    2010-01-01

    Event timing and synchronization are two key aspects to improve in the implementation of distributed data acquisition (dDAQ) systems such as the ones used in fusion experiments. It is also of great importance the integration of dDAQ in control and measurement networks. This paper analyzes the applicability of the IEEE1588 and EPICS standards to solve these problems, and presents a hardware module implementation based in both of them that allow adding these functionalities to any DAQ. The IEEE1588 standard facilitates the integration of event timing and synchronization mechanisms in distributed data acquisition systems based on IEEE 803.3 (Ethernet). An optimal implementation of such system requires the use of network interface devices which include specific hardware resources devoted to the IEE1588 functionalities. Unfortunately, this is not the approach followed in most of the large number of applications available nowadays. Therefore, most solutions are based in software and use standard hardware network interfaces. This paper presents the development of a hardware module (GI2E) with IEEE1588 capabilities which includes USB, RS232, RS485 and CAN interfaces. This permits to integrate any DAQ element that uses these interfaces in dDAQ systems in an efficient and simple way. The module has been developed with Motorola's Coldfire MCF5234 processor and National Semiconductors's PHY DP83640T, providing it with the possibility to implement the PTP protocol of IEEE1588 by hardware, and therefore increasing its performance over other implementations based in software. To facilitate the integration of the dDAQ system in control and measurement networks the module includes a basic Input/Output Controller (IOC) functionality of the Experimental Physics and Industrial Control System (EPICS) architecture. The paper discusses the implementation details of this module and presents its applications in advanced dDAQ applications in the fusion community.

  14. Right Writing (or Writing Right) for Creativity in Advertising.

    Science.gov (United States)

    Pearce, R. Charles

    1989-01-01

    Suggests techniques from Peter Elbow's book, "Writing with Power," for an advertising copywriting class. Describes in detail an eight-step procedure: warm-up, loop writing, sharing, revision, sharing, revision, editing group sharing, and revision. (MS)

  15. The Write Stuff: Teaching the Introductory Public Relations Writing Course.

    Science.gov (United States)

    King, Cynthia M.

    2001-01-01

    Outlines an introductory public relations writing course. Presents course topics and objectives, and assignments designed to meet them. Provides a sample grading rubric and evaluates major public relations writing textbooks. Discusses learning and assessment strategies. (SR)

  16. Observing writing processes of struggling adult writers with collaborative writing

    Directory of Open Access Journals (Sweden)

    Afra Sturm

    2016-10-01

    Full Text Available This study investigated how struggling adult writers solve a writing task and what they know about writing and themselves as writers. The writing process of the adult writers was examined by combining three elements: the observation of collaborative writing tasks, analyses of their written texts, and structured individual interviews that included both retrospective and prospective parts. This methodical approach provides productive tools to assess writing processes and writing knowledge of struggling adult writers. The triangulation of data from the different sources is visualized in a case study. Findings from the case study suggest both similarities and differences between struggling adult and younger writers. Concerning the writing process of both groups, planning and revision play a limited role. However, alongside these similar limitations in their writing process, struggling adult writers distinguish themselves from their young counterparts through their relatively extensive knowledge about themselves as writers.

  17. Collaborative Writing to Enhance Academic Writing Development through Project Work

    Science.gov (United States)

    Robayo Lun, Alma Milena; Hernandez Ortiz, Luz Stella

    2013-01-01

    Advanced students at university level struggle with many aspects of academic writing in English as a foreign language. The purpose of this article is to report on an investigation aimed at analyzing what collaborative writing through project work tells us about students' academic writing development at the tertiary level. The compositions written…

  18. Write to read: the brain's universal reading and writing network.

    Science.gov (United States)

    Perfetti, Charles A; Tan, Li-Hai

    2013-02-01

    Do differences in writing systems translate into differences in the brain's reading network? Or is this network universal, relatively impervious to variation in writing systems? A new study adds intriguing evidence to these questions by showing that reading handwritten words activates a pre-motor area across writing systems. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. Scaffolding EFL Students' Writing through the Writing Process Approach

    Science.gov (United States)

    Faraj, Avan Kamal Aziz

    2015-01-01

    This research reports a study conducted at Koya University/English Language Department, and it aims at presenting the effect of scaffolding on EFL students' writing ability through the writing process. In this study, the students have taken the role of writers, so they need to follow the same steps that writers apply during their writing process.…

  20. Writing for publication Part II--The writing process.

    Science.gov (United States)

    Clarke, L K

    1999-01-01

    You have selected a topic, gathered resources, and identified your target audience. The next step is to begin to write and organize your ideas. Initiating the actual writing process can be intimidating, especially for a novice author. This portion of the writing for publication series focuses on helping the writer to organize ideas and get started.

  1. IEEE Std 383-1974: IEEE standard for type test of Class IE electric cables, field splices, and connections for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard provides direction for establishing type tests which may be used in qualifying Class 1E electric cables, field splices, and other connections for service in nuclear power generating stations. General guidelines for qualifications are given in IEEE Std 323-1974, Standard for Qualifying Class IE Electric Equipment for Nuclear Power Generating Stations. Categories of cables covered are those used for power control and instrumentation services. Though intended primarily to pertain to cable for field installation, this guide may also be used for the qualification of internal wiring of manufactured devices. This guide does not cover cables for service within the reactor vessel

  2. Reach Out and Write Someone.

    Science.gov (United States)

    Arnold, Vanessa D.; Roach, Terry D.

    1993-01-01

    Writing letters to elected officials and letters to the editor helps students articulate their thoughts based on sound evidence and valid reasoning, avoiding "sounding off" and emotional appeals. Writing skills, critical thinking, and civic values are reinforced. (SK)

  3. Writing with a Personal Voice.

    Science.gov (United States)

    Rico, Gabriele Lusser

    1985-01-01

    Clustering is a nonlinear brainstorming technique that can encourage children's natural writing ability by helping them draw on their need to make patterns out of their experience. Tips for introducing cluster writing into the classroom are offered. (MT)

  4. Business Writing in Freshman English.

    Science.gov (United States)

    Larmouth, Donald W.

    1980-01-01

    Suggests incorporating business writing into a freshman English course. Outlines three writing and research assignments: a financial status memorandum, a management analysis report, and an evaluation of applicants for a position at a university. (TJ)

  5. Writing with Voice

    Science.gov (United States)

    Kesler, Ted

    2012-01-01

    In this Teaching Tips article, the author argues for a dialogic conception of voice, based in the work of Mikhail Bakhtin. He demonstrates a dialogic view of voice in action, using two writing examples about the same topic from his daughter, a fifth-grade student. He then provides five practical tips for teaching a dialogic conception of voice in…

  6. WRITING LIGHT VERSE.

    Science.gov (United States)

    ARMOUR, RICHARD

    VARIOUS ASPECTS OF WRITING LIGHT VERSE, EITHER FOR FUN OR FOR PUBLICATION, ARE DISCUSSED IN THIS BOOK--(1) THE NATURE AND APPEAL OF LIGHT VERSE AND ITS MANY VARIETIES, (2) SUBJECTS WHICH LEND THEMSELVES BEST TO THE LIGHT-VERSE TREATMENT, (3) THE APPLICATION OF WHAT ONE HAS LEARNED FROM READING, THINKING, AND CLOSELY OBSERVING HUMAN FOIBLES, (4)…

  7. Translation as (Global) Writing

    Science.gov (United States)

    Horner, Bruce; Tetreault, Laura

    2016-01-01

    This article explores translation as a useful point of departure and framework for taking a translingual approach to writing engaging globalization. Globalization and the knowledge economy are putting renewed emphasis on translation as a key site of contest between a dominant language ideology of monolingualism aligned with fast capitalist…

  8. When Cyburgs (Cyborgs) Write.

    Science.gov (United States)

    Calderonello, Alice; Shaller, Deborah

    In an extended conversation two female writing instructors discuss the kind of discourse available in the academy, the way educators are trained to deploy its conventions, and the different ways that voices are authorized. They cite Harraway as an academic writer who bridges the various post-structuralist discourses without ever losing sight of…

  9. Audiovisual Script Writing.

    Science.gov (United States)

    Parker, Norton S.

    In audiovisual writing the writer must first learn to think in terms of moving visual presentation. The writer must research his script, organize it, and adapt it to a limited running time. By use of a pleasant-sounding narrator and well-written narration, the visual and narrative can be successfully integrated. There are two types of script…

  10. Writing a Thesis Differently

    Science.gov (United States)

    Honan, Eileen; Bright, David

    2016-01-01

    In this paper we explore the contributions that Deleuze and Guattari have made to thinking/writing language and how these ideas can be put to work in producing a doctoral thesis. We contribute to the field of work within what Patti Lather and Elizabeth St Pierre have called the "post-qualitative" movement, where researchers attempt to…

  11. Robert Frost on Writing.

    Science.gov (United States)

    Barry, Elaine

    This book is a collection of Frost's letters, reviews, introductions, lectures, and interviews on writing dating back to 1913. It provides Frost's view of literature, and its relation to language and social order. Part one, "Frost as a Literary Critic," discusses the scope of Frost's criticism and Frost as both critical theorist and…

  12. Tolstoy, the Writing Teacher.

    Science.gov (United States)

    Blaisdell, Bob

    1997-01-01

    Discusses the Russian master, Leo Tolstoy, and the fact that he wrote pedagogical treatises besides novels. Talks about his free school for children on his estate and his research on education. Discusses two of Tolstoy's essays which recount interactions with the peasant children. Links this to teaching an adult writing workshop at a soup kitchen.…

  13. Painting and Writing Matters

    DEFF Research Database (Denmark)

    Balle, Søren Hattesen

    materialization. At the same time as O’Hara and Rivers investigate the often conflicting powers of both genres to incarnate the reality of the material world (especially the human body) in their respective media, they also playfully foreground the materiality of painterly/poetic text as paint and writing...

  14. Writing for Physics Mastery.

    Science.gov (United States)

    Weber, Stephen W.

    A study examined the effectiveness of incorporating writing as a tool to master the concepts of physics. Subjects were students in the three traditional physics classes and one non-math or conceptual physics class at East High School in Rockford, Illinois. The instructor tried a variety of methods--students wrote criticisms of Carl Sagan videos,…

  15. Writing for the IELTS

    CERN Document Server

    Lougheed, Dr Lin

    2016-01-01

    This book guides test takers step-by-step through the process of writing an essay in response to a task. Learn how to apply what you’ve learned, familiarize yourself with the types of questions you’ll have to respond to on the test, complete your responses within the time limits, and more.

  16. Cactus: Writing an Article

    Science.gov (United States)

    Hyde, Hartley; Spencer, Toby

    2010-01-01

    Some people became mathematics or science teachers by default. There was once such a limited range of subjects that students who could not write essays did mathematics and science. Computers changed that. Word processor software helped some people overcome huge spelling and grammar hurdles and made it easy to edit and manipulate text. Would-be…

  17. Queering the Writing Center

    Science.gov (United States)

    Denny, Harry

    2010-01-01

    Composition classrooms and writing centers are spaces where negotiation of academic, social, cultural, and political identities are ubiquitous, yet research has not produced adequate theory and practice to help tutors and writers navigate identity production and its politics. This article seeks to begin conversations that might lead to better…

  18. Four virtues of writing

    DEFF Research Database (Denmark)

    Galle, Per

    2016-01-01

    I compiled this guide primarily for students of practical design or architecture at the Royal Danish Academy of Fine Arts. Nevertheless, the guide may also be of use to (potential) design researchers, e.g. doctoral students. In the guide, I offer advice on how to write well, based on my personal ...

  19. Inductive Reasoning and Writing

    Science.gov (United States)

    Rooks, Clay; Boyd, Robert

    2003-01-01

    Induction, properly understood, is not merely a game, nor is it a gimmick, nor is it an artificial way of explaining an element of reasoning. Proper understanding of inductive reasoning--and the various types of reasoning that the authors term inductive--enables the student to evaluate critically other people's writing and enhances the composition…

  20. Writing proofs in analysis

    CERN Document Server

    Kane, Jonathan M

    2016-01-01

    This is a textbook on proof writing in the area of analysis, balancing a survey of the core concepts of mathematical proof with a tight, rigorous examination of the specific tools needed for an understanding of analysis. Instead of the standard "transition" approach to teaching proofs, wherein students are taught fundamentals of logic, given some common proof strategies such as mathematical induction, and presented with a series of well-written proofs to mimic, this textbook teaches what a student needs to be thinking about when trying to construct a proof. Covering the fundamentals of analysis sufficient for a typical beginning Real Analysis course, it never loses sight of the fact that its primary focus is about proof writing skills. This book aims to give the student precise training in the writing of proofs by explaining exactly what elements make up a correct proof, how one goes about constructing an acceptable proof, and, by learning to recognize a correct proof, how to avoid writing incorrect proofs. T...

  1. Magazine Writing Today.

    Science.gov (United States)

    Kelley, Jerome E.

    Intended as a practical guide for persons interested in the field of free lance writing, this book provides information on the following topics: the individual's response to the magazine publishing market; magazines and the types of articles that are marketable; methods for locating story material; ways of questioning and interpreting an editor's…

  2. Teaching Technical Writing - Towards Technical Writing

    DEFF Research Database (Denmark)

    Kastberg, Peter

    2000-01-01

    In this paper I will present key aspects of the curriculum for the university degree in technical translation that I have designed for and subsequently implemented at the German Department of the Aarhus School of Business, Denmark. My starting point will be a critical discussion of the norm that ...... of technical writing.......In this paper I will present key aspects of the curriculum for the university degree in technical translation that I have designed for and subsequently implemented at the German Department of the Aarhus School of Business, Denmark. My starting point will be a critical discussion of the norm...... that used to govern what the quality of an LSP text should be as opposed to the standpoint, which I advocate. By way of summing up, I will show how a university curriculum is designed so that - upon graduation - the technical translator could also be methodological quite well suited to take on the challenge...

  3. TRAVEL WRITING: AN APPLICATION OF WRITING WORKSHOP TO ENHANCE STUDENTS’S CREATIVE WRITING

    Directory of Open Access Journals (Sweden)

    Prayudias Margawati

    2014-10-01

    Full Text Available Writing is often assumed as uneasy skill to either learn or teach. For students, they find it difficult to develop ideas in writing. On the other hand, teachers, many of them, only ready with the materials but confuse with the appropriate ways to teach. This paper intends to describe and discuss a method of teaching writing namely writing workshop to improve students’ writing skill through travel writing. Writing workshop proposed by Calkins that consists of mini lesson, work time, peer conferring and/or response groups, share sessions, and publication celebration is applied in writing class for methodological purposes. In mini lesson, teacher offers something to the class that is meant to introduce a writing strategy done at the beginning of the workshop. During work time point, students start their new piece of writing. Teacher moves among students conferring with them while checking their works. Peer conferences or response groups provide a forum for students to talk about works in progress. When students work in group, one of them could arrange his/ her group needs during the work time. A share session may be varied, one possible way is each group shares their process of writing to other students. At the end of writing class, student writers come together to publish and/ or celebrate their final work. The publication could be in the form of portfolio, students’ diary, blog, or others. Travel writing genre is chosen as it could develop students’ creativity in describing/ narrating their own stories during, let say holiday or things they used to see on the way home weekly or monthly. Furthermore, travel writing as the product of creative writing teaches the readers of values, characteristics, and way of life. Last but not least, a professional writing teacher should set the writing workshop components in variety ways to achieve effective running-class.

  4. Reaching Resistant Youth through Writing.

    Science.gov (United States)

    Skramstad, Teresa

    1998-01-01

    A teacher recounts her experiences with students who were successful telling their stories through writing and using their writing as a vehicle for expressing their emotions. Explains how helping students "find their voices" through writing can crack tough exteriors and help youth reconnect to school and themselves. (Author/MKA)

  5. Map It Then Write It

    Science.gov (United States)

    Lott, Kimberly; Read, Sylvia

    2015-01-01

    All writing begins with ideas, but young students often need visual cues to help them organize their thoughts before beginning to write. For this reason, many elementary teachers use graphic organizers or thinking maps to help students visualize patterns and organize their ideas within the different genres of writing. Graphic organizers such as…

  6. Discourse Approaches to Writing Assessment.

    Science.gov (United States)

    Connnor, Ulla; Mbaye, Aymerou

    2002-01-01

    Discusses assessment of English-as-a-Foreign/Second-Language (EFL/ESL) writing. Suggests there is a considerable gap between current practices in writing assessment and criteria suggested by advances in knowledge of discourse structure. Illustrates this by contrasting current practices in the scoring of two major EFL/ESL writing tests with…

  7. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  8. Organization of the 17th Advanced Accelerator Concepts (AAC16) Workshop by the IEEE. Final Scientific/Technical Report On AWARD NO. DE-SC0015635

    Energy Technology Data Exchange (ETDEWEB)

    Sutter, David F. [Inst. of Electrical and Electronics Engineers Inc., Piscataway, NJ (United States)

    2017-07-15

    The 2016 Workshop on Advanced Accelerator Concepts (AAC) was held at the Gaylord Hotel and Conference Center, National Harbor, Maryland, from July 31 through August 5, 2016. This workshop was the seventeenth in a biennial series that began at Los Alamos National Laboratory in 1982 with a workshop on laser acceleration of particles (see AIP Conf. Proc. 91). AAC16 was organized under the sponsorship of the IEEE Council on Superconductivity with financial support from the U. S. Department of Energy Office of High Energy Physics and the National Science Foundation. The scope of the AAC Workshop has grown since 1982 to encompass a broad range of topics related to advancing accelerator science and technology beyond its current scientific and technical limits and is now an internationally acknowledged forum for interdisciplinary discussions on advanced accelerator and beam physics/technology concepts covering the widest possible range of applications. The Workshop continued the trend of growing worldwide participation, attracting world wide participation. The Workshop had a total of 256 attendees comprising (including the U.S.) representatives from 11 countries representing 65 different institutions. Each day’s schedule began with plenary sessions covering broad, cross disciplinary interests or general tutorial topics as selected by the Program Committee, followed by a break out into more narrowly focused working groups. The Workshop was organized into eight Working Groups each with a published statement of topical focus, scope of discussion and goals. A summary of the Working Group activities and conclusions is included in the American Institute of Physics’ (AIP) Conference Proceedings now available as an on line open source document. It has been a long tradition of the AAC workshops to encourage strong student participation. This is accomplished in part by subsidizing student attendance, done for this work shop by using funds from the DOE and National Science

  9. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  10. IEEE Std 381-1977: IEEE standard criteria for type tests of Class 1E modules used in nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the basic requirements of a type test program with the objective of verifying that a module used as Class 1E equipment in a nuclear power generating station meets or exceeds its design specifications. This document is limited to class 1E modules from and including the sensor through the logic circuitry of the final actuation devices. Except for those that are part of a module, switchgear, cables, connections, motors, valve actuators, station batteries, and penetrations are not included and are covered by other IEEE documents. The purpose of this document is to supplement the procedures and requirements given in IEEE Std 323-1974 [24] for type testing Class 1E modules, thereby providing directions for establishment of a type test program which will obtain the required test data and yield the required documentation of test methods and results. This standard is structured to present to the user the principal performance characteristics and environmental parameters which must be considered in designing a type test program for any give Class 1E module. These modules range from tiny sensors to complete racks or cabinets full of equipment that may be located inside or outside containment. The Class 1E modules are required to perform their function before, during, or after, or all, any design basis event specified for the module. The vast variety of modules covered by this document precludes the listing here of specific requirements for each type test

  11. How newspapers began to blog

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Kleis

    2012-01-01

    of technologists (project managers, computer programers, information architects, etc.) that are increasingly integral to how legacy media organizations operate in a new and ever more convergent media environment under circumstances of great economic uncertainty, and discuss the wider implications for how we......In this article, I examine how ‘old’ media organizations develop ‘new’ media technologies by analyzing processes of technological innovation in two Danish newspaper companies that integrated blogs into their websites in very different ways in 2007. Drawing on concepts from science and technology...... studies and sociology and building on previous research on blogging by news media organizations, I analyze how the three different communities involved in the development process – journalists and managers, but also the often-overlooked community of technologists – articulated different versions of what...

  12. When the atomic age began

    International Nuclear Information System (INIS)

    1967-01-01

    2 December 1942, just twenty-five years ago, is the date most often proclaimed as marking the beginning of the atomic age. On that day Enrico Fermi's atomic 'pile' went critical - man had achieved the first self-sustained nuclear chain reaction and controlled it. This achievement is an outstanding example of how modern science can work. It had been predicted in theory, calculated in advance and finally realised through the work of large teams of scientists, headed by some of the most imaginative personalities of our century. The military aspects of man-made nuclear chain reaction still dominate our world today. However, within this quarter of a century, nuclear energy has also become significant as a source of power for peaceful purposes. By the end of another quarter of a century it will, according to the best forecasts we can make today, produce a major part of the electricity in the world. The control of nuclear fission was initiated by Fermi and his collaborators. It had a tremendous impact on politics, on concepts of warfare and finally on scientific progress for man's welfare. Fifteen years afterwards the International Atomic Energy Agency was created to promote the peaceful uses of the new technology and to assist in winning the advantages it offered for improving health and prosperity. Another of its great objects is to ensure, as far as possible, that nuclear materials intended for peaceful purposes shall not be diverted to military ends. The hope of the world must be that this, one day, will include all nuclear materials

  13. Electronic outlining as a writing strategy: Effects on students' writing products, mental effort and writing process

    NARCIS (Netherlands)

    De Smet, Milou; Brand-Gruwel, Saskia; Leijten, Mariëlle; Kirschner, Paul A.

