Guest Editors: Pavel Zemliansky begin_of_the_skype_highlighting end_of_the_skype_highlighting, James Madison University, USA; Constance Kampf, University of Aarhus, Denmark Overview Most literature in technical communication published in the United States focuses on the state of the discipline......, the theory and practice of technical communication in Europe, Asia, South America, and other places deserve closer attention. Substantial differences between the state of the discipline in North America and abroad impact our work in this globalized world, as well as our current students' future professional...... and education is emerging, and the implications of these origins for theory, practice and teaching. Possible Topics for Articles Possible topics, issues and questions to be examined in this issue include but are not limited to: Which theoretical perspectives and disciplinary roots affect technical...
Goga, Nicolae; Costache, Stefania; Moldoveanu, Florica
This article presents the formal work done for the ISO/IEEE P11073-20601 Draft Standard for Health informatics - Personal health device communication - Application profile Optimized exchange protocol. ISO/IEEE 11073 family defines standards for device communication between agents (e.g. blood
North Carolina State Dept. of Public Instruction, Raleigh. Div. of Vocational Education.
This simulation is intended for use as a culminating activity after students have been exposed to personal and/or business letter writing, use of reference manuals, typing of letters, mailing procedures, typing of numbers, punctuation practice, and filing procedures. Stated objectives are to enable students to type a mailable letter; to inspect,…
Full Text Available Referral of patients to hospitals, specialists and other institutions is an essential part of primary health care. Patients are referred to specialists when investigation or therapeutic options are exhausted in primary care or when opinion or advice is needed from them. Referral has considerable implications for patients, health care system and health care costs. Good communication between primary and secondary care is essential for the smooth running of any health care system. Referral and reply letters are the sole means of communication between doctors most of the time and breakdown in communication could lead to poor continuity of care, delayed diagnoses, polypharmacy, increased litigation risk and unnecessary testing. A referral letter also helps to avoid patient dissatisfaction and loss of confidence in family physician. Studies of referral letters have reported that specialists are dissatisfied with their quality and content. Inclusion of letter writing skills in the medical curriculum, peer assessment and feedback have shown to improve the quality of referral letters. . Form letters have shown to enhance information content and communication in referral process. In Sri Lanka referral letters are usually hand written and frequent complaints are that these letters do not contain adequate information and retrieval of information is a problem due to poor legibility and clarity. Sometimes Primary care doctors refer patients to hospitals and specialists with only verbal instructions. To address these short comings this form letter was introduced. Based on the guidelines and systematic review of published articles, items of information to be included were decided. Printed forms of the letter are kept in the practice and the doctor has to just fill up relevant information under each heading. The objectives of introducing this structured referral letter was to improve the quality and standard of referral letters and save time for both general
Shows how students can use persuasive principles of communication (format and writer's purpose) and of classical rhetoric (organization, ethos, pathos, logos, and style) to improve their ability to analyze business letters. Shows how applying these principles to the analysis of business letters from other countries helps students write better and…
Result: A majority (>80%) of the referral letters had no information on the current medication list, relevant psychosocial history, outline of management to date, results of investigations to date, and known allergies. Conclusion: Deficits in communication or information transfer through referral letters to the psychiatrist are ...
history, may not be elements that non-psychiatrist phy- sicians routinely collect during their examinations and, therefore, one would not expect such information to be available to be included in referral letters. Conclusion. Deficits in communication or information transfer through referral letters to the psychiatrist are common.
van Bloem, J.W.H.; Schiphorst, Roelof; Kluwer, Taco; Slump, Cornelis H.
The number of wireless devices (smartphones, laptops, sensors) that use the 2.4 GHz ISM band is rapidly increasing. The most common communication system in this band is Wi-Fi (IEEE 802.11b/g/n). For that reason coexistence between Wi-Fi and other systems becomes more and more important. In this
Full Text Available The direct link communication between STAtions (STAs is one of the techniques to improve the MAC performance of IEEE 802.11 infrastructure networks. For the efficient direct link communication, in the literature, the simultaneous polling method was proposed to allow the multiple direct data communication to be performed simultaneously. However, the efficiency of the simultaneous polling method is affected by the interference condition. To alleviate the problem of the lower polling efficiency with the larger interference range, the hybrid polling method is proposed for the direct link communication between STAs in IEEE 802.11 infrastructure networks. By the proposed polling method, we can integrate the sequential and simultaneous polling methods properly according to the interference condition. Numerical examples are also presented to show the medium access control (MAC performance improvement by the proposed polling method.
Arroyo Arzubi, Alejandro; Castro Lechtaler, Antonio; Foti, Antonio Roberto; Fusario, Rubén J.; García Guibout, Jorge; Sens, Lorena
In recent years the use of wireless communications has increased significantly. Rural communities without cable network communication have found a solution in wireless technologies. Based on previous fieldwork, this paper analyzes software development of integration based technologies for communication equipment. It focuses on the feasibility of the IEEE 802.22 standard as a solution to the wireless problem.
Vivek Agarwal; Raymond A. DeCarlo; Lefteri H. Tsoukalas
considerations that must also be taken into account when computing the power consumption associated with each task. The considerations includes: number of events occurring in a fixed active time period and the duration of each event, event-information processing time, total communication time, number of retransmission, etc. Additionally, at the network level the communication of information data packets between WSNs involves collisions, latency, andretransmission, which result in unanticipated power losses. This paper presents stochastic modeling of power demand for a schedule-driven WSN utilizing Institute of Electrical and Electronics Engineers, IEEE, 802.11 communication protocols. The model captures the generic operation of a schedule-driven WSN when an external event occurs, i.e., sensing, following by processing, and followed by communication. The results are verified via simulation.
The Editor welcomes letters, by e-mail to email@example.com or by post to Dirac House, Temple Back, Bristol BS1 6BE, UK. Contents: Quantum uncertainties Reflections in a plastic box A brief history of quantum physics Correction Grammar and gender Quantum uncertainties Whilst I enjoyed Gesche Pospiech's article ('Uncertainty and complementarity: the heart of quantum physics' 2000 Phys. Educ. 35 393 9) I would like to expand on two comments he makes. Firstly the author claims that QM is linear, and a consequence of this is that any two superimposed states form an admissible third state. This is rather too sweeping, as it is true only for degenerate states. Otherwise quantum mechanics would allow a continuum of energies between states by a simple admixture of levels. The proof of this statement is trivial. For a Hamiltonian H and two orthogonal wavefunctions, ψ1 and ψ2 with energies E1 and E2 then (ψ1 + ψ2) is not an eigenfunction of that Hamiltonian as H(ψ1 + ψ2) = E1ψ1 + E2ψ2 ≠ E(ψ1 + ψ2) for any value of E, unless E1 = E2. Secondly Pospiech states that quantum objects show wave- or particle-like behaviour, depending on the measuring apparatus, and that occasionally experiments (such as Taylor's) reveal both. I would contest the validity of this type of thinking. All experiments on quantum objects reveal both types of behaviour—even ones which simply show straight line motion of photons. What is important, in addition, is our interpretation of the results. It takes an understanding of QED, for example, to see that an experiment which otherwise shows particle behaviour is, in fact, showing quantum behaviour. More contentiously though I would suggest that detection apparatus is incapable of detecting anything other than particles. Wave-like behaviour is revealed only by an analysis of the paths the particle could have taken. In other words, the interference of continuous fields sometimes predicts the same results when the detection is averaged over many events
The Editor welcomes letters, by e-mail to firstname.lastname@example.org or by post to Dirac House, Temple Back, Bristol BS1 6BE, UK. Contents: Alternative view of education in Zambia Pedantry or compromise Alternative view of education in Zambia I have just read the 'On the Map' report of the International School of Lusaka with very mixed feelings (Physics Education, March 2001). I have recently spent some time in Zambia, in Lusaka, and share Sue Pears' love for the country and the Zambians. The ISL is indeed a good, prestigious school, similar to International Schools in many other countries. But, as in most other developing countries, there is enormous variation between the different types of schooling, and the ISL is at one end of the spectrum. Most schools in Zambia are less favoured. Zambia is a wonderful, beautiful country full of the most friendly and resourceful people I know. It is also a very poor country. It is a country of enormous contrasts and its schools reflect that variation. It has a tiny, affluent 'middle' class of professionals, politicians, businessmen, employees of international businesses and NGOs—nearly all paid from overseas budgets. It has an enormous majority of poor folk, cheerfully living in very basic conditions but sharing their lives in extended families without complaint. The government is virtually bankrupt, and consequently those paid by the government—teachers, police, nurses etc—get a pittance. The wage for a teacher in a typical school is #20 per month (compared to a typical teacher in the UK who gets 100 times more, about #2000 per month). The GNP in Zambia is about 1 per day per person, and this has to pay for all the schools, hospitals, police, and the civic infrastructure that we take so much for granted (the GNP in UK is about 60 per day per person). Consequently most state schools do not have resources; they have a classroom and a teacher but little else. What resources the school has will be paid for by the school fees that every
The Editor welcomes letters, by e-mail to email@example.com or by post to Dirac House, Temple Back, Bristol BS1 6BE Contents: Force on a pendulum Sound slows down Bond is back Force on a pendulum The simple pendulum has been used by several educationalists for investigating the patterns of thinking among students and their observations that Aristotelian thinking persists among students at college level. I had also considered the simple pendulum in my 1985 letter in Physics Today , so I was interested to read the test given by Lenka CzudkovÃ¡ and Jana MusilovÃ¡ . When students were asked to draw net forces acting on the particle at various positions, 31.9% of students believed that the net force was tangential to the particle's path the whole time. To me this is no surprise because in our derivation of the equation for the period of a simple pendulum we assume that the unbalanced sine component provides the restoring force for the harmonic motion of the bob. Of course, CzudkovÃ¡ and MusilovÃ¡'s question asked students for the net force on the particle, not the component. The student's answer fits well with the logic of the equilibrium of forces and the parallelogram law. Lastly, let me bring out the similarity between the student's answer and the thinking of George Gamow. He used to call positrons 'donkey' electrons because of their displacement against the applied force, before Paul Dirac termed them positrons. Victor Weisskeptf told me this anecdote in a letter in May 1982. References  Sathe D 1985 Phys. Today 38 144  CzudkovÃ¡ L and MusilovÃ¡ J 2000 Phys. Educ. 35 428 Dileep V Sathe Dadawala Jr College, Pune, India Sound slows down Without wanting to stir up more trouble amongst the already muddy waters of Physics teaching, consider how many times you have heard (or, more worryingly, read) this: 'Sound waves travel faster in a denser material' But...The velocity of simple longitudinal waves in a bulk medium is given by v = (K/ρ)1/2 where K is
Copyright protection and information security are two most considered issues of digital data following the development of internet and computer network. As an important solution for protection, watermarking technology has become one of the challenged roles in industry and academic research. The watermarking technology can be classified by two categories: visible watermarking and invisible watermarking. With invisible technique, there is an advantage on user interaction because of the visibility. By applying watermarking for communication, it will be a challenge and a new direction for communication technology. In this paper we will propose one new research on communication technology using optical camera communications (OCC) based invisible watermarking. Beside the analysis on performance of proposed system, we also suggest the frame structure of PHY and MAC layer for IEEE 802.15.7r1 specification which is a revision of visible light communication (VLC) standardization.
The Editor welcomes letters, by e-mail to firstname.lastname@example.org or by post to Dirac House, Temple Back, Bristol BS1 6BE, UK. Contents: M-set as metaphor The abuse of algebra M-set as metaphor 'To see a World in a Grain of Sand And a Heaven in a Wild Flower Hold Infinity in the palm of your hand And Eternity in an hour' William Blake's implied relativity of spatial and temporal scales is intriguing and, given the durability of this worlds-within-worlds concept (he wrote in 1803) in art, literature and science, the blurring of distinctions between the very large and the very small must strike some kind of harmonious chord in the human mind. Could this concept apply to the physical world? To be honest, we cannot be absolutely sure. Most cosmological thinking still retains the usual notions of a finite universe and an absolute size scale extending from smallest to largest objects. In the boundless realm of mathematics, however, the story is quite different. The M-set was discovered by the French mathematician Benoit Mandelbrot in 1980, created by just a few simple lines of computer code that are repeated recursively. As in Blake's poem, this 'world' has no bottom we have an almost palpable archetype for the concept of infinity. I would use the word 'tangible', but one of the defining features of the M-set is that nowhere in the labyrinth can one find a surface smooth enough for a tangent. Upon magnification even surfaces that appeared to be smooth explode with quills and scrolls and lightning bolts and spiral staircases. And there is something more, something truly sublime. Observe a small patch with unlimited magnifying power and, as you observe the M-set on ever-smaller scales, down through literally endless layers of ornate structure, you occasionally come upon a rapidly expanding cortex of dazzling colour with a small black structure at its centre. The black spot appears to be the M-set itself! There is no end to the hierarchy, no bottom-most level, just endless recursive
... NUCLEAR REGULATORY COMMISSION [NRC-2011-0204] Proposed Generic Communication; Draft NRC Generic Letter 2011-XX: Seismic Risk Evaluations for Operating Reactors AGENCY: Nuclear Regulatory Commission... FR 54507), that requested public comment on Draft NRC Generic Letter 2011- XX: Seismic Risk...
Distributed control in a networked environment is an irreplaceable feature in systems with remote sensors and actuators. Although distributed control was not originally designed to be networked, usage of off-the-shelf networking technologies has become so prevalent that control systems are desired to have access mechanisms similar to computer networks. However, proprietary transducer interfaces for network communications and distributed control overwhelmingly dominate this industry. Unless the lack of compatibility and interoperability among transducers is resolved, the mature level of access (that computer networking can deliver) will not be achieved in such networked distributed control systems. Standardization of networked transducer interfaces will enable devices from different manufacturers to talk to each other and ensure their plug-and-play capability. One such standard is the suite of IEEE 1451 for sensor network communication and transducer interfaces. The suite not only provides a standard interface for smart transducers, but also outlines the connection of an NCAP (network capable application processor) and transducers (through a transducer interface module TIM). This paper presents the design of the compliance testing of IEEE 1451.1 (referred to as Dot1) compatible NCAP-to-NCAP communications on a link-layer independent medium. The paper also represents the first demonstration of NCAP-to-NCAP communications with Dot1 compatibility: a tester NCAP and an NCAP under test (NUT).
Gomes, Diogo; Afonso, José A
Body sensor networks (BSNs) enable continuous monitoring of patients anywhere, with minimum constraints to daily life activities. Although the IEEE 802.15.4 and ZigBee(®) (ZigBee Alliance, San Ramon, CA) standards were mainly developed for use in wireless sensors network (WSN) applications, they are also widely used in BSN applications because of device characteristics such as low power, low cost, and small form factor. However, compared with WSNs, BSNs present some very distinctive characteristics in terms of traffic and mobility patterns, heterogeneity of the nodes, and quality of service requirements. This article evaluates the suitability of the carrier sense multiple access-collision avoidance protocol, used by the IEEE 802.15.4 and ZigBee standards, for data-intensive BSN applications, through the execution of experimental tests in different evaluation scenarios, in order to take into account the effects of contention, clock drift, and hidden nodes on the communication reliability. Results show that the delivery ratio may decrease substantially during transitory periods, which can last for several minutes, to a minimum of 90% with retransmissions and 13% without retransmissions. This article also proposes and evaluates the performance of the BSN contention avoidance mechanism, which was designed to solve the identified reliability problems. This mechanism was able to restore the delivery ratio to 100% even in the scenario without retransmissions.
Medlock, Stephanie; Eslami, Saeid; Askari, Marjan; van Lieshout, Erik Jan; Dongelmans, Dave A.; Abu-Hanna, Ameen
The discharge letter is the primary means of communication at patient discharge, yet discharge letters are often not completed on time. A multifaceted intervention was performed to improve communication in patient hand-off from the intensive care unit (ICU) to the wards by improving the timeliness
Medlock, S.; Eslami, S.; Askari, M.; van Lieshout, E.J.; Dongelmans, D.A.; Abu-Hanna, A.
Background: The discharge letter is the primary means of communication at patient discharge, yet discharge letters are often not completed on time. A multifaceted intervention was performed to improve communication in patient hand-off from the intensive care unit (ICU) to the wards by improving the
Janß, Armin; Thorn, Johannes; Schmitz, Malte; Mildner, Alexander; Dell'Anna-Pudlik, Jasmin; Leucker, Martin; Radermacher, Klaus
Nowadays, only closed and proprietary integrated operating room systems (IORS) from big manufacturers are available on the market. Hence, the interconnection of components from third-party vendors is only possible with increased time and costs. In the context of the German Federal Ministry of Education and Research (BMBF)-funded project OR.NET (2012-2016), the open integration of medical devices from different manufacturers was addressed. An integrated operating theater based on the open communication standard IEEE 11073 shall give clinical operators the opportunity to choose medical devices independently of the manufacturer. This approach would be advantageous especially for hospital operators and small- and medium-sized enterprises (SME) of medical devices. Actual standards and concepts regarding technical feasibility and the approval process do not cope with the requirements for a modular integration of medical devices in the operating room (OR), based on an open communication standard. Therefore, innovative approval strategies and corresponding certification and test procedures, which cover actual legal and normative standards, have to be developed in order to support the future risk management and the usability engineering process of open integrated medical devices in the OR. The use of standardized device and service profiles and a three-step testing procedure, including conformity, interoperability and integration tests are described in this paper and shall support the manufacturers to integrate their medical devices without disclosing the medical devices' risk analysis and related confidential expertise or proprietary information.
Pick, Doreén; Zielke, Stephan
In several markets firms are required to explicitly announce price increases by sending customers notification letters. The purpose of this article is to analyze how electricity providers deal with such obligatory price increase communication and to provide a comprehensive overview of communicative arguments used by firms. Data is gathered through a content analysis of 97 price increase mailings. Findings show that electricity providers apply several price communication strategies while other promising strategies for customer retention are mostly ignored (i.e., those related to competitors, offerings and relationship benefits). Further, price increase communication differs between national and local firms. Local firms are more transparent in their price increase communication and refer even less often to offer and relationship benefits. Electricity firms have many options to improve the potential effects of price increase letters, such as referring to the future relationship. This is the first study which examines the content of price increase communication by firms. It structures price communication practices used by electricity providers, analyzes their empirical relevance, summarizes findings in five global propositions, and provides a detailed agenda for future research. Moreover, the study indicates several means for public policy organizations to offer regulations on the content of price increase notifications. - Highlights: • We examine 97 price increase letters from electricity providers in Germany. • We investigate the means how firms deal with price increase communications. • Electricity providers aim to hide price increases towards their customers. • Electricity providers only scarcely use benefit and relationship communication. • Price increase communication differs between types of providers as national firms are more professional.
Altintas, Onur; Chen, Wai; Heijenk, Geert; Oh, Hyun Seo; Chung, Jong-Moon; Dressler, Falko; Kargl, Frank; Pau, Giovanni; Schoch, Elmar
On behalf of the Organizing Committee, we would like to welcome you to the fourth edition of the IEEE Vehicular Networking Conference in Seoul, Korea. IEEE VNC is a unique conference sponsored by both IEEE Communications Society and Intelligent Transportation Systems Society. It brings together
Agarwal, Vivek [Idaho National Lab. (INL), Idaho Falls, ID (United States); Richardson, Joseph [Idaho National Lab. (INL), Idaho Falls, ID (United States); Zhang, Yanliang [Idaho National Lab. (INL), Idaho Falls, ID (United States)
Most wireless sensor network (comprising of thousands of WSNs) applications require operation over extended periods of time beginning with their deployment. Network lifetime is extremely critical for most applications and is one of the limiting factors for energy-constrained networks. Based on applications, there are wide ranges of different energy sources suitable for powering WSNs. A battery is traditionally used to power WSNs. The deployed WSN is required to last for long time. Due to finite amount of energy present in batteries, it is not feasible to replace batteries. Recently there has been a new surge in the area of energy harvesting were ambient energy in the environment can be utilized to prolong the lifetime of WSNs. Some of the sources of ambient energies are solar power, thermal gradient, human motion and body heat, vibrations, and ambient RF energy. The design and development of TEGs to power WSNs that would remain active for a long period of time requires comprehensive understanding of WSN operational. This motivates the research in modeling the lifetime, i.e., power consumption, of a WSN by taking into consideration various node and network level activities. A WSN must perform three essential tasks: sense events, perform quick local information processing of sensed events, and wirelessly exchange locally processed data with the base station or with other WSNs in the network. Each task has a power cost per unit tine and an additional cost when switching between tasks. There are number of other considerations that must also be taken into account when computing the power consumption associated with each task. The considerations includes: number of events occurring in a fixed active time period and the duration of each event, event-information processing time, total communication time, number of retransmission, etc. Additionally, at the network level the communication of information data packets between WSNs involves collisions, latency, and
Medlock, Stephanie; Eslami, Saeid; Askari, Marjan; van Lieshout, Erik Jan; Dongelmans, Dave A; Abu-Hanna, Ameen
The discharge letter is the primary means of communication at patient discharge, yet discharge letters are often not completed on time. A multifaceted intervention was performed to improve communication in patient hand-off from the intensive care unit (ICU) to the wards by improving the timeliness of discharge letters. A management directive was operationalised by a working group of ICU staff in a longitudinal before-after study. The intervention consisted of (a) changing policy to require a letter for use as a transfer note at the time of ICU discharge, (b) changing the assignment of responsibility to an automatic process, (c) leveraging positive peer pressure by making the list of patients in need of letters visible to colleagues and (d) provision of decision support, through automatic copying of important content from the patient record to the letter and email reminders if letters were not written on time. Statistical process control charts were used to monitor the longitudinal effect of the intervention. The intervention resulted in a 77.9% absolute improvement in the proportion of patients with a complete transfer note at the time of discharge, and an 85.2% absolute improvement in the number of discharge letters written. Statistical process control shows that the effect was sustained over time. A multifaceted intervention can be highly effective for improving discharge communication from the ICU.
Dheensa, Sandi; Lucassen, Anneke; Fenwick, Angela
European genetic testing guidelines recommend that healthcare professionals (HCPs) discuss the familial implications of any test with a patient and offer written material to help them share the information with family members. Giving patients these "family letters" to alert any relatives of their risk has become part of standard practice and has gone relatively unquestioned over the years. Communication with at-risk relatives will become an increasingly pressing issue as mainstream and routine practice incorporates broad genome tests and as the number of findings potentially relevant to relatives increases. This study therefore explores problems around the use of family letters to communicate about genetic risk. We conducted 16 focus groups with 80 HCPs, and 35 interviews with patients, recruited from across the UK. Data were analyzed thematically and we constructed four themes: 1) HCPs writing family letters: how to write them and why?, 2) Patients' issues with handing out family letters, 3) Dissemination becomes an uncontrolled form of communication, and 4) When the relative has the letter, is the patient's and HCP's duty discharged? We conclude by suggesting alternative and supplementary methods of communication, for example through digital tools, and propose that in comparison to communication by family letter, direct contact by HCPs might be a more appropriate and successful option.
The primary objective of the Australia Post eLetter project 1 was to determine the feasibility of using the eLetter service with the Patient Administration System Appointment Scheduling Module to provide a fully automated mailing function that would eliminate the need for manual processing of mail delivery. Issues with timely delivery of letters throughout all outpatient sites at the Royal Hobart Hospital (RHH) have been identified as being mainly due to limited human resources being available to perform mailing duties and the like. This new desktop service enables staff to transmit data electronically in conjunction with the appointment software for large quantity mail postings to Australia Post via a secure line. Australia Post then validates the address, appends a barcode, prints the letter, envelopes it and inserts it into the mail distribution network in the state of the recipient. This article depicts the process that has eliminated the manual processing of a letter via the traditional Microsoft application, Wordmate, a system at RHH that was always difficult to use. With the introduction of eLetter, the RHH's Specialist Clinics have significantly improved the timeliness and quality of communication with patients as well as reducing administration tasks for staff.
Kian, Low W
.... Several SDR software architectures have been developed during the last few years. One implementation of the Software Communications Architecture is the Open Source SCA Implementation::Embedded (OSSIE...
The present collection of letters from JINR, Dubna, contains ten separate records on the microscopic entropy and nonlocality, conditional density matrix: systems and subsystems in quantum mechanics, physics of quantum computation, flipping qubits, quantum zeno effect for N-level Friedrichs model, universal hybrid quantum processors, formation of the SU(3)-polarization states in atom-quantum electromagnetic field system under condition of the Bose-Einstein condensate existence, periodical sequences (trajectories) of outcomes of atomic state measurement on exit from the micromaser cavity, an algebraic method to solve the Tavis-Cummings problem, quantum teleportation of nuclear matter and its investigation
Institute of Electrical and Electronics Engineers, Inc., New York, NY.
The Institute of Electrical and Electronics Engineers (IEEE) validation program is designed to motivate persons practicing in electrical and electronics engineering to pursue quality technical continuing education courses offered by any responsible sponsor. The rapid acceptance of the validation program necessitated the additional development of a…
The IEEE 802.11ad waveform can be used for automotive radar by exploiting the Golay complementary sequences in the preamble of a frame. The performance of radar, however, is limited by the preamble structure. In this paper, we propose an adaptive pre...
... NUCLEAR REGULATORY COMMISSION [NRC-2011-0204] Proposed Generic Communication; Draft NRC Generic... functions. SSCs in operating nuclear power plants are designed either in accordance with, or have been... nuclear reactors. The background information relevant to this GL includes the individual plant...
Yuan, Wei; Wang, Xiangyu; Linnartz, J.P.M.G.
IEEE 802.15.4 was developed to meet the needs for low-rate wireless communication. However, due to its low power, IEEE 802.15.4 is potentially vulnerable to interference by other wireless technologies having much higher power and working in the same industrial, scientific, and medical (ISM) band
Basso, T.; DeBlasio, R.
The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.
[Definition and specification requirements for PAC-systems (picture archiving and communication system). A performance index with reference to the standard "IEEE Recommended Practice for Software Requirement Specifications"].
König, H; Klose, K J
The formulation of requirements is necessary to control the goals of a PACS project. Furthermore, in this way, the scope of functionality necessary to support radiological working processes becomes clear. Definitions of requirements and specification are formulated independently of systems according to the IEEE standard "Recommended Practice for Software Requirements Specifications". Definitions are given in the Request for Information, specifications in the Request for Proposal. Functional and non-functional requirements are distinguished. The solutions are rated with respect to scope, appropriateness and quality of implementation. A PACS checklist was created according to the methods described above. It is published on the homepage of the "Arbeitsgemeinschaft Informationstechnologie" (AGIT) within the "Deutsche Röntgengesellschaft" (DRG) (http://www.uni-marburg.de/mzr/agit). The checklist provides a discussion forum which should contribute to an agreement on accepted basic PACS functionalities.
IEEE Council on Superconductivity
Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity's Awards Committee (right).
Full Text Available [Extract] Dear Friends and Colleagues, In August of 2014, Manduca P et al. published “An open letter for the people in Gaza” in The Lancet. This letter was the response of those authors to their perspective of what was happening in Gaza during the summer-long conflict between Israel and Gaza. Israel was finally responding to years of bombardment from Gaza into civilian areas in the south of Israel. Two of the authors of the letters were known anti-Semites, and held connections with David Duke, a former Ku Klux Klan Grand Wizard in Louisiana and advocate of Nazism. Both these authors expressed sympathy and support for Duke’s rabidly anti-Jewish positions. In their letter they accused Israel’s medical community of complicity in committing terrible atrocities and even implied that chemical warfare was being used by Israel. ...
Sthapit, Pranesh; Pyun, Jae-Young
The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.
From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...
... CONTRACT ADMINISTRATION AND AUDIT SERVICES Postaward Orientation 42.504 Postaward letters. In some circumstances, a letter or other written form of communication to the contractor may be adequate postaward...
Mišić, Jelena; (Sherman) Shen, Xuemin
We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184
Misić, Jelena; Sherman Shen, Xuemin
We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.
Shukla, P. K.
Describes an assignment in which students write a letter of complaint, and discusses how this assignment aids students in seeing the importance of effective written communication to their daily lives. (SR)
Malone, Edward A.
This article examines the historical professional project that created the Institute of Radio Engineers' Professional Group on Engineering Writing an Speech (IRE PGEWS)--now called the Institute of Electrical and Electronics Engineers' Professional Communication Society (IEEE PCS)--and recounts the group's early history in detail. It also traces…
Johnson, Karl E.
Conclusions of surveys (63 libraries, OCLC database, University of Rhode Island users) assessing handling of Institute of Electrical and Electronics Engineers (IEEE) conference publications indicate that most libraries fully catalog these publications using LC cataloging, and library patrons frequently require series access to publications. Eight…
Zhai, Linbo; Zhang, Xiaomin; Xie, Gang
This letter presents a model with queueing theory to analyze the performance of non-saturated IEEE 802.11 DCF networks. We use the closed queueing network model and derive an approximate representation of throughput which can reveal the relationship between the throughput and the total offered load under finite traffic load conditions. The accuracy of the model is verified by extensive simulations.
This paper describes the preliminary steps towards the foundation and the early history of IRE Region 9 / IEEE Region 8. The information has been gathered mainly from the archives of the IEEE Benelux Section.
Dheensa, Sandeep; Lucassen, Anneke; Fenwick, Angela
European genetic testing guidelines recommend that healthcare professionals (HCPs) discuss the familial implications of any test with a patient and offer written material to help them share the information with family members. Giving patients these “family letters” to alert any relatives of their risk has become part of standard practice and has gone relatively unquestioned over the years. Communication with at-risk relatives will become an increasingly pressing issue as mainstream and routin...
Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity’s Awards Committee (right). (Photo: IEEE Council on Superconductivity)With the magnets installed in the tunnel and work on the interconnections almost completed, Lucio Rossi has reaped the rewards of fifteen years of work. And yet, when the physicist from Milan arrived to take charge of the group responsible for the superconducting magnets in 2001, success seemed far from assured. Endowed with surprising levels of energy, Lucio Rossi, together with his team, ensured that production of these highly complex magnets got underway. Today, that achievement earns them the recognition not only of CERN but also of the international superconducting community. It is for this achievement that Lucio Rossi was awarded the prize by the IEEE’s (Institute of Electrical an...
This letter confirms that the Laboratory for Laser Energetics (LLE) was an important part of the FY10 NIF Polar Drive Exploding Pusher experiments on the National Ignition Facility (NIF). These experiments were designed by LLE to produce requested neutron yields to calibrate and qualify nuclear diagnostics. LLE built a deuterium-tritium filling system for the glass shells and provided them to LLNL for mounting. In FY10, four exploding pusher implosions were performed with measured neutron yields within a factor of two of requested and ion temperatures within 20% of requested. These implosions are proving to be an ideal platform for commissioning the nuclear diagnostic suite on the NIF and are achieving all of the objectives planned for this campaign.
Miksztai-Réthey, Brigitta; Faragó, Kinga Bettina
We studied an artificial intelligent assisted interaction between a computer and a human with severe speech and physical impairments (SSPI). In order to speed up AAC, we extended a former study of typing performance optimization using a framework that included head movement controlled assistive technology and an onscreen writing device. Quantitative and qualitative data were collected and analysed with mathematical methods, manual interpretation and semi-supervised machine video annotation. As the result of our research, in contrast to the former experiment's conclusions, we found that our participant had at least two different typing strategies. To maximize his communication efficiency, a more complex assistive tool is suggested, which takes the different methods into consideration.
Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard
Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.
Lezcano, Leonardo; Triana, Michel; Ternier, Stefaan; Hartkopf, Kathleen; Stieger, Lina; Schroeder, Hanna; Sopka, Sasa; Drachsler, Hendrik; Maher, Bridget; Henn, Patrick; Orrego, Carola; Specht, Marcus
The electronic discharge letter mobile app takes advantage of Near Field Communication (NFC) within the PATIENT project and a related post-doc study. NFC enabled phones to read passive RFID tags, but can also use this short-range wireless technology to exchange (small) messages. NFC in that sense
Fafoutis, Xenofon; Sørensen, Thomas; Madsen, Jan
The paper investigates the feasibility of using IEEE 802.11 in energy harvesting low-power sensing applications. The investigation is based on a prototype carbon dioxide sensor node that is powered by artificial indoors light. The wireless communication module of the sensor node is based on the RTX......4100 module. RTX4100 incorporates a wireless protocol that duty-cycles the radio while being compatible with IEEE 802.11 access points. The presented experiments demonstrate sustainable operation but indicate a trade-off between the benefits of using IEEE 802.11 in energy harvesting applications...
Bell, James D.
In discussing letter-writing methods for business communication classes, the article explains that claim letter formats other than the direct approach are not only legitimate, but also effective, and suggests that the approach selected should depend upon the circumstances surrounding the claim. (CT)
Kuo-Feng Huang; Shih-Jung Wu
Supporting Quality of Service (QoS) guarantees for diverse multimedia services is the primary concern for IEEE802.16j networks. A scheduling scheme that satisfies the QoS requirements has become more important for wireless communications. We proposed an adaptive nontransparent-based distributed scheduling scheme (ANDS) for IEEE 802.16j networks. ANDS comprises three major components: Priority Assignment, Resource Allocation, Preserved Bandwidth Adjustment. Different service-type connections p...
