WorldWideScience

Sample records for ieee honors deblasio

  1. IEEE Honors DeBlasio with Steinmetz Award | News | NREL

    Science.gov (United States)

    professional association, with the 2010 Charles Proteus Steinmetz Award. The award will be presented on Dec. 5 with the U.S. Department of the Energy's National Renewable Energy Laboratory (NREL), will be honored

  2. Richard DeBlasio | NREL

    Science.gov (United States)

    DeBlasio's leadership, electricity research at NREL helped develop interconnection technology and validate Smart Grid modernization. Professional Experience Trained in electrical and electronics engineering , DeBlasio has worked in various leadership positions at NREL (and SERI) since 1978. These included research

  3. IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Basso, T.; DeBlasio, R.

    2012-04-01

    The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

  4. Housing Honors. National Collegiate Honors Council Monograph Series

    Science.gov (United States)

    Frost, Linda, Ed.; Kay, Lisa W., Ed.; Poe, Rachael, Ed.

    2015-01-01

    Honors administrators spend much of their time explaining and describing what honors is and does. When they talk about what honors looks like nationally, they should have answers to the following important questions: How pervasive is the model of separate honors facilities?; How pervasive are the legendary closets that honors programs have so…

  5. Honor Role

    Science.gov (United States)

    Good, Howard

    2004-01-01

    In this article, the author talks about "honor" and describes how the word has been taken for granted in schools. He explains that "honor" traditionally, has had two meanings, and that the National Honor Society (NHS) reflects the most ancient of them. Like Aristotle, who described honor in his "Nicomachean Ethics" as "the prize of virtue and the…

  6. A different kind of honor culture : Family honor and aggression in Turks

    NARCIS (Netherlands)

    van Osch, Y.M.J.; Breugelmans, S.M.; Zeelenberg, M.; Bölük, P.

    2013-01-01

    Masculine honor has been found to explain the relationship between insults and aggression in the USA. However, detailed accounts of Mediterranean honor cultures suggest that family honor may be more important in explaining cross-cultural differences in aggression. Two studies revealed that people

  7. A different kind of honor culture : Family honor and aggression in Turks

    NARCIS (Netherlands)

    van Osch, Yvette; Breugelmans, Seger M.; Zeelenberg, Marcel; Bölük, Pinar

    Masculine honor has been found to explain the relationship between insults and aggression in the USA. However, detailed accounts of Mediterranean honor cultures suggest that family honor may be more important in explaining cross-cultural differences in aggression. Two studies revealed that people

  8. Honors Education and Global Citizenship

    Science.gov (United States)

    Wolfensberger, Marca V. C.

    2012-01-01

    An issue of "Journal of the National Collegiate Honors Council" devoted to "Honors Around the Globe" is an important opportunity to consider the role of honors in creating international awareness and understanding. Honors faculty and administrators have become increasingly active in global cross-communication through, for…

  9. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  10. Honor as Cultural Mindset: Activated Honor Mindset Affects Subsequent Judgment and Attention in Mindset-Congruent Ways

    Directory of Open Access Journals (Sweden)

    Sheida Novin

    2016-12-01

    Full Text Available Honor values articulate gender roles, the importance of reputation in maintaining one’s place in society, and maintaining respect for the groups one belongs to. In that sense honor provides a template for organizing social interactions and hence may be functional even among people and societies that do not report valuing and endorsing honor. We test the prediction that honor influences judgment and attention when activated in two experiments (N=538. Using a culture-as-situated cognition perspective, we predicted that activating one aspect of honor would activate other aspects, even among individuals who do not much endorse honor values. We tested these predictions among European Americans, a group that is not typically associated with honor values. In each study, participants were randomly assigned to experimental or control groups, which differed in one way: the experimental group read statements about honor values as a first step and the control group did not. Participants then judged stick-figure pairs (judging which is male; Study 1, n = 130 or made lexical decisions (judging whether a letter-string formed a correctly spelled word; Study 2, n = 408. In Study 1, experimental group participants were more likely to choose the visually agentic figure as male. In Study 2, experimental group participants were more accurate at noticing that the letter-string formed a word if the word was an honor-relevant word (e.g., noble, but they did not differ from the control group if the word was irrelevant to honor (e.g., happy. Participants in both studies were just above the neutral point in their endorsement of honor values. Individual differences in honor values endorsement did not moderate the effects of activating an honor mindset. Though honor is often described as if it is located in space, we did not find clear effects of where our letter strings were located on the computer screen. Our findings suggest a new way to consider how honor functions

  11. Honor and I: Differential relationships between honor and self-esteem in three cultural groups

    NARCIS (Netherlands)

    Novin, S.; Tatar, B.; Krabbendam, L.

    2015-01-01

    Honor is often defined as one's self-esteem through one's own eyes as through the eyes of others. This definition assumes that endorsing honor values is universally related to one's self-esteem. Yet, prior work shows that the salience of honor in individuals' lives differs across cultures, which

  12. The Honors Thesis: A Handbook for Honors Directors, Deans, and Faculty Advisors. National Collegiate Honors Council Monograph Series

    Science.gov (United States)

    Anderson, Mark; Lyons, Karen; Weiner, Norman

    2014-01-01

    This handbook is intended to help all those who design, administer, and implement honors thesis programs--honors directors, deans, staff, faculty, and advisors--evaluate their thesis programs, solve pressing problems, select more effective requirements or procedures, or introduce an entirely new thesis program. The authors' goal is to provide…

  13. The IEEE Milestone event at CERN

    CERN Multimedia

    2005-01-01

    On the initiative of its French and Swiss Sections, the IEEE has honoured CERN with an 'IEEE Milestone in the history of electricity and electronics' for the invention of the multi-wire proportional chamber in 1968. The IEEE established the Electrical Engineering Milestones programe in 1983 to honour significant achievements in the history of electrical and electronics engineering. To be designated, an achievement must be at least 25 years old, must have involved a unique solution to an engineering problem, and must have had at least regional impact. Currently there are more than  50 IEEE Milestones around the world. http://www.ieee.org/organizations/history_center/cern.html The installation and unveiling of this IEEE Milestone will provide the opportunity to emphasize the close relationship between science, technology, industry and well-being in society.  A ceremony, organised with the support of a group of IEEE members working at CERN, will be held at the CERN Globe of Science and Inn...

  14. Active Channel Reservation for Coexistence Mechanism (ACROS) for IEEE 802.15.4 and IEEE 802.11

    Science.gov (United States)

    Shin, Soo Young; Woo, Dong Hyuk; Lee, Jong Wook; Park, Hong Seong; Kwon, Wook Hyun

    In this paper, a coexistence mechanism between IEEE 802.15.4 and IEEE 802.11b, Active Channel Reservation for cOexiStence (ACROS), is proposed. The key idea underlining ACROS is to reserve the channel for IEEE 802.15.4 transmission, where IEEE 802.11 transmissions are forbidden. The request-to-send (RTS)/clear-to send (CTS) mechanism within IEEE 802.11 is used to reserve a channel. The proposed ACROS mechanism is implemented into a PC based prototype. The embedded version of ACROS is also developed to mitigate the timing drift problem in the PC-based ACROS. The efficiency of ACROS is shown using the throughput and packet error rate achieved in actual experiments.

  15. 2012 IEEE Vehicular Networking Conference (VNC)

    NARCIS (Netherlands)

    Altintas, Onur; Chen, Wai; Heijenk, Geert; Oh, Hyun Seo; Chung, Jong-Moon; Dressler, Falko; Kargl, Frank; Pau, Giovanni; Schoch, Elmar

    2012-01-01

    On behalf of the Organizing Committee, we would like to welcome you to the fourth edition of the IEEE Vehicular Networking Conference in Seoul, Korea. IEEE VNC is a unique conference sponsored by both IEEE Communications Society and Intelligent Transportation Systems Society. It brings together

  16. Simulasi Kinerja Jaringan Nirkabel IEEE-802.11a dan IEEE-802.11g Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Helm Fitriawan

    2014-03-01

    Full Text Available Wireless network uses transmission media based on radio waves. This type of networks is mainly useddue to its efficiency and mobility in data exchanging. This paper reports the modeling and simulation of wirelessnetworks based on Cisco Aironet 1130ag access point devices with IEEE 802.11a and IEEE 802.11g standards. Themodeling and simulation are performed using network simulator version 2 (NS-2 that is installed on operationsystem Linux Ubuntu v.10.10. The NS-2 is commonly used and works well in numerous types of network simulation. From simulation, we obtain quality of service parameters by employing several simulation scenarios in terms ofnumber of nodes, distances, and packet data sizes. It can be concluded from simulation results that the IEEE 802.11gnetworks transfer data with better quality than those of IEEE 802.11a networks.  Furthermore, the IEEE 802.11gnetworks provide a higher throughput, with smaller amount of delay and packet loss percentage compared to thoseof IEEE 802.11a networks.

  17. Culture, Masculine Honor, and Violence Toward Women.

    Science.gov (United States)

    Brown, Ryan P; Baughman, Kiersten; Carvallo, Mauricio

    2018-04-01

    Prior research has connected the cultural ideology of honor to intrasexual violence between men and to attitudes supporting intersexual aggression in response to perceived honor violations by female romantic partners. We extend this research to show that honor ideology is also associated with an increased likelihood of men actually engaging in violent and sexually coercive behaviors toward women. Extending previous research on honor-based schemas and scripts linked to relationship violence, comparisons between honor states and non-honor states in the United States show that official rape and domestic homicide rates by White male perpetrators (Study 1) and experiences of rape and violence in relationships anonymously reported by White female teenagers (Study 2) were higher in honor states, controlling for a variety of potential confounds. These results extend prior laboratory research on honor-based schemas and scripts into the realm of extreme, real-world behaviors.

  18. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications

    Science.gov (United States)

    Mišić, Jelena; (Sherman) Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184

  19. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications.

    Science.gov (United States)

    Misić, Jelena; Sherman Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

  20. A coexistence model of IEEE 802.15.4 and IEEE 802.1 lbIg

    NARCIS (Netherlands)

    Yuan, Wei; Wang, Xiangyu; Linnartz, J.P.M.G.

    2007-01-01

    IEEE 802.15.4 was developed to meet the needs for low-rate wireless communication. However, due to its low power, IEEE 802.15.4 is potentially vulnerable to interference by other wireless technologies having much higher power and working in the same industrial, scientific, and medical (ISM) band

  1. Performance comparison of IEEE 802.11g and IEEE 802.11n in the presence of interference from 802.15.4 networks

    OpenAIRE

    Masood, Syed Haani

    2013-01-01

    In this paper we compare the packet error rate (PER) and maximum throughput of IEEE 802.11n and IEEE 802.11g under interference from IEEE 802.15.4 by using MATLAB to simulate the IEEE PHY for 802.11n and 802.11g networks.

  2. Cultural prototypes and dimensions of honor.

    Science.gov (United States)

    Cross, Susan E; Uskul, Ayse K; Gerçek-Swing, Berna; Sunbay, Zeynep; Alözkan, Cansu; Günsoy, Ceren; Ataca, Bilge; Karakitapoglu-Aygün, Zahide

    2014-02-01

    Research evidence and theoretical accounts of honor point to differing definitions of the construct in differing cultural contexts. The current studies address the question "What is honor?" using a prototype approach in Turkey and the Northern United States. Studies 1a/1b revealed substantial differences in the specific features generated by members of the two groups, but Studies 2 and 3 revealed cultural similarities in the underlying dimensions of self-respect, moral behavior, and social status/respect. Ratings of the centrality and personal importance of these factors were similar across the two groups, but their association with other relevant constructs differed. The tripartite nature of honor uncovered in these studies helps observers and researchers alike understand how diverse responses to situations can be attributed to honor. Inclusion of a prototype analysis into the literature on honor cultures can provide enhanced coverage of the concept that may lead to testable hypotheses and new theoretical developments.

  3. 32 CFR 901.12 - Honor military and honor Naval schools-AFROTC and AFJROTC category.

    Science.gov (United States)

    2010-07-01

    ... for nomination in this category applies to the administrative authority of the school involved. (b... 32 National Defense 6 2010-07-01 2010-07-01 false Honor military and honor Naval schools-AFROTC...) DEPARTMENT OF THE AIR FORCE MILITARY TRAINING AND SCHOOLS APPOINTMENT TO THE UNITED STATES AIR FORCE ACADEMY...

  4. Honors and Non-Honors Student Engagement: A Model of Student, Curricular, and Institutional Characteristics

    Science.gov (United States)

    Buckner, Ellen; Shores, Melanie; Sloane, Michael; Dantzler, John; Shields, Catherine; Shader, Karen; Newcomer, Bradley

    2016-01-01

    The purpose of this study was to apply several measures of learning and engagement to a comparable cohort of honors and non-honors students in order to generate a preliminary model of student engagement. Specific purposes were the following: (1) to determine the feasibility for use of several measures of student characteristics that may affect…

  5. IEEE International Symposium on Biomedical Imaging.

    Science.gov (United States)

    2017-01-01

    The IEEE International Symposium on Biomedical Imaging (ISBI) is a scientific conference dedicated to mathematical, algorithmic, and computational aspects of biological and biomedical imaging, across all scales of observation. It fosters knowledge transfer among different imaging communities and contributes to an integrative approach to biomedical imaging. ISBI is a joint initiative from the IEEE Signal Processing Society (SPS) and the IEEE Engineering in Medicine and Biology Society (EMBS). The 2018 meeting will include tutorials, and a scientific program composed of plenary talks, invited special sessions, challenges, as well as oral and poster presentations of peer-reviewed papers. High-quality papers are requested containing original contributions to the topics of interest including image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological, and statistical modeling. Accepted 4-page regular papers will be published in the symposium proceedings published by IEEE and included in IEEE Xplore. To encourage attendance by a broader audience of imaging scientists and offer additional presentation opportunities, ISBI 2018 will continue to have a second track featuring posters selected from 1-page abstract submissions without subsequent archival publication.

  6. Academic success and early career outcomes : Can honors alumni be distinguished from non-honors alumni?

    NARCIS (Netherlands)

    Kool, A.; Mainhard, M. T.; Brekelmans, M.; van Beukelen, P.; Jaarsma, Alexandra

    2016-01-01

    This study compared Dutch alumni who previously participated in an honors program (n=72) to non-honors alumni who entered university as high-achieving high school students (n=72) with regard to (1) final university grade point average (GPA) and (2) early career outcomes. Final grades were drawn from

  7. Inking and Thinking: Honors Students and Tattoos

    Science.gov (United States)

    Dundes, Lauren; Francis, Antonia

    2016-01-01

    This study examines whether academically accelerated students in a college Honors program are as likely as other students to acquire a tattoo and to spend the same amount of time contemplating this decision. A convenience sample of 71 honors students and 135 non-honors students completed a survey at a small mid-Atlantic liberal arts college in…

  8. School violence and the culture of honor.

    Science.gov (United States)

    Brown, Ryan P; Osterman, Lindsey L; Barnes, Collin D

    2009-11-01

    We investigated the hypothesis that a sociocultural variable known as the culture of honor would be uniquely predictive of school-violence indicators. Controlling for demographic characteristics associated in previous studies with violent crime among adults, we found that high-school students in culture-of-honor states were significantly more likely than high-school students in non-culture-of-honor states to report having brought a weapon to school in the past month. Using data aggregated over a 20-year period, we also found that culture-of-honor states had more than twice as many school shootings per capita as non-culture-of-honor states. The data revealed important differences between school violence and general patterns of homicide and are consistent with the view that many acts of school violence reflect retaliatory aggression springing from intensely experienced social-identity threats.

  9. Academic success and early career outcomes : Can honors alumni be distinguished from non-honors alumni?

    NARCIS (Netherlands)

    Kool, A.; Mainhard, M. T.; Jaarsma, A. D C; Brekelmans, M.; van Beukelen, P.

    2016-01-01

    This study compared Dutch alumni who previously participated in an honors program (n = 72) to non-honors alumni who entered university as high-achieving high school students (n = 72) with regard to (1) final university grade point average (GPA) and (2) early career outcomes. Final grades were drawn

  10. Honor as Cultural Mindset: Activated Honor Mindset Affects Subsequent Judgment and Attention in Mindset-Congruent Ways

    NARCIS (Netherlands)

    Novin, Sheida; Oyserman, Daphna

    2016-01-01

    Honor values articulate gender roles, the importance of reputation in maintaining one’s place in society, and maintaining respect for the groups one belongs to. In that sense honor provides a template for organizing social interactions and hence may be functional even among people and societies that

  11. Coexistence of IEEE 802.11b/g WLANs and IEEE 802.15.4 WSNs : Modeling and Protocol Enhancements

    NARCIS (Netherlands)

    Yuan, W.

    2011-01-01

    As an emerging short-range wireless technology, IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) are increasingly used in the fields of home control, industrial control, consumer electronics, energy management, building automation, telecom services, personal healthcare, etc. IEEE

  12. Teaching for excellence: honors pedagogies revealed

    NARCIS (Netherlands)

    Wolfensberger, M.V.C.

    2012-01-01

    What are characteristics of honors pedagogies in higher education? What are the teaching strategies that are particularly relevant and successful for academically gifted and motivated students? In spite of the substantial body of literature about the practice of honors education, very little

  13. Researching the roots of IEEE Region 8

    NARCIS (Netherlands)

    Bastiaans, M.J.

    2013-01-01

    This paper describes the preliminary steps towards the foundation and the early history of IRE Region 9 / IEEE Region 8. The information has been gathered mainly from the archives of the IEEE Benelux Section.

  14. Costs and Benefits in the Economy of Honors

    Science.gov (United States)

    Badenhausen, Richard

    2012-01-01

    To be in honors is to be engaged in many different economic arrangements and exchanges. Honors educators work in concert with their admissions offices while recruiting high-achieving students whose decisions often hinge on how much money the institution can offer in the form of discounts to tuition and financial aid. Honors programs that tie…

  15. Consider Your Man Card Reissued: Masculine Honor and Gun Violence

    Science.gov (United States)

    Shuffelton, Amy

    2015-01-01

    In this article, Amy Shuffelton addresses school shootings through an investigation of honor and masculinity. Drawing on recent scholarship on honor, including Bernard Williams's "Shame and Necessity" and Kwame Anthony Appiah's "The Honor Code," Shuffelton points out that honor has been misconstrued as exclusively a matter of…

  16. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  17. IEEE C37.82-1987: IEEE standard for the qualification of switchgear assemblies for Class 1E applications in nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the methods and requirements for qualifying switchgear assemblies for indoor areas outside of the containment in nuclear power generating stations. These assemblies include (1) metal-enclosed low-voltage power circuit breaker switchgear assemblies, as defined in ANSI/IEEE C37.20.1-1987, (2) metal-clad switchgear assemblies, as defined in ANSI/IEEE C37.20.2-1987, (3) metal-enclosed bus, as defined in ANSI/IEEE C37.23-1987, and (4) metal-enclosed interrupter switchgear assemblies, as defined in ANSI/IEEE C37.20.3-1987. The purpose of this document is to provide amplification of the general requirements of ANSI/IEEE Std 323-1983 as they apply to the specific features of Class 1E switchgear assemblies. Where differences exist between this document and ANSI/IEEE Std 323-1983, this document takes precedence insofar as switchgear assemblies are concerned

  18. To honor and obey: Perceptions and disclosure of sexual assault among honor ideology women.

    Science.gov (United States)

    McLean, Caitlin L; Crowder, Marisa K; Kemmelmeier, Markus

    2018-05-15

    The overwhelming majority of rapes goes unreported. To better understand the sociocultural mechanisms behind why underreporting may occur, three studies (total n = 1,481) examine how women's endorsement of honor values influence the perceptions of rape. Using vignettes that varied the closeness of the perpetrator of a sexual assault (i.e., stranger, acquaintance, or husband), we found that women who endorse honor values of womanhood were less likely to label a forced sexual act as "rape" and to suggest that the victim discloses the rape to others, including to the police. This was especially true the closer the victim was to the perpetrator (e.g., husband vs. stranger). Our findings highlight the effects of honor values on perceived sexual assault and the consequences of disclosure, and may aid in understanding barriers to rape reporting and areas for intervention. © 2018 Wiley Periodicals, Inc.

  19. The Fessenden Honors in Engineering Program

    Science.gov (United States)

    Giazzoni, Michael

    2018-01-01

    Developing honors opportunities for students in engineering programs can be difficult, and the experience at the University of Pittsburgh is no exception. Often these students' degree requirements are so demanding that their opportunities for participating in honors experiences are severely limited. In each of the two semesters of their freshman…

  20. Honor crimes: review and proposed definition

    NARCIS (Netherlands)

    Elakkary, S.; Franke, B.; Shokri, D.; Hartwig, S.; Tsokos, M.; Puschel, K.

    2014-01-01

    There is every reason to believe that honor based violence is one of the forms of domestic violence that is being practiced against females all over the world. This type of violence includes a wide range of crimes, the severest of which is honor killing. Many studies have adopted different

  1. The Study on Activation Strategy of Time-honored Brand

    Directory of Open Access Journals (Sweden)

    Mu Jiankang

    2017-01-01

    Full Text Available Time-honored brands have profound cultural heritage, a large part of glorious time-honored brands has gradually disappeared from the market. Brand activation is the core of management strategic of brand equity as well as the fundamental requirement of time-honored enterprise recovery. This paper constructs the time-honored brand purchase model and finds that consumers nostalgic psychology for the consumer’s perception and buying behavior has a positive effect.

  2. Toward a Science of Honors Education

    Science.gov (United States)

    Jones, Beata M.

    2016-01-01

    In this article, Beata Jones attempts to organize the honors discipline into a comprehensive framework that can guide explorations and shed light on specific attributes of honors entities in the framework of their interrelationships. The framework offers an approach to deal with the inherent fragmentation of the field, which can lead to…

  3. Medal of Honor Recipients: 1979-2004

    National Research Council Canada - National Science Library

    Richardson, Glenda

    2004-01-01

    .... Although the Persian Gulf War, Operation Enduring Freedom, and Operation Iraqi Freedom are listed in the Table of Contents, as of this writing, no Medals of Honor have been awarded for actions in these conflicts. For further information, see CRS Report 95-519, "Medal of Honor: History and Issues." This report will be updated as new recipients are named.

  4. Prioritizing Service to the Academically Talented: The Honors College

    Science.gov (United States)

    Floyd, Deborah L.; Holloway, Alexandria

    2006-01-01

    This chapter describes community college honors programs and courses, emphasizing in particular the Honors College at Miami Dade College in Florida. The chapter discusses pros and cons of honors programs and courses in the context of their appropriateness to the community college mission of open access and egalitarianism. (Contains 1 table.)

  5. Fiber optics backbone for IEEE 802.3 networks

    Science.gov (United States)

    Shani, Ron

    1990-01-01

    In the last few years the IEEE 802.3 committee has developed fiber optics inter-repeater link standard called FOIRL. This standard defines the "Fiber Optics Media Access Unit" (FOMAU) which is used to connect two IEEE 802.3 repeaters that are up to 1Km apart. The IEEE 802.3 lOBaseF task force is currently standardizing a full F/O system in two directions: passive and active. The active approach is a compromise between the FOIRL (Asynchronous) approach and the Synchronous approach. As a result of this activity the IEEE 802.3 standard will define three different F/O interfaces and several devices that will not inter-operate. Such a standard will lower the credibility among the IEEE 802.3 user community, as customers will be confused amidst the many chapters and devices with no clear choice. This paper describes a method that can reduce the number of standards to two (passive and active), while proposing a solution for all the requirements of 802.3 F/O LAN. (The question of passive vs active approach will be discussed in this paper).

  6. The Effect of Honors Courses on Grade Point Averages

    Science.gov (United States)

    Spisak, Art L.; Squires, Suzanne Carter

    2016-01-01

    High-ability entering college students give three main reasons for not choosing to become part of honors programs and colleges; they and/or their parents believe that honors classes at the university level require more work than non-honors courses, are more stressful, and will adversely affect their self-image and grade point average (GPA) (Hill;…

  7. Interdisciplinary Teaching of Theatre and Human Rights in Honors

    Science.gov (United States)

    Szasz, Maria

    2017-01-01

    Since spring 2012, the author has taught a 300-level Theatre and Human Rights class in the University of New Mexico Honors College. One of the centerpieces of honors education is careful research and thorough analysis of what is taught and why it is taught. In creating the honors class Theatre and Human Rights, the author explored how she would…

  8. Honor, Anger, and Belittlement in Aristotle’s Ethics

    Directory of Open Access Journals (Sweden)

    Robert Sokolowski

    2014-06-01

    Full Text Available The author considers the phenomenon of honor (timē by examining Aristotle’s description of it and its role in ethical and political life. His study of honor leads him to two related phenomena, anger (orgē and belittlement or contempt (oligōria; examining them helps him define honor more precisely. With his examination of honor the author shows how densely interwoven Aristotle’s ethical theory is; he illuminates such diverse things as the human good, political life and friendship, virtue, vice, incontinence, flattery, wealth and pleasure; he shows how the metaphysical principles of dunamis and energeia are at work in human affairs; he treats the passion of anger as well as the moral attitude of contempt that provokes it, and he situates both within the study of rhetoric.

  9. Honors in Honduras: Engaged Learning in Action

    Science.gov (United States)

    Folds-Bennett, Trisha; Twomey, Mary Pat

    2013-01-01

    A significant challenge in honors education is providing experiences through which students deeply engage ideas and content so that their analytical abilities and core beliefs and values are transformed. The College of Charleston Honors College aimed to stimulate critical thinking and examination of core values through a more holistic approach to…

  10. The scalable coherent interface, IEEE P1596

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1990-01-01

    IEEE P1596, the scalable coherent interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960--1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics

  11. The role of honor concerns in emotional reactions to offences

    NARCIS (Netherlands)

    Rodriguez Mosquera, P.M.; Manstead, A.S.R.; Fischer, A.H.

    2002-01-01

    nvestigated the role of honor concerns in mediating the effect of nationality and gender on the reported intensity of anger and shame in reaction to insult vignettes. Spain, an honor culture, and The Netherlands, where honor is of less central significance, were selected for comparison. A total of

  12. R&D 100 Awards Honor NREL Research

    Science.gov (United States)

    R&D 100 Awards Honor NREL Research For more information contact: George Douglas 303-275-4096 e National Renewable Energy Laboratory will be honored Thursday with two R&D 100 awards. The awards are given each year by the editors of R&D Magazine for what they consider to be among the year's 100

  13. Proceedings of IEEE Machine Learning for Signal Processing Workshop XV

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the Fifteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP’2005), held in Mystic, Connecticut, USA, September 28-30, 2005. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP) organized...... by the NNSP Technical Committee of the IEEE Signal Processing Society. The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized...... by the Machine Learning for Signal Processing Technical Committee with sponsorship of the IEEE Signal Processing Society. Following the practice started two years ago, the bound volume of the proceedings is going to be published by IEEE following the Workshop, and we are pleased to offer to conference attendees...

  14. Honoring Teachers for Their Vocation and Potential

    Science.gov (United States)

    Williams, Raymond Brady

    2007-01-01

    One goal of the Wabash Center is to honor teachers for their potential, and hospitality has been a primary means to that end. A lesson learned is that the intention and effort to honor teachers create contexts for meaningful discussions, creative learning, and personal renewal of those engaged in workshops and consultations. The lesson is valuable…

  15. Fear of the Loss of Honor: Implications of Honor-Based Violence for the Development of Youth and Their Families

    Science.gov (United States)

    Sedem, Mina; Ferrer-Wreder, Laura

    2015-01-01

    Background: Violence committed against young women, and in some cases young men, who are considered to have violated honor-based norms are reported in several countries, making honor-based violence (HBV) a global concern. This article is an overview of research in this area and summarizes key findings from a Swedish program of research dedicated…

  16. Qualification test of Class 1E equipment based on IEEE323 Std 2003

    International Nuclear Information System (INIS)

    Kim, J. S.; Jung, S. C.; Kim, T. R.

    2004-01-01

    IEEE Standard for Qualifying Class 1E Equipment has been updated to 2003 edition since the issue of IEEE Std 323-1971, 1974, 1983. NRC approved the IEEE Std 323-1974 as Qualification standard of Class 1E Equipment in domestic nuclear power plant. IEEE Std 323-2003 was issued in September of 2003 and utility is waiting the approval of NRC. IEEE Std 323-2003 suggest a new qualification technique which adopts the condition monitoring. Performance of two transient during DBA test is no longer recommended in IEEE Std 323-2003. IEEE323 Std 2003 included a chapter of ''extension of Qualified life'' to make available the life extension of components during plant life extension. For the efficient control of preserving EQ in domestic nuclear power plant, IEEE323 Std 2003 is strongly recommended

  17. Aan de slag met honors : praktijklessen uit Europa

    NARCIS (Netherlands)

    Wolfensberger, Marca; Hogenstijn, Maarten

    2015-01-01

    In de brochure ‘Aan de slag met honors’ worden onderzoeksresultaten van het onderzoeksproject Honors in Europe hertaald naar tips voor succesvol en inspirerend honorsonderwijs. De brochure is grotendeels gebaseerd op het boek Talent Development in European Higher Education – Honors programs in the

  18. IEEE Prize for Lucio Rossi

    CERN Multimedia

    IEEE Council on Superconductivity

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity's Awards Committee (right).

  19. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  20. Proceedings IEEE Visualization Conference and IEEE Information Visualization Conference (VIS'07 and INFOVIS'07, Sacramento CA, USA, October 28-November 1, 2007)

    NARCIS (Netherlands)

    Chen, M.; Hansen, C.; North, C.; Pang, A.; Wijk, van J.J.

    2007-01-01

    These are the proceedings of the IEEE Visualization Conference 2007 (Vis 2007) and the IEEE Information Visualization Conference 2007 (InfoVis 2007) held during October 28 to November 1, 2007 in Sacramento, California. The power of using computing technology to create useful, effective imagery for

  1. Mothers in Honors

    Science.gov (United States)

    Killinger, Mimi; Binder-Hathaway, Rachel; Mitchell, Paige; Patrick, Emily

    2013-01-01

    This article describes the experiences of four honors mothers as they offer sage advice. They argue convincingly that they are motivated, focused students who bring rich diversity to college programs. They further report disturbing marginalization and isolation that could be ameliorated with support and increased sensitivity on the part of…

  2. Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards

    Science.gov (United States)

    Sharma, V.; Singh, H.; Malhotra, J.

    2012-12-01

    Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

  3. Creating Opportunities for Peer Leadership in Honors Education

    Science.gov (United States)

    Leichliter, Marie E.

    2013-01-01

    Honors educators are privileged to work with exceptional students who are also some of the most engaged and motivated students on campus. These students often seek opportunities within their honors experience to study abroad, join community service organizations, conduct research, participate in internships, and develop their leadership skills.…

  4. Assessing Success in Honors: Getting beyond Graduation Rates

    Science.gov (United States)

    Kelly, Sean K.

    2013-01-01

    An honors curriculum with realistic graduation requirements should have a respectable graduation rate. This number, when low, can indicate significant problems in the program. But a high graduation rate does not necessarily indicate success. A quality honors program, especially one that remains attentive to students' ability to thrive, might have…

  5. Return of IEEE Std 627 and its Value to Equipment Qualification Programs

    International Nuclear Information System (INIS)

    Horvath, D.A.

    2012-01-01

    IEEE Std 627 ''Design Qualification of Safety Systems Equipment Used in Nuclear Power Generating Stations'' was issued to more generically establish qualification requirements in the form of a high level umbrella document. Efforts on this standard began in late 1975 at the request of the IEEE Nuclear Standards Management Board. In 1977 a joint ASME/IEEE agreement established responsibility for qualification and quality assurance standards preparation. ASME accepted responsibility for Quality Assurance and IEEE for qualification. In accordance with that agreement, IEEE completed the generic qualification standard in 1980. This document provided high level approaches, criteria, guidance, and principles for qualification of both electrical and mechanical equipment that at that time appeared in no other industry standard. IEEE Std 627-1980 was later reaffirmed in 1996. In 1986, ASME's Board on Nuclear Codes and Standards directed its Committee on Qualification of Mechanical Equipment (QME) to develop a standard for qualifying mechanical equipment. This task was completed in several parts during the time frame from 1992 to 1994. Partly in response to this activity, IEEE Std 627 was withdrawn in 2002. Later although withdrawn, it was found that IEEE Std 627 was continuing to be used and referenced by many entities both in the US and other countries including in ASME's QME-1-2002 ''Qualification of Active Mechanical Equipment Used in Nuclear Power Plants'', US NRC's NUREG-0800 Standard Review Plan Section 3.11, at least one reactor vendor's Design Certification Document (DCD), several international licensing documents, and elsewhere. As a result, in 2007, the IEEE Standards Board authorized Working Group 2.10 of Subcommittee 2 (Qualification) of the Power and Energy Society's Nuclear Power Engineering Committee to resurrect and update IEEE Std 627-1980 (Reaff 1996). The result was the culmination IEEE Std 627 in 2010. This paper will report on the eight improvements made

  6. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    The Nobel prize winner Georges Charpak and W. Cleon Anderson, IEEE President, unveil the Milestone bronze plaques. At a ceremony on 26 September at the Globe of Science and Innovation, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally dedicated Milestone plaques recognising the invention of electronic particle detectors at CERN. The plaque were unveiled by Mr Anderson and Georges Charpak, the Nobel-prize winning inventor of wire chamber technology at CERN in 1968. The IEEE is the world's largest professional association dedicated to the advancement of technology with 365,000 individual members in over 150 countries. Established in 1983, there are currently over 60 Milestones around the world. They honour momentous achievements in the history of electrical and electronics engineering, such as the landing of the first transatlantic cable, code breaking at Bletchley Park during World War II, and the development of the Japanese Bullet train, the Tokaido Shin...

  7. IEEE Std 535-1986: IEEE standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 308-1980 can be demonstrated by using the procedures provided in this standard in accordance with ANSI/IEEE Std 323-1983. Battery sizing, maintenance, capacity testing, installation, charging equipment, and consideration of other type batteries are beyond the scope of this standard

  8. Cicero, Retrieving the Honorable

    Directory of Open Access Journals (Sweden)

    William A. Frank

    2014-06-01

    Full Text Available From Marcus Tullius Cicero’s philosophical writings, the author first draws out a modest network of ideas that informs his understanding of what it means to be a good man (vir bonus. Then, he finds in Cicero the idea of a befitting mutuality among four distinctively human capacities: a faculty for inquiry into and love for truth manifest in words and actions (reason; a disposition for the recognition of and attraction to things of worth beyond self-interest (the honorable; an acute sense of one own spheres of responsibility along with facility for speaking and acting appropriately within them (appropriate action, and fostering and extending the bonds of mutual personal relations grounded in justice and benevolence (society. Against the background of deep commitments in modernity to hedonism and autonomous individualism, the author proposes a retrieval of the virtue of the honorable as an attractive alternative.

  9. Honor Killing: Where Pride Defeats Reason.

    Science.gov (United States)

    Kanchan, Tanuj; Tandon, Abhishek; Krishan, Kewal

    2016-12-01

    Honor killings are graceless and ferocious murders by chauvinists with an antediluvian mind. These are categorized separately because these killings are committed for the prime reason of satisfying the ego of the people whom the victim trusts and always looks up to for support and protection. It is for this sole reason that honor killings demand strict and stern punishment, not only for the person who committed the murder but also for any person who contributed or was party to the act. A positive change can occur with stricter legislation and changes in the ethos of the society we live in today.

  10. IEEE Std 535-1979: IEEE standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1971 and IEE Std 308-1978, can be demonstrated by using the procedures provided in this standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other type batteries are beyond the scope of this standard

  11. Naming patterns reveal cultural values: patronyms, matronyms, and the U.S. culture of honor.

    Science.gov (United States)

    Brown, Ryan P; Carvallo, Mauricio; Imura, Mikiko

    2014-02-01

    Four studies examined the hypothesis that honor norms would be associated with a pronounced use of patronyms, but not matronyms, for naming children. Study 1 shows that men who endorse honor values expressed a stronger desire to use patronyms (but not matronyms) for future children, an association that was mediated by patriarchal attitudes. Study 2 presents an indirect method for assessing state patronym and matronym levels. As expected, patronym scores were significantly higher in honor states and were associated with a wide range of variables linked previously to honor-related dynamics. Study 3a shows that following the terrorist attacks of 9/11, patronyms increased in honor states, but not in non-honor states. Likewise, priming men with a fictitious terrorist attack (Study 3b) increased the association between honor ideology and patronym preferences. Together, these studies reveal a subtle social signal that reflects the masculine values of an honor culture.

  12. Demography of Honors: The Census of U.S. Honors Programs and Colleges

    Science.gov (United States)

    Scott, Richard I.; Smith, Patricia J.; Cognard-Black, Andrew J.

    2017-01-01

    Beginning in 2013 and spanning four research articles, we have implemented an empirical analysis protocol for honors education that is rooted in demography (Scott; Scott and Smith; Smith and Scott "Growth"; Smith and Scott, "Demography"). The goal of this protocol is to describe the structure and distribution of the honors…

  13. Committed to the Honor Code: An Investment Model Analysis of Academic Integrity

    Science.gov (United States)

    Dix, Emily L.; Emery, Lydia F.; Le, Benjamin

    2014-01-01

    Educators worldwide face challenges surrounding academic integrity. The development of honor codes can promote academic integrity, but understanding how and why honor codes affect behavior is critical to their successful implementation. To date, research has not examined how students' "relationship" to an honor code predicts…

  14. Honoring our Nation's Veterans

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2015-11-01

    Full Text Available No abstract available. Article truncated at 150 words. Today is Armistice Day, renamed Veterans Day in 1954, to honor our Nation's Veterans. In Washington the rhetoric from both the political right and left supports our Veterans. My cynical side reminds me that this might have something to do with Veterans voting in a higher percentage than the population as a whole, but let me give the politicians this one. Serving our Country in the military is something that deserves to be honored. I was proud to serve our Veterans over 30 years at the four Department of Veterans Affairs (VA hospitals. However, the VA has had a very bad year. First, in Washington there were the resignations of the Secretary of Veterans Affairs, Eric Shinseki; the undersecretary for the Veterans Health Administration, Robert Petzel; and the undersecretary for the Veterans Benefits Administration, Allison Hickey. Locally, in the light of the VA wait scandal there were the firing of ...

  15. Honors pedagogy: tailoring learning preferences of honors and regular students for autonomy and structure

    NARCIS (Netherlands)

    Kingma, Tineke; Kamans, Elanor; Heijne, Marjolein; Wolfensberger, Marca; Jaarsma, Debbie

    2017-01-01

    Students differ in their learning preferences. When students are more intrinsically motivated this improves their well-being and involvement (Levesque, Zuehlke, Stanek, & Ryan, 2004). Teaching highly motivated honors students places different demands on teachers (Wolfensberger, 2012). High motivated

  16. Turning Points: Improving Honors Student Preparation for Thesis Completion

    Science.gov (United States)

    Patino, Cynthia

    2012-01-01

    This dissertation is an action research study that had as its primary goal to increase retention of honors college students at Arizona State University by implementing an additional advising session during the fifth semester of their academic career. Introducing additional, strategically-timed support for the honors thesis and demystifying the…

  17. IEEE Prize for Lucio Rossi

    CERN Multimedia

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity’s Awards Committee (right). (Photo: IEEE Council on Superconductivity)With the magnets installed in the tunnel and work on the interconnections almost completed, Lucio Rossi has reaped the rewards of fifteen years of work. And yet, when the physicist from Milan arrived to take charge of the group responsible for the superconducting magnets in 2001, success seemed far from assured. Endowed with surprising levels of energy, Lucio Rossi, together with his team, ensured that production of these highly complex magnets got underway. Today, that achievement earns them the recognition not only of CERN but also of the international superconducting community. It is for this achievement that Lucio Rossi was awarded the prize by the IEEE’s (Institute of Electrical an...