    2018-01-01

    This study addresses to what extent and how electronic outlining enhances students' writing performance. To this end, the focus of this study is not only on students' final writing products but also on the organisation of the writing process (i.e., planning, translating, and reviewing) and perceived

  14. Learning Science through Writing: Associations with Prior Conceptions of Writing and Perceptions of a Writing Program

    Science.gov (United States)

    Ellis, Robert A.; Taylor, Charlotte E.; Drury, Helen

    2007-01-01

    Students in a large undergraduate biology course were expected to write a scientific report as a key part of their course design. This study investigates the quality of learning arising from the writing experience and how it relates to the quality of students' preconceptions of learning through writing and their perceptions of their writing…

  15. SOME THOUGHTS ON WRITING SKILLS

    Directory of Open Access Journals (Sweden)

    Sim Monica Ariana

    2010-07-01

    Full Text Available Writing is one of the central pillars of language learning and should be of major interest and concern to teachers, students and researchers. This paper is intended to be a plea for writing and explores issues regarding instruction and evaluation of writing skills of nonnative speaker students. It examines expectations of nonnative speakers writing quality and performance on writing proficiency exams, as well. Finally, it is trying to ring a bell about this skill that has been neglected in spite of its importance when it comes to foreign language acquisition

  16. Hybrid Polling Method for Direct Link Communication for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2008-10-01

    Full Text Available The direct link communication between STAtions (STAs is one of the techniques to improve the MAC performance of IEEE 802.11 infrastructure networks. For the efficient direct link communication, in the literature, the simultaneous polling method was proposed to allow the multiple direct data communication to be performed simultaneously. However, the efficiency of the simultaneous polling method is affected by the interference condition. To alleviate the problem of the lower polling efficiency with the larger interference range, the hybrid polling method is proposed for the direct link communication between STAs in IEEE 802.11 infrastructure networks. By the proposed polling method, we can integrate the sequential and simultaneous polling methods properly according to the interference condition. Numerical examples are also presented to show the medium access control (MAC performance improvement by the proposed polling method.

  17. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias

    2012-09-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump\\'s effectiveness. The winning entry split analysis of the pump into three parts based on the pump\\'s functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/ oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump. © 2012 IEEE.

  18. The Exploration of Network Coding in IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Deze Zeng

    2011-01-01

    communication protocol should be energy efficient. The IEEE 802.15.4 is designed as a standard protocol for low power, low data rate, low complexity, and short range connections in WPANs. The standard supports allocating several numbers of collision-free guarantee time slots (GTSs within a superframe for some time-critical transmissions. Recently, COPE was proposed as a promising network coding architecture to essentially improve the throughput of wireless networks. In this paper, we exploit the network coding technique at coordinators to improve energy efficiency of the WPAN. Some related practical issues, such as GTS allocation and multicast, are also discussed in order to exploit the network coding opportunities efficiently. Since the coding opportunities are mostly exploited, our proposal achieves both higher energy efficiency and throughput performance than the original IEEE 802.15.4.

  19. The IEEE 1355 Standard. Developments, performance and application in high energy physics

    International Nuclear Information System (INIS)

    Haas, S.

    1998-12-01

    The data acquisition systems of the next generation High Energy Physics experiments at the Large Hadron Collider (LHC) at CERN will rely on high-speed point-to-point links and switching networks for their higher level trigger and event building systems. This thesis provides a detailed evaluation of the DS-Link and switch technology, which is based on the IEEE 1355 standard for Heterogeneous Interconnect (HIC). The DS-Link is a bidirectional point-to-point serial interconnect, operating at speeds up to 200 MBaud. The objective of this thesis was to study the performance of the IEEE 1355 link and switch technology and to demonstrate that switching networks using this technology would scale to meet the requirements of the High Energy Physics applications

  20. VARNOST BREZŽIČNIH OMREŽIJ PO STANDARDU IEEE 802.11

    OpenAIRE

    Štumberger, Matej

    2013-01-01

    Diplomska naloga se osredotoča na problem varovanja brezžičnih omrežij, zasnovanih po standardu IEEE 802.11. Opisano je združenje IEEE in njihova specifikacija standardov z oznako 802, prav tako pa so opisani tudi standardi, protokoli in tehnike varovanja in zaščite omrežij, ki delujejo po tej specifikaciji. Predstavljeno je tudi trenutno stanje varnosti brezžičnih omrežij na področju mesta Ptuj, opisani in prikazani pa so tudi različni pristopi za zlorabo brezžičnih omrežij, skupaj s program...

  1. Design Optimization of Cyber-Physical Distributed Systems using IEEE Time-sensitive Networks (TSN)

    DEFF Research Database (Denmark)

    Pop, Paul; Lander Raagaard, Michael; Craciunas, Silviu S.

    2016-01-01

    to the optimization of distributed cyber-physical systems using real-time Ethernet for communication. Then, we formulate two novel optimization problems related to the scheduling and routing of TT and AVB traffic in TSN. Thus, we consider that we know the topology of the network as well as the set of TT and AVB flows......In this paper we are interested in safety-critical real-time applications implemented on distributed architectures supporting the Time-SensitiveNetworking (TSN) standard. The ongoing standardization of TSN is an IEEE effort to bring deterministic real-time capabilities into the IEEE 802.1 Ethernet...... standard supporting safety-critical systems and guaranteed Quality-of-Service. TSN will support Time-Triggered (TT) communication based on schedule tables, Audio-Video-Bridging (AVB) flows with bounded end-to-end latency as well as Best-Effort messages. We first present a survey of research related...

  2. Transient Stability Improvement of IEEE 9 Bus System Using Power World Simulator

    Directory of Open Access Journals (Sweden)

    Kaur Ramandeep

    2016-01-01

    Full Text Available The improvement of transient stability of power system was one of the most challenging research areas in power engineer.The main aim of this paper was transient stability analysis and improvement of IEEE 9 bus system. These studies were computed using POWER WORLD SIMULATOR. The IEEE 9 bus system was modelled in power world simulator and load flow studies were performed to determine pre-fault conditions in the system using Newton-Raphson method. The transient stability analysis was carried out using Runga method during three-phase balanced fault. For the improvement transient stability, the general methods adopted were fast acting exciters, FACT devices and addition of parallel transmission line. These techniques play an important role in improving the transient stability, increasing transmission capacity and damping low frequency oscillations.

  3. Integration of IEEE 1451 and HL7 exchanging information for patients' sensor data.

    Science.gov (United States)

    Kim, Wooshik; Lim, Suyoung; Ahn, Jinsoo; Nah, Jiyoung; Kim, Namhyun

    2010-12-01

    HL7 (Health Level 7) is a standard developed for exchanging incompatible healthcare information generated from programs or devices among heterogenous medical information systems. At present, HL7 is growing as a global standard. However, the HL7 standard does not support effective methods for treating data from various medical sensors, especially from mobile sensors. As ubiquitous systems are growing, HL7 must communicate with various medical transducers. In the area of sensor fields, IEEE 1451 is a group of standards for controlling transducers and for communicating data from/to various transducers. In this paper, we present the possibility of interoperability between the two standards, i.e., HL7 and IEEE 1451. After we present a method to integrate them and show the preliminary results of this approach.

  4. A note on bound constraints handling for the IEEE CEC'05 benchmark function suite.

    Science.gov (United States)

    Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas

    2014-01-01

    The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems.

  5. Qualification of cables to IEEE standards 323-1974 and 383-1974

    International Nuclear Information System (INIS)

    Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.

    1980-01-01

    Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2kV, and 15kV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15kV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs

  6. Qualification of cables to IEEE standards 323-1974 and 383-1974

    International Nuclear Information System (INIS)

    Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.

    1980-01-01

    Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2KV, and 15KV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15KV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs

  7. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-01-16

    IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly.

  8. A Fast MAC-Layer Handover for an IEEE 802.16e-Based WMAN

    Science.gov (United States)

    Ray, Sayan K.; Pawlikowski, Krzysztof; Sirisena, Harsha

    We propose a modification of the IEEE 802.16e hard handover (HHO) procedure, which significantly reduces the handover latency constraint of the original HHO procedure in IEEE 802.16e networks. It allows a better handling of the delay-sensitive traffic by avoiding unnecessary time-consuming scanning and synchronization activity as well as simplifies the network re-entry procedure. With the help of the backhaul network, it reduces the number of control messages in the original handover policy, making the handover latency acceptable also for real-time streaming traffic. Preliminary performance evaluation studies show that the modified handover procedure is able to reduce the total handover latency by about 50%.

  9. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    Science.gov (United States)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  10. Capacity Evaluation for IEEE 802.16e Mobile WiMAX

    Directory of Open Access Journals (Sweden)

    Chakchai So-In

    2010-01-01

    Full Text Available We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the capacity are explained and methods to reduce these overheads are also presented. The advantage of a simple model is that the effect of each decision and sensitivity to various parameters can be seen easily. We illustrate the model by estimating the capacity for three sample applications—Mobile TV, VoIP, and data. The analysis process helps explain various features of IEEE 802.16e Mobile WiMAX. It is shown that proper use of overhead reducing mechanisms and proper scheduling can make an order of magnitude difference in performance. This capacity evaluation method can also be used for validation of simulation models.

  11. Contributions to the 14th IEEE/NPSS Symposium on fusion engineering

    International Nuclear Information System (INIS)

    Navarro, A.P.; Almoguera, L.; Alonso Gozalo, J.; Alonso Candenas, J.; Blaumoser, M.

    1992-01-01

    Three communications about the TJ-II device, under construction at CIEMAT with preferential support from EURATOM, were presented to the 14th IEEE/NPSS Symposium on Fusion Engineering and are collected in this report. The first one describes in detail the device and its present status of design and construction. The remaining two deal with the two most critical components of the project: the vacuum vessel and the central hard conductor. (author) 16 fig. 16 ref

  12. Utilizing reliability concepts in the development of IEEE recommended good practices for nuclear plant maintenance

    International Nuclear Information System (INIS)

    Gradin, L.P.

    1986-01-01

    This paper presents information describing the concern for nuclear power plant electrical equipment maintenance and the IEEE Nuclear Power Engineering Committee's method to address that concern. That method includes the creation of Working Group 3.3, ''Maintenance Good Practices'' which is developing specific maintenance good practice documents, supporting technical information exchange, and providing a vehicle to promote practices which can reduce cost and enhance plant safety. The foundation for that effort is the utilization of Reliability concepts

  13. Practical support for Lean Six Sigma software process definition using IEEE software engineering standards

    CERN Document Server

    Land, Susan K; Walz, John W

    2012-01-01

    Practical Support for Lean Six Sigma Software Process Definition: Using IEEE Software Engineering Standards addresses the task of meeting the specific documentation requirements in support of Lean Six Sigma. This book provides a set of templates supporting the documentation required for basic software project control and management and covers the integration of these templates for their entire product development life cycle. Find detailed documentation guidance in the form of organizational policy descriptions, integrated set of deployable document templates, artifacts required in suppo

  14. [Mobile Health: IEEE Standard for Wearable Cuffless Blood Pressure Measuring Devices].

    Science.gov (United States)

    Zhou, Xia; Wu, Wenli; Bao, Shudi

    2015-07-01

    IEEE Std 1708-2014 breaks through the traditional standards of cuff based blood pressure measuring devices and establishes a normative definition of wearable cuffless blood pressure measuring devices and the objective performance evaluation of this kind of devices. This study firstly introduces the background of the new standard. Then, the standard details will be described, and the impact of cuffless blood pressure measuring devices with the new standard on manufacturers and end users will be addressed.

  15. IEEE guide for general principles of reliability analysis of nuclear power generating station protection systems

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    Presented is the Institute of Electrical and Electronics Engineers, Inc. (IEEE) guide for general principles of reliability analysis of nuclear power generating station protection systems. The document has been prepared to provide the basic principles needed to conduct a reliability analysis of protection systems. Included is information on qualitative and quantitative analysis, guides for failure data acquisition and use, and guide for establishment of intervals

  16. IEEE standard for qualifying class IE equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1974-01-01

    The Institute of Electrical and Electrical Engineers, Inc. (IEEE) standards for electrical equipment (Class IE) for nuclear power generating stations are given. The standards are to provide guidance for demonstrating and documenting the adequacy of electric equipment used in all Class IE and interface systems. Representative in containment design basis event conditions for the principal reactor types are included in the appendixes for guidance in enviromental simulation

  17. Writing against integration

    DEFF Research Database (Denmark)

    Rytter, Mikkel

    2018-01-01

    The article addresses some of the problems related to the concept of integration, which has been used (and abused) in Denmark since the 1980s to discuss socio-economic, cultural and religious challenges related to the everyday life of ethnic minorities. The concept of integration is not innocent...... three scenarios: ‘welfare reciprocity’, ‘host and guests’ and ‘the Danes as an indigenous people’. These scenarios consolidate an asymmetrical relationship between majorities and minorities because they simultaneously cast integration as desirable and impossible. Finally, inspired by Lila Abu......-Lughod’s seminal article “writing against culture”, the article suggests strategies of “writing against integration” in order to regain the critical potential of academic analysis....

  18. Writing as collaborative inquiry

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth; Pedersen, Christina Hee; Novak, Martin

    2015-01-01

    involved in collaborative knowledge production across difference (including age, professional position, life situation, nation). We tell about our experiences with how collaboration can lead toward re-invention of our research practices and methods, as well as our own subjectivities, through involvement......In our presentation we strive to disturb and unravel the romantic discourses of collaboration, dialogue and empowerment in relation to qualitative inquiry. For more than two years we (five Danish and Czech researchers) have been exploring the complex obstructions, difficulties and potentials...... in the not-yet-known. Over the years, we have shared and analyzed personal stories about our collaborative experiences in an on-going reflective learning process. We draw on writing methodologies, including memory-work (Haug, Davies) and collaborative writing such as by Wyatt, Gale, Gannon & Davies. Our...

  19. Writing the Scripted Spaces

    DEFF Research Database (Denmark)

    Pold, Søren

    2006-01-01

    In the following, I will take a critical look at the concept of virtual reality, and following literary experiments with the computer, I will argue for - and develop - an alternative concept of scripted space.1 Furthermore, I will give an idea of what is currently happening to the concept and pra...... and practice of writing and how it is interacting with our mediated environments on and off the Internet....

  20. An improved IEEE 802.11 protocol for reliable data transmission in power distribution fault diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)

    2010-10-15

    In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.

  1. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Science.gov (United States)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  2. Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    M. Udin Harun Al Rasyid

    2013-12-01

    Full Text Available IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology. Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca

  3. Interoperability in digital electrocardiography: harmonization of ISO/IEEE x73-PHD and SCP-ECG.

    Science.gov (United States)

    Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Serrano, Luis; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José

    2010-11-01

    The ISO/IEEE 11073 (x73) family of standards is a reference frame for medical device interoperability. A draft for an ECG device specialization (ISO/IEEE 11073-10406-d02) has already been presented to the Personal Health Device (PHD) Working Group, and the Standard Communications Protocol for Computer-Assisted ElectroCardioGraphy (SCP-ECG) Standard for short-term diagnostic ECGs (EN1064:2005+A1:2007) has recently been approved as part of the x73 family (ISO 11073-91064:2009). These factors suggest the coordinated use of these two standards in foreseeable telecardiology environments, and hence the need to harmonize them. Such harmonization is the subject of this paper. Thus, a mapping of the mandatory attributes defined in the second draft of the ISO/IEEE 11073-10406-d02 and the minimum SCP-ECG fields is presented, and various other capabilities of the SCP-ECG Standard (such as the messaging part) are also analyzed from an x73-PHD point of view. As a result, this paper addresses and analyzes the implications of some inconsistencies in the coordinated use of these two standards. Finally, a proof-of-concept implementation of the draft x73-PHD ECG device specialization is presented, along with the conversion from x73-PHD to SCP-ECG. This paper, therefore, provides recommendations for future implementations of telecardiology systems that are compliant with both x73-PHD and SCP-ECG.

  4. IEEE recommended practices for seismic qualification of Class 1E equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    The IEEE has developed this document to provide direction for developing programs to seismically qualify Class 1E equipment for nuclear power generating stations. It supplements IEEE Std 323-1974, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, which describes the basic requirements for equipment qualification. The Class 1E equipment to be qualified by produres or standards established by this document are of many forms, characteristics, and materials; therefore, the document presents many acceptable methods with the intent of permitting the user to make a judicious selection from among the various options. In making such a selection, the user should choose those that best meet a particular equipment's requirements. Further, in using this document as a specification for the purchase of equipment, the many options should also be recognized and the document invoked accordingly. It is recommended that the need for specific standards for the seismic qualifiction of particular kinds of equipment be evaluated by those responsible for such documents and that consideration be given to the application of particular methods from these documents which are most suitable

  5. IEEE P1596, a scalable coherent interface for GigaByte/sec multiprocessor applications

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1988-11-01

    IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained during the development of Fastbus (IEEE 960), Futurebus (IEEE 896.1) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor; efficient support of a coherent distributed-cache image of shared memory; and support for segmentation, bus repeaters and general switched interconnections like Banyan, Omega, or full crossbar networks. To achieve these ambitious goals, SCI must sacrifice the immediate handshake characteristic of the present generation of buses in favor of a packet-like split-cycle protocol. Wire-ORs, broadcasts, and even ordinary passive bus structures are to be avoided. However, a lower performance (1 GByte/sec per backplane instead of per processor) implementation using a register insertion ring architecture on a passive ''backplane'' appears to be possible using the same interface as for the more costly switch networks. This paper presents a summary of current directions, and reports the status of the work in progress

  6. Study on Additional Carrier Sensing for IEEE 802.15.4 Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bih-Hwang Lee

    2010-06-01

    Full Text Available Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs. The slotted carrier sense multiple access with collision avoidance (CSMA/CA is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC delay and power consumption of CCA detection.

  7. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    International Nuclear Information System (INIS)

    Sklavos, N; Selimis, G; Koufopavlou, O

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given

  8. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    Science.gov (United States)

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  9. Study on additional carrier sensing for IEEE 802.15.4 wireless sensor networks.

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Ruei-Lung; Wu, Huai-Kuei; Wong, Chi-Ming

    2010-01-01

    Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA) detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS) algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC) delay and power consumption of CCA detection.

  10. On IEEE 802.15.6 IR-UWB receivers - simulations for DBPSK modulation.

    Science.gov (United States)

    Niemelä, Ville; Hämäläinen, Matti; Iinatti, Jari

    2013-01-01

    In 2002, Federal Communications Commission (FCC) was the first in defining regulations for ultra wideband (UWB) communications followed by Europe and Japan some years later. Focusing on impulse radio (IR) UWB, in 2007 was the time for the first published standard targeting in personal area networks, released by the IEEE. The second IEEE released standard including UWB definitions is targeted for wireless body area networks (WBAN) and was published in 2012. As the wireless communications has been and will be passing through almost any levels in society, the natural step with WBAN is using it in different medical, healthcare and wellbeing applications. The arguments for these are related to the modern lifestyle, in which people have increasingly more free time and are more interested in taking care of their health and wellbeing. Another challenge is the population composition, i.e., aging in developed countries which call for new solutions and procedures, particularly from cost wise. In this paper, we are evaluating UWB receivers based on the IEEE 802.15.6 physical layer definitions and capable of detecting differentially encoded modulation. The evaluation is performed using two different WBAN channel models.

  11. A versatile electrical penetration design qualified to IEEE Std. 317-1983

    International Nuclear Information System (INIS)

    Lankenau, W.; Wetherill, T.M.

    1994-01-01

    Although worldwide demand for new construction of nuclear power stations has been on a decline, the available opportunities for the design and construction of qualified electrical penetrations continues to offer challenges, requiring a highly versatile design. Versatility is necessary in order to meet unique customer requirements within the constraints of a design basis qualified to IEEE Std. 317-1983. This paper summarizes such a versatile electrical penetration designed, built and tested to IEEE Std. 317-1983. The principal features are described including major materials of construction. Some of the design constraints such as sealing requirements, and conductor density (including numerical example) are discussed. The requirements for qualification testing of the penetration assembly to IEEE Std. 317-1983 are delineated in a general sense, and some typical test ranges for preconditioning, radiation exposure, and LOCA are provided. The paper concludes by describing ways in which this versatile design has been adapted to meet unique customer requirements in a variety of nuclear power plants

  12. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks.

    Science.gov (United States)

    Son, Kyou Jung; Hong, Sung Hyeuck; Moon, Seong-Pil; Chang, Tae Gyu; Cho, Hanjin

    2016-06-03

    This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method.

  13. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    Directory of Open Access Journals (Sweden)

    V. Balaji

    2016-01-01

    Full Text Available In this paper we present a Cooperative Spectrum Sensing (CSS algorithm for Cognitive Radios (CR based on IEEE 802.22Wireless Regional Area Network (WRAN standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22 within a time constraint (channel sensing time. To meet this objective, we have developed CSS algorithm using unsupervised K-means clustering classification approach. The received energy level of each Secondary User (SU is considered as the parameter for determining channel availability. The performance of proposed algorithm is quantified in terms of detection accuracy, training and classification delay time. Further, the detection accuracy of our proposed scheme meets the requirement of IEEE 802.22 WRAN with the target probability of falsealrm as 0.1. All the simulations are carried out using Matlab tool.