The Director General has received a communication dated 25 June 2008 from the Resident Representative of the United Kingdom, on behalf of the Resident Representatives of China, France, Germany, the Russian Federation, the United Kingdom and the United States of America, and the Secretary General and High Representative of the European Union, attaching the text of a letter and offer of 12 June 2008 delivered to the authorities of the Islamic Republic of Iran by Mr. Javier Solana, together with a summary of remarks made by Mr. Solana on 14 June 2008. The communication and, as requested therein, its attachments, are herewith circulated for information
On the initiative of its French and Swiss Sections, the IEEE has honoured CERN with an 'IEEE Milestone in the history of electricity and electronics' for the invention of the multi-wire proportional chamber in 1968. The IEEE established the Electrical Engineering Milestones programe in 1983 to honour significant achievements in the history of electrical and electronics engineering. To be designated, an achievement must be at least 25 years old, must have involved a unique solution to an engineering problem, and must have had at least regional impact. Currently there are more than 50 IEEE Milestones around the world. http://www.ieee.org/organizations/history_center/cern.html The installation and unveiling of this IEEE Milestone will provide the opportunity to emphasize the close relationship between science, technology, industry and well-being in society. A ceremony, organised with the support of a group of IEEE members working at CERN, will be held at the CERN Globe of Science and Inn...
At a ceremony at CERN, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally a Milestone plaque in recognition of the invention of electronic particle detectors at CERN
Nilesh B. Kalani
Full Text Available Abstract This paper discusses about IEEE 802.11b simulation model implemented using LabVIEW software and its analyses for impact on bit error rate BER for different parameters as channel type channel number data transmission rate and packet size. Audio file is being transmitted processed and analyzed using the model for various parameters. This paper gives analysis of BER verses ESN0 for various parameter like data rate packet size and communication channel for the IEEE 802.11b simulation model generated using LabVIEW. It is proved that BER can be optimized by tweaking different parameters of wireless communication system.
Kisner, Roger A [ORNL; Mullens, James Allen [ORNL; Wilson, Thomas L [ORNL; Wood, Richard Thomas [ORNL; Korsah, Kofi [ORNL; Qualls, A L [ORNL; Muhlheim, Michael David [ORNL; Holcomb, David Eugene [ORNL; Loebl, Andy [ORNL
Current industry and NRC guidance documents such as IEEE 7-4.3.2, Reg. Guide 1.152, and IEEE 603 do not sufficiently define a level of detail for evaluating interdivisional communications independence. The NRC seeks to establish criteria for safety systems communications that can be uniformly applied in evaluation of a variety of safety system designs. This report focuses strictly on communication issues related to data sent between safety systems and between safety and nonsafety systems. Further, the report does not provide design guidance for communication systems nor present detailed failure modes and effects analysis (FMEA) results for existing designs. This letter report describes communications between safety and nonsafety systems in nuclear power plants outside the United States. A limited study of international nuclear power plants was conducted to ascertain important communication implementations that might have bearing on systems proposed for licensing in the United States. This report provides that following information: 1.communications types and structures used in a representative set of international nuclear power reactors, and 2.communications issues derived from standards and other source documents relevant to safety and nonsafety communications. Topics that are discussed include the following: communication among redundant safety divisions, communications between safety divisions and nonsafety systems, control of safety equipment from a nonsafety workstation, and connection of nonsafety programming, maintenance, and test equipment to redundant safety divisions during operation. Information for this report was obtained through publicly available sources such as published papers and presentations. No proprietary information is represented.
Kisner, Roger A.; Mullens, James Allen; Wilson, Thomas L.; Wood, Richard Thomas; Korsah, Kofi; Qualls, A.L.; Muhlheim, Michael David; Holcomb, David Eugene; Loebl, Andy
Current industry and NRC guidance documents such as IEEE 7-4.3.2, Reg. Guide 1.152, and IEEE 603 do not sufficiently define a level of detail for evaluating interdivisional communications independence. The NRC seeks to establish criteria for safety systems communications that can be uniformly applied in evaluation of a variety of safety system designs. This report focuses strictly on communication issues related to data sent between safety systems and between safety and nonsafety systems. Further, the report does not provide design guidance for communication systems nor present detailed failure modes and effects analysis (FMEA) results for existing designs. This letter report describes communications between safety and nonsafety systems in nuclear power plants outside the United States. A limited study of international nuclear power plants was conducted to ascertain important communication implementations that might have bearing on systems proposed for licensing in the United States. This report provides that following information: 1.communications types and structures used in a representative set of international nuclear power reactors, and 2.communications issues derived from standards and other source documents relevant to safety and nonsafety communications. Topics that are discussed include the following: communication among redundant safety divisions, communications between safety divisions and nonsafety systems, control of safety equipment from a nonsafety workstation, and connection of nonsafety programming, maintenance, and test equipment to redundant safety divisions during operation. Information for this report was obtained through publicly available sources such as published papers and presentations. No proprietary information is represented
The IEEE International Symposium on Biomedical Imaging (ISBI) is a scientific conference dedicated to mathematical, algorithmic, and computational aspects of biological and biomedical imaging, across all scales of observation. It fosters knowledge transfer among different imaging communities and contributes to an integrative approach to biomedical imaging. ISBI is a joint initiative from the IEEE Signal Processing Society (SPS) and the IEEE Engineering in Medicine and Biology Society (EMBS). The 2018 meeting will include tutorials, and a scientific program composed of plenary talks, invited special sessions, challenges, as well as oral and poster presentations of peer-reviewed papers. High-quality papers are requested containing original contributions to the topics of interest including image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological, and statistical modeling. Accepted 4-page regular papers will be published in the symposium proceedings published by IEEE and included in IEEE Xplore. To encourage attendance by a broader audience of imaging scientists and offer additional presentation opportunities, ISBI 2018 will continue to have a second track featuring posters selected from 1-page abstract submissions without subsequent archival publication.
The Nobel prize winner Georges Charpak and W. Cleon Anderson, IEEE President, unveil the Milestone bronze plaques. At a ceremony on 26 September at the Globe of Science and Innovation, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally dedicated Milestone plaques recognising the invention of electronic particle detectors at CERN. The plaque were unveiled by Mr Anderson and Georges Charpak, the Nobel-prize winning inventor of wire chamber technology at CERN in 1968. The IEEE is the world's largest professional association dedicated to the advancement of technology with 365,000 individual members in over 150 countries. Established in 1983, there are currently over 60 Milestones around the world. They honour momentous achievements in the history of electrical and electronics engineering, such as the landing of the first transatlantic cable, code breaking at Bletchley Park during World War II, and the development of the Japanese Bullet train, the Tokaido Shin...
IEEE P1596, the scalable coherent interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960--1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics
Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...
Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos
In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.
Wang, Hua; Dittmann, Lars
Future mobile communication systems such as IEEE 802.16 are expected to deliver a variety of multimedia services with diverse QoS requirements. To guarantee the QoS provision, appropriate scheduler architecture and scheduling algorithms have to be carefully designed. In this paper, we propose...
The Secretariat has received a letter dated 12 August 2005 from the Resident Representative of Yemen attaching a letter dated 8 August 2005 from Mr. Amre Moussa, Secretary General of the League of Arab States, to the Director General. In the light of the request expressed by the Resident Representative of Yemen in his letter of 12 August 2005, his letter and the letter of the Secretary General of the League of Arab States are attached for the information of all Member States
Our IEEE transactions on power electronics has had some very positive progress these past years under the leadership of Dr. Daan van Wyk. Papers have been processed efficiently both in review time and publication time. This success has spread throughout the whole power electronics community which...
First page Back Continue Last page Overview Graphics. The IEEE 802.11a standards. Provides higher data rate and system capacities and uses OFDM in Physical Layer to mitigate the multi path effects;. Supports multiple 20Mhz channel. Each channel being an OFDM Modulated;; 52 Carriers. 48 data carrier; 4 Carry pilot ...
This piece was a letter directed towards various ministers in the parliament, targeted at raising a discussion on the values in the education of architects in Denmark and various related topics.......This piece was a letter directed towards various ministers in the parliament, targeted at raising a discussion on the values in the education of architects in Denmark and various related topics....
Fan, Yuting; Li, Jianqiang; Lei, Yi; Tang, Ming; Yin, Feifei; Dai, Yitang; Xu, Kun
In this Letter, we experimentally demonstrate a full-duplex transmission system of IEEE 802.11ac-compliant multiple-input multiple-output (MIMO) signals over a 2-km 7-core fiber for in-building wireless local-area network (WLAN) distributed antenna systems. For full-duplex 3 ï¿½ 3 MIMO
Ullah, Sana; Chen, Min; Kwak, Kyung Sup
The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.
Nga, Dinh Thi Thuy; Kim, Mingon; Kang, Minho
Sleep-mode operation of a Mobile Subscriber Station (MSS) in IEEE 802.16e effectively saves energy consumption; however, it induces frame response delay. In this letter, we propose an algorithm to quickly find the optimal value of the final sleep interval in sleep-mode in order to minimize energy consumption with respect to a given frame response delay constraint. The validations of our proposed algorithm through analytical results and simulation results suggest that our algorithm provide a potential guidance to energy saving.
Public-private partnerships have been a mainstay of the U.S. Department of Energy and the National Renewable Energy Laboratory (DOE/NREL) approach to research and development. These partnerships also include technology development that enables grid modernization and distributed energy resources (DER) advancement, especially renewable energy systems integration with the grid. Through DOE/NREL and industry support of Institute of Electrical and Electronics Engineers (IEEE) standards development, the IEEE 1547 series of standards has helped shape the way utilities and other businesses have worked together to realize increasing amounts of DER interconnected with the distribution grid. And more recently, the IEEE 2030 series of standards is helping to further realize greater implementation of communications and information technologies that provide interoperability solutions for enhanced integration of DER and loads with the grid. For these standards development partnerships, for approximately $1 of federal funding, industry partnering has contributed $5. In this report, the status update is presented for the American National Standards IEEE 1547 and IEEE 2030 series of standards. A short synopsis of the history of the 1547 standards is first presented, then the current status and future direction of the ongoing standards development activities are discussed.
We reproduce an english translation of one of these letters below, in which ... contemporary scientific knowledge, and that under the circumstances ... generation it became necessary to limit the numbers because of lack of space, so that, in.
Earth Data Analysis Center, University of New Mexico — The National Flood Hazard Layer (NFHL) data incorporates all Digital Flood Insurance Rate Map(DFIRM) databases published by FEMA, and any Letters Of Map Revision...
McPherson, A C; Knibbe, T J; Oake, M; Swift, J A; Browne, N; Ball, G D C; Hamilton, J
Health care professionals play a critical role in preventing and managing childhood obesity, but the American Academy of Pediatrics recently stressed the importance of using sensitive and nonstigmatizing language when discussing weight with children and families. Although barriers to weight-related discussions are well known, there are few evidence-based recommendations around communication best practices. Disability populations in particular have previously been excluded from work in this area. The objectives were to present the findings of a recent scoping review to children with and without disabilities and their caregivers for their reactions; and to explore the experiences and perceptions of the children and their caregivers regarding weight-related communication best practices. Focus group and individual interviews were conducted with 7-18-year olds with and without disabilities and their caregivers. The interview guide was created using findings from a recent scoping review of weight-related communication best practices. Inductive thematic analysis was employed. Eighteen children (9 boys; 7 children with disabilities) and 21 caregivers (17 mothers, 1 step-father, 3 other caregivers) participated in 8 focus group and 7 individual interviews. Preferred communication strategies were similar across those with and without disabilities, although caregivers of children with autism spectrum disorder endorsed more concrete approaches. Discussions emphasizing growth and health were preferred over weight and size. Strengths-based, solution-focused approaches for weight conversations were endorsed, although had not been widely experienced. Perceptions of weight-related communication were similar across stakeholder groups, regardless of children's disability or weight status. Participants generally agreed with the scoping review recommendations, suggesting that they apply broadly across different settings and populations; however, tailoring them to specific circumstances
Deng, Julia; Meng, Ke; Xiao, Yang; Xu, Roger
IEEE 802.11 wireless Local Area Network (WLAN) becomes very prevalent nowadays. Either as a simple range extender for a home wired Ethernet interface, or as a wireless deployment throughout an enterprise, WLAN provides mobility, convenience, and low cost. However, an IEEE 802.11b/g wireless network uses the frequency of unlicensed 2.4GHz, which makes the network unsafe and more vulnerable than traditional Ethernet networks. As a result, anyone who is familiar with wireless network may initiate a Denial of Service (DoS) attack to influence the common communication of the network or even make it crash. In this paper, we present our studies on the DoS attacks and mitigation strategies for IEEE 802.11b/g WLANs and describe some initial implementations using IEEE 802.11b/g wireless devices.
Fukatsu, Takema; Kuratani, Shigeru
A new open-access journal, Zoological Letters, was launched as a sister journal to Zoological Science, in January 2015. The new journal aims at publishing topical papers of high quality from a wide range of basic zoological research fields. This review highlights the notable reviews and research articles that have been published in the first year of Zoological Letters, providing an overview on the current achievements and future directions of the journal.
Background: Healthcare workers at primary healthcare (PHC) clinics are frustrated by the fact that they do not receive replies to their referral letters to doctors. Referral letters act as permission slips to allow patients easy access to treatment by specialists at secondary and tertiary service levels and communicate reasons for ...
Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.
Communication dated 29 May 2006 received from the Resident Representative of the Syrian Arab Republic to the Agency concerning a letter from the Secretary General of the League of Arab States to the Director General
The Secretariat has received a letter dated 29 May 2006 from the Resident Representative of the Syrian Arab Republic attaching a letter dated 28 May 2006 from Mr. Amre Moussa, Secretary General of the League of Arab States, to the Director General. In the light of the request expressed by the Resident Representative of the Syrian Arab Republic in his letter of 29 May 2006, his letter and the letter of the Secretary General of the League of Arab States are attached for the information of all Member States
Evans, Mary Ann; Bell, Michelle; Shaw, Deborah; Moretti, Shelley; Page, Jodi
In this study 149 kindergarten children were assessed for knowledge of letter names and letter sounds, phonological awareness, and cognitive abilities. Through this it examined child and letter characteristics influencing the acquisition of alphabetic knowledge in a naturalistic context, the relationship between letter-sound knowledge and…
Lalande, John F.
Suggests having foreign language students write business letters to stimulate interest in developing writing skills. This project gives the students the opportunity of travelling abroad vicariously and to collect souvenirs while improving their communication skills in the foreign language. (CFM)
Pop, Paul; Lander Raagaard, Michael; Craciunas, Silviu S.
to the optimization of distributed cyber-physical systems using real-time Ethernet for communication. Then, we formulate two novel optimization problems related to the scheduling and routing of TT and AVB traffic in TSN. Thus, we consider that we know the topology of the network as well as the set of TT and AVB flows......In this paper we are interested in safety-critical real-time applications implemented on distributed architectures supporting the Time-SensitiveNetworking (TSN) standard. The ongoing standardization of TSN is an IEEE effort to bring deterministic real-time capabilities into the IEEE 802.1 Ethernet...... standard supporting safety-critical systems and guaranteed Quality-of-Service. TSN will support Time-Triggered (TT) communication based on schedule tables, Audio-Video-Bridging (AVB) flows with bounded end-to-end latency as well as Best-Effort messages. We first present a survey of research related...
Kim, Wooshik; Lim, Suyoung; Ahn, Jinsoo; Nah, Jiyoung; Kim, Namhyun
HL7 (Health Level 7) is a standard developed for exchanging incompatible healthcare information generated from programs or devices among heterogenous medical information systems. At present, HL7 is growing as a global standard. However, the HL7 standard does not support effective methods for treating data from various medical sensors, especially from mobile sensors. As ubiquitous systems are growing, HL7 must communicate with various medical transducers. In the area of sensor fields, IEEE 1451 is a group of standards for controlling transducers and for communicating data from/to various transducers. In this paper, we present the possibility of interoperability between the two standards, i.e., HL7 and IEEE 1451. After we present a method to integrate them and show the preliminary results of this approach.
Navarro, A.P.; Almoguera, L.; Alonso Gozalo, J.; Alonso Candenas, J.; Blaumoser, M.
Three communications about the TJ-II device, under construction at CIEMAT with preferential support from EURATOM, were presented to the 14th IEEE/NPSS Symposium on Fusion Engineering and are collected in this report. The first one describes in detail the device and its present status of design and construction. The remaining two deal with the two most critical components of the project: the vacuum vessel and the central hard conductor. (author) 16 fig. 16 ref
.... These National Security Letters (NSLs) seek customer and consumer transaction information in national security investigations from communications providers, financial institutions, and credit agencies...
All the Letters to the Editor in this issue are in the same PostScript or PDF file. Contents The imaginary Sun? Harold Aspden Energy Science Ltd, PO Box 35, Southampton SO16 7RB, UK Difficult physics? Tim Akrill Chief Examiner, A-level Physics, Edexcel Foundation Was it a dream? Bill Jarvis 6 Peggy's Mill Road, Edinburgh EH4 6JY
Peden, Ann R
Dr. Hildegard Peplau, considered to be our first modern Nurse theorist and the Mother of Psychiatric Nursing, was a prolific writer, engaging in correspondence with colleagues and students who sought her professional and theoretical expertise. Through these letters, she influenced psychiatric nursing while maintaining a broad international network of professional colleagues. An analysis of letters, written between 1990 and 1998, provides insights into Peplau's last decade of professional life and a model of how to support the next generation of nurse scholars. Using content analysis, 24 letters received between 1990 and 1998 were read, reread, and coded. Recurring themes were identified. Three themes were identified. These include Peplau, the Person: Living a Life of Professional Balance; Lighting a Spark: Investing in the Next Generation; and Work in the Vineyards of Nursing: Maintaining a Life of Scholarship. The letters depict Peplau's keen intellect, her wide professional network, her leisure time spent with family and friends, and her own work to assure that her theoretical legacy continued. Peplau's insights continue to be relevant as psychiatric mental health nursing leaders engage in activities to support the next generation of scholars and leaders.
Reforming the General Chemistry Textbook individual letters by Edward T. Samulski; Stephen J. Hawkes; Stephen J. Fisher; J. Stephen Hartman; A. R. H. Cole; Stanley Pine, Ronald Archer, and Herbert Kaesz; Jimmy Reeves; Robert Hill; and Brock Spencer, C. Bradley Moore and Nedah Rose. Re: article by R. J. Gillespie The author replies
Full Text Available The Internet of Things (IoT is going to be a market-changing force for a variety of real-time applications such as e-healthcare, home automation, environmental monitoring, and industrial automation. Low power wireless communication protocols offering long lifetime and high reliability such as the IEEE 802.15.4 standard have been a key enabling technology for IoT deployments and are deployed for home automation recently. The issues of the IEEE 802.15.4 networks have moved from theory to real world deployments. The work presented herein intends to demonstrate the use of the IEEE 802.15.4 standard in recent IoT commercial products for smart home applications: the Smart Home Starter Kit. The contributions of the paper are twofold. First, the paper presents how the IEEE 802.15.4 standard is employed in Smart Home Starter Kit. In particular, network topology, network operations, and data transfer mode are investigated. Second, network performance metrics such as end-to-end (E2E delay and frame reception ratio (FRR are evaluated by experiments. In addition, the paper discusses several directions for future improvements of home automation commercial products.
Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio
The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.
Niemelä, Ville; Hämäläinen, Matti; Iinatti, Jari
In 2002, Federal Communications Commission (FCC) was the first in defining regulations for ultra wideband (UWB) communications followed by Europe and Japan some years later. Focusing on impulse radio (IR) UWB, in 2007 was the time for the first published standard targeting in personal area networks, released by the IEEE. The second IEEE released standard including UWB definitions is targeted for wireless body area networks (WBAN) and was published in 2012. As the wireless communications has been and will be passing through almost any levels in society, the natural step with WBAN is using it in different medical, healthcare and wellbeing applications. The arguments for these are related to the modern lifestyle, in which people have increasingly more free time and are more interested in taking care of their health and wellbeing. Another challenge is the population composition, i.e., aging in developed countries which call for new solutions and procedures, particularly from cost wise. In this paper, we are evaluating UWB receivers based on the IEEE 802.15.6 physical layer definitions and capable of detecting differentially encoded modulation. The evaluation is performed using two different WBAN channel models.
Department of Homeland Security — Documents, including different types of Letters of MAP Revision (LOMR) and Letters of Map Amendment (LOMA), which are issued by FEMA to revise or amend the flood...
Atanassov, KT; Doukovska, L; Hadjiski, M; Jotsov, V; Kacprzyk, J; Kasabov, N; Sotirov, S; Szmidt, E; Zadrożny, S; Filev, D; Jabłkowski, J; Kacprzyk, J; Krawczak, M; Popchev, I; Rutkowski, L; Sgurev, V; Sotirova, E; Szynkarczyk, P
This two volume set of books constitutes the proceedings of the 2014 7th IEEE International Conference Intelligent Systems (IS), or IEEE IS’2014 for short, held on September 24‐26, 2014 in Warsaw, Poland. Moreover, it contains some selected papers from the collocated IWIFSGN'2014-Thirteenth International Workshop on Intuitionistic Fuzzy Sets and Generalized Nets.The conference was organized by the Systems Research Institute, Polish Academy of Sciences, Department IV of Engineering Sciences, Polish Academy of Sciences, and Industrial Institute of Automation and Measurements - PIAP.The papers included in the two proceedings volumes have been subject to a thorough review process by three highly qualified peer reviewers.Comments and suggestions from them have considerable helped improve the quality of the papers but also the division of the volumes into parts, and assignment of the papers to the best suited parts.
Tejero-Calado, Juan; Lopez-Casado, Carmen; Bernal-Martin, Antonio; Lopez-Gomez, Miguel; Romero-Romero, Marco; Quesada, Guillermo; Lorca, Julio; Rivas, Ramon
New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. This kind of devices favours at-home hospitalization, reducing the affluence to sanitary assistance centers to make routine controls. This fact causes a really favourable social impact, especially for elder people, rural-zone inhabitant, chronic patients and handicapped people. Furthermore, it offers new functionalities to physicians and will reduce the sanitary cost. Among these functionalities, biomedical signals can be sent to other devices (screen, PDA, PC...) or processing centers, without restricting the patients' mobility. The aim of this project is the development and implementation of a reduced size multi-channel electrocardiograph based on IEEE 802.11, which allows wireless monitoring of patients, and the insertion of the information into the TCP/IP Hospital network.
The present collection of letters from JINR, Dubna, contains nine separate letters on data on elastic (p,n) charge exchange: compilation, the potentialities of δ-electron control of luminosity in experiments with internal targets at the Nuclotron, pion broadening and low-mass dilepton production, fluctuation of electromagnetic cascade axis in dense amorphous segmented media, the forward detector of the ANKE spectrometer. Tracking system and its use in data analysis, quantum field theory with three-dimensional vector time, curvature decomposition and the Einstein-Yang-Mills equations, an integral equation for the spinor amplitude of a massive neutral Dirac particle in a curved space time with arbitrary geometry and surprising resonances in 147 Sm(nα) 144 Nd reaction
The present collection of letters from JINR, Dubna, contains eight separate letters on analysis of experimental data on relativistic nuclear collisions in the Lobachevski space, relativistic contribution of the final-state interaction to deuteron photodisintegration, on the charge asymmetry of the like-sign lepton pairs induced by B - B bar - production asymmetry, limits on the ν e → ν e neutrino oscillation parameters from an experiment at the IHEP-JINR neutrino detector, excitation of high spin isomers in photonuclear reactions, study of product formation in proton-nuclear reactions on the 129 I target induced by 660-MeV protons, application of jet pumps in the cryogenic system of the Nuclotron - superconducting accelerator of relativistic particles and study of the silicon drift detector performance with inclined tracks
The present collection of letters from JINR, Dubna, contains nine separate letters on nonlocal chiral quark model with confinement, perturbation of finite-lattice spectral levels by nearby nuclear resonances, on the application of 'Z 0 + jet' events for determining the gluon distribution in a proton at the LHC, account of light velocity constancy in the Galilean problem on the free movement of a particle and its fall onto the ground, first results of crystal deflector investigations at the Nuclotron external beams, decay parameters of K mesons, measured at proton synchrotron U-70 using 'Hyperon' set-up and modern world data, prototype of atomic-emission spectrometer on the basis of one-electrode impulse RF discharge for analytical measurements, polarimeter for Nuclotron internal beam and primordial bubbles of colour superconducting quark matter
The present collection of letters from JINR, Dubna, contains thirteen separate letters on start-to-end simulations of SASE FEL at the TESLA test facility, possible ways of improvement of the FEM oscillator with a Bragg resonator, the status and perspectives of the electron cooling method development, crystalline ion beams in storage rings, latest results of modeling of LHC beam injection, charge exchange injection in a synchrotron equipped with an electron cooling system, fringe and hysteresis effects in electron guns, nonstationary regimes of electron flow formation in secondary emission inverse coaxial diodes, a proposal of the experiment testing of the fine structure of the Vavilov-Cherenkov radiation, computer simulation of the electron beam dynamics at the accelerator structure and the injector of S-band linac with energies of 3 and 10 MeV, calculation of the electron beam dynamics of the accelerator LUE-200, the accelerator-accumulation facility ITEP-TWAC and accelerators-drivers of electronuclear facilities
Beier, Sofie; Ejlers, Steen
The talk will focus on Danish type designers and their work on Æ (AE), Ø (Oslash) and Å (Aring). These 'anomalies' found in the Danish written language, often causes difficulties for type designers. The counters of Ø/ø sometimes appear overcrowded, the uppercase Æ can result in an uncomfortably o......' attempt to create the optimal variation of these letters, we will give a brief introduction to the Danish typography tradition ranging from the early 20th Century and up until today....
Kafka, P.; Maier-Leibnitz, H.
Heinz Maier-Leibnitz a well-known scientist, nuclear physicist, for 50 years, who publicily supported the idea not to overrate the dangers of peaceful utilization of nuclear energy, has grown tired of talking only to colleagues. He invites a junior fellow physicist, who held engaged speeches against the nuclear power plant Zwentendorf, to an exchange of thoughts. Peter Kafka, an astro-physicist studied the self organisation of the universe from the big bang to the economic crisis and encountered the question of which conditions have to be fulfilled to prevent progress from becoming caranogenous. He became one of the spokesmen of 'political ecology' and called for resistance again large-scale technological use of scientific knowledge. He was enthusiastic about the idea of an exchange of letters, because he - just like his partner - believes in gaining knowledge by discussion. The variety of subjects is sketched briefly in form of three lectures. In the letters both scientists discuss intensly about: - Freedom of science and responsibility of science. - Decisions on energy questions under time-pressure. - Risks of nuclear plants. - Large scale technology and large-scale research or decentralization. - Energy utilization and energy waste. - Nuclear energy and alternatives. - Sense and nonsense of detailed future planning. In the end no one has convinced the other. The reader however finds a lot of new incentives in the letters - printed in unabridged form - a lot of new and significant arguments for a discussion which has only just started. (orig.) [de
The 21st IEEE International Workshop on Machine Learning for Signal Processing will be held in Beijing, China, on September 18–21, 2011. The workshop series is the major annual technical event of the IEEE Signal Processing Society's Technical Committee on Machine Learning for Signal Processing...
These proceedings contains refereed papers presented at the Fifteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP’2005), held in Mystic, Connecticut, USA, September 28-30, 2005. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP) organized...... by the NNSP Technical Committee of the IEEE Signal Processing Society. The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized...... by the Machine Learning for Signal Processing Technical Committee with sponsorship of the IEEE Signal Processing Society. Following the practice started two years ago, the bound volume of the proceedings is going to be published by IEEE following the Workshop, and we are pleased to offer to conference attendees...
Elian Iwi Afifah; Triyono Triyono; Yuliati Hotifah
Abstract: Communication skills are the most important things for teenagers. There is a leaning that the teenagers who have low communication skills can be called as someone who is introvert personality. People who are introvert personality tend to be difficult to communicate and express verbally. The purpose of developing letter sharing media is to improve communication skills of introvert student. This research is development research by adopting Borg and Gall research model. The development...
Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)
In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.
Sklavos, N.; Selimis, G.; Koufopavlou, O.
The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.
Sklavos, N; Selimis, G; Koufopavlou, O
The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given
Masood, Syed Haani
In this paper we compare the packet error rate (PER) and maximum throughput of IEEE 802.11n and IEEE 802.11g under interference from IEEE 802.15.4 by using MATLAB to simulate the IEEE PHY for 802.11n and 802.11g networks.
In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump\\'s effectiveness. The winning entry split analysis of the pump into three parts based on the pump\\'s functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/ oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump. © 2012 IEEE.
communication protocol should be energy efficient. The IEEE 802.15.4 is designed as a standard protocol for low power, low data rate, low complexity, and short range connections in WPANs. The standard supports allocating several numbers of collision-free guarantee time slots (GTSs within a superframe for some time-critical transmissions. Recently, COPE was proposed as a promising network coding architecture to essentially improve the throughput of wireless networks. In this paper, we exploit the network coding technique at coordinators to improve energy efficiency of the WPAN. Some related practical issues, such as GTS allocation and multicast, are also discussed in order to exploit the network coding opportunities efficiently. Since the coding opportunities are mostly exploited, our proposal achieves both higher energy efficiency and throughput performance than the original IEEE 802.15.4.
Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton
Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.
Shin, Soo Young; Woo, Dong Hyuk; Lee, Jong Wook; Park, Hong Seong; Kwon, Wook Hyun
In this paper, a coexistence mechanism between IEEE 802.15.4 and IEEE 802.11b, Active Channel Reservation for cOexiStence (ACROS), is proposed. The key idea underlining ACROS is to reserve the channel for IEEE 802.15.4 transmission, where IEEE 802.11 transmissions are forbidden. The request-to-send (RTS)/clear-to send (CTS) mechanism within IEEE 802.11 is used to reserve a channel. The proposed ACROS mechanism is implemented into a PC based prototype. The embedded version of ACROS is also developed to mitigate the timing drift problem in the PC-based ACROS. The efficiency of ACROS is shown using the throughput and packet error rate achieved in actual experiments.
Lander, Dorothy A; Graham-Pole, John R
This article explores the art of letter-writing, specifically to our beloved dead, as a form of autoethnographic research, pedagogy, and care work. As university teachers and qualitative researchers in palliative and end-of-life care, we review the literature and history of epistolary communications with the deceased, as a prelude to writing our own letters. John writes to his long-dead mother and Dorothy to her recently deceased spouse Patrick, each letter followed by a reflective dialogue between us. Through this dialogue, we highlight the potential application of this art, or handcraft, to formal and informal palliative care, and the implications for practice, pedagogy, policy, and research. We propose that such direct, non-mediated, communications can offer a valuable form of healing for bereaved people. The therapeutic potential of letter writing and the abundance of literary and popular culture exemplars of responses from the dead are also largely unexplored in death education and research.
Newman, Terry H.; Bizzarri, Sarah A.
An important part of student success in school is the involvement of families. However, the communication between students and families regarding school is often sparse at best and caregivers can feel left out as to what is happening. Friday letters improve communication between students and families and also provide a myriad of instructional…
For anyone who wants to communicate effectively in business, this is your complete reference guide for any form of written communication. Packed with over 500 sample documents, over 100 tips for better business writing and useful templates you can apply to your writing immediately, Model Business Letters will help you put the key rules of good business writing into action.