  18. Mission, Performance Indicators, and Assessment in U.S. Honors: A View from the Netherlands

    Science.gov (United States)

    Bartelds, Vladimir; Drayer, Lyndsay; Wolfensberger, Marca V. C.

    2012-01-01

    A mission statement that identifies the goals and aims of an honors program is a key step in program development. The National Collegiate Honors Council's Basic Characteristics of a Fully Developed Honors Program states unequivocally that a successful honors program "has a clear mandate from the institution's administration in the form of a…

  19. A Tradition Unlike Any Other: Research on the Value of an Honors Senior Thesis

    Science.gov (United States)

    Banks, H. Kay

    2016-01-01

    An honors senior thesis introduces students into a world of scholarship and professional activity in a way that no single course, either semester- or year-long, can do (Anderson, Lyons, and Weiner). Many honors educators consider honors thesis work to be the defining honors experience. For graduate schools, employers, and the students themselves,…

  20. IEEE Conference Publications in Libraries.

    Science.gov (United States)

    Johnson, Karl E.

    1984-01-01

    Conclusions of surveys (63 libraries, OCLC database, University of Rhode Island users) assessing handling of Institute of Electrical and Electronics Engineers (IEEE) conference publications indicate that most libraries fully catalog these publications using LC cataloging, and library patrons frequently require series access to publications. Eight…

  1. IEEE International Workshop on Machine Learning for Signal Processing: Preface

    DEFF Research Database (Denmark)

    Tao, Jianhua

    The 21st IEEE International Workshop on Machine Learning for Signal Processing will be held in Beijing, China, on September 18–21, 2011. The workshop series is the major annual technical event of the IEEE Signal Processing Society's Technical Committee on Machine Learning for Signal Processing...

  2. Honored Teacher Shows Commitment.

    Science.gov (United States)

    Ratte, Kathy

    1987-01-01

    Part of the acceptance speech of the 1985 National Council for the Social Studies Teacher of the Year, this article describes the censorship experience of this honored social studies teacher. The incident involved the showing of a videotape version of the feature film entitled "The Seduction of Joe Tynan." (JDH)

  3. NREL's Earl Christensen Honored with Two Awards from National Biodiesel

    Science.gov (United States)

    Board | News | NREL NREL's Earl Christensen Honored with Two Awards from National Biodiesel Board NREL's Earl Christensen Honored with Two Awards from National Biodiesel Board February 16, 2018 Fuel stability research advances innovation and bolsters industry confidence in biodiesel. Scott

  4. An Augustinian Culture of Learning for Interdisciplinary Honors Programs

    Science.gov (United States)

    Ste. Antoine, Tom

    2010-01-01

    Any attempt to discern the purpose of honors education and to integrate it with the unique ethos of a Christian institution can prove to be difficult. Yet, describing and articulating a sense of purpose is essential for an honors program to justify itself. This essay contends that a philosophy of education based on Augustine's…

  5. IEEE guide for the analysis of human reliability

    International Nuclear Information System (INIS)

    Dougherty, E.M. Jr.

    1987-01-01

    The Institute of Electrical and Electronics Engineers (IEEE) working group 7.4 of the Human Factors and Control Facilities Subcommittee of the Nuclear Power Engineering Committee (NPEC) has released its fifth draft of a Guide for General Principles of Human Action Reliability Analysis for Nuclear Power Generating Stations, for approval of NPEC. A guide is the least mandating in the IEEE hierarchy of standards. The purpose is to enhance the performance of an human reliability analysis (HRA) as a part of a probabilistic risk assessment (PRA), to assure reproducible results, and to standardize documentation. The guide does not recommend or even discuss specific techniques, which are too rapidly evolving today. Considerable maturation in the analysis of human reliability in a PRA context has taken place in recent years. The IEEE guide on this subject is an initial step toward bringing HRA out of the research and development arena into the toolbox of standard engineering practices

  6. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    Science.gov (United States)

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  7. IEEE Std 650-1990: IEEE standard for qualification of Class 1E static battery chargers and inverters for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    Methods for qualifying static battery chargers and inverters for Class 1E installations in a mild environment outside containment in nuclear power generating stations are described. The qualification methods set forth employ a combination of type testing and analysis, the latter including a justification of methods, theories, and assumptions used. These procedures meet the requirements of IEEE Std 323-1983, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations

  8. Building Bridges between Science Courses Using Honors Organic Chemistry Projects

    Science.gov (United States)

    Hickey, Timothy; Pontrello, Jason

    2016-01-01

    Introductory undergraduate science courses are traditionally offered as distinct units without formalized student interaction between classes. To bridge science courses, the authors used three Honors Organic Chemistry projects paired with other science courses. The honors students delivered presentations to mainstream organic course students and…

  9. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The award was presented by the deputy programme chair Vince Cianciolo (left) at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November.

  10. Setting Them Free: Students as Co-Producers of Honors Education

    Science.gov (United States)

    van Gorp, Bouke; Wolfensberger, Marca V. C.; de Jong, Nelleke

    2012-01-01

    While the attractions and advantages of freedom that differentiates honors education from regular teaching are both theoretically and practically significant, the authors' experience at Utrecht University in the Netherlands has demonstrated drawbacks that need to be addressed and resolved in creating effective honors education. Freedom poses…

  11. Honors Programs at Smaller Colleges. 3rd Edition. National Collegiate Honors Council Monograph Series

    Science.gov (United States)

    Schuman, Samuel

    2011-01-01

    This monograph focuses upon areas of special concern to those working with honors at smaller colleges and universities: mission, recruitment, facilities, administration, budget, and curriculum. In each area, the author makes some general suggestions about overall operating principles, note specific issues that can lead to difficulties, and suggest…

  12. Hearts and Minds: Honors Programs in North American Christian Institutions

    Science.gov (United States)

    Bratt, Kenneth

    2010-01-01

    For readers outside North America, the concept of "honors education" may be confusing (since the word honours features in British and Commonwealth degree titles) or obscure (bringing to mind associations with aristocratic privilege or elitist competition). But in the United States the development of honors programs in colleges, and later honors…

  13. IEEE Conference Record - Abstracts. 1997 IEEE International Conference on Plasma Science, 19 - 22 May 1997 San Diego, California

    National Research Council Canada - National Science Library

    Hyman, Julius

    1997-01-01

    This 360 page softbound publication includes the following major sections. An invitation to ICOPS'97, Catamaran Resort Hotel Floor Pinas, Officers of the IEEE Nuclear and Plasma Sciences Society, Conference Information...

  14. Life history, code of honor, and emotional responses to inequality in an economic game.

    Science.gov (United States)

    Pedersen, Eric J; Forster, Daniel E; McCullough, Michael E

    2014-10-01

    The code of honor, which is characterized by a preoccupation with reputation and willingness to take retaliatory action, has been used extensively to explain individual and cultural differences in peoples' tendencies to behave aggressively. However, research on the relationship between the code of honor and emotional responses to social interactions has been limited in scope, focusing primarily on anger in response to insults and reputational threats. Here we broaden this scope by examining the relationship between code of honor and emotional reactions in response to an unfair economic exchange that resulted in unequal monetary earnings among 3 laboratory participants. We found that endorsement of the code of honor was related to anger and envy in response to unfair monetary distributions. Interestingly, code of honor predicted envy above and beyond what could be accounted for by anger, but the converse was not the case. This suggests that the code of honor influenced perceptions of how subjects viewed their own earnings relative to those of others, which consequently was responsible for their apparent anger as a result of the economic transaction. Furthermore, the unique relationship between code of honor and envy was present only for subjects who received unfair treatment and not for subjects who merely witnessed unfair treatment. Additionally, we replicated previous findings that harsh childhood environmental conditions are associated with endorsement of the code of honor, highlighting the potential value of incorporating a life history theoretical approach to investigating individual differences in endorsement of the code of honor. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  15. Honors Thesis Preparation: Evidence of the Benefits of Structured Curricula

    Science.gov (United States)

    Engel, Steven

    2016-01-01

    A recent study of honors curricula across the nation indicates that 75.6% of honors programs and colleges at four-year institutions have thesis or capstone requirements (Savage and Cognard-Black). In addition to institutions with thesis requirements, many more also have the option for students to complete theses. For example, an earlier study…

  16. Male honor and female fidelity: implicit cultural scripts that perpetuate domestic violence.

    Science.gov (United States)

    Vandello, Joseph A; Cohen, Dov

    2003-05-01

    Two studies explored how domestic violence may be implicitly or explicitly sanctioned and reinforced in cultures where honor is a salient organizing theme. Three general predictions were supported: (a) female infidelity damages a man's reputation, particularly in honor cultures; (b) this reputation can be partially restored through the use of violence; and (c) women in honor cultures are expected to remain loyal in the face of jealousy-related violence. Study 1 involved participants from Brazil (an honor culture) and the United States responding to written vignettes involving infidelity and violence in response to infidelity. Study 2 involved southern Anglo, Latino, and northern Anglo participants witnessing a "live" incident of aggression against a woman (actually a confederate) and subsequently interacting with her.

  17. Energy Harvesting - Wireless Sensor Networks for Indoors Applications Using IEEE 802.11

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Sørensen, Thomas; Madsen, Jan

    2014-01-01

    The paper investigates the feasibility of using IEEE 802.11 in energy harvesting low-power sensing applications. The investigation is based on a prototype carbon dioxide sensor node that is powered by artificial indoors light. The wireless communication module of the sensor node is based on the RTX......4100 module. RTX4100 incorporates a wireless protocol that duty-cycles the radio while being compatible with IEEE 802.11 access points. The presented experiments demonstrate sustainable operation but indicate a trade-off between the benefits of using IEEE 802.11 in energy harvesting applications...

  18. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    At a ceremony at CERN, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally a Milestone plaque in recognition of the invention of electronic particle detectors at CERN

  19. 0011-0030.How to make an abstract in IEEE Format for ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.How to make an abstract in IEEE Format for AvishkarMulticultural Night in IEEE R10 Student Congress 2009Performances.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook ...

  20. IEEE 1451.2 based Smart sensor system using ADuc847

    Science.gov (United States)

    Sreejithlal, A.; Ajith, Jose

    IEEE 1451 standard defines a standard interface for connecting transducers to microprocessor based data acquisition systems, instrumentation systems, control and field networks. Smart transducer interface module (STIM) acts as a unit which provides signal conditioning, digitization and data packet generation functions to the transducers connected to it. This paper describes the implementation of a microcontroller based smart transducer interface module based on IEEE 1451.2 standard. The module, implemented using ADuc847 microcontroller has 2 transducer channels and is programmed using Embedded C language. The Sensor system consists of a Network Controlled Application Processor (NCAP) module which controls the Smart transducer interface module (STIM) over an IEEE1451.2-RS232 bus. The NCAP module is implemented as a software module in C# language. The hardware details, control principles involved and the software implementation for the STIM are described in detail.

  1. NREL Senior Research Fellow Honored by The Journal of Physical Chemistry |

    Science.gov (United States)

    News | NREL 7 » NREL Senior Research Fellow Honored by The Journal of Physical Chemistry News Release: NREL Senior Research Fellow Honored by The Journal of Physical Chemistry January 10, 2007 The Journal of Physical Chemistry B. The Dec. 21 issue was titled The Arthur J. Nozik Festschrift (Volume 110

  2. Minorities and Women and Honors Education.

    Science.gov (United States)

    Harvey, Maria Luisa Alvarez

    1986-01-01

    Although honors education can be a key to the liberation of women and minorities, both groups continue to be underrepresented, perhaps because bright women and minority students are uncomfortable displaying their talents and adding pressure in an already stressful situation. (MSE)

  3. IEEE No. 323, IEEE trial-use standard: General guide for qualifying Class I electric equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the basic requirements for the qualification of Class I electric equipment. This is equipment which is essential to the safe shutdown and isolation of the reactor or whose failure or damage could result in significant release of radioactive material. The purpose of this document is to provide guidance for demonstrating the qualifications of electrical equipment as required in the IEEE Std 279 -- Criteria for Nuclear Power Generating Station Protection Systems, and IEEE Std 308 -- Criteria for Class 1E Electric Systems for Nuclear Power Generating Stations. The qualification methods described may be used in conjunction with the Guides for qualifying specific types of equipment, (see Foreword), for updating qualification following modifications or for qualifying equipment for which no applicable Guide exists

  4. Nursing Care at the Time of Death: A Bathing and Honoring Practice.

    Science.gov (United States)

    Rodgers, Debra; Calmes, Beth; Grotts, Jonathan

    2016-05-01

    To explore family members' experience of a bathing and honoring practice after a loved one's death in the acute care setting.
. A descriptive, qualitative design using a semistructured telephone interview script.
. The Inpatient Adult Oncology Unit at Santa Barbara Cottage Hospital in California. 
. 13 family members who participated in the bathing and honoring practice after their loved one's death on the oncology unit.
. Participants were selected by purposive sampling and interviewed by telephone three to six months after their loved one's death. Interviews using a semistructured script with open-ended questions were recorded, transcribed, verified, and analyzed using phenomenologic research techniques to identify common themes of experience.
. 24 first-level themes and 11 superordinate themes emerged from the data. All participants indicated that the bathing and honoring practice was a positive experience and supported the grieving process. The majority found the practice to be meaningful and stated that it honored their loved one. Many expressed that the bathing and honoring was spiritually significant in a nondenominational way and that they hope it will be made available to all families of patients who die in the hospital. 
. After patient death, a bathing and honoring practice with family member participation is positive and meaningful, and it supports family members' initial grieving.
. This study is a first step toward establishing specific nursing interventions as evidence-based practice that can be incorporated in routine nursing care for patients and families at the end of life.

  5. The IEEE 802.11a standards

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. The IEEE 802.11a standards. Provides higher data rate and system capacities and uses OFDM in Physical Layer to mitigate the multi path effects;. Supports multiple 20Mhz channel. Each channel being an OFDM Modulated;; 52 Carriers. 48 data carrier; 4 Carry pilot ...

  6. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  7. 2000 Honor List: A Hopeful Bunch.

    Science.gov (United States)

    Nilsen, Alleen Pace; Donelson, Ken; Blasingame, James, Jr.

    2001-01-01

    Presents 11 titles selected for the 2000 Honor List for young adult literature. Notes that the books were selected by combining their favorites with the best-book list compiled by the editors of such publications as "School Library Journal,""Booklist," and "Horn Book." (SG)

  8. Introduction to IEEE Std. 7-4.3.2 Annex D -- ''Qualification of existing commercial computers''

    International Nuclear Information System (INIS)

    Holmstrom, K.J.

    1995-01-01

    On September 15th of 1993 the IEEE standards board approved IEEE Std. 7-4.3.2-1993, IEEE Standard for Digital Computers in Safety Systems of Nuclear Power Generating Stations. This paper is an introduction to Annex D of this document which concerns the commercial grade dedication of existing computers or new non-1E computers

  9. Isolan - A Fibre Optic Network Conforming To IEEE 802.3 Standards

    Science.gov (United States)

    Roworth, D. A. A.; Howe, N.

    1986-10-01

    The progress of the IEEE 802.3 standard for fibre optic LANs is indicated with reference to both mixed media networks and full fibre networks. For a fibre optic network the most suitable layout is a "snowflake" topology composed of multiport repeaters and active fibre hubs. A range of components is described which enables the realisation of such a topology in conformance with the IEEE 802.3 standard.

  10. Honors Anthropology and the Four Rs.

    Science.gov (United States)

    Farrer, Claire R.

    1990-01-01

    Describes an honors introductory cultural anthropology course taught at California State University, Chico. Discusses the course design, how course information is made relevant and reinforced, and how students have partial responsibility for the course design. Discusses the use of science fiction books to make material relevant to students. (JS)

  11. 0011-0030.What is IEEE 754 StandardHow to convert real number ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.What is IEEE 754 StandardHow to convert real number in binary format using IEEE 754 StandardAn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.

  12. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false IEEE 1680 Standard for the... CONTRACT CLAUSES Text of Provisions and Clauses 52.223-16 IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE...

  13. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  14. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  15. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    ...) attacks targeting its management and media access protocols Computer simulation models have proven to be effective tools in the study of cause and effect in numerous fields This thesis involved the design and implementation of a IEEE 8O2.11-based simulation model using OMNeT++, to investigate the effects of different types of DoS attacks on a IEEE 8O2.11 network, and the effectiveness of corresponding countermeasures.

  16. Editorial for IEEE Transactions on Power Electronics

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2007-01-01

    Our IEEE transactions on power electronics has had some very positive progress these past years under the leadership of Dr. Daan van Wyk. Papers have been processed efficiently both in review time and publication time. This success has spread throughout the whole power electronics community which...

  17. IEEE Std 730 Software Quality Assurance: Supporting CMMI-DEV v1.3, Product and Process Quality Assurance

    Science.gov (United States)

    2011-05-27

    frameworks 4 CMMI-DEV IEEE / ISO / IEC 15288 / 12207 Quality Assurance ©2011 Walz IEEE Life Cycle Processes & Artifacts • Systems Life Cycle Processes...TAG to ISO TC 176 Quality Management • Quality: ASQ, work experience • Software: three books, consulting, work experience • Systems: Telecom & DoD...and IEEE 730 SQA need to align. The P730 IEEE standards working group has expanded the scope of the SQA process standard to align with IS 12207

  18. Augmenting the Energy-Saving Impact of IEEE 802.3az via the Control Plane

    OpenAIRE

    Thaenchaikun , Chakadkit; Jakllari , Gentian; Paillassa , Béatrice

    2015-01-01

    International audience; IEEE 802.3az, the recent standard for Energy Efficient Ethernet, is one of the main contributions of the ICT industry to the global quest for energy efficiency. Energy consumption reduction is accomplished by essentially replacing the continuous IDLE of legacy IEEE 802.3 cards with a Low Power Idle. While this is an important step in the right direction, studies have shown that the energy saving with IEEE 802.3az highly depends on the traffic load and stops for link ut...

  19. Radio Frequency Fingerprinting Techniques Through Preamble Modification in IEEE 802.11B

    Science.gov (United States)

    2014-06-30

    4.2.1 Wald–Wolfowitz Runs Test . . . . . . . . . . . . . . . . . . . . . . 41 4.2.2 Wald–Wolfowitz Application to SXS System . . . . . . . . . . . . 42...Station SXS Signals eXploitation System USB Universal Serial Bus xiv Acronym Definition USRP Universal Software Radio Peripheral WLAN Wireless Local...Electronics Engineers (IEEE) defines standards applicable to the IEEE 802.11 protocol, however the standard does not reach the level of specificity to dictate

  20. Harmonization of IEEE323 and IEC60780 standards For Environmental Qualificaiton of Electric Equipment

    International Nuclear Information System (INIS)

    Kim, Jong Seog

    2009-01-01

    IEEE323 standard has been widely used for the qualification of electric equipment in Asian pacific area while IEC6070 has been mostly used in European area. Since each plant use different standard for environmental qualification, manufacturer has to perform the qualification test twice in accordance with each standard. Problem also can be happened in the plant site when they are going to purchase equipment qualified by different qualification standard which are not used in his plant. The need of harmonization of each standard has been raised several years and it is known that some studies are in progress by IEEE committee. KEPRI has a plan of comparing EQ relative standards of IEEE, IEC and RCC in 2009. In this paper, brief comparing result between IEEE323 and IEC60780 and the proper harmonization method is introduced

  1. And the Top Honor Goes to Voc Ed.

    Science.gov (United States)

    Hettinger, James

    1998-01-01

    Ray Chelewski is the first vocational-technical educator to win Walt Disney's top teaching honor. Chelewski is an agriculture teacher at the Presque Isle Regional Technology Center in northeast Maine. (JOW)

  2. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    OpenAIRE

    V. Balaji; S. Anand; C.R. Hota; G. Raghurama

    2016-01-01

    In this paper we present a Cooperative Spectrum Sensing (CSS) algorithm for Cognitive Radios (CR) based on IEEE 802.22Wireless Regional Area Network (WRAN) standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration) to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22) within a time constraint (channel sensing time). To meet this objectiv...

  3. A formal analysis of ISO/IEEE P11073-20601 standard of medical device communication

    NARCIS (Netherlands)

    Goga, Nicolae; Costache, Stefania; Moldoveanu, Florica

    2009-01-01

    This article presents the formal work done for the ISO/IEEE P11073-20601 Draft Standard for Health informatics - Personal health device communication - Application profile Optimized exchange protocol. ISO/IEEE 11073 family defines standards for device communication between agents (e.g. blood

  4. IEEE standard for qualification of class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    IEEE Std 323-1974, Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, was developed to provide guidance for demonstrating and documenting the adequacy of electrical equipment used in all Class 1E and interface systems. This standard, IEEE Std 535-1979, was developed to provide specific methods and type test procedures for lead storage batteries in reference to IEEE Std 323-1974

  5. A versatile electrical penetration design qualified to IEEE Std. 317-1983

    International Nuclear Information System (INIS)

    Lankenau, W.; Wetherill, T.M.

    1994-01-01

    Although worldwide demand for new construction of nuclear power stations has been on a decline, the available opportunities for the design and construction of qualified electrical penetrations continues to offer challenges, requiring a highly versatile design. Versatility is necessary in order to meet unique customer requirements within the constraints of a design basis qualified to IEEE Std. 317-1983. This paper summarizes such a versatile electrical penetration designed, built and tested to IEEE Std. 317-1983. The principal features are described including major materials of construction. Some of the design constraints such as sealing requirements, and conductor density (including numerical example) are discussed. The requirements for qualification testing of the penetration assembly to IEEE Std. 317-1983 are delineated in a general sense, and some typical test ranges for preconditioning, radiation exposure, and LOCA are provided. The paper concludes by describing ways in which this versatile design has been adapted to meet unique customer requirements in a variety of nuclear power plants

  6. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    Directory of Open Access Journals (Sweden)

    V. Balaji

    2016-01-01

    Full Text Available In this paper we present a Cooperative Spectrum Sensing (CSS algorithm for Cognitive Radios (CR based on IEEE 802.22Wireless Regional Area Network (WRAN standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22 within a time constraint (channel sensing time. To meet this objective, we have developed CSS algorithm using unsupervised K-means clustering classification approach. The received energy level of each Secondary User (SU is considered as the parameter for determining channel availability. The performance of proposed algorithm is quantified in terms of detection accuracy, training and classification delay time. Further, the detection accuracy of our proposed scheme meets the requirement of IEEE 802.22 WRAN with the target probability of falsealrm as 0.1. All the simulations are carried out using Matlab tool.

  7. An Extended IEEE 118-Bus Test System With High Renewable Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Pena, Ivonne; Martinez-Anido, Carlo Brancucci; Hodge, Bri-Mathias

    2018-01-01

    This article describes a new publicly available version of the IEEE 118-bus test system, named NREL-118. The database is based on the transmission representation (buses and lines) of the IEEE 118-bus test system, with a reconfigured generation representation using three regions of the US Western Interconnection from the latest Western Electricity Coordination Council (WECC) 2024 Common Case [1]. Time-synchronous hourly load, wind, and solar time series are provided for over one year (8784 hours). The public database presented and described in this manuscript will allow researchers to model a test power system using detailed transmission, generation, load, wind, and solar data. This database includes key additional features that add to the current IEEE 118-bus test model, such as: the inclusion of 10 generation technologies with different heat rate functions, minimum stable levels and ramping rates, GHG emissions rates, regulation and contingency reserves, and hourly time series data for one full year for load, wind and solar generation.

  8. "Shades of Foreign Evil": "Honor Killings" and "Family Murders" in the Canadian Press.

    Science.gov (United States)

    Shier, Allie; Shor, Eran

    2016-09-01

    This article compares murder cases labeled "honor killings" with cases labeled "family/spousal murders" in the Canadian news media, exploring the construction of boundaries between these two practices. We conducted a systematic qualitative content analysis, examining a sample of 486 articles from three major Canadian newspapers between 2000 and 2012. Our analysis shows that "honor killings" are framed in terms of culture and ethnic background, presenting a dichotomy between South Asian/Muslim and Western values. Conversely, articles presenting cases as "family/spousal murders" tend to focus on the perpetrators' personalities or psychological characteristics, often ignoring factors such as culture, patriarchy, honor, and shame. © The Author(s) 2015.

  9. Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.

    Science.gov (United States)

    Ullah, Sana; Chen, Min; Kwak, Kyung Sup

    2012-12-01

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.

  10. IEEE C37.105-1987: IEEE standard for qualifying Class 1E protective relays and auxiliaries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic principles, requirements, and methods for qualifying Class 1E protective relays and auxiliaries such as test and control switches, terminal blocks, and indicating lamps for applications in nuclear power generating stations. When properly employed it can be used to demonstrate the design adequacy of such equipment under normal, abnormal, design basis event and post design basis event conditions in accordance with ANSI/IEEE Std 323-1983. When protective relays and auxiliaries are located in areas not subject to harsh environments, environmental qualification is not required. Protective relays and auxiliaries located inside primary containment in a nuclear power generating station present special conditions beyond the scope of this document. The qualification procedure presented is generic in nature. Other methods may be used at the discretion of the qualifier, provided the basic precepts of ANSI/IEEE Std 32301983 are satisfied

  11. Guest editors' introduction : Highlights from IEEE Pacific Visualization

    NARCIS (Netherlands)

    Wijk, van J.J.; North, S.; Shen, H.-W.

    2010-01-01

    This article looks briefly at four articles based on papers from the 2010 IEEE Pacific Visualization Symposium. These articles, which strongly focus on visual design and applications, cover a range of applications in scientific visualization, information visualization, and graph visualization,

  12. Comparison Of Several Methods Of Implementing A Fiber Optic IEEE 802.3 Ethernet

    Science.gov (United States)

    Thompson, Geoffrey O.

    1987-01-01

    Several different methods of implementing a fiber optic version of IEEE 802.3 10BASE LANs have been proposed as a candidate for standardization by IEEE. There have been extensive discussions as to the relative merits and features of the several systems. This paper will discuss the merits of each for this particular application on a comparative basis.

  13. The Economic Returns to Graduating with Honors - Evidence from Law Graduates

    OpenAIRE

    Schumann, Mathias; Freier, Ronny; Siedler, Thomas

    2014-01-01

    This paper studies the causal effects of graduating from university with an honors degree on subsequent labor market outcomes. While a rich body of literature has focused on estimating returns to human capital, few studies have analyzed returns at the very top of the education distribution. We highlight the importance of honors degrees for future labor market success in the context of German law graduates. Using a difference-in-differences research design combined with entropy balancing, we f...

  14. Implementation of DoS attack and mitigation strategies in IEEE 802.11b/g WLAN

    Science.gov (United States)

    Deng, Julia; Meng, Ke; Xiao, Yang; Xu, Roger

    2010-04-01

    IEEE 802.11 wireless Local Area Network (WLAN) becomes very prevalent nowadays. Either as a simple range extender for a home wired Ethernet interface, or as a wireless deployment throughout an enterprise, WLAN provides mobility, convenience, and low cost. However, an IEEE 802.11b/g wireless network uses the frequency of unlicensed 2.4GHz, which makes the network unsafe and more vulnerable than traditional Ethernet networks. As a result, anyone who is familiar with wireless network may initiate a Denial of Service (DoS) attack to influence the common communication of the network or even make it crash. In this paper, we present our studies on the DoS attacks and mitigation strategies for IEEE 802.11b/g WLANs and describe some initial implementations using IEEE 802.11b/g wireless devices.

  15. Evaluation of H.264/AVC over IEEE 802.11p vehicular networks

    Science.gov (United States)

    Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

    2013-12-01

    The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

  16. History of Great Ideas: An Honors Seminar.

    Science.gov (United States)

    Terrill, Marty; And Others

    The History of Great Ideas is an interdisciplinary seminar course for sophomore honor students at North Arkansas Community Technical College that teaches the intellectual history of western civilization. Each semester, students study 14 ideas from science, philosophy, history, religion, sociology, and economics to discover how philosophical…

  17. Masculine and family honor and youth violence: The moderating role of ethnic-cultural affiliation.

    Science.gov (United States)

    Khoury-Kassabri, Mona

    2016-01-01

    This study examines the involvement in violent behavior of at-risk Arab and Jewish male youth from a large city in Israel. It explores the role masculine and family honor plays in predicting youth involvement in violence and tests whether this association is moderated by ethnic-cultural affiliation. A total of 282 males (59.2% Arab), aged 15-21, filled out a self-report closed-ended questionnaire. We found that among both Jewish and Arab youth a greater concern with masculine honor was positively associated with involvement in violence. We also found that Arab youth are significantly more involved in violent behavior than Jewish youth, and that Arab participants were more concerned with masculine and family honor. However, contrary to what was expected, greater concern with family honor was associated with lower levels of Arab youth involvement in violence. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  18. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  19. Attitudes of Turkish Academics Regarding Violence Against Women in the Name of Honor.

    Science.gov (United States)

    Yeşilçiçek Çalik, Kıymet

    2017-11-01

    Honor is an important concept that has a vital value in Turkey and affects many women's lives and even causes death. It is of utmost importance to know and scientifically demonstrate the value judgments of the academics that lead and pioneer the society in our country where honor culture is adopted. Therefore, in Turkey, where thousands of women are exposed to violence every year, 877 academics participated in this descriptive study to determine the attitudes of academics toward violence against women in the name of honor. The data were collected using "The Scale for Attitudes Towards Violence Against Women in the Name of Honor (SAVWNH)" in the form of electronic questionnaires through email addresses of the academics working at different faculties of the university in the official website of the university in September 1 to October 1, 2015. In our study, academics' "attitudes towards violence against women in the name of honor" were found low. That is, academics had negative attitudes toward the verbal or physical violence against women in the name of honor and opposed to the punishment of women for this reason. Nevertheless, the attitudes of those who were males; those who were not professors, associate professors, and assistant professors; those who were single; those who had lived in the district/village for a long time; those who had arranged marriages; those who used any kind of violence; and those who considered violence as a solution were found somewhat more conventional. These results showed that, for some academics, the traditional beliefs of the Turkish patriarchal society continued to be valid although they were included in university academic cultures. In fact, it is revealed here that social values, traditions, and customs are very effective and important on the formation of personality in socialization process.

  20. An Honors Interdisciplinary Community-Based Research Course

    Science.gov (United States)

    Dunbar, David; Terlecki, Melissa; Watterson, Nancy; Ratmansky, Lisa

    2013-01-01

    This article describes how two faculty members at Cabrini College--one from biology and the other from psychology--incorporated interdisciplinary community-based research in an honors course on environmental watershed issues. The course, Environmental Psychology, was team-taught in partnership with a local watershed organization, the Valley Creek…

  1. Tailoring an Honors Program to Your Institution.

    Science.gov (United States)

    Terrill, Marty

    The first step in developing the honors program at North Arkansas Community College (NACC) involved establishing the following four program objectives: (1) to develop students' skills in critical thinking, research, and the application of knowledge; (2) to explore the historical, philosophical, and cultural backgrounds of disciplines; (3) to…

  2. Performance Evaluations for IEEE 802.15.4-based IoT Smart Home Solution

    Directory of Open Access Journals (Sweden)

    Nga Dinh

    2016-09-01

    Full Text Available The Internet of Things (IoT is going to be a market-changing force for a variety of real-time applications such as e-healthcare, home automation, environmental monitoring, and industrial automation. Low power wireless communication protocols offering long lifetime and high reliability such as the IEEE 802.15.4 standard have been a key enabling technology for IoT deployments and are deployed for home automation recently. The issues of the IEEE 802.15.4 networks have moved from theory to real world deployments. The work presented herein intends to demonstrate the use of the IEEE 802.15.4 standard in recent IoT commercial products for smart home applications: the Smart Home Starter Kit. The contributions of the paper are twofold. First, the paper presents how the IEEE 802.15.4 standard is employed in Smart Home Starter Kit. In particular, network topology, network operations, and data transfer mode are investigated. Second, network performance metrics such as end-to-end (E2E delay and frame reception ratio (FRR are evaluated by experiments. In addition, the paper discusses several directions for future improvements of home automation commercial products.

  3. Between honor and shame :|bmartyrdom in 2 Maccabees 6-7 within the socio-cultural arena

    OpenAIRE

    Hefer, Barend Joachim

    2012-01-01

    The study, “Between honor and shame: Martyrdom in 2 Maccabees 6-7 within the socio-cultural arena”, presents a look at how the community viewed martyrdom in 2 Maccabees 6:18-7:42 from the perspective of honor and shame. The chief objective is to determine whether or not the community supported or challenged the notion of the martyrs’ death being either honorable or shameful. In order to reach a satisfactory conclusion to this objective, this study set as goals the identification of key themes...

  4. IEEE Standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1980-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1979 and IEEE Std 308-1978, can be demonstrated by using the procedures provided in this Standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other types batteries are beyond the scope of this Standard

  5. Pembangunan Aplikasi Perhitungan Honor dan Pengukuran Kinerja Asisten Praktikum Berbasis SaaS

    Directory of Open Access Journals (Sweden)

    Fitri Susanti

    2015-11-01

    Full Text Available Bagi suatu perguruan tinggi, kegiatan praktikum sangat penting untuk mendukung pembelajaran di kelas. Beberapa masalah yang muncul dalam pengelolaan kegiatan praktikum seperti keterlambatan pengumpulan berita acara praktikum (BAP sehingga memperlambat perhitungan, pembayaran dan pelaporan honor asprak. Dibutuhkan waktu sekitar dua minggu untuk rekapitulasi dan validasi ratusan lembar BAP yang telah terkumpul setiap bulannya. Dibutuhkan pengolahan data lebih lanjut untuk menilai kinerja asprak berdasarkan data BAP. Untuk mengatasi permasalahan di atas maka dibangun aplikasi perhitungan honor dan kinerja asprak. Aplikasi ini digunakan untuk mengelola data BAP, perhitungan dan pelaporan honor, perhitungan nilai transkrip aktivitas kemahasiswaan (TAK dan pencetakan sertifikat asprak. Keterbatasan SDM atau biaya menyebabkan tidak semua perguruan tinggi dapat langsung membuat aplikasi yang dibutuhkan. Oleh karena itu aplikasi ini dibangun berbasis Software as A Service (SaaS. Aplikasi ini dikembangkan dengan metode analisis perancangan terstruktur dengan model waterfall. Pengumpulan data kebutuhan aplikasi dilakukan dengan survey ke fakultas-fakultas di Universitas Telkom. Hasilnya dianalisis dan dikembangkan menjadi rancangan aplikasi. Aplikasi diimplementasikan pada pemrograman PHP. Pengujian dilakukan dengan metode black box testing. Hasilnya berupa aplikasi SaaS untuk perhitungan honor dan pengukuran kinerja asisten praktikum. Perguruan tinggi pengguna aplikasi SaaS ini dapat melakukan kostumisasi terhadap fitur yang ada sesuai dengan kebutuhan.

  6. IEEE 693 seismic qualification of composites for substation high-voltage equipment

    Energy Technology Data Exchange (ETDEWEB)

    Schiff, A.J. [Precision Measurement Instruments, Los Altos Hills, CA (United States); Kempner, L.Jr. [Bonneville Power Administration, Vancouver, BC (Canada)

    2004-07-01

    Standard 693-1997 of the Institute of Electrical and Electronic Engineers (IEEE) is the recommended practice for seismic design of substations. It represents a significant improvement in the way the power industry seismically qualifies substation high-voltage equipment. This paper described the use of IEEE Standard 693 for hollow-core composite insulators that are used on high-voltage transformers and demonstrated that changes are warranted. The following four failure modes associated with the composite insulator were discussed: bond degradation, bond failure, tube degradation and tube layer delamination. The authors evaluated the IEEE 693 qualification procedure of time history shake-table and static-pull tests and were concerned about acceptance criteria. It was shown that acceptance criteria are not valid for qualifying hollow-core composites and that static-pull tests are needed after the vibration qualification tests are completed. It was suggested that more research is warranted to determine if bonding at the top part of the flange can be eliminated, thereby eliminating bond degradation. The resulting increase in system damping would improve the dynamic response of the unit. 1 ref., 10 figs.

  7. 2011 IEEE Vehicular Networking Conference (VNC): Demo Summaries

    NARCIS (Netherlands)

    Altintas, O.; Chen, W.; Heijenk, Geert; Dressler, F.; Ekici, E.; Kargl, Frank; Shigeno, H.; Dietzel, Stefan

    2011-01-01

    Foreword For the first time in its history, IEEE VNC has included this year’s demonstrations in its program. Demonstrations play an important role to expose the research community to practical aspects of research and to foster cross-fertilization among researchers both in academia and in industry.

  8. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe (right) receives the Student Paper Award. Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The NPSS established this award in 2005 to encourage outstanding student contributions and greater student participation as principle or sole authors of papers. The prizes were presented at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November. The prototype chip was designed by Ballabriga based on ideas generated within the CERN Medipix team - part of the PH Microelectronics group. It could be used in various fields in the future, including medical imaging, neutron imaging, electron microscopy, radiation monitoring and other applications in high-energy physics. The novel aspe...

  9. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Pichet Ritthisoonthorn

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  10. Performance of the IEEE 802.3 EPON registration scheme under high load

    Science.gov (United States)

    Bhatia, Swapnil P.; Bartos, Radim

    2004-09-01

    The proposed standard for the IEEE 802.3 Ethernet Passive Optical Network includes a random delayed transmission scheme for registration of new nodes. Although the scheme performs well on low loads, our simulation demonstrates the degraded and undesirable performance of the scheme at higher loads. We propose a simple modification to the current scheme that increases its range of operation and is compatible with the IEEE draft standard. We demonstrate the improvement in performance gained without any significant increase in registration delay.

  11. VARNOST BREZŽIČNIH OMREŽIJ PO STANDARDU IEEE 802.11

    OpenAIRE

    Štumberger, Matej

    2013-01-01

    Diplomska naloga se osredotoča na problem varovanja brezžičnih omrežij, zasnovanih po standardu IEEE 802.11. Opisano je združenje IEEE in njihova specifikacija standardov z oznako 802, prav tako pa so opisani tudi standardi, protokoli in tehnike varovanja in zaščite omrežij, ki delujejo po tej specifikaciji. Predstavljeno je tudi trenutno stanje varnosti brezžičnih omrežij na področju mesta Ptuj, opisani in prikazani pa so tudi različni pristopi za zlorabo brezžičnih omrežij, skupaj s program...

  12. International Conference on Grey Systems and intelligent Services (IEEE GSIS 2009)

    CERN Document Server

    Liu, Sifeng; Advances in Grey Systems Research

    2010-01-01

    This book contains contributions by some of the leading researchers in the area of grey systems theory and applications. All the papers included in this volume are selected from the contributions physically presented at the 2009 IEEE International Conference on Grey Systems and Intelligent Services, November 11 – 12, 2009, Nanjing, Jiangsu, People’s Republic of China. This event was jointly sponsored by IEEE Systems, Man, and Cybernetics Society, Natural Science Foundation of China, and Grey Systems Society of China. Additionally, Nanjing University of Aeronautics and Astronautics also invested heavily in this event with its direct and indirect financial and administrative supports.