  14. Analysis and Enhancement of IEEE 802.15.4e DSME Beacon Scheduling Model

    Directory of Open Access Journals (Sweden)

    Kwang-il Hwang

    2014-01-01

    Full Text Available In order to construct a successful Internet of things (IoT, reliable network construction and maintenance in a sensor domain should be supported. However, IEEE 802.15.4, which is the most representative wireless standard for IoT, still has problems in constructing a large-scale sensor network, such as beacon collision. To overcome some problems in IEEE 802.15.4, the 15.4e task group proposed various different modes of operation. Particularly, the IEEE 802.15.4e deterministic and synchronous multichannel extension (DSME mode presents a novel scheduling model to solve beacon collision problems. However, the DSME model specified in the 15.4e draft does not present a concrete design model but a conceptual abstract model. Therefore, in this paper we introduce a DSME beacon scheduling model and present a concrete design model. Furthermore, validity and performance of DSME are evaluated through experiments. Based on experiment results, we analyze the problems and limitations of DSME, present solutions step by step, and finally propose an enhanced DSME beacon scheduling model. Through additional experiments, we prove the performance superiority of enhanced DSME.

  15. A Novel Prioritization Scheme to Improve QoS in IEEE 802.11e Networks

    Directory of Open Access Journals (Sweden)

    Navid Tadayon

    2010-01-01

    Full Text Available IEEE 802.11 WLAN utilizes a distributed function at its MAC layer, namely, DCF to access the wireless medium. Due to its distributed nature, DCF is able to guarantee working stability in a wireless medium while maintaining the assembling and maintenance cost in a low level. However, DCF is inefficient in dealing with real-time traffics due to its incapability on providing QoS. IEEE 802.11e was introduced as a supplementary standard to cope with this problem. This standard introduces an Enhanced Distributed Coordination Function (EDCF that works based on diff-Serve model and can serve multiple classes of traffics (by using different prioritizations schemes. With the emergence of new time-sensitive applications, EDCF has proved to be yet inefficient in dealing with these kinds of traffics because it could not provide network with well-differentiated QoS. In this study, we propose a novel prioritization scheme to improve QoS level in IEEE 802.11e network. In this scheme, we replace Uniform PDF with Gamma PDF, which has salient differentiating properties. We investigate the suitability and superiority of this scheme on furnishing network with well-differentiated QoS using probabilistic analysis. We strengthen our claims by extensive simulation runs.

  16. IEEE 693 seismic qualification of composites for substation high-voltage equipment

    Energy Technology Data Exchange (ETDEWEB)

    Schiff, A.J. [Precision Measurement Instruments, Los Altos Hills, CA (United States); Kempner, L.Jr. [Bonneville Power Administration, Vancouver, BC (Canada)

    2004-07-01

    Standard 693-1997 of the Institute of Electrical and Electronic Engineers (IEEE) is the recommended practice for seismic design of substations. It represents a significant improvement in the way the power industry seismically qualifies substation high-voltage equipment. This paper described the use of IEEE Standard 693 for hollow-core composite insulators that are used on high-voltage transformers and demonstrated that changes are warranted. The following four failure modes associated with the composite insulator were discussed: bond degradation, bond failure, tube degradation and tube layer delamination. The authors evaluated the IEEE 693 qualification procedure of time history shake-table and static-pull tests and were concerned about acceptance criteria. It was shown that acceptance criteria are not valid for qualifying hollow-core composites and that static-pull tests are needed after the vibration qualification tests are completed. It was suggested that more research is warranted to determine if bonding at the top part of the flange can be eliminated, thereby eliminating bond degradation. The resulting increase in system damping would improve the dynamic response of the unit. 1 ref., 10 figs.

  17. Writing for computer science

    CERN Document Server

    Zobel, Justin

    2015-01-01

    All researchers need to write or speak about their work, and to have research  that is worth presenting. Based on the author's decades of experience as a researcher and advisor, this third edition provides detailed guidance on writing and presentations and a comprehensive introduction to research methods, the how-to of being a successful scientist.  Topics include: ·         Development of ideas into research questions; ·         How to find, read, evaluate and referee other research; ·         Design and evaluation of experiments and appropriate use of statistics; ·         Ethics, the principles of science and examples of science gone wrong. Much of the book is a step-by-step guide to effective communication, with advice on:  ·         Writing style and editing; ·         Figures, graphs and tables; ·         Mathematics and algorithms; ·         Literature reviews and referees' reports; ·         Structuring of arguments an...

  18. Writing in turbulent air.

    Science.gov (United States)

    Bominaar, Jeroen; Pashtrapanska, Mira; Elenbaas, Thijs; Dam, Nico; ter Meulen, Hans; van de Water, Willem

    2008-04-01

    We describe a scheme of molecular tagging velocimetry in air in which nitric oxide (NO) molecules are created out of O2 and N2 molecules in the focus of a strong laser beam. The NO molecules are visualized a while later by laser-induced fluorescence. The precision of the molecular tagging velocimetry of gas flows is affected by the gradual blurring of the written patterns through molecular diffusion. In the case of turbulent flows, molecular diffusion poses a fundamental limit on the resolution of the smallest scales in the flow. We study the diffusion of written patterns in detail for our tagging scheme which, at short (micros) delay times is slightly anomalous due to local heating by absorption of laser radiation. We show that our experiments agree with a simple convection-diffusion model that allows us to estimate the temperature rise upon writing. Molecular tagging can be a highly nonlinear process, which affects the art of writing. We find that our tagging scheme is (only) quadratic in the intensity of the writing laser.

  19. Conference Proceedings for 1997 IEEE 24th International Conference on Plasma Sciences, 19 - 22 May 1997, San Diego, California

    National Research Council Canada - National Science Library

    Hyman, Julius

    1997-01-01

    This 360 page softbound publication includes the following major sections, An invitation to ICOPS'97, Catamaran Resort Hotel Floor Pinas, Officers of the IEEE Nuclear and Plasma Sciences Society, Conference Information...

  20. NIH-IEEE 2015 Strategic Conference on Healthcare Innovations and Point-of-Care Technologies for Prec

    Science.gov (United States)

    NIH and the Institute for Electrical and Electronics Engineering, Engineering in Medicine and Biology Society (IEEE/EMBS) hosted the third iteration of the Healthcare Innovations and Point-of-Care Technologies Conference last week.

  1. Study of Allocation Guaranteed Time Slot Wireless Body Area Networks Based on IEEE 802.15.4

    Science.gov (United States)

    Yundra, E.; Harsono, G. D.

    2018-04-01

    This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption

  2. Performance Analysis of IEEE 802.11g TCM Waveforms Transmitted over a Channel with Pulse-Noise Interference

    National Research Council Canada - National Science Library

    Drivas, Athanasios

    2007-01-01

    .... The application of TCM combines FEC coding and M-ary modulation in one operation. The objective of this thesis is to investigate the performance of an orthogonal frequency-division multiplexing (OFDM) based IEEE...

  3. Implementation of DoS attack and mitigation strategies in IEEE 802.11b/g WLAN

    Science.gov (United States)

    Deng, Julia; Meng, Ke; Xiao, Yang; Xu, Roger

    2010-04-01

    IEEE 802.11 wireless Local Area Network (WLAN) becomes very prevalent nowadays. Either as a simple range extender for a home wired Ethernet interface, or as a wireless deployment throughout an enterprise, WLAN provides mobility, convenience, and low cost. However, an IEEE 802.11b/g wireless network uses the frequency of unlicensed 2.4GHz, which makes the network unsafe and more vulnerable than traditional Ethernet networks. As a result, anyone who is familiar with wireless network may initiate a Denial of Service (DoS) attack to influence the common communication of the network or even make it crash. In this paper, we present our studies on the DoS attacks and mitigation strategies for IEEE 802.11b/g WLANs and describe some initial implementations using IEEE 802.11b/g wireless devices.

  4. Implementation of IEEE-1588 timing and synchronization for ATCA control and data acquisition systems

    International Nuclear Information System (INIS)

    Correia, Miguel; Sousa, Jorge; Combo, Álvaro; Rodrigues, António P.; Carvalho, Bernardo B.; Batista, António J.N.; Gonçalves, Bruno; Correia, Carlos M.B.A.; Varandas, Carlos A.F.

    2012-01-01

    Highlights: ► IEEE-1588 over Ethernet protocol is implemented for the synchronization of all clock signals of an ATCA AMC carrier module. ► The ATCA hardware consists of an AMC quad-carrier main-board with PCI Express switching. ► IEEE-1588 is to be implemented on a Virtex-6 FPGA. ► Timing signals on the ATX-AMC4-PTP are managed and routed by a crosspoint-switch implemented on a Virtex-6 FPGA. ► Each clock signal source may be independently located (on each of the AMC cards, RTM or ATCA backplane). - Abstract: Control and data acquisition (C and DA) systems for Fusion experiments are required to provide accurate timing and synchronization (T and S) signals to all of its components. IPFN adopted PICMG's Advanced Telecommunications Computing Architecture (ATCA) industry standard to develop C and DA instrumentation. ATCA was chosen not only for its high throughput characteristics but also for its high availability (HA) features which become of greater importance in steady-state operation scenarios. However, the specified ATCA clock and synchronization interface may be too limited for the timing and synchronization needs in advanced Physics experiments. Upcoming specification extensions, developed by the “xTCA for Physics” workgroups, will contemplate, among others, a complementary timing specification, developed by the PICMG xTCA for Physics IO, Timing and Synchronization Technical Committee. The IEEE-1588 Precision Time Protocol (PTP) over Ethernet is one of the protocols, proposed by the Committee, aiming for precise synchronization of clocks in measurement and control systems, based on low jitter and slave-to-slave skew criteria. The paper presents an implementation of IEEE-1588 over Ethernet, in an ATCA hardware platform. The ATCA hardware consists of an Advanced Mezzanine Card (AMC) quad-carrier front board with PCI Express switching. IEEE-1588 is to be implemented on a Virtex-6 FPGA. Ethernet connectivity with the remote master clock is located on

  5. The Functions of Writing in an Elementary Classroom.

    Science.gov (United States)

    Florio, Susan; Clark, Christopher M.

    1982-01-01

    Describes an ethnographic study of writing in one elementary classroom that identified four functions of writing: writing to participate in community, writing to know oneself and others, writing to occupy free time, and writing to demonstrate academic competence. (HOD)

  6. Writing by Any Other Name

    Science.gov (United States)

    Yancey, Kathleen Blake

    2009-01-01

    People are writing as never before--in blogs and text messages and on MySpace and Facebook and Twitter. Teenagers do a good deal of this writing, and in some composing environments--for example, the text-messaging space of a cell phone--they are ahead of adults in their invention of new writing practices and new genres. At the same time, teenagers…

  7. Academic Writing : Examples from BUV

    OpenAIRE

    Engdahl, Ingrid

    2016-01-01

    This guide is an introduction to academic writing that describes features of scientific writing that are recommended for students in Teacher Education Programmes and in Child and Youth Studies. It includes a style guide, how to structure your text, and an APA Publication Manual for referencing, as well as guides for writing an outline for a study, advice for serving as opponent(s) and respondent(s) and an agenda for a thesis/examining seminar.

  8. Should psychiatrists write fiction?

    Science.gov (United States)

    Bladon, Henry

    2018-04-01

    This paper looks at the relationship between fiction and psychiatry. Specifically, the idea of psychiatrists as fiction writers is explored, and reference is made to various fictional texts to illustrate the problems of stigma and negative imagery. These two main areas of focus are highlighted as ones that the practice of writing fiction might address, and some potential pitfalls are discussed. The paper suggests how psychiatrists might ameliorate the present problems by incorporating their unique clinical skills and knowledge into fictional narratives. Declaration of interest None.

  9. A Writing Bookshelf (Professional Resources).

    Science.gov (United States)

    Moore, Sharon Arthur; Moore, David W.

    1990-01-01

    Recommends 14 recently published books on writing. Groups the books in 6 categories: assessment, classroom publishing, foundations, insights from writers, classroom descriptions, and general information. (MG)

  10. Student Perceptions of Scholarly Writing

    Directory of Open Access Journals (Sweden)

    Shirley Peganoff O'Brien

    2016-07-01

    Full Text Available Learning the process of scholarly writing, including the significance of peer review, is an essential element in the preparation of students for professional practice. This descriptive research study, using Scholarship of Teaching and Learning methodology, explores one approach to teaching scholarly writing in an occupational science/occupational therapy curriculum. The writing assignment was designed to offer multiple points for feedback and revision and instructional features to reinforce learning. A survey of students [n = 169] participating in this scholarly writing project was conducted yearly to gather their perceptions of learning. The results revealed four key elements: instructional strategies are needed to support scholarly writing, students value explicit instructor feedback, a successful writing experience opens the possibility for students to write in their professional future, and students will develop the habits of a writer given structure and pedagogical considerations in the assignment construction. This experience shows students will work to achieve the expected standard for scholarship once writing is made an essential part of the course and their efforts are supported by scaffolding the assignment. Through this experience, it was also learned students need opportunities for repetition and practice to refine scholarly writing. Suggestions for future research are proposed.

  11. Virological failure of staggered and simultaneous treatment interruption in HIV patients who began Efavirenz-based regimens after allergic reactions to nevirapine

    Directory of Open Access Journals (Sweden)

    Siripassorn Krittaecho

    2013-01-01

    Full Text Available Abstract Objective The objective of this work was to study the virological outcomes associated with two different types of treatment interruption strategies in patients with allergic reactions to nevirapine (NVP. We compared the virological outcomes of (1 HIV-1-infected patients who discontinued an initial NVP-based regimen because of cutaneous allergic reactions to NVP; different types of interruption strategies were used, and second-line regimen was based on efavirenz (EFV; and (2 HIV-1-infected patients who began an EFV-based regimen as a first-line therapy (controls. Methods This retrospective cohort included patients who began an EFV-based regimen, between January 2002 and December 2008, as either an initial regimen or as a subsequent regimen after resolving a cutaneous allergic reaction against an initial NVP-based regimen. The study ended in March 2010. The primary outcome was virological failure, which was defined as either (a two consecutive plasma HIV-1 RNA levels >400 copies/mL or (b a plasma HIV-1 RNA level >1,000 copies/mL plus any genotypic resistance mutation. Results A total of 559 patients were stratified into three groups: (a Simultaneous Interruption, in which the subjects simultaneously discontinued all the drugs in an NVP-based regimen following an allergic reaction (n=161; (b Staggered Interruption, in which the subjects discontinued NVP treatment while continuing nucleoside reverse transcriptase inhibitor (NRTI backbone therapy for a median of 7 days (n=82; and (c Control, in which the subjects were naïve to antiretroviral therapy (n=316. The overall median follow-up time was 43 months. Incidence of virological failure in Simultaneous Interruption was 12.9 cases per 1,000 person-years, which trended toward being higher than the incidences in Staggered Interruption (5.4 and Control (6.6. However, differences were not statistically significant. Conclusions Among the patients who had an acute allergic reaction to first

  12. Writing Skills for Technical Students. Fourth Edition.

    Science.gov (United States)

    Carlisle, Vicky; Smith, Harriet; Baker, Fred; Ellegood, George; Kopay, Carol; Tanzer, Ward; Young, Diana; Dujordan, Jerome; Webster, Ron; Lewis, Sara Drew

    This self-paced text/workbook is designed for the adult learner who needs a review of grammar and writing skills in order to write clearly and concisely on the job. It offers career-minded students 14 individualized instructional modules on grammar, paragraph writing, report writing, letter writing, and spelling. It is designed for both self-paced…

  13. An ESL Audio-Script Writing Workshop

    Science.gov (United States)

    Miller, Carla

    2012-01-01

    The roles of dialogue, collaborative writing, and authentic communication have been explored as effective strategies in second language writing classrooms. In this article, the stages of an innovative, multi-skill writing method, which embeds students' personal voices into the writing process, are explored. A 10-step ESL Audio Script Writing Model…

  14. What Basic Writers Think about Writing.

    Science.gov (United States)

    Eves-Bowden, Anmarie

    2001-01-01

    Explores basic writing students' current writing processes, their thoughts on their writing, and their introduction to a structured writing process model. Suggests that educators can assist basic writers in becoming successful college writers by introducing them to a structured writing process model while also helping them to become reflective…

  15. Writing Feature Articles with Intermediate Students

    Science.gov (United States)

    Morgan, Denise N.

    2010-01-01

    Students need regular opportunities to write expository text. However, focusing on report writing often leaves students without strong examples to study or analyze to guide and grow their own writing. Writing and studying feature articles, meant to inform and explain, can become an alternative to report writing, as they can easily be located in…

  16. From University Writing to Workplace Writing: The Case of Social ...

    African Journals Online (AJOL)

    This is a case study of social work students' initial experiences with professional writing. The paper addresses the issue of academic writing with special attention to the types of documents written by social work students on their fieldwork placements using twelve students who volunteered to be interviewed. Their views are ...

  17. Writing, Literacy and Technology: Toward a Cyborg Writing.

    Science.gov (United States)

    Olson, Gary A.

    1996-01-01

    Presents an interview with feminist social critic Donna Haraway about her call for "cyborg writing," writing that replaces the idea of an authoritative or dominant story with an acknowledgment of the wide range of narratives to be told in science, technology, and other areas. Also questions Haraway about activism for academics, particularly as it…

  18. The Relationships among Writing Skills, Writing Anxiety and Metacognitive Awareness

    Science.gov (United States)

    Balta, Elif Emine

    2018-01-01

    The purpose of this study was to investigate the relationships among students' argumentative text writing skills, writing anxiety, and metacognitive awareness. The participants were composed of 375 8th graders in six middle schools in Sivas. Metacognitive Awareness Inventory (B Form) which was adapted in to Turkish by Karakelle & Saraç (2007)…

  19. Writing-to-Learn, Writing-to-Communicate, & Scientific Literacy

    Science.gov (United States)

    Balgopal, Meena; Wallace, Alison

    2013-01-01

    Writing-to-learn (WTL) is an effective instructional and learning strategy that centers on the process of organizing and articulating ideas, as opposed to writing-to-communicate, which centers on the finished written product. We describe a WTL model that we have developed and tested with various student groups over several years. With effective…

  20. Writing for Professional Publication: Three Road Signs for Writing Success

    Science.gov (United States)

    Buttery, Thomas J.

    2010-01-01

    In the first edition of Writing for Publication: An Organizational Paradigm (Buttery, 2010), I recommend a model for organizing theoretical articles. The process includes seven components: title, introduction, outline/advanced organizer, headings, transitions, summary and references. This article will focus on the writing process. The strands of…

  1. Techniques for motivating students to write, for teaching writing and for systematizing writing assessment

    OpenAIRE

    Küçükal, Şerife

    1990-01-01

    Ankara : Faculty of Letters and the Institute of Economics and Social Science of Bilkent Univ., 1990. Thesis (Master's) -- Bilkent University, 1990. Includes bibliographical references. The purpose of this study is to investigate the suggestions that experts in the field of teaching composition have for motivating students to write, teaching writing and assessing writing and the ways that these suggestions could be used in Turkish EFL Hazirlik classes for elementary level students. ...

  2. DoS detection in IEEE 802.11 with the presence of hidden nodes

    Directory of Open Access Journals (Sweden)

    Joseph Soryal

    2014-07-01

    Full Text Available The paper presents a novel technique to detect Denial of Service (DoS attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS and Frequency Hopping Spread Spectrum (FHSS and the results are presented to validate the algorithm.

  3. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    Science.gov (United States)

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  4. A Novel Energy Saving Algorithm with Frame Response Delay Constraint in IEEE 802.16e

    Science.gov (United States)

    Nga, Dinh Thi Thuy; Kim, Mingon; Kang, Minho

    Sleep-mode operation of a Mobile Subscriber Station (MSS) in IEEE 802.16e effectively saves energy consumption; however, it induces frame response delay. In this letter, we propose an algorithm to quickly find the optimal value of the final sleep interval in sleep-mode in order to minimize energy consumption with respect to a given frame response delay constraint. The validations of our proposed algorithm through analytical results and simulation results suggest that our algorithm provide a potential guidance to energy saving.

  5. A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielsen, Christoffer Rosenkilde

    2007-01-01

    Static analysis is successfully used for automatically validating security properties of classical cryptographic protocols. In this paper, we shall employ the same technique to a modern security protocol for wireless networks, namely the latest version of the Privacy and Key Management protocol...... for IEEE 802.16e, PKMv2. This protocol seems to have an exaggerated mixture of security features. Thus, we iteratively investigate which components are necessary for upholding the security properties and which can be omitted safely. This approach is based on the LySa process calculus and employs...

  6. An IEEE 802.3 Compatible Real Time Medium Access Control with Length-based Priority

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A new medium access control method is proposed over the predominant Ethernet broadcast channel. Taking advantages of intrinsic variable length characteristic of standard Ethernet frame, message-oriented dynamic priority mechanism is established. Prioritized medium access control operates under a so-called block mode in event of collisions.High priority messages have a chance to preempt block status incurred by low priority ones. By this means, the new MAC provides a conditional deterministic real time performance beyond a statistical one. Experiments demonstrate effectiveness and attractiveness of the proposed scheme. Moreover, this new MAC is completely compatible with IEEE802.3.