The present collection of letters from JINR, Dubna, contains eight separate records on the role of the complanar emission of particles in nuclear interaction for E 0 >10 16 eV detected in the stratosphere, 10 B nucleus fragment yields, nuclear teleportation (proposal for an experiment), invisible 'glue' bosons in model field theory, calculation of the ionization differential effective cross sections in fast ion-atom collisions, interactions of ultracold neutrons near surface of solids, g factors as a probe for high-spin structure of neutron-rich Dy isotopes, search for periodicities in experimental data by the autoregressive model methods
The present collection of letters from JINR, Dubna, contains eight separate records on the interaction of high energy Λ 6 He hypernuclear beams with atomic nuclei, the position-sensitive detector of a high spatial resolution on the basis of a multiwire gas electron multiplier, pseudorapidity hadron density at the LHC energy, high precision laser control of the ATLAS tile-calorimeter module mass production at JINR, a new approach to ECG's features recognition involving neural network, subcriticity of a uranium target enriched in 235 U, beam space charge effects in high-current cyclotron injector CI-5, a homogeneous static gravitational field and the principle of equivalence
The present collection of letters from JINR, Dubna, contains seven separate records on kinematic separation and mass analysis of heavy recoiling nuclei, dynamical effects prior to heavy ion fusion, VACTIV-DELPHI graphical dialog based program for the analysis of gamma-ray spectra, irradiation of nuclear emulsions in relativistic beams of 6 He and 3 H nuclei, optical and structural investigations of PLZT x/65/35 (x = 4, 8 %) ferroelectric ceramics irradiated by a high-current pulsed electron beam, the oscillating charge and first evidence for neutrinoless double beta decay
The present collection of letters from JINR, Dubna, contains seven separate records on physics from extra dimensions, new physics in the new millennium with GENIUS: double beta decay, dark matter, solar neutrinos, the (μ - , e + ) conversion in nuclei mediated by light Majorana neutrinos, exotic muon-to-positron conversion in nuclei: partial transition sum evaluation by using shell model, solar neutrino problem accounting for self consistent magnetohydrodynamics solution for solar magnetic fields, first neutrino observations from the Sudbury neutrino observatory and status report on BOREXINO and results of the muon-background measurements at CERN
The present collection of letters from JINR, Dubna, contains eight separate records on quantum field theory and symmetries in nuclear physics, multifractal analysis of AFM images of Nb thin film surfaces, the fast-acting memory for multichannel converters of time to digital, an analysis of the anomalous Cherenkov radiation obtained in the relativistic lead ion beam at CERN SPS, the problem of consistency of the thermal-spike model with experimentally determined electron temperature, ATLAS calorimeter performance for charged pion as well as on collective flow in multifragmentation induced by relativistic helium and carbon ions variation of the coulomb repulsion in multifragmentation
The present collection of letters from JINR, Dubna, contains six separate records on the DELPHI experiment at LEP, the Fermi-surface dynamics of rotating nuclei, production of large samples of the silica dioxide aerogel in the 37-litre autoclave and test of its optical properties, preliminary radiation resource results on scintillating fibers, a new algorithm for the direct transformation method of time to digital with the high time resolution and development and design of analogue read-out electronics for HADES drift chamber system
Thursday 5 November was another major milestone en route to the establishment of the experimental programme for CERN's LHC protonproton collider to be built in the 27- kilometre LEP tunnel. After initial discussions of 'Expressions of Interest' at the specially arranged meeting at Evian-les-Bains, France, earlier this year (May, page 1), three Letters of Intent have emerged, together involving nearly 2000 physicists from research institutes all over the world. As well as these researchers listed on the documents, the plans in fact involve many additional technical specialists who work behind the scenes. It was a historic moment as these three detector proposals were aired at the first open meeting of the new LHC Experiments Committee. CERN's main auditorium and a large overflow room receiving relayed video pictures were both packed. From these three schemes - ATLAS, CMS and L3P - and the first reactions to their letters of intent, eventually two projects will emerge, for which full technical proposals will be prepared, including construction plans and credible costings
Dejan Milan Tepšić
Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of
The purpose of this paper is to recommend regulatory guidance for reviewers examining computer communication systems used in nuclear power plants. The recommendations cover three areas important to these communications systems: system design, communication protocols, and communication media. The first area, system design, considers three aspects of system design--questions about architecture, specific risky design elements or omissions to look for in designs being reviewed, and recommendations for multiplexed data communication systems used in safety systems. The second area reviews pertinent aspects of communication protocol design and makes recommendations for newly designed protocols or the selection of existing protocols for safety system, information display, and non-safety control system use. The third area covers communication media selection, which differs significantly from traditional wire and cable. The recommendations for communication media extend or enhance the concerns of published IEEE standards about three subjects: data rate, imported hazards and maintainability
Wijk, van J.J.; North, S.; Shen, H.-W.
This article looks briefly at four articles based on papers from the 2010 IEEE Pacific Visualization Symposium. These articles, which strongly focus on visual design and applications, cover a range of applications in scientific visualization, information visualization, and graph visualization,
Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Serrano, Luis; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José
The ISO/IEEE 11073 (x73) family of standards is a reference frame for medical device interoperability. A draft for an ECG device specialization (ISO/IEEE 11073-10406-d02) has already been presented to the Personal Health Device (PHD) Working Group, and the Standard Communications Protocol for Computer-Assisted ElectroCardioGraphy (SCP-ECG) Standard for short-term diagnostic ECGs (EN1064:2005+A1:2007) has recently been approved as part of the x73 family (ISO 11073-91064:2009). These factors suggest the coordinated use of these two standards in foreseeable telecardiology environments, and hence the need to harmonize them. Such harmonization is the subject of this paper. Thus, a mapping of the mandatory attributes defined in the second draft of the ISO/IEEE 11073-10406-d02 and the minimum SCP-ECG fields is presented, and various other capabilities of the SCP-ECG Standard (such as the messaging part) are also analyzed from an x73-PHD point of view. As a result, this paper addresses and analyzes the implications of some inconsistencies in the coordinated use of these two standards. Finally, a proof-of-concept implementation of the draft x73-PHD ECG device specialization is presented, along with the conversion from x73-PHD to SCP-ECG. This paper, therefore, provides recommendations for future implementations of telecardiology systems that are compliant with both x73-PHD and SCP-ECG.
Full Text Available Abstract Background Written correspondence is one of the most important forms of communication between health care providers, yet there is little feedback provided to specialists. The objective of this study was to determine the feasibility and satisfaction of a peer assessment program on consultation letters and to determine inter-rater reliability between family physicians and specialists. Methods A rating scale of nine 5-point Likert scale items including specific content, style items, education value of the letter and an overall rating was developed from a previous validated tool. Nine Internal Medicine specialists/subspecialists from two tertiary care centres submitted 10 letters with patient and physician identifiers removed. Two Internal Medicine specialists, and 2 family physicians from the other centre rated each letter (to protect writer anonymity. A satisfaction survey was sent to each writer and rater after collation of the results. A follow-up survey was sent 6–8 months later. Results There was a high degree of satisfaction with the process and feedback. The rating scale information was felt to be useful and appropriate for evaluating the quality of consultation letters by 6/7 writers. 5/7 seven writers felt that the feedback they received resulted in immediate changes to their letters. Six months later, 6/9 writers indicated they had maintained changes in their letters. Raters rank ordered letters similarly (Cronbach's alpha 0.57–0.84 but mean scores were highly variant. At site 1 there were significant differences in scoring brevity (p Conclusion Most participants found peer assessment of letters feasible and beneficial and longstanding changes occurred in some individuals. Family physicians and specialists appear to have different expectations on some items. Further studies on reliability and validity, with a larger sample, are required before high stakes professional assessments include consultation letters.
The present collection of letters from JINR, Dubna, contains nine separate records on the new results on simulation of the nuclotron beam extraction with a bent crystal, the Ehrenfest force in inhomogeneous magnetic field, the e/h ratio of the electromagnetic calorimeter, a new approach to develop hadronic event generators in HEP, an algebraic description of multilayer systems with resonances, a high-voltage module for photomultipliers, an estimation of the spin-flip contribution to the np→pn process from the charge exchange reaction on the deuteron, a measurement of the tensor analyzing powers in the dd→ 3 Hp reactions at RIKEN as well as on calibration of SPES4-π set-up in experiments on SATURNE-II
The present collection of letters from JINR, Dubna, contains ten separate records on the monochromatic neutrinos from massive fourth generation neutrino annihilation in the Sun and Earth, solar neutrino results from SAGE, the present and future oscillation experiments at reactors, as well as on the possibilities to test the LSND parameters at reactors, the energy spectrum of reactor antineutrinos and searches for new physics (recent developments), angular distribution of radiative gamma quanta in radiative beta decay of neutrons, an 37 Ar based neutrino source for calibration of the iodine solar neutrino detector, detector LENS as a new tool for solar neutrino spectroscopy, limits on different Majoron decay modes of 100 Mo, 116 Cd, 82 Se, and 96 Zr for neutrinoless double beta decays in the NEMO-2 experiment as well as on the search for 76 Ge and 150 Nd double beta decay to excited states
The present collection of letters from JINR, Dubna, contains ten separate records on Wien filter using in exploring on low-energy radioactive nuclei, memory effects in dissipative nucleus-nucleus collision, topological charge and topological susceptibility in connection with translation and gauge invariance, solutions of the multitime Dirac equation, the maximum entropy technique. System's statistical description, the charged conductor inside dielectric. Solution of boundary condition by means of auxiliary charges and the method of linear algebraic equations, optical constants of the TGS single crystal irradiated by power pulsed electron beam, interatomic pair potential and n-e amplitude from slow neutron scattering by noble gases, the two-coordinate multiwire proportional chamber of the high spatial resolution and neutron drip line in the region of O-Mg isotopes
The present collection of letters from JINR, Dubna, contains seven separate records on the integral representation for structure functions and target mass effects, multiscale properties of DNA primary structure including cross-scale correlations, dissipative evolution of the elementary act, the fine structure of the M T =1 Gamow-Teller resonance in 147g Tb→ 147 Gd β + /EC decay, the behaviour of the TVO temperature sensors in the magnetic fields, a fast method for searching for tracks in multilayer drift chambers of HADES spectrometer, a novel approach to particle track etching including surfactant enhanced control of pore morphology, azimuthal correlations of secondary particles in 32 S induced interactions with Ag(Br) nuclei at 4.5 GeV/ c/ nucleon
The present collection of letters from JINR, Dubna, contains eight separate records on status of 116 Cd double β decay study with 116 CdWO 4 scintillators, new limits on 2β processes in 40 Ca and 46 Ca by using low radioactive CaF 2 (Eu) crystal scintillators, the single state dominance in 2νββ-decay transitions to excited 0 + and 2 + final states, present status of the MONOLITH project, technique of neutrino-induced muon detection on the Earth surface, high-sensitive spectrometer of fast neutrons and the results of fast neutron background flux measurements at the gallium-germanium solar neutrino experiment (SAGE), new experimental limits on the electron stability and excitation of nuclear levels in 23 Na, 127 I and 129 Xe induced by the electron decay on the atomic shell and element-loaded organic scintillators for neutron and neutrino physics
This 360 page softbound publication includes the following major sections. An invitation to ICOPS'97, Catamaran Resort Hotel Floor Pinas, Officers of the IEEE Nuclear and Plasma Sciences Society, Conference Information...
Full Text Available This study explored whether there is a gender difference in letter-sound knowledge when children start at school. 485 children aged 5–6 years completed assessment of letter-sound knowledge, i.e., large letters; sound of large letters; small letters; sound of small letters. The findings indicate a significant difference between girls and boys in all four factors tested in this study in favor of the girls. There are still no clear explanations to the basis of a presumed gender difference in letter-sound knowledge. That the findings have origin in neuro-biological factors cannot be excluded, however, the fact that girls probably have been exposed to more language experience/stimulation compared to boys, lends support to explanations derived from environmental aspects.
Full Text Available In the most general sense, lettering is the art of drawing letters, in which the letter forms carry illustrtive features. In this research which is titled "An Analysis on Legibility in Letterings Used in Print Advertisements", letterings used in and specially designed for print ads are analysed and their contribution to the ads are examined. Legibility, which is the fundamental function of writing and typography is examined in the field of lettering that has an illustrative approach. Also, the article puts emphasis on the technique and form’s contribution on content in letterings. Keywords: Lettering, print advertisements, letter design, illustration, legibility.
Seyed Davoud Mousavi
Full Text Available Cooperative communication techniques have recently enabled wireless technologies to overcome their challenges. The main objective of these techniques is to improve resource allocation. In this paper, we propose a new protocol in medium access control (MAC of the IEEE 802.11 standard. In our new protocol, which is called Fair Cooperative MAC (FC-MAC, every relay node participates in cooperation proportionally to its provided cooperation gain. This technique improves network resource allocation by exploiting the potential capacity of all relay candidates. Simulation results demonstrate that the FC-MAC protocol presents better performance in terms of throughput, fairness, and network lifetime.
Full Text Available Wireless network uses transmission media based on radio waves. This type of networks is mainly useddue to its efficiency and mobility in data exchanging. This paper reports the modeling and simulation of wirelessnetworks based on Cisco Aironet 1130ag access point devices with IEEE 802.11a and IEEE 802.11g standards. Themodeling and simulation are performed using network simulator version 2 (NS-2 that is installed on operationsystem Linux Ubuntu v.10.10. The NS-2 is commonly used and works well in numerous types of network simulation. From simulation, we obtain quality of service parameters by employing several simulation scenarios in terms ofnumber of nodes, distances, and packet data sizes. It can be concluded from simulation results that the IEEE 802.11gnetworks transfer data with better quality than those of IEEE 802.11a networks. Furthermore, the IEEE 802.11gnetworks provide a higher throughput, with smaller amount of delay and packet loss percentage compared to thoseof IEEE 802.11a networks.
Hamilton, C W
Pharmacists frequently write letters but lack specific training on how to do it well. This review summarizes strategies for improving business correspondence, emphasizes basic writing guidelines, and offers practical advice for pharmacists. The first steps for effective communication are careful planning and identifying the main message to be conveyed. The purpose for writing should be stated in the opening paragraph of the letter. To ensure a successful outcome, actions needed should be clearly summarized and visually highlighted. The tone of the letter should reflect a reasonable speech pattern, not the cryptic writing found in many scientific papers. The layout of the letter should be inviting, which is readily achievable through judicious use of word processing. Many delivery options are available, such as traditional postal services, express mail, and facsimile transmission. Readers are encouraged to test these basic writing principles and decide for themselves whether these recommendations affect the success of business correspondence.
Mueller, Luke A; Sharma, Arjun; Ottenberg, Abigale L; Mueller, Paul S
In 2006, the Heart Rhythm Society (HRS) recommended that cardiovascular implantable electronic device (CIED) manufacturers use advisory notification letters to communicate with affected patients. To evaluate the readability of the HRS sample "patient device advisory notification" letter and those created by 1 CIED manufacturer. The HRS sample letter and 25 Boston Scientific Corporation letters dated from 2005 through 2011 were evaluated by using 6 readability tests. Readability (Flesch-Kincaid score) of the HRS sample letter was grade level 12.5, and median readability of the device manufacturer letters was grade level 12.8 (range 10.8-18.9). Similar results were obtained by using other readability scales. No letters had readability scores at the National Work Group on Literacy and Health's recommended reading level-fifth grade; the letters' readability exceeded this recommended level by an average of 7.7 grades (95% confidence interval 6.9-8.5; Preadability scores at the average reading level of US adults-eighth grade; the letters' readability exceeded this level by an average of 4.7 grades (95% confidence interval 3.9-5.5; Preadability of the HRS sample letter and those created by a CIED manufacturer significantly exceeded the recommended and average US adults' reading skill levels. Such letters are unlikely to be informative to many patients. CIED manufacturers should ensure that advisory letters are comprehensible to most affected patients. Copyright © 2013 Heart Rhythm Society. Published by Elsevier Inc. All rights reserved.
This revision of IEEE Std 101-1972 describes statistical analyses for data from thermally accelerated aging tests. It explains the basis and use of statistical calculations for an engineer or scientist. Accelerated test procedures usually call for a number of specimens to be aged at each of several temperatures appreciably above normal operating temperatures. High temperatures are chosen to produce specimen failures (according to specified failure criteria) in typically one week to one year. The test objective is to determine the dependence of median life on temperature from the data, and to estimate, by extrapolation, the median life to be expected at service temperature. This guide presents methods for analyzing such data and for comparing test data on different materials
Nazabal, Juan Antonio; Falcone, Francisco; Fernández-Valdivielso, Carlos; Matías, Ignacio Raúl
The use of Vehicular Ad-Hoc Networks (VANETs) is growing nowadays and it includes both roadside-to-vehicle communication (RVC) and inter-vehicle communication (IVC). The purpose of VANETs is to exchange useful information between vehicles and the roadside infrastructures for making an intelligent use of them. There are several possible applications for this technology like: emergency warning system for vehicles, cooperative adaptive cruise control or collision avoidance, among others. The objective of this work is to develop a VANET prototype system for urban environments using IEEE 802.15.4 compliant devices. Simulation-based values of the estimated signal strength and radio link quality values are obtained and compared with measurements in outdoor conditions to validate an implemented VANET system. The results confirm the possibility of implementing low cost vehicular communication networks operating at moderate vehicular speeds.
Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
Full Text Available We bring to attention of specialists an undated letter of Ottoman ruler Mehmed II Fatih to the Great Horde khan Ahmad from the collection of famous collector of Ottoman charters Feridun-bey [1, S. 289]. The addressee is the famous ruler of the Great Horde, khan Ahmad. Daulat Khan mentioned in the letter is Nur-Davlet. He was connected with khan Ahmad, and, as indicated by the letter, he had also set in close contact with the Ottomans whose ruler openly declares in a letter that “our sight of benevolence and patronage is directed toward him”. Thereby the Sultan made it clear to the “principal” Tatar khan Akhmad that Nur-Davlet was under the patronage of the Ottoman Empire. Considering the period of activity of Nur-Davlet in Crimea, presumably the letter was written in 1477. Famous researcher of the Crimean Khanate V.D. Smirnov had already examined the letter and the question of why Ahmad Khan was named the Crimean khan in the title of the letter [2, p. 221–222].
cause of OHCA, particularly among elderly and coronary vasospasm as a considerable ... 88% of the cardiac arrests occur at home.4 The survival rate varies between 6.7% and 8.4% and ... In the era of communication revolution, smart phone.
In the last few years the IEEE 802.3 committee has developed fiber optics inter-repeater link standard called FOIRL. This standard defines the "Fiber Optics Media Access Unit" (FOMAU) which is used to connect two IEEE 802.3 repeaters that are up to 1Km apart. The IEEE 802.3 lOBaseF task force is currently standardizing a full F/O system in two directions: passive and active. The active approach is a compromise between the FOIRL (Asynchronous) approach and the Synchronous approach. As a result of this activity the IEEE 802.3 standard will define three different F/O interfaces and several devices that will not inter-operate. Such a standard will lower the credibility among the IEEE 802.3 user community, as customers will be confused amidst the many chapters and devices with no clear choice. This paper describes a method that can reduce the number of standards to two (passive and active), while proposing a solution for all the requirements of 802.3 F/O LAN. (The question of passive vs active approach will be discussed in this paper).
Gabriella Del Lungo Camiciotti
Full Text Available The recently renewed scholarly interest in historical letters and letter writing has given rise to several studies which explore the culture of epistolarity from different perspectives. The article offers an introduction to recent scholarship on epistolary discourse and practices in early modern culture. Given the importance of letters as data for several types of diachronic investigation, the article focuses on three points that are crucial for an understanding of the relevance of epistolary discourse itself in early modern European culture. Firstly, letters are invaluable data for historical linguistics, to which they provide information for the history of languages, and sociohistorical and sociolinguistic research. A second recent field of investigation considers letters as documents and material items; the results of research in this area have contributed to the reconstruction of official relationships and information exchanges in past cultures and shed light on social interaction. A third, more traditional area of study, deals with the letter as a form that has given rise to many different genres across the centuries, both practical and literary.
Waldman, Anne; Becker, Robin
Presents words of encouragement to a young poet. Includes empathetic words and motivating ideas. Presents a letter including a quote from "Tintern Abbey" by William Wordsworth and ideas about that quote. (SG)
Scientific Letter: Monosymptomatic Hypochondriacal Psychosis (somatic delusional disorder): A report of two cases. ... African Journal of Psychiatry. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives.
Dougherty, E.M. Jr.
The Institute of Electrical and Electronics Engineers (IEEE) working group 7.4 of the Human Factors and Control Facilities Subcommittee of the Nuclear Power Engineering Committee (NPEC) has released its fifth draft of a Guide for General Principles of Human Action Reliability Analysis for Nuclear Power Generating Stations, for approval of NPEC. A guide is the least mandating in the IEEE hierarchy of standards. The purpose is to enhance the performance of an human reliability analysis (HRA) as a part of a probabilistic risk assessment (PRA), to assure reproducible results, and to standardize documentation. The guide does not recommend or even discuss specific techniques, which are too rapidly evolving today. Considerable maturation in the analysis of human reliability in a PRA context has taken place in recent years. The IEEE guide on this subject is an initial step toward bringing HRA out of the research and development arena into the toolbox of standard engineering practices
This article describes a contrastive study on rhetorical differences between Italian and English sales promotion letters. It is assumed that cultural differences affect discourse genres traditionally considered as standardized, ritual or even formulaic, written business communication being a case in point. It was our goal to investigate how…
Evaluation of medical consultation letters at King Fahd Hospital, Al Hufuf, Saudi Arabia. Hamed Abd Allah Al Wadaani, Magdy Hassan Balaha. Abstract. Background: In surgical wards, it is of paramount importance to communicate with other health care providers, mostly physicians, referring patients to them for their ...
Germán A. Prieto
Full Text Available Letter from the editor Our first issue of 2018 is available now. We have 9 articles in this issue, in topics ranging from soil characterization, petrophysical properties of rocks, signal processing of images and GNSS station to asteroid impact effects. Mechanical soil properties in sandy-pebble soil are studied as a function of grain size content in Lu et al. Satellite-derived soil moisture estimation is discussed in Thanabalan and Vidhya, based on a semi-empirical approach and backscattering images. Macroscopic mechanical characteristics of rocks depend on a number of factors, including microstructure damage. Under changing temperature conditions (freeze-thaw rock samples studied by Jiang show significant strength decrease, which has important consequences in engineering. Advanced signal processing methods are used in Zeng et al. for image retrieval applied to remote sensing data, using a Bayesian network approach. Similarly, Oktar and Erdogan use linear trend and wavelet analysis to continuous GNSS data showing both displacements due to tectonic as well as atmospheric and hydrologic effects. Debris flows can in some cases become serious hazards because they can block river flow as a debris flow dam. Chen et al. propose a method to identify the formation of such dams, with an example from the Er river in Taiwan. Mamaseni et al. study the petrophysical properties of three formations in the Duhok Basin, northern Iran, based on well-log data. Results suggest a significant thickness with good moveable hydrocarbons in the study area. Methane adsorption and gas content are strongly influenced by shale composition. Zhu et al. show that Total Organic Content has a stronger influence on methane adsorption and gas content than the mineral composition, studying samples from the southern Sichuan Basin. Our last contribution in this issue discussed a large asteroid impact in eastern Colombia. The impact would have affected the environment and landscape, but
Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The award was presented by the deputy programme chair Vince Cianciolo (left) at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November.
The purpose of the present study is to find out the features of English business letters. Halliday's systemic functional linguistics is used as the theoretical framework, mainly, interpersonal fucntion. The English business letter (EBL) is an important written text used for international business communication and it has its own features of text.…
Hildebrandt, Herbert W.
Describes how letter writing, especially business letters, was influenced by Greek and Roman oral rhetoricians. Discusses three precepts of oral rhetoric--inventio, dispositio, and style--and notes that the classical theories' reflection in written communication can be seen in selected Italian, German, and English epistolographic works. (MM)
Discusses the way in which letters sent to Thomas Edison following the report that he had solved the problem of incandescent lighting reveal the many discursive worlds that Edison's work touched. Claims these letters indicate how a technological accomplishment is also a multiple, complex social, and communicative accomplishment, creating place and…
Full Text Available Kurt G NaberTechnical University of Munich, Munich, GermanyMinardi et al1 have described well-established risk factors for recurrent urinary tract infection (UTI and have emphasized the importance of a clear communication with the patient in order to find out behavior at risk, channel right hygiene recommendations, and suggest necessary changes in life habits to prevent acute UTI episodes. There is general agreement that behavioral modifications and counseling should be attempted first to reduce the rate of acute UTI episodes and their associated discomfort.
Chiodo, Beverly A.; Hatcher, Barbara A.
The authors discuss how to write an effective, persuasive letter to an elected official. They encourage business communications instructors to promote letter writing to their students as a means of political activism. (CH)
Describes a teamwork approach in which business communications students handwrite letters to be prepared by typewriting students; the letters are then revised and graded by the respective teachers. Both sets of students benefit from this simulated office experience. (SK)
This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in IEEE Std 344-1987. To define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general, they are (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay that constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new application, then proof testing must be performed for that new case
This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in ANSI/IEEE Std 344-1975, Recommended Practices for Seismic Qualification of Class 1E Equipment for Nuclear Power Generating Stations. In order to define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general they are: (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay which constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new case
This book introduces students and practicing engineers to all the components of writing in the workplace. It teaches readers how considerations of audience and purpose govern the structure of their documents within particular work settings. The IEEE Guide to Writing in the Engineering and Technical Fields is broken up into two sections: "Writing in Engineering Organizations" and "What Can You Do With Writing?" The first section helps readers approach their writing in a logical and persuasive way as well as analyze their purpose for writing. The second section demonstrates how to distinguish rhetorical situations and the generic forms to inform, train, persuade, and collaborate. The emergence of the global workplace has brought with it an increasingly important role for effective technical communication. Engineers more often need to work in cross-functional teams with people in different disciplines, in different countries, and in different parts of the world. Engineers must know how to communicate in a rapid...
Pedro, Cassandra; Lousada, Marisa; Pereira, Rita; Hall, Andreia; Jesus, Luis M T
There is a need to develop letter knowledge assessment tools to characterise the letter knowledge in Portuguese pre-schoolers and to compare it with pre-schoolers from other countries, but there are no tools for this purpose in Portugal. The aim of this paper is to describe the development and validation procedures of the Prova de Avaliação de Competências de Pré-Literacia (PACPL), which assesses letter knowledge. This study includes data that has been gathered in two phases: pilot and main study. In the pilot study, an expert panel of six speech and language pathologists analysed the instrument. Children (n = 216) aged 5;0-7;11 participated in the main study that reports data related to the psychometric characteristics of the PACPL. Content validity, internal consistency, reliability and contributing factors to performance were examined statistically. A modified Bland-Altman method revealed good agreement amongst evaluators. The main study showed that the PACPL has a very good internal consistency and high inter-rater (96.2% of agreement and a Cohen's k value of 0.92) and intra-rater (95.6% of agreement and a Cohen's k value of 0.91) agreement. Construct validity of the PCAPL was also assured (Cronbach's α of 0.982). Significant differences were found between age groups with children increasing their letter knowledge with age. In addition, they were better at identifying than at producing both letter names and letter sounds. The PACPL is a valid and reliable instrument to assess letter knowledge in Portuguese children.
Full Text Available Recently intervehicle communications are attracting much attention from industry and academia. Upcoming standard for intervehicle communication IEEE 802.11p, known as Wireless Access in Vehicular Environments (WAVE, is still in its draft stage, but already coming into final standardization phase. Problematic, regarding mobile WAVE nodes, are described in several articles, simulations prepared and experiments done. But most of these works do not consider possible maximal communication load. This paper presents intervehicle communication scenario in respect to radio communications, mobility and other aspects of vehicular environments.Article in English
I am entering the fourth year as the Editor in Chief of the IEEE TRANSACTIONS ON POWER ELECTRONICS. A position like this becomes more and more important for the technical field as publishing in a peer-reviewed highly ranked journal has influence on the industrial and academic career. It is a way...
Contacts Researchers News & Events Event Calendar Annual Program Review Research Seminars Press Room Event Archives ARC Researchers at the IEEE 2015 Vehicle Power and Propulsion Conference (October 19-22 Ballroom B P-SS4-2 Comparison of SOFC and PEM Fuel Cell Hybrid Power Management Strategies for Mobile
Altintas, O.; Chen, W.; Heijenk, Geert; Dressler, F.; Ekici, E.; Kargl, Frank; Shigeno, H.; Dietzel, Stefan
Foreword For the first time in its history, IEEE VNC has included this year’s demonstrations in its program. Demonstrations play an important role to expose the research community to practical aspects of research and to foster cross-fertilization among researchers both in academia and in industry.
Home; public; Volumes; reso; 021; 01; 0011-0030.Data Representation amp Computer Arithmetic6 IEEE Standard Double Precision FormatIn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.
disaster response, e-health, and industrial communications, 5G .... outdoors. Installed by cellular operator mainly to increase coverage to areas where signal ..... An Overview of Massive Mimo: Benefits and Challenges, IEEE Journal of Se-.
Madueño, Germán Corrales; Stefanovic, Cedomir; Popovski, Petar
IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M...... reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably...
Kim, J. S.; Jung, S. C.; Kim, T. R.
IEEE Standard for Qualifying Class 1E Equipment has been updated to 2003 edition since the issue of IEEE Std 323-1971, 1974, 1983. NRC approved the IEEE Std 323-1974 as Qualification standard of Class 1E Equipment in domestic nuclear power plant. IEEE Std 323-2003 was issued in September of 2003 and utility is waiting the approval of NRC. IEEE Std 323-2003 suggest a new qualification technique which adopts the condition monitoring. Performance of two transient during DBA test is no longer recommended in IEEE Std 323-2003. IEEE323 Std 2003 included a chapter of ''extension of Qualified life'' to make available the life extension of components during plant life extension. For the efficient control of preserving EQ in domestic nuclear power plant, IEEE323 Std 2003 is strongly recommended
Full Text Available IEEE 802.11 Wi-Fi networks are increasingly becoming popular for its use in industrial applications. With the availability of recent amendments to IEEE 802.11 series of standards, particularly IEEE 802.11n, the adoption of Wi-Fi networks for process automation is gaining more focus and importance. The installation of Wireless networks naturally provides reduction in cable and its maintenance related costs, provides increased flexibility and mobility to enhance performance of industrial control system. The IEEE 802.11n supports parameterization that can be set for particular industrial applications and hence it has addressed to the aspects of timeliness and criticality to some extent. This paper proposes the use of IEEE 802.11n network to interconnect field instruments with Siemens PLC controller in harsh EMI/EMC environment. An application example is shown where the alternate control system architecture is developed in which non-critical and non-safety signals are communicated over Wi-Fi. While, for critical and safety signals, traditional hardwired signals methods can be implemented.
Pelegris, P; Banitsas, K
Recent advancements in wireless communications technologies bring us one step closer to provide reliable Telecare services as an alternative to patients staying in a hospital mainly for monitoring purposes. In this research we investigate the efficiency of IEEE 802.15.4 in a simple scenario where a patient is being monitored using an ECG and a blood analysis module. This approach binds well with assisted living solutions, by sharing the network infrastructure for both monitoring and control while taking advantage of the low power features of the protocol. Such applications are becoming more and more realistic to implement as IEEE 802.15.4 compatible hardware becomes increasingly available. Our aim is to examine the impact of Beacon and Superframe Order in the medium access delay, dropped packets, end to end delay, average retransmission attempts and consumed power focusing on this bandwidth demanding situation where the network load does not allow low duty cycles, in order to draw some conclusions on the effect that this will have to telemonitoring applications.
Full Text Available Multimedia communications have experienced an unprecedented growth due mainly to the increase in the content quality and the emergence of smart devices. The demand for these contents is tending towards wireless technologies. However, these transmissions are quite sensitive to network delays. Therefore, ensuring an optimum QoS level becomes of great importance. The IEEE 802.11e amendment was released to address the lack of QoS capabilities in the original IEEE 802.11 standard. Accordingly, the Enhanced Distributed Channel Access (EDCA function was introduced, allowing it to differentiate traffic streams through a group of Medium Access Control (MAC parameters. Although EDCA recommends a default configuration for these parameters, it has been proved that it is not optimum in many scenarios. In this work a dynamic prediction scheme for these parameters is presented. This approach ensures an appropriate traffic differentiation while maintaining compatibility with the stations without QoS support. As the APs are the only devices that use this algorithm, no changes are required to current network cards. The results show improvements in both voice and video transmissions, as well as in the QoS level of the network that the proposal achieves with regard to EDCA.
Carlos A. Vargas J.
Full Text Available Times of change wind this year for Earth Sciences Research Journal. The hard work of the last years have resulted in a significant advance for this journal, and now we want to announce our four volumes to be published since 2016 every year. The objective of being a top-quality journal is in the North of our compass, and it will be inspiring the daily work of the people making this publication possible. Several conferences have called our journal for special issues, and we expect to fit into their requests to keep providing the users with novel contents in the earth sciences field. In this open-access issuing, there is room for all scientific papers looking for a worldwide site to publish. But not only in Earth Sciences Research Journal challenge winds are moving the kite. The petroleum market in the world is facing one of the most critical times of the history, playing on an unexpected stage where no many actors were ready for. Management of resources are in the spotlight of the political world; energy and water, as well as the environment, turned into subjects of the first line. Fracking has resulted in thousands of discussions inside and outside of the academic world. We want to encourage everyone involved in the scientific research on earth sciences to submit us their papers. Nowadays, we substantially revised every one of the works sent and pay strict attention to the review processes, reducing periods and improving experiences of authors in the editorial world. We intend to collaborate with other professional organizations interested in geology scientific communication. Find in the ESRJ a friendly hand to work with. For the volume 20, number 1, we are presenting 18 selected papers in different areas of study; original contents we hope will be of your complete usability. Comments, claims, and suggestions are always welcomed in Earth Sciences Research Journal through the mail account email@example.com. Thanks for reading and
On September 15th of 1993 the IEEE standards board approved IEEE Std. 7-4.3.2-1993, IEEE Standard for Digital Computers in Safety Systems of Nuclear Power Generating Stations. This paper is an introduction to Annex D of this document which concerns the commercial grade dedication of existing computers or new non-1E computers
This document describes the methods and requirements for qualifying switchgear assemblies for indoor areas outside of the containment in nuclear power generating stations. These assemblies include (1) metal-enclosed low-voltage power circuit breaker switchgear assemblies, as defined in ANSI/IEEE C37.20.1-1987, (2) metal-clad switchgear assemblies, as defined in ANSI/IEEE C37.20.2-1987, (3) metal-enclosed bus, as defined in ANSI/IEEE C37.23-1987, and (4) metal-enclosed interrupter switchgear assemblies, as defined in ANSI/IEEE C37.20.3-1987. The purpose of this document is to provide amplification of the general requirements of ANSI/IEEE Std 323-1983 as they apply to the specific features of Class 1E switchgear assemblies. Where differences exist between this document and ANSI/IEEE Std 323-1983, this document takes precedence insofar as switchgear assemblies are concerned
Mary Cadbury was one of six daughters in a wealthy Birmingham family, all of whom took up professional or unpaid philanthropic work. In 1873 Mary began nurse training at the Nightingale School, St Thomas's Hospital, and regularly sent letters to family and friends, which provide a graphic account of the experience of a nurse in the latter half of the nineteenth century.