  13. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks.

    Science.gov (United States)

    Son, Kyou Jung; Hong, Sung Hyeuck; Moon, Seong-Pil; Chang, Tae Gyu; Cho, Hanjin

    2016-06-03

    This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method.

  14. The Quest for Honor and Citizenship in Post-Slavery Borgu (Benin)

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    2015-01-01

    that is increasingly being contested in a number of forms. The paper explores the heritage of slavery in its cultural, spatial, social, economic, and political dimensions. The author sheds light on the concept of honor that is a central dimension of social and political life in West Africa. In nowadays Benin, Gando...... peasants take pride in nourrishing a number of noble families and put at stake their honor in ostentatious competition. By doing so, they not only question the central idea that slaves are honorless but enact new conceptions and new practices of citizenship....

  15. Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks

    OpenAIRE

    Kuo-Feng Huang; Shih-Jung Wu

    2013-01-01

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services is the primary concern for IEEE802.16j networks. A scheduling scheme that satisfies the QoS requirements has become more important for wireless communications. We proposed an adaptive nontransparent-based distributed scheduling scheme (ANDS) for IEEE 802.16j networks. ANDS comprises three major components: Priority Assignment, Resource Allocation, Preserved Bandwidth Adjustment. Different service-type connections p...

  16. Application of IEEE 1588 to the real-time control system of accelerator

    International Nuclear Information System (INIS)

    Ma Mingchao; Chen Jianfeng; Shen Liren; Jiang Geyang

    2014-01-01

    Background: Time synchronization is one of the core technology of realizing the real-time control of accelerator under the distributed control system architecture. The ordinary crystal frequency deviation of IEEE 1588 causes low synchronous accuracy, which doesn't meet the needs of high precision synchronization. Purpose: This paper proposes an algorithm to improve the synchronization precision caused by the crystal frequency deviation. Methods: According to the basic principle of IEEE 1588 time synchronization, a dynamic frequency compensation (DFC) algorithm module was designed and a test platform was built to verify the feasibility and practicability of the algorithm. The influence of the synchronous cycle and delay jitter of the switch on the synchronization accuracy were analyzed. Results: Experimental results showed the great precision improvement of synchronization after using DFC algorithm. Conclusion: Low synchronous accuracy caused by the crystal frequency deviation can be improved by using DFC algorithm implemented for precision time protocol (PTP) of IEEE 1588. (authors)

  17. CUANDO LAS AFRENTAS SE LAVABAN CON SANGRE: HONOR, MASCULINIDAD Y DUELOS DE ESPADAS EN EL SIGLO XVIII CHILENO

    Directory of Open Access Journals (Sweden)

    Verónica Undurraga Schüler

    2008-06-01

    Full Text Available Este trabajo aborda la relación entre honor y prácticas sociales en el siglo XVIII chileno, analizando la figura de los duelos o expresiones de violencia masculina formalizada. Junto con indagar en los mecanismos restitutorios del honor y su vinculación a los fundamentos de una masculinidad tradicional, reflexiona sobre las gamas de manejo social de dicho valor en el período señalado. Teóricamente se rescatan los aportes de la antropología y se hace un balance del tratamiento historiográfico del problema. Desde los registros judiciales se plantea el carácter transversal del honor en términos sociales y se aborda su "doble naturaleza" en cuanto espacio relacional y ámbito de confrontación de los individuos.This works deals with the relationship between honor and social practices in Chile's eighteenth century and analyzes formal duels or expressions of legalized masculine violence. This article explores various manifestations of the social ways used to deal with honor at that time, together with the inquiries about mechanisms used to restore honor and its links with traditional masculinity. Theoretically, this work rescues contributions made by anthropologists and provides an overview of how honor and masculinity have been examined in the historiography. Starting from judicial records, the article considers the transversal character of honor in social terms and approaches its "double significance" as both a relational space for people and as a sphere for the confrontation of individuals.

  18. IEEE 1547 and 2030 Standards for Distributed Energy Resources Interconnection and Interoperability with the Electricity Grid

    Energy Technology Data Exchange (ETDEWEB)

    Basso, T.

    2014-12-01

    Public-private partnerships have been a mainstay of the U.S. Department of Energy and the National Renewable Energy Laboratory (DOE/NREL) approach to research and development. These partnerships also include technology development that enables grid modernization and distributed energy resources (DER) advancement, especially renewable energy systems integration with the grid. Through DOE/NREL and industry support of Institute of Electrical and Electronics Engineers (IEEE) standards development, the IEEE 1547 series of standards has helped shape the way utilities and other businesses have worked together to realize increasing amounts of DER interconnected with the distribution grid. And more recently, the IEEE 2030 series of standards is helping to further realize greater implementation of communications and information technologies that provide interoperability solutions for enhanced integration of DER and loads with the grid. For these standards development partnerships, for approximately $1 of federal funding, industry partnering has contributed $5. In this report, the status update is presented for the American National Standards IEEE 1547 and IEEE 2030 series of standards. A short synopsis of the history of the 1547 standards is first presented, then the current status and future direction of the ongoing standards development activities are discussed.

  19. Codes, Ciphers, and Cryptography--An Honors Colloquium

    Science.gov (United States)

    Karls, Michael A.

    2010-01-01

    At the suggestion of a colleague, I read "The Code Book", [32], by Simon Singh to get a basic introduction to the RSA encryption scheme. Inspired by Singh's book, I designed a Ball State University Honors Colloquium in Mathematics for both majors and non-majors, with material coming from "The Code Book" and many other sources. This course became…

  20. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  1. The Honorable Dr Adolfo Urso, Vice Minister for Foreign Trade, "Viceministro delle Attivita' Produttive, Italia"

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    Photo 01: The Honorable Dr Adolfo Urso, Deputy Minister for Productive Activities, Italy, visiting SM18 with (from l to r): Dr Roberto Saban, Technical Coordination and Planning, LHC machine; Prof. Luciano Maiani, CERN Director-General; Dr Mario Gerbino, Director General of the Ministry and Prof. Lucio Rossi, LHC Main Magnet and Superconductors (MMS) Group Leader. Photo 02: Prof. Luciano Maiani, CERN Director-General and The Honorable Dr Adolfo Urso, Deputy Minister for Productive Activities, Italy, in front of one of the LHC superconducting magnet in SM18. Photo 03 :In front of one of the LHC superconducting magnets - from left to right Dr Roberto Saban, Technical Coordination and Planning, LHC machine; The Honorable Dr Adolfo Urso, Deputy Minister for Productive Activities, Italy and Prof. Luciano Maiani, CERN Director-General. Photo 04: In the SM18 hall (from l. to r.) Prof. Luciano Maiani, CERN Director-General, The Honorable Dr Adolfo Urso, Deputy Minister for Productive Activities, Italy and Dr Mario Ge...

  2. Honors

    Science.gov (United States)

    Anonymous

    2012-05-01

    A number of AGU members were honored during the European Geosciences Union's (EGU) General Assembly, held on 22-27 April in Vienna. EGU Union awards were presented to the following people: Vincent Courtillot, University of Paris Diderot, France, received the 2012 Arthur Holmes Medal and EGU honorary membership for seminal contributions to geomagnetism and the geodynamics of mantle hot spots.Michael Ghil, University of California, Los Angeles, and École Normale Supérieure, France, received the 2012 Alfred Wegener Medal and EGU honorary membership for his leading contributions to theoretical climate dynamics; his innovative observational studies involving model assimilation of satellite data in meteorology, oceanography, and space physics; the breadth of his interdisciplinary studies, including macroeconomics; and his extensive supervision and mentoring of scores of graduate and postdoctoral students. Robin Clarke, Universidade Federal do Rio Grande do Sul, Brazil, received the 2012 Alexander von Humboldt Medal for fundamental contributions in statistical analysis and modeling of hydrological processes.Angioletta Coradini, Istituto Nazionale di Astrofsica, Italy, received the 2012 Jean Dominique Cassini Medal and EGU honorary membership in recognition of her important and wide range of work in planetary sciences and solar system formation and for her leading role in the development of space infrared instrumentation for planetary exploration.

  3. Honors

    Science.gov (United States)

    2012-05-01

    A number of AGU members were honored during the European Geosciences Union's (EGU) General Assembly, held on 22-27 April in Vienna. EGU Union awards were presented to the following people: Vincent Courtillot, University of Paris Diderot, France, received the 2012 Arthur Holmes Medal and EGU honorary membership for seminal contributions to geomagnetism and the geodynamics of mantle hot spots. Michael Ghil, University of California, Los Angeles, and École Normale Supérieure, France, received the 2012 Alfred Wegener Medal and EGU honorary membership for his leading contributions to theoretical climate dynamics; his innovative observational studies involving model assimilation of satellite data in meteorology, oceanography, and space physics; the breadth of his interdisciplinary studies, including macroeconomics; and his extensive supervision and mentoring of scores of graduate and postdoctoral students. Robin Clarke, Universidade Federal do Rio Grande do Sul, Brazil, received the 2012 Alexander von Humboldt Medal for fundamental contributions in statistical analysis and modeling of hydrological processes. Angioletta Coradini, Istituto Nazionale di Astrofsica, Italy, received the 2012 Jean Dominique Cassini Medal and EGU honorary membership in recognition of her important and wide range of work in planetary sciences and solar system formation and for her leading role in the development of space infrared instrumentation for planetary exploration.

  4. Pasión y honor. elementos culturales del homicidio en la provincia de Soto (Santander) de 1903 a 1930

    OpenAIRE

    Jairo Antonio Melo Flórez

    2010-01-01

    Este artículo relaciona algunos elementos culturales de los conflictos interpersonales como son aquellos enmarcados en los conceptos de honor y pasión, entendiéndolos como sentimientos que adquieren sentido en las relaciones sociales, y que se pueden evidenciar en los casos de homicidio en la Provincia de Soto entre 1903 y 1930. El honor por lo general ha sido tratado desde la perspectiva de los hombres honorables, pero también existe una forma de honor en las personas del común, en un sentid...

  5. Determinantes dos Honorários de Auditoria: um Estudo nas Empresas Listadas na BM&FBOVESPA, Brasil

    Directory of Open Access Journals (Sweden)

    Walther Bottaro de Lima Castro

    2015-12-01

    Full Text Available RESUMO Este trabalho analisa os determinantes dos honorários de auditoria pagos por empresas listadas na BM&FBOVESPA. Os dados referentes às empresas listadas para 2012 mostram relação positiva entre honorários com as variáveis porte, complexidade do cliente e auditores Big N. O risco percebido pelo auditor demonstrou afetar os valores dos honorários de forma diferente nos clientes de maior e menor porte. Nos de menor porte, os resultados sugerem que o auditor cobre menores honorários de clientes mais alavancados e com maior risco, contrariando a hipótese de que o auditor cobraria maiores honorários como prêmio pelo risco assumido. Já nos de maior porte, os resultados demonstram que clientes com maior risco, medido pela liquidez e alavancagem, ou com maiores práticas de governança, tendem a gastar mais com auditoria. Quanto à troca do auditor, os resultados apontaram que clientes maiores pagam menos no primeiro ano de auditoria. Esses resultados qualificam os achados de Hallak e Silva (2012, sugerindo a necessidade de novas pesquisas com bases temporalmente mais extensas.

  6. Computational simulations of frictional losses in pipe networks confirmed in experimental apparatusses designed by honors students

    Science.gov (United States)

    Pohlman, Nicholas A.; Hynes, Eric; Kutz, April

    2015-11-01

    Lectures in introductory fluid mechanics at NIU are a combination of students with standard enrollment and students seeking honors credit for an enriching experience. Most honors students dread the additional homework problems or an extra paper assigned by the instructor. During the past three years, honors students of my class have instead collaborated to design wet-lab experiments for their peers to predict variable volume flow rates of open reservoirs driven by gravity. Rather than learn extra, the honors students learn the Bernoulli head-loss equation earlier to design appropriate systems for an experimental wet lab. Prior designs incorporated minor loss features such as sudden contraction or multiple unions and valves. The honors students from Spring 2015 expanded the repertoire of available options by developing large scale set-ups with multiple pipe networks that could be combined together to test the flexibility of the student team's computational programs. The engagement of bridging the theory with practice was appreciated by all of the students such that multiple teams were able to predict performance within 4% accuracy. The challenges, schedules, and cost estimates of incorporating the experimental lab into an introductory fluid mechanics course will be reported.

  7. The Relationship between High School Math Courses, High School GPA, and Retention of Honors Scholarships

    Science.gov (United States)

    Megert, Diann Ackerman

    2005-01-01

    This research examined the high school transcripts of honors scholarship recipients to identify a better criterion for awarding scholarships than high school grade point average (GPA) alone. Specifically, this study compared the honors scholarship retention rate when the scholarship was awarded based on completed advanced high school math classes…

  8. Design of handoff procedures for broadband wireless access IEEE 802.16 based networks

    Directory of Open Access Journals (Sweden)

    V. Rangel–Licea

    2008-01-01

    Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.

  9. Study of Allocation Guaranteed Time Slot Wireless Body Area Networks Based on IEEE 802.15.4

    Science.gov (United States)

    Yundra, E.; Harsono, G. D.

    2018-04-01

    This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption

  10. A versatile trigger and synchronization module with IEEE1588 capabilities and EPICS support

    International Nuclear Information System (INIS)

    Lopez, J.M.; Ruiz, M.; Borrego, J.; Arcas, G. de; Barrera, E.; Vega, J.

    2010-01-01

    Event timing and synchronization are two key aspects to improve in the implementation of distributed data acquisition (dDAQ) systems such as the ones used in fusion experiments. It is also of great importance the integration of dDAQ in control and measurement networks. This paper analyzes the applicability of the IEEE1588 and EPICS standards to solve these problems, and presents a hardware module implementation based in both of them that allow adding these functionalities to any DAQ. The IEEE1588 standard facilitates the integration of event timing and synchronization mechanisms in distributed data acquisition systems based on IEEE 803.3 (Ethernet). An optimal implementation of such system requires the use of network interface devices which include specific hardware resources devoted to the IEE1588 functionalities. Unfortunately, this is not the approach followed in most of the large number of applications available nowadays. Therefore, most solutions are based in software and use standard hardware network interfaces. This paper presents the development of a hardware module (GI2E) with IEEE1588 capabilities which includes USB, RS232, RS485 and CAN interfaces. This permits to integrate any DAQ element that uses these interfaces in dDAQ systems in an efficient and simple way. The module has been developed with Motorola's Coldfire MCF5234 processor and National Semiconductors's PHY DP83640T, providing it with the possibility to implement the PTP protocol of IEEE1588 by hardware, and therefore increasing its performance over other implementations based in software. To facilitate the integration of the dDAQ system in control and measurement networks the module includes a basic Input/Output Controller (IOC) functionality of the Experimental Physics and Industrial Control System (EPICS) architecture. The paper discusses the implementation details of this module and presents its applications in advanced dDAQ applications in the fusion community.

  11. The Pursuit of Excellence: An Analysis of the Honors College Application and Enrollment Decision for a Large Public University

    Science.gov (United States)

    Singell, Larry D., Jr.; Tang, Hui-Hsuan

    2012-01-01

    Honors colleges housed in public universities began only in the last half century, but have become nearly ubiquitous over the last 20 years. This paper, using recent data from the oldest stand-alone honors college in the country, is the first to study how the application and enrollment decisions of honors college students differ from the general…

  12. Proceedings of IEEE Machine Learning for Signal Processing Workshop XVI

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the sixteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP'2006), held in Maynooth, Co. Kildare, Ireland, September 6-8, 2006. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP......). The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized by the Machine Learning for Signal Processing Technical Committee...... the same standard as the printed version and facilitates the reading and searching of the papers. The field of machine learning has matured considerably in both methodology and real-world application domains and has become particularly important for solution of problems in signal processing. As reflected...

  13. Capacity Evaluation for IEEE 802.16e Mobile WiMAX

    Directory of Open Access Journals (Sweden)

    Chakchai So-In

    2010-01-01

    Full Text Available We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the capacity are explained and methods to reduce these overheads are also presented. The advantage of a simple model is that the effect of each decision and sensitivity to various parameters can be seen easily. We illustrate the model by estimating the capacity for three sample applications—Mobile TV, VoIP, and data. The analysis process helps explain various features of IEEE 802.16e Mobile WiMAX. It is shown that proper use of overhead reducing mechanisms and proper scheduling can make an order of magnitude difference in performance. This capacity evaluation method can also be used for validation of simulation models.

  14. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    OpenAIRE

    Sayef Azad Sakin; Md. Abdur Razzaque; Mohammad Mehedi Hassan; Atif Alamri; Nguyen H. Tran; Giancarlo Fortino

    2017-01-01

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a s...

  15. The Gifted and Honors Program at Ridgeroad Jr. High.

    Science.gov (United States)

    Moody, Bonnie

    1984-01-01

    Describes a science program for honors students that offers a blend of both teacher-directed and student-directed activities. Includes information on instructional strategies used, independent student study projects, financial considerations, grading, and student reaction to the program. (JN)

  16. PERFORMANCE STUDY OF DISTRIBUTED COORDINATION FUNCTION OVER IEEE 802.11A PHYSICAL LAYER

    Directory of Open Access Journals (Sweden)

    S. SELVAKENEDDY

    2006-06-01

    Full Text Available IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802 for wireless LANs. It has specified an additional physical layer (PHY to support higher data rates, and is termed as the orthogonal frequency division multiplexing (OFDM. In order to exploit its benefits, one of the medium access control (MAC protocols specified in the IEEE 802.11 specification is called distributed coordination function (DCF. DCF is a carrier sense multiple access with collision avoidance (CSMA/CA scheme with slotted binary exponential backoff. The frames can be transmitted using the basic access scheme or the RTS/CTS scheme in DCF. It was demonstrated previously that the RTS/CTS mechanism works well in most scenarios for the previously specified PHYs. In this work, a simple simulator is developed to verify the scalability of the RTS/CTS mechanism over OFDM PHY, which supports much higher data rates.

  17. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  18. 32 CFR 887.7 - Persons separated under other than honorable conditions (undesirable or bad conduct) or...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Persons separated under other than honorable conditions (undesirable or bad conduct) or dishonorable discharge. 887.7 Section 887.7 National Defense... honorable conditions (undesirable or bad conduct) or dishonorable discharge. Those persons whose character...

  19. Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4

    Directory of Open Access Journals (Sweden)

    Mukhtar Azeem

    2014-01-01

    by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.

  20. Eleanor McElwee and the Formation of IEEE PCS

    Science.gov (United States)

    Malone, Edward A.

    2015-01-01

    This article examines the historical professional project that created the Institute of Radio Engineers' Professional Group on Engineering Writing an Speech (IRE PGEWS)--now called the Institute of Electrical and Electronics Engineers' Professional Communication Society (IEEE PCS)--and recounts the group's early history in detail. It also traces…

  1. Mentors, Muses, and Mutuality: Honoring Barbara Snell Dohrenwend

    Science.gov (United States)

    Mulvey, Anne

    2012-01-01

    I describe feminist community psychology principles that have the potential to expand and enrich mentoring and that honor Barbara Snell Dohrenwend, a leader who contributed to the research, theory, and profession of community psychology. I reflect on the affect that Barbara Dohrenwend had on life and on the development of feminist community…

  2. On IEEE 802.15.6 IR-UWB receivers - simulations for DBPSK modulation.

    Science.gov (United States)

    Niemelä, Ville; Hämäläinen, Matti; Iinatti, Jari

    2013-01-01

    In 2002, Federal Communications Commission (FCC) was the first in defining regulations for ultra wideband (UWB) communications followed by Europe and Japan some years later. Focusing on impulse radio (IR) UWB, in 2007 was the time for the first published standard targeting in personal area networks, released by the IEEE. The second IEEE released standard including UWB definitions is targeted for wireless body area networks (WBAN) and was published in 2012. As the wireless communications has been and will be passing through almost any levels in society, the natural step with WBAN is using it in different medical, healthcare and wellbeing applications. The arguments for these are related to the modern lifestyle, in which people have increasingly more free time and are more interested in taking care of their health and wellbeing. Another challenge is the population composition, i.e., aging in developed countries which call for new solutions and procedures, particularly from cost wise. In this paper, we are evaluating UWB receivers based on the IEEE 802.15.6 physical layer definitions and capable of detecting differentially encoded modulation. The evaluation is performed using two different WBAN channel models.

  3. Honor, Dignidad y Reciprocidad Honra, dignidade e reciprocidade

    Directory of Open Access Journals (Sweden)

    Luís R. Cardoso de Oliveira

    2004-12-01

    Full Text Available El texto discute la articulación entre las nociones de honor, dignidad y reciprocidad en los procesos de resolución de disputas, teniendo como foco los juzgados de pequeñas causas. El papel del don es destacado en la comprensión de las diputas, cuya resolución demanda el examen de tres dimensiones temáticas: los derechos, los intereses y el reconocimiento. Esta última dimensión está asociada a la visibilización del insulto moral, caracterizado como una agresión a derechos de difícil procesamiento en el ámbito judicial.The text discusses how notions of honor, dignity and reciprocity articulate in processes of dispute resolution, focusing in small claims courts. The role of the gift is highlighted in the understanding of disputes whose equation demands the examination of three thematic dimensions: rights, interests and recognition. The latter is associated to the visibility of moral insults, which are characterized as aggressions to rights that are frequently excluded from judicial processes.

  4. Pasión y honor. elementos culturales del homicidio en la provincia de Soto (Santander de 1903 a 1930

    Directory of Open Access Journals (Sweden)

    Jairo Antonio Melo Flórez

    2010-01-01

    Full Text Available Este artículo relaciona algunos elementos culturales de los conflictos interpersonales como son aquellos enmarcados en los conceptos de honor y pasión, entendiéndolos como sentimientos que adquieren sentido en las relaciones sociales, y que se pueden evidenciar en los casos de homicidio en la Provincia de Soto entre 1903 y 1930. El honor por lo general ha sido tratado desde la perspectiva de los hombres honorables, pero también existe una forma de honor en las personas del común, en un sentido más conflictivo y complejo, que residía por lo general en el respeto generado por sus iguales y en la sexualidad de las mujeres. Así mismo, la pasión era un sentimiento que conllevaba a reacciones violentas, relacionado en buena medida con el honor, y cuya reacción podía ser más o menos ritualizada en un pleito o bastante impulsiva en una riña.

  5. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  6. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  7. An analytical model for the performance analysis of concurrent transmission in IEEE 802.15.4.

    Science.gov (United States)

    Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto

    2014-03-20

    Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.

  8. Medal of Honor Award Process Review: U.S. Army Noncommissioned Officer Nominee (Redacted)

    Science.gov (United States)

    2016-05-04

    award the nominee the Silver Star. We determined Secretary McHugh acted within his authority when he decided to award the SS. We found no evidence...why the Honorable John M. McHugh , Secretary of the Army, downgraded the nominee’s MOH award recommendation to the Silver Star (SS).1 In a memorandum...valorous actions as documented in the MOH award 1 The Honorable John M. McHugh left his position as Secretary of the Army on November 1, 2015. 2 We did

  9. Information Technology Strategies for Honor Society and Organization Membership Retention in Online Nursing Programs.

    Science.gov (United States)

    Hopkins, Emily E; Wasco, Jennifer J

    Membership retention in an honor society or organization is of utmost importance for sustainability. However, retaining members in organizations that serve online education nursing students can be a challenging task. Understanding the importance of creating a sense of community to promote retention within an honor society chapter, nursing faculty at a small private university implemented different online approaches. This article highlights successful information technology strategies to promote membership retention in organizations for online nursing students.

  10. 0011-0030.Data Representation amp Computer Arithmetic6 IEEE ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.Data Representation amp Computer Arithmetic6 IEEE Standard Double Precision FormatIn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.

  11. Study on Additional Carrier Sensing for IEEE 802.15.4 Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bih-Hwang Lee

    2010-06-01

    Full Text Available Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs. The slotted carrier sense multiple access with collision avoidance (CSMA/CA is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC delay and power consumption of CCA detection.

  12. Study on additional carrier sensing for IEEE 802.15.4 wireless sensor networks.

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Ruei-Lung; Wu, Huai-Kuei; Wong, Chi-Ming

    2010-01-01

    Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA) detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS) algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC) delay and power consumption of CCA detection.

  13. IEEE P1596, a scalable coherent interface for GigaByte/sec multiprocessor applications

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1988-11-01

    IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained during the development of Fastbus (IEEE 960), Futurebus (IEEE 896.1) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor; efficient support of a coherent distributed-cache image of shared memory; and support for segmentation, bus repeaters and general switched interconnections like Banyan, Omega, or full crossbar networks. To achieve these ambitious goals, SCI must sacrifice the immediate handshake characteristic of the present generation of buses in favor of a packet-like split-cycle protocol. Wire-ORs, broadcasts, and even ordinary passive bus structures are to be avoided. However, a lower performance (1 GByte/sec per backplane instead of per processor) implementation using a register insertion ring architecture on a passive ''backplane'' appears to be possible using the same interface as for the more costly switch networks. This paper presents a summary of current directions, and reports the status of the work in progress

  14. Centauri High School Teacher Honored as Colorado Outstanding Biology

    Science.gov (United States)

    Teacher Centauri High School Teacher Honored as Colorado Outstanding Biology Teacher For more information contact: e:mail: Public Affairs Golden, Colo., May 2, 1997 -- Tracy Swedlund, biology teacher at Centauri High School in LaJara, was selected as Colorado's 1997 Outstanding Biology Teacher and will be

  15. Laboratories for educational innovation: honors programs in the Netherlands

    NARCIS (Netherlands)

    Wolfensberger, Marca; van Eijl, Pierre; Pilot, Albert

    2012-01-01

    In Dutch universities, honors programs are a fast growing development. The first such programs started in 1993. Twenty years later a large number of programs are implemented at nearly all research universities and also at many universities of applied sciences in the Netherlands. Recent data have

  16. The Exploration of Network Coding in IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Deze Zeng

    2011-01-01

    communication protocol should be energy efficient. The IEEE 802.15.4 is designed as a standard protocol for low power, low data rate, low complexity, and short range connections in WPANs. The standard supports allocating several numbers of collision-free guarantee time slots (GTSs within a superframe for some time-critical transmissions. Recently, COPE was proposed as a promising network coding architecture to essentially improve the throughput of wireless networks. In this paper, we exploit the network coding technique at coordinators to improve energy efficiency of the WPAN. Some related practical issues, such as GTS allocation and multicast, are also discussed in order to exploit the network coding opportunities efficiently. Since the coding opportunities are mostly exploited, our proposal achieves both higher energy efficiency and throughput performance than the original IEEE 802.15.4.

  17. Qualification of cables to IEEE standards 323-1974 and 383-1974

    International Nuclear Information System (INIS)

    Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.

    1980-01-01

    Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2kV, and 15kV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15kV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs

  18. Qualification of cables to IEEE standards 323-1974 and 383-1974

    International Nuclear Information System (INIS)

    Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.

    1980-01-01

    Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2KV, and 15KV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15KV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs

  19. Don't tread on me: masculine honor ideology in the U.S. and militant responses to terrorism.

    Science.gov (United States)

    Barnes, Collin D; Brown, Ryan P; Osterman, Lindsey L

    2012-08-01

    Using both college students and a national sample of adults, the authors report evidence linking the ideology of masculine honor in the U.S. with militant responses to terrorism. In Study 1, individuals' honor ideology endorsement predicted, among other outcomes, open-ended hostile responses to a fictitious attack on the Statue of Liberty and support for the use of extreme counterterrorism measures (e.g., severe interrogations), controlling for right-wing authoritarianism, social dominance orientation, and other covariates. In Study 2, the authors used a regional classification to distinguish honor state respondents from nonhonor state respondents, as has traditionally been done in the literature, and showed that students attending a southwestern university desired the death of the terrorists responsible for 9/11 more than did their northern counterparts. These studies are the first to show that masculine honor ideology in the U.S. has implications for the intergroup phenomenon of people's responses to terrorism.

  20. Honors

    Science.gov (United States)

    2011-10-01

    More than a dozen AGU members are among 94 researchers announced by U.S. president Barack Obama on 26 September as recipients of the Presidential Early Career Award for Scientists and Engineers. The award, which is coordinated by the Office of Science and Technology Policy within the Executive Office of the President, is considered the highest honor bestowed by the U.S. government on science and engineering professionals in the early stages of their independent research careers. This year's recipients include Jeffrey Book, Naval Research Laboratory; Jonathan Cirtain, NASA Marshall Space Flight Center; Fotini Katopodes Chow, University of California, Berkeley; Elizabeth Cochran, U.S. Geological Survey (USGS); Ian Howat, Ohio State University; Christiane Jablonowski, University of Michigan; Justin Kasper, Smithsonian Astrophysical Observatory; Elena Litchman, Michigan State University; James A. Morris Jr., National Oceanic and Atmospheric Administration (NOAA); Erin M. Oleson, NOAA; Victoria Orphan, California Institute of Technology; Sasha Reed, USGS; David Shelly, USGS; and Feng Wang, University of California, Berkeley. Five AGU members are among 10 U.S. representatives recently selected for International Arctic Science Committee working groups. The AGU members, chosen as representatives through the U.S. National Academies review process, are Atmosphere Working Group member James Overland, Pacific Marine Environmental Laboratory, NOAA; Cryosphere Working Group members Walter Meier, University of Colorado at Boulder, and Elizabeth Hunke, Los Alamos National Laboratory; Marine Working Group member Mary-Louise Timmermans, Yale University; and Terrestrial Working Group member Vanessa Lougheed, University of Texas at El Paso.

  1. PERLINDUNGAN HUKUM TENAGA HONORER SETELAH BERLAKUNYA UNDANG-UNDANG NOMOR 5 TAHUN 2014 TENTANG APARATUR SIPIL NEGARA

    Directory of Open Access Journals (Sweden)

    Made Aditya Pramana Putra

    2016-09-01

    Full Text Available The emergence of The State Civil Apparatus (No. 5 of 2014 gives an impact to position and the legal protection to honorary employees. According to that law, honorary employee was substituted by the government employee with treaty of work. This substitution makes the honorary employees do not have status and legal protection. The aim of this study is to examine position and legal protection of the honorary employee.  This study used normative, legislation, historical, and conceptual approaches. Legal materials used in this study come from primary, secondary, and tertiary, which used library research methods. This study found that since the government publishes the Law No. 5 of 2014 to substitute the Law no. 43 of 1999, the status and the legal protection of the honoraryemployee became unclear. This is because of the government was not able to handle the problem of the honorary employee, especially for the salary, recruitment, and the status. However, actually the case is honorary employee have been playing important roles in government institution. Thus, the Law of the State Civil Apparatus should makes a better protection for the government employee with treaty work as a substitute for the honorary employee. Terbitnya Undang-Undang nomor 5 tahun 2014 tentang Aparatur Sipil Negarasangat mempengaruhi kedudukan dan perlindungan hukum bagi tenaga honorer.Dalam undang-undang tersebut, istilah tenaga honorer diganti menjadi pegawai pemerintah dengan perjanjian kerja. Penelitian ini bertujuan untuk mengkaji posisi dan perlindungan hukum bagi tenaga honorer. Penelitian ini menggunakan pendekatan normatif, perundangan, historis, dan konseptual. Materi hukum yang digunakan dalam penelitian ini berasal dari sumber primer, sekunderm dan tersier, dengan menggunakan metode studi pustaka. Penelitian ini menemukan bahw sejak diterbitkannya Undang-undang No. 5 Tahun 2014 yang menggantikan Undang-Undang No. 43 Tahun 1999, status dan perlindungan hukum tenaga

  2. The scalable coherent interface, IEEE P1596, status and possible applications to data acquisition and physics

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1990-01-01

    IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960-1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics. 7 refs

  3. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    The convenience of IEEE 8O2.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors However, this use is predicated on an implicit assumption of confidentiality...

  4. IEEE Std 101-1987: IEEE guide for the statistical analysis of thermal life test data

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This revision of IEEE Std 101-1972 describes statistical analyses for data from thermally accelerated aging tests. It explains the basis and use of statistical calculations for an engineer or scientist. Accelerated test procedures usually call for a number of specimens to be aged at each of several temperatures appreciably above normal operating temperatures. High temperatures are chosen to produce specimen failures (according to specified failure criteria) in typically one week to one year. The test objective is to determine the dependence of median life on temperature from the data, and to estimate, by extrapolation, the median life to be expected at service temperature. This guide presents methods for analyzing such data and for comparing test data on different materials

  5. The tree identify protocol of IEEE 1394 in uCRL

    NARCIS (Netherlands)

    C. Shankland; M.B. van der Zwaag

    1998-01-01

    textabstractWe specify the tree identify protocol of the IEEE 1394 high performance serial multimedia bus at three different levels of detail using $mu$CRL. We use the cones and foci verification technique of Groote and Springintveld to show that the descriptions are equivalent under branching

  6. IEEE Std 649-1991: IEEE standard for qualifying Class 1E motor control centers for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    The basic principles, requirements, and methods for qualifying Class 1E motor control centers for both harsh and mild environment applications in nuclear power generating stations are described. In addition to defining specific qualification requirements for Class 1E motor control centers and their components in accordance with the more general qualification requirements of IEEE Std 323-1983, this standard is intended to provide guidance in establishing a qualification program for demonstrating the adequacy of Class 1E motor control centers in nuclear power generating station applications

  7. IEEE 802.3 Fiber Optic Inter-Repeater Link

    Science.gov (United States)

    Tarrant, Peter J.

    1987-01-01

    This paper describes the implementation of a fiber optic inter-repeater link (FOIRL), used for connecting two remote copper segments of an IEEE 802.3 local area network. The rationale for the design, the signalling used and the collision detection mechanism is discussed. The evolution of the draft international standard for the FOIRL and the concurrence amongst various manufacturers is also presented. Finally some examples of typical applications, highlighting the ease of installation, are given.

  8. Robert L. Oprisko’s Honor: A Phenomenology and Holden Caulfield

    Directory of Open Access Journals (Sweden)

    Eliza Quincey

    2015-07-01

    Full Text Available Robert L. Oprisko’s book, “Honor: A Phenomenology” challenges ones of the most obvious social norms in contemporary society. The concept of honor is one that the “generic” as Sergei Prozorov would say, simply cannot comprehend, nor even make efforts to define. Though fluently used in infamous works such as “The Iliad”, honor has yet to be so explicitly dissected until now. Dr. Oprisko’s book takes a promiscuous and brutally honest approach to “Honor” en generale as well as the many facets associated with such. Similar to fine cuisine and wine, there are many literary accompaniments that serve as wonderful pairings to broaden the kaleidoscope perspectives presented in the book. The contested novel by J.D. Salinger, “The Catcher in the Rye”, although by no means consists of any political or metaphysical theory, contains a stark personification of what is actively presented in every chapter of Dr. Oprisko’s book. Holden Caufield serves as a terrific litmus test for the concepts defined in Oprisko’s work. Holden is by no means a likeable character in the literary world, but however he is raw enough to be able to internalize and beholden things like, “honorableness”, “dignity”, and most importantly for Holden, “face”. Though to the naked eye and untrained mind these “things” which Holden can in fact internalize may seem fairly simple; it challenges the reader to humble oneself and accept that which is the raw. There is no space for semantics and lies in Oprisko’s work. In fact it is so shockingly explicit, one may find themselves utterly offended. Holden Caufield offended readers for years after Sallinger brought him to life over the span of 200 or more so pages, so much that the book was condemned in certain places. Robert L. Oprisko’s, “Honor: A Phenomenology”, in my utmost opinion, contains this same potential. By critically engaging in Oprisko’s spar with “honor”, one may find themselves

  9. ARC Researchers at IEEE 2015 Vehicle Power and Propulsion Conference

    Science.gov (United States)

    Contacts Researchers News & Events Event Calendar Annual Program Review Research Seminars Press Room Event Archives ARC Researchers at the IEEE 2015 Vehicle Power and Propulsion Conference (October 19-22 Ballroom B P-SS4-2 Comparison of SOFC and PEM Fuel Cell Hybrid Power Management Strategies for Mobile

  10. Analysis and Enhancement of IEEE 802.15.4e DSME Beacon Scheduling Model

    Directory of Open Access Journals (Sweden)

    Kwang-il Hwang

    2014-01-01

    Full Text Available In order to construct a successful Internet of things (IoT, reliable network construction and maintenance in a sensor domain should be supported. However, IEEE 802.15.4, which is the most representative wireless standard for IoT, still has problems in constructing a large-scale sensor network, such as beacon collision. To overcome some problems in IEEE 802.15.4, the 15.4e task group proposed various different modes of operation. Particularly, the IEEE 802.15.4e deterministic and synchronous multichannel extension (DSME mode presents a novel scheduling model to solve beacon collision problems. However, the DSME model specified in the 15.4e draft does not present a concrete design model but a conceptual abstract model. Therefore, in this paper we introduce a DSME beacon scheduling model and present a concrete design model. Furthermore, validity and performance of DSME are evaluated through experiments. Based on experiment results, we analyze the problems and limitations of DSME, present solutions step by step, and finally propose an enhanced DSME beacon scheduling model. Through additional experiments, we prove the performance superiority of enhanced DSME.

  11. Laboratories for Educational Innovation: Honors Programs in the Netherlands

    Science.gov (United States)

    Wolfensberger, Marca V. C.; Van Eijl, Pierre; Pilot, Albert

    2012-01-01

    In Dutch universities, honors programs are a fast growing development. The first such programs started in 1993. Twenty years later a large number of programs are implemented at nearly all research universities and also at many universities of applied sciences in the Netherlands. Recent data have revealed significant diversity in the types and…

  12. A Fast MAC-Layer Handover for an IEEE 802.16e-Based WMAN

    Science.gov (United States)

    Ray, Sayan K.; Pawlikowski, Krzysztof; Sirisena, Harsha

    We propose a modification of the IEEE 802.16e hard handover (HHO) procedure, which significantly reduces the handover latency constraint of the original HHO procedure in IEEE 802.16e networks. It allows a better handling of the delay-sensitive traffic by avoiding unnecessary time-consuming scanning and synchronization activity as well as simplifies the network re-entry procedure. With the help of the backhaul network, it reduces the number of control messages in the original handover policy, making the handover latency acceptable also for real-time streaming traffic. Preliminary performance evaluation studies show that the modified handover procedure is able to reduce the total handover latency by about 50%.

  13. AGU honored for Antarctic book

    Science.gov (United States)

    AGU has won an honorable mention award at the Fifteenth Annual Awards Program for Excellence in Professional and Scholarly Publishing sponsored by the Association of American Publishers for the book Volcanoes of the Antarctic Plate and Southern Oceans. The book is part of AGU's Antarctic Research Series, an outgrowth of research done during the International Geophysical Year that was begun in 1963 with a grant from the National Science Foundation. The award was presented at the AAP Annual Awards Dinner on February 6 at the Ritz-Carlton Hotel in Washington, D.C. The award consists of a medallion and a plate on which the names of the publisher, title, and authors are engraved.

  14. The IEEE 1355 Standard. Developments, performance and application in high energy physics

    International Nuclear Information System (INIS)

    Haas, S.