  7. 2012 Special NSREC Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    Science.gov (United States)

    Schwank, Jim; Brown, Dennis; Girard, Sylvain; Gouker, Pascale; Gerardin, Simone; Quinn, Heather; Barnaby, Hugh

    2012-12-01

    The December 2012 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 49th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held July 16-20, 2012, in Miami, Florida USA. 95 papers presented at the 2012 NSREC were submitted for consideration for this year’s special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas. The peer review process for a typical technical journal generally takes six months to one year to complete. To publish this special issue of the IEEE Transactions on Nuclear Science (in December), the review process, from initial submission to final form, must be completed in about 10 weeks. Because of the short schedule, both the authors and reviewers are required to respond very quickly. The reviewers listed on the following pages contributed vitally to this quick-turn review process.We would like to express our sincere appreciation to each of them for accepting this difficult, but critical role in the process. To provide consistent reviews of papers throughout the year, the IEEE Transactions on Nuclear Science relies on a year-round editorial board that manages reviews for submissions throughout the year to the TRANSACTIONS in the area of radiation effects. The review process is managed by a Senior

  8. A time-based admission control mechanism for IEEE 802.11 ad Hoc networks

    OpenAIRE

    Costa, Luís Henrique M. K.; Cerveira, Carlos Rodrigo

    2006-01-01

    This paper presents a time-based admission control mechanism (TAC) for IEEE 802.11 ad hoc networks. The proposed mechanism was adapted to the QoS AODV routing protocol, which takes the quality of service requirements of the data flow into account in the route discovery process. TAC-AODV estimates the idle time of the physical medium based on the frames listened. The incoming traffic is admitted according to the offered load as well as the intra-flow interference, calculated based on the numbe...

  9. 4th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  10. Impacto de mecanismos de seguridad en sensores IEEE 802.15.4

    OpenAIRE

    Tripp Barba, Carolina; Casademont Serra, Jordi

    2009-01-01

    En la actualidad son muchos los mecanismos de seguridad que el estándar IEEE 802.15.4 permite a las redes inalámbricas de sensores [1] Dicho estándar define las especificaciones de la Capa de Acceso al Medio y la Capa Física de los dispositivos inalámbricos de área personal. La última revisión corresponde al 2006. Dichas revisiones y actualizaciones son hechas por el grupo de trabajo 802.15. Sin embargo estos mecanismos consumen recursos como memoria y batería, que son...

  11. Low-frequency electrical dosimetry: research agenda of the IEEE International Committee on Electromagnetic Safety.

    Science.gov (United States)

    Reilly, J Patrick; Hirata, Akimasa

    2016-06-21

    This article treats unsettled issues in the use of numerical models of electrical dosimetry as applied to international limits on human exposure to low-frequency (typically  IEEE-ICES (International Committee on Electromagnetic Safety) Technical Committee 95. The paper discusses 25 issues needing attention, fitting into three general categories: induction models; electrostimulation models; and human exposure limits. Of these, 9 were voted as 'high priority' by members of Subcommittee 6. The list is presented as a research agenda for refinements in numerical modeling with applications to human exposure limits. It is likely that such issues are also important in medical and electrical product safety design applications.

  12. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  13. Impact of cell load on 5GHz IEEE 802.11 WLAN

    OpenAIRE

    Abu-Tair, Mamoun; Bhatti, Saleem Noel

    2017-01-01

    We have conducted an empirical study of the latest 5GHz IEEE 802.11 wireless LAN (WLAN) variants of 802.11n (5GHz) and 802.11ac (Wave 1), under different cell load conditions. We have considered typical configurations of both protocols on a Linux testbed. Under light load,there is no clear difference between 802.11n and 802.11ac in terms of performance and energy consumption. However, in some cases of high cell load, we have found that there may be a small advantage with 802.11ac. Overall, we...

  14. Distributed Fair Access Point Selection for Multi-Rate IEEE 802.11 WLANs

    Science.gov (United States)

    Gong, Huazhi; Nahm, Kitae; Kim, Jongwon

    In IEEE 802.11 networks, the access point (AP) selection based on the strongest signal strength often results in the extremely unfair bandwidth allocation among mobile users (MUs). In this paper, we propose a distributed AP selection algorithm to achieve a fair bandwidth allocation for MUs. The proposed algorithm gradually balances the AP loads based on max-min fairness for the available multiple bit rate choices in a distributed manner. We analyze the stability and overhead of the proposed algorithm, and show the improvement of the fairness via computer simulation.

  15. Rate Adaptation Based on Collision Probability for IEEE 802.11 WLANs

    Science.gov (United States)

    Kim, Taejoon; Lim, Jong-Tae

    Nowadays IEEE 802.11 wireless local area networks (WLANs) support multiple transmission rates. To achieve the best performance, transmitting stations adopt the various forms of automatic rate fallback (ARF). However, ARF suffers from severe performance degradation as the number of transmitting stations increases. In this paper, we propose a new rate adaptation scheme which adjusts the ARF's up/down threshold according to the channel contention level. Simulation result shows that the proposed scheme achieves fairly good performance compared with the existing schemes.

  16. Adaptive rate selection scheme for video transmission to resolve IEEE 802.11 performance anomaly

    Science.gov (United States)

    Tang, Guijin; Zhu, Xiuchang

    2011-10-01

    Multi-rate transmission may lead to performance anomaly in an IEEE 802.11 network. It will decrease the throughputs of all the higher rate stations. This paper proposes an adaptive rate selection scheme for video service when performance anomaly occurs. Considering that video has the characteristic of tolerance to packet loss, we actively drop several packets so as to select the rates as high as possible for transmitting packets. Experiment shows our algorithm can decrease the delay and jitter of video, and improve the system throughput as well.

  17. A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    Seyed Davoud Mousavi

    2018-05-01

    Full Text Available Cooperative communication techniques have recently enabled wireless technologies to overcome their challenges. The main objective of these techniques is to improve resource allocation. In this paper, we propose a new protocol in medium access control (MAC of the IEEE 802.11 standard. In our new protocol, which is called Fair Cooperative MAC (FC-MAC, every relay node participates in cooperation proportionally to its provided cooperation gain. This technique improves network resource allocation by exploiting the potential capacity of all relay candidates. Simulation results demonstrate that the FC-MAC protocol presents better performance in terms of throughput, fairness, and network lifetime.

  18. Latency and Jitter Analysis for IEEE 802.11e Wireless LANs

    Directory of Open Access Journals (Sweden)

    Sungkwan Youm

    2013-01-01

    Full Text Available This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF differentiates classes of service and to characterize the probability distribution of the medium access control (MAC layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.

  19. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Pichet Ritthisoonthorn

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  20. High school boys' and girls' writing conceptions and writing self-efficacy beliefs : what is their role in writing performance?

    OpenAIRE

    Villalón Molina, Ruth; Mateos, Mar; Cuevas, Isabel

    2015-01-01

    ABSTRACT: This study investigated the conceptions about writing and writing self-efficacy beliefs held by high school students in relation to the students’ gender as well as their associations with writing achievement. The results show that female students have more sophisticated writing conceptions than their male counterparts but no gender differences were found in writing self-efficacy beliefs. In addition, results reveal that writing self-efficacy beliefs and gender play an important role...

  1. Simulation in JFL: Business Writing

    Science.gov (United States)

    Fukushima, Tatsuya

    2007-01-01

    This article discusses a simulation wherein learners of Japanese as a Foreign Language (JFL) in a business writing course at an American university are assigned tasks to write a series of business letters based on situations that are likely to occur in actual business settings. After an overview of the theoretical background, this article…

  2. P.S. Write Soon!

    Science.gov (United States)

    Edwards, Pat

    Intended for use by students, this illustrated Australian classroom unit was designed to encourage young people to develop a lifelong habit of letter writing. The booklet begins with a letter to children from the Australian "Post," and excerpts from two poems about letter writing. A section on how letters can link the world emphasizes…

  3. The Machine Scoring of Writing

    Science.gov (United States)

    McCurry, Doug

    2010-01-01

    This article provides an introduction to the kind of computer software that is used to score student writing in some high stakes testing programs, and that is being promoted as a teaching and learning tool to schools. It sketches the state of play with machines for the scoring of writing, and describes how these machines work and what they do.…

  4. An Accounting Writing Proficiency Survey

    Science.gov (United States)

    Firch, Tim; Campbell, Annhenrie; Filling, Steven; Lindsay, David H.

    2011-01-01

    Although there has been much discussion about improving college student writing with college-level courses, little is known about how accounting programs, in particular, are addressing the writing proficiency challenge. This study surveys the 852 accounting programs in the United States to identify the frequency and types of accounting writing…

  5. Army Contract Writing System (ACWS)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Army Contract Writing System (ACWS) Defense Acquisition Management Information Retrieval...Information 4 Responsible Office 4 References 4 Program Description 5 Business Case 5 Program Status 6 Schedule 7 Performance...Program Information Program Name Army Contract Writing System (ACWS) DoD Component Army Responsible Office Program Manager References MAIS

  6. Learning to Write and Draw

    Science.gov (United States)

    ... Share on Facebook Share on LinkedIn Share via email Print How Your Child’s Writing and Art Changes Over Time Creativity is a ... What Can You Do to Encourage Art and Writing Skills Resources and References Share on Twitter Share on ... Print You might also be interested in Article ...

  7. Writing Stories in the Sciences

    Science.gov (United States)

    Lee, Eunbae; Maerz, John C.

    2015-01-01

    Writing stories is advocated as an excellent means of learning the process of science; however, little is understood about students' experiences of engaging in story writing in postsecondary science courses. The study described in this article was designed to improve the practice of using stories in science by examining students' lived experience…

  8. The Writing Conference as Performance.

    Science.gov (United States)

    Newkirk, Thomas

    1995-01-01

    Provides an overview of the conversational roles taken on by students and teachers during college-level writing conferences. Uses the performative theory of Erving Goffman to analyze these role patterns. Illuminates the specific performative demands presented by writing conferences on both students and teachers. (HB)

  9. Creative Writing Class as Crucible

    Science.gov (United States)

    Barron, Monica

    2007-01-01

    In this article, the author relates her experiences as creative writing teacher and her views as a teacher in the aftermath of Virginia Tech shooting. As a teacher who had taught writing and literature for twenty years, the author had received a great deal of submissions from her students about serial killers, rapists, slashers, and murderers and…

  10. The Cognitive Demands of Writing

    NARCIS (Netherlands)

    Torrance, Mark; Jeffery, Gaynor

    1999-01-01

    Writing is a complex activity that places demands on cognitive resources. This volume presents original theory and research exploring the ways in which the sub-components of the writing process (generating and organizing content, producing grammatical sentences, etc.) differ in their cognitive

  11. Guidelines for writing an argumentative essay

    OpenAIRE

    Aleksandra Egurnova

    2014-01-01

    The guidelines below are intended for teachers, professors, students, and the public at large who are interested in the issues of English writing culture. They provide a detailed plan for completing the writing task–writing an argumentative essay.

  12. Effects of disfluency in writing.

    Science.gov (United States)

    Medimorec, Srdan; Risko, Evan F

    2016-11-01

    While much previous research has suggested that decreased transcription fluency has a detrimental effect on writing, there is recent evidence that decreased fluency can actually benefit cognitive processing. Across a series of experiments, we manipulated transcription fluency of ostensibly skilled typewriters by asking them to type essays in two conditions: both-handed and one-handed typewriting. We used the Coh-Metrix text analyser to investigate the effects of decreased transcription fluency on various aspects of essay writing, such as lexical sophistication, sentence complexity, and cohesion of essays (important indicators of successful writing). We demonstrate that decreased fluency can benefit certain aspects of writing and discuss potential mechanisms underlying disfluency effects in essay writing. © 2016 The British Psychological Society.

  13. Reading, writing, rebelling

    DEFF Research Database (Denmark)

    Doubinsky, Sebastien

    2017-01-01

    What is reading? What is writing? What connects the two? These questions have been the fertile ground for many literary and philosophical theories, from New Criticism to Deconstruction. This essay does not pretend answering to these two questions, but rather to question the question themselves...... and try to shed a different light of this essential problematic. Choosing not to consider literature as a stable concept, but rather as an ontologically impermanent one, I try to reflect upon the terms that condition our approach of works and of the creation of these works. In a large perspective......, the notions of “reading” and “writing” are examined through the prism of their incarnations as “works”, and the consequences of this identity have on our critical discourse. In order to read critically, one must thus recognize this immanent instability of our notions and definitions, and begin from...

  14. Writing Through: Practising Translation

    Directory of Open Access Journals (Sweden)

    Joel Scott

    2010-05-01

    Full Text Available This essay exists as a segment in a line of study and writing practice that moves between a critical theory analysis of translation studies conceptions of language, and the practical questions of what those ideas might mean for contemporary translation and writing practice. Although the underlying preoccupation of this essay, and my more general line of inquiry, is translation studies and practice, in many ways translation is merely a way into a discussion on language. For this essay, translation is the threshold of language. But the two trails of the discussion never manage to elude each other, and these concatenations have informed two experimental translation methods, referred to here as Live Translations and Series Translations. Following the essay are a number of poems in translation, all of which come from Blanco Nuclear by the contemporary Spanish poet, Esteban Pujals Gesalí. The first group, the Live Translations consist of transcriptions I made from audio recordings read in a public setting, in which the texts were translated in situ, either off the page of original Spanish-language poems, or through a process very much like that carried out by simultaneous translators, for which readings of the poems were played back to me through headphones at varying speeds to be translated before the audience. The translations collected are imperfect renderings, attesting to a moment in language practice rather than language objects. The second method involves an iterative translation process, by which three versions of any one poem are rendered, with varying levels of fluency, fidelity and servility. All three translations are presented one after the other as a series, with no version asserting itself as the primary translation. These examples, as well as the translation methods themselves, are intended as preliminary experiments within an endlessly divergent continuum of potential methods and translations, and not as a complete representation of

  15. A strategy for implementation of experience based seismic equipment qualification in IEEE and ASME industry standards

    International Nuclear Information System (INIS)

    Adams, T.M.

    1996-01-01

    In the past 20 years, extensive data on the performance of mechanical and electric equipment during actual strong motion earthquakes and seismic qualification tests has been accumulated. Recognizing that an experience based approach provides a technically sound and cost effective method for the seismic qualification of some or certain equipment, the IEEE Nuclear Power Engineering Committee and the ASME Committee on Qualification of Mechanical Equipment established a Special Working Group to investigate the incorporation of experienced based methods into the industry consensus codes and standards currently used in the seismic qualification of Seismic Category Nuclear Power Plant equipment. This paper presents the strategy (course of action) which was developed by the Special Working Group for meeting this objective of incorporation of experience based seismic qualification standards used in the design and seismic qualification of seismic category nuclear power plant equipment. This strategy was recommended to both chartering organizations, the IEEE Nuclear Power Engineering Committee and the ASME Committee on Qualification of Mechanical Equipment for their consideration and implementation. The status of the review and implementation of the Special Working Group's recommended strategy by the sponsoring organization is also discussed

  16. 2008 Special NSREC Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    Science.gov (United States)

    Schwank, Jim; Buchner, Steve; Marshall, Paul; Duzellier, Sophie; Brown, Dennis; Poivey, Christian; Pease, Ron

    2008-12-01

    The December 2008 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 45th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held in Tucson, Arizona, July 14 - 18, 2008. Over 115 papers presented at the 2008 NSREC were submitted for consideration for this year's special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas.

  17. BOB-RED queue management for IEEE 802.15.4 wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Wu Jean-Lien

    2011-01-01

    Full Text Available Abstract Multimedia services over resource constrained wireless sensor networks (WSNs face a performance bottleneck issue from the gateway node to the sink node. Therefore, the queue management at the gateway node is crucial for diversified messages conveyed from the front nodes to the sink node. In this article, beacon order-based random early detection (BOB-RED queue management is proposed. BOB-RED is a dynamic adaptation scheme based on adjusting beacon interval and superframe duration in the IEEE 802.15.4 MAC superframe accompanied with RED queue management scheme to increase the transmission efficiency of multimedia over WSNs. We focus on the performance improvement upon different traffic loads over WSNs. Evaluation metrics include end-to-end delay, packet delivery ratio, and energy consumption in IEEE 802.15.4 beacon enabled mode. Simulation results show that BOB-RED can effectively decrease end-to-end delay and energy consumption compared to the DropTail scheme.

  18. Throughput analysis of the IEEE 802.4 token bus standard under heavy load

    Science.gov (United States)

    Pang, Joseph; Tobagi, Fouad

    1987-01-01

    It has become clear in the last few years that there is a trend towards integrated digital services. Parallel to the development of public Integrated Services Digital Network (ISDN) is service integration in the local area (e.g., a campus, a building, an aircraft). The types of services to be integrated depend very much on the specific local environment. However, applications tend to generate data traffic belonging to one of two classes. According to IEEE 802.4 terminology, the first major class of traffic is termed synchronous, such as packetized voice and data generated from other applications with real-time constraints, and the second class is called asynchronous which includes most computer data traffic such as file transfer or facsimile. The IEEE 802.4 token bus protocol which was designed to support both synchronous and asynchronous traffic is examined. The protocol is basically a timer-controlled token bus access scheme. By a suitable choice of the design parameters, it can be shown that access delay is bounded for synchronous traffic. As well, the bandwidth allocated to asynchronous traffic can be controlled. A throughput analysis of the protocol under heavy load with constant channel occupation of synchronous traffic and constant token-passing times is presented.

  19. Real-Time-Simulation of IEEE-5-Bus Network on OPAL-RT-OP4510 Simulator

    Science.gov (United States)

    Atul Bhandakkar, Anjali; Mathew, Lini, Dr.

    2018-03-01

    The Real-Time Simulator tools have high computing technologies, improved performance. They are widely used for design and improvement of electrical systems. The advancement of the software tools like MATLAB/SIMULINK with its Real-Time Workshop (RTW) and Real-Time Windows Target (RTWT), real-time simulators are used extensively in many engineering fields, such as industry, education, and research institutions. OPAL-RT-OP4510 is a Real-Time Simulator which is used in both industry and academia. In this paper, the real-time simulation of IEEE-5-Bus network is carried out by means of OPAL-RT-OP4510 with CRO and other hardware. The performance of the network is observed with the introduction of fault at various locations. The waveforms of voltage, current, active and reactive power are observed in the MATLAB simulation environment and on the CRO. Also, Load Flow Analysis (LFA) of IEEE-5-Bus network is computed using MATLAB/Simulink power-gui load flow tool.

  20. Improving Energy Efficiency in Idle Listening of IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2016-01-01

    Full Text Available This paper aims to improve energy efficiency of IEEE 802.11 wireless local area networks (WLANs by effectively dealing with idle listening (IL, which is required for channel sensing and is unavoidable in a contention-based channel access mechanism. Firstly, we show that IL is a dominant source of energy drain in WLANs and it cannot be effectively alleviated by the power saving mechanism proposed in the IEEE 802.11 standard. To solve this problem, we propose an energy-efficient mechanism that combines three schemes in a systematic way: downclocking, frame aggregation, and contention window adjustment. The downclocking scheme lets a station remain in a semisleep state when overhearing frames destined to neighbor stations, whereby the station consumes the minimal energy without impairing channel access capability. As well as decreasing the channel access overhead, the frame aggregation scheme prolongs the period of semisleep time. Moreover, by controlling the size of contention window based on the number of stations, the proposed mechanism decreases unnecessary IL time due to collision and retransmission. By deriving an analysis model and performing extensive simulations, we confirm that the proposed mechanism significantly improves the energy efficiency and throughput, by up to 2.8 and 1.8 times, respectively, compared to the conventional power saving mechanisms.

  1. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    Science.gov (United States)

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  2. Predictable and reliable ECG monitoring over IEEE 802.11 WLANs within a hospital.

    Science.gov (United States)

    Park, Juyoung; Kang, Kyungtae

    2014-09-01

    Telecardiology provides mobility for patients who require constant electrocardiogram (ECG) monitoring. However, its safety is dependent on the predictability and robustness of data delivery, which must overcome errors in the wireless channel through which the ECG data are transmitted. We report here a framework that can be used to gauge the applicability of IEEE 802.11 wireless local area network (WLAN) technology to ECG monitoring systems in terms of delay constraints and transmission reliability. For this purpose, a medical-grade WLAN architecture achieved predictable delay through the combination of a medium access control mechanism based on the point coordination function provided by IEEE 802.11 and an error control scheme based on Reed-Solomon coding and block interleaving. The size of the jitter buffer needed was determined by this architecture to avoid service dropout caused by buffer underrun, through analysis of variations in transmission delay. Finally, we assessed this architecture in terms of service latency and reliability by modeling the transmission of uncompressed two-lead electrocardiogram data from the MIT-BIH Arrhythmia Database and highlight the applicability of this wireless technology to telecardiology.

  3. Investigating the efficiency of IEEE 802.15.4 for medical monitoring applications.

    Science.gov (United States)

    Pelegris, P; Banitsas, K

    2011-01-01

    Recent advancements in wireless communications technologies bring us one step closer to provide reliable Telecare services as an alternative to patients staying in a hospital mainly for monitoring purposes. In this research we investigate the efficiency of IEEE 802.15.4 in a simple scenario where a patient is being monitored using an ECG and a blood analysis module. This approach binds well with assisted living solutions, by sharing the network infrastructure for both monitoring and control while taking advantage of the low power features of the protocol. Such applications are becoming more and more realistic to implement as IEEE 802.15.4 compatible hardware becomes increasingly available. Our aim is to examine the impact of Beacon and Superframe Order in the medium access delay, dropped packets, end to end delay, average retransmission attempts and consumed power focusing on this bandwidth demanding situation where the network load does not allow low duty cycles, in order to draw some conclusions on the effect that this will have to telemonitoring applications.

  4. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel.

    Science.gov (United States)

    Sakin, Sayef Azad; Razzaque, Md Abdur; Hassan, Mohammad Mehedi; Alamri, Atif; Tran, Nguyen H; Fortino, Giancarlo

    2017-12-07

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies.