Having trouble with your credit card debt? Below you will find examples of hardship letters. There are several things to consider when writing a credit card hardship letter. A hardship letter is the first step to letting the credit card company know that things are bad. This free credit card hardship letter sample is only a guide in order to start the negotiation. Credit card debt hardship letter example, hardship letter to credit card. If you are having trouble paying off your debt and need ...
These proceedings contains refereed papers presented at the sixteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP'2006), held in Maynooth, Co. Kildare, Ireland, September 6-8, 2006. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP......). The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized by the Machine Learning for Signal Processing Technical Committee...... the same standard as the printed version and facilitates the reading and searching of the papers. The field of machine learning has matured considerably in both methodology and real-world application domains and has become particularly important for solution of problems in signal processing. As reflected...
Rafael Ballabriga Suñe (right) receives the Student Paper Award. Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The NPSS established this award in 2005 to encourage outstanding student contributions and greater student participation as principle or sole authors of papers. The prizes were presented at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November. The prototype chip was designed by Ballabriga based on ideas generated within the CERN Medipix team - part of the PH Microelectronics group. It could be used in various fields in the future, including medical imaging, neutron imaging, electron microscopy, radiation monitoring and other applications in high-energy physics. The novel aspe...
Kimple, Adam J; McClurg, Stanley W; Del Signore, Anthony G; Tomoum, Mohamed O; Lin, Feng-Chang; Senior, Brent A
Historically, narrative letters of recommendation have been utilized in the selection of applicants for otolaryngology residency programs. In the last two application cycles, our specialty adopted a standardized letter of recommendation (SLOR). The intent was to decrease time burden for letter writers and to provide readers with an objective evaluation of applicants. The objective of this study was to determine attributes in the SLOR that correlate with matching into a residency program. We performed a retrospective study using SLOR, United States Medical Licensing Examination (USMLE) step 1 scores, and matched outcomes of applicants who applied to our institution for the 2013 and 2014 match cycle. We included the following variables from the SLOR in the statistical analysis to determine which ones were associated with matching: patient care, medical knowledge, communication skills, procedural skills, research, initiative and drive, commitment to otolaryngology, commitment to academic medicine, match potential, and USMLE1 scores. We identified 532 applicants and 963 SLOR. In successful applicants, scores for patient care, medical knowledge, communication skills, initiative and drive, and match potential were statistically higher (P otolaryngology, commitment to academic medicine, and USMLE step 1 scores were not higher among successfully matched applicants. Although SLOR can save time for letter writers and provide an objective description of applicants, the utility of individual domains within the SLOR is questionable. Additionally, it is concerning that applicants' professionalism and procedural skills are not correlated with matching in our specialty. NA. Laryngoscope, 126:1071-1076, 2016. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.
Watts, Iain P
This essay investigates scientific exchanges between Britain and France from 1806 to 1814, at the height of the Napoleonic Wars. It argues for a picture of scientific communication that sees letters and printed texts not as separate media worlds, but as interconnected bearers of time-critical information within a single system of intelligence gathering and experimental practice. During this period, Napoleon Bonaparte's Continental System blockade severed most links between Britain and continental Europe, yet scientific communications continued--particularly on electrochemistry, a subject of fierce rivalry between Britain and France. The essay traces these exchanges using the archive of a key go-between, the English man of science Sir Charles Blagden. The first two sections look at Blagden's letter-writing operation, reconstructing how he harnessed connections with neutral American diplomats, merchants, and the State to get scientific intelligence between London and Paris. The third section, following Blagden's words from Britain to France to America, looks at how information in letters cross-fertilized with information in print. The final section considers how letters and print were used together to solve the difficult practical problem of replicating experiments across the blockade.
Tarrant, Peter J.
This paper describes the implementation of a fiber optic inter-repeater link (FOIRL), used for connecting two remote copper segments of an IEEE 802.3 local area network. The rationale for the design, the signalling used and the collision detection mechanism is discussed. The evolution of the draft international standard for the FOIRL and the concurrence amongst various manufacturers is also presented. Finally some examples of typical applications, highlighting the ease of installation, are given.
Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David
This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educat...
Congress Centre of “Instituto Superior Técnico”, Lisboa, Portugal, 24-28 May, 2010 ABSTRACT SUBMISSION OPEN Abstract Submission Deadline: March 1st, 2010 Dear Sir/Madam, We are pleased to announce that abstract submission for the 17th IEEE NPSS Real Time Conference is now open on our web site. The deadline for submitting an abstract is 1st March 2010. Full conference details General Chairman
On Maximizing the Second Smallest Eigen- value of a State-Dependent Graph Laplacian,” IEEE Transactions on Au- tomatic Control, vol. 51, no. 1, pp...Collective Motion With Limited Communication,” IEEE Transactions on Au- tomatic Control, vol. 53, no. 3, pp. 706–719, 2008. [Online]. Available: http
Xu, Changchun; Xu, Yanyi; Liu, Gan; Liu, Kezhong
Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MAC layer. The model is applied for performance analysis of voice communications over IEEE 802.11 single-hop ad hoc networks. By using the model, we finish the performance optimization of IEEE MAC layer and obtain the maximum number of voice calls in IEEE 802.11 ad hoc networks as well as the statistical performance bounds. Furthermore, we design a fully distributed call admission control (CAC) algorithm which can provide strict statistical QoS guarantee for voice communications over IEEE 802.11 ad hoc networks. Extensive simulations indicate the accuracy of the analytical model and the CAC scheme.
Ahson, Syed A
The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wireless industry's growing need for communications professionals with practical problem-solving skills in real-world situations. Individuals who achieve this prestigious certification are recognized as possessing the required knowledge, skill, and abilities to meet wireless challenges in various industry, business, corporate, and organizational settings. Presenting contributions from 50 wireless commun
Pasolini, Gianni; Buratti, Chiara; Feltrin, Luca; Zabini, Flavio; De Castro, Cristina; Verdone, Roberto; Andrisano, Oreste
Information and Communication Technologies (ICTs), through wireless communications and the Internet of Things (IoT) paradigm, are the enabling keys for transforming traditional cities into smart cities, since they provide the core infrastructure behind public utilities and services. However, to be effective, IoT-based services could require different technologies and network topologies, even when addressing the same urban scenario. In this paper, we highlight this aspect and present two smart city testbeds developed in Italy. The first one concerns a smart infrastructure for public lighting and relies on a heterogeneous network using the IEEE 802.15.4 short-range communication technology, whereas the second one addresses smart-building applications and is based on the LoRa low-rate, long-range communication technology. The smart lighting scenario is discussed providing the technical details and the economic benefits of a large-scale (around 3000 light poles) flexible and modular implementation of a public lighting infrastructure, while the smart-building testbed is investigated, through measurement campaigns and simulations, assessing the coverage and the performance of the LoRa technology in a real urban scenario. Results show that a proper parameter setting is needed to cover large urban areas while maintaining the airtime sufficiently low to keep packet losses at satisfactory levels.
Full Text Available Information and Communication Technologies (ICTs, through wireless communications and the Internet of Things (IoT paradigm, are the enabling keys for transforming traditional cities into smart cities, since they provide the core infrastructure behind public utilities and services. However, to be effective, IoT-based services could require different technologies and network topologies, even when addressing the same urban scenario. In this paper, we highlight this aspect and present two smart city testbeds developed in Italy. The first one concerns a smart infrastructure for public lighting and relies on a heterogeneous network using the IEEE 802.15.4 short-range communication technology, whereas the second one addresses smart-building applications and is based on the LoRa low-rate, long-range communication technology. The smart lighting scenario is discussed providing the technical details and the economic benefits of a large-scale (around 3000 light poles flexible and modular implementation of a public lighting infrastructure, while the smart-building testbed is investigated, through measurement campaigns and simulations, assessing the coverage and the performance of the LoRa technology in a real urban scenario. Results show that a proper parameter setting is needed to cover large urban areas while maintaining the airtime sufficiently low to keep packet losses at satisfactory levels.
Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger
In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump's effectiveness. The winning entry split analysis of the pump into three parts based on the pump's functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump.
Cooperative schemes for critical content distribution over vehicular networks are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range communications with the base station (BS) and 802.11p is considered for inter-vehicle collaboration on the short range. A high mobility environment with correlated shadowing is adopted. Both schemes are shown to outperform non-cooperative unicasting and multicasting, respectively, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2012 IEEE.
Does the world need yet another 1/0 bus standard? If you need fast and cheap serial video communication, then the answer is yes. As technology advances, so too must data transport mechanisms advance. You can`t expect RS-232 to support real-time digital video, and if you can`t afford expensive professional serial video interfaces, (such as Sony`s Serial Digital Interface), Firewire may be a good solution. IEEE 1394, or commonly known as Firewire, is a general purpose serial bus that meets many of the 1/0 needs of today`s video and multimedia developers. For those of you who only read the first paragraph, here`s Firewire in a nutshell: It provides a guaranteed transfer rate of 10OMbps or 20OMbps of digital data (such as video direct from camera to computer), over an inexpensive, non-proprietary serial bus. Here is a list of its features.
Hussein T. Mouftah
Full Text Available Wireless networks for vehicular environments are gaining increasing importance due to their ability to provide a means for stations on the roadside and radio units on board of vehicles to communicate and share safety-related information, thus reducing the probability of accidents and increasing the efficiency of the transportation system. With this goal in mind, the IEEE is currently developing the Wireless Access in Vehicular Environments (WAVE IEEE 802.11p standard. WAVE devices use the IEEE 802.11's Enhanced Distributed Channel Access (EDCA MAC protocol to compete for the transmission medium. This work proposes an analytical tool to evaluate the performance of EDCA under the specific conditions of the so-called control channel (CCH of a WAVE environment, including the particular EDCA parameter values and the fact that all safety-critical data frames are broadcasted. The protocol is modeled using Markov chains and results related to throughput, frame-error rate, buffer occupancy and delay are obtained under different traffic-load conditions. The main analysis is performed assuming that the CCH works continuously, and then an explanation is given as to the considerations that are needed to account for the fact that activity on the CCH is intermittent.
Kumar, Vivek; Gupta, Bharat
The newly drafted IEEE 802.15.6 standard for Wireless Body Area Networks (WBAN) has been concentrating on a numerous medical and non-medical applications. Such short range wireless communication standard offers ultra-low power consumption with variable data rates from few Kbps to Mbps in, on or around the proximity of the human body. In this paper, the performance analysis of carrier sense multiple access with collision avoidance (CSMA/CA) scheme based on IEEE 802.15.6 standard in terms of throughput, reliability, clear channel assessment (CCA) failure probability, packet drop probability, and end-to-end delay has been presented. We have developed a discrete-time Markov chain (DTMC) to significantly evaluate the performances of IEEE 802.15.6 CSMA/CA under non-ideal channel condition having saturated traffic condition including node wait time and service time. We also visualize that, as soon as the payload length increases the CCA failure probability increases, which results in lower node's reliability. Also, we have calculated the end-to-end delay in order to prioritize the node wait time cause by backoff and retransmission. The user priority (UP) wise DTMC analysis has been performed to show the importance of the standard especially for medical scenario.
Xia, Feng; Li, Jie; Hao, Ruonan; Kong, Xiangjie; Gao, Ruixia
Cyber-Physical Systems (CPS) that collect, exchange, manage information, and coordinate actions are an integral part of the Smart Grid. In addition, Quality of Service (QoS) provisioning in CPS, especially in the wireless sensor/actuator networks, plays an essential role in Smart Grid applications. IEEE 802.15.4, which is one of the most widely used communication protocols in this area, still needs to be improved to meet multiple QoS requirements. This is because IEEE 802.15.4 slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) employs static parameter configuration without supporting differentiated services and network self-adaptivity. To address this issue, this paper proposes a priority-based Service Differentiated and Adaptive CSMA/CA (SDA-CSMA/CA) algorithm to provide differentiated QoS for various Smart Grid applications as well as dynamically initialize backoff exponent according to traffic conditions. Simulation results demonstrate that the proposed SDA-CSMA/CA scheme significantly outperforms the IEEE 802.15.4 slotted CSMA/CA in terms of effective data rate, packet loss rate, and average delay.
L. Taylor and D. Barney
CMS Centres, Outreach and the 7 TeV Media Event The new CMS Communications group is now established and is addressing three areas that are critical to CMS as it enters the physics operations phase: - Communications Infrastructure, including almost 50 CMS Centres Worldwide, videoconferencing systems, and CERN meeting rooms - Information systems, including the internal and external Web sites as well as the document preparation and management systems - Outreach and Education activities, including working with print, radio and TV media, visits to CMS, and exhibitions. The group has been active in many areas, with the highest priority being accorded to needs of CMS operations and preparations for the major media event planned for 7 TeV collisions. Unfortunately the CMS Centre@CERN suffered a major setback when, on 21st December, a cooling water pipe froze and burst on the floor above the CMS Centre main room. Water poured through the ceiling, flooding the floor and soaking some of the consoles, before e...
The organisation of the Open Days at the end of September was the single biggest effort of the CMS Communications Group this year. We would like to thank all volunteers for their hard work to show our Point 5 facilities and explain science and technology to the general public. During two days more than 5,000 people visited the CMS detector underground and profited from the surface activities, which included an exhibition on CMS, a workshop on superconductivity, and an activity for our younger visitors involving wooden Kapla blocks. The Communications Group took advantage of the preparations to produce new CMS posters that can be reused at other venues. Event display images have been produced not just for this occasion but also for other exhibits, education purposes, publications etc. During the Open Days, Gilles Jobin, 2012 winner of CERN Collide@CERN prize, performed his Quantum show in Point 5, with the light installation of German artist Julius von Bismarck. Image 3: CERN Open Days at CMS wel...
An open letter was published by Latin American and Caribbean women during the Special Session of the UN General Assembly on the International Conference on Population and Development. The letter generally focused on the Church¿s stand on women's reproductive rights. In particular, it questioned the Church on the following aspects of reproductive health, which include: 1) maternal death related to lack of access to reproductive health care; 2) Vatican representatives insisting that only parents can supervise their children education and health, which also lead to many cases of sexual abuse and incest; 3) women's sexual inequality and daily violence; 4) the Vatican delegation blocking the advances of contraception, sexual education, and HIV prevention; 5) problems of migrants and allocation of resources; and 6) the Church failing to recognize the capacity of young people to make decisions based on their own conscience.
John von Neuman was perhaps the most influential mathematician of the twentieth century, especially if his broad influence outside mathematics is included. Not only did he contribute to almost all branches of mathematics and created new fields, but he also changed post-World War II history with his work on the design of computers and with being a sought-after technical advisor to many figures in the U.S. military-political establishment in the 1940s and 1950s. The present volume is the first substantial collection of (previously mainly unpublished) letters written by von Neumann to colleagues, friends, government officials, and others. The letters give us a glimpse of the thinking of John von Neumann about mathematics, physics, computer science, science management, education, consulting, politics, and war. Readers of quite diverse backgrounds will find much of interest in this fascinating first-hand look at one of the towering figures of twentieth century science.
Letter and syllable dice devised for a project in rural Ecuador provide inexpensive, easily reproducible learning materials for practice in basic literary skills. Eleven wooden cubes with six letters on each cube are cast onto a surface and the player constructs words from the letters on the top side of the dice. After a word is formed and…
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Demand letters. 29.511 Section 29.511... Overpayments § 29.511 Demand letters. Except as provided in § 29.516(e), before starting collection action to recover an overpayment, the Benefits Administrator must send a demand letter that informs the debtor in...
... 7 Agriculture 15 2010-01-01 2010-01-01 false Demand letter. 3560.709 Section 3560.709 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Unauthorized Assistance § 3560.709 Demand letter. (a) If a... repayment schedule, the Agency will send the borrower a demand letter specifying: (1) The amount of...
Introduction Mobile Computing Applications Evolution of Wireless Networks and Services Summary Cellular Network Architecture UMTS Architecture Public Land Mobile Network Interfaces User Authentication Frequency Reuse Channel Assignment Location Registration and Update Handover Procedures CDMA The Move toward 3G Networks Wireless Local Area Networks IEEE 802.11 Standard IEEE 802.11b Standard (Wi-Fi) IEEE 802.11a Standard IEEE 802.11g Standard HIPERLAN/2 IEEE 802.1x Standard IEEE 802.11i Standard IEEE 802.11e Standard Security Issues IP over 802.11 WLAN Integrating 802.11 WLAN and UMTS Summary Wireless Personal Area Networks HomeRF Bluetooth Technology IEEE 802.15.3 Standard Home Area Networks Summary Wireless Sensor Networks Applications of WSNs Requirements for WSNs WSN Architecture The 802.15.4 Standard The ZigBee Protocol Power Conservation Techniques Network and Communications Configuration of Sensor Networks WSN and Emergency Response Applications Summary Mobile Ad Hoc Networks AODV DSR OLSR TBRPF Summary...
Adelin Charles Fiorato
Full Text Available A titan of artistic creation, the sculptor-painter-architect Michelangelo was also a tireless letter writer. Five hundred and eighteen of his letters have reached us, stretching from his youth to the eve of his death, but we know that many others have been lost. Written in a kind of familiar Florentine and in a style of minimalist ‘realism’ – which does not prevent the presence of either impetuous polemical flights or pages of literary indulgence – these letters deal mainly with everyday subjects: day-by-day relationships, either endearing or resentful, with his relatives, financial or property matters and, above all, the marriage problems which concerned his nephew Leonardo, the sole heir of the family. But one also discovers in them the artist’s warm feelings of friendship and love, his poetic and aesthetic exchanges, his relationships, often conflictual, with his fellow-artists and patrons as well as his reflections on old age and death. All in all, these letters represent a documentary chronicle of a Florentine bourgeois family and the technical hassle of an entrepreneur’s activity. If, on the one hand, the Carteggio does not shed light either on Michelangelo’s conception of art or the way in which he realized his works, on the other it illustrates certain latent aspects of his projects, as well as of his personality, which was at the same time melancholy and aggressive, surprisingly whole and manifold. This luxuriant correspondence presents, so to speak, a ‘genetic’ interest, since it reveals the hidden face of the brilliant conceiver and creator, of the artist and entrepreneur struggling with the obstacles whose overcoming makes creation possible.
Mendes, Dinah M
In the form of a letter, the writer communicates to Freud her appreciation for the incomparable richness and complexity of the psychoanalytic enterprise in its century-long evolution from classical, Freudian origins to new developments in theory and technique. At the same time, concern is expressed about the continuity and survival of psychoanalysis in a cultural milieu that has absorbed its once radical ideas about sexuality and unconscious motivation while resisting its viability as a method of treatment.
Davis, Colin J.; Bowers, Jeffrey S.
Dividing attention across multiple words occasionally results in misidentifications whereby letters apparently migrate between words. Previous studies have found that letter migrations preserve within-word letter position, which has been interpreted as support for position-specific letter coding. To investigate this issue, the authors used word…
Chen, M.; Hansen, C.; North, C.; Pang, A.; Wijk, van J.J.
These are the proceedings of the IEEE Visualization Conference 2007 (Vis 2007) and the IEEE Information Visualization Conference 2007 (InfoVis 2007) held during October 28 to November 1, 2007 in Sacramento, California. The power of using computing technology to create useful, effective imagery for
As an emerging short-range wireless technology, IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) are increasingly used in the fields of home control, industrial control, consumer electronics, energy management, building automation, telecom services, personal healthcare, etc. IEEE
Robins, Sarah; Treiman, Rebecca; Rosales, Nicole
Learning about letters is an important component of emergent literacy. We explored the possibility that parent speech provides information about letters, and also that children’s speech reflects their own letter knowledge. By studying conversations transcribed in CHILDES (MacWhinney, 2000) between parents and children aged one to five, we found that alphabetic order influenced use of individual letters and letter sequences. The frequency of letters in children’s books influenced parent utterances throughout the age range studied, but children’s utterances only after age two. Conversations emphasized some literacy-relevant features of letters, such as their shapes and association with words, but not letters’ sounds. Describing these patterns and how they change over the preschool years offers important insight into the home literacy environment. PMID:25598577
Wright, Scott M; Ziegelstein, Roy C
Writing a meaningful and valuable letter of reference is not an easy task. Several factors influence the quality of any letter of reference. First, the accuracy and reliability of the writer's impressions and judgment depend on how well he knows the individual being described. Second, the writer's frame of reference, which is determined by the number of persons at the same level that he has worked with, will impact the context and significance of his beliefs and estimations. Third, the letter-writing skills of the person composing the letter will naturally affect the letter. To support the other components of a candidate's application, a letter of reference should provide specific examples of how an individual's behavior or attitude compares to a reference group and should assess "intangibles" that are hard to glean from a curriculum vitae or from test scores. This report offers suggestions that should help physicians write more informative letters of reference.
Živčák, Jozef; Aspects of Computational Intelligence Theory and Applications
This volume covers the state-of-the art of the research and development in various aspects of computational intelligence and gives some perspective directions of development. Except the traditional engineering areas that contain theoretical knowledge, applications, designs and projects, the book includes the area of use of computational intelligence in biomedical engineering. „Aspects of Computational Intelligence: Theory and Applications” is a compilation of carefully selected extended papers written on the basis of original contributions presented at the 15th IEEE International Conference on Intelligent Engineering Systems 2011, INES 2011 held at June 23.-26. 2011 in AquaCity Poprad, Slovakia.
The IEEE P896 Future Backplane Bus project has been influenced by and has influenced FASTBUS and several other contemporary bus designs. This paper summarizes the current status of that project, which is directed toward the needs of modern 32-bit microprocessor systems with multiple processors. Some of the technology developed for P896 will be important for future non-ECL implementations of FASTBUS and other buses. In particular, new bus drivers and receivers should greatly improve the performance and reliability of backplane buses and cable buses. The current status of the P896 serial bus is also summarized
Odelola, Catherine; Jabbar, Farid
The quality of information provided by referring general practitioners to secondary care mental health services are crucial elements in the effective management of patients. In order to establish effective communication, both primary and secondary care health professionals should contribute to planning and organising this process taking into account their different opinions and views. Anonymous questionnaire was designed to collect information on items that GPs and psychiatrist rated as most important items in GP referral letters to psychiatrists. The questionnaires were sent out electronically. Each item was scored using a rating scale where 0 was least important and 10 was most important. Items that scored 8 and above were agreed by all as the most important items. 76 GP letters were audited using a devised checklist of the identified most important items. Data was collected and analysed using a devised data collection tool. A re-audit was done 6months later. A response rate of 70% was obtained for both psychiatrists and GPs. Reasons for referral were described in almost all GP referral letters (95%). Only 24% referral letters had details about current physical health which improved to 59%. Concerns about risk were described in only 47% of letters and treatment provided by GP in 50% of letters. These improved in 79% and 71% of letters respectively in the re-audit. The involvement of professionals in devising a standardised approach for referral letters has improved communication in this re-audit between GPs and Psychiatrists. This is evident in the improvement in key aspects of the referral letters: past medical history, past psychiatric history, current physical health, treatment provided by GP. Efficient communication between GPs and psychiatrists improves the quality of health care for patients.
Elian Iwi Afifah
Full Text Available Abstract: Communication skills are the most important things for teenagers. There is a leaning that the teenagers who have low communication skills can be called as someone who is introvert personality. People who are introvert personality tend to be difficult to communicate and express verbally. The purpose of developing letter sharing media is to improve communication skills of introvert student. This research is development research by adopting Borg and Gall research model. The development result showed that this product has the criteria of usefulness, feasibility, accuracy, and attractiveness and appropriate when used to facilitate students to express communication skills in writing. Abstrak: Keterampilan komunikasi merupakan hal yang terpenting bagi remaja. Terdapat kecenderungan bahwa remaja yang memiliki keterampilan komunikasi yang rendah dapat dikatakan sebagai seseorang yang berkepribadian introvert. Orang yang berkepribadian introvert cenderung sulit berkomunikasi dan sulit mengungkapkan secara lisan. Pengembangan media letter sharing ini bertujuan untuk meningkatkan keterampilan komunikasi siswa introvert. Penelitian ini merupakan penelitian pengembangan dengan mengadopsi model penelitian Borg and Gall. Hasil pengembangan menunjukkan bahwa produk ini mempunyai kriteria kegunaan, kelayakan, ketepatan, kemenarikan dan sesuai apabila digunakan untuk memfasilitasi siswa dalam mengekspresikan keterampilan komunikasi secara tertulis.
Laíse Ribas Bastos
Full Text Available The object for studying and analysis in this work is a set of letters received by Domingos Carvalho da Silva, which points to the constitution of a scene consisted of friendship and dissidences around a common literary and intellectual perspective. The objective of this work is to map the heterogeneity of the group as well as the problematic project involving the literary production in that moment, in order to find, thus, the means and ways of permanence of literature as it was configured between the 1940s and the 1960s.
The resolve of the naming dispute between Denmark, Norway and Sweden over the sea name Skagerrak has always been hailed as a prime example of how a naming dispute between countries over joint geographical name features should be handled and solved. This is a search into the story behind the scenes...... by the national mapping agencies. Practical Implications: Useful for institutions seeking name dispute resolution. Building on the extensive correspondence of almost fifty letters in the Danish Place-Name Commission’s journal archive, this naming dispute is shown to be of a rather different nature and resolve...
Instruction in business letter-writing, particularly in the context of the business French course, is discussed. First, the kinds of business communications (face-to-face, print, and electronic) currently used are surveyed briefly, and a taxonomy of the content of business communication is presented. Conventions of French business letters are then…
that every possible channel of communication will be utilized to ascertain the whereabouts of your son. The personal effects of 2nd. Lieut. Charles W...AIR UNIVERSITY AIR FORCE RESEARCH INSTITUTE Letters of Second Lieutenant Charles Wesley Chapman, Jr. December 19, 1894–May 3, 1918 Air Force...in-Publication Data Chapman, Charles Wesley, Jr., 1894–1918. Letters of Second Lieutenant Charles Wesley Chapman, Jr., December 19, 1894–May 3, 1918
According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.
The basic principles, requirements, and methods for qualifying Class 1E motor control centers for both harsh and mild environment applications in nuclear power generating stations are described. In addition to defining specific qualification requirements for Class 1E motor control centers and their components in accordance with the more general qualification requirements of IEEE Std 323-1983, this standard is intended to provide guidance in establishing a qualification program for demonstrating the adequacy of Class 1E motor control centers in nuclear power generating station applications
This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1979 and IEEE Std 308-1978, can be demonstrated by using the procedures provided in this Standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other types batteries are beyond the scope of this Standard
IEEE Std 323-1974, Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, was developed to provide guidance for demonstrating and documenting the adequacy of electrical equipment used in all Class 1E and interface systems. This standard, IEEE Std 535-1979, was developed to provide specific methods and type test procedures for lead storage batteries in reference to IEEE Std 323-1974
Šljivo, Amina; Kerkhove, Dwight; Tian, Le; Famaey, Jeroen; Munteanu, Adrian; Moerman, Ingrid; Hoebeke, Jeroen; De Poorter, Eli
So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning
The saying made famous by Mathew Carter that "type is a beautiful group of letters, not a group of beautiful letters”, highlights the fact that although a typeface consists of a number of letters it is when the letters are assembled in a word that they become type. However, research indicates...... that what makes letters legible in isolation is not necessarily the same as what makes them legible in words. Is it possible to create a typeface where both letters and words have a high level of legibility or are those factors so different that they cannot be combined? Through a literature review...... on relevant experimental investigations, I will in this talk present examples of when the legibility findings on letters and words correlate and when they differ....
Wright, Scott M; Ziegelstein, Roy C
Writing a meaningful and valuable letter of reference is not an easy task. Several factors influence the quality of any letter of reference. First, the accuracy and reliability of the writer's impressions and judgment depend on how well he knows the individual being described. Second, the writer's frame of reference, which is determined by the number of persons at the same level that he has worked with, will impact the context and significance of his beliefs and estimations. Third, the letter...
Hua Ye Ming
Full Text Available Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handheld devices with wireless LAN capability. In this paper, a hybrid protocol named improved PCF operation is proposed, which intelligently chooses the access point- (AP- assisted DCF (distributed coordinator function and enhanced PCF (point coordinator function transmission mechanism of IEEE 802.11 protocol in an infrastructure-based wireless LAN environment. Received signal strength indicator (RSSI is used to determine the tradeoff between direct mobile-to-mobile transmission and transmission routed by AP. Based on the estimation, mobile stations can efficiently communicate directly instead of being routed through AP if they are in the vicinity of each other. Furthermore, a smart AP protocol is proposed as extension to the improved PCF operation by utilizing the historical end-to-end delay information to decide the waking up time of mobile stations. Simulation results show that using the proposed protocol, energy consumption of mobile devices can be reduced at the cost of slightly longer end-to-end packet delay compared to traditional IEEE 802.11 PCF protocol. However, in a non-time-critical environment, this option can significantly prolong the operation time of mobile devices.
Goswami, Dayananda; Sarma, Kanak C; Mahanta, Anil
The wireless body area network (WBAN) has gaining tremendous attention among researchers and academicians for its envisioned applications in healthcare service. Ultra wideband (UWB) radio technology is considered as excellent air interface for communication among body area network devices. Characterisation and modelling of channel parameters are utmost prerequisite for the development of reliable communication system. The path loss of on-body UWB channel for each frequency band defined in IEEE 802.15.6 standard is experimentally determined. The parameters of path loss model are statistically determined by analysing measurement data. Both the line-of-sight and non-line-of-sight channel conditions are considered in the measurement. Variations of parameter values with the size of human body are analysed along with the variation of parameter values with the surrounding environments. It is observed that the parameters of the path loss model vary with the frequency band as well as with the body size and surrounding environment. The derived parameter values are specific to the particular frequency bands of IEEE 802.15.6 standard, which will be useful for the development of efficient UWB WBAN system.
Kasparick, Martin; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk
Surgical procedures become more and more complex and the number of medical devices in an operating room (OR) increases continuously. Today's vendor-dependent solutions for integrated ORs are not able to handle this complexity. They can only form isolated solutions. Furthermore, high costs are a result of vendor-dependent approaches. Thus we present a service-oriented device communication for distributed medical systems that enables the integration and interconnection between medical devices among each other and to (medical) information systems, including plug-and-play functionality. This system will improve patient's safety by making technical complexity of a comprehensive integration manageable. It will be available as open standards that are part of the IEEE 11073 family of standards. The solution consists of a service-oriented communication technology, the so called Medical Devices Profile for Web Services (MDPWS), a Domain Information & Service Model, and a binding between the first two mechanisms. A proof of this concept has been done with demonstrators of real world OR devices.
Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Rodenas-Herraiz, David; Cruz-Martinez, Felipe; Garcia-Sanchez, Felipe
Wireless Multimedia Sensor Networks (WMSNs) are a special type of Wireless Sensor Network (WSN) where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES) mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.
Full Text Available Wireless Multimedia Sensor Networks (WMSNs are a special type of Wireless Sensor Network (WSN where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.
Firor, John W.
This Resource Letter provides a guide to the literature on the possibility of a human-induced climate change—a global warming. Journal articles and books are cited for the following topics: the Greenhouse Effect, sources of infrared-trapping gases, climate models and their uncertainties, verification of climate models, past climate changes, and economics, ethics, and politics of policy responses to climate change. [The letter E after an item indicates elementary level or material of general interest to persons becoming informed in the field. The letter I, for intermediate level, indicates material of somewhat more specialized nature, and the letter A indicates rather specialized or advanced material.
The seventeenth of a series of workshops sponsored by the IEEE Signal Processing Society and organized by the Machine Learning for Signal Processing Technical Committee (MLSP-TC). The field of machine learning has matured considerably in both methodology and real-world application domains and has...... become particularly important for solution of problems in signal processing. As reflected in this collection, machine learning for signal processing combines many ideas from adaptive signal/image processing, learning theory and models, and statistics in order to solve complex real-world signal processing......, and two papers from the winners of the Data Analysis Competition. The program included papers in the following areas: genomic signal processing, pattern recognition and classification, image and video processing, blind signal processing, models, learning algorithms, and applications of machine learning...
Blaabjerg, Frede; Lehman, Brad
should increase the impact factor of the IEEE TRANSACTIONS ON POWER ELECTRONICS (TPEL). In 2007, TPEL published 2600 pages, and it has gradually been increased to 4000 pages in 2011, 5000 pages in 2012, and 5500 pages are projected for 2013. We have decided to publish 12 printed issues so every month...... a new issue will be printed. A graph is provided showing the number of regular papers received in the past years as well as the number of published pages in the TPEL. Finally they note that in 2008, TPEL obtained a record high value for the impact factor (as shown in a figure) but in 2009 it was reduced...... the papers to be read over a longer time span; 2) Web of Science (ISI Thomsen Reuter) began to register new power electronics conferences in their database, and citations from conferences counts and contributes to a higher impact factor....