    1998-12-01

    The data acquisition systems of the next generation High Energy Physics experiments at the Large Hadron Collider (LHC) at CERN will rely on high-speed point-to-point links and switching networks for their higher level trigger and event building systems. This thesis provides a detailed evaluation of the DS-Link and switch technology, which is based on the IEEE 1355 standard for Heterogeneous Interconnect (HIC). The DS-Link is a bidirectional point-to-point serial interconnect, operating at speeds up to 200 MBaud. The objective of this thesis was to study the performance of the IEEE 1355 link and switch technology and to demonstrate that switching networks using this technology would scale to meet the requirements of the High Energy Physics applications

  15. 12 New England Organizations Honored for Outstanding Achievements in Energy Efficiency

    Science.gov (United States)

    EPA and the U.S. Department of Energy (DOE) are honoring 12 New England businesses and organizations for their commitment to saving energy, saving money, and protecting the environment through superior energy efficiency achievements.

  16. A PROPOSED NOVEL ARCHITECTURE OF EC CONTROL SYSTEM USING IEEE 802.11n NETWORK AT ITER-INDIA GYROTRON TEST FACILITY

    Directory of Open Access Journals (Sweden)

    Deepak Mandge

    2017-06-01

    Full Text Available IEEE 802.11 Wi-Fi networks are increasingly becoming popular for its use in industrial applications. With the availability of recent amendments to IEEE 802.11 series of standards, particularly IEEE 802.11n, the adoption of Wi-Fi networks for process automation is gaining more focus and importance. The installation of Wireless networks naturally provides reduction in cable and its maintenance related costs, provides increased flexibility and mobility to enhance performance of industrial control system. The IEEE 802.11n supports parameterization that can be set for particular industrial applications and hence it has addressed to the aspects of timeliness and criticality to some extent. This paper proposes the use of IEEE 802.11n network to interconnect field instruments with Siemens PLC controller in harsh EMI/EMC environment. An application example is shown where the alternate control system architecture is developed in which non-critical and non-safety signals are communicated over Wi-Fi. While, for critical and safety signals, traditional hardwired signals methods can be implemented.

  17. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  18. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Science.gov (United States)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  19. Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    M. Udin Harun Al Rasyid

    2013-12-01

    Full Text Available IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology. Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca

  20. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    International Nuclear Information System (INIS)

    Sklavos, N; Selimis, G; Koufopavlou, O

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given

  1. Validation of IEEE P1547.1 Interconnection Test Procedures: ASCO 7000 Soft Load Transfer System

    Energy Technology Data Exchange (ETDEWEB)

    Kroposki, B.; Englebretson, S.; Pink, C.; Daley, J.; Siciliano, R.; Hinton, D.

    2003-09-01

    This report presents the preliminary results of testing the ASCO 7000 Soft Load Transfer System according to IEEE P1547.1 procedures. The ASCO system interconnects synchronous generators with the electric power system and provides monitoring and control for the generator and grid connection through extensive protective functions. The purpose of this testing is to evaluate and give feedback on the contents of IEEE Draft Standard P1547.1 Conformance Tests Procedures for Equipment Interconnecting Distributed Resources With Electric Power Systems.

  2. Editorial for the IEEE Transactions on Power Electronics, January 2009

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2009-01-01

    I am entering the fourth year as the Editor in Chief of the IEEE TRANSACTIONS ON POWER ELECTRONICS. A position like this becomes more and more important for the technical field as publishing in a peer-reviewed highly ranked journal has influence on the industrial and academic career. It is a way...

  3. An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes

    Directory of Open Access Journals (Sweden)

    Szott Szymon

    2010-01-01

    Full Text Available We present a novel model of IEEE 802.11 EDCA with support for analysing networks with misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the model by extensive simulation analysis and by comparing it to three other IEEE 802.11 models. The results show that our model behaves satisfactorily and outperforms other widely acknowledged models. Secondly, a comparison with simulation results in several scenarios with misbehaving nodes proves that our model performs correctly for these scenarios. The proposed model can, therefore, be considered as an original contribution to the area of EDCA models and backoff misbehaviour.

  4. Transient Stability Improvement of IEEE 9 Bus System Using Power World Simulator

    Directory of Open Access Journals (Sweden)

    Kaur Ramandeep

    2016-01-01

    Full Text Available The improvement of transient stability of power system was one of the most challenging research areas in power engineer.The main aim of this paper was transient stability analysis and improvement of IEEE 9 bus system. These studies were computed using POWER WORLD SIMULATOR. The IEEE 9 bus system was modelled in power world simulator and load flow studies were performed to determine pre-fault conditions in the system using Newton-Raphson method. The transient stability analysis was carried out using Runga method during three-phase balanced fault. For the improvement transient stability, the general methods adopted were fast acting exciters, FACT devices and addition of parallel transmission line. These techniques play an important role in improving the transient stability, increasing transmission capacity and damping low frequency oscillations.

  5. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  6. Simultaneous transmission of the IEEE 802.11 radio signal and optical Gbit Ethernet over the multimode fiber link

    Science.gov (United States)

    Maksymiuk, L.; Podziewski, A.

    2015-09-01

    In the paper we present a successful joint transmission of the IEEE 802.11 signal and an optical Gbit Ethernet over a multimode fiber based link. Most importantly, the multiplexation of both signals was performed in the optical domain. Due to the utilization of the multimode fiber the OBI noise was avoided and both channels were able to operate at the same wavelength. We prove that potential RoF link for IEEE 802.11 signal distribution may be used to additionally transmit other signals as Gbit Ethernet and therefore utilize the fiber infrastructure installed more effectively. The qualities of both the IEEE 802.11 and Ethernet transmissions fulfilled the requirements imposed by appropriate standards.

  7. Explaining how honors students position themselves when collaborating with regular students

    NARCIS (Netherlands)

    Volker, Judith; Kamans, Elanor; Tiesinga, Lammert; Wolfensberger, Marca

    2015-01-01

    Paper presentatie tijdens de EARLI Conference 2015, Limassol, Cypres, 28 augustus. In this line of research we take a social psychological approach to understanding how honors students position themselves when collaborating with regular students. More specifically, we explore whether stereotypes

  8. The concept of «honor», «dignity» in the context of the professionalization of public service

    Directory of Open Access Journals (Sweden)

    S. M. Serjogin

    2016-09-01

    Full Text Available The article analyzes ethical aspects of the personality of a public servant. Such  concepts as, «professional honor», «professional dignity», «professional justice», «professional responsibility» are disclosed. The role of these concepts in public servants’ professional activities is defermined. It is stated that professional dignity of the public servant is closely connected with his position in the team, his personal merit and honor public servant. The matter is that a public servant is a representative a particular team, and the entire public service. The attention is focused on the fact that the higher developed feeling of personal and official dignity of public servants, the more he values his professional honor, the more significant social value he has to society. As a result, professional honor and professional dignity, complement each other, help to maintain a certain, fairly high level of a public servant’s morality. It was found that such concepts as «professional honor», «professional dignity», «professional justice», «professional responsibility» were brought up before and are brought up now in a large stable structures and organizations of the world. In developed countries, such as France, Germany, Japan, England – the honor and responsibility of public servant are essential professional qualities, which largely determine style of activities and influence decision-making process. In our country, nowadays, the education of a public servant is missed, therefore we will not be able in the future to count on the loyalty of civil servants to their job. We will have to deal with the satisfaction of public servants’ personal needs, as it often happens now. Based on the analysis concluded that the professional ethics of a public servant is a rather complicated and weighty task of harmonizing professional and personal moral responsibility, principles, values and interests.

  9. Implementation of IEEE-1588 timing and synchronization for ATCA control and data acquisition systems

    International Nuclear Information System (INIS)

    Correia, Miguel; Sousa, Jorge; Combo, Álvaro; Rodrigues, António P.; Carvalho, Bernardo B.; Batista, António J.N.; Gonçalves, Bruno; Correia, Carlos M.B.A.; Varandas, Carlos A.F.

    2012-01-01

    Highlights: ► IEEE-1588 over Ethernet protocol is implemented for the synchronization of all clock signals of an ATCA AMC carrier module. ► The ATCA hardware consists of an AMC quad-carrier main-board with PCI Express switching. ► IEEE-1588 is to be implemented on a Virtex-6 FPGA. ► Timing signals on the ATX-AMC4-PTP are managed and routed by a crosspoint-switch implemented on a Virtex-6 FPGA. ► Each clock signal source may be independently located (on each of the AMC cards, RTM or ATCA backplane). - Abstract: Control and data acquisition (C and DA) systems for Fusion experiments are required to provide accurate timing and synchronization (T and S) signals to all of its components. IPFN adopted PICMG's Advanced Telecommunications Computing Architecture (ATCA) industry standard to develop C and DA instrumentation. ATCA was chosen not only for its high throughput characteristics but also for its high availability (HA) features which become of greater importance in steady-state operation scenarios. However, the specified ATCA clock and synchronization interface may be too limited for the timing and synchronization needs in advanced Physics experiments. Upcoming specification extensions, developed by the “xTCA for Physics” workgroups, will contemplate, among others, a complementary timing specification, developed by the PICMG xTCA for Physics IO, Timing and Synchronization Technical Committee. The IEEE-1588 Precision Time Protocol (PTP) over Ethernet is one of the protocols, proposed by the Committee, aiming for precise synchronization of clocks in measurement and control systems, based on low jitter and slave-to-slave skew criteria. The paper presents an implementation of IEEE-1588 over Ethernet, in an ATCA hardware platform. The ATCA hardware consists of an Advanced Mezzanine Card (AMC) quad-carrier front board with PCI Express switching. IEEE-1588 is to be implemented on a Virtex-6 FPGA. Ethernet connectivity with the remote master clock is located on

  10. Comparison of IEEE383-2003 and IEC60505-2004 standards for harmonization of environmental qualification procedure of electric cable

    International Nuclear Information System (INIS)

    Kim, Jong Seog; Jeong, Sun Chul; Park, Kyung Heum; Jang, Kyung Nam

    2010-01-01

    Needs for harmonization of international equipment qualification(EQ) standards have been raised several years due to purchasing problem of nuclear equipment supplied from abroad country. To meet the regulatory requirement of domestic nuclear power plant, manufacturers have to qualify their equipment in accordance with each standard such as IEEE, IEC and RCC-E. Double qualification increase the equipment cost, which result in high construction cost. Even the unification of each standard have been discussed several years, we have got the long way to go yet. Comparison and harmonization of each international standard will give help to purchase the equipment qualified by not endorsed standard. Environmental qualification, seismic qualification and EMI/EMC qualification are major targets for harmonization. Since concern about cable qualification of 60 years life has been raised recently, harmonization of cable qualification standard also needs to be discussed. KEPRI launched a project for harmonization of EQ relative standards such as IEEE, IEC and RCC-E. A study for harmonization of IEEE323 and IEC60780 is known in progress by IEEE committee. In this paper, harmonization of international standards for cable qualification will be discussed. IEEE383 standard is qualification standard for electric cable broadly used in Asian pacific area while IEC60505 is mostly used in European area. Since these two standards have different requirements for environmental qualification of cable, problem can be happened in the plant site when they purchase cable qualified by not endorsed standard. IEEE383-2003 and IEC60505-2004 is the latest version of each standard. Comparison results and recommendations for harmonization of these two standards are introduced herein

  11. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    Science.gov (United States)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  12. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  13. Spectrum-efficient multi-channel design for coexisting IEEE 802.15.4 networks: A stochastic geometry approach

    KAUST Repository

    Elsawy, Hesham

    2014-07-01

    For networks with random topologies (e.g., wireless ad-hoc and sensor networks) and dynamically varying channel gains, choosing the long term operating parameters that optimize the network performance metrics is very challenging. In this paper, we use stochastic geometry analysis to develop a novel framework to design spectrum-efficient multi-channel random wireless networks based on the IEEE 802.15.4 standard. The proposed framework maximizes both spatial and time domain frequency utilization under channel gain uncertainties to minimize the number of frequency channels required to accommodate a certain population of coexisting IEEE 802.15.4 networks. The performance metrics are the outage probability and the self admission failure probability. We relax the single channel assumption that has been used traditionally in the stochastic geometry analysis. We show that the intensity of the admitted networks does not increase linearly with the number of channels and the rate of increase of the intensity of the admitted networks decreases with the number of channels. By using graph theory, we obtain the minimum required number of channels to accommodate a certain intensity of coexisting networks under a self admission failure probability constraint. To this end, we design a superframe structure for the coexisting IEEE 802.15.4 networks and a method for time-domain interference alignment. © 2002-2012 IEEE.

  14. Analysis Of Impact Of Various Parameters On BER Performance For IEEE 802.11b

    Directory of Open Access Journals (Sweden)

    Nilesh B. Kalani

    2015-08-01

    Full Text Available Abstract This paper discusses about IEEE 802.11b simulation model implemented using LabVIEW software and its analyses for impact on bit error rate BER for different parameters as channel type channel number data transmission rate and packet size. Audio file is being transmitted processed and analyzed using the model for various parameters. This paper gives analysis of BER verses ESN0 for various parameter like data rate packet size and communication channel for the IEEE 802.11b simulation model generated using LabVIEW. It is proved that BER can be optimized by tweaking different parameters of wireless communication system.

  15. Diseño y verificación de un amplificador para IEEE802.16

    OpenAIRE

    Lloret Arjona, Patricia

    2005-01-01

    Hace más de 6 años se empezó a gestar el IEEE802.16, un estándar para una nueva tecnología inalámbrica de banda ancha. El primer capítulo consiste en una introducción sobre este estándar, su evolución, las diferentes versiones que han ido apareciendo y las características principales de cada una de ellas, seguido de un pequeño comentario sobre su faceta comercial, WiMAX. El IEEE802.16 está empezando a tener relevancia, de modo que se decidió realizar un amplificador capaz de...

  16. Service differentiated and adaptive CSMA/CA over IEEE 802.15.4 for Cyber-Physical Systems.

    Science.gov (United States)

    Xia, Feng; Li, Jie; Hao, Ruonan; Kong, Xiangjie; Gao, Ruixia

    2013-01-01

    Cyber-Physical Systems (CPS) that collect, exchange, manage information, and coordinate actions are an integral part of the Smart Grid. In addition, Quality of Service (QoS) provisioning in CPS, especially in the wireless sensor/actuator networks, plays an essential role in Smart Grid applications. IEEE 802.15.4, which is one of the most widely used communication protocols in this area, still needs to be improved to meet multiple QoS requirements. This is because IEEE 802.15.4 slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) employs static parameter configuration without supporting differentiated services and network self-adaptivity. To address this issue, this paper proposes a priority-based Service Differentiated and Adaptive CSMA/CA (SDA-CSMA/CA) algorithm to provide differentiated QoS for various Smart Grid applications as well as dynamically initialize backoff exponent according to traffic conditions. Simulation results demonstrate that the proposed SDA-CSMA/CA scheme significantly outperforms the IEEE 802.15.4 slotted CSMA/CA in terms of effective data rate, packet loss rate, and average delay.

  17. Outdoor Long-Range WLANs : A Lesson for IEEE 802.11ah

    NARCIS (Netherlands)

    Aust, Stefan; Venkatesha Prasad, R.; Niemegeers, Ignas G M M

    2015-01-01

    Several service applications have been reported by many who proposed the use of wireless LANs (WLANs) over a wide variety of outdoor deployments. In particular, the upcoming IEEE 802.11ah WLAN protocol will enable a longer transmission range between WLAN access points (APs) and stations (STAs) up to

  18. Honoring Leslie A. Geddes - farewell ...

    Science.gov (United States)

    Valentinuzzi, Max E

    2010-01-05

    Honor thy father and thy mother, say the Holy Scriptures1, for they at least gave thee this biological life, but honor thy teachers, too, for they gave thee knowledge and example.Leslie Alexander Geddes took off on a long, long trip, Sunday October 25, 2009, leaving his body for medical and research use. The departing station was West Lafayette, Indiana, where he set foot in 1974, at Purdue University, stamping there a unique deep imprint, similar and probably more profound than the one left at Baylor College of Medicine (BCM), Houston, Texas, in the period 1955-1974. Memories came back as a flood the minute after a message broke the news to me: When I first met him visiting the Department of Physiology at BCM back in 1962, my first Classical Physiology with Modern Instrumentation Summer Course ... The versatile Physiograph was the main equipment, an electronic-mechanical three or four channel recorder that could pick up a variety of physiological variables. Les and his collaborators had introduced also the impedance pneumograph, which was a simplified version of previous developments made by others. It became a ubiquitous unit that trod many roads in the hands of eager and curious students. Ventricular fibrillation and especially its counterpart, defibrillation, stand out as subjects occupying his concern along the years. Many were the students recruited to such effort and long is the list of papers on the subject. Physiological signals attracted considerable part of his activities because one of his perennial mottos was measurement is essential in physiology. He has written thirteen books and over eight hundred scientific papers, receiving also several prizes and distinctions. Not only his interests stayed within the academic environment but an industrial hue was manifested in over 20 USA patents, all applied to medical use. History of science and technology was another area in which, often with Hebbel Hoff, he uncovered astounding and delightful information. It

  19. Career and Technology Center Honors Julie Hartman | Poster

    Science.gov (United States)

    By Carolynne Keenan, Contributing Writer On May 7, Julie Hartman was honored by the Frederick County Career and Technology Center (CTC) for her support of the CTC’s Biomedical Sciences Program. As an education program specialist for Outreach and Special Programs at NCI at Frederick, Hartman is responsible for NCI at Frederick’s participation in the program, which is designed to offer Frederick County high school students hands-on, practical laboratory experience beyond the typical classroom setting. 

  20. Performance Analysis of Non-saturated IEEE 802.11 DCF Networks

    Science.gov (United States)

    Zhai, Linbo; Zhang, Xiaomin; Xie, Gang

    This letter presents a model with queueing theory to analyze the performance of non-saturated IEEE 802.11 DCF networks. We use the closed queueing network model and derive an approximate representation of throughput which can reveal the relationship between the throughput and the total offered load under finite traffic load conditions. The accuracy of the model is verified by extensive simulations.

  1. IEEE Std 381-1977: IEEE standard criteria for type tests of Class 1E modules used in nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the basic requirements of a type test program with the objective of verifying that a module used as Class 1E equipment in a nuclear power generating station meets or exceeds its design specifications. This document is limited to class 1E modules from and including the sensor through the logic circuitry of the final actuation devices. Except for those that are part of a module, switchgear, cables, connections, motors, valve actuators, station batteries, and penetrations are not included and are covered by other IEEE documents. The purpose of this document is to supplement the procedures and requirements given in IEEE Std 323-1974 [24] for type testing Class 1E modules, thereby providing directions for establishment of a type test program which will obtain the required test data and yield the required documentation of test methods and results. This standard is structured to present to the user the principal performance characteristics and environmental parameters which must be considered in designing a type test program for any give Class 1E module. These modules range from tiny sensors to complete racks or cabinets full of equipment that may be located inside or outside containment. The Class 1E modules are required to perform their function before, during, or after, or all, any design basis event specified for the module. The vast variety of modules covered by this document precludes the listing here of specific requirements for each type test

  2. IEEE 8023 ethernet, current status and future prospects at the LHC

    CERN Document Server

    Dobinson, Robert W; Haas, S; Martin, B; Le Vine, M J; Saka, F

    2000-01-01

    The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging. 8 Refs.

  3. Problems and solutions in application of IEEE standards at Savannah River Site, Department of Energy (DOE) nuclear facilities

    International Nuclear Information System (INIS)

    Lee, Y.S.; Bowers, T.L.; Chopra, B.J.; Thompson, T.T.; Zimmerman, E.W.

    1993-01-01

    The Department of Energy (DOE) Nuclear Material Production Facilities at the Savannah River Site (SRS) were designed, constructed, and placed into operation in the early 1950's, based on existing industry codes/standards, design criteria, analytical procedures. Since that time, DOE has developed Orders and Polices for the planning, design and construction of DOE Nuclear Reactor Facilities which invoke or reference commercial nuclear reactor codes and standards. The application of IEEE reactor design requirements such as Equipment Qualification, Seismic Qualification, Single Failure Criteria, and Separation Requirement, to non-reactor facilities has been a problem since the IEEE reactor criteria do not directly confirm to the needs of non-reactor facilities. SRS Systems Engineering is developing a methodology for the application of IEEE Standards to non-reactor facilities at SRS

  4. Planning and implementing an honors degree in environmental science curricula: a case study from the University of Delaware, USA

    Science.gov (United States)

    Levia, Delphis

    2015-04-01

    Environmental degradation is undermining the sustainability of our planet. The multi-faceted nature of environmental stressors, which inherently couples human-environment interactions across space and time, necessitates that we train environmental scientists holistically within an interdisciplinary framework. Recruiting top-notch honors students to major in the environmental sciences is a critical step to ensure that we have the human capital to tackle complicated environmental problems successfully. Planning and implementing an honors degree is no trivial task. Based upon a recently completed and implemented set of programmatic revisions*, this poster showcases a successful example of an honors curriculum in environmental science to recruit and educate dynamic thinkers capable of improving the quality of our environment. The interdisciplinary environmental science program at the University of Delaware emphasizes the cross-cutting among earth's spheres through a core set of courses which employ a quantitative approach which is supplemented by several environmental policy courses. The core is coupled with six different thematic concentrations (students choose one) which permit the student to delve into a particular area of environmental science. The honors component of the degree consists of twelve additional credits. These credits are met through a specially designed introductory environmental course, a field experience requiring data collection, analysis, and write-up, a capstone course, and one other environmentally related course. The environmental sciences honors curriculum outlined in this poster may serve as a useful guide to others wishing to establish an honors program of their own in environmental science to recruit and prepare the next generation to mitigate environmental degradation. -------------- * Please note that the planning process for the environmental programs was and is the collective effort of many dedicated people. Current members of the

  5. Integration of IEEE 1451 and HL7 exchanging information for patients' sensor data.

    Science.gov (United States)

    Kim, Wooshik; Lim, Suyoung; Ahn, Jinsoo; Nah, Jiyoung; Kim, Namhyun

    2010-12-01

    HL7 (Health Level 7) is a standard developed for exchanging incompatible healthcare information generated from programs or devices among heterogenous medical information systems. At present, HL7 is growing as a global standard. However, the HL7 standard does not support effective methods for treating data from various medical sensors, especially from mobile sensors. As ubiquitous systems are growing, HL7 must communicate with various medical transducers. In the area of sensor fields, IEEE 1451 is a group of standards for controlling transducers and for communicating data from/to various transducers. In this paper, we present the possibility of interoperability between the two standards, i.e., HL7 and IEEE 1451. After we present a method to integrate them and show the preliminary results of this approach.

  6. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  7. Basic security measures for IEEE 802.11 wireless networks

    OpenAIRE

    Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David

    2008-01-01

    This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educat...

  8. A Novel Prioritization Scheme to Improve QoS in IEEE 802.11e Networks

    Directory of Open Access Journals (Sweden)

    Navid Tadayon

    2010-01-01

    Full Text Available IEEE 802.11 WLAN utilizes a distributed function at its MAC layer, namely, DCF to access the wireless medium. Due to its distributed nature, DCF is able to guarantee working stability in a wireless medium while maintaining the assembling and maintenance cost in a low level. However, DCF is inefficient in dealing with real-time traffics due to its incapability on providing QoS. IEEE 802.11e was introduced as a supplementary standard to cope with this problem. This standard introduces an Enhanced Distributed Coordination Function (EDCF that works based on diff-Serve model and can serve multiple classes of traffics (by using different prioritizations schemes. With the emergence of new time-sensitive applications, EDCF has proved to be yet inefficient in dealing with these kinds of traffics because it could not provide network with well-differentiated QoS. In this study, we propose a novel prioritization scheme to improve QoS level in IEEE 802.11e network. In this scheme, we replace Uniform PDF with Gamma PDF, which has salient differentiating properties. We investigate the suitability and superiority of this scheme on furnishing network with well-differentiated QoS using probabilistic analysis. We strengthen our claims by extensive simulation runs.

  9. IEEE C37.98-1987: IEEE standard seismic testing of relays

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in IEEE Std 344-1987. To define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general, they are (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay that constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new application, then proof testing must be performed for that new case

  10. IEEE C37.98-1978: IEEE standard seismic testing of relays

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in ANSI/IEEE Std 344-1975, Recommended Practices for Seismic Qualification of Class 1E Equipment for Nuclear Power Generating Stations. In order to define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general they are: (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay which constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new case

  11. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger

    2012-01-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall

  12. 17th IEEE NPSS Real Time Conference – RT-2010

    CERN Multimedia

    Carlos Varandas

    2010-01-01

    Congress Centre of “Instituto Superior Técnico”, Lisboa, Portugal, 24-28 May, 2010 ABSTRACT SUBMISSION OPEN Abstract Submission Deadline: March 1st, 2010 Dear Sir/Madam, We are pleased to announce that abstract submission for the 17th IEEE NPSS Real Time Conference is now open on our web site. The deadline for submitting an abstract is 1st March 2010. Full conference details General Chairman

  13. Incorporating antenna beamswitching technique into drivers for IEEE802.11 WLAN devices

    CSIR Research Space (South Africa)

    Mofolo, M

    2015-11-23

    Full Text Available the beamswitching technique for switched parasitic array (SPA) and electronically steerable parasitic array radiator (ESPAR) antennas in the drivers for IEEE802.11 WLAN devices. The modifications of the open source drivers (ath5k and ath9k) to enable real...

  14. Honor killings in the Middle East and North Africa: a systematic review of the literature.

    Science.gov (United States)

    Kulczycki, Andrzej; Windle, Sarah

    2011-11-01

    A systematic review of the research literature on honor killings in the Middle East and North Africa (MENA) indicates a paucity of studies relative to the presumed magnitude of the problem. Forty articles were reviewed and critically appraised, of which only 9 contained primary data and 11 presented original secondary analyses. Despite a recent increase in published studies, persistent methodological limitations restrict the generalizability of findings. Most studies focus on legal aspects, determinants, and characteristics of victims and perpetrators. Victims are mostly young females murdered by their male kin. Unambiguous evidence of a decline in tolerance of honor killings remains elusive.

  15. An improved IEEE 802.11 protocol for reliable data transmission in power distribution fault diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)

    2010-10-15

    In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.

  16. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    Science.gov (United States)

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  17. ESO Receives Computerworld Honors Program 21st Century Achievement Award in Science Category

    Science.gov (United States)

    2005-06-01

    In a ceremony held in Washington, D.C. (USA) on June 6, 2005, ESO, the European Organisation for Astronomical Research in the southern Hemisphere, received the coveted 21st Century Achievement Award from the Computerworld Honors Program for its visionary use of information technology in the Science category. Sybase, a main database server vendor and member of the Chairmen's Committee, nominated ESO's Data Flow System in recognition of its contributions to the global information technology revolution and its positive impact on society. The citations reads: "ESO has revolutionized the operations of ground-based astronomical observatories with a new end-to-end data flow system, designed to improve the transmission and management of astronomical observations and data over transcontinental distances." This year's awards, in 10 categories, were presented at a gala event at the National Building Museum, attended by over 250 guests, including leaders of the information technology industry, former award recipients, judges, scholars, and diplomats representing many of the 54 countries from which the 17-year-old program's laureates have come. "The Computerworld Honors Program 21st Century Achievement Awards are presented to companies from around the world whose visionary use of information technology promotes positive social, economic and educational change," said Bob Carrigan, president and CEO of Computerworld and chairman of the Chairmen's Committee of the Computerworld Honors Program. "The recipients of these awards are the true heroes of the information age and have been appropriately recognized by the leading IT industry chairmen as true revolutionaries in their fields." ESO PR Photo 18/05 ESO PR Photo 18/05 ESO Receives the Award in the Science Category [Preview - JPEG: 400 x 496 pix - 53k] [Normal - JPEG: 800 x 992 pix - 470k] [Full Res - JPEG: 1250 x 1550 pix - 1.1M] Caption: ESO PR Photo 18/05: Receiving the Computerworld 21st Century Achievement Award for Science

  18. A distributed scheme to manage the dynamic coexistence of IEEE 802.15.4-based health-monitoring WBANs.

    Science.gov (United States)

    Deylami, Mohammad N; Jovanov, Emil

    2014-01-01

    The overlap of transmission ranges between wireless networks as a result of mobility is referred to as dynamic coexistence. The interference caused by coexistence may significantly affect the performance of wireless body area networks (WBANs) where reliability is particularly critical for health monitoring applications. In this paper, we analytically study the effects of dynamic coexistence on the operation of IEEE 802.15.4-based health monitoring WBANs. The current IEEE 802.15.4 standard lacks mechanisms for effectively managing the coexistence of mobile WBANs. Considering the specific characteristics and requirements of health monitoring WBANs, we propose the dynamic coexistence management (DCM) mechanism to make IEEE 802.15.4-based WBANs able to detect and mitigate the harmful effects of coexistence. We assess the effectiveness of this scheme using extensive OPNET simulations. Our results indicate that DCM improves the successful transmission rates of dynamically coexisting WBANs by 20%-25% for typical medical monitoring applications.

  19. BOB-RED queue management for IEEE 802.15.4 wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Wu Jean-Lien

    2011-01-01

    Full Text Available Abstract Multimedia services over resource constrained wireless sensor networks (WSNs face a performance bottleneck issue from the gateway node to the sink node. Therefore, the queue management at the gateway node is crucial for diversified messages conveyed from the front nodes to the sink node. In this article, beacon order-based random early detection (BOB-RED queue management is proposed. BOB-RED is a dynamic adaptation scheme based on adjusting beacon interval and superframe duration in the IEEE 802.15.4 MAC superframe accompanied with RED queue management scheme to increase the transmission efficiency of multimedia over WSNs. We focus on the performance improvement upon different traffic loads over WSNs. Evaluation metrics include end-to-end delay, packet delivery ratio, and energy consumption in IEEE 802.15.4 beacon enabled mode. Simulation results show that BOB-RED can effectively decrease end-to-end delay and energy consumption compared to the DropTail scheme.

  20. Hybrid Polling Method for Direct Link Communication for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2008-10-01

    Full Text Available The direct link communication between STAtions (STAs is one of the techniques to improve the MAC performance of IEEE 802.11 infrastructure networks. For the efficient direct link communication, in the literature, the simultaneous polling method was proposed to allow the multiple direct data communication to be performed simultaneously. However, the efficiency of the simultaneous polling method is affected by the interference condition. To alleviate the problem of the lower polling efficiency with the larger interference range, the hybrid polling method is proposed for the direct link communication between STAs in IEEE 802.11 infrastructure networks. By the proposed polling method, we can integrate the sequential and simultaneous polling methods properly according to the interference condition. Numerical examples are also presented to show the medium access control (MAC performance improvement by the proposed polling method.

  1. IEEE Std 649-1980: IEEE standard for qualifying Class 1E motor control centers for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic principles, requirements, and methods for qualifying Class 1E motor control centers for outside containment applications in nuclear power generating stations. Qualification of motor control centers located inside containment in a nuclear power generating station is beyond the scope of this standard. The purpose of this standard is (1) to define specific qualification requirements for Class 1E motor control centers in accordance with the more general qualification requirements of IEEE Std 323-1974, IEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations; (2) to provide guidance in establishing a qualification program for demonstrating the design adequacy of Class 1E motor control centers in nuclear power generating station applications

  2. IEEE 802.11 ECG monitoring system.

    Science.gov (United States)

    Tejero-Calado, Juan; Lopez-Casado, Carmen; Bernal-Martin, Antonio; Lopez-Gomez, Miguel; Romero-Romero, Marco; Quesada, Guillermo; Lorca, Julio; Rivas, Ramon

    2005-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. This kind of devices favours at-home hospitalization, reducing the affluence to sanitary assistance centers to make routine controls. This fact causes a really favourable social impact, especially for elder people, rural-zone inhabitant, chronic patients and handicapped people. Furthermore, it offers new functionalities to physicians and will reduce the sanitary cost. Among these functionalities, biomedical signals can be sent to other devices (screen, PDA, PC...) or processing centers, without restricting the patients' mobility. The aim of this project is the development and implementation of a reduced size multi-channel electrocardiograph based on IEEE 802.11, which allows wireless monitoring of patients, and the insertion of the information into the TCP/IP Hospital network.

  3. IEEE 802.3 Ethernet, Current Status and Future Prospects at the LHC

    CERN Document Server

    Dobinson, Robert W; Haas, S W; Martin, B; Le Vine, M J; Saka, F

    2000-01-01

    The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging.

  4. El Médico de su Honra (The Doctor of his Own Honor by Calderón de la Barca: The Honor as a Cause of Exemption of the Penal Responsibility in the Baroque Spain

    Directory of Open Access Journals (Sweden)

    José Palacio González

    2014-12-01

    Full Text Available The notion of honor or reputation is at the very core of the Spanish theatre in the baroque period. This fact could not be correctly understood without taking into consideration the obsession about purity of blood, having got a relevant influence in the Spanish society daily life since the expulsion of the Jewish population and the taking over of Grenade in 1492, as well as the first rank role played by the clerical and political power against the reform movement into the Church. One additional element that should be included into this general frame of reference is the structural inability of the Spanish economy to take off, after the end of the middle-age, in a process leading to a beginning of industrial revolution, with the subsequent assumption of modern values that necessarily would come out of that process. The most telling example of the importance of the idea of honor in the Spanish baroque theatre is, with no doubt, The Doctor of his own honor (El medico de su honra, by Calderón de la Barca, which plot turns around the announced death of an innocent lady suspicioned of adultery, just because of an unhappy sets of events. In the play the jealousy is less determinant for the purpose of the plot that the need for the husband to eliminate any element of uncertainty, as far as his reputation is concerned. The King understands the husband’s motivation and forgives him. Such a conception of honor has left, till very recent times, a major mark in the evolution of the Spanish society, even at a legislative level. El concepto de honor o reputación es un elemento fundamental en el teatro barroco español. Este hecho no se puede entender correctamente sin tener en cuenta la obsesión por la pureza de sangre, concepto con una influencia relevante en la vida cotidiana de la sociedad española desde la expulsión de la población judía y la conquista de Granada en 1492, así como por el papel fundamental desempeñado por el poder clerical y pol

  5. The IEEE-SA patent policy update under the lens of EU competition law

    NARCIS (Netherlands)

    Kanevskaia, Olia; Zingales, Nicolo

    2016-01-01

    In 2015, the Institute of Electrical and Electronics Engineers (IEEE) Standardization Association made some controversial changes to its patent policy. The changes include a recommended method of calculation of FRAND royalty rates, and a request to members holding a standard essential patent (SEP)

  6. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    Science.gov (United States)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  7. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias

    2012-09-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump\\'s effectiveness. The winning entry split analysis of the pump into three parts based on the pump\\'s functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/ oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump. © 2012 IEEE.

  8. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-01-16

    IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly.

  9. Design Optimization of Cyber-Physical Distributed Systems using IEEE Time-sensitive Networks (TSN)

    DEFF Research Database (Denmark)

    Pop, Paul; Lander Raagaard, Michael; Craciunas, Silviu S.

    2016-01-01

    to the optimization of distributed cyber-physical systems using real-time Ethernet for communication. Then, we formulate two novel optimization problems related to the scheduling and routing of TT and AVB traffic in TSN. Thus, we consider that we know the topology of the network as well as the set of TT and AVB flows......In this paper we are interested in safety-critical real-time applications implemented on distributed architectures supporting the Time-SensitiveNetworking (TSN) standard. The ongoing standardization of TSN is an IEEE effort to bring deterministic real-time capabilities into the IEEE 802.1 Ethernet...... standard supporting safety-critical systems and guaranteed Quality-of-Service. TSN will support Time-Triggered (TT) communication based on schedule tables, Audio-Video-Bridging (AVB) flows with bounded end-to-end latency as well as Best-Effort messages. We first present a survey of research related...

  10. DoS detection in IEEE 802.11 with the presence of hidden nodes

    Directory of Open Access Journals (Sweden)

    Joseph Soryal

    2014-07-01

    Full Text Available The paper presents a novel technique to detect Denial of Service (DoS attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS and Frequency Hopping Spread Spectrum (FHSS and the results are presented to validate the algorithm.

  11. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    Science.gov (United States)

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  12. IEEE recommended practices for seismic qualification of Class 1E equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    The IEEE has developed this document to provide direction for developing programs to seismically qualify Class 1E equipment for nuclear power generating stations. It supplements IEEE Std 323-1974, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, which describes the basic requirements for equipment qualification. The Class 1E equipment to be qualified by produres or standards established by this document are of many forms, characteristics, and materials; therefore, the document presents many acceptable methods with the intent of permitting the user to make a judicious selection from among the various options. In making such a selection, the user should choose those that best meet a particular equipment's requirements. Further, in using this document as a specification for the purchase of equipment, the many options should also be recognized and the document invoked accordingly. It is recommended that the need for specific standards for the seismic qualifiction of particular kinds of equipment be evaluated by those responsible for such documents and that consideration be given to the application of particular methods from these documents which are most suitable

  13. "The Endless Appetite": Honors Education and the Spirit of the Humanities

    Science.gov (United States)

    Martino, Andrew

    2015-01-01

    In a world that no longer privileges thinking, Andrew Martino writes here that we might need to consider what we are asking of our students--and why--when we ask them to think. This article presents a declaration of how Martino thinks honors education can serve as a resistant force against the increasing encroachment of a wholly utilitarian…

  14. Setting the Table for Diversity. National Collegiate Honors Council Monograph Series

    Science.gov (United States)

    Coleman, Lisa L., Ed.; Kotinek, Jonathan D., Ed.

    2010-01-01

    This monograph provides a cross section of policy and practice through the voices and experiences of honors faculty, staff, and students from across the nation. While far from comprehensive, this volume does pick up different strands of thinking on diversity to present a rich and complicated understanding of what diversity is, why it is important,…

  15. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-01-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  16. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-08-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  17. A 1-GHz charge pump PLL frequency synthesizer for IEEE 1394b PHY

    DEFF Research Database (Denmark)

    Ji, J.; Liu, H.; Li, Q.

    2012-01-01

    This paper presents an implementation of multi-rate SerDes transceiver for IEEE 1394b applications. Simple and effective pre-emphasis and equalizer circuits are used at transmitter and receiver, respectively. A phase interpolator based clock and data recovery circuit with optimized linearity is a...

  18. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  19. Preparing students for global citizenship: the effects of a Dutch undergraduate honors course

    NARCIS (Netherlands)

    Schutte, Ingrid W.; Kamans, Elanor; Wolfensberger, Marca; Veugelers, Wiel

    2017-01-01

    Using a mixed method approach, this case study investigates effects on the participating students () of an undergraduate honors course in the Netherlands, aimed at global justice citizenship. Knowledge about effects of global citizenship courses is still limited. The Ethical Sensitivity Scale

  20. IEEE Xplore® Digital Library - Evolving to Meet YOUR Changing Needs

    OpenAIRE

    2014-01-01

    Представлена презентация доклада "Использование платформы IEEE Digital Library: уникальные научные публикации в области электроники, радиосвязи, вычислительной техники, информационных технологий, энергетики, машиностроения, физики, химии, геологии, нанотехнологий" Эстер Лукаш, специалиста по обучению IEEE (Германия), на семинаре «Использование платформы IEEE Digital Library», прошедшем 02 октября 2014 года в УрФУ, на английском языке....