  5. Performance analysis of the IEEE 802.16e power management for the initiations of awakening

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    To increase battery life in IEEE 802.16e systems, it is essential to efficiently manage energy in mobile stations. The sleep-mode operation in power management helps to increase the life of a station by saving energy consumption. In power management, there are two important performance metrics: energy consumption and the response delay of awakening medium access control (MAC) service data unit (SDU). While in a base station (BS) initiation of awakening, the two performance metrics should be simultaneously considered, in a mobile subscriber station (MSS) initiation of awakening, the response delay is not considered because it is self-operational. There performance metrics are affected by the minimum sleep interval (Tmin), the maximum sleep interval (Tmax), and the average interarrival time of awakening MAC SDUs (TI) during sleep-mode operation. Therefore, it is imperative to evaluate the two initiations of awakening depending on TI. To reach a fuller understanding of the performance, this paper shows an analytical mode and simulations results for the standard sleep-mode operation in the IEEE 802.16e MAC.

  6. IEEE 1394 CAMERA IMAGING SYSTEM FOR BROOKHAVENS BOOSTER APPLICATION FACILITY BEAM DIAGNOSTICS

    International Nuclear Information System (INIS)

    BROWN, K.A.; FRAK, B.; GASSNER, D.; HOFF, L.; OLSEN, R.H.; SATOGATA, T.; TEPIKIAN, S.

    2002-01-01

    Brookhaven's Booster Applications Facility (BAF) will deliver resonant extracted heavy ion beams from the AGS Booster to short-exposure fixed-target experiments located at the end of the BAF beam line. The facility is designed to deliver a wide range of heavy ion species over a range of intensities from 10 3 to over 10 8 ions/pulse, and over a range of energies from 0.1 to 3.0 GeV/nucleon. With these constraints we have designed instrumentation packages which can deliver the maximum amount of dynamic range at a reasonable cost. Through the use of high quality optics systems and neutral density light filters we will achieve 4 to 5 orders of magnitude in light collection. By using digital IEEE1394 camera systems we are able to eliminate the frame-grabber stage in processing and directly transfer data at maximum rates of 400 Mb/set. In this note we give a detailed description of the system design and discuss the parameters used to develop the system specifications. We will also discuss the IEEE1394 camera software interface and the high-level user interface

  7. An Adaptive Medium Access Parameter Prediction Scheme for IEEE 802.11 Real-Time Applications

    Directory of Open Access Journals (Sweden)

    Estefanía Coronado

    2017-01-01

    Full Text Available Multimedia communications have experienced an unprecedented growth due mainly to the increase in the content quality and the emergence of smart devices. The demand for these contents is tending towards wireless technologies. However, these transmissions are quite sensitive to network delays. Therefore, ensuring an optimum QoS level becomes of great importance. The IEEE 802.11e amendment was released to address the lack of QoS capabilities in the original IEEE 802.11 standard. Accordingly, the Enhanced Distributed Channel Access (EDCA function was introduced, allowing it to differentiate traffic streams through a group of Medium Access Control (MAC parameters. Although EDCA recommends a default configuration for these parameters, it has been proved that it is not optimum in many scenarios. In this work a dynamic prediction scheme for these parameters is presented. This approach ensures an appropriate traffic differentiation while maintaining compatibility with the stations without QoS support. As the APs are the only devices that use this algorithm, no changes are required to current network cards. The results show improvements in both voice and video transmissions, as well as in the QoS level of the network that the proposal achieves with regard to EDCA.

  8. Dynamic Contention Window Control Scheme in IEEE 802.11e EDCA-Based Wireless LANs

    Science.gov (United States)

    Abeysekera, B. A. Hirantha Sithira; Matsuda, Takahiro; Takine, Tetsuya

    In the IEEE 802.11 MAC protocol, access points (APs) are given the same priority as wireless terminals in terms of acquiring the wireless link, even though they aggregate several downlink flows. This feature leads to a serious throughput degradation of downlink flows, compared with uplink flows. In this paper, we propose a dynamic contention window control scheme for the IEEE 802.11e EDCA-based wireless LANs, in order to achieve fairness between uplink and downlink TCP flows while guaranteeing QoS requirements for real-time traffic. The proposed scheme first determines the minimum contention window size in the best-effort access category at APs, based on the number of TCP flows. It then determines the minimum and maximum contention window sizes in higher priority access categories, such as voice and video, so as to guarantee QoS requirements for these real-time traffic. Note that the proposed scheme does not require any modification to the MAC protocol at wireless terminals. Through simulation experiments, we show the effectiveness of the proposed scheme.

  9. Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Ikram Syed

    2016-01-01

    Full Text Available The performance improvement in IEEE 802.11 WLANs in widely fluctuating network loads is a challenging task. To improve the performance in this saturated state, we develop an adaptive backoff algorithm that maximizes the system throughput, reduces the collision probability, and maintains a high fairness for the IEEE 802.11 DCF under dense network conditions. In this paper, we present two main advantages of the proposed ABA-CW algorithm. First, it estimates the number of active stations and then calculates an optimal contention window based on the active station number. Each station calculates the channel state probabilities by observing the channel for the total backoff period. Based on these channel states probabilities, each station can estimate the number of active stations in the network, after which it calculates the optimal CW utilizing the estimated active number of stations. To evaluate the proposed mechanism, we derive an analytical model to determine the network performance. From our results, the proposed ABA-CW mechanism achieved better system performance compared to fixed-CW (BEB, EIED, LILD, and SETL and adaptive-CW (AMOCW, Idle Sense mechanisms. The simulation results confirmed the outstanding performance of the proposed mechanism in that it led to a lower collision probability, higher throughput, and high fairness.

  10. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    Directory of Open Access Journals (Sweden)

    Sayef Azad Sakin

    2017-12-01

    Full Text Available Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies.

  11. We learn to write by reading, but writing can make you smarter We learn to write by reading, but writing can make you smarter

    Directory of Open Access Journals (Sweden)

    Stephen Krashen

    2008-04-01

    Full Text Available My goal in this paper is to make Iwo points: Writing style does not come from writing or from direct instruction, but from reading. Actual writing can help us solve problems and can make us smarter. Writing Style Comes from Readino, A substantial amount of research strongly suggests that we learn to write by reading. To be more precise, we acquire writing style, the special language of writing, by reading. Hypothesizing that writing style comes from reading, not from writing or instniction, is consistent with what is known about language acquisition: Most of language acquisition lakes place subconsciously, not through deliberate study, and it is a result of input (comprehension, not output (production (Krashen, 1982. My goal in this paper is to make Iwo points: Writing style does not come from writing or from direct instruction, but from reading. Actual writing can help us solve problems and can make us smarter. Writing Style Comes from Readino, A substantial amount of research strongly suggests that we learn to write by reading. To be more precise, we acquire writing style, the special language of writing, by reading. Hypothesizing that writing style comes from reading, not from writing or instniction, is consistent with what is known about language acquisition: Most of language acquisition lakes place subconsciously, not through deliberate study, and it is a result of input (comprehension, not output (production (Krashen, 1982.

  12. Field Botany and Creative Writing: Where the Science of Writing Meets the Writing of Science

    Science.gov (United States)

    Killingbeck, Keith

    2006-01-01

    Merging science and writing to enhance both subjects was the objective of a venture known as "Plant Notes." At first, teacher-written notes served as the inspiration for this writing assignment. Later, eclectic student-written novellas, poems, song lyrics, mnemonic devices, and field trip recollections made their way into "Plant Notes" and stole…

  13. "Your Writing, Not My Writing": Discourse Analysis of Student Talk about Writing

    Science.gov (United States)

    Hales, Patrick D.

    2017-01-01

    Student voice is a difficult concept to capture in research. This study attempts to provide a vehicle for understanding student perceptions about writing and writing instruction through a case study supported by discourse analysis of student talk. The high school students in this study participated in interviews and focus groups about their…

  14. Proton Beam Writing

    International Nuclear Information System (INIS)

    Rajta, I.; Szilasi, S.Z.; Csige, I.; Baradacs, E.

    2005-01-01

    Complete text of publication follows. Refractive index depth profile in PMMA due to proton irradiation Proton Beam Writing has been successfully used to create buried channel waveguides in PMMA, which suggested that proton irradiation increases the refractive index. To investigate this effect, PMMA samples were irradiated by 1.7-2.1 MeV proton beam. Spectroscopic Ellipsometry has been used to investigate the depth profile of the refractive index. An increase of the refractive index was observed in the order of 0.01, which is approximately one order of magnitude higher than the detection limit. The highest increase of the refractive index occurs at the end of range, i.e. we found a good correlation with the Bragg curve of the energy loss. Hardness changes in PMMA due to proton beam micromachining As protons penetrate a target material and lose their energy according to the Bragg curve, the energy loss is different at different depths. This causes depth-dependent changes of some physical properties in the target material (e.g. refractive index, hardness). In order to characterize the changes of hardness and other mechanical properties as a function of beam penetration depth, systematic investigations have been performed on PMMA, the most common resist material used in proton beam micromachining. Silicon check valve made by proton beam micromachining The possible application of Proton Beam Micromachining (PBM) has been demonstrated by a few authors for creating 3D Si microstructures. In this work we present alternative methods for the formation of a simple a non-return valve for microfluidic applications. Two different approaches have been applied, in both cases we exploited characteristic features of the PBM technique and the selective formation and dissolution of porous Si over the implantation damaged areas. In the first case we implanted 10 μm thick cantilever-type membrane of the valve normally to the crystal surface and at 30-60 degrees to the sidewalls of the

  15. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  16. Problems and solutions in application of IEEE standards at Savannah River Site, Department of Energy (DOE) nuclear facilities

    International Nuclear Information System (INIS)

    Lee, Y.S.; Bowers, T.L.; Chopra, B.J.; Thompson, T.T.; Zimmerman, E.W.

    1993-01-01

    The Department of Energy (DOE) Nuclear Material Production Facilities at the Savannah River Site (SRS) were designed, constructed, and placed into operation in the early 1950's, based on existing industry codes/standards, design criteria, analytical procedures. Since that time, DOE has developed Orders and Polices for the planning, design and construction of DOE Nuclear Reactor Facilities which invoke or reference commercial nuclear reactor codes and standards. The application of IEEE reactor design requirements such as Equipment Qualification, Seismic Qualification, Single Failure Criteria, and Separation Requirement, to non-reactor facilities has been a problem since the IEEE reactor criteria do not directly confirm to the needs of non-reactor facilities. SRS Systems Engineering is developing a methodology for the application of IEEE Standards to non-reactor facilities at SRS

  17. A distributed scheme to manage the dynamic coexistence of IEEE 802.15.4-based health-monitoring WBANs.

    Science.gov (United States)

    Deylami, Mohammad N; Jovanov, Emil

    2014-01-01

    The overlap of transmission ranges between wireless networks as a result of mobility is referred to as dynamic coexistence. The interference caused by coexistence may significantly affect the performance of wireless body area networks (WBANs) where reliability is particularly critical for health monitoring applications. In this paper, we analytically study the effects of dynamic coexistence on the operation of IEEE 802.15.4-based health monitoring WBANs. The current IEEE 802.15.4 standard lacks mechanisms for effectively managing the coexistence of mobile WBANs. Considering the specific characteristics and requirements of health monitoring WBANs, we propose the dynamic coexistence management (DCM) mechanism to make IEEE 802.15.4-based WBANs able to detect and mitigate the harmful effects of coexistence. We assess the effectiveness of this scheme using extensive OPNET simulations. Our results indicate that DCM improves the successful transmission rates of dynamically coexisting WBANs by 20%-25% for typical medical monitoring applications.

  18. Simultaneous transmission of the IEEE 802.11 radio signal and optical Gbit Ethernet over the multimode fiber link

    Science.gov (United States)

    Maksymiuk, L.; Podziewski, A.

    2015-09-01

    In the paper we present a successful joint transmission of the IEEE 802.11 signal and an optical Gbit Ethernet over a multimode fiber based link. Most importantly, the multiplexation of both signals was performed in the optical domain. Due to the utilization of the multimode fiber the OBI noise was avoided and both channels were able to operate at the same wavelength. We prove that potential RoF link for IEEE 802.11 signal distribution may be used to additionally transmit other signals as Gbit Ethernet and therefore utilize the fiber infrastructure installed more effectively. The qualities of both the IEEE 802.11 and Ethernet transmissions fulfilled the requirements imposed by appropriate standards.

  19. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  20. The craft of scientific writing

    CERN Document Server

    Alley, Michael

    1996-01-01

    Designed to help both professional and student scientists and engineers write clearly and effectively, this text approaches the subject in a fresh way. Using scores of examples from a wide variety of authors and disciplines, the author - himself a writer and physicist -- demonstrates the difference between strong and weak scientific writing, and how to convey ideas to the intended audience. In addition, he gives advice on how to start writing, and how to revise drafts, including many suggestions about approaching a wide variety of tasks - from laboratory reports to grant proposals, from internal communications to press releases - as well as a concise guide to appropriate style and usage.

  1. ESL intermediate/advanced writing

    CERN Document Server

    Munoz Page, Mary Ellen; Jaskiewicz, Mary

    2011-01-01

    Master ESL (English as a Second Language) Writing with the study guide designed for non-native speakers of English. Skill-building lessons relevant to today's topics help ESL students write complete sentences, paragraphs, and even multi-paragraph essays. It's perfect for classroom use or self-guided writing preparation.DETAILS- Intermediate drills for improving skills with parallel structure, mood, correct shifting errors & dangling participles- Advanced essay drills focusing on narrative, descriptive, process, reaction, comparison and contrast- Superb preparation for students taking the TOEFL

  2. The craft of scientific writing

    CERN Document Server

    Alley, Michael

    2019-01-01

    The Craft of Scientific Writing uses scores of examples to show the differences between scientific writing that informs and persuades and scientific writing that does not. Focusing on technical papers, dissertations, and reports, this text shows engineers, scientists, and technical professionals the five keys of style that distinguish the best scientific documents: (1) having the details presented in a methodical fashion, (2) having the important details emphasized, (3) having ideas cast into clear and precise sentences, (4) having clear connections between those ideas, and (5) having illustrations that persuade.

  3. Writing fiction about geoscience

    Science.gov (United States)

    Andrews, S.

    2013-12-01

    Employment in geology provides excellent preparation for writing mystery novels that teach geoscience. While doing pure research at the USGS under the mentorship of Edwin D. McKee, I learned that the rigors of the scientific method could be applied not only to scientific inquiry but to any search for what is true, including the art of storytelling (the oldest and still most potent form of communication), which in turn supports science. Geoscience constructs narratives of what has happened or what might happen; hence, to communicate my findings, I must present a story. Having developed my writing skills while preparing colleague-reviewed papers (which required that I learn to set my ego aside and survive brutal critiques), the many rounds of edits required to push a novel through a publishing house were a snap. My geoscience training for becoming a novelist continued through private industry, consultancy, and academia. Employment as a petroleum geologist added the pragmatism of bottom-line economics and working to deadlines to my skill set, and nothing could have prepared me for surviving publishers' rejections and mixed reviews better than having to pitch drilling projects to jaded oil patch managers, especially just before lunchtime, when I was all that stood between them and their first martinis of the day. Environmental consulting was an education in ignorant human tricks and the politics of resource consumption gone astray. When teaching at the college level and guest lecturing at primary and secondary schools, my students taught me that nothing was going to stick unless I related the story of geoscience to their lives. When choosing a story form for my novels, I found the mystery apropos because geoscientists are detectives. Like police detectives, we work with fragmentary and often hidden evidence using deductive logic, though our corpses tend to be much, much older or not dead yet. Throughout my career, I learned that negative stereotypes about scientists

  4. Masters’ Writings and Students’ Writings: School Material in Mesopotamia

    OpenAIRE

    Proust, Christine

    2011-01-01

    International audience; By nature, school drafts of Mesopotamia were meant to destruction. But, thanks to clay support of writing and ancient recycling practices, they reached us in vast amount. These school tablets were mainly produced along a quite short period, between 18th and 17th century B.C. They contain principally exercises for learning writing, Sumerian language and mathematics. These sources bear witness of phenomena linked with those which are examined in this book: change of know...

  5. 'The Loss of My Elderly Patient:' Interactive reflective writing to support medical students' rites of passage.

    Science.gov (United States)

    Wald, Hedy S; Reis, Shmuel P; Monroe, Alicia D; Borkan, Jeffrey M

    2010-01-01

    The fostering of reflective capacity within medical education helps develop critical thinking and clinical reasoning skills and enhances professionalism. Use of reflective narratives to augment reflective practice instruction is well documented. At Warren Alpert Medical School of Brown University (Alpert Med), a narrative medicine curriculum innovation of students' reflective writing (field notes) with individualized feedback from an interdisciplinary faculty team (in pre-clinical years) has been implemented in a Doctoring course to cultivate reflective capacity, empathy, and humanism. Interactive reflective writing (student writer/faculty feedback provider dyad), we propose, can additionally support students with rites of passage at critical educational junctures. At Alpert Med, we have devised a tool to guide faculty in crafting quality feedback, i.e. the Brown Educational Guide to Analysis of Narrative (BEGAN) which includes identifying students' salient quotes, utilizing reflection-inviting questions and close reading, highlighting derived lessons/key concepts, extracting clinical patterns, and providing concrete recommendations as relevant. We provide an example of a student's narrative describing an emotionally powerful and meaningful event - the loss of his first patient - and faculty responses using BEGAN. The provision of quality feedback to students' reflective writing - supported by BEGAN - can facilitate the transformation of student to professional through reflection within medical education.

  6. We learn to write by reading, but writing can make you smarter We learn to write by reading, but writing can make you smarter

    Directory of Open Access Journals (Sweden)

    Stephen Krashen

    2008-04-01

    Full Text Available My goal in this paper is to make two points: 1. Writing style does not come from writing or from direct instruction, but from reading. 2. Actual writing can help us solve problems and can make us smarter. Writing Style Comes from Reading A substantial amount of research slrongly suggests that wc learn to write by reading. To be more precise, wc acquire writing style, the special language of writing, by reading. Hypothesizing that writing style comes from reading, not from writing or instruction, is consistent with what is known about language acquisition: Most of language acquisition takes place subconsciously, not through deliberate study, and it is a result of input (comprehension, not output (production (Krashen, 1982. Thus, if you wrile a page a day, your writing style or your command of mechanics will not improve. On Ihe other hand, other good things may result from your writing, as we shall see in the second section of this paper. My goal in this paper is to make two points: 1. Writing style does not come from writing or from direct instruction, but from reading. 2. Actual writing can help us solve problems and can make us smarter. Writing Style Comes from Reading A substantial amount of research slrongly suggests that wc learn to write by reading. To be more precise, wc acquire writing style, the special language of writing, by reading. Hypothesizing that writing style comes from reading, not from writing or instruction, is consistent with what is known about language acquisition: Most of language acquisition takes place subconsciously, not through deliberate study, and it is a result of input (comprehension, not output (production (Krashen, 1982. Thus, if you wrile a page a day, your writing style or your command of mechanics will not improve. On Ihe other hand, other good things may result from your writing, as we shall see in the second section of this paper.

  7. High School Boys' and Girls' Writing Conceptions and Writing Self-Efficacy Beliefs: What Is Their Role in Writing Performance?

    Science.gov (United States)

    Villalón, Ruth; Mateos, Mar; Cuevas, Isabel

    2015-01-01

    This study investigated the conceptions about writing and writing self-efficacy beliefs held by high school students in relation to the students' gender as well as their associations with writing achievement. The results show that female students have more sophisticated writing conceptions than their male counterparts but no gender differences…

  8. PROCESS WRITING: SUCCESSFUL AND UNSUCCESSFUL WRITERS; DISCOVERING WRITING BEHAVIOURS

    Directory of Open Access Journals (Sweden)

    Ismail Baroudy

    2008-12-01

    Full Text Available Successful and unsuccessful strategies practically complied with in the act of writing have been so far experimentally tapped and scholastically rehearsed by several authors. In this study, a complementary task using a questionnaire worked out to comprehensively specify and cover almost all types of writing behaviours has been inquisitively manipulated. By analysing and inspecting the findings elicited from student-writers’ response sheets, successful and unsuccessful writing strategies are then contrastively identified, categorised and demonstrated. Based on the awareness accomplished, writing teachers’ consciousness will be raised and boosted, thus, helping their poor student-writers justifiably quit their debilitative habits and adopt instead, facilitative ones, those competent writers implement while writing. In the questionnaire, the student-writers would reflect upon their creeping experience and pass informative judgements about their own strategies. Student-writers will respond to fact-finding statements regarding five writing components delineated as rehearsing, drafting, revising, student-writers’ role and the role of instructional materials

  9. Knowledge unbound selected writings on Open Access, 2002-2011

    CERN Document Server

    Suber, Peter

    2016-01-01

    Peter Suber has been a leading advocate for open access since 2001 and has worked full time on issues of open access since 2003. As a professor of philosophy during the early days of the internet, he realized its power and potential as a medium for scholarship. As he writes now, "it was like an asteroid crash, fundamentally changing the environment, challenging dinosaurs to adapt, and challenging all of us to figure out whether we were dinosaurs." When Suber began putting his writings and course materials online for anyone to use for any purpose, he soon experienced the benefits of that wider exposure. In 2001, he started a newsletter -- the Free Online Scholarship Newsletter, which later became the SPARC Open Access Newsletter -- in which he explored the implications of open access for research and scholarship. This book offers a selection of some of Suber's most significant and influential writings on open access from 2002 to 2010. In these texts, Suber makes the case for open access to research; answers c...