Full Text Available The modern digitized world has led to the emergence of a new paradigm on global information networks and infrastructures known as Cyberspace and the studies of Cybernetics, which bring seamless integration of physical, social and mental spaces. Cyberspace is becoming an integral part of our daily life from learning and entertainment to business and cultural activities. As expected, this whole concept of Cybernetics brings new challenges that need to be tackled. The 2017 IEEE Cyber Science and Technology Congress (CyberSciTech 2017 provided a forum for researchers to report their research findings and exchange ideas. The congress took place in Orlando, Florida, USA during 6–10 November 2017. Not counting poster papers, the congress accepted over fifty papers that are divided into nine sessions. In this report, we provide an overview of the research contributions of the papers in CyberSciTech 2017.
Moein, A; Pouladian, M
New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. It offers new functionalities to physicians and will reduce the costs. Among these functionalities, biomedical signals can be sent to other devices (PDA, PC . . . ) or processing centers, without restricting the patients' mobility. This article discusses the WIH (Ward-In-Hand) structure and the software required for its implementation before an operational example is presented with its results. The aim of this project is the development and implementation of a reduced size electrocardiograph based on IEEE 802.11 with high speed and more accuracy, which allows wireless monitoring of patients, and the insertion of the information into the Wi-Fi hospital networks.
Oscar P. Sarmiento
Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.
Full Text Available The ability to identify letters and encode their position is a crucial step of the word recognition process. However and despite their word identification problem, the ability of dyslexic children to encode letter-identity and letter-position within strings was not systematically investigated. This study aimed at filling this gap and further explored how letter identity and letter position encoding is modulated by letter context in developmental dyslexia. For this purpose, a letter-string comparison task was administered to French dyslexic children and two chronological-age (CA and reading-age (RA-matched control groups. Children had to judge whether two successively and briefly presented 4-letter-strings were identical or different. Letter-position and letter-identity were manipulated through the transposition (e.g., RTGM vs. RMGT or substitution of two letters (e.g., TSHF vs. TGHD. Non-words, pseudo-words and words were used as stimuli to investigate sub-lexical and lexical effects on letter encoding. Dyslexic children showed both substitution and transposition detection problems relative to CA controls. A substitution advantage over transpositions was only found for words in dyslexic children whereas it extended to pseudo-words in RA controls and to all type of items in CA controls. Letters were better identified in the dyslexic group when belonging to orthographically familiar strings. Letter position encoding was very impaired in dyslexic children who did not show any word context effect in contrast to CA controls. Overall, the current findings point to a strong letter identity and letter position encoding disorder in developmental dyslexia.
Richard Ellis is a consultant in communications and the successful author of 'Communication for Engineers'. In each chapter he highlights key points and situations, and provides exercises to consolidate what has already been learnt. The book ends with a 'toolbox' of useful information on subjects such as writing letters, spelling, punctuation, using abbreviations, studying for exams, using libraries and training.Written in clear, informative English, with the emphasis on the practical, this book is essential reading for both students and professionals in the con
c) it shows bit error rate (BER) performance with negligible degradation in SNR, compared to that of a coherent FH system. These advantages of the...Advanced),” IEEE International Conference on Communication Systems (ICCS), Singapore , pp. 146–150, Nov. 2010.  K.S. Gong, “Performance of Diversity
This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1971 and IEE Std 308-1978, can be demonstrated by using the procedures provided in this standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other type batteries are beyond the scope of this standard
This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 308-1980 can be demonstrated by using the procedures provided in this standard in accordance with ANSI/IEEE Std 323-1983. Battery sizing, maintenance, capacity testing, installation, charging equipment, and consideration of other type batteries are beyond the scope of this standard
Methods for qualifying static battery chargers and inverters for Class 1E installations in a mild environment outside containment in nuclear power generating stations are described. The qualification methods set forth employ a combination of type testing and analysis, the latter including a justification of methods, theories, and assumptions used. These procedures meet the requirements of IEEE Std 323-1983, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations
Wang, Hua; Xiong, C; Iversen, Villy Bæk
The emerging IEEE 802.16j mobile multi-hop relay (MMR) network is currently being developed to increase the user throughput and extend the service coverage as an enhancement of existing 802.16e standard. In 802.16j, the intermediate relay stations (RSs) help the base station (BS) communicate...... with those mobile stations (MSs) that are either too far away from the BS or placed in an area where direct communication with BS experiences unsatisfactory level of service. In this paper, we investigate the uplink Erlang capacity of a two-hop 802.16j relay system supporting both voice and data traffics...... with adaptive modulation and coding (AMC) scheme applied in the physical layer. We first develop analytical models to calculate the blocking probability in the access zone and the outage probability in the relay zone, respectively. Then a joint algorithm is proposed to determine the bandwidth distribution...
Thompson, Geoffrey O.
Several different methods of implementing a fiber optic version of IEEE 802.3 10BASE LANs have been proposed as a candidate for standardization by IEEE. There have been extensive discussions as to the relative merits and features of the several systems. This paper will discuss the merits of each for this particular application on a comparative basis.
Home; public; Volumes; reso; 021; 01; 0011-0030.How to make an abstract in IEEE Format for AvishkarMulticultural Night in IEEE R10 Student Congress 2009Performances.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook ...
Home; public; Volumes; reso; 021; 01; 0011-0030.What is IEEE 754 StandardHow to convert real number in binary format using IEEE 754 StandardAn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.
Cunningham, Donald H.; Graham, Louise
The article describes a one-hour presentation which provides a basic stereotyped pattern of letter organization for the four types of letters (order, request, claim, and reply) the business of secretarial student is most likely to have to write. The four paragraphs of the pattern are: purpose, explanation, optional, and closing. (AG)
Shaw, Philip; Okamura, Akiko
This study examines the relative contributions of subculture membership and mother-tongue status/target culture membership in writing transactional letters. We examined the letters accompanying articles initially submitted for publication by 26 NSE and 23 NNSE academics, and compared them with ef...
Morris, P. E.; Cook, N.
The evidence for the effectiveness of the first letter mnemonic technique is confused. There are at least three studies showing no effect, and one where an improvement in recall occurred. Reports two experiments which attempted to locate the conditions under which the first letter mnemonic is effective. (Author/RK)
This standard describes the basic requirements for qualifying Class 1E equipment with interfaces that are to be used in nuclear power generating stations. The requirements presented include the principles, procedures, and methods of qualification. These qualification requirements, when met, will confirm the adequacy of the equipment design under normal, abnormal, design basis event, post design basis event, and in-service test conditions for the performance of safety function(s). The purpose of this standard is to identify requirements for the qualification of Class 1E equipment, including those interfaces whose failure could adversely affect the performance of Class 1E equipment and systems. The methods described shall be used for qualifying equipment, extending qualification, and updating qualification if the equipment is modified. Other issued IEEE standards which present qualification methods for specific equipment or components, or both, and those that deal with parts of the qualification program, may be used to supplement this standard, as applicable
This standard describes the basic principles, requirements, and methods for qualifying Class 1E motor control centers for outside containment applications in nuclear power generating stations. Qualification of motor control centers located inside containment in a nuclear power generating station is beyond the scope of this standard. The purpose of this standard is (1) to define specific qualification requirements for Class 1E motor control centers in accordance with the more general qualification requirements of IEEE Std 323-1974, IEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations; (2) to provide guidance in establishing a qualification program for demonstrating the design adequacy of Class 1E motor control centers in nuclear power generating station applications
Kim, Tae Ok; Kim, Kyung Jae; Choi, Bong Dae
We analyze the MAC performance of the IEEE 802.11 DCF and 802.11e EDCA in non-saturation condition where device does not have packets to transmit sometimes. We assume that a flow is not generated while the previous flow is in service and the number of packets in a flow is geometrically distributed. In this paper, we take into account the feature of non-saturation condition in standards: possibility of transmission performed without preceding backoff procedure for the first packet arriving at the idle station. Our approach is to model a stochastic behavior of one station as a discrete time Markov chain. We obtain four performance measures: normalized channel throughput, average packet HoL (head of line) delay, expected time to complete transmission of a flow and packet loss probability. Our results can be used for admission control to find the optimal number of stations with some constraints on these measures.
Norris, Dennis; Kinoshita, Sachiko; van Casteren, Maarten
Early on during word recognition, letter positions are not accurately coded. Evidence for this comes from transposed-letter (TL) priming effects, in which letter strings generated by transposing two adjacent letters (e.g., "jugde") produce large priming effects, more than primes with the letters replaced in the corresponding position (e.g.,…
and R. Jost, “Spectrum analysis and measurements in a congested electromagnetic environment,” in IEEE International Symposium on Electromagnetic...and communications systems and its impact on radar’s detectable target parameters,” in Proc. IEEE Vehicular Technology Conference, May 2015, pp. 1–6
Full Text Available The present study employed critical contrastive rhetoric to investigate the L2 to L1 transfer of organizational pattern and directness level of speech acts in business complaint letters. By examining the L1 complaint letters of 30 tourism university students in two phases of study, pre and post instruction of English complaint letter, the study revealed that the rhetorical organization of Persian letters are in a state of hybridity. The post instruction comparison of letters, however, showed a tendency towards applying English conventions both in organization and directness level of complaint speech act in the L1 complaint letters. The results also revealed that after instruction the expert in the field of tourism viewed some letters as inappropriate in terms of politeness which is reflected through some lexical items.
Today is a red-letter day for the LHC and CERN as a beam of protons has travelled around the LHC ring for the very first time! The start of LHC operation marks the end of a long period in which you have given your all, and this first particle beam circulating in the accelerator now paves the way for discoveries that will open up a whole new field of knowledge. The history of the LHC began in 1984 with a debate on the possible objectives of a future accelerator, based on the state of our knowledge at that time. The CERN Council then approved the single-stage construction of the LHC in 1996, giving the go-ahead for the work that has now reached completion. For the past twelve years, physicists, engineers and technicians from CERN and its associated institutes have been engaged in constructing the three pillars of the LHC: the accelerator (including the upgrade of the existing accelerator chain), the four experiments, and the computing ...
Pashinin, Pavel P.
Dear readers, contributors, and members of the world laser physics community. It is a great honour for us to introduce to you our new publishing partner, IOP Publishing, a subsidiary of the Institute of Physics, United Kingdom. IOP Publishing is a world renowned authority in producing journals, magazines, websites and services that enable researchers and research organizations to present their work to a world-wide audience. Laser Physics, the first English-language scientific journal in Russia, was founded in 1990 on the initiative of Alexander M Prokhorov, a pioneer and leader in laser physics research. Professor Prokhorov served as the first Editor-in-Chief of the journal until 2002. We are proud that it is our 23rd year of publishing Laser Physics and our 10th year of publishing Laser Physics Letters. We would like to honour the memory of our friend, late Professor Igor Yevseyev, whose enthusiasm and unwavering dedication to our journals contributed most significantly to their success. It was initially his idea in 2011 to approach IOP with a partnership proposal. We deeply regret that he is no longer with us as we enter this productive alliance. Now, in partnership with IOP, we are turning a new page in providing world-wide access to the cutting-edge research results in our journals, serving our well established global audience. We see new horizons opening for our journals for years to come and hope that our readers share our enthusiasm and aspirations. Please accept our best wishes for all your new scientific endeavors in the exciting field of laser physics.
Raghunandan, Avesh; Karmazinaite, Berta; Rossow, Andrea S
Letter sequence recognition accuracy has been postulated to be limited primarily by low-level visual factors. The influence of high level factors such as visual memory (load and decay) has been largely overlooked. This study provides insight into the role of these factors by investigating the interaction between letter sequence recognition accuracy, letter string length and report condition. Letter sequence recognition accuracy for trigrams and pentagrams were measured in 10 adult subjects for two report conditions. In the complete report condition subjects reported all 3 or all 5 letters comprising trigrams and pentagrams, respectively. In the partial report condition, subjects reported only a single letter in the trigram or pentagram. Letters were presented for 100ms and rendered in high contrast, using black lowercase Courier font that subtended 0.4° at the fixation distance of 0.57m. Letter sequence recognition accuracy was consistently higher for trigrams compared to pentagrams especially for letter positions away from fixation. While partial report increased recognition accuracy in both string length conditions, the effect was larger for pentagrams, and most evident for the final letter positions within trigrams and pentagrams. The effect of partial report on recognition accuracy for the final letter positions increased as eccentricity increased away from fixation, and was independent of the inner/outer position of a letter. Higher-level visual memory functions (memory load and decay) play a role in letter sequence recognition accuracy. There is also suggestion of additional delays imposed on memory encoding by crowded letter elements. Copyright © 2016 Spanish General Council of Optometry. Published by Elsevier España, S.L.U. All rights reserved.
Managers spend majority of their time communicating in several forms: meeting, face-to –face dis- cussion, letters, emails etc. Also more and more employees realize that communication is a very im- portant part of their work because a lot of their work activities are based on teamwork among workers in different functional groups. This is the reason why communication has become more important in companies. The experience shows that there are significant differences in manners of ...
Daneels, Glenn; Municio, Esteban; Van de Velde, Bruno; Ergeerts, Glenn; Weyn, Maarten; Latré, Steven; Famaey, Jeroen
The Time-Slotted Channel Hopping (TSCH) mode of the IEEE 802.15.4e amendment aims to improve reliability and energy efficiency in industrial and other challenging Internet-of-Things (IoT) environments. This paper presents an accurate and up-to-date energy consumption model for devices using this IEEE 802.15.4e TSCH mode. The model identifies all network-related CPU and radio state changes, thus providing a precise representation of the device behavior and an accurate prediction of its energy consumption. Moreover, energy measurements were performed with a dual-band OpenMote device, running the OpenWSN firmware. This allows the model to be used for devices using 2.4 GHz, as well as 868 MHz. Using these measurements, several network simulations were conducted to observe the TSCH energy consumption effects in end-to-end communication for both frequency bands. Experimental verification of the model shows that it accurately models the consumption for all possible packet sizes and that the calculated consumption on average differs less than 3% from the measured consumption. This deviation includes measurement inaccuracies and the variations of the guard time. As such, the proposed model is very suitable for accurate energy consumption modeling of TSCH networks.
Almas, M. S.; Vanfretti, L.; Baudette, M.
BabelFish (BF) is a real-time data mediator for development and fast prototyping of synchrophasor applications. BF is compliant with the synchrophasor data transmission IEEE Std C37.118.2-2011. BF establishes a TCP/IP connection with any Phasor Measurement Unit (PMU) or Phasor Data Concentrator (PDC) stream and parses the IEEE Std C37.118.2-2011 frames in real-time to provide access to raw numerical data in the LabVIEW environment. Furthermore, BF allows the user to select "data-of-interest" and transmit it to either a local or remote application using the User Datagram Protocol (UDP) in order to support both unicast and multicast communication. In the power systems Wide Area Monitoring Protection and Control (WAMPAC) domain, BF provides the first Free/Libre and Open Source Software (FLOSS) for the purpose of giving the users tools for fast prototyping of new applications processing PMU measurements in their chosen environment, thus liberating them of time consuming synchrophasor data handling and allowing them to develop applications in a modular fashion, without a need of a large and monolithic synchrophasor software environment.
frameworks 4 CMMI-DEV IEEE / ISO / IEC 15288 / 12207 Quality Assurance ©2011 Walz IEEE Life Cycle Processes & Artifacts • Systems Life Cycle Processes...TAG to ISO TC 176 Quality Management • Quality: ASQ, work experience • Software: three books, consulting, work experience • Systems: Telecom & DoD...and IEEE 730 SQA need to align. The P730 IEEE standards working group has expanded the scope of the SQA process standard to align with IS 12207
Full Text Available In recent years, wireless technologies and application received great attention. The Medium Access Control (MAC protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel in wireless local area networks (WLANs. IEEE 802.11 introduced the optional RTS/CTS handshaking mechanism to address the hidden terminal problem as well as to reduces the chance of collision in case of higher node density and traffic. RTS Threshold (RT determines when RTS/CTS mechanism should be used and proved to be an important parameter for performance characteristics in data transmission. We first investigate to find a meaningful threshold value according to the network situation and determine the impact of using or disengaging the RTS/CTS optional mechanism and dynamically adjust the RTS Threshold to maximize data transmission. The results show a significant improvement over existing CSMA/CA and RTS/CTS schemes. Our adaptive scheme performed even better when data rate increases. We verify our proposed scheme both analytically and with extensive network simulation using ns-2.
Full Text Available High data rates and spectral efficiency is the main requirements for wireless communication systems. Orthogonal Frequency Division Multiplexing (OFDM is a special form of multi carrier transmission used to achieve high data rates of the various WLAN standards. WLAN uses an Inverse Fast Fourier Transform (IFFT at the transmitter to modulate a high bit-rate signal onto a number of carriers and ensure orthogonality between the carriers. The FFT-OFDM has a disadvantage that it is inherently inflexible and requires a complex IFFT core. Recently, Wavelet Packet Transform is proposed as an alternate to FFT. It is a multiplexing method in which data is assigned to wavelet sub bands having different time and frequency resolutions. This paper presents a BER analysis of Fourier-based OFDM (FFT-OFDM and Wavelet Packet based OFDM (WPT-OFDM in WLAN standard (IEEE 802.11a. The performance of FFT and WPT OFDM for various modulation techniques such as PSK, DPSK and QAM for varying values of M was evaluated in AWGN Channel.
From minding your Ps and Qs to wondering why X should mark the spot, Alphabetical is a book for everyone who loves words and language. Whether it's how letters are arranged on keyboards or Viking runes, textspeak or zip codes, this book will change the way you think about letters for ever. How on Earth did we fix upon our twenty-six letters, what do they really mean, and how did we come to write them down in the first place? Michael Rosen takes you on an unforgettable adventure through the hi...
... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false IEEE 1680 Standard for the... CONTRACT CLAUSES Text of Provisions and Clauses 52.223-16 IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE...
Lee, Hyun-Jin; Kim, Jae-Hyun
A control frame can be piggybacked onto a data frame to increase channel efficiency in wireless communication. However, if the control frame including global control information is piggybacked, the delay of the data frame from a access point will be increased even though there is only one station with low physical transmission rate. It is similar to the anomaly phenomenon in a network which supports multi-rate transmission. In this letter, we define this phenomenon as “the piggyback problem at low physical transmission rate” and evaluate the effect of this problem with respect to physical transmission rate and normalized traffic load. Then, we propose a delay-based piggyback scheme. Simulations show that the proposed scheme reduces average frame transmission delay and improves channel utilization about 24% and 25%, respectively.
Joel R. Noche
Full Text Available An asynchronous floating-point arithmetic unit is designed and tested at the transistor level usingCadence software. It uses CMOS (complementary metal oxide semiconductor and DCVS (differentialcascode voltage switch logic in a 0.35 µm process using a 3.3 V supply voltage, with dual-rail data andsingle-rail control signals using four-phase handshaking.Using 17,085 transistors, the unit handles single-precision (32-bit addition/subtraction, multiplication,division, and remainder using the IEEE 754-1985 Standard for Binary Floating-Point Arithmetic, withrounding and other operations to be handled by separate hardware or software. Division and remainderare done using a restoring subtractive algorithm; multiplication uses an additive algorithm. Exceptionsare noted by flags (and not trap handlers and the output is in single-precision.Previous work on asynchronous floating-point arithmetic units have mostly focused on single operationssuch as division. This is the first work to the authors' knowledge that can perform floating-point addition,multiplication, division, and remainder using a common datapath.
R. P. J. C. Ramanayake
Full Text Available Background: Communication between primary care doctors and specialists/hospital doctors is vital for smooth functioning of a health care system. In many instances referral and reply letters are the sole means of communication between general practitioners and hospital doctors/specialists. Despite the obvious benefits to patient care, answers to referral letters are the exception worldwide. In Sri Lanka hand written conventional letters are used to refer patients and replies are scarce. Materials and Methods: This interventional study was designed to assess if attaching a structured reply form with the referral letter would increase the rate of replies/back-referrals. It was conducted at the Family Medicine Clinic of the Faculty of Medicine, University of Kelaniya. A structured referral letter (form was designed based on guide lines and literature and it was used for referral of patients for a period of six months. Similarly a structured reply form was also designed and both the referral letter and the reply letter were printed on A4 papers side by side and these were used for the next six months for referrals. Both letters had headings and space underneath to write details pertaining to the patient. A register was maintained to document the number of referrals and replies received during both phases. Patents were asked to return the reply letters if specialists/hospital doctors obliged to reply. Results: Total of 90 patients were referred using the structured referral form during 1st phase. 80 letters (with reply form attached were issued during the next six months. Patients were referred to eight different specialties. Not a single reply during the 1 st phase and there were six 6 (7.5% replies during the 2 nd phase. Discussion: This was an attempt to improve communication between specialists/hospital doctors and primary care doctors. Even though there was some improvement it was not satisfactory. A multicenter island wide study should be
Thaenchaikun , Chakadkit; Jakllari , Gentian; Paillassa , Béatrice
International audience; IEEE 802.3az, the recent standard for Energy Efficient Ethernet, is one of the main contributions of the ICT industry to the global quest for energy efficiency. Energy consumption reduction is accomplished by essentially replacing the continuous IDLE of legacy IEEE 802.3 cards with a Low Power Idle. While this is an important step in the right direction, studies have shown that the energy saving with IEEE 802.3az highly depends on the traffic load and stops for link ut...
Referral letters act as permission slips to allow patients easy access to ... Methods: A qualitative study method was used, as the purpose of this study was to .... The total list of topics ..... Research design: qualitative and quantitative approaches.
In a letter of July 2010 the Energy Council made recommendations for a policy framework with more obligations and fewer subsidies. This included the Energy Council's advice to investigate whether the introduction of a supplier obligation could play a major role in the realisation of the CO2 emission target of the Netherlands and increase the share of renewable energy in line with European agreements. This advice letter deals with one aspect of the broader considerations: the share of renewable electricity and the kind of incentive framework that is needed to achieve the target concerned. In this letter we will examine the possibilities of the SDE+ support (financial incentive for renewable energy) scheme and the supplier obligation, the effects on the market and the consequences for achieving the target. This letter closes with conclusions and recommendations. [nl
Juan J. Pérez-Solano
Full Text Available Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.
Pérez-Solano, Juan J; Claver, Jose M; Ezpeleta, Santiago
Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.
1 Classification | CG-926 RDC | author | audience | month year Maritime Geo-Fence Letter Report Authors: Irene Gonin and Gregory...Johnson Distribution Statement A: Approved for public release; distribution is unlimited. July 2016 Report No. CG-D-10-16 Maritime Geo-Fence...United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Geo-Fence Letter Report 1
In her article "Burroughs's Postcolonial Visions in The Yage Letters" Melanie Keomany discusses the contents of William S. Burroughs and Allen Ginsberg's The Yage Letters which could be dismissed as openly bigoted and racist. Keomany posits that the text reveals valuable connections between the colonial expansion of the eighteenth century and 1950s USA and Latin America. By re-shaping Burroughs's lived experiences in the Amazon into a text where the narrator William Lee mimics sardonically an...
Sharma, V.; Singh, H.; Malhotra, J.
Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.
Lee, Bih-Hwang; Lai, Hui-Cheng
In order to achieve the prioritized quality of service (QoS) guarantee, the IEEE 802.11e EDCAF (the enhanced distributed channel access function) provides the distinguished services by configuring the different QoS parameters to different access categories (ACs). An admission control scheme is needed to maximize the utilization of wireless channel. Most of papers study throughput improvement by solving the complicated multidimensional Markov-chain model. In this paper, we introduce a back-off model to study the transmission probability of the different arbitration interframe space number (AIFSN) and the minimum contention window size (CWmin). We propose an adaptive control scheme (ACS) to dynamically update AIFSN and CWmin based on the periodical monitoring of current channel status and QoS requirements to achieve the specific service differentiation at access points (AP). This paper provides an effective tuning mechanism for improving QoS in WLAN. Analytical and simulation results show that the proposed scheme outperforms the basic EDCAF in terms of throughput and service differentiation especially at high collision rate.
Full Text Available Starting from the hypothesis that printed word identification initially involves the parallel mapping of visual features onto location-specific letter identities, we analyze the type of information that would be involved in optimally mapping this location-specific orthographic code onto a location-invariant lexical code. We assume that some intermediate level of coding exists between individual letters and whole words, and that this involves the representation of letter combinations. We then investigate the nature of this intermediate level of coding given the constraints of optimality. This intermediate level of coding is expected to compress data while retaining as much information as possible about word identity. Information conveyed by letters is a function of how much they constrain word identity and how visible they are. Optimization of this coding is a combination of minimizing resources (using the most compact representations and maximizing information. We show that in a large proportion of cases, non-contiguous letter sequences contain more information than contiguous sequences, while at the same time requiring less precise coding. Moreover, we found that the best predictor of human performance in orthographic priming experiments was within-word ranking of conditional probabilities, rather than average conditional probabilities. We conclude that from an optimality perspective, readers learn to select certain contiguous and non-contiguous letter combinations as information that provides the best cue to word identity.
Nygil Alex Vadakkan
Full Text Available The IEEE 802.21 standard was developed for communication of devices in a heterogeneous environment which included greater support for handoffs. This paper focuses on the denial of service (DoS vulnerabilities faced by such Media Independent Handover (MIH networks & various effective countermeasures that can be deployed to prevent their impact on such heterogeneous networks. The use of polling mechanism coupled with real time as well as offline traffic analysis can keep a good number of attacks at bay. The use of offline traffic analysis is to use the model and compare it with a lighter model and see if any of the excluded features in the lighter model have had suspicious variations which could be a varied form of DoS attack or an attack that is completely new. The countermeasures that have been developed also allows for the increase in efficiency of data transfer as well as higher rates of success in handoffs.
Full Text Available In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.
Jabłoński, G.; Makowski, D.; Mielczarek, A.; Orlikowski, M.; Perek, P.; Napieralski, A.; Makijarvi, P.; Simrock, S.
Distributed data acquisition and control systems in large-scale scientific experiments, like e.g. ITER, require time synchronization with nanosecond precision. A protocol commonly used for that purpose is the Precise Timing Protocol (PTP), also known as IEEE 1588 standard. It uses the standard Ethernet signalling and protocols and allows obtaining timing accuracy of the order of tens of nanoseconds. The MTCA.4 is gradually becoming the platform of choice for building such systems. Currently there is no commercially available implementation of the PTP receiver on that platform. In this paper, we present a module in the MTCA.4 form factor supporting this standard. The module may be used as a timing receiver providing reference clocks in an MTCA.4 chassis, generating a Pulse Per Second (PPS) signal and allowing generation of triggers and timestamping of events on 8 configurable backplane lines and two front panel connectors. The module is based on the Xilinx Spartan 6 FPGA and thermally stabilized Voltage Controlled Oscillator controlled by the digital-to-analog converter. The board supports standalone operation, without the support from the host operating system, as the entire control algorithm is run on a Microblaze CPU implemented in the FPGA. The software support for the card includes the low-level API in the form of Linux driver, user-mode library, high-level API: ITER Nominal Device Support and EPICS IOC. The device has been tested in the ITER timing distribution network (TCN) with three cascaded PTP-enabled Hirschmann switches and a GPS reference clock source. An RMS synchronization accuracy, measured by direct comparison of the PPS signals, better than 20 ns has been obtained.
Rash, Arjun H; Sheldon, Robert; Donald, Maoliosa; Eronmwon, Cindy; Kuriachan, Vikas P
Effective communication between the consultants and physicians form an integral foundation of effective and expert patient care. A broad review of the literature has not been undertaken to determine the components of a consultant's letter of most value to the referring physician. We aimed to identify the components of a consultant's letter preferred by referring physicians. We searched Embase and MEDLINE (OVID) Medicine (EBM) Reviews and Cochrane Database of Systematic Reviews for English articles with no restriction on initial date to January 6, 2017. Articles containing letters from specialists to referring physicians regarding outpatient assessments with either an observational or experimental design were included. Studies were excluded if they pertained to communications from referring physicians to consultant specialists, or pertained to allied health professionals, inpatient documents, or opinion articles. We enumerated the frequencies with which three common themes were addressed, and the positive or negative nature of the comments. The three themes were the structure of consultant letters, their contents, and whether referring physicians and consultants shared a common opinion about the items. Eighteen articles were included in our synthesis. In 11 reports, 91% of respondents preferred structured formats. Other preferred structural features were problem lists and brevity (four reports each). The most preferred contents were oriented to insight: diagnosis, prognosis, and management plan (16/21 mentions in the top tertile). Data items such as history, physical examination, and medication lists were less important (1/23 mentions in the top tertile). Reports varied as to whether referring physicians and consultants shared common opinions about letter features. Referring physicians prefer brief, structured letters from consultants that feature diagnostic and prognostic opinions and management plans over unstructured letters that emphasize data elements such as
Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger
In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall
Kim, Jong Seog
IEEE323 standard has been widely used for the qualification of electric equipment in Asian pacific area while IEC6070 has been mostly used in European area. Since each plant use different standard for environmental qualification, manufacturer has to perform the qualification test twice in accordance with each standard. Problem also can be happened in the plant site when they are going to purchase equipment qualified by different qualification standard which are not used in his plant. The need of harmonization of each standard has been raised several years and it is known that some studies are in progress by IEEE committee. KEPRI has a plan of comparing EQ relative standards of IEEE, IEC and RCC in 2009. In this paper, brief comparing result between IEEE323 and IEC60780 and the proper harmonization method is introduced
The convenience of IEEE 8O2.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors However, this use is predicated on an implicit assumption of confidentiality...
Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.
Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval
The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.
Networked Airborne Communications Using Adaptive Multi-Beam Directional Links R. Bruce MacLeod Member, IEEE, and Adam Margetts Member, IEEE MIT...provide new techniques for increasing throughput in airborne adaptive directional net- works. By adaptive directional linking, we mean systems that can...techniques can dramatically increase the capacity in airborne networks. Advances in digital array technology are beginning to put these gains within reach
IEEE Std 627 ''Design Qualification of Safety Systems Equipment Used in Nuclear Power Generating Stations'' was issued to more generically establish qualification requirements in the form of a high level umbrella document. Efforts on this standard began in late 1975 at the request of the IEEE Nuclear Standards Management Board. In 1977 a joint ASME/IEEE agreement established responsibility for qualification and quality assurance standards preparation. ASME accepted responsibility for Quality Assurance and IEEE for qualification. In accordance with that agreement, IEEE completed the generic qualification standard in 1980. This document provided high level approaches, criteria, guidance, and principles for qualification of both electrical and mechanical equipment that at that time appeared in no other industry standard. IEEE Std 627-1980 was later reaffirmed in 1996. In 1986, ASME's Board on Nuclear Codes and Standards directed its Committee on Qualification of Mechanical Equipment (QME) to develop a standard for qualifying mechanical equipment. This task was completed in several parts during the time frame from 1992 to 1994. Partly in response to this activity, IEEE Std 627 was withdrawn in 2002. Later although withdrawn, it was found that IEEE Std 627 was continuing to be used and referenced by many entities both in the US and other countries including in ASME's QME-1-2002 ''Qualification of Active Mechanical Equipment Used in Nuclear Power Plants'', US NRC's NUREG-0800 Standard Review Plan Section 3.11, at least one reactor vendor's Design Certification Document (DCD), several international licensing documents, and elsewhere. As a result, in 2007, the IEEE Standards Board authorized Working Group 2.10 of Subcommittee 2 (Qualification) of the Power and Energy Society's Nuclear Power Engineering Committee to resurrect and update IEEE Std 627-1980 (Reaff 1996). The result was the culmination IEEE Std 627 in 2010. This paper will report on the eight improvements made
...) attacks targeting its management and media access protocols Computer simulation models have proven to be effective tools in the study of cause and effect in numerous fields This thesis involved the design and implementation of a IEEE 8O2.11-based simulation model using OMNeT++, to investigate the effects of different types of DoS attacks on a IEEE 8O2.11 network, and the effectiveness of corresponding countermeasures.
Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...
Bhatia, Swapnil P.; Bartos, Radim
The proposed standard for the IEEE 802.3 Ethernet Passive Optical Network includes a random delayed transmission scheme for registration of new nodes. Although the scheme performs well on low loads, our simulation demonstrates the degraded and undesirable performance of the scheme at higher loads. We propose a simple modification to the current scheme that increases its range of operation and is compatible with the IEEE draft standard. We demonstrate the improvement in performance gained without any significant increase in registration delay.
Roworth, D. A. A.; Howe, N.
The progress of the IEEE 802.3 standard for fibre optic LANs is indicated with reference to both mixed media networks and full fibre networks. For a fibre optic network the most suitable layout is a "snowflake" topology composed of multiport repeaters and active fibre hubs. A range of components is described which enables the realisation of such a topology in conformance with the IEEE 802.3 standard.
Kroposki, B.; Englebretson, S.; Pink, C.; Daley, J.; Siciliano, R.; Hinton, D.
This report presents the preliminary results of testing the ASCO 7000 Soft Load Transfer System according to IEEE P1547.1 procedures. The ASCO system interconnects synchronous generators with the electric power system and provides monitoring and control for the generator and grid connection through extensive protective functions. The purpose of this testing is to evaluate and give feedback on the contents of IEEE Draft Standard P1547.1 Conformance Tests Procedures for Equipment Interconnecting Distributed Resources With Electric Power Systems.
The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.