  1. Developing Trustworthy Commissioned Officers: Transcending the Honor Codes and Concept

    Science.gov (United States)

    2012-10-01

    prima   facie  evidence  that  one  has  been  honorable.  This  assumption  is...the   staff   and   faculty   at   each   commissioning   source  have  an   obligation   to   show  Cadets,  Midshipmen...and belief in the competency, character, and commitment of an institution, organization, group, or individual to fulfill obligations and

  2. Investigating the efficiency of IEEE 802.15.4 for medical monitoring applications.

    Science.gov (United States)

    Pelegris, P; Banitsas, K

    2011-01-01

    Recent advancements in wireless communications technologies bring us one step closer to provide reliable Telecare services as an alternative to patients staying in a hospital mainly for monitoring purposes. In this research we investigate the efficiency of IEEE 802.15.4 in a simple scenario where a patient is being monitored using an ECG and a blood analysis module. This approach binds well with assisted living solutions, by sharing the network infrastructure for both monitoring and control while taking advantage of the low power features of the protocol. Such applications are becoming more and more realistic to implement as IEEE 802.15.4 compatible hardware becomes increasingly available. Our aim is to examine the impact of Beacon and Superframe Order in the medium access delay, dropped packets, end to end delay, average retransmission attempts and consumed power focusing on this bandwidth demanding situation where the network load does not allow low duty cycles, in order to draw some conclusions on the effect that this will have to telemonitoring applications.

  3. Dynamic subframe allocation for mobile broadband m-health using IEEE 802.16j mobile multihop relay networks.

    Science.gov (United States)

    Alinejad, Ali; Istepanian, R S H; Philip, N

    2012-01-01

    The concept of 4G health will be one of the key focus areas of future m-health research and enterprise activities in the coming years. WiMAX technology is one of the constituent 4G wireless technologies that provides broadband wireless access (BWA). Despite the fact that WiMAX is able to provide a high data rate in a relatively large coverage; this technology has specific limitations such as: coverage, signal attenuation problems due to shadowing or path loss, and limited available spectrum. The IEEE 802.16j mobile multihop relay (MMR) technology is a pragmatic solution designed to overcome these limitations. The aim of IEEE 802.16j MMR is to expand the IEEE 802.16e's capabilities with multihop features. In particular, the uplink (UL) and downlink (DL) subframe allocation in WiMAX network is usually fixed. However, dynamic frame allocation is a useful mechanism to optimize uplink and downlink subframe size dynamically based on the traffic conditions through real-time traffic monitoring. This particular mechanism is important for future WiMAX based m-health applications as it allows the tradeoff in both UL and DL channels. In this paper, we address the dynamic frame allocation issue in IEEE 802.16j MMR network for m-health applications. A comparative performance analysis of the proposed approach is validated using the OPNET Modeler(®). The simulation results have shown an improved performance of resource allocation and end-to-end delay performance for typical medical video streaming application.

  4. Interoperability in digital electrocardiography: harmonization of ISO/IEEE x73-PHD and SCP-ECG.

    Science.gov (United States)

    Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Serrano, Luis; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José

    2010-11-01

    The ISO/IEEE 11073 (x73) family of standards is a reference frame for medical device interoperability. A draft for an ECG device specialization (ISO/IEEE 11073-10406-d02) has already been presented to the Personal Health Device (PHD) Working Group, and the Standard Communications Protocol for Computer-Assisted ElectroCardioGraphy (SCP-ECG) Standard for short-term diagnostic ECGs (EN1064:2005+A1:2007) has recently been approved as part of the x73 family (ISO 11073-91064:2009). These factors suggest the coordinated use of these two standards in foreseeable telecardiology environments, and hence the need to harmonize them. Such harmonization is the subject of this paper. Thus, a mapping of the mandatory attributes defined in the second draft of the ISO/IEEE 11073-10406-d02 and the minimum SCP-ECG fields is presented, and various other capabilities of the SCP-ECG Standard (such as the messaging part) are also analyzed from an x73-PHD point of view. As a result, this paper addresses and analyzes the implications of some inconsistencies in the coordinated use of these two standards. Finally, a proof-of-concept implementation of the draft x73-PHD ECG device specialization is presented, along with the conversion from x73-PHD to SCP-ECG. This paper, therefore, provides recommendations for future implementations of telecardiology systems that are compliant with both x73-PHD and SCP-ECG.

  5. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    Science.gov (United States)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  6. 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf | 01 ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News. IAS Logo. 29th Mid-year meeting. Posted on 19 ...

  7. Mirror Neurons, Theatrical Mirrors and the Honor Code

    OpenAIRE

    Greer, M.G. (Margaret G.)

    2012-01-01

    Este artículo relaciona el descubrimiento de cierta clase de células cerebrales denominados «neuronas espejo», que pueden ayudar a explicar la base biológica de la naturaleza pre-conceptual, pre-lingüística de la cognición humana, a la teoría lacaniana de la formación de la subjetividad humana en el espacio del Otro. Así explica la naturaleza inter-sujetiva del honor que Lope describe en Los comendadores de Córdoba como «aquélla que consiste en otro». La teoría de las neuronas espejo muestra ...

  8. Revisión del estado del arte deIR-Ultra-Wideband y simulación de la respuesta impulsiva del canal IEEE802.15.4a Review of the state of art of IR-Ultra-Wideband and simulation of Impulse Responce of the IEEE 802.15.4a channel

    Directory of Open Access Journals (Sweden)

    Julio Suárez Páez

    2010-06-01

    Full Text Available Este artículo realiza una revisión del estado del arte de la tecnología basada en canales de Banda Ultra Ancha (UWB, Ultra–Wideband enfocándose en su regulación, estandarización, aplicaciones básicas, modelo de canal IEEE 802.15.4a y simulación de la respuesta impulsiva de este tipo de canal. También se pretende introducir al lector en las tecnologías basadas en canales IR–UWB y en los parámetros para el modelamiento y simulación del canal UWB IEEE 802.15.4a.This paper reviews the state of the art of the technology based in channels of Ultra Wide band (UWB Ultra–Wideband focusing on its regulation, standardization, basic applications, IEEE 802.15.4a channel model and simulation of the impulsive response of this type of channel. Also, it aims to introduce the reader to the technologies based on IR–UWB channels and the parameters for modeling and simulation of IEEE 802.15.4a UWB channel.

  9. Proceedings of the 1988 IEEE international conference on robotics and automation. Volume 1

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    These proceedings compile the papers presented at the international conference (1988) sponsored by IEEE Council on ''Robotics and Automation''. The subjects discussed were: automation and robots of nuclear power stations; algorithms of multiprocessors; parallel processing and computer architecture; and U.S. DOE research programs on nuclear power plants

  10. Cut throat injuries and honor killings: review of 15 cases in eastern Turkey.

    Science.gov (United States)

    Ozdemir, Bora; Celbis, Osman; Kaya, Atılhan

    2013-05-01

    Throat cuts could be of homicidal, suicidal or accidental origin. In the cases of death from cut throat, suicide can be distinguished from homicide based on the type and location of the wound and crime scene investigation. The purpose of the current study is to attract attention to the instructive findings for origin determination in deaths by cut throat according to the number and characteristics of the wounds and crime scene investigation. We have reviewed the files of autopsies performed between the years of 2000 and 2010, and compared with previously published case reports; all results were summarized in the current study. The results showed that 60% of cases were male, 40% were female, with 27.9 years of average age. The mean number of wounds was calculated to be 34.3 per case for honor homicides, 7.4 per case for other homicides, and 2.0 per case for suicides. Numbers of wounds were approximately 5 times higher in the honor homicides compared to other homicides. If the number of wounds were excessive, possibility of honor killings should be taken into account. When the killer was a parent not in psychosis, hesitation cuts were detected. Additional lesions were present in 46.7% of the cases, and they were assessed as homicide. Presence of vertebral notch and spinal cord cuts, which require a substantial amount of force and pressure via sharp tools, indicates homicide. Copyright © 2012 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  11. NIH-IEEE 2015 Strategic Conference on Healthcare Innovations and Point-of-Care Technologies for Prec

    Science.gov (United States)

    NIH and the Institute for Electrical and Electronics Engineering, Engineering in Medicine and Biology Society (IEEE/EMBS) hosted the third iteration of the Healthcare Innovations and Point-of-Care Technologies Conference last week.

  12. La cultura del honor en la culpabilización de la mujer objeto de violación

    OpenAIRE

    Canto, Jesús M.; Perles, Fabiola; San Martín, Jesús

    2014-01-01

    Se analiza el papel que desempeña la cultura del honor en la culpabilización de las mujeres objeto de violación. Se obtiene que en los escenarios de violación en lo que previamente se daba algún tipo de intimidad entre la víctima y el agresor (violación por un conocido y violación marital), a medida que se puntúa más alto en la aceptación de los postulados de la cultura del honor, más se culpabiliza a la mujer.

  13. Status of the IEEE P896 Future Backplane Bus

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1983-10-01

    The IEEE P896 Future Backplane Bus project has been influenced by and has influenced FASTBUS and several other contemporary bus designs. This paper summarizes the current status of that project, which is directed toward the needs of modern 32-bit microprocessor systems with multiple processors. Some of the technology developed for P896 will be important for future non-ECL implementations of FASTBUS and other buses. In particular, new bus drivers and receivers should greatly improve the performance and reliability of backplane buses and cable buses. The current status of the P896 serial bus is also summarized

  14. 15th IEEE International Conference on Intelligent Engineering Systems

    CERN Document Server

    Živčák, Jozef; Aspects of Computational Intelligence Theory and Applications

    2013-01-01

    This volume covers the state-of-the art of the research and development in various aspects of computational intelligence and gives some perspective directions of development. Except the traditional engineering areas that contain theoretical knowledge, applications, designs and projects, the book includes the area of use of computational intelligence in biomedical engineering. „Aspects of Computational Intelligence: Theory and Applications” is a compilation of carefully selected extended papers written on the basis of original contributions presented at the 15th IEEE International Conference on Intelligent Engineering Systems 2011, INES 2011 held at June 23.-26. 2011 in AquaCity Poprad, Slovakia.    

  15. IEEE Std 323-1983: IEEE standard for qualifying Class 1E equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic requirements for qualifying Class 1E equipment with interfaces that are to be used in nuclear power generating stations. The requirements presented include the principles, procedures, and methods of qualification. These qualification requirements, when met, will confirm the adequacy of the equipment design under normal, abnormal, design basis event, post design basis event, and in-service test conditions for the performance of safety function(s). The purpose of this standard is to identify requirements for the qualification of Class 1E equipment, including those interfaces whose failure could adversely affect the performance of Class 1E equipment and systems. The methods described shall be used for qualifying equipment, extending qualification, and updating qualification if the equipment is modified. Other issued IEEE standards which present qualification methods for specific equipment or components, or both, and those that deal with parts of the qualification program, may be used to supplement this standard, as applicable

  16. Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCA in Non-saturation Condition

    Science.gov (United States)

    Kim, Tae Ok; Kim, Kyung Jae; Choi, Bong Dae

    We analyze the MAC performance of the IEEE 802.11 DCF and 802.11e EDCA in non-saturation condition where device does not have packets to transmit sometimes. We assume that a flow is not generated while the previous flow is in service and the number of packets in a flow is geometrically distributed. In this paper, we take into account the feature of non-saturation condition in standards: possibility of transmission performed without preceding backoff procedure for the first packet arriving at the idle station. Our approach is to model a stochastic behavior of one station as a discrete time Markov chain. We obtain four performance measures: normalized channel throughput, average packet HoL (head of line) delay, expected time to complete transmission of a flow and packet loss probability. Our results can be used for admission control to find the optimal number of stations with some constraints on these measures.

  17. Improving Energy Efficiency in Idle Listening of IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2016-01-01

    Full Text Available This paper aims to improve energy efficiency of IEEE 802.11 wireless local area networks (WLANs by effectively dealing with idle listening (IL, which is required for channel sensing and is unavoidable in a contention-based channel access mechanism. Firstly, we show that IL is a dominant source of energy drain in WLANs and it cannot be effectively alleviated by the power saving mechanism proposed in the IEEE 802.11 standard. To solve this problem, we propose an energy-efficient mechanism that combines three schemes in a systematic way: downclocking, frame aggregation, and contention window adjustment. The downclocking scheme lets a station remain in a semisleep state when overhearing frames destined to neighbor stations, whereby the station consumes the minimal energy without impairing channel access capability. As well as decreasing the channel access overhead, the frame aggregation scheme prolongs the period of semisleep time. Moreover, by controlling the size of contention window based on the number of stations, the proposed mechanism decreases unnecessary IL time due to collision and retransmission. By deriving an analysis model and performing extensive simulations, we confirm that the proposed mechanism significantly improves the energy efficiency and throughput, by up to 2.8 and 1.8 times, respectively, compared to the conventional power saving mechanisms.

  18. A note on bound constraints handling for the IEEE CEC'05 benchmark function suite.

    Science.gov (United States)

    Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas

    2014-01-01

    The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems.

  19. A high-linearity InGaP/GaAs HBT power amplifier for IEEE 802.11a/n

    International Nuclear Information System (INIS)

    Cui Jie; Chen Lei; Kang Chunlei; Shi Jia; Zhang Xuguang; Ai Baoli; Liu Yi

    2013-01-01

    A three-stage 4.8–6 GHz monolithic power amplifier (PA) compatible with IEEE 802.11a/n designed based on an advanced 2 μm InGaP/GaAs hetero-junction bipolar transistor (HBT) process is presented. The PA integrates input matching and closed-loop power control circuits on chip. Under 3.3 V DC bias, the amplifier achieves a ∼31 dB small signal gain, excellent wide band input and output matching among overall 1.2 GHz bandwidth, and up to 24.5 dBm linear output power below EVM 3% with IEEE 802.11a 64QAM OFDM input signal. (semiconductor integrated circuits)

  20. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 μm CMOS

    International Nuclear Information System (INIS)

    Wu Bin; Zhou Yumei; Zhu Yongxu; Zhang Zhengdong; Cai Jingjing

    2011-01-01

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 μm 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 x 2.6 mm 2 area and consumes 83 mW under typical work modes. (semiconductor integrated circuits)

  1. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 μm CMOS

    Science.gov (United States)

    Bin, Wu; Yumei, Zhou; Yongxu, Zhu; Zhengdong, Zhang; Jingjing, Cai

    2011-05-01

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 μm 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 × 2.6 mm2 area and consumes 83 mW under typical work modes.

  2. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 {mu}m CMOS

    Energy Technology Data Exchange (ETDEWEB)

    Wu Bin; Zhou Yumei; Zhu Yongxu; Zhang Zhengdong; Cai Jingjing, E-mail: wubin@ime.ac.cn [Institute of Microelectronics, Chinese Academy of Sciences, Beijing 100029 (China)

    2011-05-15

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 {mu}m 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 x 2.6 mm{sup 2} area and consumes 83 mW under typical work modes. (semiconductor integrated circuits)

  3. Analysis of Adaptive Control Scheme in IEEE 802.11 and IEEE 802.11e Wireless LANs

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Hui-Cheng

    In order to achieve the prioritized quality of service (QoS) guarantee, the IEEE 802.11e EDCAF (the enhanced distributed channel access function) provides the distinguished services by configuring the different QoS parameters to different access categories (ACs). An admission control scheme is needed to maximize the utilization of wireless channel. Most of papers study throughput improvement by solving the complicated multidimensional Markov-chain model. In this paper, we introduce a back-off model to study the transmission probability of the different arbitration interframe space number (AIFSN) and the minimum contention window size (CWmin). We propose an adaptive control scheme (ACS) to dynamically update AIFSN and CWmin based on the periodical monitoring of current channel status and QoS requirements to achieve the specific service differentiation at access points (AP). This paper provides an effective tuning mechanism for improving QoS in WLAN. Analytical and simulation results show that the proposed scheme outperforms the basic EDCAF in terms of throughput and service differentiation especially at high collision rate.

  4. Human exposure standards in the frequency range 1 Hz To 100 kHz: the case for adoption of the IEEE standard.

    Science.gov (United States)

    Patrick Reilly, J

    2014-10-01

    Differences between IEEE C95 Standards (C95.6-2002 and C95.1-2005) in the low-frequency (1 Hz-100 kHz) and the ICNIRP-2010 guidelines appear across the frequency spectrum. Factors accounting for lack of convergence include: differences between the IEEE standards and the ICNIRP guidelines with respect to biological induction models, stated objectives, data trail from experimentally derived thresholds through physical and biological principles, selection and justification of safety/reduction factors, use of probability models, compliance standards for the limbs as distinct from the whole body, defined population categories, strategies for central nervous system protection below 20 Hz, and correspondence of environmental electric field limits with contact currents. This paper discusses these factors and makes the case for adoption of the limits in the IEEE standards.

  5. Essays on the future in honor of Nick Metropolis

    CERN Document Server

    Rota, Gian-Carlo

    2000-01-01

    This collection represents a unique undertaking in scientific publishing to honor Nick Metropolis. Nick was the last survivor of the World War II Manhattan Project in Los Alamos, and was an important member of the Los Alamos national Laboratory until his death in October, 1999. In this volume, some of the leading scientists and humanists of our time have contributed essays related to their respective disciplines, exploring various aspects of future developments in science and society, philosophy, national security, nuclear power, pure and applied mathematics, physics and biology, particle physics, computing, and information science.

  6. Adaptive Radio Resource Allocation in Hierarchical QoS Scheduling for IEEE 802.16 Systems

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2007-01-01

    Future mobile communication systems such as IEEE 802.16 are expected to deliver a variety of multimedia services with diverse QoS requirements. To guarantee the QoS provision, appropriate scheduler architecture and scheduling algorithms have to be carefully designed. In this paper, we propose...

  7. IEEE 1394 CAMERA IMAGING SYSTEM FOR BROOKHAVENS BOOSTER APPLICATION FACILITY BEAM DIAGNOSTICS

    International Nuclear Information System (INIS)

    BROWN, K.A.; FRAK, B.; GASSNER, D.; HOFF, L.; OLSEN, R.H.; SATOGATA, T.; TEPIKIAN, S.

    2002-01-01

    Brookhaven's Booster Applications Facility (BAF) will deliver resonant extracted heavy ion beams from the AGS Booster to short-exposure fixed-target experiments located at the end of the BAF beam line. The facility is designed to deliver a wide range of heavy ion species over a range of intensities from 10 3 to over 10 8 ions/pulse, and over a range of energies from 0.1 to 3.0 GeV/nucleon. With these constraints we have designed instrumentation packages which can deliver the maximum amount of dynamic range at a reasonable cost. Through the use of high quality optics systems and neutral density light filters we will achieve 4 to 5 orders of magnitude in light collection. By using digital IEEE1394 camera systems we are able to eliminate the frame-grabber stage in processing and directly transfer data at maximum rates of 400 Mb/set. In this note we give a detailed description of the system design and discuss the parameters used to develop the system specifications. We will also discuss the IEEE1394 camera software interface and the high-level user interface

  8. Sea Lions and Honors Students: More in Common than You May Think

    Science.gov (United States)

    Lindemann-Biolsi, Kristy L.

    2014-01-01

    One can easily find a link between the general principles of learning in relation to both nonhuman and human animals. What may be a more difficult but equally important parallel is how these learning principles are applied to the training of animals and the teaching of honors students. The author considers what teachers can learn from observing…

  9. Highlighting the Transfer, Honors, and Excellence Workshop. CSCC Bulletin, Issue 7, 1983.

    Science.gov (United States)

    Center for the Study of Community Colleges, Los Angeles, CA.

    Summaries are provided for the major presentations given at a workshop on honors, transfer, and excellence, held in Los Angeles in October 1982. Following a brief overview of the main topics covered, highlights are presented from the talks of: (1) Robert McCabe, president of Miami-Dade Community College (MDCC), who urged participants to set high…

  10. IEEE standard for qualifying class IE equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1974-01-01

    The Institute of Electrical and Electrical Engineers, Inc. (IEEE) standards for electrical equipment (Class IE) for nuclear power generating stations are given. The standards are to provide guidance for demonstrating and documenting the adequacy of electric equipment used in all Class IE and interface systems. Representative in containment design basis event conditions for the principal reactor types are included in the appendixes for guidance in enviromental simulation

  11. Predictable and reliable ECG monitoring over IEEE 802.11 WLANs within a hospital.

    Science.gov (United States)

    Park, Juyoung; Kang, Kyungtae

    2014-09-01

    Telecardiology provides mobility for patients who require constant electrocardiogram (ECG) monitoring. However, its safety is dependent on the predictability and robustness of data delivery, which must overcome errors in the wireless channel through which the ECG data are transmitted. We report here a framework that can be used to gauge the applicability of IEEE 802.11 wireless local area network (WLAN) technology to ECG monitoring systems in terms of delay constraints and transmission reliability. For this purpose, a medical-grade WLAN architecture achieved predictable delay through the combination of a medium access control mechanism based on the point coordination function provided by IEEE 802.11 and an error control scheme based on Reed-Solomon coding and block interleaving. The size of the jitter buffer needed was determined by this architecture to avoid service dropout caused by buffer underrun, through analysis of variations in transmission delay. Finally, we assessed this architecture in terms of service latency and reliability by modeling the transmission of uncompressed two-lead electrocardiogram data from the MIT-BIH Arrhythmia Database and highlight the applicability of this wireless technology to telecardiology.

  12. Real-Time-Simulation of IEEE-5-Bus Network on OPAL-RT-OP4510 Simulator

    Science.gov (United States)

    Atul Bhandakkar, Anjali; Mathew, Lini, Dr.

    2018-03-01

    The Real-Time Simulator tools have high computing technologies, improved performance. They are widely used for design and improvement of electrical systems. The advancement of the software tools like MATLAB/SIMULINK with its Real-Time Workshop (RTW) and Real-Time Windows Target (RTWT), real-time simulators are used extensively in many engineering fields, such as industry, education, and research institutions. OPAL-RT-OP4510 is a Real-Time Simulator which is used in both industry and academia. In this paper, the real-time simulation of IEEE-5-Bus network is carried out by means of OPAL-RT-OP4510 with CRO and other hardware. The performance of the network is observed with the introduction of fault at various locations. The waveforms of voltage, current, active and reactive power are observed in the MATLAB simulation environment and on the CRO. Also, Load Flow Analysis (LFA) of IEEE-5-Bus network is computed using MATLAB/Simulink power-gui load flow tool.

  13. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    Science.gov (United States)

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  14. WIH-based IEEE 802.11 ECG monitoring implementation.

    Science.gov (United States)

    Moein, A; Pouladian, M

    2007-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. It offers new functionalities to physicians and will reduce the costs. Among these functionalities, biomedical signals can be sent to other devices (PDA, PC . . . ) or processing centers, without restricting the patients' mobility. This article discusses the WIH (Ward-In-Hand) structure and the software required for its implementation before an operational example is presented with its results. The aim of this project is the development and implementation of a reduced size electrocardiograph based on IEEE 802.11 with high speed and more accuracy, which allows wireless monitoring of patients, and the insertion of the information into the Wi-Fi hospital networks.

  15. Contributions to the 14th IEEE/NPSS Symposium on fusion engineering

    International Nuclear Information System (INIS)

    Navarro, A.P.; Almoguera, L.; Alonso Gozalo, J.; Alonso Candenas, J.; Blaumoser, M.

    1992-01-01

    Three communications about the TJ-II device, under construction at CIEMAT with preferential support from EURATOM, were presented to the 14th IEEE/NPSS Symposium on Fusion Engineering and are collected in this report. The first one describes in detail the device and its present status of design and construction. The remaining two deal with the two most critical components of the project: the vacuum vessel and the central hard conductor. (author) 16 fig. 16 ref

  16. [Mobile Health: IEEE Standard for Wearable Cuffless Blood Pressure Measuring Devices].

    Science.gov (United States)

    Zhou, Xia; Wu, Wenli; Bao, Shudi

    2015-07-01

    IEEE Std 1708-2014 breaks through the traditional standards of cuff based blood pressure measuring devices and establishes a normative definition of wearable cuffless blood pressure measuring devices and the objective performance evaluation of this kind of devices. This study firstly introduces the background of the new standard. Then, the standard details will be described, and the impact of cuffless blood pressure measuring devices with the new standard on manufacturers and end users will be addressed.

  17. For Distinguished Public Service: Medical Library Association Honors FNLM and NIH MedlinePlus Magazine | NIH ...

    Science.gov (United States)

    ... Medical Library Association Honors FNLM and NIH MedlinePlus Magazine Past Issues / Summer 2011 Table of Contents MLA ... From You We want your feedback on the magazine and ideas for future issues, as well as ...

  18. Encouraging Self-Reflection by Business Honors Students: Reflective Writing, Films, and Self-Assessments

    Science.gov (United States)

    Yoder, Stephen A.

    2017-01-01

    "The Moral Imagination," edited by Oliver F. Williams is a collection of essays written nearly twenty years ago on how honors educators might teach students to develop a sense of moral imagination through literature, art, and film. The book's subtitle--"How Literature and Films Can Stimulate Ethical Reflection in the Business…

  19. Da destinação dos honorários de sucumbência nas causas cíveis patrocinadas pelo Núcleo de Assistência Judiciária da UFV

    Directory of Open Access Journals (Sweden)

    Júlio Justo Peter

    2013-11-01

    Full Text Available O presente trabalho tem por objetivo investigar quem deve ser o destinatário dos honorários advocatícios de sucumbência nas causas cíveis patrocinadas pelo Núcleo de Assistência Judiciária (NAJ da Universidade Federal de Viçosa (UFV. Por meio dos métodos bibliográfico, dedutivo e indutivo, consistentes no exame da legislação nacional, da jurisprudência, da doutrina e de normas administrativas, analisou-se a natureza jurídica e a destinação dos honorários advocatícios inclusos na condenação, a legalidade do Regulamento nº 5/96 do Conselho Universitário (CONSU da UFV, que destina os honorários inclusos na condenação aos cofres da universidade, e se os professores inscritos na Ordem dos Advogados do Brasil (OAB que atuaram nessas causas estariam autorizados a perceber os honorários de sucumbência. A conclusão foi pela ilegalidade desse regulamento por não destinar os honorários de advogado inclusos na condenação nem ao advogado nem à parte vencedora, devendo, portanto, ser essa verba honorária destinada aos professores.

  20. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  1. Performance Analysis of IEEE 802.15.6 CSMA/CA Protocol for WBAN Medical Scenario through DTMC Model.

    Science.gov (United States)

    Kumar, Vivek; Gupta, Bharat

    2016-12-01

    The newly drafted IEEE 802.15.6 standard for Wireless Body Area Networks (WBAN) has been concentrating on a numerous medical and non-medical applications. Such short range wireless communication standard offers ultra-low power consumption with variable data rates from few Kbps to Mbps in, on or around the proximity of the human body. In this paper, the performance analysis of carrier sense multiple access with collision avoidance (CSMA/CA) scheme based on IEEE 802.15.6 standard in terms of throughput, reliability, clear channel assessment (CCA) failure probability, packet drop probability, and end-to-end delay has been presented. We have developed a discrete-time Markov chain (DTMC) to significantly evaluate the performances of IEEE 802.15.6 CSMA/CA under non-ideal channel condition having saturated traffic condition including node wait time and service time. We also visualize that, as soon as the payload length increases the CCA failure probability increases, which results in lower node's reliability. Also, we have calculated the end-to-end delay in order to prioritize the node wait time cause by backoff and retransmission. The user priority (UP) wise DTMC analysis has been performed to show the importance of the standard especially for medical scenario.

  2. IEEE Std 383-1974: IEEE standard for type test of Class IE electric cables, field splices, and connections for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard provides direction for establishing type tests which may be used in qualifying Class 1E electric cables, field splices, and other connections for service in nuclear power generating stations. General guidelines for qualifications are given in IEEE Std 323-1974, Standard for Qualifying Class IE Electric Equipment for Nuclear Power Generating Stations. Categories of cables covered are those used for power control and instrumentation services. Though intended primarily to pertain to cable for field installation, this guide may also be used for the qualification of internal wiring of manufactured devices. This guide does not cover cables for service within the reactor vessel

  3. 7th IEEE International Conference Intelligent Systems

    CERN Document Server

    Atanassov, KT; Doukovska, L; Hadjiski, M; Jotsov, V; Kacprzyk, J; Kasabov, N; Sotirov, S; Szmidt, E; Zadrożny, S; Filev, D; Jabłkowski, J; Kacprzyk, J; Krawczak, M; Popchev, I; Rutkowski, L; Sgurev, V; Sotirova, E; Szynkarczyk, P

    2015-01-01

    This two volume set of books constitutes the proceedings of the 2014  7th IEEE International Conference Intelligent Systems (IS), or IEEE IS’2014 for short, held on September 24‐26, 2014 in Warsaw, Poland. Moreover, it contains some selected papers from the collocated IWIFSGN'2014-Thirteenth International Workshop on Intuitionistic Fuzzy Sets and Generalized Nets.The conference was organized by the Systems Research Institute, Polish Academy of Sciences, Department IV of Engineering Sciences, Polish Academy of Sciences, and Industrial Institute of Automation and Measurements - PIAP.The papers included in the two proceedings volumes have been subject to a thorough review process by three highly qualified peer reviewers.Comments and suggestions from them have considerable helped improve the quality of the papers but also the division of the volumes into parts, and assignment of the papers to the best suited parts.  

  4. 2012 Special NSREC Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    Science.gov (United States)

    Schwank, Jim; Brown, Dennis; Girard, Sylvain; Gouker, Pascale; Gerardin, Simone; Quinn, Heather; Barnaby, Hugh

    2012-12-01

    The December 2012 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 49th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held July 16-20, 2012, in Miami, Florida USA. 95 papers presented at the 2012 NSREC were submitted for consideration for this year’s special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas. The peer review process for a typical technical journal generally takes six months to one year to complete. To publish this special issue of the IEEE Transactions on Nuclear Science (in December), the review process, from initial submission to final form, must be completed in about 10 weeks. Because of the short schedule, both the authors and reviewers are required to respond very quickly. The reviewers listed on the following pages contributed vitally to this quick-turn review process.We would like to express our sincere appreciation to each of them for accepting this difficult, but critical role in the process. To provide consistent reviews of papers throughout the year, the IEEE Transactions on Nuclear Science relies on a year-round editorial board that manages reviews for submissions throughout the year to the TRANSACTIONS in the area of radiation effects. The review process is managed by a Senior

  5. Puelles romero, Luis: Honoré Daumier: la risa republicana

    Directory of Open Access Journals (Sweden)

    Óscar Ortega Ruiz

    2015-01-01

    Full Text Available Recientemente, Abada Editores ha puesto a disposición de sus lectores el nuevo ensayo de Luis Puelles Romero, titular de Estética y Teoría de las Artes de la Universidad de Málaga. Honoré Daumier: la risa republicana se interna en la vida y la obra de este marsellés nacido en 1808 y muerto en París en 1879, cuyo trabajo se desarrolló durante cincuenta años decisivos de la historia de Francia, desde el final del periodo legitimista hasta los inicios de la III República.

  6. Rate Adaptation Based on Collision Probability for IEEE 802.11 WLANs

    Science.gov (United States)

    Kim, Taejoon; Lim, Jong-Tae

    Nowadays IEEE 802.11 wireless local area networks (WLANs) support multiple transmission rates. To achieve the best performance, transmitting stations adopt the various forms of automatic rate fallback (ARF). However, ARF suffers from severe performance degradation as the number of transmitting stations increases. In this paper, we propose a new rate adaptation scheme which adjusts the ARF's up/down threshold according to the channel contention level. Simulation result shows that the proposed scheme achieves fairly good performance compared with the existing schemes.

  7. Comparison and Analysis of IEEE 344 and IEC 60980 standards for harmonization of seismic qualification of safety-related equipment

    International Nuclear Information System (INIS)

    Lee, Young Ok; Kim, Jong Seog; Seo, Jeong Ho; Kim, Myung Jun

    2011-01-01

    The seismic qualification of safety related equipment in nuclear power plants should demonstrate an equipment's ability to perform its safety function during/or after the time it is subjected to the forces resulting from one SSE. In addition, the equipment must withstand the effects of a number of OBEs, preceding the SSE. IEEE 344 and IEC 60980 present the criteria for establishing procedures demonstrating that the Class 1E equipment can meet its performance requirement during seismic events. Currently, IEEE 344 is used for regulation of nuclear power plant in the United State whereas IEC 60980 is mainly used in Europe. In particular, NPPs of France and China apply with RCC-E and GB that are domestic standards, respectively. Equipment supplier and Utility have difficulties because of different applicable standards. Equipment supplier to export S/R components/equipment to other standard area performs additional seismic qualification. For example, equipment are qualifies according to IEC 60980, RCC-E, GB although they have been qualified in accordance with IEEE 344. Also, utility to attempt power up-rate, life extension of NPP constructed under rules of RCC-E such as Ulchin NPP 1 and 2 has similar difficulties. RCC-E endorses IEC 60980 and GB is almost same as IEC 60980 except minor difference of earthquake environment definition. Therefore this paper surveys the similarities and differences between IEEE 344 and IEC 60980. In addition, this paper considers how the two sets of standards may be used in a complementary fashion to be possible using one or the other standard area

  8. De la difusión cultural de la virtud caballeresca a la defensa del honor

    Directory of Open Access Journals (Sweden)

    Remedios Morán Martín

    2000-01-01

    Full Text Available A medida que la nobleza va perdiendo su carácter guerrero (bellatores, empieza a elaborar un concepto de virtud y de honor cercano a las nuevas corrientes humanistas que se difunden en la Península, lo que conlleva unas nuevas formas de defensa del honor como práctica social, que desembocarán en la tipificación del duelo como delito.As the same time as Nobility is on the way to lose its warlike attitude (bellatores, it begins to elabórate a new concept of virtue and honour cióse to the new humanistic tendencies spread in the Iberian Península, what implles new ways to defend the honour as a social practico, which wlll lead to the typification of the duel as an offense.

  9. Psychocultural Mechanisms of the Propensity toward Criminal Homicide: A Multidimensional View of the Culture of Honor

    Directory of Open Access Journals (Sweden)

    Monica G. T. C. Souza

    2017-11-01

    Full Text Available Introduction: Theory of the Culture of Honor is one of the few models in criminology specifically geared toward homicide. It proposes that, in certain societies, men must never show weakness and are required to react violently to any perceived threats to their reputation, thereby increasing their probability of committing a homicide. This has been suggested as the main explanation for the high rates of this type of crime in Brazil, particularly in the Northeast. Underlying this explanation there are complex mechanisms and processes that have yet to be clarified.Objectives: The present research aimed to investigate the workings of the possible psychocultural mechanisms underlying the culture of honor and the process through which they might affect the individual propensity toward homicide.Methods: A total of 336 Brazilian adults were assessed regarding a broad range of sociodemographic, psychological, and sociocultural variables, including their attitudes toward homicide. The resulting dataset was analyzed using Smallest Space Analysis and Facet Theory.Results: It seems that certain cultural elements associated to traditional masculinity and enhanced anger tend to promote negative personality traits and increase one’s propensity toward committing homicide.Conclusion: The findings obtained not only confirm the Theory of the Culture of Honor for the propensity toward homicide, but also explicit and clarify some of the psychocultural processes and mechanisms involved, suggesting a new scientific framework.

  10. Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Ikram Syed

    2016-01-01

    Full Text Available The performance improvement in IEEE 802.11 WLANs in widely fluctuating network loads is a challenging task. To improve the performance in this saturated state, we develop an adaptive backoff algorithm that maximizes the system throughput, reduces the collision probability, and maintains a high fairness for the IEEE 802.11 DCF under dense network conditions. In this paper, we present two main advantages of the proposed ABA-CW algorithm. First, it estimates the number of active stations and then calculates an optimal contention window based on the active station number. Each station calculates the channel state probabilities by observing the channel for the total backoff period. Based on these channel states probabilities, each station can estimate the number of active stations in the network, after which it calculates the optimal CW utilizing the estimated active number of stations. To evaluate the proposed mechanism, we derive an analytical model to determine the network performance. From our results, the proposed ABA-CW mechanism achieved better system performance compared to fixed-CW (BEB, EIED, LILD, and SETL and adaptive-CW (AMOCW, Idle Sense mechanisms. The simulation results confirmed the outstanding performance of the proposed mechanism in that it led to a lower collision probability, higher throughput, and high fairness.

  11. Cross-Layer Measurement on an IEEE 802.11g Wireless Network Supporting MPEG-2 Video Streaming Applications in the Presence of Interference

    Directory of Open Access Journals (Sweden)

    Alessandro Sona

    2010-01-01

    Full Text Available The performance of wireless local area networks supporting video streaming applications, based on MPEG-2 video codec, in the presence of interference is here dealt with. IEEE 802.11g standard wireless networks, that do not support QoS in according with IEEE 802.11e standard, are, in particular, accounted for and Bluetooth signals, additive white Gaussian noise, and competitive data traffic are considered as sources of interference. The goal is twofold: from one side, experimentally assessing and correlating the values that some performance metrics assume at the same time at different layers of an IEEE 802.11g WLAN delivering video streaming in the presence of in-channel interference; from the other side, deducing helpful and practical hints for designers and technicians, in order to efficiently assess and enhance the performance of an IEEE 802.11g WLAN supporting video streaming in some suitable setup conditions and in the presence of interference. To this purpose, an experimental analysis is planned following a cross-layer measurement approach, and a proper testbed within a semianechoic chamber is used. Valuable results are obtained in terms of signal-to-interference ratio, packet loss ratio, jitter, video quality, and interference data rate; helpful hints for designers and technicians are finally gained.

  12. A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    Seyed Davoud Mousavi

    2018-05-01

    Full Text Available Cooperative communication techniques have recently enabled wireless technologies to overcome their challenges. The main objective of these techniques is to improve resource allocation. In this paper, we propose a new protocol in medium access control (MAC of the IEEE 802.11 standard. In our new protocol, which is called Fair Cooperative MAC (FC-MAC, every relay node participates in cooperation proportionally to its provided cooperation gain. This technique improves network resource allocation by exploiting the potential capacity of all relay candidates. Simulation results demonstrate that the FC-MAC protocol presents better performance in terms of throughput, fairness, and network lifetime.

  13. Imagination and the Humanities in Honors across the Disciplines at a Jesuit University

    Science.gov (United States)

    Kraus, Joe

    2015-01-01

    Not every student has done honors work in the humanities, but all students experience research at a human level that necessarily recalls the work of the humanities. This article describes how Joe Kraus, a professor of literature at the University of Scranton, was inspired to see applied humanities in stories of human experiences, which helped him…

  14. An Asynchronous IEEE Floating-Point Arithmetic Unit

    Directory of Open Access Journals (Sweden)

    Joel R. Noche

    2007-12-01

    Full Text Available An asynchronous floating-point arithmetic unit is designed and tested at the transistor level usingCadence software. It uses CMOS (complementary metal oxide semiconductor and DCVS (differentialcascode voltage switch logic in a 0.35 µm process using a 3.3 V supply voltage, with dual-rail data andsingle-rail control signals using four-phase handshaking.Using 17,085 transistors, the unit handles single-precision (32-bit addition/subtraction, multiplication,division, and remainder using the IEEE 754-1985 Standard for Binary Floating-Point Arithmetic, withrounding and other operations to be handled by separate hardware or software. Division and remainderare done using a restoring subtractive algorithm; multiplication uses an additive algorithm. Exceptionsare noted by flags (and not trap handlers and the output is in single-precision.Previous work on asynchronous floating-point arithmetic units have mostly focused on single operationssuch as division. This is the first work to the authors' knowledge that can perform floating-point addition,multiplication, division, and remainder using a common datapath.