  10. IEEE Xplore® Digital Library - Evolving to Meet YOUR Changing Needs

    OpenAIRE

    2014-01-01

    Представлена презентация доклада "Использование платформы IEEE Digital Library: уникальные научные публикации в области электроники, радиосвязи, вычислительной техники, информационных технологий, энергетики, машиностроения, физики, химии, геологии, нанотехнологий" Эстер Лукаш, специалиста по обучению IEEE (Германия), на семинаре «Использование платформы IEEE Digital Library», прошедшем 02 октября 2014 года в УрФУ, на английском языке....

  11. Writing faster Python

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Did you know that Python preallocates integers from -5 to 257 ? Reusing them 1000 times, instead of allocating memory for a bigger integer, can save you a couple of milliseconds of code’s execution time. If you want to learn more about this kind of optimizations then, … well, probably this presentation is not for you :) Instead of going into such small details, I will talk about more "sane" ideas for writing faster code. After a very brief overview of how to optimize Python code (rule 1: don’t do this; rule 2: don’t do this yet; rule 3: ok, but what if I really want to do this ?), I will show simple and fast ways of measuring the execution time and finally, discuss examples of how some code structures could be improved. You will see: - What is the fastest way of removing duplicates from a list - How much faster your code is when you reuse the built-in functions instead of trying to reinvent the wheel - What is faster than the good ol’ for loop - If the lookup is faster in a list or a set (and w...

  12. : Writing as medusa

    Directory of Open Access Journals (Sweden)

    Telma Scherer

    2016-12-01

    Full Text Available http://dx.doi.org/10.5007/2175-7917.2016v21n2p118 In this paper I’ll offer a personal reading of the short novel Água viva (medusa, or “living water”, in Portuguese from Clarice Lispector, through Helène Cixous statements about the creative process which she explains in her book Three steps in the ladder or writing. Cixous creates the image of a descendent ladder that has three steps: death, dreams and roots. Lispector does the same movement searching her “it”, and composes a radical practice with language that is also an investigation. In order to follow this path of the descendent ladder and analyze the “it” through comparative reading, I’ll bring some of Hilda Hilst’s poems, from her book Poemas malditos, gozozos e devotos and also Sylvia Plath’s, from Ariel, namely “Lady Lazarus”. Hilst constructs a game between obedience and subversion, faith and poetic creation, proposing a complexity of images from the idea of God, transfigured. Plath already brings to the reflection the cyclic recurrence, which is also a kind of all fear letting go. The readings of Hilst and Plath give light, in its own way, to the route undertaken in Cixous trail and enrich the search of the Lispector`s "it".

  13. EPA Communications Stylebook: Writing Guide

    Science.gov (United States)

    For the most part, EPA follows the Associated Press (AP) Stylebook. Other requirements of basic punctuation and grammar and usage in EPA writing modify, supplement, or in some cases reiterate AP style.

  14. On gender and writing On gender and writing

    Directory of Open Access Journals (Sweden)

    Arnold Gordenstein

    2008-04-01

    Full Text Available In the introduction to this collection of 22 essays on gender and writing the editor confesses: I was never interested in including articles which would attack the idea of whether gender and the writing process had anything in common. I wasn't interested in anyone who held an 'androgyny' view of the writing process or in anyone who had anti-feminist views. The people I asked were all people who had something positive to say about how they saw gender and the writing process coming together in their work. (p.9 Consequently one finishes this book with the impression that almost all these writers know one another and share views on politics, literature and sex. The largest group of essays is from single mothers or gay women who write fiction, theater or poetry. Of the 22 writers almost all are British, all but 3 1/2 are female (the half because he "shares" a doubled personality with his wife, all but a few speak of being formed by the turbulent 1960's. In the introduction to this collection of 22 essays on gender and writing the editor confesses: I was never interested in including articles which would attack the idea of whether gender and the writing process had anything in common. I wasn't interested in anyone who held an 'androgyny' view of the writing process or in anyone who had anti-feminist views. The people I asked were all people who had something positive to say about how they saw gender and the writing process coming together in their work. (p.9 Consequently one finishes this book with the impression that almost all these writers know one another and share views on politics, literature and sex. The largest group of essays is from single mothers or gay women who write fiction, theater or poetry. Of the 22 writers almost all are British, all but 3 1/2 are female (the half because he "shares" a doubled personality with his wife, all but a few speak of being formed by the turbulent 1960's.

  15. Teaching Process Writing in an Online Environment

    Science.gov (United States)

    Carolan, Fergal; Kyppö, Anna

    2015-01-01

    This reflective practice paper offers some insights into teaching an interdisciplinary academic writing course aimed at promoting process writing. The study reflects on students' acquisition of writing skills and the teacher's support practices in a digital writing environment. It presents writers' experiences related to various stages of process…

  16. Partnering with Parents in the Writing Classroom

    Science.gov (United States)

    Zurcher, Melinda A.

    2016-01-01

    Writing is a complex act that requires students' concentrated time and effort to master--time and effort that teachers strain to find in a crowded curriculum. Despite this struggle to prioritize writing, students in the 21st century need writing skills to participate in the workplace, academia, economy, and democracy. If writing skills really are…

  17. Moving beyond Journaling to Dialogues in Writing

    Science.gov (United States)

    Hail, Cindy; George, Sue; Hail, John

    2013-01-01

    The last two decades have produced theoretical-based methodology models emphasizing student-centered and learner-controlled writing experiences. During the 1990s, writing evolved into a function of learning. As more was learned about the writing process, it became evident that writing led to clarifying thinking and served as a forum for revealing…

  18. The Writing Staff as Faculty Compost Pile.

    Science.gov (United States)

    Dorenkamp, Angela G.

    Misconceptions about the teaching of writing prevail on many college campuses, partially because writing teachers fail to communicate with their colleagues. It is especially important for writing teachers to let their colleagues know that learning to write is a long term developmental process that needs support and reinforcement from the entire…

  19. Nudging Students into Writing Creatively (Teaching Ideas).

    Science.gov (United States)

    Perreault, George; And Others

    1996-01-01

    Describes ideas for writing prompts and assignments proposed by three different teachers: (1) writing poems inspired by smells of herbs and spices; (2) writing about past perceptions and feelings after looking at a photograph; and (3) writing a "self-portrait." (TB)

  20. Why Literature Students Should Practise Life Writing

    Science.gov (United States)

    Cardell, Kylie; Douglas, Kate

    2018-01-01

    This article considers our experiences teaching a hybrid literature/creative writing subject called "Life Writing." We consider the value of literature students engaging in creative writing practice--in this instance, the nonfiction subgenre of life writing--as part of their critical literary studies. We argue that in practicing life…

  1. Teaching life writing texts in Europe : Introduction

    NARCIS (Netherlands)

    Mreijen, Anne-Marie

    2015-01-01

    Although courses on auto/biography and life writing are taught at different universities in Europe, and elements of contemporary life writing issues are addressed in different disciplines like sociology and history, life writing courses, as described in Teaching Life Writing Texts, are certainly not

  2. Writing Excel Macros with VBA

    CERN Document Server

    Roman, Steven

    2008-01-01

    To achieve the maximum control and flexibility from Microsoft® Excel often requires careful custom programming using the VBA (Visual Basic for Applications) language. Writing Excel Macros with VBA, 2nd Edition offers a solid introduction to writing VBA macros and programs, and will show you how to get more power at the programming level: focusing on programming languages, the Visual Basic Editor, handling code, and the Excel object model.

  3. Ideas for clear technical writing

    Science.gov (United States)

    Robinson, B.P.

    1984-01-01

    The three greatest obstacles to clear technical-report writing are probably (1) imprecise words, (2) wordiness, and (3) poorly constructed sentences. Examples of category 1 include abstract words, jargon, and vogue words; of category 2, sentences containing impersonal construction superfluous words; and of category 3, sentences lacking parallel construction and proper order of related words and phrases. These examples and other writing-related subjects are discussed in the report, which contains a cross-referenced index and 24 references.

  4. Fault-Tolerant Topology and Routing Synthesis for IEEE Time-Sensitive Networking

    DEFF Research Database (Denmark)

    Gavrilut, Voica Maria; Zarrin, Bahram; Pop, Paul

    2017-01-01

    of the applications are satisffied. We propose three approaches to solve this optimization problem: (1) a heuristic solution, (2) a Greedy Randomized Adaptive Search Procedure (GRASP) metaheuristic, and (3) a Constraint Programmingbased model. The approaches are evaluated on several test cases, including a test case......Time-Sensitive Networking (TSN) is a set of IEEE standards that extend Ethernet for safety-critical and real-time applications. TSN is envisioned to be widely used in several applications areas, from industrial automation to in-vehicle networking. A TSN network is composed of end systems...... interconnected by physical links and bridges (switches). The data in TSN is exchanged via streams. We address safety-critical real-time systems, and we consider that the streams use the Urgency-Based Scheduler (UBS) traffic-type, suitable for hard real-time traffic. We are interested in determining a fault...

  5. Synchronous ethernet and IEEE 1588 in telecoms next generation synchronization networks

    CERN Document Server

    2013-01-01

    This book addresses the multiple technical aspects of the distribution of synchronization in new generation telecommunication networks, focusing in particular on synchronous Ethernet and IEEE1588 technologies. Many packet network engineers struggle with understanding the challenges that precise synchronization distribution can impose on networks. The usual “why”, “when” and particularly “how” can cause problems for many engineers. In parallel to this, some other markets have identical synchronization requirements, but with their own design requirements, generating further questions. This book attempts to respond to the different questions by providing background technical information. Invaluable information on state of-the-art packet network synchronization and timing architectures is provided, as well as an unbiased view on the synchronization technologies that have been internationally standardized over recent years, with the aim of providing the average reader (who is not skilled in the art) wi...

  6. 12th ACIS/IEEE International Conference on Computer Science and Information Science

    CERN Document Server

    2013-01-01

    This edited book presents scientific results of the 12th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013) which was held on June 16-20, 2013 in Toki Messe, Niigata, Japan. The aim of this conference was to bring together scientists, engineers, computer users, and students to share their experiences and exchange new ideas, research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them The conference organizers selected the best 20 papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review.    

  7. Efficient Beacon Collision Resolution Procedure for IEEE 802.15.4 /Zigbee Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Bassam A. Zafar

    2017-04-01

    Full Text Available While IEEE 802.15.4/Zigbee is a promising technology for Wireless Personal Area Networks, several transmission problems are not yet resolved. In particular, the problem of beacon transmission interferences is causing the device connection loss to the network. In order to resolve this problem, we present a new distributed and reactive procedure for beacon collision resolution. It is an extension of the alignment procedure to reorganize randomly the beacon transmission time when a collision has occurred. The detail of the proposed procedure will be fully described and analyzed. The performance of our approach is performed by simulations. The results show that our approach reduces the collision probability and the device disconnections consequently.

  8. Development of a low mobility IEEE 802.15.4 compliant VANET system for urban environments.

    Science.gov (United States)

    Nazabal, Juan Antonio; Falcone, Francisco; Fernández-Valdivielso, Carlos; Matías, Ignacio Raúl

    2013-05-29

    The use of Vehicular Ad-Hoc Networks (VANETs) is growing nowadays and it includes both roadside-to-vehicle communication (RVC) and inter-vehicle communication (IVC). The purpose of VANETs is to exchange useful information between vehicles and the roadside infrastructures for making an intelligent use of them. There are several possible applications for this technology like: emergency warning system for vehicles, cooperative adaptive cruise control or collision avoidance, among others. The objective of this work is to develop a VANET prototype system for urban environments using IEEE 802.15.4 compliant devices. Simulation-based values of the estimated signal strength and radio link quality values are obtained and compared with measurements in outdoor conditions to validate an implemented VANET system. The results confirm the possibility of implementing low cost vehicular communication networks operating at moderate vehicular speeds.

  9. 2011 IEEE Visualization Contest winner: Visualizing unsteady vortical behavior of a centrifugal pump.

    Science.gov (United States)

    Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger

    2012-01-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump's effectiveness. The winning entry split analysis of the pump into three parts based on the pump's functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump.

  10. Vispubdata.org: A Metadata Collection About IEEE Visualization (VIS) Publications.

    Science.gov (United States)

    Isenberg, Petra; Heimerl, Florian; Koch, Steffen; Isenberg, Tobias; Xu, Panpan; Stolper, Charles D; Sedlmair, Michael; Chen, Jian; Moller, Torsten; Stasko, John

    2017-09-01

    We have created and made available to all a dataset with information about every paper that has appeared at the IEEE Visualization (VIS) set of conferences: InfoVis, SciVis, VAST, and Vis. The information about each paper includes its title, abstract, authors, and citations to other papers in the conference series, among many other attributes. This article describes the motivation for creating the dataset, as well as our process of coalescing and cleaning the data, and a set of three visualizations we created to facilitate exploration of the data. This data is meant to be useful to the broad data visualization community to help understand the evolution of the field and as an example document collection for text data visualization research.

  11. Beamforming transmission in IEEE 802.11ac under time-varying channels.

    Science.gov (United States)

    Yu, Heejung; Kim, Taejoon

    2014-01-01

    The IEEE 802.11ac wireless local area network (WLAN) standard has adopted beamforming (BF) schemes to improve spectral efficiency and throughput with multiple antennas. To design the transmit beam, a channel sounding process to feedback channel state information (CSI) is required. Due to sounding overhead, throughput increases with the amount of transmit data under static channels. Under practical channel conditions with mobility, however, the mismatch between the transmit beam and the channel at transmission time causes performance loss when transmission duration after channel sounding is too long. When the fading rate, payload size, and operating signal-to-noise ratio are given, the optimal transmission duration (i.e., packet length) can be determined to maximize throughput. The relationship between packet length and throughput is also investigated for single-user and multiuser BF modes.

  12. Fir Filters Compliant with the IEEE Standard for M Class PMU

    Directory of Open Access Journals (Sweden)

    Duda Krzysztof

    2016-12-01

    Full Text Available In this paper it is shown that M class PMU (Phasor Measurement Unit reference model for phasor estimation recommended by the IEEE Standard C37.118.1 with the Amendment 1 is not compliant with the Standard. The reference filter preserves only the limits for TVE (total vector error, and exceeds FE (frequency error and RFE (rate of frequency error limits. As a remedy we propose new filters for phasor estimation for M class PMU that are fully compliant with the Standard requirements. The proposed filters are designed: 1 by the window method; 2 as flat-top windows; or as 3 optimal min-max filters. The results for all Standard compliance tests are presented, confirming good performance of the proposed filters. The proposed filters are fixed at the nominal frequency, i.e. frequency tracking and adaptive filter tuning are not required, therefore they are well suited for application in lowcost popular PMUs.

  13. IEEE [Institute of Electrical and Electronics Engineers] standards and nuclear software quality engineering

    International Nuclear Information System (INIS)

    Daughtrey, T.

    1988-01-01

    Significant new nuclear-specific software standards have recently been adopted under the sponsorship of the American Nuclear Society and the American Society of Mechanical Engineers. The interest of the US Nuclear Regulatory Commission has also been expressed through their issuance of NUREG/CR-4640. These efforts all indicate a growing awareness of the need for thorough, referenceable expressions of the way to build in and evaluate quality in nuclear software. A broader professional perspective can be seen in the growing number of software engineering standards sponsored by the Institute of Electrical and Electronics Engineers (IEEE) Computer Society. This family of standards represents a systematic effort to capture professional consensus on quality practices throughout the software development life cycle. The only omission-the implementation phase-is treated by accepted American National Standards Institute or de facto standards for programming languages

  14. 3th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2015-01-01

    This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference.  The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference’s most promis...

  15. Delay efficient cooperation in public safety vehicular networks using LTE and IEEE 802.11p

    KAUST Repository

    Atat, Rachad

    2012-01-01

    Cooperative schemes for critical content distribution over vehicular networks are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range communications with the base station (BS) and 802.11p is considered for inter-vehicle collaboration on the short range. A high mobility environment with correlated shadowing is adopted. Both schemes are shown to outperform non-cooperative unicasting and multicasting, respectively, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2012 IEEE.

  16. Dynamic Voltage Stability Studies using a Modified IEEE 30-Bus System

    Directory of Open Access Journals (Sweden)

    Oluwafemi Emmanuel Oni

    2016-09-01

    Full Text Available Power System stability is an essential study in the planning and operation of an efficient, economic, reliable and secure electric power system because it encompasses all the facet of power systems operations, from planning, to conceptual design stages of the project as well as during the systems operating life span. This paper presents different scenario of power system stability studies on a modified IEEE 30-bus system which is subjected to different faults conditions. A scenario whereby the longest high voltage alternating current (HVAC line is replaced with a high voltage direct current (HVDC line was implemented. The results obtained show that the HVDC line enhances system stability more compared to the contemporary HVAC line. Dynamic analysis using RMS simulation tool was used on DigSILENT PowerFactory.

  17. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  18. Experimental video signals distribution MMF network based on IEEE 802.11 standard

    Science.gov (United States)

    Kowalczyk, Marcin; Maksymiuk, Lukasz; Siuzdak, Jerzy

    2014-11-01

    The article was focused on presentation the achievements in a scope of experimental research on transmission of digital video streams in the frame of specially realized for this purpose ROF (Radio over Fiber) network. Its construction was based on the merge of wireless IEEE 802.11 network, popularly referred as Wi-Fi, with a passive optical network PON based on multimode fibers MMF. The proposed approach can constitute interesting proposal in area of solutions in the scope of the systems monitoring extensive, within which is required covering of a large area with ensuring of a relatively high degree of immunity on the interferences transmitted signals from video IP cameras to the monitoring center and a high configuration flexibility (easily change the deployment of cameras) of such network.

  19. Mobile Device Passive Localization Based on IEEE 802.11 Probe Request Frames

    Directory of Open Access Journals (Sweden)

    Lin Sun

    2017-01-01

    Full Text Available This paper presents a novel passive mobile device localization mode based on IEEE 802.11 Probe Request frames. In this approach, the listener can discover mobile devices by receiving the Probe Request frames and localize them on his walking path. The unique location of the mobile device is estimated on a geometric diagram and right-angled walking path. In model equations, site-related parameter, that is, path loss exponent, is eliminated to make the approach site-independent. To implement unique localization, the right-angled walking path is designed and the optimal location is estimated from the optional points. The performance of our method has been evaluated inside the room, outside the room, and in outdoor scenarios. Three kinds of walking paths, for example, horizontal, vertical, and slanted, are also tested.

  20. IEEE 1394/firewire a low cost, high speed, digital serial bus

    Energy Technology Data Exchange (ETDEWEB)

    Gaunt, R.

    1997-05-01

    Does the world need yet another 1/0 bus standard? If you need fast and cheap serial video communication, then the answer is yes. As technology advances, so too must data transport mechanisms advance. You can`t expect RS-232 to support real-time digital video, and if you can`t afford expensive professional serial video interfaces, (such as Sony`s Serial Digital Interface), Firewire may be a good solution. IEEE 1394, or commonly known as Firewire, is a general purpose serial bus that meets many of the 1/0 needs of today`s video and multimedia developers. For those of you who only read the first paragraph, here`s Firewire in a nutshell: It provides a guaranteed transfer rate of 10OMbps or 20OMbps of digital data (such as video direct from camera to computer), over an inexpensive, non-proprietary serial bus. Here is a list of its features.

  1. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-01-01

    Full Text Available A Wireless Body Area Network (WBAN is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE applications. Since WBAN nodes are used to collect sensitive (life-critical information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS attacks in WBAN at Physical, Medium Access Control (MAC, Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP and Contention Free Period (CFP parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS in WBAN (since most of the data is carried in CFP period. As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  2. A study of IEEE 802.15.4 security framework for wireless body area networks.

    Science.gov (United States)

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  3. The Evolution of a Writing Program.

    Science.gov (United States)

    White, Bonnie J; Lamson, Karen S

    2017-07-01

    Scholarly writing is required in nursing, and some students are unable to communicate effectively through writing. Faculty members may struggle with the grading of written assignments. A writing team, consisting of a nursing faculty member, the school of nursing library liaison, and members from academic support services, implemented strategies including workshops, handouts, and use of exemplars to improve student writing and to provide support to faculty. Few students sought help from the writing team. An online writing center within the existing learning management system was developed to address nursing students' and faculty's scholarly writing needs. The writing center includes guides, tutorials, and exemplars. Anecdotal evidence indicates the use of the writing center during afternoons and evenings and prior to due dates of written assignments. Online writing resources were used more frequently than face-to-face support. Further research is needed to evaluate the effectiveness of the program. [J Nurs Educ. 2017;56(7):443-445.]. Copyright 2017, SLACK Incorporated.