4.2.1 Wald–Wolfowitz Runs Test . . . . . . . . . . . . . . . . . . . . . . 41 4.2.2 Wald–Wolfowitz Application to SXS System . . . . . . . . . . . . 42...Station SXS Signals eXploitation System USB Universal Serial Bus xiv Acronym Definition USRP Universal Software Radio Peripheral WLAN Wireless Local...Electronics Engineers (IEEE) defines standards applicable to the IEEE 802.11 protocol, however the standard does not reach the level of specificity to dictate
Communication dated 5 September 2005 received from the Permanent Mission of the United Kingdom of Great Britain and Northern Ireland to the Agency concerning a letter from the Government of the United Kingdom to the Secretary General of the League of Arab States
The Secretariat has received a Note Verbale dated 5 September 2005 from the Permanent Mission of the United Kingdom, attaching a letter dated 31 August 2005 from the Minister of State at the Foreign and Commonwealth Office to the Secretary General of the League of Arab States. In the light of the request expressed by the Permanent Mission of the United Kingdom in that Note Verbale, the Note Verbale and the attached letter are hereby circulated for the information of all Member States
Giordano, Arthur A
Arthur Giordano, PhD, is a consultant in the field of military and commercial communications specializing in wireless communications. He is a co-founder of G5 Scientific, LLC, is a senior member of the IEEE and has taught graduate communications courses. He has developed numerous models using MathWorks®' SIMULINK®® to characterize digital communications systems. Allen Levesque, PhD, is a consultant specializing in digital communications systems, and is a partner in G5 Scientific, LLC. He has taught graduate courses in digital communications at Worcester Polytechnic Institute and is currently
Kim, Sang Hyun
The purpose of this study was to examine the concordance between a checklist's categories of professor recommendation letters and characteristics of the self-introduction letter. Checklists of professor recommendation letters were analyzed and classified into cognitive, social, and affective domains. Simple correlation was performed to determine whether the characteristics of the checklists were concordant with those of the self-introduction letter. The difference in ratings of the checklists by pass or fail grades was analyzed by independent sample t-test. Logistic regression analysis was performed to determine whether a pass or fail grade was influenced by ratings on the checklists. The Cronbach alpha value of the checklists was 0.854. Initiative, as an affective domain, in the professor's recommendation letter was highly ranked among the six checklist categories. Self-directed learning in the self-introduction letter was influenced by a pass or fail grade by logistic regression analysis (pprofessor recommendation letters and the sum of all characteristics in the self-introduction letter.
Perea, Manuel; Lupker, Stephen J.
Nonwords created by transposing two "adjacent" letters (i.e., transposed-letter (TL) nonwords like "jugde") are very effective at activating the lexical representation of their base words. This fact poses problems for most computational models of word recognition (e.g., the interactive-activation model and its extensions), which assume that exact…
Castet, Eric; Descamps, Marine; Denis-Noël, Ambre; Colé, Pascale
It has been proposed that letters, as opposed to symbols, trigger specialized crowding processes, boosting identification of the first and last letters of words. This hypothesis is based on evidence that single-letter accuracy as a function of within-string position has a W shape (the classic serial position function [SPF] in psycholinguistics) whereas an inverted V shape is obtained when measured with symbols. Our main goal was to test the robustness of the latter result. Our hypothesis was that any letter/symbol difference might result from short-term visual memory processes (due to the partial report [PR] procedures used in SPF studies) rather than from crowding. We therefore removed the involvement of short-term memory by precueing target-item position and compared SPFs with precueing and postcueing. Perimetric complexity was stringently matched between letters and symbols. In postcueing conditions similar to previous studies, we did not reproduce the inverted V shape for symbols: Clear-cut W shapes were observed with an overall smaller accuracy for symbols compared to letters. This letter/symbol difference was dramatically reduced in precueing conditions in keeping with our prediction. Our results are not consistent with the claim that letter strings trigger specialized crowding processes. We argue that PR procedures are not fit to isolate crowding processes.
Velan, Hadas; Frost, Ram
We examined the effects of letter-transposition in Hebrew in three masked-priming experiments. Hebrew, like English has an alphabetic orthography where sequential and contiguous letter strings represent phonemes. However, being a Semitic language it has a non-concatenated morphology that is based on root derivations. Experiment 1 showed that…
Tadayon, Navid; Aissa, Sonia
The IEEE 802.22 is a new cognitive radio standard that is aimed at extending wireless outreach to rural areas. Known as wireless regional area networks, and designed based on the not-to-interfere spectrum sharing model, WRANs are channelized and centrally-controlled networks working on the under-utilized UHF/VHF TV bands to establish communication with remote users, so-called customer premises equipment (CPEs). Despite the importance of reliable and interference-free operation in these freque...
Shabani, Hikma; Ahmed, Musse Mohamud; Khan, Sheroz; Hameed, Shahab Ahmed; Habaebi, Mohamed Hadi
A smart grid refers to a modernization of the electricity system that brings intelligence, reliability, efficiency and optimality to the power grid. To provide an automated and widely distributed energy delivery, the smart grid will be branded by a two-way flow of electricity and information system between energy suppliers and their customers. Thus, the smart grid is a power grid that integrates data communication networks which provide the collected and analysed data at all levels in real time. Therefore, the performance of communication systems is so vital for the success of smart grid. Merit to the ZigBee/IEEE802.15.4std low cost, low power, low data rate, short range, simplicity and free licensed spectrum that makes wireless sensor networks (WSNs) the most suitable wireless technology for smart grid applications. Unfortunately, almost all ZigBee channels overlap with wireless local area network (WLAN) channels, resulting in severe performance degradation due to interference. In order to improve the performance of communication systems, this paper proposes an optimal throughput and self-adaptability of ZigBee/IEEE802.15.4std for smart grid
Islam, T.; Hu, Y.; Onur, E.; Boltjes, B.; Jongh, J.F.C.M de
Intelligent Transportation Systems (ITS) is becoming an important paradigm, because of its ability to enhance safety and to mitigate congestion on road traffic scenarios. Realizing the fact that data collection scheme from in-situ test beds for large number of vehicles is always expensive and time
Full Text Available The letters of Ignatius represent one of the key texts for the emergence of martyrdom during the second century AD in Christianity. This article is concerned with the question whether Ignatius contributed to a “theology of martyrdom” or whether he rather relied on previous traditions. The author argues, by undertaking an analysis of certain pragmatics and semantics, that the motif of martyrdom is solely used to buttress Ignatius’ claim for authority among his intended addressees by referring to an understanding of martyrdom that has its roots in the New Testament. An identification of the author of the letters with a historical martyr is regarded as unlikely.
Excellent communication skills are vital in today's workplace. Whether keeping the interest of a large audience, impressing a potential employer or simply winning the argument at an important meeting, sounding the part is key. This fourth edition of Improve Your Communication Skills is full of practical advice on all aspects of verbal and non-verbal communication. It gives vital tips on improving conversations and building rapport with colleagues, learning the skills of persuasion, and writing effective emails, letters and reports. This editionincludes new information focusing on communicating across borders and virtual teams and a new chapter on managing difficult conversations."
The purpose of this review is to provide the overview of available systems and potential future systems for communication during disaster in Malaysia. Electronic searches in major subject loci databases such as MEDLINE (via PUBMED), Ovid, Science Direct, Scopus, IEEE Xplore digital library and Springer are used in ...
Schuster, Mary Lay
This article traces the history of Mary Schuster's career in technical writing and communication from 1968 when she took a position in the Publications Department at the Institute of Electrical and Electronics Engineers (IEEE) to her work at "Technical Communication Quarterly" ("TCQ") in 2003 and forward. She discusses the…
Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang
In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN's MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS.
Full Text Available Normally-skilled reading involves special processing strategies for letters, which are habitually funneled into an abstract letter code. On the basis of previous studies we argue that this habit leads to the preferred usage of an analytic strategy for the processing of letters, while non-letters are preferably processed via a holistic strategy. The well-known Global Precedence Effect (GPE seems to contradict to this assumption, since, with compound, hierarchical figures, including letter items, faster responses are observed to the global than to the local level of the figure, as well as an asymmetric interference effect from global to local level. We argue that with letters these effects depend on presentation conditions; only when they elicit the processing strategies automatized for reading, an analytic strategy for letters in contrast to non-letters is to be expected. We compared the GPE for letters and non-letters in central viewing, with the global stimulus size close to the functional visual field in whole word reading (6.5o of visual angle and local stimuli close to the critical size for fluent reading of individual letters (.5o of visual angle. Under these conditions, the GPE remained robust for non-letters. For letters, however, it disappeared: letters showed no overall response time advantage for the global level and symmetric congruence effects (local-to-global as well as global-to local interference. We interpret these results as according to the view that reading is based on resident analytic visual processing strategies for letters.
In this open letter, Eve Tuck calls on communities, researchers, and educators to reconsider the long-term impact of "damage-centered" research--research that intends to document peoples' pain and brokenness to hold those in power accountable for their oppression. This kind of research operates with a flawed theory of change: it is often used to…
Angiolillo, Paul J.; Lynch, Jonathan
Ask any physicist what the preeminent journal in the field is, and I think the almost unanimous answer will be "Physical Review Letters" ("PRL"). This weekly journal of the American Physical Society publishes high-impact research from all the major subdisciplines of physics. This journal is not the one you would think is the first place a high…
Samuels, Helen Willa
A study of the functions of colleges and universities, Varsity Letters is intended to aid those responsible for the documentation of these institutions. Samuels offers specific advice about the records of modern colleges and universities and proposes a method to ensure their adequate documentation. She also offers a method to analyze and plan the preservation of records for any type of institution.
Dar Es Salaam Medical Students' Journal. The journal publishes original research, case report/case series, letter to the editor, reviews of health related issues in medicine, pharmacy, dentistry, nursing, public and allied health sciences. Furthermore the DMSJ endeavours to disseminate research findings mainly of medical ...
This issue of the information letter consists of two articles, "Music Therapy" and "Research and Applications of Psychomusical Techniques"; a review of the book, "La musicotherapie et les methods nouvelles d'association des techniques" by Guilhot and Cecourt, and a bibliography of books on music therapy written in…
In response to the letter by Dr. Amir Arav I would like to mention the following. The application of the principle of directional solidification to cryopreservation of living cells was, as far as I am aware, not the invention of Dr. Arav. It was first published and patented by Rubinsky (Berkeley,
Aihara, H.; Oreglia, M.; Berger, E.L.; Guarino, V.; Repond, J.; Weerts, H.; Xia, L.; Zhang, J.; Zhang, Q.; Srivastava, A.; Butler, J.M.; Goldstein, Joel; Velthuis, J.; Radeka, V.; Zhu, R.-Y.; Lutz, P.; de Roeck, A.; Elsener, K.; Gaddi, A.; Gerwig, H.; Grefe, C.; Klempt, W.; Linssen, L.; Schlatter, D.; Speckmayer, P.; Thom, J.; Yang, J.; Christian, D.C.; Cihangir, S.; Cooper, W.E.; Demarteau, M.; Fisk, H.E.; Garren, L.A.; Krempetz, K.; Kutschke, R.K.; Lipton, R.; Para, A.; Tschirhart, R.; Wenzel, H.; Yarema, R.; Grunewald, M.; Pankov, A.; U., Gomel State Tech.; Dutta, T.; Dauncey, P.D.; Balbuena, J.P.; Fleta, C.; Lozano, M.; Ullan, M.; Christian, G.B.; Faus-Golfe, A.; Fuster, J.; Lacasta, C.; Marinnas, C.; Vos, M.; Duarte, J.; Fernandez, M.; Gonzalez, J.; Jaramillo, R.; Lopez, Virto A.; Martinez-Eivero, C.; Moya, D.; Ruiz-Mimeno, A.; Vila, I.; Colledani, C.; Dorokhov, A.; Hu-Guo, C.; Winter, M.; Moortgat-Pick, G.; Onoprienko, D.V.; Kim, G.N.; Park, H.; Adloff, C.; Blaha, J.; Blaising, J.-J.; Cap, S.; Chefdeville, M.; Drancourt, C.; Espargiliare, A.; Gaglione, R.; Geffroy, N.; Jacquemier, J.; Karyotakis, Y.; Prast, J.; Vouters, G.; Gronberg, J.; Walston, S.; Wright, D.; Sawyer, L.; Laloum, M.; Ciobanu, C.; Chauveau, J.; Savoy-Navarro, A.; Andricek, L.; Moser, H.-G.; Cowan, R.f.; Fisher, P.; Yamamoto, R.K.; Kenney, ClMl; Boos, E.E.; Merkin, M.; Chen, S.; Chakraborty, D.; Dyshkant, A.; Hedin, D.; Zutshi, V.; Galkin, V.; D'Ascenzo, N.; Ossetski, D.; Saveliev, V.; Kapusta, F.; De Masi, R.; Vrba, V.; Lu, C.; McDonald, K.T.; Smith, A.J.S.; Bortoletto, D.; Coath, R.; Crooks, J.; Damerell, C.; Gibson, M.; Nichols, A.; Stanitzki, M.; Strube, J.; Turchetta, R.; Tyndel, M.; Weber, M.; Worm, S.; Zhang, Z.; Barklow, T.L.; Belymam, A.; Breidenbach, M.; Cassell, R.; Craddock, W.; Deaconu, C.; Dragone, A.; Graf, N.A.; Haller, G.; Herbst, R.; Hewett, J.L.; Jaros, J.A.; Johnson, A.S.; Kim, P.C.; MacFarlane, D.B.; Markiewicz, T.; Maruyama, T.; McCormick, J.; Moffeit, K.; Neal, H.A.; Nelson, T.K.; Oriunno, M.; Partridge, R.; Peskin, M.E.; Rizzo, T.G.; Rowson, P.; Su, D.; Woods, M.; Chakrabarti, S.; Dieguez, A.; Garrido, Ll.; Kaminski, J.; Conway, J.S.; Chertok, M.; Gunion, J.; Holbrook, B.; Lander, R.L.; Tripathi, S.M.; Fadeyev, V.; Schumm, B.A.; Oreglia, M.; Gill, J.; Nauenberg, U.; Oleinik, G.; Wagner, S.R.; Ranjan, K.; Shivpuri, R.; Varner, G.S.; Orava, R.; Van Kooten, R.; Bilki, B.; Charles, M.; Kim, T.J.; Mallik, U.; Norbeck, E.; Onel, Y.; Brau, B.P.; Willocq, S.; Taylor, G.N.; Riles, Keith; Yang, H.-J.; Kriske, R.; Cremaldi, L.; Rahmat, R.; Lastovicka-Medin, G.; Seidel, S.; Hildreth, M.D.; Wayne, M.; Brau, J.E.; Frey, R.; Sinev, N.; Strom, D.M.; Torrence, E.; Banda, Y.; Burrows, P.N.; Devetak, E.; Foster, B.; Lastovicka, T.; Li, Y.-M.; Nomerotski, A.; Riera-Babures, J.; Vilasis-Cardona, X.; Manly, S.; Adeva, B.; Iglesias Escudero, C.; Vazquez Regueiro, P.; Saborido Silva, J.J.; Gallas Torreira, A.; Gao, D.; Jie, W.; Jungfeng, Y.; Li, C.; Liu, S.; Liu, Y.; Sun, Y.; Wang, Q.; Yi, J.; Yonggang, W.; Zhao, Z.; De, K.; Farbin, A.; Park, S.; Smith, J.; White, A.P.; Yu, J.; Lou, X.C.; Abe, T.; Iwasaki, M.; Lubatti, H.J.; Band, H.R.; Feyzi, F.; Prepost, R.; Karchin, P.E.; Milstene, C.; Baltay, C.; Dhawan, S.; Kwon, Y.-J.
Letter of intent describing SiD (Silicon Detector) for consideration by the International Linear Collider IDAG panel. This detector concept is founded on the use of silicon detectors for vertexing, tracking, and electromagnetic calorimetry. The detector has been cost-optimized as a general-purpose detector for a 500 GeV electron-positron linear collider.
... VESSELS General Provisions § 28.60 Exemption letter. (a) Types of exemptions. (1) Specific exemption means... for an exemption of either type must be in writing, have specific reasons for the request, and be sent... vessel to which any exemption applies. (e) Right of appeal. Any person directly affected by a decision or...
Cole, Leonard A
.... Library of Congress Cataloging-in-Publication Data Cole, Leonard A., 1933The anthrax letters : a medical detective story / Leonard A. Cole. p. cm. Includes bibliographical references and index. ISBN 0-309-08881-X - ISBN 0-309-52584-5 (PDF) 1. Bioterrorism- United States. 2. Anthrax- United States. 3. Postal service- United States. 4. Victims of...
Discusses in depth the film "Cartas del parque" ("Letters from the Park"), the first of six films in the "Amores Dificiles" series. Notes that the film is pervaded by the traditional overdetermination of gender roles. Suggests that an intrusive and authoritative narrator makes of this both a "readerly" and a…
Items 1 - 19 of 19 ... African Journals Online: Browse Alphabetically -- letter T ... and economic aspects of management and conservation of tropical flora and fauna. ... Les principaux thèmes qui y sont abordés recouvrent les axes de recherche ...
... 42 Public Health 1 2010-10-01 2010-10-01 false Charge letter. 93.202 Section 93.202 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON RESEARCH...
This standard describes the basic principles, requirements, and methods for qualifying Class 1E protective relays and auxiliaries such as test and control switches, terminal blocks, and indicating lamps for applications in nuclear power generating stations. When properly employed it can be used to demonstrate the design adequacy of such equipment under normal, abnormal, design basis event and post design basis event conditions in accordance with ANSI/IEEE Std 323-1983. When protective relays and auxiliaries are located in areas not subject to harsh environments, environmental qualification is not required. Protective relays and auxiliaries located inside primary containment in a nuclear power generating station present special conditions beyond the scope of this document. The qualification procedure presented is generic in nature. Other methods may be used at the discretion of the qualifier, provided the basic precepts of ANSI/IEEE Std 32301983 are satisfied
This document describes the basic requirements for the qualification of Class I electric equipment. This is equipment which is essential to the safe shutdown and isolation of the reactor or whose failure or damage could result in significant release of radioactive material. The purpose of this document is to provide guidance for demonstrating the qualifications of electrical equipment as required in the IEEE Std 279 -- Criteria for Nuclear Power Generating Station Protection Systems, and IEEE Std 308 -- Criteria for Class 1E Electric Systems for Nuclear Power Generating Stations. The qualification methods described may be used in conjunction with the Guides for qualifying specific types of equipment, (see Foreword), for updating qualification following modifications or for qualifying equipment for which no applicable Guide exists
Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.
Pena, Ivonne; Martinez-Anido, Carlo Brancucci; Hodge, Bri-Mathias
This article describes a new publicly available version of the IEEE 118-bus test system, named NREL-118. The database is based on the transmission representation (buses and lines) of the IEEE 118-bus test system, with a reconfigured generation representation using three regions of the US Western Interconnection from the latest Western Electricity Coordination Council (WECC) 2024 Common Case . Time-synchronous hourly load, wind, and solar time series are provided for over one year (8784 hours). The public database presented and described in this manuscript will allow researchers to model a test power system using detailed transmission, generation, load, wind, and solar data. This database includes key additional features that add to the current IEEE 118-bus test model, such as: the inclusion of 10 generation technologies with different heat rate functions, minimum stable levels and ramping rates, GHG emissions rates, regulation and contingency reserves, and hourly time series data for one full year for load, wind and solar generation.
Full Text Available IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802 for wireless LANs. It has specified an additional physical layer (PHY to support higher data rates, and is termed as the orthogonal frequency division multiplexing (OFDM. In order to exploit its benefits, one of the medium access control (MAC protocols specified in the IEEE 802.11 specification is called distributed coordination function (DCF. DCF is a carrier sense multiple access with collision avoidance (CSMA/CA scheme with slotted binary exponential backoff. The frames can be transmitted using the basic access scheme or the RTS/CTS scheme in DCF. It was demonstrated previously that the RTS/CTS mechanism works well in most scenarios for the previously specified PHYs. In this work, a simple simulator is developed to verify the scalability of the RTS/CTS mechanism over OFDM PHY, which supports much higher data rates.
Sreejithlal, A.; Ajith, Jose
IEEE 1451 standard defines a standard interface for connecting transducers to microprocessor based data acquisition systems, instrumentation systems, control and field networks. Smart transducer interface module (STIM) acts as a unit which provides signal conditioning, digitization and data packet generation functions to the transducers connected to it. This paper describes the implementation of a microcontroller based smart transducer interface module based on IEEE 1451.2 standard. The module, implemented using ADuc847 microcontroller has 2 transducer channels and is programmed using Embedded C language. The Sensor system consists of a Network Controlled Application Processor (NCAP) module which controls the Smart transducer interface module (STIM) over an IEEE1451.2-RS232 bus. The NCAP module is implemented as a software module in C# language. The hardware details, control principles involved and the software implementation for the STIM are described in detail.
IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960-1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics. 7 refs
Ma Mingchao; Chen Jianfeng; Shen Liren; Jiang Geyang
Background: Time synchronization is one of the core technology of realizing the real-time control of accelerator under the distributed control system architecture. The ordinary crystal frequency deviation of IEEE 1588 causes low synchronous accuracy, which doesn't meet the needs of high precision synchronization. Purpose: This paper proposes an algorithm to improve the synchronization precision caused by the crystal frequency deviation. Methods: According to the basic principle of IEEE 1588 time synchronization, a dynamic frequency compensation (DFC) algorithm module was designed and a test platform was built to verify the feasibility and practicability of the algorithm. The influence of the synchronous cycle and delay jitter of the switch on the synchronization accuracy were analyzed. Results: Experimental results showed the great precision improvement of synchronization after using DFC algorithm. Conclusion: Low synchronous accuracy caused by the crystal frequency deviation can be improved by using DFC algorithm implemented for precision time protocol (PTP) of IEEE 1588. (authors)
Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto
Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.
Jin, Li; Zhang, Guoan; Zhu, Xiaojun
The back-off procedure is one of the media access control technologies in 802.11P communication protocol. It plays an important role in avoiding message collisions and allocating channel resources. Formal methods are effective approaches for studying the performances of communication systems. In this paper, we establish a discrete time model for the back-off procedure. We use Markov Decision Processes (MDPs) to model the non-deterministic and probabilistic behaviors of the procedure, and use the probabilistic computation tree logic (PCTL) language to express different properties, which ensure that the discrete time model performs their basic functionality. Based on the model and PCTL specifications, we study the effect of contention window length on the number of senders in the neighborhood of given receivers, and that on the station’s expected cost required by the back-off procedure to successfully send packets. The variation of the window length may increase or decrease the maximum probability of correct transmissions within a time contention unit. We propose to use PRISM model checker to describe our proposed back-off procedure for IEEE802.11P protocol in vehicle network, and define different probability properties formulas to automatically verify the model and derive numerical results. The obtained results are helpful for justifying the values of the time contention unit.
Wang, Liang-Hung; Chen, Tsung-Yen; Lin, Kuang-Hao; Fang, Qiang; Lee, Shuenn-Yuh
This paper presents a wireless biosignal acquisition system-on-a-chip (WBSA-SoC) specialized for electrocardiogram (ECG) monitoring. The proposed system consists of three subsystems, namely, 1) the ECG acquisition node, 2) the protocol for standard IEEE 802.15.4 ZigBee system, and 3) the RF transmitter circuits. The ZigBee protocol is adopted for wireless communication to achieve high integration, applicability, and portability. A fully integrated CMOS RF front end containing a quadrature voltage-controlled oscillator and a 2.4-GHz low-IF (i.e., zero-IF) transmitter is employed to transmit ECG signals through wireless communication. The low-power WBSA-SoC is implemented by the TSMC 0.18-μm standard CMOS process. An ARM-based displayer with FPGA demodulation and an RF receiver with analog-to-digital mixed-mode circuits are constructed as verification platform to demonstrate the wireless ECG acquisition system. Measurement results on the human body show that the proposed SoC can effectively acquire ECG signals.
Velan, Hadas; Frost, Ram
We examined the effects of letter transposition in Hebrew in three masked-priming experiments. Hebrew, like English has an alphabetic orthography where sequential and contiguous letter strings represent phonemes. However, being a Semitic language it has a non-concatenated morphology that is based on root derivations. Experiment 1 showed that transposed-letter (TL) root primes inhibited responses to targets derived from the non-transposed root letters, and that this inhibition was unrelated to relative root frequency. Experiment 2 replicated this result and showed that if the transposed letters of the root created a nonsense-root that had no lexical representation, then no inhibition and no facilitation were obtained. Finally, Experiment 3 demonstrated that in contrast to English, French, or Spanish, TL nonword primes did not facilitate recognition of targets, and when the root letters embedded in them consisted of a legal root morpheme, they produced inhibition. These results suggest that lexical space in alphabetic orthographies may be structured very differently in different languages if their morphological structure diverges qualitatively. In Hebrew, lexical space is organized according to root families rather than simple orthographic structure, so that all words derived from the same root are interconnected or clustered together, independent of overall orthographic similarity.
Full Text Available We present a novel model of IEEE 802.11 EDCA with support for analysing networks with misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the model by extensive simulation analysis and by comparing it to three other IEEE 802.11 models. The results show that our model behaves satisfactorily and outperforms other widely acknowledged models. Secondly, a comparison with simulation results in several scenarios with misbehaving nodes proves that our model performs correctly for these scenarios. The proposed model can, therefore, be considered as an original contribution to the area of EDCA models and backoff misbehaviour.
by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.
V. Balaji; S. Anand; C.R. Hota; G. Raghurama
In this paper we present a Cooperative Spectrum Sensing (CSS) algorithm for Cognitive Radios (CR) based on IEEE 802.22Wireless Regional Area Network (WRAN) standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration) to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22) within a time constraint (channel sensing time). To meet this objectiv...
Sayef Azad Sakin; Md. Abdur Razzaque; Mohammad Mehedi Hassan; Atif Alamri; Nguyen H. Tran; Giancarlo Fortino
Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a s...
Liu, Sifeng; Advances in Grey Systems Research
This book contains contributions by some of the leading researchers in the area of grey systems theory and applications. All the papers included in this volume are selected from the contributions physically presented at the 2009 IEEE International Conference on Grey Systems and Intelligent Services, November 11 – 12, 2009, Nanjing, Jiangsu, People’s Republic of China. This event was jointly sponsored by IEEE Systems, Man, and Cybernetics Society, Natural Science Foundation of China, and Grey Systems Society of China. Additionally, Nanjing University of Aeronautics and Astronautics also invested heavily in this event with its direct and indirect financial and administrative supports.
Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.
Binsbergen, J.J. van; Drenthen, A.J.
BACKGROUND: In 1998 the Dutch College of General Practitioners (NHG) began developing patient information letters (PILs), based on the practice guidelines for family physicians (FPs) (NHG standards). Five nutritional guidance letters have since been developed with the Dutch Nutrition Center.
Full Text Available at the application layer to protect the messages against eavesdropping. However, the evolution of strong deciphering mechanisms has made conventional cryptography-based security techniques ineffective against attacks from an intruder. Figure 1: Layer protocol... communication networks with passive and active eavesdropper,” IEEE Globecom; Wireless Communication System, pp. 4868-4873, 2012.  Y. Zou, X. Wang and W. Shen, “Optimal relay selection for physical layer security in cooperative wireless networks,” IEEE...
Fitz, Matthew; La Rochelle, Jeffrey; Lang, Valerie; DeWaay, Deborah; Adams, William; Nasraty, Farah
Phenomenon: Fourth-year medical students obtain Department of Medicine (DOM) letters ("Chair" letters) to support their residency applications. Writing and interpreting DOM letters are challenging. There is heterogeneity in the letters that makes it difficult to both write and read these letters. The purpose of this study is to determine the value of new guidelines developed by a task force of clerkship directors and program directors in internal medicine and assess the implementation of these guidelines. The Clerkship Directors in Internal Medicine performed a cross-sectional survey of internal medicine clerkship directors at U.S. and Canadian medical schools in 2014. In addition, the primary author's institution reviewed 1,347 DOM letters between 2012 and 2014 to assess the implementation of these guidelines. The survey response rate was 78%. DOM letter writers reported the guidelines were better, easier to implement, and more compatible with the purpose of DOM letters than previously. Most letter readers reported that letters using the guidelines were more credible. Writers of DOM letters in lower academic ranks rated the letters with guidelines higher in several domains than those in higher academic ranks. Readers of DOM letters in higher academic ranks rated the letters with guidelines higher in several domains than those in lower academic ranks. In the DOM letters examined, the odds of meeting each guideline increased with each additional year. However, for 3 guidelines there was an initial decline in adherence from 2012 to 2013 before increasing again in 2014-the recommended length, clerkship description, and detailed narrative guidelines. Letters solely written by a chair were less likely to incorporate the guidelines. Insights: Clerkship directors often write the DOM letters and identify with the purpose of the guidelines. As writers, lower ranking academic faculty value the guidelines more than higher ranking academic faculty. As readers of DOM letters
Gustavson, D.B.; James, D.V.; Wiggers, H.A.
The Scalable Coherent Interface standard defines a new generation of interconnection that spans the full range from supercomputer memory 'bus' to campus-wide network. SCI provides bus-like services and a shared-memory software model while using an underlying, packet protocol on many independent communication links. Initially these links are 1 GByte/s (wires) and 1 GBit/s (fiber), but the protocol scales well to future faster or lower-cost technologies. The interconnect may use switches, meshes, and rings. The SCI distributed-shared-memory model is simple and versatile, enabling for the first time a smooth integration of highly parallel multiprocessors, workstations, personal computers, I/O, networking and data acquisition
Lenke, Nils; Roudet, Nicolas; Tilton, Hereward
The authors provide a transcription, translation, and evaluation of nine newly discovered letters from the alchemist Michael Maier (1568-1622) to Gebhardt Johann von Alvensleben (1576-1631), a noble landholder in the vicinity of Magdeburg. Stemming from the final year of his life, this correspondence casts new light on Maier's biography, detailing his efforts to secure patronage amid the financial crisis of the early Thirty Years' War. While his ill-fated quest to perfect potable gold continued to form the central focus of his patronage suits, Maier also offered his services in several arts that he had condemned in his printed works, namely astrology and "supernatural" magic. Remarks concerning his previously unknown acquaintance with Heinrich Khunrath call for a re-evaluation of Maier's negotiation of the discursive boundaries between Lutheran orthodoxy and Paracelsianism. The letters also reveal Maier's substantial contribution to a work previously ascribed solely to the English alchemist Francis Anthony.
Examines how metadiscourse is used to create a positive corporate image in 137 CEOs' letters, showing how CEOs use nonpropositional material to realize rational, credible, and affective appeals. Reveals the essentially rhetorical nature of CEOs' letters by comparing the frequency and distribution of metadiscourse in their letters and directors'…
Gosseye, L.; Blom, F.; Leerintveld, A.
Return to Sender takes as its starting point Constantijn Huygens’ letters and shows us the author in his different guises: intimus of René Descartes, translator of John Donne, collector of art, writer of flirtatious love letters and the author of a long consolatory letter-poem for an ailing friend
Mason, Richard W.; Schroeder, Mark P.
Letters of reference are commonly used in acquiring a job in education. Despite serious issues of validity and reliability in writing and evaluating letters, there is a dearth of research that systematically examines the evaluation process and defines the constructs that define high quality letters. The current study used NVivo to examine 160…
Mason, Richard W.; Schroeder, Mark P.
Letters of reference are widely used as an essential part of the hiring process of newly licensed teachers. While the predictive validity of these letters of reference has been called into question it has never been empirically studied. The current study examined the predictive validity of the quality of letters of reference for forty-one student…
Omtzigt, D.; Hendriks, A.W.C.J.; Kolk, H.H.J.
Little is known about the role of the magno system in reading. One important hypothesis is that this system is involved in the allocation of attention. We reasoned that the presentation of a single letter automatically draws attention to this letter, whereas in the case of a flanked letter, an
Full Text Available Given that health is so relevant for global productivity and competitiveness, and that the Information and Communications Technology (ICTs play an important role in all of the productivity factors, this work makes use of the ICTs in health matters proposing the to use a WiFi oximeter. This article describes the operating principles of a Pulse Oximeter (PO which is an opto-electronic non-invasive medical instrument capable of measuring changes in heart rate (HR and SpO2 at the fingertip and its upgrade to the standards; HL7 and IEEE 11073-10404:2008, its design, and its validation against the three existing devices. Variables (SpO2%, Ppm and Temperature were compared, and its performance and impact were discussed the addition of the WiFi technology allows a better communication between devices, causing a greater impact in global competiveness.
Sotiropoulos, Anastasios D.
Chaotic music is composed from a proposed iterative map depicting the letter m, relating the pitch, duration and loudness of successive steps. Each of the two curves of the letter m is based on the classical logistic map. Thus, the generating map is xn+1 = r xn(1/2 - xn) for xn between 0 and 1/2 defining the first curve, and xn+1 = r (xn - 1/2)(1 - xn) for xn between 1/2 and 1 representing the second curve. The parameter r which determines the height(s) of the letter m varies from 2 to 16, the latter value ensuring fully developed chaotic solutions for the whole letter m; r = 8 yielding full chaotic solutions only for its first curve. The m-model yields fixed points, bifurcation points and chaotic regions for each separate curve, as well as values of the parameter r greater than 8 which produce inter-fixed points, inter-bifurcation points and inter-chaotic regions from the interplay of the two curves. Based on this, music is composed from mapping the m- recurrence model solutions onto actual notes. The resulting musical score strongly depends on the sequence of notes chosen by the composer to define the musical range corresponding to the range of the chaotic mathematical solutions x from 0 to 1. Here, two musical ranges are used; one is the middle chromatic scale and the other is the seven- octaves range. At the composer's will and, for aesthetics, within the same composition, notes can be the outcome of different values of r and/or shifted in any octave. Compositions with endings of non-repeating note patterns result from values of r in the m-model that do not produce bifurcations. Scores of chaotic music composed from the m-model and the classical logistic model are presented.