  15. The culture of honor as the best explanation for the high rates of criminal homicide in Pernambuco: A comparative study with 160 convicts and non-convicts

    Directory of Open Access Journals (Sweden)

    Monica Gomes Teixeira Campello de Souza

    2016-01-01

    Full Text Available The present work aimed to investigate the propensity towards criminal homicide using a broad approach, encompassing theories based on socioeconomic frustration, decision-making processes, emotional attachment, testosterone, moral development, moral values, and the culture of honor. A total of 160 adult Brazilian men completed a questionnaire, various psychological tests, and right-hand digit ratio measurements. The findings discarded all theories tested, except the culture of honor. It is concluded that, in the region, public policies for the reduction of the rate of homicides must be specific to that crime and address cultural issues regarding honor and moral satisfaction.

  16. Performance characterization of the IEEE 802.11 signal transmission over a multimode fiber PON

    Science.gov (United States)

    Maksymiuk, L.; Siuzdak, J.

    2014-11-01

    In this paper there are presented measurements concerning performance analysis of the IEEE 802.11 signal distribution over multimode fiber based passive optical network. In the paper there are addressed three main sources of impairments: modal noise, frequency response fluctuation of the multimode fiber and non-linear distortion of the signal in the receiver.

  17. Multitemporal Very High Resolution From Space: Outcome of the 2016 IEEE GRSS Data Fusion Contest

    NARCIS (Netherlands)

    Mou, L.; Zhu, X.; Vakalopoulou, M.; Karantzalos, K.; Paragios, N.; Saux, Le B.; Moser, G.; Tuia, D.

    2017-01-01

    In this paper, the scientific outcomes of the 2016 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society are discussed. The 2016 Contest was an open topic competition based on a multitemporal and multimodal dataset,

  18. Dynamic Contention Window Control Scheme in IEEE 802.11e EDCA-Based Wireless LANs

    Science.gov (United States)

    Abeysekera, B. A. Hirantha Sithira; Matsuda, Takahiro; Takine, Tetsuya

    In the IEEE 802.11 MAC protocol, access points (APs) are given the same priority as wireless terminals in terms of acquiring the wireless link, even though they aggregate several downlink flows. This feature leads to a serious throughput degradation of downlink flows, compared with uplink flows. In this paper, we propose a dynamic contention window control scheme for the IEEE 802.11e EDCA-based wireless LANs, in order to achieve fairness between uplink and downlink TCP flows while guaranteeing QoS requirements for real-time traffic. The proposed scheme first determines the minimum contention window size in the best-effort access category at APs, based on the number of TCP flows. It then determines the minimum and maximum contention window sizes in higher priority access categories, such as voice and video, so as to guarantee QoS requirements for these real-time traffic. Note that the proposed scheme does not require any modification to the MAC protocol at wireless terminals. Through simulation experiments, we show the effectiveness of the proposed scheme.

  19. Performance modeling of a two-tier primary-secondary network with IEEE 802.11 broadcast scheme

    KAUST Repository

    Khabazian, Mehdi

    2011-03-01

    In this paper, we study the performance of a two-tier primary-secondary network based on IEEE 802.11 broadcast scheme. We assume that a number of primary and secondary users coexist in the radio environment and share a single band. To protect the primary users\\' priority, the secondary users are allowed to contend for the channel only if they sense it idle for a certain sensing time. Considering an exponential packet inter-arrival time for the primary network, we model each primary user as an independent M/G/1 queue. Subsequently, we determine the primary users\\' average medium access delay in the presence of secondary users as well as the hybrid network\\'s throughput. Numerical results and discussions show the effects of parameters pertaining to the secondary users, such as as sensing time, packet payload size and population size, on the performance of the primary network. Furthermore, we provide simulation results which confirm the accuracy of the proposed analysis. © 2011 IEEE.

  20. Performance modeling of a two-tier primary-secondary network with IEEE 802.11 broadcast scheme

    KAUST Repository

    Khabazian, Mehdi; Aissa, Sonia; El Kefi, Rania

    2011-01-01

    In this paper, we study the performance of a two-tier primary-secondary network based on IEEE 802.11 broadcast scheme. We assume that a number of primary and secondary users coexist in the radio environment and share a single band. To protect the primary users' priority, the secondary users are allowed to contend for the channel only if they sense it idle for a certain sensing time. Considering an exponential packet inter-arrival time for the primary network, we model each primary user as an independent M/G/1 queue. Subsequently, we determine the primary users' average medium access delay in the presence of secondary users as well as the hybrid network's throughput. Numerical results and discussions show the effects of parameters pertaining to the secondary users, such as as sensing time, packet payload size and population size, on the performance of the primary network. Furthermore, we provide simulation results which confirm the accuracy of the proposed analysis. © 2011 IEEE.

  1. Performance Analysis of IEEE 802.11g TCM Waveforms Transmitted over a Channel with Pulse-Noise Interference

    National Research Council Canada - National Science Library

    Drivas, Athanasios

    2007-01-01

    .... The application of TCM combines FEC coding and M-ary modulation in one operation. The objective of this thesis is to investigate the performance of an orthogonal frequency-division multiplexing (OFDM) based IEEE...

  2. Honoring and Building on the Rich Literacy Practices of Young Bilingual and Multilingual Learners

    Science.gov (United States)

    Souto-Manning, Mariana

    2016-01-01

    In this article, the author invites teachers of children who are bilingual, multilingual, and at promise for bi-/multilingualism to honor and build on their rich literacy practices. To do so, she challenges ideas and labels that continuously disempower bilingual and multilingual learners. Souto-Manning establishes the understanding that education…

  3. Playing with Light: Adventures in Optics and Spectroscopy for Honors and Majors General Chemistry

    Science.gov (United States)

    van Staveren, Marie N.; Edwards, Kimberly D.; Apkarian, V. A.

    2012-01-01

    A lab was developed for use in an undergraduate honors and majors general chemistry laboratory to introduce students to optics, spectroscopy, and the underlying principles of quantum mechanics. This lab includes four mini-experiments exploring total internal reflection, the tunneling of light, spectra of sparklers and colored candles, and emission…

  4. Honoring the Past, Changing the Future: Bringing Native American Voices into Dance Theory Courses

    Science.gov (United States)

    Prichard, Robin

    2016-01-01

    The inclusion of Native American perspectives adds an important voice in honoring the multiplicities of histories and cultures inherent in American society. And yet, teachers run the risk of committing unknown offenses if they are not familiar with the potential pitfalls that longstanding asymmetrical power relations between cultures can produce.…

  5. Mathematical Analysis of EDCA's Performance on the Control Channel of an IEEE 802.11p WAVE Vehicular Network

    Directory of Open Access Journals (Sweden)

    Hussein T. Mouftah

    2010-01-01

    Full Text Available Wireless networks for vehicular environments are gaining increasing importance due to their ability to provide a means for stations on the roadside and radio units on board of vehicles to communicate and share safety-related information, thus reducing the probability of accidents and increasing the efficiency of the transportation system. With this goal in mind, the IEEE is currently developing the Wireless Access in Vehicular Environments (WAVE IEEE 802.11p standard. WAVE devices use the IEEE 802.11's Enhanced Distributed Channel Access (EDCA MAC protocol to compete for the transmission medium. This work proposes an analytical tool to evaluate the performance of EDCA under the specific conditions of the so-called control channel (CCH of a WAVE environment, including the particular EDCA parameter values and the fact that all safety-critical data frames are broadcasted. The protocol is modeled using Markov chains and results related to throughput, frame-error rate, buffer occupancy and delay are obtained under different traffic-load conditions. The main analysis is performed assuming that the CCH works continuously, and then an explanation is given as to the considerations that are needed to account for the fact that activity on the CCH is intermittent.

  6. IEEE 845 - a proposed guideline for use of human factors in design and retrofit design of nuclear power plants

    International Nuclear Information System (INIS)

    Schurman, D.L.

    1987-01-01

    This paper describes the development and content of the Institute of Electrical and Electronics Engineers (IEEE) Standard 845. This guide was developed by Working Group 7.2 of Subcommittee 7 of the Nuclear Power Engineering Committee of the Power Engineering Society of the IEEE. The guide has been approved by the Nuclear Power Engineering Committee (NPEC) and is now in the standards development and approval process. The guide is the first standards action approved by the NPEC of IEEE and is presented here to obtain wider peer response to its content. The guide provides a systematic framework for selection of human factors techniques and for the use of those techniques. The guide also provides a list of commonly used human factors techniques, along with a commentary about cost, ease of use, and other characteristics of each of the techniques. The guide is written with the project engineer and design engineer in mind. Thus, the guide attempts to provide a basis for the systematic selection of human factors techniques for various purposes and guidance regarding which of these techniques is likely to require the assistance of a human factors expert to apply

  7. Pudor, honor, and autoridad: the evolving patient-physician relationship in Spain.

    Science.gov (United States)

    Epstein, R M; Borrell i Carrió, F

    2001-10-01

    The expression of emotion and the sharing of information are determined by cultural factors, consultation time, and the structure of the health care system. Two emblematic situations in Spain - the expression of aggression in the patient-physician encounter, and the withholding of diagnostic information from the patient - have not been well-described in their sociocultural context. To explore these, the authors observed and participated in clinical practice and teaching in several settings throughout Spain and analyzed field notes using qualitative methods. In this paper, we explore three central constructs - modesty (pudor), dignity (honor), and authority (autoridad) - and their expressions in patient-physician encounters. We define two types of emotions in clinical settings - public, extroverted expressions of anger and exuberance; and private, deeply held feelings of fear and grief that tend to be expressed through the arts and religion. Premature reassurance and withholding of information are interpreted as attempts to reconstruct the honor and pudor of the patient. Physician authority and perceived loyalty to the government-run health care system generate conflict and aggression in the patient-physician relationship. These clinical behaviors are contextualized within cultural definitions of effective communication, an ideal patient-physician relationship, the role of the family, and ethical behavior. Despite agreement on the goals of medicine, the behavioral manifestations of empathy and caring in Spain contrast substantially with northern European and North American cultures.

  8. A course for developing interprofessional skills in pre-professional honor students using humanities and media.

    Science.gov (United States)

    Poirier, Therese I; Stamper-Carr, Connie; Newman, Kate

    2017-09-01

    To design and implement an undergraduate honors course for pre-health professional students that develops interpersonal skills through use of a variety of humanities. A three credit hour course in an honors seminar sequence was developed by pharmacy practice faculty and with input from faculty in mass communications, philosophy, applied communication studies and history. The course utilized a variety of media such as literature, film, and podcasts to foster student discussion about a variety of health-related topics. Topics included public health, stigmatization, portrayals of health care providers, patient experiences, health care ethics, aging, and death and dying. Students were assessed using pre-class assignments and reflective writings as well as a formal written and oral presentation on a selected health-related book. A quasi-experimental design was used to assess the impact of the course on desired course outcomes. The first course offering was to 22 undergraduate pre-health professional honors students. Pre- and post-course surveys on students' perceptions and students' reflective writings revealed achievement of desired course outcomes. Post-course evaluations also revealed positive perceptions about the course. The design of this course provided an outlet for students to read and enjoy various forms of media, while also meeting its goal of exposing students to a variety of humanities. The course allowed students to think critically about various health care issues, and to begin to develop interpersonal skills. The course could be adapted for pharmacy by developing affective domains of the Accreditation Council for Pharmacy Education (ACPE) Standards. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. IEEE Conference Record of 1980 Fourteenth Pulse Power Modulator Symposium, 3-5 June 1980.

    Science.gov (United States)

    1980-01-01

    Capacitor Discharges, Proc IEEE 113, p. able operation on Nova we are examing alter- 1549 (1966). nate switch gas (Ar:N 2 :SF 6 ) and electrode material...VOLTTA-KILOVOLTS PLATE VO LTAM --LOVLTS Figure 8. Constant Current Curve for the X2097U Figure 11. Constant Current Curve for the X2097V at 2000 Volt

  10. Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M...... reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably...

  11. Development and results of a test program to demonstrate compliance with IEEE STD 384 and R.G. 1.75 electrical separation requirements

    International Nuclear Information System (INIS)

    Eckert, G.P.; Heneberry, E.F.; Walker, F.P.; Konkus, J.F.

    1987-01-01

    The IEEE Std 384-1974, entitled ''Criteria for Separation of Class 1E Equipment and Circuits,'' contains criteria to ensure the independence of redundant Class 1E equipment when designing electrical systems in nuclear plants. The NRC, in R.G. 1.75 Rev. 2, 1978, endorses, with comments, IEEE-384, as the means of achieving independence. One method given in IEEE-384, is that of maintaining a specified separation between components; another method utilizes a combination of separation and barriers. The standard also allows alternative methods to be used when justified by test-based analyses. This paper is a report of a test program undertaken to provide a basis for analysis in the development of alternative methods of achieving separation. The test parameters developed and used, and the results obtained, should prove useful in determining alternative methods of complying with R.G. 1.75 requirements

  12. Statement of Honorable Donald C. Winter Secretary of the Navy Before the House Armed Services Committee

    National Research Council Canada - National Science Library

    Winter, Donald C

    2007-01-01

    Mr. Chairman, Mr. Ranking Member, and Members of the Committee, it is an honor to appear before you representing the brave men and women of the United States Navy and the United States Marine Corps active, reserve...

  13. Impacto de mecanismos de seguridad en sensores IEEE 802.15.4

    OpenAIRE

    Tripp Barba, Carolina; Casademont Serra, Jordi

    2009-01-01

    En la actualidad son muchos los mecanismos de seguridad que el estándar IEEE 802.15.4 permite a las redes inalámbricas de sensores [1] Dicho estándar define las especificaciones de la Capa de Acceso al Medio y la Capa Física de los dispositivos inalámbricos de área personal. La última revisión corresponde al 2006. Dichas revisiones y actualizaciones son hechas por el grupo de trabajo 802.15. Sin embargo estos mecanismos consumen recursos como memoria y batería, que son...

  14. Impact of cell load on 5GHz IEEE 802.11 WLAN

    OpenAIRE

    Abu-Tair, Mamoun; Bhatti, Saleem Noel

    2017-01-01

    We have conducted an empirical study of the latest 5GHz IEEE 802.11 wireless LAN (WLAN) variants of 802.11n (5GHz) and 802.11ac (Wave 1), under different cell load conditions. We have considered typical configurations of both protocols on a Linux testbed. Under light load,there is no clear difference between 802.11n and 802.11ac in terms of performance and energy consumption. However, in some cases of high cell load, we have found that there may be a small advantage with 802.11ac. Overall, we...

  15. The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms

    Directory of Open Access Journals (Sweden)

    Trong-Minh Hoang

    2017-01-01

    Full Text Available Security of any wireless network is always an important issue due to its serious impacts on network performance. Practically, the IEEE 802.11 medium access control can be violated by several native or smart attacks that result in downgrading network performance. In recent years, there are several studies using analytical model to analyze medium access control (MAC layer misbehavior issue to explore this problem but they have focused on binary exponential backoff only. Moreover, a practical condition such as the freezing backoff issue is not included in the previous models. Hence, this paper presents a novel analytical model of the IEEE 802.11 MAC to thoroughly understand impacts of misbehaving node on network throughput and delay parameters. Particularly, the model can express detailed backoff algorithms so that the evaluation of the network performance under some typical attacks through numerical simulation results would be easy.

  16. A pseudo differential Gm—C complex filter with frequency tuning for IEEE802.15.4 applications

    Science.gov (United States)

    Xin, Cheng; Lungui, Zhong; Haigang, Yang; Fei, Liu; Tongqiang, Gao

    2011-07-01

    This paper presents a CMOS Gm—C complex filter for a low-IF receiver of the IEEE 802.15.4 standard. A pseudo differential OTA with reconfigurable common mode feedback and common mode feed-forward is proposed as well as the frequency tuning method based on a relaxation oscillator. A detailed analysis of non-ideality of the OTA and the frequency tuning method is elaborated. The analysis and measurement results have shown that the center frequency of the complex filter could be tuned accurately. The chip was fabricated in a standard 0.35 μm CMOS process, with a single 3.3 V power supply. The filter consumes 2.1mA current, has a measured in-band group delay ripple of less than 0.16 μs and an IRR larger than 28 dB at 2 MHz apart, which could meet the requirements oftheIEEE802.15.4 standard.

  17. Preparing Students for Global Citizenship: The Effects of a Dutch Undergraduate Honors Course

    Directory of Open Access Journals (Sweden)

    Ingrid W. Schutte

    2017-01-01

    Full Text Available Using a mixed method approach, this case study investigates effects on the participating students (N=25 of an undergraduate honors course in the Netherlands, aimed at global justice citizenship. Knowledge about effects of global citizenship courses is still limited. The Ethical Sensitivity Scale Questionnaire and the Global Citizenship Scale were used in a pre- and posttest design to measure possible development in the moral and civic domain among the participants of the course. In the qualitative part, deductive content analyses of students’ work and students’ written reflection on the course, utilizing the theory-based curriculum guidelines Global Justice Citizenship Education, were performed. In addition, a follow-up blog and interview were analyzed to learn students’ perception on the effects of the course after half a year. Quantitative results show increased ethical sensitivity as well as global civic engagement and global competence among the participants. Qualitative results point in the same direction and provide deeper insights in the content of students’ learning and the perceived impact of the course on their attitudes and behavior. Results are discussed in relation to theory on justice-oriented global citizenship and honors pedagogies.

  18. Oldest Packet Drop (OPD): a Buffering Mechanism for Beaconing in IEEE 802.11p VANETs

    NARCIS (Netherlands)

    van Eenennaam, Martijn; Hendriks, Luuk; Karagiannis, Georgios; Heijenk, Geert

    2011-01-01

    The IEEE 802.11p MAC technology can be used to provide connectivity for real-time vehicle control known as Cooperative Adaptive Cruise Control. Due to the real-time nature of this system, it is paramount the delay of the received information is as small as possible. This paper researches the Oldest

  19. Interference Measurements in IEEE 802.11 Communication Links Due to Different Types of Interference Sources

    NARCIS (Netherlands)

    van Bloem, J.W.H.; Schiphorst, Roelof; Kluwer, Taco; Slump, Cornelis H.

    2012-01-01

    The number of wireless devices (smartphones, laptops, sensors) that use the 2.4 GHz ISM band is rapidly increasing. The most common communication system in this band is Wi-Fi (IEEE 802.11b/g/n). For that reason coexistence between Wi-Fi and other systems becomes more and more important. In this

  20. Throughput analysis of the IEEE 802.4 token bus standard under heavy load

    Science.gov (United States)

    Pang, Joseph; Tobagi, Fouad

    1987-01-01

    It has become clear in the last few years that there is a trend towards integrated digital services. Parallel to the development of public Integrated Services Digital Network (ISDN) is service integration in the local area (e.g., a campus, a building, an aircraft). The types of services to be integrated depend very much on the specific local environment. However, applications tend to generate data traffic belonging to one of two classes. According to IEEE 802.4 terminology, the first major class of traffic is termed synchronous, such as packetized voice and data generated from other applications with real-time constraints, and the second class is called asynchronous which includes most computer data traffic such as file transfer or facsimile. The IEEE 802.4 token bus protocol which was designed to support both synchronous and asynchronous traffic is examined. The protocol is basically a timer-controlled token bus access scheme. By a suitable choice of the design parameters, it can be shown that access delay is bounded for synchronous traffic. As well, the bandwidth allocated to asynchronous traffic can be controlled. A throughput analysis of the protocol under heavy load with constant channel occupation of synchronous traffic and constant token-passing times is presented.

  1. Too Smart to Fail: Perceptions of Asian American Students' Experiences in a Collegiate Honors Program

    Science.gov (United States)

    Henfield, Malik S.; Woo, Hongryun; Lin, Yi-Chun; Rausch, Meredith A.

    2014-01-01

    There is a considerable history of misunderstandings associated with Asian American in education. Although many educators and scholars have begun to pay more attention to unique issues associated with this population, studies exploring these students' experiences as honors students in collegiate contexts are scant in the educational literature.…

  2. A pseudo differential Gm-C complex filter with frequency tuning for IEEE802.15.4 applications

    International Nuclear Information System (INIS)

    Cheng Xin; Yang Haigang; Liu Fei; Gao Tongqiang; Zhong Lungui

    2011-01-01

    This paper presents a CMOS G m -C complex filter for a low-IF receiver of the IEEE 802.15.4 standard. A pseudo differential OTA with reconfigurable common mode feedback and common mode feed-forward is proposed as well as the frequency tuning method based on a relaxation oscillator. A detailed analysis of non-ideality of the OTA and the frequency tuning method is elaborated. The analysis and measurement results have shown that the center frequency of the complex filter could be tuned accurately. The chip was fabricated in a standard 0.35 μm CMOS process, with a single 3.3 V power supply. The filter consumes 2.1mA current, has a measured in-band group delay ripple of less than 0.16 μs and an IRR larger than 28 dB at 2 MHz apart, which could meet the requirements oftheIEEE802.15.4 standard. (semiconductor integrated circuits)

  3. Evaluasi Kinerja IEEE 802.11e HCCA untuk Dukungan QoS pada WLAN Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Amry Daulat Gultom

    2014-06-01

    Full Text Available Wireless Local Area Network (WLAN digunakan oleh trafik multimedia yang seharusnya memerlukan persyaratan jaringan yang lebih baik terhadap delay, jitter dan packet losses. IEEE 802.11 Task Group E memperkenalkan perbaikan protokol MAC 802.11, yaitu Hybrid Coordination Function (HCF, yang terdiri dari dua mekanisme akses: Enhanced Distributed Channel Access (EDCA dan HCF Controlled Channel Access (HCCA yang memberikan dukungan Kualitas Layanan/Quality of Service (QoS bagi trafik multimedia. Tujuan dari penelitian ini adalah untuk memahami algoritma protokol MAC IEEE 802.11e HCCA pada jaringan WLAN, dan menganalisis kinerja protokol MAC 802.11e HCCA pada aplikasi multimedia dengan menggunakan metode simulasi pada NS-2. Metrik kinerja yang diukur adalah jitter dan throughput-nya. Hasil penelitian ini menunjukkan bahwa protokol MAC HCCA dapat memberikan jaminan QoS dibanding protokol MAC DCF, dimana jitter HCCA lebih stabil dari pada jitter DCF. Begitupula dengan throughput HCCA yang tidak berubah selama trafik berlangsung, tidak seperti pada DCF yang masih mengalami fluktuasi yang besar.

  4. Performance analysis of the IEEE 802.16e power management for the initiations of awakening

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    To increase battery life in IEEE 802.16e systems, it is essential to efficiently manage energy in mobile stations. The sleep-mode operation in power management helps to increase the life of a station by saving energy consumption. In power management, there are two important performance metrics: energy consumption and the response delay of awakening medium access control (MAC) service data unit (SDU). While in a base station (BS) initiation of awakening, the two performance metrics should be simultaneously considered, in a mobile subscriber station (MSS) initiation of awakening, the response delay is not considered because it is self-operational. There performance metrics are affected by the minimum sleep interval (Tmin), the maximum sleep interval (Tmax), and the average interarrival time of awakening MAC SDUs (TI) during sleep-mode operation. Therefore, it is imperative to evaluate the two initiations of awakening depending on TI. To reach a fuller understanding of the performance, this paper shows an analytical mode and simulations results for the standard sleep-mode operation in the IEEE 802.16e MAC.

  5. Group-Orthogonal Code-Division Multiplex: A Physical-Layer Enhancement for IEEE 802.11n Networks

    Directory of Open Access Journals (Sweden)

    Felip Riera-Palou

    2010-01-01

    Full Text Available The new standard for wireless local area networks (WLANs, named IEEE 802.11n, has been recently released. This new norm builds upon and remains compatible with the previous WLANs standards IEEE 802.11a/g while it is able to achieve transmission rates of up to 600 Mbps. These increased data rates are mainly a consequence of two important new features: (1 multiple antenna technology at transmission and reception, and (2 optional doubling of the system bandwidth thanks to the availability of an additional 20 MHz band. This paper proposes the use of Group-Orthogonal Code Division Multiplex (GO-CDM as a means to improve the performance of the 802.11n standard by further exploiting the inherent frequency diversity. It is explained why GO-CDM synergistically matches with the two aforementioned new features and the performance gains it can offer under different configurations is illustrated. Furthermore, the effects that group-orthogonal has on key implementation issues such as channel estimation, carrier frequency offset, and peak-to-average power ratio (PAPR are also considered.

  6. 2008 Special NSREC Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    Science.gov (United States)

    Schwank, Jim; Buchner, Steve; Marshall, Paul; Duzellier, Sophie; Brown, Dennis; Poivey, Christian; Pease, Ron

    2008-12-01

    The December 2008 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 45th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held in Tucson, Arizona, July 14 - 18, 2008. Over 115 papers presented at the 2008 NSREC were submitted for consideration for this year's special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas.

  7. The influence of culture of honor and emotional intelligence in the acculturation of Moroccan immigrant women.

    Science.gov (United States)

    Lopez-Zafra, Esther; El Ghoudani, Karima

    2014-01-01

    Migration is a normal process of people seeking new opportunities, work, or leisure in societies. The way people adapt to a new country (acculturation) is a complex process in which immigrants' evaluations about the culture of origin and their perceptions of the host country interact. The combination of these two factors produces four types of acculturation: separation, assimilation, integration, and marginalization. Several variables, such as personality, attitudes, and emotional intelligence, have been studied to help explain this process. However, the impact of a culture of honor and its interaction with other variables remains an open question that may help to explain how migrants can better adjust to their host culture. In this study, we examine the influence of the culture of honor (social) and emotional intelligence (individual) on acculturation. In a sample of 129 Moroccan women (mean age = 29, SD = 9.40) immigrants in Spain (mean time in Spain = 6 years, SD = 3.60), we investigated the relations among the variables of interest. Our results show that no significant differences emerged in the scores given for culture of honor (CH) and the acculturation strategies of the Moroccan immigrant women F(3, 99) = .233; p = .87. However women who preferred the integration strategy scored highest on emotional intelligence (EI), whereas the assimilated immigrants showed the lowest scores for EI F(3, 92) = 4.63; p = .005. Additionally, only in the case of integration does EI mediate between CH and the value given to the immigrant's own and host cultures (p <.001).

  8. IEEE 802154 and ZigBee as enabling technologies for low-power wireless systems with quality-of-service constraints

    CERN Document Server

    Tennina, Stefano; Daidone, Roberta; Alves, Mário; Jurčík, Petr; Severino, Ricardo; Tiloca, Marco; Hauer, Jan-Hinrich; Pereira, Nuno; Dini, Gianluca; Bouroche, Mélanie; Tovar, Eduardo

    2013-01-01

    This book outlines the most important characteristics of IEEE 802.15.4 and ZigBee and how they can be used to engineer Wireless Sensor Network (WSN) systems and applications, with a particular focus on Quality-of-Service (QoS) aspects. It starts by providing a snapshot of the most relevant features of these two protocols, identifying some gaps in the standard specifications. Then it describes several state-of-the-art open-source implementations, models and tools that have been designed by the authors and have been widely used by the international community. The book also outlines the fundamental performance limits of IEEE 802.15.4/ZigBee networks, based on well-sustained analytical, simulation and experimental models, including how to dimension such networks to optimize delay/energy trade-offs.

  9. Basic security measures for IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Oscar P. Sarmiento

    2008-05-01

    Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.

  10. Real-life IT architecture design reports and their relation to IEEE Std 1471 stakeholders and concerns

    NARCIS (Netherlands)

    van Vliet, H.; Koning, H.

    2006-01-01

    Architectural designs are an important means to manage the development and deployment of information technology (IT). Much debate has been going on about a proper definition of architecture in IT and about how to describe it. In 2000, the IEEE Std 1471 proposed a model of an architecture description

  11. Symposium in Honor of Minoru M. Freund

    CERN Document Server

    Langhoff, Stephanie

    2014-01-01

    The presentations at this NASA-hosted Symposium in honor of Mino Freund will touch upon the fields, to which his prolific mind has made significant contributions. These include low temperature physics, cosmology, and nanotechnology with its wide-ranging applicability to material science, neuroscience, Earth sciences and satellite technology.  To learn more about Mino’s career you can download the "Tribute" , which outlines his journey from (i) low-temperature physics and superconductivity at the ETH Zürich to (ii) building one remarkable milliKelvin refrigerator for the US-Japan IRTS mission at UC Berkeley and ISAS in Japan to (iii) a decade in cosmology, to (iv) being on the micro-bolometer team at NASA Goddard for the HAWC instrument on SOFIA, to (v) developing at AFRL the nanotechnology portfolio for the entire Air Force.  This was followed by six years at the NASA Ames Research Center, where Mino formulated his far-ahead ideas about swarms of capable nanosats circling the Earth, which have since star...

  12. Marketingová strategie pro vzdělávací program Honors Academia

    OpenAIRE

    Šanová, Hana

    2017-01-01

    Diploma thesis deals with educational program of Honors Academia. The aim of the thesis is to set the marketing strategy of the program and to recommend suitable communication channels for marketing communication. The theoretical part deals with the marketing for education and services, with strategic management, namely with marketing strategy, tactics and analysis of internal and external environment. The pratical part consists of secondary research, one qualitative research, focus group, an...

  13. Los reglamentos de honores y distinciones: una estrategia de interacción con los públicos. Los galardones otorgados y revocados por la Diputación Provincial de Sevilla / Honors and distinctions regulations: a strategy of interaction with publics. The awards granted and revoked by the Diputación Provincial de Seville

    Directory of Open Access Journals (Sweden)

    Margarita Parrilla Amador

    2013-12-01

    Full Text Available A través de las Relaciones Públicas las organizaciones inician sistemas de comunicación dialógicos con los públicos de su entorno, posicionando mensajes a través de la interactividad con su entorno. Tradicionalmente concebidas desde el ámbito empresarial, han sido poco estudiadas desde el sector público como sistema a través del cual las administraciones públicas gestionan sus relaciones con sus administrados. En este sentido, desde el prisma de la comunicación organizacional, este trabajo pretende analizar cómo los reglamentos de honores y distinciones regulados y otorgados por la administración pública española, se erigen como un sistema de comunicación bidireccional que permite al Estado posicionar determinados mensajes relacionados con el ensalzamiento de determinados valores vigentes en cada contexto histórico, previamente detectados como dignos de respeto por la opinión pública. Para llevar a cabo el objetivo principal de este estudio, se selecciona como objeto de estudio la normativa de reglamentos de honores y distinciones de la Diputación de Sevilla para demostrar que la historia, la normativa y su ejecución nos hablan de honores y distinciones que ensalzan valores que deben ser referencia para la sociedad del momento. / Through public relations organizations starts a dialogic communication system with the public in their environment, positioning messages through the interactivity with their environment. Traditionally designed from the business sector, they have received little attention from the public administrations as a system through which government manages their relationships with their citizens. Thus, from the perspective of organizational communication, this paper analyzes how the regulations of honors and distinctions awarded by the Spanish publics administrations, stand as a bidirectional communication system that allows the state to position certain related messages exaltation of certain values

  14. IEEE standard requirements for reliability analysis in the design and operation of safety systems for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1976-01-01

    The purpose of this standard is to provide uniform, minimum acceptable requirements for the performance of reliability analyses for safety-related systems found in nuclear-power generating stations, but not to define the need for an analysis. The need for reliability analysis has been identified in other standards which expand the requirements of regulations (e.g., IEEE Std 379-1972 (ANSI N41.2-1972), ''Guide for the Application of the Single-Failure Criterion to Nuclear Power Generating Station Protection System,'' which describes the application of the single-failure criterion). IEEE Std 352-1975, ''Guide for General Principles of Reliability Analysis of Nuclear Power Generating Station Protection Systems,'' provides guidance in the application and use of reliability techniques referred to in this standard

  15. Mathematical modeling of a radio-frequency path for IEEE 802.11ah based wireless sensor networks

    Science.gov (United States)

    Tyshchenko, Igor; Cherepanov, Alexander; Dmitrii, Vakhnin; Popova, Mariia

    2017-09-01

    This article discusses the process of creating the mathematical model of a radio-frequency path for an IEEE 802.11ah based wireless sensor networks using M atLab Simulink CAD tools. In addition, it describes occurring perturbing effects and determining the presence of a useful signal in the received mixture.

  16. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  17. Distributed Fair Access Point Selection for Multi-Rate IEEE 802.11 WLANs

    Science.gov (United States)

    Gong, Huazhi; Nahm, Kitae; Kim, Jongwon

    In IEEE 802.11 networks, the access point (AP) selection based on the strongest signal strength often results in the extremely unfair bandwidth allocation among mobile users (MUs). In this paper, we propose a distributed AP selection algorithm to achieve a fair bandwidth allocation for MUs. The proposed algorithm gradually balances the AP loads based on max-min fairness for the available multiple bit rate choices in a distributed manner. We analyze the stability and overhead of the proposed algorithm, and show the improvement of the fairness via computer simulation.

  18. Conference Proceedings for 1997 IEEE 24th International Conference on Plasma Sciences, 19 - 22 May 1997, San Diego, California

    National Research Council Canada - National Science Library

    Hyman, Julius

    1997-01-01

    This 360 page softbound publication includes the following major sections, An invitation to ICOPS'97, Catamaran Resort Hotel Floor Pinas, Officers of the IEEE Nuclear and Plasma Sciences Society, Conference Information...

  19. Mobile Engagement at Scottsdale Community College: The Apple iPad in an English Honors Class

    Science.gov (United States)

    Tualla, Larry Tech

    2011-01-01

    This dissertation reports on an action research study that sought to discover how a new WiFi, tablet computing device, the Apple iPad, affected, enhanced, and impacted student engagement in an English Honors course at Scottsdale Community College. The researcher was also the instructor in the two semester, first-year, college composition sequence…

  20. 4th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  1. Latency and Jitter Analysis for IEEE 802.11e Wireless LANs

    Directory of Open Access Journals (Sweden)

    Sungkwan Youm

    2013-01-01

    Full Text Available This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF differentiates classes of service and to characterize the probability distribution of the medium access control (MAC layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.

  2. An Adaptive Medium Access Parameter Prediction Scheme for IEEE 802.11 Real-Time Applications

    Directory of Open Access Journals (Sweden)

    Estefanía Coronado

    2017-01-01

    Full Text Available Multimedia communications have experienced an unprecedented growth due mainly to the increase in the content quality and the emergence of smart devices. The demand for these contents is tending towards wireless technologies. However, these transmissions are quite sensitive to network delays. Therefore, ensuring an optimum QoS level becomes of great importance. The IEEE 802.11e amendment was released to address the lack of QoS capabilities in the original IEEE 802.11 standard. Accordingly, the Enhanced Distributed Channel Access (EDCA function was introduced, allowing it to differentiate traffic streams through a group of Medium Access Control (MAC parameters. Although EDCA recommends a default configuration for these parameters, it has been proved that it is not optimum in many scenarios. In this work a dynamic prediction scheme for these parameters is presented. This approach ensures an appropriate traffic differentiation while maintaining compatibility with the stations without QoS support. As the APs are the only devices that use this algorithm, no changes are required to current network cards. The results show improvements in both voice and video transmissions, as well as in the QoS level of the network that the proposal achieves with regard to EDCA.

  3. Vispubdata.org: A Metadata Collection About IEEE Visualization (VIS) Publications.

    Science.gov (United States)

    Isenberg, Petra; Heimerl, Florian; Koch, Steffen; Isenberg, Tobias; Xu, Panpan; Stolper, Charles D; Sedlmair, Michael; Chen, Jian; Moller, Torsten; Stasko, John

    2017-09-01

    We have created and made available to all a dataset with information about every paper that has appeared at the IEEE Visualization (VIS) set of conferences: InfoVis, SciVis, VAST, and Vis. The information about each paper includes its title, abstract, authors, and citations to other papers in the conference series, among many other attributes. This article describes the motivation for creating the dataset, as well as our process of coalescing and cleaning the data, and a set of three visualizations we created to facilitate exploration of the data. This data is meant to be useful to the broad data visualization community to help understand the evolution of the field and as an example document collection for text data visualization research.

  4. Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Gaoyuan; Wen, Hong; Wang, Longye; Xie, Ping; Song, Liang; Tang, Jie; Liao, Runfa

    2017-12-26

    In this paper, we propose an adaptive single differential coherent detection (SDCD) scheme for the binary phase shift keying (BPSK) signals in IEEE 802.15.4 Wireless Sensor Networks (WSNs). In particular, the residual carrier frequency offset effect (CFOE) for differential detection is adaptively estimated, with only linear operation, according to the changing channel conditions. It was found that the carrier frequency offset (CFO) and chip signal-to-noise ratio (SNR) conditions do not need a priori knowledge. This partly benefits from that the combination of the trigonometric approximation sin - 1 ( x ) ≈ x and a useful assumption, namely, the asymptotic or high chip SNR, is considered for simplification of the full estimation scheme. Simulation results demonstrate that the proposed algorithm can achieve an accurate estimation and the detection performance can completely meet the requirement of the IEEE 802.15.4 standard, although with a little loss of reliability and robustness as compared with the conventional optimal single-symbol detector.

  5. Effect of Positive Psychology Elements on Job Pride and Honor with an Emphasis on Mediating Role of Communication among Faculty Members of Shiraz University of Medical Sciences

    Science.gov (United States)

    Hosein Kamani, Seyed Mohammad

    2017-01-01

    Job pride and honor is affected by various causes. Elements of positive psychology can be pointed out as one of them that in recent years has played an important role in organizational development. Hence, this study is to provide a prediction model about the impact of hope and resilience on job pride and honor with an emphasis on mediator role of…

  6. BabelFish-Tools for IEEE C37.118.2-compliant real-time synchrophasor data mediation

    Science.gov (United States)

    Almas, M. S.; Vanfretti, L.; Baudette, M.

    BabelFish (BF) is a real-time data mediator for development and fast prototyping of synchrophasor applications. BF is compliant with the synchrophasor data transmission IEEE Std C37.118.2-2011. BF establishes a TCP/IP connection with any Phasor Measurement Unit (PMU) or Phasor Data Concentrator (PDC) stream and parses the IEEE Std C37.118.2-2011 frames in real-time to provide access to raw numerical data in the LabVIEW environment. Furthermore, BF allows the user to select "data-of-interest" and transmit it to either a local or remote application using the User Datagram Protocol (UDP) in order to support both unicast and multicast communication. In the power systems Wide Area Monitoring Protection and Control (WAMPAC) domain, BF provides the first Free/Libre and Open Source Software (FLOSS) for the purpose of giving the users tools for fast prototyping of new applications processing PMU measurements in their chosen environment, thus liberating them of time consuming synchrophasor data handling and allowing them to develop applications in a modular fashion, without a need of a large and monolithic synchrophasor software environment.