  4. Expressive/Exploratory Technical Writing (XTW) in Engineering: Shifting the Technical Writing Curriculum

    Science.gov (United States)

    Warnock, Scott; Kahn, Michael

    2007-01-01

    While the importance of "expressive writing," or informal, self-directed writing, has been well established, teachers underutilize it, particularly in technical writing courses. We introduce the term expressive/exploratory technical writing (XTW), which is the use of informal, self-directed writing to problem-solve in technical fields. We describe…

  5. Writing Activities of Public Relations Practitioners: The Relationship between Experience and Writing Tasks.

    Science.gov (United States)

    Napoli, Philip M.; Taylor, Maureen; Powers, Gerald

    1999-01-01

    Surveys 200 public relations practitioners and investigates whether the type of writing and over-all time spent writing vary with years of experience. Finds that higher levels of writing efficiency come with writing experience, and shows that female practitioners spend a higher percentage of their workday on writing tasks than do their male…

  6. Student-Teachers across the Curriculum Learn to Write Feedback: Does It Reflect on Their Writing?

    Science.gov (United States)

    Cohen-sayag, Esther

    2016-01-01

    The study examined the connection between writing competency and writing feedback experiences through academic writing course for student-teachers across the curriculum. The aims of the course were to prepare student-teachers to their role as writing facilitators and to improve their writing. Experimental and control group differed in course plan…

  7. Effects of Writing Instruction on Kindergarten Students' Writing Achievement: An Experimental Study

    Science.gov (United States)

    Jones, Cindy D'On

    2015-01-01

    This full-year experimental study examined how methods of writing instruction contribute to kindergarten students' acquisition of foundational and compositional early writing skills. Multiple regression with cluster analysis was used to compare 3 writing instructional groups: an interactive writing group, a writing workshop group, and a…

  8. Mathematical modeling of a radio-frequency path for IEEE 802.11ah based wireless sensor networks

    Science.gov (United States)

    Tyshchenko, Igor; Cherepanov, Alexander; Dmitrii, Vakhnin; Popova, Mariia

    2017-09-01

    This article discusses the process of creating the mathematical model of a radio-frequency path for an IEEE 802.11ah based wireless sensor networks using M atLab Simulink CAD tools. In addition, it describes occurring perturbing effects and determining the presence of a useful signal in the received mixture.

  9. Spectrum-efficient multi-channel design for coexisting IEEE 802.15.4 networks: A stochastic geometry approach

    KAUST Repository

    Elsawy, Hesham

    2014-07-01

    For networks with random topologies (e.g., wireless ad-hoc and sensor networks) and dynamically varying channel gains, choosing the long term operating parameters that optimize the network performance metrics is very challenging. In this paper, we use stochastic geometry analysis to develop a novel framework to design spectrum-efficient multi-channel random wireless networks based on the IEEE 802.15.4 standard. The proposed framework maximizes both spatial and time domain frequency utilization under channel gain uncertainties to minimize the number of frequency channels required to accommodate a certain population of coexisting IEEE 802.15.4 networks. The performance metrics are the outage probability and the self admission failure probability. We relax the single channel assumption that has been used traditionally in the stochastic geometry analysis. We show that the intensity of the admitted networks does not increase linearly with the number of channels and the rate of increase of the intensity of the admitted networks decreases with the number of channels. By using graph theory, we obtain the minimum required number of channels to accommodate a certain intensity of coexisting networks under a self admission failure probability constraint. To this end, we design a superframe structure for the coexisting IEEE 802.15.4 networks and a method for time-domain interference alignment. © 2002-2012 IEEE.

  10. Real-life IT architecture design reports and their relation to IEEE Std 1471 stakeholders and concerns

    NARCIS (Netherlands)

    van Vliet, H.; Koning, H.

    2006-01-01

    Architectural designs are an important means to manage the development and deployment of information technology (IT). Much debate has been going on about a proper definition of architecture in IT and about how to describe it. In 2000, the IEEE Std 1471 proposed a model of an architecture description

  11. Architectural and Functional Design and Evaluation of E-Learning VUIS Based on the Proposed IEEE LTSA Reference Model.

    Science.gov (United States)

    O'Droma, Mairtin S.; Ganchev, Ivan; McDonnell, Fergal

    2003-01-01

    Presents a comparative analysis from the Institute of Electrical and Electronics Engineers (IEEE) Learning Technology Standards Committee's (LTSC) of the architectural and functional design of e-learning delivery platforms and applications, e-learning course authoring tools, and learning management systems (LMSs), with a view of assessing how…

  12. Analyzing the Engineering Educational Research in Spain: A Global Vision through the Awards of CESEI-IEEE

    Science.gov (United States)

    Plaza, I.; Arcega, F.; Castro, M.; Llamas, M.

    2011-01-01

    CESEI is the acronym of the Spanish Chapter of the Education Society of IEEE (the Institute of Electric and Electronics Engineers). Every year, the CESEI awards a prize for the best doctoral thesis and FDP (final (master) degree projects) about education. The thesis or the project must be developed in the areas of electrical engineering,…

  13. Analysis of Radio communication solutions in small and isolated communities under the IEEE 802.22 standard

    OpenAIRE

    Arroyo Arzubi, Alejandro; Castro Lechtaler, Antonio; Foti, Antonio Roberto; Fusario, Rubén J.; García Guibout, Jorge; Sens, Lorena

    2013-01-01

    In recent years the use of wireless communications has increased significantly. Rural communities without cable network communication have found a solution in wireless technologies. Based on previous fieldwork, this paper analyzes software development of integration based technologies for communication equipment. It focuses on the feasibility of the IEEE 802.22 standard as a solution to the wireless problem.

  14. AVSS 2007: IEEE International Conference onAdvanced Video and Signal based Surveillance, London, UK, September 2007

    DEFF Research Database (Denmark)

    Fihl, Preben

    This technical report will cover the participation in the IEEE International Conference on Advanced Video and Signal based Surveillance in September 2007. The report will give a concise description of the most relevant topics presented at the conference, focusing on the work related to the HERMES...... project and human motion and action recognition. Our contribution to the conference will also be described....

  15. Low-cost RAU with Optical Power Supply Used in a Hybrid RoF IEEE 802.11 Network

    Science.gov (United States)

    Kowalczyk, M.; Siuzdak, J.

    2014-09-01

    The paper presents design and implementation of a low-cost RAU (Remote Antenna Unit) device. It was designed to work in a hybrid Wi-Fi/optical network based on the IEEE 802.11b/g standard. An unique feature of the device is the possibility of optical power supply.

  16. Open Data for Global Multimodal Land Use Classification: Outcome of the 2017 IEEE GRSS Data Fusion Contest

    NARCIS (Netherlands)

    Yokoya, Naoto; Ghamisi, Pedram; Xia, Junshi; Sukhanov, Sergey; Heremans, Roel; Tankoyeu, Ivan; Bechtel, Benjamin; Saux, Le Bertrand; Moser, Gabriele; Tuia, Devis

    2018-01-01

    In this paper, we present the scientific outcomes of the 2017 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society. The 2017 Contest was aimed at addressing the problem of local climate zones classification based on

  17. Psychiatric/ psychological forensic report writing.

    Science.gov (United States)

    Young, Gerald

    Approaches to forensic report writing in psychiatry, psychology, and related mental health disciplines have moved from an organization, content, and stylistic framework to considering ethical and other codes, evidentiary standards, and practice considerations. The first part of the article surveys different approaches to forensic report writing, including that of forensic mental health assessment and psychiatric ethics. The second part deals especially with psychological ethical approaches. The American Psychological Association's Ethical Principles and Code of Conduct (2002) provide one set of principles on which to base forensic report writing. The U.S. Federal Rules of Evidence (2014) and related state rules provide another basis. The American Psychological Association's Specialty Guidelines for Forensic Psychology (2013) provide a third source. Some work has expanded the principles in ethics codes; and, in the third part of this article, these additions are applied to forensic report writing. Other work that could help with the question of forensic report writing concerns the 4 Ds in psychological injury assessments (e.g., conduct oneself with Dignity, avoid the adversary Divide, get the needed reliable Data, Determine interpretations and conclusions judiciously). One overarching ethical principle that is especially applicable in forensic report writing is to be comprehensive, scientific, and impartial. As applied to forensic report writing, the overall principle that applies is that the work process and product should reflect integrity in its ethics, law, and science. Four principles that derive from this meta-principle concern: Competency and Communication; Procedure and Protection; Dignity and Distance; and Data Collection and Determination. The standards or rules associated with each of these principles are reviewed. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  18. Reader-Centered Technical Writing

    Science.gov (United States)

    Narayanan, M.

    2012-12-01

    Technical writing is an essential part of professional communication and in recent years it has shifted from a genre-based approach. Formerly, technical writing primarily focused on generating templates of documents and sometimes it was creating or reproducing traditional forms with minor modifications and updates. Now, technical writing looks at the situations surrounding the need to write. This involves deep thinking about the goals and objectives of the project on hand. Furthermore, one observes that it is very important for any participatory process to have the full support of management. This support needs to be well understood and believed by employees. Professional writing may be very persuasive in some cases. When presented in the appropriate context, technical writing can persuade a company to improve work conditions ensuring employee safety and timely production. However, one must recognize that lot of professional writing still continues to make use of reports and instruction manuals. Normally, technical and professional writing addresses four aspects. Objective: The need for generating a given professionally written technical document and the goals the document is expected to achieve and accomplish. Clientele: The clientele who will utilize the technical document. This may include the people in the organization. This may also include "unintended readers." Customers: The population that may be affected by the content of the technical document generated. This includes the stakeholders who will be influenced. Environment: The background in which the document is created. Also, the nature of the situation that warranted the generation of the document. Swiss Psychologist Jean Piaget's view of Learning focuses on three aspects. The author likes to extend Jean Piaget's ideas to students, who are asked to prepare and submit Reader-Centered Technical Writing reports and exercises. Assimilation: Writers may benefit specifically, by assimilating a new object into

  19. Kindergarten Predictors of Third Grade Writing

    Science.gov (United States)

    Kim, Young-Suk; Al Otaiba, Stephanie; Wanzek, Jeanne

    2015-01-01

    The primary goal of the present study was to examine the relations of kindergarten transcription, oral language, word reading, and attention skills to writing skills in third grade. Children (N = 157) were assessed on their letter writing automaticity, spelling, oral language, word reading, and attention in kindergarten. Then, they were assessed on writing in third grade using three writing tasks – one narrative and two expository prompts. Children’s written compositions were evaluated in terms of writing quality (the extent to which ideas were developed and presented in an organized manner). Structural equation modeling showed that kindergarten oral language and lexical literacy skills (i.e., word reading and spelling) were independently predicted third grade narrative writing quality, and kindergarten literacy skill uniquely predicted third grade expository writing quality. In contrast, attention and letter writing automaticity were not directly related to writing quality in either narrative or expository genre. These results are discussed in light of theoretical and practical implications. PMID:25642118

  20. Reflective writing: the student nurse's perspective on reflective writing and poetry writing.

    Science.gov (United States)

    Coleman, Dawn; Willis, Diane S

    2015-07-01

    Reflective writing is a mandatory part of nurse education but how students develop their skills and use reflection as part of their experiential learning remains relatively unknown. Understanding reflective writing in all forms from the perspective of a student nurse is therefore important. To explore the use of reflective writing and the use of poetry in pre-registered nursing students. A qualitative design was employed to explore reflective writing in pre-registered nursing students. A small university in Scotland. BSc (Hons) Adult and Mental Health Pre-registration Student Nurses. Two focus groups were conducted with 10 student nurses during March 2012. Data was analysed thematically using the framework of McCarthy (1999). Students found the process of reflective writing daunting but valued it over time. Current educational methods, such as assessing reflective accounts, often lead to the 'narrative' being watered down and the student feeling judged. Despite this, reflection made students feel responsible for their own learning and research on the topic. Some students felt the use of models of reflection constricting, whilst poetry freed up their expression allowing them to demonstrate the compassion for their patient under their care. Poetry writing gives students the opportunity for freedom of expression, personal satisfaction and a closer connection with their patients, which the more formal approach to reflective writing did not offer. There is a need for students to have a safe and supportive forum in which to express and have their experiences acknowledged without the fear of being judged. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.

  1. Yoruba Writing: Standards and Trends

    Directory of Open Access Journals (Sweden)

    Tèmítọ́pẹ́ Olúmúyìwá Ph.D.

    2013-06-01

    Full Text Available This paper presents the state of Yorùbá orthography. The first effort at standardizing Yorùbá writing system came in 1875, and there has been a great deal of refinements and orthographies since. Specifically, a great rush of activity in standardizing written Yorùbá came in the years after independence when effort to introduce the teaching of Nigerian languages in schools and the application of those languages to official activities. The present standards were established in 1974, however, there remains a great deal of contention over writing conventions-spelling, grammar, the use of tone marks. The paper explores examples from journalism, religious writing, education and literature, and advertising to demonstrate ongoing deviations from the approved orthography.

  2. Future direction of direct writing

    Science.gov (United States)

    Kim, Nam-Soo; Han, Kenneth N.

    2010-11-01

    Direct write technology using special inks consisting of finely dispersed metal nanoparticles in liquid is receiving an undivided attention in recent years for its wide range of applicability in modern electronic industry. The application of this technology covers radio frequency identification-tag (RFID-tag), flexible-electronics, organic light emitting diodes (OLED) display, e-paper, antenna, bumpers used in flip-chip, underfilling, frit, miniresistance applications and biological uses, artificial dental applications and many more. In this paper, the authors have reviewed various direct write technologies on the market and discussed their advantages and shortfalls. Emphasis has given on microdispensing deposition write (MDDW), maskless mesoscale materials deposition (M3D), and ink-jet technologies. All of these technologies allow printing various patterns without employing a mask or a resist with an enhanced speed with the aid of computer. MDDW and M3D are capable of drawing patterns in three-dimension and MDDW, in particular, is capable of writing nanoinks with high viscosity. However, it is still far away for direct write to be fully implemented in the commercial arena. One of the hurdles to overcome is in manufacturing conductive inks which are chemically and physically stable, capable of drawing patterns with acceptable conductivity, and also capable of drawing patterns with acceptable adhesiveness with the substrates. The authors have briefly discussed problems involved in manufacturing nanometal inks to be used in various writing devices. There are numerous factors to be considered in manufacturing such inks. They are reducing agents, concentrations, oxidation, compact ability allowing good conductivity, and stability in suspension.

  3. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah.

    Science.gov (United States)

    Tian, Le; Khorov, Evgeny; Latré, Steven; Famaey, Jeroen

    2017-07-04

    IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing

  4. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic.

    Science.gov (United States)

    Šljivo, Amina; Kerkhove, Dwight; Tian, Le; Famaey, Jeroen; Munteanu, Adrian; Moerman, Ingrid; Hoebeke, Jeroen; De Poorter, Eli

    2018-01-23

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning

  5. Collaborative writing: Tools and tips

    Directory of Open Access Journals (Sweden)

    Eapen Bell

    2007-01-01

    Full Text Available Majority of technical writing is done by groups of experts and various web based applications have made this collaboration easy. Email exchange of word processor documents with tracked changes used to be the standard technique for collaborative writing. However web based tools like Google docs and Spreadsheets have made the process fast and efficient. Various versioning tools and synchronous editors are available for those who need additional functionality. Having a group leader who decides the scheduling, communication and conflict resolving protocols is important for successful collaboration.

  6. Writing the Live Coding Book

    DEFF Research Database (Denmark)

    Blackwell, Alan; Cox, Geoff; Lee, Sang Wong

    2016-01-01

    This paper is a speculation on the relationship between coding and writing, and the ways in which technical innovations and capabilities enable us to rethink each in terms of the other. As a case study, we draw on recent experiences of preparing a book on live coding, which integrates a wide range...... of personal, historical, technical and critical perspectives. This book project has been both experimental and reflective, in a manner that allows us to draw on critical understanding of both code and writing, and point to the potential for new practices in the future....

  7. Best practices in writing instruction

    CERN Document Server

    Fitzgerald, Jill; MacArthur, Charles A

    2014-01-01

    An indispensable teacher resource and course text, this book presents evidence-based practices for helping all K-12 students develop their skills as writers. Every chapter draws clear connections to the Common Core State Standards (CCSS). Leading authorities describe how to teach the skills and strategies that students need to plan, draft, evaluate, and revise multiple types of texts. Also addressed are ways for teachers to integrate technology into the writing program, use assessment to inform instruction, teach writing in the content areas, and tailor instruction for English language learner

  8. Collaborative writing: Tools and tips.

    Science.gov (United States)

    Eapen, Bell Raj

    2007-01-01

    Majority of technical writing is done by groups of experts and various web based applications have made this collaboration easy. Email exchange of word processor documents with tracked changes used to be the standard technique for collaborative writing. However web based tools like Google docs and Spreadsheets have made the process fast and efficient. Various versioning tools and synchronous editors are available for those who need additional functionality. Having a group leader who decides the scheduling, communication and conflict resolving protocols is important for successful collaboration.

  9. Remediating Remediation: From Basic Writing to Writing across the Curriculum

    Science.gov (United States)

    Faulkner, Melissa

    2013-01-01

    This article challenges faculty members and administrators to rethink current definitions of remediation. First year college students are increasingly placed into basic writing courses due to a perceived inability to use English grammar correctly, but it must be acknowledged that all students will encounter the need for remediation as they attempt…

  10. Contributions of Emergent Literacy Skills to Name Writing, Letter Writing, and Spelling in Preschool Children

    Science.gov (United States)

    Puranik, Cynthia S.; Lonigan, Christopher J.; Kim, Young-Suk

    2011-01-01

    The purpose of this study was to examine which emergent literacy skills contribute to preschool children’s emergent writing (name-writing, letter-writing, and spelling) skills. Emergent reading and writing tasks were administered to 296 preschool children aged 4–5 years. Print knowledge and letter-writing skills made positive contributions to name writing; whereas alphabet knowledge, print knowledge, and name writing made positive contributions to letter writing. Both name-writing and letter-writing skills made significant contributions to the prediction of spelling after controlling for age, parental education, print knowledge, phonological awareness, and letter-name and letter-sound knowledge; however, only letter-writing abilities made a significant unique contribution to the prediction of spelling when both letter-writing and name-writing skills were considered together. Name writing reflects knowledge of some letters rather than a broader knowledge of letters that may be needed to support early spelling. Children’s letter-writing skills may be a better indicator of children’s emergent literacy and developing spelling skills than are their name-writing skills at the end of the preschool year. Spelling is a developmentally complex skill beginning in preschool and includes letter writing and blending skills, print knowledge, and letter-name and letter-sound knowledge. PMID:21927537

  11. An empirical evaluation of bufferbloat in IEEE 802.11n wireless networks

    KAUST Repository

    Showail, Ahmad

    2014-04-06

    In this paper, we analyze the impact of large, persistently-full buffers (`bufferbloat\\') on various network dynamics in IEEE 802.11n wireless networks. Bufferbloat has mostly been studied in the context of wired networks. We study the impact of bufferbloat on a variety of wireless network topologies, including wireless LAN (WLAN) and multi-hop wireless networks. Our results show that a single FTP transfer between two Linux wireless hosts can saturate the buffers in the network stack, leading to RTT delays exceeding 4.5 s in multi-hop configurations. We show that well-designed Aggregate MAC Protocol Data Unit (A-MPDU) MAC-layer frame aggregation can reduce RTT delays while simultaneously increasing network throughput. However, additional measures may still be required to meet the constraints of real-time flows (such as VoIP). Our experiments show that large buffers can deteriorate the fairness in rate allocation in parking lot based multi-hop networks.

  12. Green Frame Aggregation Scheme for IEEE 802.11n Networks

    KAUST Repository

    Alaslani, Maha S.

    2015-04-01

    Frame aggregation is one of the major MAC layer enhancements in the IEEE 802.11 family that boosts the network throughput performance. It aims to achieve higher throughput by transmitting huge amount of data in a single transmit oppor- tunity. With the increasing awareness of energy e ciency, it has become vital to rethink about the design of such frame aggregation protocol. Aggregation techniques help to reduce energy consumption over ideal channel conditions. However, in a noisy channel environment, a new energy-aware frame aggregation scheme is required. In this thesis, a novel Green Frame Aggregation (GFA) scheduling scheme has been proposed and evaluated. GFA optimizes the aggregate size based on channel quality in order to minimize the consumed energy. GFA selects the optimal sub-frame size that satisfies the loss constraint for real-time applications as well as the energy budget of the ideal channel situations. The design, the implementation, and evaluation of GFA using testbed deployment is done. The experimental analysis shows that GFA outperforms the conventional frame aggregation methodology in terms of energy e ciency by about 6⇥ in the presence of severe interference conditions. Moreover, GFA also outperforms the static frame sizing method in terms of network goodput and maintains almost the same end- to-end latency.

  13. Smart City Pilot Projects Using LoRa and IEEE802.15.4 Technologies.

    Science.gov (United States)

    Pasolini, Gianni; Buratti, Chiara; Feltrin, Luca; Zabini, Flavio; De Castro, Cristina; Verdone, Roberto; Andrisano, Oreste

    2018-04-06

    Information and Communication Technologies (ICTs), through wireless communications and the Internet of Things (IoT) paradigm, are the enabling keys for transforming traditional cities into smart cities, since they provide the core infrastructure behind public utilities and services. However, to be effective, IoT-based services could require different technologies and network topologies, even when addressing the same urban scenario. In this paper, we highlight this aspect and present two smart city testbeds developed in Italy. The first one concerns a smart infrastructure for public lighting and relies on a heterogeneous network using the IEEE 802.15.4 short-range communication technology, whereas the second one addresses smart-building applications and is based on the LoRa low-rate, long-range communication technology. The smart lighting scenario is discussed providing the technical details and the economic benefits of a large-scale (around 3000 light poles) flexible and modular implementation of a public lighting infrastructure, while the smart-building testbed is investigated, through measurement campaigns and simulations, assessing the coverage and the performance of the LoRa technology in a real urban scenario. Results show that a proper parameter setting is needed to cover large urban areas while maintaining the airtime sufficiently low to keep packet losses at satisfactory levels.