Full Text Available Shakespeare has exerted a powerful influence on Japanese literature since he was accepted in the second half of the nineteenth century. Particularly Hamlet has had a strong impact on Japanese men of letters and provided them with the impetus to revive the play in contemporary literature. In this paper I discuss how they have utilized Hamlet for their creative activity and enriched Japanese literature.
Hospital executives who haven't been in the market recently for a new or renewed letter of credit will find it a more expensive way to back their variable-rate debt. Annual fees are surging, for reasons ranging from an international banking agreement that goes into effect next year to more conservative fee structures being instituted because of bad loans made by some banks in the past decade.
Jensen-Rix, Robert William
The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...
C. Shankland; M.B. van der Zwaag
textabstractWe specify the tree identify protocol of the IEEE 1394 high performance serial multimedia bus at three different levels of detail using $mu$CRL. We use the cones and foci verification technique of Groote and Springintveld to show that the descriptions are equivalent under branching
Ji, J.; Liu, H.; Li, Q.
This paper presents an implementation of multi-rate SerDes transceiver for IEEE 1394b applications. Simple and effective pre-emphasis and equalizer circuits are used at transmitter and receiver, respectively. A phase interpolator based clock and data recovery circuit with optimized linearity is a...
Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...
Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...
Dobinson, Robert W; Haas, S; Martin, B; Le Vine, M J; Saka, F
The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging. 8 Refs.
Dobinson, Robert W; Haas, S W; Martin, B; Le Vine, M J; Saka, F
The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging.
Kanevskaia, Olia; Zingales, Nicolo
In 2015, the Institute of Electrical and Electronics Engineers (IEEE) Standardization Association made some controversial changes to its patent policy. The changes include a recommended method of calculation of FRAND royalty rates, and a request to members holding a standard essential patent (SEP)
Home; public; Volumes; reso; 021; 01; 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News. IAS Logo. 29th Mid-year meeting. Posted on 19 ...
Capacitor Discharges, Proc IEEE 113, p. able operation on Nova we are examing alter- 1549 (1966). nate switch gas (Ar:N 2 :SF 6 ) and electrode material...VOLTTA-KILOVOLTS PLATE VO LTAM --LOVLTS Figure 8. Constant Current Curve for the X2097U Figure 11. Constant Current Curve for the X2097V at 2000 Volt
van Eenennaam, Martijn; Hendriks, Luuk; Karagiannis, Georgios; Heijenk, Geert
The IEEE 802.11p MAC technology can be used to provide connectivity for real-time vehicle control known as Cooperative Adaptive Cruise Control. Due to the real-time nature of this system, it is paramount the delay of the received information is as small as possible. This paper researches the Oldest
Yasmin M. Amin
Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.
These proceedings compile the papers presented at the international conference (1988) sponsored by IEEE Council on ''Robotics and Automation''. The subjects discussed were: automation and robots of nuclear power stations; algorithms of multiprocessors; parallel processing and computer architecture; and U.S. DOE research programs on nuclear power plants
Maksymiuk, L.; Siuzdak, J.
In this paper there are presented measurements concerning performance analysis of the IEEE 802.11 signal distribution over multimode fiber based passive optical network. In the paper there are addressed three main sources of impairments: modal noise, frequency response fluctuation of the multimode fiber and non-linear distortion of the signal in the receiver.
Mou, L.; Zhu, X.; Vakalopoulou, M.; Karantzalos, K.; Paragios, N.; Saux, Le B.; Moser, G.; Tuia, D.
In this paper, the scientific outcomes of the 2016 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society are discussed. The 2016 Contest was an open topic competition based on a multitemporal and multimodal dataset,
Aust, Stefan; Venkatesha Prasad, R.; Niemegeers, Ignas G M M
Several service applications have been reported by many who proposed the use of wireless LANs (WLANs) over a wide variety of outdoor deployments. In particular, the upcoming IEEE 802.11ah WLAN protocol will enable a longer transmission range between WLAN access points (APs) and stations (STAs) up to
Full Text Available the beamswitching technique for switched parasitic array (SPA) and electronically steerable parasitic array radiator (ESPAR) antennas in the drivers for IEEE802.11 WLAN devices. The modifications of the open source drivers (ath5k and ath9k) to enable real...
Full Text Available Managers spend majority of their time communicating in several forms: meeting, face-to –face dis- cussion, letters, emails etc. Also more and more employees realize that communication is a very im- portant part of their work because a lot of their work activities are based on teamwork among workers in different functional groups. This is the reason why communication has become more important in companies. The experience shows that there are significant differences in manners of communication and that it appears to be a very important factor which makes some organizations more successful than others. Communication is the most important for managers because research shows that the spent long period in work time in communication.
Full Text Available Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.
Passafiume, Marco; Maddio, Stefano; Cidronali, Alessandro
Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI) measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality) has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.
Lopez, J.M.; Ruiz, M.; Borrego, J.; Arcas, G. de; Barrera, E.; Vega, J.
Event timing and synchronization are two key aspects to improve in the implementation of distributed data acquisition (dDAQ) systems such as the ones used in fusion experiments. It is also of great importance the integration of dDAQ in control and measurement networks. This paper analyzes the applicability of the IEEE1588 and EPICS standards to solve these problems, and presents a hardware module implementation based in both of them that allow adding these functionalities to any DAQ. The IEEE1588 standard facilitates the integration of event timing and synchronization mechanisms in distributed data acquisition systems based on IEEE 803.3 (Ethernet). An optimal implementation of such system requires the use of network interface devices which include specific hardware resources devoted to the IEE1588 functionalities. Unfortunately, this is not the approach followed in most of the large number of applications available nowadays. Therefore, most solutions are based in software and use standard hardware network interfaces. This paper presents the development of a hardware module (GI2E) with IEEE1588 capabilities which includes USB, RS232, RS485 and CAN interfaces. This permits to integrate any DAQ element that uses these interfaces in dDAQ systems in an efficient and simple way. The module has been developed with Motorola's Coldfire MCF5234 processor and National Semiconductors's PHY DP83640T, providing it with the possibility to implement the PTP protocol of IEEE1588 by hardware, and therefore increasing its performance over other implementations based in software. To facilitate the integration of the dDAQ system in control and measurement networks the module includes a basic Input/Output Controller (IOC) functionality of the Experimental Physics and Industrial Control System (EPICS) architecture. The paper discusses the implementation details of this module and presents its applications in advanced dDAQ applications in the fusion community.
This standard provides direction for establishing type tests which may be used in qualifying Class 1E electric cables, field splices, and other connections for service in nuclear power generating stations. General guidelines for qualifications are given in IEEE Std 323-1974, Standard for Qualifying Class IE Electric Equipment for Nuclear Power Generating Stations. Categories of cables covered are those used for power control and instrumentation services. Though intended primarily to pertain to cable for field installation, this guide may also be used for the qualification of internal wiring of manufactured devices. This guide does not cover cables for service within the reactor vessel
Farooq, Jahanzeb; Bro, Lars; Karstensen, Rasmus Thystrup
Communications-Based Train Control (CBTC) is a modern signalling system that uses radio communication to transfer train control information between train and wayside. The trackside networks in these systems are mostly based on conventionalinfrastructureWi-Fi(IEEE802.11).Itmeansatrain has to conti...
The content of Gerbert's "scientific" letters is analyzed in detail, with special emphasis on arithmetical and geometrical issues, such as multiplication and division rules related to the use of abacus, superparticular numbers and evaluation of the area of an equilateral triangle. It is shown that Gerbert's area formula, albeit based on rational fractions, could hardly be conceived without knowledge of Pythagoras' theorem. This fact casts a light also on the astronomical tools created by Gerbert, where the didactical aspect cannot be separated from the accuracy of the demonstrations and of the measurements.
Germán A. de la Reza
Full Text Available ABSTRACT One of the fundamental objectives of The Jamaica Letter is the reflection on the features that should have the international order after the fall of the Spanish Empire. For its organization, Simon Bolívar appeals to the amphictyonic assemblies of classical Greece and invokes the Pan-European project of the Abbe Saint Pierre. This article traces the documentary sources from which Bolivar derives his notion of confederal union and inspires the unions treaties from 1822 to 1826.
This letter of the DGEMP (General Direction of the Energy and the Raw Materials) deals with the following four main topics: the main recommendations of the final report of the working Group ''Factor 4'' concerning the energy policy; the energy conservation certificates as a tool of the energy control with their implication in the residential and ternary sector; the increase of the solar water heaters and heat pumps sales thanks to the tax credits; the California example facing the climatic change and the energy policy. (A.L.B.)
Pasachoff, Jay M.; Fraknoi, Andrew
This Resource Letter provides a guide to the available literature, listing selected books, articles, and online resources about scientific, cultural, and practical issues related to observing solar eclipses. It is timely, given that a total solar eclipse will cross the continental United States on August 21, 2017. The next total solar eclipse path crossing the U.S. and Canada will be on April 8, 2024. In 2023, the path of annularity of an annular eclipse will cross Mexico, the United States, and Canada, with partial phases visible throughout those countries.
Full Text Available The Wireless Sensor Networks are widely used to detect and exchange information and in recent years they have been increasingly involved in Intelligent Transportation System applications, especially in dynamic management of signalized intersections. In fact, the real-time knowledge of information concerning traffic light junctions represents a valid solution to congestion problems. In this paper, a wireless network architecture, based on IEEE 802.15.4 or Bluetooth, in order to monitor vehicular traffic flows near to traffic lights, is introduced. Moreover, an innovative algorithm is proposed in order to determine dynamically green times and phase sequence of traffic lights, based on measured values of traffic flows. Several simulations compare IEEE 802.15.4 and Bluetooth protocols in order to identify the more suitable communication protocol for ITS applications. Furthermore, in order to confirm the validity of the proposed algorithm for the dynamic management of traffic lights, some case studies have been considered and several simulations have been performed.
Kurniawan Saputro, Adi; Sumpeno, Surya; Hariadi, Mochamad
Museum is a place to keep the historic objects and historical education center to introduce the nation’s culture. Utilizing technology in a museum to become a smart city is a challenge. Internet of thing (IOT) is a technological advance in Information and communication (ICT) that can be applied in the museum The current ICT development is not only a transmission medium, but Augmented Reality technology is also being developed. Currently, Augmented Reality technology creates virtual objects into the real world using markers or images. In this study, researcher used signals to make virtual objects appear in the real world using the IEEE 802.14.5 protocol replacing the Augmented Reality marker. RSSI and triangulation are used as a substitute microlocation for AR objects. The result is the performance of Wireless Sensor Network could be used for data transmission in the museum. LOS research at a distance of 15 meters with 1000 ms delay found 1.4% error rate and NLOS with 2.3% error rate. So it can be concluded that utilization technology (IOT) using signal wireless sensor network as a replace for marker augmented reality can be used in museum
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.
This document describes the basic requirements of a type test program with the objective of verifying that a module used as Class 1E equipment in a nuclear power generating station meets or exceeds its design specifications. This document is limited to class 1E modules from and including the sensor through the logic circuitry of the final actuation devices. Except for those that are part of a module, switchgear, cables, connections, motors, valve actuators, station batteries, and penetrations are not included and are covered by other IEEE documents. The purpose of this document is to supplement the procedures and requirements given in IEEE Std 323-1974  for type testing Class 1E modules, thereby providing directions for establishment of a type test program which will obtain the required test data and yield the required documentation of test methods and results. This standard is structured to present to the user the principal performance characteristics and environmental parameters which must be considered in designing a type test program for any give Class 1E module. These modules range from tiny sensors to complete racks or cabinets full of equipment that may be located inside or outside containment. The Class 1E modules are required to perform their function before, during, or after, or all, any design basis event specified for the module. The vast variety of modules covered by this document precludes the listing here of specific requirements for each type test
Vergara-Martínez, Marta; Perea, Manuel; Gómez, Pablo; Swaab, Tamara Y.
The encoding of letter position is a key aspect in all recently proposed models of visual-word recognition. We analyzed the impact of lexical frequency on letter position assignment by examining the temporal dynamics of lexical activation induced by pseudowords extracted from words of different frequencies. For each word (e.g., BRIDGE), we created two pseudowords: A transposed-letter (TL: BRIGDE) and a replaced-letter pseudoword (RL: BRITGE). ERPs were recorded while participants read words and pseudowords in two tasks: Semantic categorization (Experiment 1) and lexical decision (Experiment 2). For high-frequency stimuli, similar ERPs were obtained for words and TL-pseudowords, but the N400 component to words was reduced relative to RL-pseudowords, indicating less lexical/semantic activation. In contrast, TL- and RL-pseudowords created from low-frequency stimuli elicited similar ERPs. Behavioral responses in the lexical decision task paralleled this asymmetry. The present findings impose constraints on computational and neural models of visual-word recognition. PMID:23454070
The author, by means of a letter to the deputy Christian Bataille, presents arguments to the shutdown of old nuclear power plants. He points out the environmental and economical arguments in favor of a decrease of the nuclear power use in France. (A.L.B.)
One of the activities of the PNL Vitrification Technology Development (PVTD) Project is to assist the Tank Waste Remediation Systems (TWRS) Program in determining which melter systems should be performance tested for potential implementation in the high-level waste (HLW) vitrification plant. The Richland Operations Office (RL) has recommended that the Cold Crucible Melter (CCM) be evaluated as a candidate ''next generation'' melter. As a result, the CCM System Evaluation cost account was established under the PVTD Project so that the CCM could be initially assessed on a high-priority basis. This letter report summarizes a brief initial review and assessment of the CCM. Using the recommendations made in this document, Westinghouse Hanford Company (WHC) and RL will make a decision regarding the urgency of performance testing the CCM. If the decision is favorable, a subcontract will be negotiated for performance testing of a CCM using Hanford HLW simulants in a pilot-scale facility. Because of the aggressive nature of the schedule, the CCM evaluation was not rigorous. The evaluation consisted of a literature review and interviews with proponents of the technology during a recent trip to France. This letter report summarizes the evaluation and makes recommendations regarding further work in this area
The resource letter covers the general subject of superfluid helium and treats 3 He and 3 He-- 4 He mixtures as well as 4 He. No effort has been made to include the fascinating experiments on either solid helium or the equally fascinating work on adsorbed helium where the helium coverage is below that necessary for superfluidity. An earlier resource letter by C. T. Lane [Am. J. Phys. 35, 367 (1967)] may be consulted for additional comments on some of the cited earlier manuscripts, but the present work is self-contained and may be used independently. Many high-quality research reports have not been cited here. Rather, the author has tried in most cases to include works particularly readable or relevant. There is a relatively heavy emphasis on experimental references. The primary reason is that these works tend to be more generally readable. No doubt some works that might have been included, have not, and for this the author takes responsibility with apology. Articles selected for incorporation in a reprint volume (to be published separately by the American Association of Physics Teachers) are marked with an asterisk(*). Following each referenced work the general level of difficulty is indicated by E, I, or A for elementary, intermediate, or advanced
GASIMOVA NAILA; HUSEYNOVA FARIDA
Every business letter is written to a purpose; each has its own special aim, and one of the features of this paper is its use of explanation to show how the various letters set out to achieve their aims. Most people don’t really notice the quality of the writing they read-they simply react positively, negatively, or not at all. But if there’s a better way to write, why not to use it! In the article some useful rules for written communication are described in order to gain yourself a great adv...
María Luz Mandingorra Llavata
Full Text Available The aim of this paper is to reconstruct the morphological evolution of the royal diplomatic letter in the Crown of Aragon between the reigns of Peter the Ceremonious and Alfonso the Magnanimous. During this period, the form taken by this document was adapted to its contents and those in receipt of it, according to the principles of the Ars dictaminis, without relinquishing its material and textual simplicity in the process. With its adaptation to the communicative requirements of the monarchy, the royal diplomatic letter became an instrument of governance that helped to strengthen royal power and anticipated mechanisms that would be fully developed during the Early Modern Period.
The data acquisition systems of the next generation High Energy Physics experiments at the Large Hadron Collider (LHC) at CERN will rely on high-speed point-to-point links and switching networks for their higher level trigger and event building systems. This thesis provides a detailed evaluation of the DS-Link and switch technology, which is based on the IEEE 1355 standard for Heterogeneous Interconnect (HIC). The DS-Link is a bidirectional point-to-point serial interconnect, operating at speeds up to 200 MBaud. The objective of this thesis was to study the performance of the IEEE 1355 link and switch technology and to demonstrate that switching networks using this technology would scale to meet the requirements of the High Energy Physics applications
Diplomska naloga se osredotoča na problem varovanja brezžičnih omrežij, zasnovanih po standardu IEEE 802.11. Opisano je združenje IEEE in njihova specifikacija standardov z oznako 802, prav tako pa so opisani tudi standardi, protokoli in tehnike varovanja in zaščite omrežij, ki delujejo po tej specifikaciji. Predstavljeno je tudi trenutno stanje varnosti brezžičnih omrežij na področju mesta Ptuj, opisani in prikazani pa so tudi različni pristopi za zlorabo brezžičnih omrežij, skupaj s program...
Full Text Available The improvement of transient stability of power system was one of the most challenging research areas in power engineer.The main aim of this paper was transient stability analysis and improvement of IEEE 9 bus system. These studies were computed using POWER WORLD SIMULATOR. The IEEE 9 bus system was modelled in power world simulator and load flow studies were performed to determine pre-fault conditions in the system using Newton-Raphson method. The transient stability analysis was carried out using Runga method during three-phase balanced fault. For the improvement transient stability, the general methods adopted were fast acting exciters, FACT devices and addition of parallel transmission line. These techniques play an important role in improving the transient stability, increasing transmission capacity and damping low frequency oscillations.
Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas
The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems.
Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.
Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2kV, and 15kV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15kV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs
Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.
Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2KV, and 15KV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15KV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs
Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin
IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly.
Ray, Sayan K.; Pawlikowski, Krzysztof; Sirisena, Harsha
We propose a modification of the IEEE 802.16e hard handover (HHO) procedure, which significantly reduces the handover latency constraint of the original HHO procedure in IEEE 802.16e networks. It allows a better handling of the delay-sensitive traffic by avoiding unnecessary time-consuming scanning and synchronization activity as well as simplifies the network re-entry procedure. With the help of the backhaul network, it reduces the number of control messages in the original handover policy, making the handover latency acceptable also for real-time streaming traffic. Preliminary performance evaluation studies show that the modified handover procedure is able to reduce the total handover latency by about 50%.
Full Text Available We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the capacity are explained and methods to reduce these overheads are also presented. The advantage of a simple model is that the effect of each decision and sensitivity to various parameters can be seen easily. We illustrate the model by estimating the capacity for three sample applications—Mobile TV, VoIP, and data. The analysis process helps explain various features of IEEE 802.16e Mobile WiMAX. It is shown that proper use of overhead reducing mechanisms and proper scheduling can make an order of magnitude difference in performance. This capacity evaluation method can also be used for validation of simulation models.
Rakia, Tamer; Yang, Hong Chuan; Gebali, Fayez; Alouini, Mohamed-Slim
In this letter, we consider a dual-hop heterogeneous visible light communication (VLC)/radio frequency (RF) communication system to extend the coverage of VLC systems. Besides detecting the information over VLC link, the relay is able to harvest
This paper presents information describing the concern for nuclear power plant electrical equipment maintenance and the IEEE Nuclear Power Engineering Committee's method to address that concern. That method includes the creation of Working Group 3.3, ''Maintenance Good Practices'' which is developing specific maintenance good practice documents, supporting technical information exchange, and providing a vehicle to promote practices which can reduce cost and enhance plant safety. The foundation for that effort is the utilization of Reliability concepts
Land, Susan K; Walz, John W
Practical Support for Lean Six Sigma Software Process Definition: Using IEEE Software Engineering Standards addresses the task of meeting the specific documentation requirements in support of Lean Six Sigma. This book provides a set of templates supporting the documentation required for basic software project control and management and covers the integration of these templates for their entire product development life cycle. Find detailed documentation guidance in the form of organizational policy descriptions, integrated set of deployable document templates, artifacts required in suppo
Zhou, Xia; Wu, Wenli; Bao, Shudi
IEEE Std 1708-2014 breaks through the traditional standards of cuff based blood pressure measuring devices and establishes a normative definition of wearable cuffless blood pressure measuring devices and the objective performance evaluation of this kind of devices. This study firstly introduces the background of the new standard. Then, the standard details will be described, and the impact of cuffless blood pressure measuring devices with the new standard on manufacturers and end users will be addressed.
Presented is the Institute of Electrical and Electronics Engineers, Inc. (IEEE) guide for general principles of reliability analysis of nuclear power generating station protection systems. The document has been prepared to provide the basic principles needed to conduct a reliability analysis of protection systems. Included is information on qualitative and quantitative analysis, guides for failure data acquisition and use, and guide for establishment of intervals
The Institute of Electrical and Electrical Engineers, Inc. (IEEE) standards for electrical equipment (Class IE) for nuclear power generating stations are given. The standards are to provide guidance for demonstrating and documenting the adequacy of electric equipment used in all Class IE and interface systems. Representative in containment design basis event conditions for the principal reactor types are included in the appendixes for guidance in enviromental simulation
Holcombe, Alex O; Nguyen, Elizabeth H L; Goodbourn, Patrick T
Capacity limits hinder processing of multiple stimuli, contributing to poorer performance for identifying two briefly presented letters than for identifying a single letter. Higher accuracy is typically found for identifying the letter on the left, which has been attributed to a right-hemisphere dominance for selective attention. Here, we use rapid serial visual presentation (RSVP) of letters in two locations at once. The letters to be identified are simultaneous and cued by rings. In the first experiment, we manipulated implied reading direction by rotating or mirror-reversing the letters to face to the left rather than to the right. The left-side performance advantage was eliminated. In the second experiment, letters were positioned above and below fixation, oriented such that they appeared to face downward (90° clockwise rotation) or upward (90° counterclockwise rotation). Again consistent with an effect of implied reading direction, performance was better for the top position in the downward condition, but not in the upward condition. In both experiments, mixture modeling of participants' report errors revealed that attentional sampling from the two locations was approximately simultaneous, ruling out the theory that the letter on one side was processed first, followed by a shift of attention to sample the other letter. Thus, the orientation of the letters apparently controls not when the letters are sampled from the scene, but rather the dynamics of a subsequent process, such as tokenization or memory consolidation. Implied reading direction appears to determine the letter prioritized at a high-level processing bottleneck. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Items 1 - 50 of 62 ... Le journal publie des communications en Anglais et en Français de tous les domains ... et de l'environnement, le financement, la politique, le média, etc). ... reports, short communications, case report, Ethics Forum, Education ...
M. Udin Harun Al Rasyid
Full Text Available IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology. Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca
The IEEE has developed this document to provide direction for developing programs to seismically qualify Class 1E equipment for nuclear power generating stations. It supplements IEEE Std 323-1974, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, which describes the basic requirements for equipment qualification. The Class 1E equipment to be qualified by produres or standards established by this document are of many forms, characteristics, and materials; therefore, the document presents many acceptable methods with the intent of permitting the user to make a judicious selection from among the various options. In making such a selection, the user should choose those that best meet a particular equipment's requirements. Further, in using this document as a specification for the purchase of equipment, the many options should also be recognized and the document invoked accordingly. It is recommended that the need for specific standards for the seismic qualifiction of particular kinds of equipment be evaluated by those responsible for such documents and that consideration be given to the application of particular methods from these documents which are most suitable
IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained during the development of Fastbus (IEEE 960), Futurebus (IEEE 896.1) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor; efficient support of a coherent distributed-cache image of shared memory; and support for segmentation, bus repeaters and general switched interconnections like Banyan, Omega, or full crossbar networks. To achieve these ambitious goals, SCI must sacrifice the immediate handshake characteristic of the present generation of buses in favor of a packet-like split-cycle protocol. Wire-ORs, broadcasts, and even ordinary passive bus structures are to be avoided. However, a lower performance (1 GByte/sec per backplane instead of per processor) implementation using a register insertion ring architecture on a passive ''backplane'' appears to be possible using the same interface as for the more costly switch networks. This paper presents a summary of current directions, and reports the status of the work in progress
Full Text Available Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs. The slotted carrier sense multiple access with collision avoidance (CSMA/CA is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC delay and power consumption of CCA detection.
Alam, Muhammad Mahtab; Ben Hamida, Elyes
Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.
Lee, Bih-Hwang; Lai, Ruei-Lung; Wu, Huai-Kuei; Wong, Chi-Ming
Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA) detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS) algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC) delay and power consumption of CCA detection.
Lankenau, W.; Wetherill, T.M.
Although worldwide demand for new construction of nuclear power stations has been on a decline, the available opportunities for the design and construction of qualified electrical penetrations continues to offer challenges, requiring a highly versatile design. Versatility is necessary in order to meet unique customer requirements within the constraints of a design basis qualified to IEEE Std. 317-1983. This paper summarizes such a versatile electrical penetration designed, built and tested to IEEE Std. 317-1983. The principal features are described including major materials of construction. Some of the design constraints such as sealing requirements, and conductor density (including numerical example) are discussed. The requirements for qualification testing of the penetration assembly to IEEE Std. 317-1983 are delineated in a general sense, and some typical test ranges for preconditioning, radiation exposure, and LOCA are provided. The paper concludes by describing ways in which this versatile design has been adapted to meet unique customer requirements in a variety of nuclear power plants
Son, Kyou Jung; Hong, Sung Hyeuck; Moon, Seong-Pil; Chang, Tae Gyu; Cho, Hanjin
This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method.
Full Text Available In this paper we present a Cooperative Spectrum Sensing (CSS algorithm for Cognitive Radios (CR based on IEEE 802.22Wireless Regional Area Network (WRAN standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22 within a time constraint (channel sensing time. To meet this objective, we have developed CSS algorithm using unsupervised K-means clustering classification approach. The received energy level of each Secondary User (SU is considered as the parameter for determining channel availability. The performance of proposed algorithm is quantified in terms of detection accuracy, training and classification delay time. Further, the detection accuracy of our proposed scheme meets the requirement of IEEE 802.22 WRAN with the target probability of falsealrm as 0.1. All the simulations are carried out using Matlab tool.
Full Text Available In order to construct a successful Internet of things (IoT, reliable network construction and maintenance in a sensor domain should be supported. However, IEEE 802.15.4, which is the most representative wireless standard for IoT, still has problems in constructing a large-scale sensor network, such as beacon collision. To overcome some problems in IEEE 802.15.4, the 15.4e task group proposed various different modes of operation. Particularly, the IEEE 802.15.4e deterministic and synchronous multichannel extension (DSME mode presents a novel scheduling model to solve beacon collision problems. However, the DSME model specified in the 15.4e draft does not present a concrete design model but a conceptual abstract model. Therefore, in this paper we introduce a DSME beacon scheduling model and present a concrete design model. Furthermore, validity and performance of DSME are evaluated through experiments. Based on experiment results, we analyze the problems and limitations of DSME, present solutions step by step, and finally propose an enhanced DSME beacon scheduling model. Through additional experiments, we prove the performance superiority of enhanced DSME.
Full Text Available IEEE 802.11 WLAN utilizes a distributed function at its MAC layer, namely, DCF to access the wireless medium. Due to its distributed nature, DCF is able to guarantee working stability in a wireless medium while maintaining the assembling and maintenance cost in a low level. However, DCF is inefficient in dealing with real-time traffics due to its incapability on providing QoS. IEEE 802.11e was introduced as a supplementary standard to cope with this problem. This standard introduces an Enhanced Distributed Coordination Function (EDCF that works based on diff-Serve model and can serve multiple classes of traffics (by using different prioritizations schemes. With the emergence of new time-sensitive applications, EDCF has proved to be yet inefficient in dealing with these kinds of traffics because it could not provide network with well-differentiated QoS. In this study, we propose a novel prioritization scheme to improve QoS level in IEEE 802.11e network. In this scheme, we replace Uniform PDF with Gamma PDF, which has salient differentiating properties. We investigate the suitability and superiority of this scheme on furnishing network with well-differentiated QoS using probabilistic analysis. We strengthen our claims by extensive simulation runs.
Schiff, A.J. [Precision Measurement Instruments, Los Altos Hills, CA (United States); Kempner, L.Jr. [Bonneville Power Administration, Vancouver, BC (Canada)
Standard 693-1997 of the Institute of Electrical and Electronic Engineers (IEEE) is the recommended practice for seismic design of substations. It represents a significant improvement in the way the power industry seismically qualifies substation high-voltage equipment. This paper described the use of IEEE Standard 693 for hollow-core composite insulators that are used on high-voltage transformers and demonstrated that changes are warranted. The following four failure modes associated with the composite insulator were discussed: bond degradation, bond failure, tube degradation and tube layer delamination. The authors evaluated the IEEE 693 qualification procedure of time history shake-table and static-pull tests and were concerned about acceptance criteria. It was shown that acceptance criteria are not valid for qualifying hollow-core composites and that static-pull tests are needed after the vibration qualification tests are completed. It was suggested that more research is warranted to determine if bonding at the top part of the flange can be eliminated, thereby eliminating bond degradation. The resulting increase in system damping would improve the dynamic response of the unit. 1 ref., 10 figs.
Full Text Available This paper reports on the development of a website tool aimed at helping Spanish small and medium enterprises (SMEs staff to write their commercial correspondence in English. It describes the steps involved in the tool system design process, making an emphasis on the methodological criteria and rational that guided us to develop the site. In order to obtain the material, a corpus of commercial correspondence written in English was collected and later analysed, applying a genre-based approach as established by Bhatia (1993 and Swales (1990. The findings provided the move structure and strategies of each type of letter as well as the lexico-grammatical realizations of each move which later would be standardised and presented to be used systematically in the composition of letters with the same communicative purpose. This work illustrates how a genre-based approach can successfully be applied to ESP materials development.
Calais, Eric; Diffenbaugh, Noah; D'Odorico, Paolo; Harris, Ruth; Knorr, Wolfgang; Lavraud, Benoit; Mueller, Anne; Peterson, William; Rignot, Eric; Srokosz, Meric; Strutton, Peter; Tyndall, Geoff; Wysession, Michael; Williams, Paul
Geophysical Research Letters (GRL) is the American Geophysical Union's premier journal of fast, groundbreaking communication. It rapidly publishes high- impact,letter-length articles, and it is the top-cited multidisciplinary geosciences journal over the past 10 years, with an impact factor that increased again in 2009, to 3.204. For manuscripts submitted to GRL, the median time to first and final decision is 23 and 27 days, respectively—a 35% improvement since 2007—and the median time from submission to publication is 13 weeks for 90% of GRL papers—a 25% improvement since 2007. Among high-impact publications in the geosciences, GRL has the fastest turnaround.
Clear understanding of software related design control requirements is key to growth in the use of computers in nuclear power generating stations. Inconsistent terminology within the nuclear and software standards arena has impacted the ability of both nuclear station system engineers (i.e., the domain expert) to clearly communicate with the software/computer hardware experts. In order for computer development to occur both groups need to have a common terminology basis. Without this commonality, inappropriate application of requirements could result. This paper will present a overview of ongoing efforts within the Institute of Electrical and Electronics Engineers Nuclear Power Engineering Committee (IEEE NPEC) and the American Society of Mechanical Engineers Nuclear Quality Assurance (ASME NQA) Committee to develop this commonality
Savin, Andrej; Schwemer, Sebastian Felix
to the information society. A key component of this acquis is the prohibition of general monitoring obligations to the benefit of providers of intermediary services. It is a means to achieve at least two central objectives: the encouragement of innovation as well as the protection of fundamental rights of all...... Internet users, namely the rights protected by Articles 8 and 11 of the European Convention of Human Rights. Yet, the proposed Copyright Directive, in particular, seems to negatively affect both the domain and effect of Article 15 of the E-commerce Directive. The signatories of this open letter therefore...... urge the European Commission to take into account the human rights dimension of Article 15 of the E-commerce Directive, as made explicit by the Court of the Justice of the European Union, and to make sure its implications are carefully examined across sectors. Authors: Sophie Stalla-Bourdillon Eleonora...
Full Text Available The author in his letter to the editor presents his own vision of carrying out archives’ tasks that arise from the public principle of archives. He is concerned especially with stagnation and passive role of archives in promoting their collections. To justify his theses the author conducted a survey among a group of his friends. He asked them four questions that tested their knowledge of archives and archival collections. Answers proved earlier conjectures to be true and were similar to the author’s experience; they showed that the society has poor knowledge of archives and their collections. The author proposed some general solutions, referring especially to actions taken by museums.