  7. ANÁLISE DE DESEMPENHO EM REDES IEEE 802.3 APLICADO PARA SISTEMA DE TEMPO REAL

    Directory of Open Access Journals (Sweden)

    Ricardo Alexsandro de Medeiros Valentim

    2011-06-01

    Full Text Available A tecnologia Ethernet domina o mercado de rede local de computadores. No entanto, não foi estabelecida como uma tecnologia para automação industrial, onde o determinismo procura os requisitos com um desempenho de tempo real. Muitas soluções têm sido propostas para resolver o problema do determinismo não, que se baseiam principalmente no TDMA (acesso múltiplo por divisão de tempo, passagem de token e mestre-escravo. É neste contexto que este trabalho é realizado, através de medidas de desempenho em redes de comunicação que utilizam o padrão IEEE 802.3, observando o comportamento destas redes, quando submetidos a diferentes cenários de sobrecarga. Para isso, as variações foram aprovadas em ambiente de teste, que será baseado em Shared Ethernet (Hub, Ethernet e Ethernet Switch com prioridade (IEEE 802.1Q. Desta forma, é possível indicar quais os dispositivos analisados pelos testes de desempenho demonstrado um comportamento mais adequado para suportar as aplicações com requisitos de tempo real.

  8. An Examination of Classroom Social Environment on Motivation and Engagement of College Early Entrant Honors Students

    Science.gov (United States)

    Maddox, Richard S.

    2010-01-01

    This study set out to examine the relationships between the classroom social environment, motivation, engagement and achievement of a group of early entrant Honors students at a large urban university. Prior research on the classroom environment, motivation, engagement and high ability students was examined, leading to the assumption that the…

  9. Protecting Critical Rail Infrastructure

    Science.gov (United States)

    2006-12-01

    Gulliver.Trb.Org/Publications/Sr/Sr270.Pdf. 38. Allan J. DeBlasio, Terrance J. Regan, Margaret E . Zirker, Katherine S. Fichter, Kristin Lovejoy ...getrpt?GAO-04-598T. 4. Ibid. 5. Thomas H. Kean, Lee H. Hamilton, Richard Ben-Veniste, Fred F. Fielding, Jamie S. Gorelick, Slade Gorton, Bob Kerrey...Committee, Current and Projected National Security Threats to the United States, Vice Admiral Lowell E . Jacoby, United States Navy, Director, Defense

  10. Low-cost RAU with Optical Power Supply Used in a Hybrid RoF IEEE 802.11 Network

    Science.gov (United States)

    Kowalczyk, M.; Siuzdak, J.

    2014-09-01

    The paper presents design and implementation of a low-cost RAU (Remote Antenna Unit) device. It was designed to work in a hybrid Wi-Fi/optical network based on the IEEE 802.11b/g standard. An unique feature of the device is the possibility of optical power supply.

  11. Open Data for Global Multimodal Land Use Classification: Outcome of the 2017 IEEE GRSS Data Fusion Contest

    NARCIS (Netherlands)

    Yokoya, Naoto; Ghamisi, Pedram; Xia, Junshi; Sukhanov, Sergey; Heremans, Roel; Tankoyeu, Ivan; Bechtel, Benjamin; Saux, Le Bertrand; Moser, Gabriele; Tuia, Devis

    2018-01-01

    In this paper, we present the scientific outcomes of the 2017 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society. The 2017 Contest was aimed at addressing the problem of local climate zones classification based on

  12. INCLUSIÓN DE CORRELACIONES TEMPORALES CON DEPENDENCIA A LARGO PLAZO Y PATRONES AUTOSIMILARES EN MODELOS DE REDES IEEE 802.3 INCLUSION OF LONG-RANGE-DEPENDENT TEMPORARY CORRELATIONS AND SELF-SIMILAR PATTERNS IN IEEE 802.3 NETWORKS MODELS

    Directory of Open Access Journals (Sweden)

    Ginno Millán Naveas

    2010-04-01

    Full Text Available En este trabajo se presentan los fundamentos de un proyecto de investigación sobre el modelado de redes de computadoras con mecanismo de control de acceso al medio, según el estándar IEEE 802.3-2005, empleando los postulados de la teoría de conjuntos autosimilares para establecer el nivel de impacto que poseen las correlaciones temporales con dependencia de largo alcance sobre el rendimiento de tales redes. Se postula una nueva forma de estimar grados de autosimilaridad basada en una variación del estimador de Whittle.The foundation of a research project about a model of computer networks with media access control mechanism based on the IEEE standard 802.3-2005 is presented. The model draws from the theory of self-similar sets for establishing the impact level that the long-range-dependent temporary correlations have on the performance of such networks. A new method for the estimation of self-similar levels based on a variation of the Whittle estimator is postulated.

  13. Basında Yer Alan Namus Cinayetlerinin Sosyolojik Analizi /A Sociological Analysis of Honor Killings Reported by the Mass Media

    Directory of Open Access Journals (Sweden)

    Ülkü Hayriye İNCİ

    2013-10-01

    Full Text Available Öz Erkek egemen toplumlarda kadına yönelik şiddetin kısmi bir kabul gördüğü bilinmektedir. Kadına yönelik şiddetin özel bir şekli de namus cinayetleridir. Son zamanlarda ulusal medyada kendisine oldukça fazla yer bulan namus cinayetleri, sosyolojik çalışmalarda da kendisine yer bulmaya başlamıştır. Bu çalışma, Türkiye’de son zamanlarda oldukça sık tartışılan namus cinayetlerinin sosyal ve kültürel hayattaki durumunu tartışmaya açmaktadır. Çalışma basında yer alan namus cinayetleri ile sınırlıdır. Çalışmada içerik analizi yöntemi kullanılmıştır. Bu bağlamda, Türkiye’de meydana gelen namus cinayetlerinin yoğun olarak ortaya çıktığı bölgelerdeki sosyal sorunlar, farklı bölgelerdeki sosyal yapının namus cinayetlerini nasıl etkilediği, toplumda nasıl yansıma bulduğu ve özellikle kadınlar tarafından nasıl algılandığı konusu, basına yansıyan haberlerin içerik çözümlemesiyle ortaya konulmaya çalışılmıştır. Abstract Violence against women is somewhat acceptable in societies which dominated by the patriarchal system. One of the aspects of violence against women is honor killings. Nowadays, honor killings take place pretty much in Turkish national media. This article discusses the social and cultural basis of honor killings debated quite often recently. The work is limited to honor killings reported by mass media. In the work the content analysis method was used. In this context, social problems and social structures of different regions of Turkey analyzed to determine the source of problem. Additionally, the place of the honor killings, how they come up, and their effects on women and society have been presented with the content analysis of the news on the media.

  14. IEEE guide for general principles of reliability analysis of nuclear power generating station protection systems

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    Presented is the Institute of Electrical and Electronics Engineers, Inc. (IEEE) guide for general principles of reliability analysis of nuclear power generating station protection systems. The document has been prepared to provide the basic principles needed to conduct a reliability analysis of protection systems. Included is information on qualitative and quantitative analysis, guides for failure data acquisition and use, and guide for establishment of intervals

  15. Analyzing the Engineering Educational Research in Spain: A Global Vision through the Awards of CESEI-IEEE

    Science.gov (United States)

    Plaza, I.; Arcega, F.; Castro, M.; Llamas, M.

    2011-01-01

    CESEI is the acronym of the Spanish Chapter of the Education Society of IEEE (the Institute of Electric and Electronics Engineers). Every year, the CESEI awards a prize for the best doctoral thesis and FDP (final (master) degree projects) about education. The thesis or the project must be developed in the areas of electrical engineering,…

  16. Analysis of Radio communication solutions in small and isolated communities under the IEEE 802.22 standard

    OpenAIRE

    Arroyo Arzubi, Alejandro; Castro Lechtaler, Antonio; Foti, Antonio Roberto; Fusario, Rubén J.; García Guibout, Jorge; Sens, Lorena

    2013-01-01

    In recent years the use of wireless communications has increased significantly. Rural communities without cable network communication have found a solution in wireless technologies. Based on previous fieldwork, this paper analyzes software development of integration based technologies for communication equipment. It focuses on the feasibility of the IEEE 802.22 standard as a solution to the wireless problem.

  17. A time-based admission control mechanism for IEEE 802.11 ad Hoc networks

    OpenAIRE

    Costa, Luís Henrique M. K.; Cerveira, Carlos Rodrigo

    2006-01-01

    This paper presents a time-based admission control mechanism (TAC) for IEEE 802.11 ad hoc networks. The proposed mechanism was adapted to the QoS AODV routing protocol, which takes the quality of service requirements of the data flow into account in the route discovery process. TAC-AODV estimates the idle time of the physical medium based on the frames listened. The incoming traffic is admitted according to the offered load as well as the intra-flow interference, calculated based on the numbe...

  18. Editorial for IEEE Transactions on Power Electronics, January 2013

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Lehman, Brad

    2013-01-01

    should increase the impact factor of the IEEE TRANSACTIONS ON POWER ELECTRONICS (TPEL). In 2007, TPEL published 2600 pages, and it has gradually been increased to 4000 pages in 2011, 5000 pages in 2012, and 5500 pages are projected for 2013. We have decided to publish 12 printed issues so every month...... a new issue will be printed. A graph is provided showing the number of regular papers received in the past years as well as the number of published pages in the TPEL. Finally they note that in 2008, TPEL obtained a record high value for the impact factor (as shown in a figure) but in 2009 it was reduced...... the papers to be read over a longer time span; 2) Web of Science (ISI Thomsen Reuter) began to register new power electronics conferences in their database, and citations from conferences counts and contributes to a higher impact factor....

  19. Honoring Choices Minnesota: preliminary data from a community-wide advance care planning model.

    Science.gov (United States)

    Wilson, Kent S; Kottke, Thomas E; Schettle, Sue

    2014-12-01

    Advance care planning (ACP) increases the likelihood that individuals who are dying receive the care that they prefer. It also reduces depression and anxiety in family members and increases family satisfaction with the process of care. Honoring Choices Minnesota is an ACP program based on the Respecting Choices model of La Crosse, Wisconsin. The objective of this report is to describe the process, which began in 2008, of implementing Honoring Choices Minnesota in a large, diverse metropolitan area. All eight large healthcare systems in the metropolitan area agreed to participate in the project, and as of April 30, 2013, the proportion of hospitalized individuals 65 and older with advance care directives in the electronic medical record was 12.1% to 65.6%. The proportion of outpatients aged 65 and older was 11.6% to 31.7%. Organizations that had sponsored recruitment initiatives had the highest proportions of records containing healthcare directives. It was concluded that it is possible to reduce redundancy by recruiting all healthcare systems in a metropolitan area to endorse the same ACP model, although significantly increasing the proportion of individuals with a healthcare directive in their medical record requires a campaign with recruitment of organizations and individuals. © 2014 The Authors.The Journal of the American Geriatrics Society published by Wiley Periodicals, Inc. on behalf of The American Geriatrics Society.

  20. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel.

    Science.gov (United States)

    Sakin, Sayef Azad; Razzaque, Md Abdur; Hassan, Mohammad Mehedi; Alamri, Atif; Tran, Nguyen H; Fortino, Giancarlo

    2017-12-07

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies.

  1. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    Directory of Open Access Journals (Sweden)

    Sayef Azad Sakin

    2017-12-01

    Full Text Available Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies.

  2. A Means of Honorable Support: Art and Music in Women's Education in the Mid-Nineteenth Century

    Science.gov (United States)

    Nash, Margaret A.

    2013-01-01

    "The value of the Art Education becomes more and more apparent as a means of honorable support and of high culture and enjoyment," stated the catalog of Ingham University in western New York State in 1863. The Art Department there would prepare "pupils for Teachers and Practical Artists." This statement reveals some of the…

  3. Proceedings of the IEEE Machine Learning for Signal Processing XVII

    DEFF Research Database (Denmark)

    The seventeenth of a series of workshops sponsored by the IEEE Signal Processing Society and organized by the Machine Learning for Signal Processing Technical Committee (MLSP-TC). The field of machine learning has matured considerably in both methodology and real-world application domains and has...... become particularly important for solution of problems in signal processing. As reflected in this collection, machine learning for signal processing combines many ideas from adaptive signal/image processing, learning theory and models, and statistics in order to solve complex real-world signal processing......, and two papers from the winners of the Data Analysis Competition. The program included papers in the following areas: genomic signal processing, pattern recognition and classification, image and video processing, blind signal processing, models, learning algorithms, and applications of machine learning...

  4. [The pharmacists of Angoulême in the days of Honoré de Balzac].

    Science.gov (United States)

    Courcou, G

    1997-01-01

    The large volume of Honoré de Balzac's correspondence testifies to his keen sense of friendship. He stayed in Angoulême three times at his friend Carraud's, which inspired his novel: Les Illusions perdues. His character, Lucien, is the son of Chardon, a pharmacist of the l'Houmeau, neighborhood similar to a real life character Evangelista. As the chemical revolution was dawning, the pharmacists of Angoulême, who often held their positions from their fathers, belonged to the town's 19th century bourgeoisie.

  5. AVSS 2007: IEEE International Conference onAdvanced Video and Signal based Surveillance, London, UK, September 2007

    DEFF Research Database (Denmark)

    Fihl, Preben

    This technical report will cover the participation in the IEEE International Conference on Advanced Video and Signal based Surveillance in September 2007. The report will give a concise description of the most relevant topics presented at the conference, focusing on the work related to the HERMES...... project and human motion and action recognition. Our contribution to the conference will also be described....

  6. Architectural and Functional Design and Evaluation of E-Learning VUIS Based on the Proposed IEEE LTSA Reference Model.

    Science.gov (United States)

    O'Droma, Mairtin S.; Ganchev, Ivan; McDonnell, Fergal

    2003-01-01

    Presents a comparative analysis from the Institute of Electrical and Electronics Engineers (IEEE) Learning Technology Standards Committee's (LTSC) of the architectural and functional design of e-learning delivery platforms and applications, e-learning course authoring tools, and learning management systems (LMSs), with a view of assessing how…

  7. A Legacy of Sacrifice and Honor: Celebrating Tribal Resilience and Military Service at Haskell Nations University

    Science.gov (United States)

    Warrington, Jacinta

    2017-01-01

    Haskell Indian Nations University opened 133 years ago, on September 17, 1884, as the U.S. Training and Industrial School--one of three original tribal boarding schools funded by the United States Congress. Three years later the school changed its name to Haskell Institute in honor of Chase Dudley Haskell, a U.S. representative from the Second…

  8. Introductory Molecular Orbital Theory: An Honors General Chemistry Computational Lab as Implemented Using Three-Dimensional Modeling Software

    Science.gov (United States)

    Ruddick, Kristie R.; Parrill, Abby L.; Petersen, Richard L.

    2012-01-01

    In this study, a computational molecular orbital theory experiment was implemented in a first-semester honors general chemistry course. Students used the GAMESS (General Atomic and Molecular Electronic Structure System) quantum mechanical software (as implemented in ChemBio3D) to optimize the geometry for various small molecules. Extended Huckel…

  9. The Heritage of Herding and Southern Homicide: Examining the Ecological Foundations of the Code of Honor Thesis

    Science.gov (United States)

    Baller, Robert D.; Zevenbergen, Matthew P.; Messner, Steven F.

    2009-01-01

    The authors examine the ecological foundations of the thesis of a "code of honor" as an explanation for southern homicide. Specifically, they consider the effects of indicators of ethnic groups that migrated from herding economies (the Scotch-Irish), cattle and pig herding, and the relative importance of agricultural production across…

  10. Practical support for Lean Six Sigma software process definition using IEEE software engineering standards

    CERN Document Server

    Land, Susan K; Walz, John W

    2012-01-01

    Practical Support for Lean Six Sigma Software Process Definition: Using IEEE Software Engineering Standards addresses the task of meeting the specific documentation requirements in support of Lean Six Sigma. This book provides a set of templates supporting the documentation required for basic software project control and management and covers the integration of these templates for their entire product development life cycle. Find detailed documentation guidance in the form of organizational policy descriptions, integrated set of deployable document templates, artifacts required in suppo

  11. A strategy for implementation of experience based seismic equipment qualification in IEEE and ASME industry standards

    International Nuclear Information System (INIS)

    Adams, T.M.

    1996-01-01

    In the past 20 years, extensive data on the performance of mechanical and electric equipment during actual strong motion earthquakes and seismic qualification tests has been accumulated. Recognizing that an experience based approach provides a technically sound and cost effective method for the seismic qualification of some or certain equipment, the IEEE Nuclear Power Engineering Committee and the ASME Committee on Qualification of Mechanical Equipment established a Special Working Group to investigate the incorporation of experienced based methods into the industry consensus codes and standards currently used in the seismic qualification of Seismic Category Nuclear Power Plant equipment. This paper presents the strategy (course of action) which was developed by the Special Working Group for meeting this objective of incorporation of experience based seismic qualification standards used in the design and seismic qualification of seismic category nuclear power plant equipment. This strategy was recommended to both chartering organizations, the IEEE Nuclear Power Engineering Committee and the ASME Committee on Qualification of Mechanical Equipment for their consideration and implementation. The status of the review and implementation of the Special Working Group's recommended strategy by the sponsoring organization is also discussed

  12. Two Sides of the Communicative Coin: Honors and Nonhonors French and Spanish Classes in a Midwestern High School

    Science.gov (United States)

    Morris, Michael

    2005-01-01

    This study compares the instructional practices in honors and nonhonors French and Spanish classes at a Midwestern high school, as well as factors influencing those practices. The researcher observed 54 class sessions and used questionnaires and interviews to obtain teachers' perspectives on instruction. Analysis revealed a statistically…

  13. Within- and between-culture variation: individual differences and the cultural logics of honor, face, and dignity cultures.

    Science.gov (United States)

    Leung, Angela K-Y; Cohen, Dov

    2011-03-01

    The CuPS (Culture × Person × Situation) approach attempts to jointly consider culture and individual differences, without treating either as noise and without reducing one to the other. Culture is important because it helps define psychological situations and create meaningful clusters of behavior according to particular logics. Individual differences are important because individuals vary in the extent to which they endorse or reject a culture's ideals. Further, because different cultures are organized by different logics, individual differences mean something different in each. Central to these studies are concepts of honor-related violence and individual worth as being inalienable versus socially conferred. We illustrate our argument with 2 experiments involving participants from honor, face, and dignity cultures. The studies showed that the same "type" of person who was most helpful, honest, and likely to behave with integrity in one culture was the "type" of person least likely to do so in another culture. We discuss how CuPS can provide a rudimentary but integrated approach to understanding both within- and between-culture variation. (c) 2011 APA, all rights reserved

  14. Modeling of Wi-Fi IEEE 802.11ac Offloading Performance For 1000x Capacity Expansion of LTE-Advanced

    DEFF Research Database (Denmark)

    Hu, Liang; Sanchez, Maria Laura Luque; Maternia, Michael

    2013-01-01

    This paper studies indoor Wi-Fi IEEE 802.11ac deployment as a capacity expansion solution of LTE-A (Long Term Evolution-Advanced) network to achieve 1000 times higher capacity. Besides increasing the traffic volume by a factor of x1000, we also increase the minimum target user data rate to 10Mbit...

  15. Open-source implementation of an ad-hoc IEEE802.11a/g/p software-defined radio on low-power and low-cost general purpose processors

    Directory of Open Access Journals (Sweden)

    S. Ciccia

    2017-12-01

    Full Text Available This work proposes a low-cost and low-power software-defined radio open-source platform with IEEE 802.11 a/g/p wireless communication capability. A state-of-the-art version of the IEEE 802.11 a/g/p software for GNU Radio (a free and open-source software development framework is available online, but we show here that its computational complexity prevents operations in low-power general purpose processors, even at throughputs below the standard. We therefore propose an evolution of this software that achieves a faster and lighter IEEE 802.11 a/g/p transmitter and receiver, suitable for low-power general purpose processors, for which GNU Radio provides very limited support; we discuss and describe the software radio processing structuring that is necessary to achieve the goal, providing a review of signal processing techniques. In particular, we emphasize the advanced reduced-instruction set (RISC machine (ARM study case, for which we also optimize some of the processing libraries. The presented software will remain open-source.

  16. Utilizing reliability concepts in the development of IEEE recommended good practices for nuclear plant maintenance

    International Nuclear Information System (INIS)

    Gradin, L.P.

    1986-01-01

    This paper presents information describing the concern for nuclear power plant electrical equipment maintenance and the IEEE Nuclear Power Engineering Committee's method to address that concern. That method includes the creation of Working Group 3.3, ''Maintenance Good Practices'' which is developing specific maintenance good practice documents, supporting technical information exchange, and providing a vehicle to promote practices which can reduce cost and enhance plant safety. The foundation for that effort is the utilization of Reliability concepts

  17. Proceeding of the ACM/IEEE-CS Joint Conference on Digital Libraries (1st, Roanoke, Virginia, June 24-28, 2001).

    Science.gov (United States)

    Association for Computing Machinery, New York, NY.

    Papers in this Proceedings of the ACM/IEEE-CS Joint Conference on Digital Libraries (Roanoke, Virginia, June 24-28, 2001) discuss: automatic genre analysis; text categorization; automated name authority control; automatic event generation; linked active content; designing e-books for legal research; metadata harvesting; mapping the…

  18. La carrera de un capellán de honor de Palacio en la crisis del Antiguo Régimen (1783-1827

    Directory of Open Access Journals (Sweden)

    Juan Carlos Saavedra Zapater

    2001-01-01

    Full Text Available La presente comunicación intenta acercamos al estudio de ios capellanes de honor de la Real Capilla como grupo social y élite de poder La Capilla real, parte integrante de la Casa Real como institución en sí misma, sufre con la evolución de los acontecimientos del final del Antiguo Régimen, las transformaciones propias tanto en las cuestiones económicas como en las funcionales. Tomando como referencia la vida y carrera de Antonio llarraza vemos el proceso que un individuo debe de llevar a cabo para acceder al honor de ser capolan real: su carrera, trayectoria profesional y relaciones sociales y de parentesco, así como es utilizado este empleo para acceder a más altos cargos.The present paper is an aproximation to the study of the Royal Chaplans of the Royal Chapel as a social group and élite ofpower The Royal Chapel, a department within the whole Royal Hause as an institution in itself, suffers with the evolution of events during the end of the Anclen Régime, the proper transformations and changos, in economical aspects as in its rule. Taking the Ufe and carrer of Antonio llarraza as a reference, we can analizo the procces that a person has to realizo in order to achive the honor ofa royal chaplancy: his professional charges, his studios and personal relationships, familiar and social as this job is used to get more important charges.

  19. Learning Strategies in Play during Basic Training for Medal of Honor and Call of Duty Video Games

    Science.gov (United States)

    Ziaeehezarjeribi, Yadi

    2010-01-01

    This study, based on experiential play methodology was used to explore student engagement while playing "Medal of Honor (2002)" and "Call of Duty (2003)". It identifies some of the key issues related to the use of video games and simulations during the training phase of game play. Research into the effects of gaming in education has been extremely…

  20. Perfectionism, Stress, and Social (Dis)Connection: A Short-Term Study of Hopelessness, Depression, and Academic Adjustment among Honors Students

    Science.gov (United States)

    Rice, Kenneth G.; Leever, Brooke A.; Christopher, John; Porter, J. Diane

    2006-01-01

    This study tested models of perfectionism predicting psychological distress and academic adjustment and moderators and mediators of those associations in 2 successive cohorts of high-achieving university honors students (N = 499). Participants completed measures earl and late in the semester. Adaptive (high standards) and maladaptive…

  1. A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielsen, Christoffer Rosenkilde

    2007-01-01

    Static analysis is successfully used for automatically validating security properties of classical cryptographic protocols. In this paper, we shall employ the same technique to a modern security protocol for wireless networks, namely the latest version of the Privacy and Key Management protocol...... for IEEE 802.16e, PKMv2. This protocol seems to have an exaggerated mixture of security features. Thus, we iteratively investigate which components are necessary for upholding the security properties and which can be omitted safely. This approach is based on the LySa process calculus and employs...

  2. Adaptive rate selection scheme for video transmission to resolve IEEE 802.11 performance anomaly

    Science.gov (United States)

    Tang, Guijin; Zhu, Xiuchang

    2011-10-01

    Multi-rate transmission may lead to performance anomaly in an IEEE 802.11 network. It will decrease the throughputs of all the higher rate stations. This paper proposes an adaptive rate selection scheme for video service when performance anomaly occurs. Considering that video has the characteristic of tolerance to packet loss, we actively drop several packets so as to select the rates as high as possible for transmitting packets. Experiment shows our algorithm can decrease the delay and jitter of video, and improve the system throughput as well.

  3. Report of the 2017 IEEE Cyber Science and Technology Congress

    Directory of Open Access Journals (Sweden)

    Wenbing Zhao

    2017-12-01

    Full Text Available The modern digitized world has led to the emergence of a new paradigm on global information networks and infrastructures known as Cyberspace and the studies of Cybernetics, which bring seamless integration of physical, social and mental spaces. Cyberspace is becoming an integral part of our daily life from learning and entertainment to business and cultural activities. As expected, this whole concept of Cybernetics brings new challenges that need to be tackled. The 2017 IEEE Cyber Science and Technology Congress (CyberSciTech 2017 provided a forum for researchers to report their research findings and exchange ideas. The congress took place in Orlando, Florida, USA during 6–10 November 2017. Not counting poster papers, the congress accepted over fifty papers that are divided into nine sessions. In this report, we provide an overview of the research contributions of the papers in CyberSciTech 2017.

  4. Performance trade-off in an adaptive IEEE 802.11ad waveform design for a joint automotive radar and communication system.

    Science.gov (United States)

    2017-05-01

    The IEEE 802.11ad waveform can be used for automotive radar by exploiting the Golay complementary sequences in the preamble of a frame. The performance of radar, however, is limited by the preamble structure. In this paper, we propose an adaptive pre...

  5. Beamforming transmission in IEEE 802.11ac under time-varying channels.

    Science.gov (United States)

    Yu, Heejung; Kim, Taejoon

    2014-01-01

    The IEEE 802.11ac wireless local area network (WLAN) standard has adopted beamforming (BF) schemes to improve spectral efficiency and throughput with multiple antennas. To design the transmit beam, a channel sounding process to feedback channel state information (CSI) is required. Due to sounding overhead, throughput increases with the amount of transmit data under static channels. Under practical channel conditions with mobility, however, the mismatch between the transmit beam and the channel at transmission time causes performance loss when transmission duration after channel sounding is too long. When the fading rate, payload size, and operating signal-to-noise ratio are given, the optimal transmission duration (i.e., packet length) can be determined to maximize throughput. The relationship between packet length and throughput is also investigated for single-user and multiuser BF modes.

  6. Dynamic Voltage Stability Studies using a Modified IEEE 30-Bus System

    Directory of Open Access Journals (Sweden)

    Oluwafemi Emmanuel Oni

    2016-09-01

    Full Text Available Power System stability is an essential study in the planning and operation of an efficient, economic, reliable and secure electric power system because it encompasses all the facet of power systems operations, from planning, to conceptual design stages of the project as well as during the systems operating life span. This paper presents different scenario of power system stability studies on a modified IEEE 30-bus system which is subjected to different faults conditions. A scenario whereby the longest high voltage alternating current (HVAC line is replaced with a high voltage direct current (HVDC line was implemented. The results obtained show that the HVDC line enhances system stability more compared to the contemporary HVAC line. Dynamic analysis using RMS simulation tool was used on DigSILENT PowerFactory.

  7. Performance Analysis of a Burst Transmission Mechanism Using Microsleep Operation for Green IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Raul Palacios-Trujillo

    2017-07-01

    Full Text Available This paper evaluates the performance of a burst transmission mechanism using microsleep operation to support high energy efficiency in IEEE 802.11 Wireless Local Area Networks (WLANs. This mechanism is an implementation of the IEEE 802.11ac Transmission Opportunity Power Save Mode (TXOP PSM. A device using the TXOP PSM-based mechanism can switch to a low-power sleep state for the time that another device transmits a burst of data frames to a third one. This operation is called microsleep and its feasibility strongly depends on the time and energy consumption that a device incurs in the transitions from and to the sleep state. This paper accounts for the impact of these transitions in the derivation of an analytical model to calculate the energy efficiency of the TXOP PSM-based mechanism under network saturation. Results obtained show that the impact of the transition requirements on the feasibility of microsleep operation can be significant depending on the selected system parameters, although it can be reduced by using burst transmissions. When microsleep operation is feasible, the TXOP PSM-based mechanism can improve the energy efficiency of other legacy mechanisms by up to 424% under high traffic loads.

  8. Evaluation of IEEE 802.11g and 802.16 for Lunar Surface Exploration Missions Using MACHETE Simulations

    Science.gov (United States)

    Segui, John; Jennings, Esther; Vyas, Hemali

    2009-01-01

    In this paper, we investigated the suitability of terrestrial wireless networking technologies for lunar surface exploration missions. Specifically, the scenario we considered consisted of two teams of collaborating astronauts, one base station and one rover, where the base station and the rover have the capability of acting as relays. We focused on the evaluation of IEEE 802.11g and IEEE 802.16 protocols, simulating homogeneous 802.11g network, homogeneous 802.16 network, and heterogeneous network using both 802.11g and 802.16. A mix of traffic flows were simulated, including telemetry, caution and warning, voice, command and file transfer. Each traffic type had its own distribution profile, data volume, and priority. We analyzed the loss and delay trade-offs of these wireless protocols with various link-layer options. We observed that 802.16 network managed the channel better than an 802.11g network due to controlled infrastructure and centralized scheduling. However, due to the centralized scheduling, 802.16 also had a longer delay. The heterogeneous (hybrid) of 802.11/802.16 achieved a better balance of performance in terms of data loss and delay compared to using 802.11 or 802.16 alone.

  9. Comparison and Analysis of ISO/IEEE 11073, IHE PCD-01, and HL7 FHIR Messages for Personal Health Devices.

    Science.gov (United States)

    Lee, Sungkee; Do, Hyoungho

    2018-01-01

    Increasing use of medical devices outside of healthcare facilities inevitably requires connectivity and interoperability between medical devices and healthcare information systems. To this end, standards have been developed and used to provide interoperability between personal health devices (PHDs) and external systems. ISO/IEEE 11073 standards and IHE PCD-01 standard messages have been used the most in the exchange of observation data of health devices. Recently, transmitting observation data using the HL7 FHIR standard has been devised in the name of DoF (Devices on FHIR) and adopted very fast. We compare and analyze these standards and suggest that which standard will work best at the different environments of device usage. We generated each message/resource of the three standards for observed vital signs from blood pressure monitor and thermometer. Then, the size, the contents, and the exchange processes of these messages are compared and analyzed. ISO/IEEE 11073 standard message has the smallest data size, but it has no ability to contain the key information, patient information. On the other hand, PCD-01 messages and FHIR standards have the fields for patient information. HL7 DoF standards provide reusing of information unit known as resource, and it is relatively easy to parse DoF messages since it uses widely known XML and JSON. ISO/IEEE 11073 standards are suitable for devices having very small computing power. IHE PCD-01 and HL7 DoF messages can be used for the devices that need to be connected to hospital information systems that require patient information. When information reuse is frequent, DoF is advantageous over PCD-01.

  10. A Novel Energy Saving Algorithm with Frame Response Delay Constraint in IEEE 802.16e

    Science.gov (United States)

    Nga, Dinh Thi Thuy; Kim, Mingon; Kang, Minho

    Sleep-mode operation of a Mobile Subscriber Station (MSS) in IEEE 802.16e effectively saves energy consumption; however, it induces frame response delay. In this letter, we propose an algorithm to quickly find the optimal value of the final sleep interval in sleep-mode in order to minimize energy consumption with respect to a given frame response delay constraint. The validations of our proposed algorithm through analytical results and simulation results suggest that our algorithm provide a potential guidance to energy saving.

  11. Full-duplex transmission of IEEE 802.11ac-compliant MIMO WLAN signals over a 2-km 7-core fiber

    NARCIS (Netherlands)

    Fan, Yuting; Li, Jianqiang; Lei, Yi; Tang, Ming; Yin, Feifei; Dai, Yitang; Xu, Kun

    2017-01-01

    In this Letter, we experimentally demonstrate a full-duplex transmission system of IEEE 802.11ac-compliant multiple-input multiple-output (MIMO) signals over a 2-km 7-core fiber for in-building wireless local-area network (WLAN) distributed antenna systems. For full-duplex 3 � 3 MIMO

  12. 8th Symposium Honoring Mathematical Physicist Jean-Pierre Vigier

    CERN Document Server

    Kauffman, Louis H; Rowlands, Peter; The Physics of Reality : Space, Time, Matter, Cosmos

    2013-01-01

    A truly Galilean class volume as it also introduces a new method in theory formation this time completing the tools of epistemology. This book covers a broad spectrum of theoretical and mathematical physics by researchers from over 20 nations from four continents. Like Vigier himself, the Vigier symposia are noted for addressing avant-garde cutting-edge topics in contemporary physics. Among the six proceedings honoring J-P Vigier this is perhaps the most exciting one as several important breakthroughs are introduced for the first time. The most interesting breakthrough in view of the recent NIST experimental violations of QED is a continuation of pioneering work by Vigier on Tight Bound States in Hydrogen. The new experimental protocol described not only promises empirical proof of large-scale extra dimensions in conjunction with avenues for testing string theory but also implies the birth of the field of Unified Field Mechanics ushering in a new age of discovery. Work on quantum computing redefines the qubit...

  13. Pursuing excellence in mathematics education essays in honor of Jeremy Kilpatrick

    CERN Document Server

    Silver, Edward

    2014-01-01

    ​Chapters in this book recognize the more than forty years of sustained and distinguished lifetime achievement in mathematics education research and development of Jeremy Kilpatrick. Including contributions from a variety of skilled mathematics educators, this text honors Jeremy Kilpatrick, reflecting on his groundbreaking papers, book chapters, and books - many of which are now standard references in the literature - on mathematical problem solving, the history of mathematics education, mathematical ability and proficiency, curriculum change and its history, global perspectives on mathematics education, and mathematics assessment. Many chapters also offer substantial contributions of their own on important themes, including mathematical problem solving, mathematics curriculum, the role of theory in mathematics education, the democratization of mathematics, and international perspectives on the professional field of mathematics education.​.

  14. Fiestas en honor a la Santa Muerte en el Caribe mexicano

    Directory of Open Access Journals (Sweden)

    Antonio Higuera Bonfil

    2015-07-01

    Full Text Available Se abordan tres fiestas en honor a la Santa Muerte en Chetumal. Se muestran los rasgos generales de las celebraciones organizadas anualmente por la parroquia del Señor de la Misericordia y la Santa Muerte, adscrita a la Iglesia Católica Tradicional México-Estados Unidos, así como por dos altares domésticos que operan como centros esotéricos. Caracterizar estas ocasiones permite entender la forma en que se ha desarrollado una práctica religiosa local, que lejos de tener una tradición única, alimenta rituales propios. Las diferentes estructuras locales permiten que los creyentes expresen su creencia mediante la inserción en la organización de estas fiestas.

  15. Bárbara Mujica, ed., Shakespeare and the Spanish «Comedia». Translation, Interpretation, Performance. Essays in Honor of Susan L. Fischer

    Directory of Open Access Journals (Sweden)

    Alejandro García-Reidy

    2016-01-01

    Full Text Available Reseña de Bárbara Mujica, ed., Shakespeare and the Spanish «Comedia». Translation, Interpretation, Performance. Essays in Honor of Susan L. Fischer, Bucknell University Press, Lewisburg, 2013, 298 pp. ISBN 9781611485172.

  16. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-01-01

    Full Text Available A Wireless Body Area Network (WBAN is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE applications. Since WBAN nodes are used to collect sensitive (life-critical information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS attacks in WBAN at Physical, Medium Access Control (MAC, Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP and Contention Free Period (CFP parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS in WBAN (since most of the data is carried in CFP period. As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  17. A study of IEEE 802.15.4 security framework for wireless body area networks.

    Science.gov (United States)

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  18. New Solutions Based On Wireless Networks For Dynamic Traffic Lights Management: A Comparison Between IEEE 802.15.4 And Bluetooth

    Directory of Open Access Journals (Sweden)

    Collotta Mario

    2015-09-01

    Full Text Available The Wireless Sensor Networks are widely used to detect and exchange information and in recent years they have been increasingly involved in Intelligent Transportation System applications, especially in dynamic management of signalized intersections. In fact, the real-time knowledge of information concerning traffic light junctions represents a valid solution to congestion problems. In this paper, a wireless network architecture, based on IEEE 802.15.4 or Bluetooth, in order to monitor vehicular traffic flows near to traffic lights, is introduced. Moreover, an innovative algorithm is proposed in order to determine dynamically green times and phase sequence of traffic lights, based on measured values of traffic flows. Several simulations compare IEEE 802.15.4 and Bluetooth protocols in order to identify the more suitable communication protocol for ITS applications. Furthermore, in order to confirm the validity of the proposed algorithm for the dynamic management of traffic lights, some case studies have been considered and several simulations have been performed.

  19. Experimental video signals distribution MMF network based on IEEE 802.11 standard

    Science.gov (United States)

    Kowalczyk, Marcin; Maksymiuk, Lukasz; Siuzdak, Jerzy

    2014-11-01

    The article was focused on presentation the achievements in a scope of experimental research on transmission of digital video streams in the frame of specially realized for this purpose ROF (Radio over Fiber) network. Its construction was based on the merge of wireless IEEE 802.11 network, popularly referred as Wi-Fi, with a passive optical network PON based on multimode fibers MMF. The proposed approach can constitute interesting proposal in area of solutions in the scope of the systems monitoring extensive, within which is required covering of a large area with ensuring of a relatively high degree of immunity on the interferences transmitted signals from video IP cameras to the monitoring center and a high configuration flexibility (easily change the deployment of cameras) of such network.

  20. Synchronous ethernet and IEEE 1588 in telecoms next generation synchronization networks

    CERN Document Server

    2013-01-01

    This book addresses the multiple technical aspects of the distribution of synchronization in new generation telecommunication networks, focusing in particular on synchronous Ethernet and IEEE1588 technologies. Many packet network engineers struggle with understanding the challenges that precise synchronization distribution can impose on networks. The usual “why”, “when” and particularly “how” can cause problems for many engineers. In parallel to this, some other markets have identical synchronization requirements, but with their own design requirements, generating further questions. This book attempts to respond to the different questions by providing background technical information. Invaluable information on state of-the-art packet network synchronization and timing architectures is provided, as well as an unbiased view on the synchronization technologies that have been internationally standardized over recent years, with the aim of providing the average reader (who is not skilled in the art) wi...

  1. Fault-Tolerant Topology and Routing Synthesis for IEEE Time-Sensitive Networking

    DEFF Research Database (Denmark)

    Gavrilut, Voica Maria; Zarrin, Bahram; Pop, Paul

    2017-01-01

    of the applications are satisffied. We propose three approaches to solve this optimization problem: (1) a heuristic solution, (2) a Greedy Randomized Adaptive Search Procedure (GRASP) metaheuristic, and (3) a Constraint Programmingbased model. The approaches are evaluated on several test cases, including a test case......Time-Sensitive Networking (TSN) is a set of IEEE standards that extend Ethernet for safety-critical and real-time applications. TSN is envisioned to be widely used in several applications areas, from industrial automation to in-vehicle networking. A TSN network is composed of end systems...... interconnected by physical links and bridges (switches). The data in TSN is exchanged via streams. We address safety-critical real-time systems, and we consider that the streams use the Urgency-Based Scheduler (UBS) traffic-type, suitable for hard real-time traffic. We are interested in determining a fault...