  14. IEEE 802.11-Based Wireless Sensor System for Vibration Measurement

    Directory of Open Access Journals (Sweden)

    Yutaka Uchimura

    2010-01-01

    Full Text Available Network-based wireless sensing has become an important area of research and various new applications for remote sensing are expected to emerge. One of the promising applications is structural health monitoring of building or civil engineering structure and it often requires vibration measurement. For the vibration measurement via wireless network, time synchronization is indispensable. In this paper, we introduce a newly developed time synchronized wireless sensor network system. The system employs IEEE 802.11 standard-based TSF-counter and sends the measured data with the counter value. TSF based synchronization enables consistency on common clock among different wireless nodes. We consider the scale effect on synchronization accuracy and evaluated the effect by taking beacon collisions into account. The scalability issue by numerical simulations is also studied. This paper also introduces a newly developed wireless sensing system and the hardware and software specifications are introduced. The experiments were conducted in a reinforced concrete building to evaluate synchronization accuracy. The developed system was also applied for a vibration measurement of a 22-story steel structured high rise building. The experimental results showed that the system performed more than sufficiently.

  15. The Impact of Dynamic RTS Threshold Adjustment for IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Mostafa Mjidi

    2009-01-01

    Full Text Available In recent years, wireless technologies and application received great attention. The Medium Access Control (MAC protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel in wireless local area networks (WLANs. IEEE 802.11 introduced the optional RTS/CTS handshaking mechanism to address the hidden terminal problem as well as to reduces the chance of collision in case of higher node density and traffic. RTS Threshold (RT determines when RTS/CTS mechanism should be used and proved to be an important parameter for performance characteristics in data transmission. We first investigate to find a meaningful threshold value according to the network situation and determine the impact of using or disengaging the RTS/CTS optional mechanism and dynamically adjust the RTS Threshold to maximize data transmission. The results show a significant improvement over existing CSMA/CA and RTS/CTS schemes. Our adaptive scheme performed even better when data rate increases. We verify our proposed scheme both analytically and with extensive network simulation using ns-2.

  16. An empirical evaluation of bufferbloat in IEEE 802.11n wireless networks

    KAUST Repository

    Showail, Ahmad; Jamshaid, Kamran; Shihada, Basem

    2014-01-01

    In this paper, we analyze the impact of large, persistently-full buffers (`bufferbloat') on various network dynamics in IEEE 802.11n wireless networks. Bufferbloat has mostly been studied in the context of wired networks. We study the impact of bufferbloat on a variety of wireless network topologies, including wireless LAN (WLAN) and multi-hop wireless networks. Our results show that a single FTP transfer between two Linux wireless hosts can saturate the buffers in the network stack, leading to RTT delays exceeding 4.5 s in multi-hop configurations. We show that well-designed Aggregate MAC Protocol Data Unit (A-MPDU) MAC-layer frame aggregation can reduce RTT delays while simultaneously increasing network throughput. However, additional measures may still be required to meet the constraints of real-time flows (such as VoIP). Our experiments show that large buffers can deteriorate the fairness in rate allocation in parking lot based multi-hop networks.

  17. On the Optimization of the IEEE 802.11 DCF: A Cross-Layer Perspective

    Directory of Open Access Journals (Sweden)

    Massimiliano Laddomada

    2010-01-01

    Full Text Available This paper is focused on the problem of optimizing the aggregate throughput of the distributed coordination function (DCF employing the basic access mechanism at the data link layer of IEEE 802.11 protocols. We consider general operating conditions accounting for both nonsaturated and saturated traffic in the presence of transmission channel errors, as exemplified by the packet error rate . The main clue of this work stems from the relation that links the aggregate throughput of the network to the packet rate of the contending stations. In particular, we show that the aggregate throughput ( presents two clearly distinct operating regions that depend on the actual value of the packet rate with respect to a critical value , theoretically derived in this work. The behavior of ( paves the way to a cross-layer optimization algorithm, which proved to be effective for maximizing the aggregate throughput in a variety of network operating conditions. A nice consequence of the proposed optimization framework relies on the fact that the aggregate throughput can be predicted quite accurately with a simple, yet effective, closed-form expression. Finally, theoretical and simulation results are presented in order to unveil, as well as verify, the key ideas.

  18. An SNMP-based solution to enable remote ISO/IEEE 11073 technical management.

    Science.gov (United States)

    Lasierra, Nelia; Alesanco, Alvaro; García, José

    2012-07-01

    This paper presents the design and implementation of an architecture based on the integration of simple network management protocol version 3 (SNMPv3) and the standard ISO/IEEE 11073 (X73) to manage technical information in home-based telemonitoring scenarios. This architecture includes the development of an SNMPv3-proxyX73 agent which comprises a management information base (MIB) module adapted to X73. In the proposed scenario, medical devices (MDs) send information to a concentrator device [designated as compute engine (CE)] using the X73 standard. This information together with extra information collected in the CE is stored in the developed MIB. Finally, the information collected is available for remote access via SNMP connection. Moreover, alarms and events can be configured by an external manager in order to provide warnings of irregularities in the MDs' technical performance evaluation. This proposed SNMPv3 agent provides a solution to integrate and unify technical device management in home-based telemonitoring scenarios fully adapted to X73.

  19. New IEEE 11073 Standards for interoperable, networked Point-of-Care Medical Devices.

    Science.gov (United States)

    Kasparick, Martin; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk

    2015-08-01

    Surgical procedures become more and more complex and the number of medical devices in an operating room (OR) increases continuously. Today's vendor-dependent solutions for integrated ORs are not able to handle this complexity. They can only form isolated solutions. Furthermore, high costs are a result of vendor-dependent approaches. Thus we present a service-oriented device communication for distributed medical systems that enables the integration and interconnection between medical devices among each other and to (medical) information systems, including plug-and-play functionality. This system will improve patient's safety by making technical complexity of a comprehensive integration manageable. It will be available as open standards that are part of the IEEE 11073 family of standards. The solution consists of a service-oriented communication technology, the so called Medical Devices Profile for Web Services (MDPWS), a Domain Information & Service Model, and a binding between the first two mechanisms. A proof of this concept has been done with demonstrators of real world OR devices.

  20. IEEE-802.15.4-based low-power body sensor node with RF energy harvester.

    Science.gov (United States)

    Tran, Thang Viet; Chung, Wan-Young

    2014-01-01

    This paper proposes the design and implementation of a low-voltage and low-power body sensor node based on the IEEE 802.15.4 standard to collect electrocardiography (ECG) and photoplethysmography (PPG) signals. To achieve compact size, low supply voltage, and low power consumption, the proposed platform is integrated into a ZigBee mote, which contains a DC-DC booster, a PPG sensor interface module, and an ECG front-end circuit that has ultra-low current consumption. The input voltage of the proposed node is very low and has a wide range, from 0.65 V to 3.3 V. An RF energy harvester is also designed to charge the battery during the working mode or standby mode of the node. The power consumption of the proposed node reaches 14 mW in working mode to prolong the battery lifetime. The software is supported by the nesC language under the TinyOS environment, which enables the proposed node to be easily configured to function as an individual health monitoring node or a node in a wireless body sensor network (BSN). The proposed node is used to set up a wireless BSN that can simultaneously collect ECG and PPG signals and monitor the results on the personal computer.

  1. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  2. Link Investigation of IEEE 802.15.4 Wireless Sensor Networks in Forests.

    Science.gov (United States)

    Ding, Xingjian; Sun, Guodong; Yang, Gaoxiang; Shang, Xinna

    2016-06-27

    Wireless sensor networks are expected to automatically monitor the ecological evolution and wildlife habits in forests. Low-power links (transceivers) are often adopted in wireless sensor network applications, in order to save the precious sensor energy and then achieve long-term, unattended monitoring. Recent research has presented some performance characteristics of such low-power wireless links under laboratory or outdoor scenarios with less obstacles, and they have found that low-power wireless links are unreliable and prone to be affected by the target environment. However, there is still less understanding about how well the low-power wireless link performs in real-world forests and to what extent the complex in-forest surrounding environments affect the link performances. In this paper, we empirically evaluate the low-power links of wireless sensors in three typical different forest environments. Our experiment investigates the performance of the link layer compatible with the IEEE 802.15.4 standard and analyzes the variation patterns of the packet reception ratio (PRR), the received signal strength indicator (RSSI) and the link quality indicator (LQI) under diverse experimental settings. Some observations of this study are inconsistent with or even contradict prior results that are achieved in open fields or relatively clean environments and thus, provide new insights both into effectively evaluating the low-power wireless links and into efficiently deploying wireless sensor network systems in forest environments.

  3. On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies.

    Science.gov (United States)

    Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Rodenas-Herraiz, David; Cruz-Martinez, Felipe; Garcia-Sanchez, Felipe

    2016-05-05

    Wireless Multimedia Sensor Networks (WMSNs) are a special type of Wireless Sensor Network (WSN) where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES) mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.

  4. Low-power secure body area network for vital sensors toward IEEE802.15.6.

    Science.gov (United States)

    Kuroda, Masahiro; Qiu, Shuye; Tochikubo, Osamu

    2009-01-01

    Many healthcare/medical services have started using personal area networks, such as Bluetooth and ZigBee; these networks consist of various types of vital sensors. These works focus on generalized functions for sensor networks that expect enough battery capacity and low-power CPU/RF (Radio Frequency) modules, but less attention to easy-to-use privacy protection. In this paper, we propose a commercially-deployable secure body area network (S-BAN) with reduced computational burden on a real sensor that has limited RAM/ROM sizes and CPU/RF power consumption under a light-weight battery. Our proposed S-BAN provides vital data ordering among sensors that are involved in an S-BAN and also provides low-power networking with zero-administration security by automatic private key generation. We design and implement the power-efficient media access control (MAC) with resource-constraint security in sensors. Then, we evaluate the power efficiency of the S-BAN consisting of small sensors, such as an accessory type ECG and ring-type SpO2. The evaluation of power efficiency of the S-BAN using real sensors convinces us in deploying S-BAN and will also help us in providing feedbacks to the IEEE802.15.6 MAC, which will be the standard for BANs.

  5. TCP Performance in Multi-Polling Game Theory-Based IEEE 802.11 Networks

    Directory of Open Access Journals (Sweden)

    Cuzanauskas Tomas

    2016-12-01

    Full Text Available Easy usage and integration with various applications made IEEE 802.11 one of the most used technologies these days, both at home and business premises. Over the years, there have been many additional improvements to the 802.11 standards. Nevertheless, the algorithms and Media Access Control (MAC layer methods are almost the same as in previous Wi-Fi versions. In this paper, a set of methods to improve the total system capacity is proposed – such as efficient transmit power management based on Game Theory with a custom wireless medium protocol. The transmit power management and wireless medium protocol is verified by both simulation and real application scenarios. The results conclude that the capacity of the proposed wireless medium protocol is overall 20 percent higher than the standard 802.11 wireless medium access protocols. Additional TCP Acknowledgment filtering, which was tested together with the proposed wireless medium access protocol, can provide up to 10-percent-higher TCP throughput in high-density scenarios, especially for asymmetrical traffic cases. The conducted research suggests that efficient power management could result in lighter transmit power allocation rules that are currently set by the local regulators for current Wi-Fi devices. Thus, better propagation characteristics and wireless medium management would lead to an overall higher wireless system capacity.

  6. SIMULADOR INTERACTIVO DE REDES INALÁMBRICAS BASADAS EN IEEE802.11a

    Directory of Open Access Journals (Sweden)

    Arturo Infante Riello

    2010-09-01

    Full Text Available Normal 0 21 false false false ES-TRAD X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Este artículo presenta los fundamentos y características básicas del diseño de un simulador de redes inalámbricas basadas en el estándar IEEE802.11a, mostrando aspectos de la capa física, canal de radio, programación e interfaz de usuario.

  7. Smart City Pilot Projects Using LoRa and IEEE802.15.4 Technologies

    Directory of Open Access Journals (Sweden)

    Gianni Pasolini

    2018-04-01

    Full Text Available Information and Communication Technologies (ICTs, through wireless communications and the Internet of Things (IoT paradigm, are the enabling keys for transforming traditional cities into smart cities, since they provide the core infrastructure behind public utilities and services. However, to be effective, IoT-based services could require different technologies and network topologies, even when addressing the same urban scenario. In this paper, we highlight this aspect and present two smart city testbeds developed in Italy. The first one concerns a smart infrastructure for public lighting and relies on a heterogeneous network using the IEEE 802.15.4 short-range communication technology, whereas the second one addresses smart-building applications and is based on the LoRa low-rate, long-range communication technology. The smart lighting scenario is discussed providing the technical details and the economic benefits of a large-scale (around 3000 light poles flexible and modular implementation of a public lighting infrastructure, while the smart-building testbed is investigated, through measurement campaigns and simulations, assessing the coverage and the performance of the LoRa technology in a real urban scenario. Results show that a proper parameter setting is needed to cover large urban areas while maintaining the airtime sufficiently low to keep packet losses at satisfactory levels.

  8. Signaling-Free Max-Min Airtime Fairness in IEEE 802.11 Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Youngsoo Lee

    2016-01-01

    Full Text Available We propose a novel media access control (MAC protocol, referred to as signaling-free max-min airtime fair (SMAF MAC, to improve fairness and channel utilization in ad hoc networks based on IEEE 802.11 wireless local area networks (WLANs. We introduce busy time ratio (BTR as a measure for max-min airtime fairness. Each node estimates its BTR and adjusts the transmission duration by means of frame aggregation and fragmentation, so that it can implicitly announce the BTR to neighbor nodes. Based on the announced BTR, each of the neighbor nodes controls its contention window. In this way, the SMAF MAC works in a distributed manner without the need to know the max-min fair share of airtime, and it does not require exchanging explicit control messages among nodes to attain fairness. Moreover, we successfully incorporate the hidden node detection and resolution mechanisms into the SMAF MAC to deal with the hidden node problem in ad hoc networks. The simulation results confirm that the SMAF MAC enhances airtime fairness without degrading channel utilization, and it effectively resolves several serious problems in ad hoc networks such as the starvation, performance anomaly, and hidden node problems.

  9. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  10. BER IMPROVEMENT OF WIRELESS LAN IEEE 802.11 STANDARD USING WAVELET PACKET TRANSFORMS

    Directory of Open Access Journals (Sweden)

    Sanjeev Kumar

    2012-09-01

    Full Text Available High data rates and spectral efficiency is the main requirements for wireless communication systems. Orthogonal Frequency Division Multiplexing (OFDM is a special form of multi carrier transmission used to achieve high data rates of the various WLAN standards. WLAN uses an Inverse Fast Fourier Transform (IFFT at the transmitter to modulate a high bit-rate signal onto a number of carriers and ensure orthogonality between the carriers. The FFT-OFDM has a disadvantage that it is inherently inflexible and requires a complex IFFT core. Recently, Wavelet Packet Transform is proposed as an alternate to FFT. It is a multiplexing method in which data is assigned to wavelet sub bands having different time and frequency resolutions. This paper presents a BER analysis of Fourier-based OFDM (FFT-OFDM and Wavelet Packet based OFDM (WPT-OFDM in WLAN standard (IEEE 802.11a. The performance of FFT and WPT OFDM for various modulation techniques such as PSK, DPSK and QAM for varying values of M was evaluated in AWGN Channel.

  11. On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies

    Directory of Open Access Journals (Sweden)

    Antonio-Javier Garcia-Sanchez

    2016-05-01

    Full Text Available Wireless Multimedia Sensor Networks (WMSNs are a special type of Wireless Sensor Network (WSN where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.

  12. Cross-layer TCP Performance Analysis in IEEE 802.11 Vehicular Environments

    Directory of Open Access Journals (Sweden)

    T. Janevski

    2014-06-01

    Full Text Available In this paper we provide a performance analysis of TCP in IEEE 802.11 vehicular environments for different well-known TCP versions, such as Tahoe, Reno, New Reno, Vegas, and Sack. The parameters of interest from the TCP side are the number of Duplicate Acknowledgements - DupAck, and the number of Delayed Acknowledgements - DelAck, while on the wireless network side the analyzed parameter is the interface queue - IFQ. We have made the analysis for the worst-case distance scenario for single-hop and worst-case multihop vehicular environments. The results show that the number of wireless hops in vehicular environments significantly reduces the TCP throughput. The best average performances considering all scenarios were obtained for TCP Vegas. However, the results show that the interface queue at wireless nodes should be at least five packets or more. On the other side, due to shorter distances in the vehicular wireless network, results show possible flexibility of using different values for the DupAck without degradation of the TCP throughput. On the other side, the introduction of the DelAck parameter provides enhancement in the average TCP throughput for all TCP versions.

  13. A IEEE 802.11e HCCA Scheduler with a Reclaiming Mechanism for Multimedia Applications

    Directory of Open Access Journals (Sweden)

    Anna Lina Ruscelli

    2014-01-01

    Full Text Available The QoS offered by the IEEE 802.11e reference scheduler is satisfactory in the case of Constant Bit Rate traffic streams, but not yet in the case of Variable Bit Rate traffic streams, whose variations stress its scheduling behavior. Despite the numerous proposed alternative schedulers with QoS, multimedia applications are looking for refined methods suitable to ensure service differentiation and dynamic update of protocol parameters. In this paper a scheduling algorithm, Unused Time Shifting Scheduler (UTSS, is deeply analyzed. It is designed to cooperate with a HCCA centralized real-time scheduler through the integration of a bandwidth reclaiming scheme, suitable to recover nonexhausted transmission time and assign that to the next polled stations. UTSS dynamically computes with an O(1 complexity transmission time providing an instantaneous resource overprovisioning. The theoretical analysis and the simulation results highlight that this injection of resources does not affect the admission control nor the centralized scheduler but is suitable to improve the performance of the centralized scheduler in terms of mean access delay, transmission queues length, bursts of traffic management, and packets drop rate. These positive effects are more relevant for highly variable bit rate traffic.

  14. Drawing on Technical Writing Scholarship for the Teaching of Writing to Advanced ESL Students--A Writing Tutorial.

    Science.gov (United States)

    Zielinska, Dorota

    2003-01-01

    Outlines the technical writing tutorial (TWT) that precedes an advanced English as a second language (ESL) writing course for students of English Philology at the Jagiellonian University, Poland. Finds a statistically significant increase in the performance of the students who had taken the TWT. Indicates that technical writing books and journals…

  15. Writing to Read: A Meta-Analysis of the Impact of Writing and Writing Instruction on Reading

    Science.gov (United States)

    Graham, Steve; Hebert, Michael

    2011-01-01

    Reading is critical to students' success in and out of school. One potential means for improving students' reading is writing. In this meta-analysis of true and quasi-experiments, Graham and Herbert present evidence that writing about material read improves students' comprehension of it; that teaching students how to write improves their reading…

  16. Neuroplasticity-based Cognitive and Linguistic Skills Training Improves Reading and Writing Skills in College Students

    Directory of Open Access Journals (Sweden)

    Beth eRogowsky

    2013-03-01

    Full Text Available This study reports an evaluation of the effect of computer-based cognitive and linguistic training on college students’ reading and writing skills. The computer-based training included a series of increasingly challenging software programs that were designed to strengthen students’ foundational cognitive skills (memory, attention span, processing speed, and sequencing in the context of listening and higher level reading tasks. Twenty-five college students (12 native English language; 13 English Second Language who demonstrated poor writing skills participated in the training group. The training group received daily training during the spring semester (11 weeks with the Fast ForWord Literacy (FFW-L and upper levels of the Fast ForWord Reading series (Levels 3, 4 and 5. The comparison group (n=28 selected from the general college population did not receive training. Both the training and comparison groups attended the same university. All students took the Gates MacGinitie Reading Test (GMRT and the Oral and Written Language Scales (OWLS Written Expression Scale at the beginning (Time 1 and end (Time 2 of the spring college semester. Results from this study showed that the training group made a statistically greater improvement from Time 1 to Time 2 in both their reading skills and their writing skills than the comparison group. The group who received training began with statistically lower writing skills before training, but exceeded the writing skills of the comparison group after training.

  17. How to analyse a Big Bang of data: the mammoth project at the Cern physics laboratory in Geneva to recreate the conditions immediately after the universe began requires computing power on an unprecedented scale

    CERN Multimedia

    Thomas, Kim

    2005-01-01

    How to analyse a Big Bang of data: the mammoth project at the Cern physics laboratory in Geneva to recreate the conditions immediately after the universe began requires computing power on an unprecedented scale

  18. Some technical writing skills industry needs

    Science.gov (United States)

    Smith, F. R.

    1981-01-01

    It is suggested that engineers and other technical students be taught three classes of skills in technical writing. First, "Big Picture Things", which includes: the importance of clear writing, the wide scope of writing, the wide scope of writing tasks that will be faced in industry, and the principles of organization of technical materials such as; how to analyze, classify, partition, and interpret. Second, "Writing Procedures", which encompasses: how to get words on paper efficiently and team-write. Third, "Writing Details", in which two considerations are important: how to achieve precision in the use of language and the aspects of style. Three problems in style are cited: the problem of sentence transition, overuse of attributive adjectives, and verbosity in paragraph structure. The most important thing in technical writing is considered to be functionality, economy and clarity.

  19. How to write a scientific paper.

    Science.gov (United States)

    Gemayel, Rita

    2016-11-01

    In the first instalment of the Words of Advice series, we feature the essentials of good manuscript writing with practical tips on how to plan, organise and write a standout scientific paper. © 2016 Federation of European Biochemical Societies.

  20. What If They Just Want To Write?

    Science.gov (United States)

    Gilmar, Sybil

    1979-01-01

    Writing workshops are held for gifted students (7 to 15 years old) and include journalism, guidebook, and fiction work with critical analysis of each other's writing. Sample exercises and brainstorming techniques are discussed. (CL)