Liou, H L; Brennan, N A
To provide empirical data of letter CSF for various levels of defocus under controlled conditions of luminance and age. Corrected distance visual acuities were tested at different levels of contrast and defocus. An experiment was conducted using the Medmont visual acuity tester on 10 young subjects and under normal room lighting. Empirical data of visual acuity were obtained for 7 levels of contrast (5, 10, 15, 25, 40, 60, 80%) and defocus levels of 0, +1 and +2D. A mathematical model was derived (R2=0.995) and this can be used to estimate visual acuity at various contrast levels for defocus of < or =+2D. This information is useful for the clinician as normative data and for further development of optical models to predict visual performance of the eye.
While recognizing that quantum mechanics demands serious attention, Albert Einstein in 1926 admonished fellow physicist Max Born that the theory does not bring us closer to the secrets of the Old One. Aware that there are deep mysteries that Nature intends to keep for herself, Freeman Dyson, the 94-year-old theoretical physicist, has nonetheless chronicled the stories of those who were engaged in solving some of the most challenging quandaries of twentieth-century physics. Written between 1940and the early 1980s, these letters to relatives form an historic account of modern science and its greatest players, including J.Robert Oppenheimer, Richard Feynman, Stephen Hawking,and Hans Bethe. Whether reflecting on the horrors of World War II, the moral dilemmas of nuclear development, the challenges of the space program, or the considerable demands of raising six children, Dyson offers a firsthand account of one of the greatest periods of scientific discovery of our modern age.
This 360 page softbound publication includes the following major sections, An invitation to ICOPS'97, Catamaran Resort Hotel Floor Pinas, Officers of the IEEE Nuclear and Plasma Sciences Society, Conference Information...
NIH and the Institute for Electrical and Electronics Engineering, Engineering in Medicine and Biology Society (IEEE/EMBS) hosted the third iteration of the Healthcare Innovations and Point-of-Care Technologies Conference last week.
Yundra, E.; Harsono, G. D.
This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption
.... The application of TCM combines FEC coding and M-ary modulation in one operation. The objective of this thesis is to investigate the performance of an orthogonal frequency-division multiplexing (OFDM) based IEEE...
Correia, Miguel; Sousa, Jorge; Combo, Álvaro; Rodrigues, António P.; Carvalho, Bernardo B.; Batista, António J.N.; Gonçalves, Bruno; Correia, Carlos M.B.A.; Varandas, Carlos A.F.
Highlights: ► IEEE-1588 over Ethernet protocol is implemented for the synchronization of all clock signals of an ATCA AMC carrier module. ► The ATCA hardware consists of an AMC quad-carrier main-board with PCI Express switching. ► IEEE-1588 is to be implemented on a Virtex-6 FPGA. ► Timing signals on the ATX-AMC4-PTP are managed and routed by a crosspoint-switch implemented on a Virtex-6 FPGA. ► Each clock signal source may be independently located (on each of the AMC cards, RTM or ATCA backplane). - Abstract: Control and data acquisition (C and DA) systems for Fusion experiments are required to provide accurate timing and synchronization (T and S) signals to all of its components. IPFN adopted PICMG's Advanced Telecommunications Computing Architecture (ATCA) industry standard to develop C and DA instrumentation. ATCA was chosen not only for its high throughput characteristics but also for its high availability (HA) features which become of greater importance in steady-state operation scenarios. However, the specified ATCA clock and synchronization interface may be too limited for the timing and synchronization needs in advanced Physics experiments. Upcoming specification extensions, developed by the “xTCA for Physics” workgroups, will contemplate, among others, a complementary timing specification, developed by the PICMG xTCA for Physics IO, Timing and Synchronization Technical Committee. The IEEE-1588 Precision Time Protocol (PTP) over Ethernet is one of the protocols, proposed by the Committee, aiming for precise synchronization of clocks in measurement and control systems, based on low jitter and slave-to-slave skew criteria. The paper presents an implementation of IEEE-1588 over Ethernet, in an ATCA hardware platform. The ATCA hardware consists of an Advanced Mezzanine Card (AMC) quad-carrier front board with PCI Express switching. IEEE-1588 is to be implemented on a Virtex-6 FPGA. Ethernet connectivity with the remote master clock is located on
Full Text Available This work proposes a low-cost and low-power software-defined radio open-source platform with IEEE 802.11 a/g/p wireless communication capability. A state-of-the-art version of the IEEE 802.11 a/g/p software for GNU Radio (a free and open-source software development framework is available online, but we show here that its computational complexity prevents operations in low-power general purpose processors, even at throughputs below the standard. We therefore propose an evolution of this software that achieves a faster and lighter IEEE 802.11 a/g/p transmitter and receiver, suitable for low-power general purpose processors, for which GNU Radio provides very limited support; we discuss and describe the software radio processing structuring that is necessary to achieve the goal, providing a review of signal processing techniques. In particular, we emphasize the advanced reduced-instruction set (RISC machine (ARM study case, for which we also optimize some of the processing libraries. The presented software will remain open-source.
Full Text Available The question of how the brain encodes letter position in written words has attracted increasing attention in recent years. A number of models have recently been proposed to accommodate the fact that transposed-letter stimuli like jugde or caniso are perceptually very close to their base words.Here we examined how letter position coding is attained in the tactile modality via Braille reading. The idea is that Braille word recognition may provide more serial processing than the visual modality, and this may produce differences in the input coding schemes employed to encode letters in written words. To that end, we conducted a lexical decision experiment with adult Braille readers in which the pseudowords were created by transposing/replacing two letters.We found a word-frequency effect for words. In addition, unlike parallel experiments in the visual modality, we failed to find any clear signs of transposed-letter confusability effects. This dissociation highlights the differences between modalities.The present data argue against models of letter position coding that assume that transposed-letter effects (in the visual modality occur at a relatively late, abstract locus.
Putnam, Brittany C.; Tiger, Jeffrey H.
Braille-character recognition is one of the foundational skills required for teachers of braille. Prior research has evaluated computer programming for teaching braille-to-print letter relations (e.g., Scheithauer & Tiger, 2012). In the current study, we developed a program (the Visual Braille Trainer) to teach not only letters but also…
Perea, Manuel; García-Chamorro, Cristina; Martín-Suesta, Miguel; Gómez, Pablo
The question of how the brain encodes letter position in written words has attracted increasing attention in recent years. A number of models have recently been proposed to accommodate the fact that transposed-letter stimuli like jugde or caniso are perceptually very close to their base words. Here we examined how letter position coding is attained in the tactile modality via Braille reading. The idea is that Braille word recognition may provide more serial processing than the visual modality, and this may produce differences in the input coding schemes employed to encode letters in written words. To that end, we conducted a lexical decision experiment with adult Braille readers in which the pseudowords were created by transposing/replacing two letters. We found a word-frequency effect for words. In addition, unlike parallel experiments in the visual modality, we failed to find any clear signs of transposed-letter confusability effects. This dissociation highlights the differences between modalities. The present data argue against models of letter position coding that assume that transposed-letter effects (in the visual modality) occur at a relatively late, abstract locus.
Kohnen, Saskia; Castles, Anne
There has been much recent interest in letter position coding in adults, but little is known about the development of this process in children learning to read. Here, the letter position coding abilities of 127 children in Grades 2, 3, and 4 (aged 7-10 years) were examined by comparing their performance in reading aloud "migratable" words (e.g.,…
This article explores the possibilities of epistolary criticism within the realm of sport studies and aspires to encourage scholars to consider the use of non-traditional sport memorabilia and source materials when telling emotive stories about sport and sport practices. The use of letters and the letter-writing format to tell a personal narrative…
Scientific Letter: Stabbing nails into the neck: an unusual self-damaging behavior mandating neurosurgery. A Aghabiklooei, R Aghabiklooei, N Zamani. Abstract. Scientific Letter - No Abstract Available. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.
Limaye, Mohan R.
Business letter-writers are advised to develop reader empathy and benefit before they ask a favor. The author analyzed two model 16th century letters of request to determine if similar advice was given in the past, and found that the request was subordinate to building a mutually beneficial relationship. (PD)
... shall not be inconsistent with or contrary to the terms of the letter of commitment. Any such letter of credit or agreement may be modified or extended at any time in such a manner and to such extent as is acceptable to the approved applicant and the bank: Provided, That such modification or extension may not be...
Intertextuality takes for granted the interdependence of literary texts because every artistic creation is a re-echoing of past knowledge. Mariama Ba's So Long A Letter and Ndubisi Umunnakwe's Dear Ramatoulaye are African examples. This work examines how Ba's So Long A Letter intertextualises with Umunnakwe's Dear ...
From handwritten letters of the American Revolution to typed emails from Iraq and Afghanistan, correspondence from U.S. troops offers students deep insight into the specific conflicts and experiences of soldiers. Over 100,000 correspondences have been donated to the Legacy Project, a national initiative launched in 1998 to preserve war letters by…
... ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Taking Marine Mammals Incidental to Conducting Precision Strike Weapon Missions in the Gulf of Mexico § 216.257 Letters of Authorization. (a) A Letter of Authorization, unless suspended or revoked...
... ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS REGULATIONS GOVERNING THE TAKING AND IMPORTING OF MARINE MAMMALS Taking Marine Mammals Incidental to Conducting Precision Strike Weapon Missions in the Gulf of Mexico § 216.258 Renewal of Letters of Authorization. (a) A Letter of Authorization...
Ågerstrand, Marlene; Bero, Lisa; Beronius, Anna
Open letter in response to the proposed criteria for identification and regulation of endocrine disrupting chemicals, under the PPP and Biocides Regulations......Open letter in response to the proposed criteria for identification and regulation of endocrine disrupting chemicals, under the PPP and Biocides Regulations...
Schryer, Catherine F.; Bell, Stephanie; Mian, Marcellina; Spafford, Marlee M.; Lingard, Lorelei
Using rhetorical genre theory and research on reported speech, this study investigates the citation practices in 81 forensic letters written by paediatricians and nurse practitioners that provide their opinion for the courts as to whether a child has experienced maltreatment. These letters exist in a complex social situation where a lack of…
Townsend, J T; Ashby, F G
A letter confusion experiment that used brief durations manipulated payoffs across the four stimulus letters, which were composed of line segments equal in length. The observers were required to report the features they perceived as well as to give a letter response. The early feature-sampling process is separated from the later letter-decision process in the substantive feature models, and predictions are thus obtained for the frequencies of feature report as well as letter report. Four substantive visual feature-processing models are developed and tested against one another and against three models of a more descriptive nature. The substantive models predict the decisional letter report phase much better than they do the feature-sampling phase, but the best overall 4 X 4 letter confusion matrix fits are obtained with one of the descriptive models, the similarity choice model. The present and other recent results suggest that the assumption that features are sampled in a stochastically independent manner may not be generally valid. The traditional high-threshold conceptualization of feature sampling is also falsified by the frequent reporting by observers of features not contained in the stimulus letter.
Colizoli, O.; Murre, J.M.J.; Rouw, R.
Background Synesthesia is a phenomenon where a stimulus produces consistent extraordinary subjective experiences. A relatively common type of synesthesia involves perception of color when viewing letters (e.g. the letter ‘a’ always appears as light blue). In this study, we examine whether traits
... the amount of the proposed loan, its purposes, rate of interest, loan security requirements, and other... SERVICE, DEPARTMENT OF AGRICULTURE PRE-LOAN POLICIES AND PROCEDURES COMMON TO INSURED AND GUARANTEED TELECOMMUNICATIONS LOANS Characteristics Letter § 1737.80 Description of characteristics letter. (a) After all of the...
... instruction letter to member. Subject: Instructions in Case of Release on Bail or Personal Recognizance 1. You... 32 National Defense 6 2010-07-01 2010-07-01 false Commander's instruction letter to member. 884.17... civilian custody on bail or on your own recognizance, report immediately in person or by telephone to the...
... (UST) Financial Responsibility § 280.99 Letter of credit. (a) An owner or operator may satisfy the... brackets are to be replaced with the relevant information and the brackets deleted: Irrevocable Standby.... We certify that the wording of this letter of credit is identical to the wording specified in 40 CFR...
Spinks, Neld; Wells, Barron
Surveys of Fortune 500 companies in 1978, 1985, and 1995 revealed trends and preferences in content of resumes and cover letters. Compared to earlier years, current preferences were for both letters and resumes in the initial contact, more emphasis on grammar and spelling, and acceptance of two-page resumes. (SK)
American Journal of Sexuality Education, 2011
The "Open Letter to Religious Leaders about Sex Education" reinforces scriptural and theological commitments to truth-telling in calling for "full and honest education about sexual and reproductive health." This "Open Letter" was published in 2002, at about the midpoint of a decade-long federal government commitment to…
van Grootheest, A C Kees; Edwards, I Ralph
Over the past few years, a number of drugs have been withdrawn for safety reasons, either by drug approval authorities, or by the manufacturer. A recent example is the withdrawal of cerivastatin in connection with rhabdomyolysis. Several other drugs have also been taken off the market as a security measure, not because the nature of the risk involved was unknown but because the risk had proved apparently uncontainable. It seems that the inclusion of a warning or contraindication in the Summary of Product Characteristics (SPC) or sending a 'Dear Doctor' letter is insufficient to ensure compliant prescription behaviour. There appears to be a discrepancy between the careful use of evidence underpinning the SPC content and formal warnings and changes to the SPC and the effect they have on the prescription and dispensing of the drugs involved. This results in undue loss or damage for both the manufacturer and the patient. There are no easy solutions to tackle this problem; the ineffectiveness of labelling and 'Dear Doctor' letters has ramifications for the whole regulatory/ industrial/educational complex. We discuss briefly four possible strategies for improving the current situation, with the emphasis on the place the prescriber has in this process. The first strategy is education-based. Clinicians need to know about the comparative merits of the effectiveness and risk of drugs, as well as how they work pharmacologically, toxicologically, and what interactions they have with each other. The second strategy involves improving the information available for clinicians. Frequently, physicians do not consult the SPC for verification, leaving aside whether they have taken notice of the contents of the official SPC in the first place. It is recommended that the accessibility of SPCs is enhanced for doctors and pharmacists, drawing attention specifically to any changes. There needs to be a single body of information that covers every drug. The third strategy involves
Lott, Susan Nitzberg; Carney, Aimee Syms; Glezer, Laurie S; Friedman, Rhonda B
BACKGROUND: Letter-by-letter readers identify each letter of the word they are reading serially in left to right order before recognizing the word. When their letter naming is also impaired, letter-by-letter reading is inaccurate and can render even single word reading very poor. Tactile and/or kinesthetic strategies have been reported to improve reading in these patients, but only under certain conditions or for a limited set of stimuli. AIMS: The primary aim of the current study was to determine whether a tactile/kinesthetic treatment could significantly improve reading specifically under normal reading conditions, i.e. reading untrained words presented in free vision and read without overt use of the strategy. METHODS #ENTITYSTARTX00026; PROCEDURES: Three chronic letter-by-letter readers participated in a tactile/kinesthetic treatment aimed at first improving letter naming accuracy (phase 1) and then letter-by-letter reading speed (phase 2). In a multiple case series design, accuracy and speed of reading untrained words without overt use of the trained tactile/kinesthetic strategy was assessed before phase 1, after phase 1 and again after phase 2. OUTCOMES #ENTITYSTARTX00026; RESULTS: All three patients significantly improved both their speed and accuracy reading untrained words without overt use of the trained tactile/kinesthetic strategy. All three patients required the additional practice in phase 2 to achieve significant improvement. Treatment did not target sentence level reading, yet two of the three patients became so adept that they could read entire sentences. CONCLUSIONS: This study replicates previous findings on the efficacy of tactile/kinesthetic treatment for letter-by-letter readers with poor letter naming. It further demonstrates that this treatment can alter cognitive processing such that words never specifically trained can be read in free vision without overtly using the trained strategy. The data suggest that an important element in achieving
Li, Lei; Hu, Jianhao
Notice of Violation of IEEE Publication Principles"Joint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath"by Lei Li and Jianhao Hu,in the IEEE Transactions on Nuclear Science, vol.57, no.6, Dec. 2010, pp. 3779-3786After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.This paper contains substantial duplication of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:"Multiple Error Detection and Correction Based on Redundant Residue Number Systems"by Vik Tor Goh and M.U. Siddiqi,in the IEEE Transactions on Communications, vol.56, no.3, March 2008, pp.325-330"A Coding Theory Approach to Error Control in Redundant Residue Number Systems. I: Theory and Single Error Correction"by H. Krishna, K-Y. Lin, and J-D. Sun, in the IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.39, no.1, Jan 1992, pp.8-17In this paper, we propose a joint scheme which combines redundant residue number systems (RRNS) with module isolation (MI) for mitigating single event multiple bit upsets (SEMBUs) in datapath. The proposed hardening scheme employs redundant residues to improve the fault tolerance for datapath and module spacings to guarantee that SEMBUs caused by charge sharing do not propagate among the operation channels of different moduli. The features of RRNS, such as independence, parallel and error correction, are exploited to establish the radiation hardening architecture for the datapath in radiation environments. In the proposed
Qingyu Shen; Xiaoming Rong; Rui Pan; Ying Peng; Wei Peng; Yamei Tang
This study examined a 24-year-old patient with delayed encephalopathy, who was admitted to hospital with complaints of headache and visual impairment 1 week after acute carbon monoxide poisoning. The results of a visual field assessment, electroencephalography and head magnetic resonance imaging indicated damage to the cerebral cortex. After a 2-week treatment period, the patient had recovered from the visual impairment, but exhibited digit- and letter-reading difficulty. The Chinese aphasia battery and the number and letter battery supplement were conducted. The results revealed that the patient exhibited digit and letter alexia, while the ability to read Chinese characters was preserved. In contrast, the patient exhibited a deficit in Chinese character writing, while number and letter writing remained intact. Following treatment, reading and writing ability was improved and electroencephalographic abnormalities were ameliorated. Overall, our experimental findings demonstrated that delayed encephalopathy following acute carbon monoxide poisoning was characterized by digit and letter alexia.
Describes a three-part assignment in which each student writes a complaint letter and an adjustment letter responding to another student's complaint letter. Discusses how the third part of the assignment--journal entries--allows students to formulate their own criteria for excellent letters based upon their reactions to the letters they receive.…
contact below the ice. 15. SUBJECT TERMS Arctic Ocean , Undersea Workstations & Vehicles, Signal Processing, Navigation , Underwater Acoustics 16...Partan, Peter Koski, and Sandipa Singh, "Long Range Acoustic Communications and Navigation in the Arctic", Proc. IEEE/MTS Oceans Conf., Washington, DC...Oct. 2015. Freitag, L., P. Koski, A. Morozov, S. Singh, J. Partan, "Acoustic Communications and Navigation Under Arctic Ice", OCEANS , 2012
Full Text Available The paper presents a novel technique to detect Denial of Service (DoS attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF protocols described in the IEEE standard . Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi , and Liu and Saadawi  to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator  to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS and Frequency Hopping Spread Spectrum (FHSS and the results are presented to validate the algorithm.
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard . Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi , and Liu and Saadawi  to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator  to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.
The essay aims at analyzing, by examining the special bond between Franz Kafka and Milena Jesenská through the lens of their letters, Prague's cultural life in the aftermath of the fall of the Habsburg Empire; an historical event marked by an increasingly threatening and aggressive antisemitism, which made the relationship between the Jewish community and other social units, such as the Czech population, more problematic. The relationship between the Jewish writer and his Czech translator, close friend and confidante, unfolds against this background. A rich and complicated relationship between different albeit communicating worlds.
This resource letter covers diverse literature(400 titles) relevant to the Accelerated Matter Program in the Particles and Fields Group at the University of Melbourne. Specifically, the research areas covered are: inertia induced electric fields in accelerated matter; strain induced contact potentials; the patch effect/surface potentials. There are no claims made for completeness. The areas of gravity, acceleration and strain induced effects in matter, and drift tube experiments with matter/antimatter are extensively covered, if not complete. The literature on acceleration/inertia induced effects in metals has a long history dating back to the 19th century and the reader is referred to the review by Barnett (1935) for an extensive list of references not included here. All other work following this 1935 review, has been included here. The literature on surface physics is very extensive and no attempt has been made to cover it all. Every major paper on metal surfaces has been cited. Several other references have been included which fall only loosely into the above areas and they represent useful and/or interesting material for this research program
In an Open Letter to Pope John Paul II, written on World Population Day (July 11) 1991, Dr. Fred Sai, President of International Planned Parenthood Federation (IPPF), called for a dialogue on voluntary family planning as a means of avoiding unwanted pregnancy. A half million women die each year from pregnancy-related causes--a death toll that could be dramatically reduced by universal access to low cost, effective contraception. Family planning further represents the best protection against abortion. The Catholic Church's vehement opposition to abortion and family planning methods other than periodic abstinence is in marked contrast to its support to human rights in other settings. The Church has supported struggles for economic ju stice in and among nations, sided with the poor, and advocated for transitions to democracy. At the same time, the family planning movement--which has as its overall objective the protection of the health and welfare of women, children, and families--is viewed by the Vatican as a vehicle for the enslavement rather than liberation of women. The opening of a sensitive dialogue between the Catholic Church and supporters of voluntary family planning could help couples make sound moral decisions about their families and contribute to saving the lives of millions of women, most of them poor.
Yuksel, Ender; Nielson, Hanne Riis; Nielsen, Christoffer Rosenkilde
Static analysis is successfully used for automatically validating security properties of classical cryptographic protocols. In this paper, we shall employ the same technique to a modern security protocol for wireless networks, namely the latest version of the Privacy and Key Management protocol...... for IEEE 802.16e, PKMv2. This protocol seems to have an exaggerated mixture of security features. Thus, we iteratively investigate which components are necessary for upholding the security properties and which can be omitted safely. This approach is based on the LySa process calculus and employs...
A new medium access control method is proposed over the predominant Ethernet broadcast channel. Taking advantages of intrinsic variable length characteristic of standard Ethernet frame, message-oriented dynamic priority mechanism is established. Prioritized medium access control operates under a so-called block mode in event of collisions.High priority messages have a chance to preempt block status incurred by low priority ones. By this means, the new MAC provides a conditional deterministic real time performance beyond a statistical one. Experiments demonstrate effectiveness and attractiveness of the proposed scheme. Moreover, this new MAC is completely compatible with IEEE802.3.
Schwank, Jim; Brown, Dennis; Girard, Sylvain; Gouker, Pascale; Gerardin, Simone; Quinn, Heather; Barnaby, Hugh
The December 2012 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 49th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held July 16-20, 2012, in Miami, Florida USA. 95 papers presented at the 2012 NSREC were submitted for consideration for this year’s special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas. The peer review process for a typical technical journal generally takes six months to one year to complete. To publish this special issue of the IEEE Transactions on Nuclear Science (in December), the review process, from initial submission to final form, must be completed in about 10 weeks. Because of the short schedule, both the authors and reviewers are required to respond very quickly. The reviewers listed on the following pages contributed vitally to this quick-turn review process.We would like to express our sincere appreciation to each of them for accepting this difficult, but critical role in the process. To provide consistent reviews of papers throughout the year, the IEEE Transactions on Nuclear Science relies on a year-round editorial board that manages reviews for submissions throughout the year to the TRANSACTIONS in the area of radiation effects. The review process is managed by a Senior
Costa, Luís Henrique M. K.; Cerveira, Carlos Rodrigo
This paper presents a time-based admission control mechanism (TAC) for IEEE 802.11 ad hoc networks. The proposed mechanism was adapted to the QoS AODV routing protocol, which takes the quality of service requirements of the data flow into account in the route discovery process. TAC-AODV estimates the idle time of the physical medium based on the frames listened. The incoming traffic is admitted according to the offered load as well as the intra-flow interference, calculated based on the numbe...
This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.
Tripp Barba, Carolina; Casademont Serra, Jordi
En la actualidad son muchos los mecanismos de seguridad que el estándar IEEE 802.15.4 permite a las redes inalámbricas de sensores  Dicho estándar define las especificaciones de la Capa de Acceso al Medio y la Capa Física de los dispositivos inalámbricos de área personal. La última revisión corresponde al 2006. Dichas revisiones y actualizaciones son hechas por el grupo de trabajo 802.15. Sin embargo estos mecanismos consumen recursos como memoria y batería, que son...
Reilly, J Patrick; Hirata, Akimasa
This article treats unsettled issues in the use of numerical models of electrical dosimetry as applied to international limits on human exposure to low-frequency (typically IEEE-ICES (International Committee on Electromagnetic Safety) Technical Committee 95. The paper discusses 25 issues needing attention, fitting into three general categories: induction models; electrostimulation models; and human exposure limits. Of these, 9 were voted as 'high priority' by members of Subcommittee 6. The list is presented as a research agenda for refinements in numerical modeling with applications to human exposure limits. It is likely that such issues are also important in medical and electrical product safety design applications.
Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.
Abu-Tair, Mamoun; Bhatti, Saleem Noel
We have conducted an empirical study of the latest 5GHz IEEE 802.11 wireless LAN (WLAN) variants of 802.11n (5GHz) and 802.11ac (Wave 1), under different cell load conditions. We have considered typical configurations of both protocols on a Linux testbed. Under light load,there is no clear difference between 802.11n and 802.11ac in terms of performance and energy consumption. However, in some cases of high cell load, we have found that there may be a small advantage with 802.11ac. Overall, we...
Gong, Huazhi; Nahm, Kitae; Kim, Jongwon
In IEEE 802.11 networks, the access point (AP) selection based on the strongest signal strength often results in the extremely unfair bandwidth allocation among mobile users (MUs). In this paper, we propose a distributed AP selection algorithm to achieve a fair bandwidth allocation for MUs. The proposed algorithm gradually balances the AP loads based on max-min fairness for the available multiple bit rate choices in a distributed manner. We analyze the stability and overhead of the proposed algorithm, and show the improvement of the fairness via computer simulation.
Kim, Taejoon; Lim, Jong-Tae
Nowadays IEEE 802.11 wireless local area networks (WLANs) support multiple transmission rates. To achieve the best performance, transmitting stations adopt the various forms of automatic rate fallback (ARF). However, ARF suffers from severe performance degradation as the number of transmitting stations increases. In this paper, we propose a new rate adaptation scheme which adjusts the ARF's up/down threshold according to the channel contention level. Simulation result shows that the proposed scheme achieves fairly good performance compared with the existing schemes.
Tang, Guijin; Zhu, Xiuchang
Multi-rate transmission may lead to performance anomaly in an IEEE 802.11 network. It will decrease the throughputs of all the higher rate stations. This paper proposes an adaptive rate selection scheme for video service when performance anomaly occurs. Considering that video has the characteristic of tolerance to packet loss, we actively drop several packets so as to select the rates as high as possible for transmitting packets. Experiment shows our algorithm can decrease the delay and jitter of video, and improve the system throughput as well.
Full Text Available This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF differentiates classes of service and to characterize the probability distribution of the medium access control (MAC layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.
Farooq, Jahanzeb; Soler, José
communication technology used. IEEE 802.11 Wi-Fi, despite being originally developed for stationary users within a limited area, has prevailed as the de-facto radio technology for CBTC. Unfortunately, very limited literature is publicly available on this topic due to the highly competitive nature of the railway...... of the communication technologies used for modern railway signalling is presented. The benefits and drawbacks of using a radio communication technology, particularly Wi-Fi, and the challenges it introduces, are discussed. Best practices in the design of a CBTC radio network and the measures to optimize its...
Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.
Full Text Available Mary Delany (1700-1788 is particularly famous for her paper-cuttings or ‘mosaicks’ based on botanical subjects. A very lively woman of fashion, she was close to Queen Charlotte and one of the Bluestocking Ladies. She left a vivid portrait of life and society in eighteenth century England and Ireland in the six volumes of her Autobiography and Letters, edited in 1861 by her descendant Lady Llanover. Her autobiography is made up of 18 letters sent to her most intimate friend, Margaret Cavendish, Duchess of Portland. The first letter is dated 1740, but in this, as in the following ones, Mrs. Delany narrates her past life to her friend, starting from the early years of her life, describing her unhappy marriage, financial difficulties as a widow, and family relationships. Along with these ‘autobiographical’ letters, other letters written by her to her sister Ann are introduced, which date to the periods of life Mrs. Delany is dealing with. The aim of this paper is to focus on the textual, linguistic and content differences between the two letter types, and analyse how the identity of Mary Delany is differently constructed and perceived in the explicit autobiographical letters addressed to the Duchess of Portland, and the ones written to her sister.
Items 1 - 8 of 8 ... Open Veterinary Journal is a peer reviewed international open access online and printed journal that publishes high-quality original research articles, reviews, short communications and case reports dedicated to all aspects of veterinary sciences and its related subjects. Other websites associated with this ...
Nagler, Michael N.
Educational practices should strive to avert the catastrophe of nuclear warfare by communicating a sense of the reality and accessibility of peace. Educators must be responsible to all mankind for the values they hold and teach. Humanization should be the goal of curriculum development. (PP)
Items 1 - 50 of 93 ... African Journal of AIDS Research (AJAR) is a peer-reviewed ... The African Journal of Aquatic Science is an international journal ... Later, the need to expand the horizon of the journal led to the formation of a group (Biomedical Communications ... African Journal of Clinical and Experimental Microbiology.
Barbaro, A; Cormaci, P; Teatino, A; La Marca, A; Barbaro, A
Two brothers, living in two different cities, received two different anonymous letters. We performed latent prints development and DNA research on the letters and also on a glass used by a cousin suspected to be the letters' sender.
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief
Lee, Kyung-Jun; Suh, Doug-Young; Park, Gwang-Hoon; Huh, Jae-Doo
This letter proposes a QoS control method for video streaming service over wireless networks. Based on statistical analysis, the time-varying MAC parameters highly related to channel condition are selected to predict available bitrate. Adaptive bitrate control of scalably-encoded video guarantees continuity in streaming service even if the channel condition changes abruptly.
The letters transcribed in this book were written by physicist David Bohm to three close female acquaintances in the period 1950 to 1956. They provide a background to his causal interpretation of quantum mechanics and the Marxist philosophy that inspired his scientific work in quantum theory, probability and statistical mechanics. In his letters, Bohm reveals the ideas that led to his ground breaking book Causality and Chance in Modern Physics. The political arguments as well as the acute personal problems contained in these letters help to give a rounded, human picture of this leading scientist and twentieth century thinker.
Kone, Cheick Tidjane; Mathias, Jean-Denis; De Sousa, Gil
Designing a Wireless Sensor Network (WSN) to achieve a high Quality of Service (QoS) (network performance and durability) is a challenging problem. We address it by focusing on the performance of the 802.15.4 communication protocol because the IEEE 802.15.4 Standard is actually considered as one of the reference technologies in WSNs. In this paper, we propose to control the sustainable use of resources (i.e., energy consumption, reliability and timely packet transmission) of a wireless sensor node equipped with photovoltaic cells by an adaptive tuning not only of the MAC (Medium Access Control) parameters but also of the sampling frequency of the node. To do this, we use one of the existing control approaches, namely the viability theory, which aims to preserve the functions and the controls of a dynamic system in a set of desirable states. So, an analytical model, describing the evolution over time of nodal resources, is derived and used by a viability algorithm for the adaptive tuning of the IEEE 802.15.4 MAC protocol. The simulation analysis shows that our solution allows ensuring indefinitely, in the absence of hardware failure, the operations (lifetime duration, reliability and timely packet transmission) of an 802.15.4 WSN and one can temporarily increase the sampling frequency of the node beyond the regular sampling one. This latter brings advantages for agricultural and environmental applications such as precision agriculture, flood or fire prevention. Main results show that our current approach enable to send more information when critical events occur without the node runs out of energy. Finally, we argue that our approach is generic and can be applied to other types of WSN.
Stoeck, Holger [Sydney Univ., NSW (Australia). Falkiner High Energy Physics Group; Bergauer, Thomas; Dragicevic, Marko [Oesterreichische Akademie der Wissenschaften, Vienna (AT). Inst. fuer Hochenergiephysik] (and others)
In the summer of 2007, the GLD concept study group, whose membership was largely based in Asia, and the LDC concept study group, which was mostly based in Europe with a strong north american membership, joined forces to produce a single Letter of Intent for a detector at the International Linear Collider, and formed the ILD concept group. Both the GLD and LDC concepts used the particle flow algorithm for jet reconstruction and a TPC for the central tracker. The basic parameters of the two concepts such as the size of the detector and the strength of the solenoid field, however, were quite different and had to be unified in order to write this letter of intent for ILD. Also, other critical details such as the interaction region design had to be unified. This was a non-trivial task, neither politically nor sociologically. The newly-formed concept study group, the ILD group, created a management team and engaged in intense studies to define the ILD detector concept by scientifically optimising the detector designs. The process has worked remarkably well, and we present here the outcome of this study as well as the large amount of studies that preceded separately by the two older concept groups. The ILD detector concept is now well defined, even though some technology choices are still open. One of the merits of unifying the detector concepts was that it revitalised the studies on physics performance and detector designs. We believe that the level of sophistication of the simulation and physics analyses has reached a high degree of sophistication for a detector group at this stage. This was achieved through collaboration and competition, and is the result of a productive learning process. The unification had also positive effects on the subdetector R and D efforts. Most R and D on detector technologies relevant to the GLD and LDC groups is being performed within the framework of detector R and D collaborations such as LCTPC, SiLC, CALICE, and FCAL which pursue their