  2. Investigating Shifts in Diverse Family Structures in Newbery Award and Honor Books Utilizing U.S. Census Data, 1930-2010

    Science.gov (United States)

    Despain, Shannon M.; Tunnell, Michael O.; Wilcox, Brad; Morrison, Timothy G.

    2015-01-01

    Newbery Award and Honor books are a representation of children's literature, but family structures portrayed in them have not previously been studied. This prescriptive content analysis considered 87 contemporary realistic fiction Newbery winners and runners-up since the 1930s that portray families in English-speaking, Western settings. The family…

  3. An IEEE 802.3 Compatible Real Time Medium Access Control with Length-based Priority

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A new medium access control method is proposed over the predominant Ethernet broadcast channel. Taking advantages of intrinsic variable length characteristic of standard Ethernet frame, message-oriented dynamic priority mechanism is established. Prioritized medium access control operates under a so-called block mode in event of collisions.High priority messages have a chance to preempt block status incurred by low priority ones. By this means, the new MAC provides a conditional deterministic real time performance beyond a statistical one. Experiments demonstrate effectiveness and attractiveness of the proposed scheme. Moreover, this new MAC is completely compatible with IEEE802.3.

  4. Resource management framework for QoS scheduling in IEEE 802.16 WiMAX networks

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2009-01-01

    IEEE 802.16, also known as WiMAX, has received much attention recently for its capability to support multiple types of applications with diverse Quality-of-Service (QoS) requirements. Beyond what the standard has defined, radio resource management (RRM) still remains an open issue, which plays...... an important role in QoS provisioning for different types of services. In this chapter, we propose a downlink resource management framework for QoS scheduling in OFDMA based WiMAX systems. Our framework consists of a dynamic resource allocation (DRA) module and a connection admission control (CAC) module...

  5. Downlink resource management for QoS scheduling in IEEE 802.16 WiMAX networks

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2010-01-01

    IEEE 802.16, also known as WiMAX, has received much attention recently for its capability to support multiple types of applications with diverse Quality-of-Service (QoS) requirements. Beyond what the standard has defined, radio resource management (RRM) still remains an open issue, which plays...... an important role in QoS provisioning for different types of services. In this paper, we propose a downlink resource management framework for QoS scheduling in OFDMA based WiMAX systems. Our framework consists of a dynamic resource allocation (DRA) module and a connection admission control (CAC) module. A two...

  6. IEEE 802.15.4 MAC with GTS transmission for heterogeneous devices with application to wheelchair body-area sensor networks.

    Science.gov (United States)

    Shrestha, Bharat; Hossain, Ekram; Camorlinga, Sergio

    2011-09-01

    In wireless personal area networks, such as wireless body-area sensor networks, stations or devices have different bandwidth requirements and, thus, create heterogeneous traffics. For such networks, the IEEE 802.15.4 medium access control (MAC) can be used in the beacon-enabled mode, which supports guaranteed time slot (GTS) allocation for time-critical data transmissions. This paper presents a general discrete-time Markov chain model for the IEEE 802.15.4-based networks taking into account the slotted carrier sense multiple access with collision avoidance and GTS transmission phenomena together in the heterogeneous traffic scenario and under nonsaturated condition. For this purpose, the standard GTS allocation scheme is modified. For each non-identical device, the Markov model is solved and the average service time and the service utilization factor are analyzed in the non-saturated mode. The analysis is validated by simulations using network simulator version 2.33. Also, the model is enhanced with a wireless propagation model and the performance of the MAC is evaluated in a wheelchair body-area sensor network scenario.

  7. Improving the communication reliability of body sensor networks based on the IEEE 802.15.4 protocol.

    Science.gov (United States)

    Gomes, Diogo; Afonso, José A

    2014-03-01

    Body sensor networks (BSNs) enable continuous monitoring of patients anywhere, with minimum constraints to daily life activities. Although the IEEE 802.15.4 and ZigBee(®) (ZigBee Alliance, San Ramon, CA) standards were mainly developed for use in wireless sensors network (WSN) applications, they are also widely used in BSN applications because of device characteristics such as low power, low cost, and small form factor. However, compared with WSNs, BSNs present some very distinctive characteristics in terms of traffic and mobility patterns, heterogeneity of the nodes, and quality of service requirements. This article evaluates the suitability of the carrier sense multiple access-collision avoidance protocol, used by the IEEE 802.15.4 and ZigBee standards, for data-intensive BSN applications, through the execution of experimental tests in different evaluation scenarios, in order to take into account the effects of contention, clock drift, and hidden nodes on the communication reliability. Results show that the delivery ratio may decrease substantially during transitory periods, which can last for several minutes, to a minimum of 90% with retransmissions and 13% without retransmissions. This article also proposes and evaluates the performance of the BSN contention avoidance mechanism, which was designed to solve the identified reliability problems. This mechanism was able to restore the delivery ratio to 100% even in the scenario without retransmissions.

  8. Path loss variation of on-body UWB channel in the frequency bands of IEEE 802.15.6 standard.

    Science.gov (United States)

    Goswami, Dayananda; Sarma, Kanak C; Mahanta, Anil

    2016-06-01

    The wireless body area network (WBAN) has gaining tremendous attention among researchers and academicians for its envisioned applications in healthcare service. Ultra wideband (UWB) radio technology is considered as excellent air interface for communication among body area network devices. Characterisation and modelling of channel parameters are utmost prerequisite for the development of reliable communication system. The path loss of on-body UWB channel for each frequency band defined in IEEE 802.15.6 standard is experimentally determined. The parameters of path loss model are statistically determined by analysing measurement data. Both the line-of-sight and non-line-of-sight channel conditions are considered in the measurement. Variations of parameter values with the size of human body are analysed along with the variation of parameter values with the surrounding environments. It is observed that the parameters of the path loss model vary with the frequency band as well as with the body size and surrounding environment. The derived parameter values are specific to the particular frequency bands of IEEE 802.15.6 standard, which will be useful for the development of efficient UWB WBAN system.

  9. Optimal Throughput and Self-adaptability of Robust Real-Time IEEE 802.15.4 MAC for AMI Mesh Network

    International Nuclear Information System (INIS)

    Shabani, Hikma; Ahmed, Musse Mohamud; Khan, Sheroz; Hameed, Shahab Ahmed; Habaebi, Mohamed Hadi

    2013-01-01

    A smart grid refers to a modernization of the electricity system that brings intelligence, reliability, efficiency and optimality to the power grid. To provide an automated and widely distributed energy delivery, the smart grid will be branded by a two-way flow of electricity and information system between energy suppliers and their customers. Thus, the smart grid is a power grid that integrates data communication networks which provide the collected and analysed data at all levels in real time. Therefore, the performance of communication systems is so vital for the success of smart grid. Merit to the ZigBee/IEEE802.15.4std low cost, low power, low data rate, short range, simplicity and free licensed spectrum that makes wireless sensor networks (WSNs) the most suitable wireless technology for smart grid applications. Unfortunately, almost all ZigBee channels overlap with wireless local area network (WLAN) channels, resulting in severe performance degradation due to interference. In order to improve the performance of communication systems, this paper proposes an optimal throughput and self-adaptability of ZigBee/IEEE802.15.4std for smart grid

  10. From extreme pH to extreme temperature: An issue in honor of the geochemical contributions of Kirk Nordstrom, USGS hydrogeochemist

    Science.gov (United States)

    Campbell, Kate M.; Verplanck, Philip L.; McCleskey, R. Blaine; Alpers, Charles N.

    2015-01-01

    This special issue of Applied Geochemistry honors Dr. D. Kirk Nordstrom, and his influential career spent primarily at the U.S. Geological Survey (USGS). This issue does not herald his retirement or other significant career milestone, but serves as a recognition of the impact his work has had on the field of geochemistry in general. This special issue grew from a symposium in Kirk’s honor (affectionately dubbed “Kirkfest”) at the Geological Society of America’s annual meeting in Denver, Colorado, USA, during October 2013. At GSA, 27 talks and 35 posters showed how Kirk’s work has influenced a wide range of current hydrogeochemical research, from geothermal processes to acid mine drainage to geochemical modeling. The breadth of his knowledge and his many contributions to the published literature have left an indelible mark on the field of geochemistry, and this special issue is a tribute to his experience and contributions.

  11. A Power-Efficient Access Point Operation for Infrastructure Basic Service Set in IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Hua Ye Ming

    2006-01-01

    Full Text Available Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handheld devices with wireless LAN capability. In this paper, a hybrid protocol named improved PCF operation is proposed, which intelligently chooses the access point- (AP- assisted DCF (distributed coordinator function and enhanced PCF (point coordinator function transmission mechanism of IEEE 802.11 protocol in an infrastructure-based wireless LAN environment. Received signal strength indicator (RSSI is used to determine the tradeoff between direct mobile-to-mobile transmission and transmission routed by AP. Based on the estimation, mobile stations can efficiently communicate directly instead of being routed through AP if they are in the vicinity of each other. Furthermore, a smart AP protocol is proposed as extension to the improved PCF operation by utilizing the historical end-to-end delay information to decide the waking up time of mobile stations. Simulation results show that using the proposed protocol, energy consumption of mobile devices can be reduced at the cost of slightly longer end-to-end packet delay compared to traditional IEEE 802.11 PCF protocol. However, in a non-time-critical environment, this option can significantly prolong the operation time of mobile devices.

  12. Accurate Energy Consumption Modeling of IEEE 802.15.4e TSCH Using Dual-BandOpenMote Hardware.

    Science.gov (United States)

    Daneels, Glenn; Municio, Esteban; Van de Velde, Bruno; Ergeerts, Glenn; Weyn, Maarten; Latré, Steven; Famaey, Jeroen

    2018-02-02

    The Time-Slotted Channel Hopping (TSCH) mode of the IEEE 802.15.4e amendment aims to improve reliability and energy efficiency in industrial and other challenging Internet-of-Things (IoT) environments. This paper presents an accurate and up-to-date energy consumption model for devices using this IEEE 802.15.4e TSCH mode. The model identifies all network-related CPU and radio state changes, thus providing a precise representation of the device behavior and an accurate prediction of its energy consumption. Moreover, energy measurements were performed with a dual-band OpenMote device, running the OpenWSN firmware. This allows the model to be used for devices using 2.4 GHz, as well as 868 MHz. Using these measurements, several network simulations were conducted to observe the TSCH energy consumption effects in end-to-end communication for both frequency bands. Experimental verification of the model shows that it accurately models the consumption for all possible packet sizes and that the calculated consumption on average differs less than 3% from the measured consumption. This deviation includes measurement inaccuracies and the variations of the guard time. As such, the proposed model is very suitable for accurate energy consumption modeling of TSCH networks.

  13. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah.

    Science.gov (United States)

    Tian, Le; Khorov, Evgeny; Latré, Steven; Famaey, Jeroen

    2017-07-04

    IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing

  14. Real-Life Solutions to Real-Life Problems: Collaborating with a Non-Profit Foundation to Engage Honors Students in Applied Research

    Science.gov (United States)

    Stark, Emily

    2013-01-01

    Colleges and universities have long emphasized undergraduate research experiences as valuable activities for students. Collegiate honors programs in particular have embraced the role of student research as an integral experience for high-ability students, leading the way in developing the thesis-based model of undergraduate research that is…

  15. International conference on "Photosynthesis research for sustainability-2013: in honor of Jalal A. Aliyev", held during June 5-9, 2013, Baku, Azerbaijan.

    Science.gov (United States)

    Allakhverdiev, Suleyman I; Huseynova, Irada M; Govindjee

    2013-12-01

    In this brief report, we provide a pictorial essay on an international conference "Photosynthesis Research for Sustainability-2013 in honor of Jalal A. Aliyev" that was held in Baku, Azerbaijan, during June 5-9, 2013 ( http://photosynthesis2013.cellreg.org/ ). We begin this report with a brief note on Jalal Aliyev, the honored scientist, and on John Walker (1997 Nobel laureate in Chemistry) who was a distinguished guest and lecturer at the Conference. We briefly describe the Conference, and the program. In addition to the excellent scientific program, a special feature of the Conference was the presentation of awards to nine outstanding young investigators; they are recognized in this report. We have also included several photographs to show the pleasant ambience at this conference. (See http://photosynthesis2013.cellreg.org/Photo-Gallery.php ; https://www.dropbox.com/sh/qcr124dajwffwh6/TlcHBvFu4H?m ; and https://www.copy.com/s/UDlxb9fgFXG9/Baku for more photographs taken by the authors as well as by others.) We invite the readers to the next conferences on "Photosynthesis Research for Sustainability-2014: in honor of Vladimir A. Shuvalov" to be held during June 2-7, 2014, in Pushchino, Russia. Detailed information for this will be posted at the Website: http://photosynthesis2014.cellreg.org/ , and for the subsequent conference on "Photosynthesis Research for Sustainability-2015" to be held in May or June 2015, in Baku, Azerbaijan, at http://photosynthesis2015.cellreg.org/ .

  16. Feasibility of space-division-multiplexed transmission of IEEE 802.11 n/ac-compliant wireless MIMO signals over OM3 multimode fiber

    NARCIS (Netherlands)

    Lei, Yi; Li, Jianqiang; Meng, Ziyi; Wu, Rui; Wan, Zhiquan; Fan, Yuting; Zhang, Wenjia; Yin, Feifei; Dai, Yitang; Xu, Kun

    2018-01-01

    In this paper, we have experimentally demonstrated the feasibility of space-division-multiplexed 3 × 3 multiple-input multiple-output (MIMO) transmission over a single OM3 multimode fiber (MMF) using commercial IEEE 802.11 n/ac access points. Throughput performance for different fiber length links

  17. IEEE Conference on Software Engineering Education and Training (CSEE&T 2012) Proceedings (25th, Nanjing, Jiangsu, China, April 17-19, 2012)

    Science.gov (United States)

    IEEE Conference on Software Engineering Education and Training, Proceedings (MS), 2012

    2012-01-01

    The Conference on Software Engineering Education and Training (CSEE&T) is the premier international peer-reviewed conference, sponsored by the Institute of Electrical and Electronics Engineers, Inc. (IEEE) Computer Society, which addresses all major areas related to software engineering education, training, and professionalism. This year, as…

  18. 12th ACIS/IEEE International Conference on Computer Science and Information Science

    CERN Document Server

    2013-01-01

    This edited book presents scientific results of the 12th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013) which was held on June 16-20, 2013 in Toki Messe, Niigata, Japan. The aim of this conference was to bring together scientists, engineers, computer users, and students to share their experiences and exchange new ideas, research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them The conference organizers selected the best 20 papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review.    

  19. Mobile Device Passive Localization Based on IEEE 802.11 Probe Request Frames

    Directory of Open Access Journals (Sweden)

    Lin Sun

    2017-01-01

    Full Text Available This paper presents a novel passive mobile device localization mode based on IEEE 802.11 Probe Request frames. In this approach, the listener can discover mobile devices by receiving the Probe Request frames and localize them on his walking path. The unique location of the mobile device is estimated on a geometric diagram and right-angled walking path. In model equations, site-related parameter, that is, path loss exponent, is eliminated to make the approach site-independent. To implement unique localization, the right-angled walking path is designed and the optimal location is estimated from the optional points. The performance of our method has been evaluated inside the room, outside the room, and in outdoor scenarios. Three kinds of walking paths, for example, horizontal, vertical, and slanted, are also tested.

  20. IEEE 1394/firewire a low cost, high speed, digital serial bus

    Energy Technology Data Exchange (ETDEWEB)

    Gaunt, R.

    1997-05-01

    Does the world need yet another 1/0 bus standard? If you need fast and cheap serial video communication, then the answer is yes. As technology advances, so too must data transport mechanisms advance. You can`t expect RS-232 to support real-time digital video, and if you can`t afford expensive professional serial video interfaces, (such as Sony`s Serial Digital Interface), Firewire may be a good solution. IEEE 1394, or commonly known as Firewire, is a general purpose serial bus that meets many of the 1/0 needs of today`s video and multimedia developers. For those of you who only read the first paragraph, here`s Firewire in a nutshell: It provides a guaranteed transfer rate of 10OMbps or 20OMbps of digital data (such as video direct from camera to computer), over an inexpensive, non-proprietary serial bus. Here is a list of its features.

  1. Quality of Service Model on Data Link Layer for Mission Critical Traffic on IEEE 802.11g Networks in Infrastructure Mode

    Directory of Open Access Journals (Sweden)

    Gerald B. Fuenmayor-Rivadeneira

    2013-11-01

    Full Text Available This article presents a synthesized review as state of the art of the study of QoS for mission-critical traffic in wireless local area networks that use the IEEE 802.11g protocol. This is to highlight previous research for their contribution will constitute a reference to guide a proposed new approach to ensuring the quality of service for this type of traffic using the above protocol. The review is based on academic and business items made during the current five years. As a result of this review it is evident that there have been many efforts to address the issue but there are still gaps in the characterization of mission-critical traffic and ensuring quality of service for the same, due the new applications and the large host of WiFi networks in business and government, which has led to increased demand for access channels and, therefore, a challenge to the progress already known, such as IEEE 802.1q.

  2. Low-frequency electrical dosimetry: research agenda of the IEEE International Committee on Electromagnetic Safety.

    Science.gov (United States)

    Reilly, J Patrick; Hirata, Akimasa

    2016-06-21

    This article treats unsettled issues in the use of numerical models of electrical dosimetry as applied to international limits on human exposure to low-frequency (typically  IEEE-ICES (International Committee on Electromagnetic Safety) Technical Committee 95. The paper discusses 25 issues needing attention, fitting into three general categories: induction models; electrostimulation models; and human exposure limits. Of these, 9 were voted as 'high priority' by members of Subcommittee 6. The list is presented as a research agenda for refinements in numerical modeling with applications to human exposure limits. It is likely that such issues are also important in medical and electrical product safety design applications.

  3. Reliability characterization of SiON and MGHK MOSFETs using flicker noise and its correlation with the bias temperature instability

    Science.gov (United States)

    Samnakay, Rameez; Balandin, Alexander A.; Srinivasan, Purushothaman

    2017-09-01

    Bias temperature instability (BTI) is one of the critical device degradation mechanisms in poly-Si/SiON and metal gate/high-k complementary metal-oxide-semiconductor (CMOS) technologies. Using the pre- and post-BTI flicker noise measurements, we investigated the bulk trap density, Nt, in both of these technologies. The low-frequency noise spectra were predominantly of 1/fγ type with γ engineering team at Globalfoundries, Inc. during the summer of 2014. He has currently authored or co-authored 10 journal publications and numerous conference presentations. His current research interests include 1/f noise in high-k dielectrics and fabricated 2D van der Waal thin-film devices Mr. Samnakay's awards and honors include the Dean's Distinguished Fellowship Award (University of California-Riverside) and induction into the IEEE-HKN honors society. He also serves as a reviewer for 6 journals including Applied Physics Letters, Journal of Physics: Condensed Matter and Nanotechnology journals.

  4. Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3

    Science.gov (United States)

    Fujiwara, Toru; Kasami, Tadao; Lin, Shu

    1989-09-01

    The error-detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3 are investigated. These codes are also used for error detection in the data link layer of the Ethernet, a local area network. The weight distributions for various code lengths are calculated to obtain the probability of undetectable error and that of detectable error for a binary symmetric channel with bit-error rate between 0.00001 and 1/2.

  5. PV radiometrics workshop proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Myers, D.R.

    1995-09-01

    This report documents presentations and discussions held at the Photovoltaics Radiometeric Measurements Workshop conducted at Vail, Colorado, on July 24 and 25, 1995. The workshop was sponsored and financed by the Photovoltaic Module and Systems Performance and Engineering Project managed by Richard DeBlasio, Principal Investigator. That project is a component of the National Renewable Energy Laboratory (NREL) Photovoltaic Research and Development Program, conducted by NREL for the US Department of Energy, through the NREL Photovoltaic Engineering and Applications Branch, managed by Roland Hulstrom. Separate abstracts have been prepared for articles from this workshop.

  6. Hierarchical decision modeling essays in honor of Dundar F. Kocaoglu

    CERN Document Server

    2016-01-01

    This volume, developed in honor of Dr. Dundar F. Kocaoglu, aims to demonstrate the applications of the Hierarchical Decision Model (HDM) in different sectors and its capacity in decision analysis. It is comprised of essays from noted scholars, academics and researchers of engineering and technology management around the world. This book is organized into four parts: Technology Assessment, Strategic Planning, National Technology Planning and Decision Making Tools. Dr. Dundar F. Kocaoglu is one of the pioneers of multiple decision models using hierarchies, and creator of the HDM in decision analysis. HDM is a mission-oriented method for evaluation and/or selection among alternatives. A wide range of alternatives can be considered, including but not limited to, different technologies, projects, markets, jobs, products, cities to live in, houses to buy, apartments to rent, and schools to attend. Dr. Kocaoglu’s approach has been adopted for decision problems in many industrial sectors, including electronics rese...

  7. Interoperable End-to-End Remote Patient Monitoring Platform Based on IEEE 11073 PHD and ZigBee Health Care Profile.

    Science.gov (United States)

    Clarke, Malcolm; de Folter, Joost; Verma, Vivek; Gokalp, Hulya

    2018-05-01

    This paper describes the implementation of an end-to-end remote monitoring platform based on the IEEE 11073 standards for personal health devices (PHD). It provides an overview of the concepts and approaches and describes how the standard has been optimized for small devices with limited resources of processor, memory, and power that use short-range wireless technology. It explains aspects of IEEE 11073, including the domain information model, state model, and nomenclature, and how these support its plug-and-play architecture. It shows how these aspects underpin a much larger ecosystem of interoperable devices and systems that include IHE PCD-01, HL7, and BlueTooth LE medical devices, and the relationship to the Continua Guidelines, advocating the adoption of data standards and nomenclature to support semantic interoperability between health and ambient assisted living in future platforms. The paper further describes the adaptions that have been made in order to implement the standard on the ZigBee Health Care Profile and the experiences of implementing an end-to-end platform that has been deployed to frail elderly patients with chronic disease(s) and patients with diabetes.

  8. IEEE guide for planning of pre-operational testing programs for class 1E power systems for nuclear-power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1976-01-01

    The Institute of Electrical and Electronics Engineers (IEEE) guide for pre-operational testing of Class 1E power systems for nuclear-power generating stations is presented. The guidelines apply to power systems both ac and dc supplies but not to the equipment which utilizes the ac and dc power. The pre-operational tests are performed after appropriate construction tests

  9. Proceedings of the IEEE International Workshop on Safety of Systems (1st) held in Monterey, California on 15-16 Mar 2007

    Science.gov (United States)

    2007-03-01

    assurance that span safety, security and other aspects of dependability, such as ISO /IEC 15026, and safety standards such as AOP 52 and MIL-STD-882...needed/finished skill  Human Resources Role-based/Right-fit  Software Acquisition Management IEEE 12207 as baseline  No requirements management  No

  10. Undergraduate honors students' images of science: Nature of scientific work and scientific knowledge

    Science.gov (United States)

    Wallace, Michael L.

    This exploratory study assessed the influence of an implicit, inquiry-oriented nature of science (NOS) instructional approach undertaken in an interdisciplinary college science course on undergraduate honor students' (UHS) understanding of the aspects of NOS for scientific work and scientific knowledge. In this study, the nature of scientific work concentrated upon the delineation of science from pseudoscience and the value scientists place on reproducibility. The nature of scientific knowledge concentrated upon how UHS view scientific theories and how they believe scientists utilize scientific theories in their research. The 39 UHS who participated in the study were non-science majors enrolled in a Honors College sponsored interdisciplinary science course where the instructors took an implicit NOS instructional approach. An open-ended assessment instrument, the UFO Scenario, was designed for the course and used to assess UHS' images of science at the beginning and end of the semester. The mixed-design study employed both qualitative and quantitative techniques to analyze the open-ended responses. The qualitative techniques of open and axial coding were utilized to find recurring themes within UHS' responses. McNemar's chi-square test for two dependent samples was used to identify whether any statistically significant changes occurred within responses from the beginning to the end of the semester. At the start of the study, the majority of UHS held mixed NOS views, but were able to accurately define what a scientific theory is and explicate how scientists utilize theories within scientific research. Postinstruction assessment indicated that UHS did not make significant gains in their understanding of the nature of scientific work or scientific knowledge and their overall images of science remained static. The results of the present study found implicit NOS instruction even with an extensive inquiry-oriented component was an ineffective approach for modifying UHS

  11. Performance analyses and improvements for the IEEE 802.15.4 CSMA/CA scheme with heterogeneous buffered conditions.

    Science.gov (United States)

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes-OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)-are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  12. Compliance and Functional Testing of IEEE 1451.1 for NCAP-to-NCAP Communications in a Sensor Network

    Science.gov (United States)

    Figueroa, Jorge; Gurkan, Deniz; Yuan, X.; Benhaddou, D.; Liu, H.; Singla, A.; Franzl, R.; Ma, H.; Bhatt, S.; Morris, J.; hide

    2008-01-01

    Distributed control in a networked environment is an irreplaceable feature in systems with remote sensors and actuators. Although distributed control was not originally designed to be networked, usage of off-the-shelf networking technologies has become so prevalent that control systems are desired to have access mechanisms similar to computer networks. However, proprietary transducer interfaces for network communications and distributed control overwhelmingly dominate this industry. Unless the lack of compatibility and interoperability among transducers is resolved, the mature level of access (that computer networking can deliver) will not be achieved in such networked distributed control systems. Standardization of networked transducer interfaces will enable devices from different manufacturers to talk to each other and ensure their plug-and-play capability. One such standard is the suite of IEEE 1451 for sensor network communication and transducer interfaces. The suite not only provides a standard interface for smart transducers, but also outlines the connection of an NCAP (network capable application processor) and transducers (through a transducer interface module TIM). This paper presents the design of the compliance testing of IEEE 1451.1 (referred to as Dot1) compatible NCAP-to-NCAP communications on a link-layer independent medium. The paper also represents the first demonstration of NCAP-to-NCAP communications with Dot1 compatibility: a tester NCAP and an NCAP under test (NUT).

  13. 3th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2015-01-01

    This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference.  The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference’s most promis...

  14. The IEEE guide to writing in the engineering and technical fields

    CERN Document Server

    Kmiec, David

    2017-01-01

    This book introduces students and practicing engineers to all the components of writing in the workplace. It teaches readers how considerations of audience and purpose govern the structure of their documents within particular work settings. The IEEE Guide to Writing in the Engineering and Technical Fields is broken up into two sections: "Writing in Engineering Organizations" and "What Can You Do With Writing?" The first section helps readers approach their writing in a logical and persuasive way as well as analyze their purpose for writing. The second section demonstrates how to distinguish rhetorical situations and the generic forms to inform, train, persuade, and collaborate. The emergence of the global workplace has brought with it an increasingly important role for effective technical communication. Engineers more often need to work in cross-functional teams with people in different disciplines, in different countries, and in different parts of the world. Engineers must know how to communicate in a rapid...

  15. Fir Filters Compliant with the IEEE Standard for M Class PMU

    Directory of Open Access Journals (Sweden)

    Duda Krzysztof

    2016-12-01

    Full Text Available In this paper it is shown that M class PMU (Phasor Measurement Unit reference model for phasor estimation recommended by the IEEE Standard C37.118.1 with the Amendment 1 is not compliant with the Standard. The reference filter preserves only the limits for TVE (total vector error, and exceeds FE (frequency error and RFE (rate of frequency error limits. As a remedy we propose new filters for phasor estimation for M class PMU that are fully compliant with the Standard requirements. The proposed filters are designed: 1 by the window method; 2 as flat-top windows; or as 3 optimal min-max filters. The results for all Standard compliance tests are presented, confirming good performance of the proposed filters. The proposed filters are fixed at the nominal frequency, i.e. frequency tracking and adaptive filter tuning are not required, therefore they are well suited for application in lowcost popular PMUs.

  16. Introducing Scientific Literature to Honors General Chemistry Students: Teaching Information Literacy and the Nature of Research to First-Year Chemistry Students

    Science.gov (United States)

    Ferrer-Vinent, Ignacio J.; Bruehl, Margaret; Pan, Denise; Jones, Galin L.

    2015-01-01

    This paper describes the methodology and implementation of a case study introducing the scientific literature and creative experiment design to honors general chemistry laboratory students. The purpose of this study is to determine whether first-year chemistry students can develop information literacy skills while they engage with the primary…

  17. Harmonic analysis, partial differential equations and applications in honor of Richard L. Wheeden

    CERN Document Server

    Franchi, Bruno; Lu, Guozhen; Perez, Carlos; Sawyer, Eric

    2017-01-01

    This is a collection of contributed papers by many eminent Harmonic Analysts and specialists of Partial Differential equations. The papers focus on weighted norm equalities for singular integrals, focusing wave equations, degenerate elliptic equations, Navier-Stokes flow in two dimensions and Poincare-Sobolev inequalities in the setting of metric spaces equipped with measures among others. Many topics considered in this volume stem from the interests of Richard L. Wheeden whose contributions to Potential Theory, singular integral theory and degenerate elliptic PDE theory this volume honors. Luis Caffarelli, Sagun Chanillo, Bruno Franchi, Cristian Guttierez, Xiaojun Huang, Carlos Kenig, Ermanno Lanconelli, Eric Sawyer and Alexander Volberg, are some of the many contributors to this volume. .

  18. Fundamentos prácticos de seguridad en redes inalámbricas ieee 802.11

    OpenAIRE

    Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David

    2010-01-01

    Este artículo presenta una discusión tutorial de tres estándares de seguridad de uso común en las redes inalámbri-cas IEEE 802.11: WEP, WPA y WPA2. Se realiza un análisis detallado del algoritmo RC4 que soporta a WEP y se in-dican sus vulnerabilidades. También se revisan los aspectos y características técnicas más relevantes de los protoco-los de cifrado WPA y WPA2 con la finalidad de hacer un análisis comparativo de los tres estándares en términos de la seguridad que ellos proporcionan. Se h...

  19. Risk and reliability analysis theory and applications : in honor of Prof. Armen Der Kiureghian

    CERN Document Server

    2017-01-01

    This book presents a unique collection of contributions from some of the foremost scholars in the field of risk and reliability analysis. Combining the most advanced analysis techniques with practical applications, it is one of the most comprehensive and up-to-date books available on risk-based engineering. All the fundamental concepts needed to conduct risk and reliability assessments are covered in detail, providing readers with a sound understanding of the field and making the book a powerful tool for students and researchers alike. This book was prepared in honor of Professor Armen Der Kiureghian, one of the fathers of modern risk and reliability analysis.

  20. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic.

    Science.gov (United States)

    Šljivo, Amina; Kerkhove, Dwight; Tian, Le; Famaey, Jeroen; Munteanu, Adrian; Moerman, Ingrid; Hoebeke, Jeroen; De Poorter, Eli

    2018-01-23

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning

  1. Relocating the history of science essays in honor of Kostas Gavroglu

    CERN Document Server

    Renn, Jurgen; Simoes, Ana

    2015-01-01

    This volume is put together in honor of a distinguished historian of science, Kostas Gavroglu, whose work has won international acclaim, and has been pivotal in establishing the discipline of history of science in Greece, its consolidation in other countries of the European Periphery, and the constructive dialogue of these emerging communities with an extended community of international scholars. The papers in the volume reflect Gavroglu’s broad range of intellectual interests and touch upon significant themes in recent history and philosophy of science. They include topics in the history of modern physical sciences, science and technology in the European periphery, integrated history and philosophy of science, historiographical considerations, and intersections with the history of mathematics, technology and contemporary issues. They are authored by eminent scholars whose academic and personal trajectories crossed with Gavroglu’s. The book will interest historians and philosophers of science and techno...

  2. THE INFLUENCE OF MAC BUFFER ON THE CONTENTION-BASED ACCESS SCHEME WITH BURSTING OPTION FOR IEEE 802.11E WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    S. SELVAKENNEDY

    2006-12-01

    Full Text Available Wireless LANs are increasingly being used for inelastic applications. Currently, there is little support for quality of service in the IEEE 802.11 MAC protocol, and IEEE task group E has defined the 802.11e MAC extension. Enhanced distributed channel access (EDCA is a contention-based scheme of the 802.11e standard. To allow a station to transmit more than one frame from a single contention, an optional feature known as controlled frame-bursting (CFB is introduced in the standard. In this paper, we initially performed an average analysis to determine a suitable burst duration limit. Then, a detailed evaluation and comparison of the EDCA protocol with the CFB option is carried out through simulation to quantify its performance gain. The impact of the MAC transmit buffer size is also incorporated. Accordingly, we have proposed a suitable approach to guide the configuration of the burst duration limit. It is demonstrated that an optimized CFB configuration allows the MAC protocol to achieve 30% more capacity than the basic EDCA scheme.

  3. Bo Xilai :China will honor its World Trade Organization(WTO) commitments. Banking and telecommunications market sectors would be opened in time

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    @@ Minister of Commerce Bo Xilai promised on September 4 that China will honor its WTO commitments. At a ceremony to mark China's five-year WTO partnership, Bo Xilai promised this to commercial leaders of Europe present again. Bo said all market sectors would be opened in time, referring especially to banking and telecommunications.

  4. Adaptive QoS provision for IEEE 802.16e BWA networks based on cross-layer design

    Directory of Open Access Journals (Sweden)

    Kuo GS

    2011-01-01

    Full Text Available Abstract This article proposes an integrated framework for adaptive QoS provision in IEEE 802.16e broadband wireless access networks based on cross-layer design. On one hand, an efficient admission control (AC algorithm is proposed along with a semi-reservation scheme to guarantee the connection-level QoS. First, to guarantee the service continuity for handoff connections and resource efficiency, our semi-reservation scheme considers both users' handoff probability and average resource consumption together, which effectively avoids resource over-reservation and insufficient reservation. For AC, a new/handoff connection is accepted only when the target cell has enough resource to afford both instantaneous and average resource consumption to meet the average source rate request. On the other hand, a joint resource allocation and packet scheduling scheme is designed to provide packet-level QoS guarantee in term of "QoS rate", which can ensure fairness for the services with identical priority level in case of bandwidth shortage. Particularly, an enhanced bandwidth request scheme is designed to reduce unnecessary BR delay and redundant signaling overhead caused by the existing one in IEEE 802.16e, which further improves the packet-level QoS performance and resource efficiency for uplink transmission. Simulation results show that the proposed approach not only balances the tradeoff among connection blocking rate, connection dropping rate, and connection failure rate, but also achieves low mean packet dropping rate (PDR, small deviation of PDR, and low QoS outage rate. Moreover, high resource efficiency is ensured.

  5. Jesus the Healer: A Sermon in Honor of the Memory of Donald Eric Capps (1939-2015).

    Science.gov (United States)

    Ferrell, Donald R

    2018-04-01

    The article below is a sermon preached in 2008. It was inspired by Donald Capps's book, Jesus the Village Psychiatrist. I offer this sermon in honor of his memory as a creative contributor to the work of the Journal as well as his distinguished career as Professor of Pastoral Theology at Princeton Theological Seminary. Many of us have been blessed by his profound psychological and theological insights into the human psyche, his scholarly explorations of the relationship of psychology and religion, and his remarkable sense of humor. We are diminished by his absence.

  6. Notice of Violation of IEEE Publication PrinciplesJoint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath

    Science.gov (United States)

    Li, Lei; Hu, Jianhao

    2010-12-01

    Notice of Violation of IEEE Publication Principles"Joint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath"by Lei Li and Jianhao Hu,in the IEEE Transactions on Nuclear Science, vol.57, no.6, Dec. 2010, pp. 3779-3786After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.This paper contains substantial duplication of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:"Multiple Error Detection and Correction Based on Redundant Residue Number Systems"by Vik Tor Goh and M.U. Siddiqi,in the IEEE Transactions on Communications, vol.56, no.3, March 2008, pp.325-330"A Coding Theory Approach to Error Control in Redundant Residue Number Systems. I: Theory and Single Error Correction"by H. Krishna, K-Y. Lin, and J-D. Sun, in the IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.39, no.1, Jan 1992, pp.8-17In this paper, we propose a joint scheme which combines redundant residue number systems (RRNS) with module isolation (MI) for mitigating single event multiple bit upsets (SEMBUs) in datapath. The proposed hardening scheme employs redundant residues to improve the fault tolerance for datapath and module spacings to guarantee that SEMBUs caused by charge sharing do not propagate among the operation channels of different moduli. The features of RRNS, such as independence, parallel and error correction, are exploited to establish the radiation hardening architecture for the datapath in radiation environments. In the proposed

  7. IEEE Validation of the Continuing Education Achievement of Engineers Registry System. Procedures for Use with a CPT 8000 Word Processor and Communications Package.

    Science.gov (United States)

    Institute of Electrical and Electronics Engineers, Inc., New York, NY.

    The Institute of Electrical and Electronics Engineers (IEEE) validation program is designed to motivate persons practicing in electrical and electronics engineering to pursue quality technical continuing education courses offered by any responsible sponsor. The rapid acceptance of the validation program necessitated the additional development of a…

  8. Performance Analyses and Improvements for the IEEE 802.15.4 CSMA/CA Scheme with Heterogeneous Buffered Conditions

    Directory of Open Access Journals (Sweden)

    Chunfeng Lv

    2012-04-01

    Full Text Available Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes—OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme—are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  9. IEEE 802.11-Based Wireless Sensor System for Vibration Measurement

    Directory of Open Access Journals (Sweden)

    Yutaka Uchimura

    2010-01-01

    Full Text Available Network-based wireless sensing has become an important area of research and various new applications for remote sensing are expected to emerge. One of the promising applications is structural health monitoring of building or civil engineering structure and it often requires vibration measurement. For the vibration measurement via wireless network, time synchronization is indispensable. In this paper, we introduce a newly developed time synchronized wireless sensor network system. The system employs IEEE 802.11 standard-based TSF-counter and sends the measured data with the counter value. TSF based synchronization enables consistency on common clock among different wireless nodes. We consider the scale effect on synchronization accuracy and evaluated the effect by taking beacon collisions into account. The scalability issue by numerical simulations is also studied. This paper also introduces a newly developed wireless sensing system and the hardware and software specifications are introduced. The experiments were conducted in a reinforced concrete building to evaluate synchronization accuracy. The developed system was also applied for a vibration measurement of a 22-story steel structured high rise building. The experimental results showed that the system performed more than sufficiently.

  10. Is a Multi-Hop Relay Scheme Gainful in an IEEE 802.22-Based Cognitive Radio System?

    Science.gov (United States)

    Shin, Jungchae; Lee, Dong-Kyu; Cho, Ho-Shin

    In this paper, we formulate a plan to operate multi-hop relays in IEEE 802.22-based cognitive radio (CR) systems and evaluate system performance to consider the propriety of a multi-hop relay scheme in CR systems. A centralized radio resource management and a simple deployment of relay stations (RSs) are assessed to make relay operations feasible under CR conditions. Simulation results show that the proposed multi-hop relay scheme significantly increases system throughput compared to a no-relay CR system as the incumbent user (IU) traffic gets heavier. Furthermore, the optimal number of hops can be determined given the traffic conditions.

  11. Introduction to the special issue on the 2011 Joint IEEE International Frequency Control Symposium and European Frequency and Time Forum.

    Science.gov (United States)

    Burt, Eric; Gill, Patrick

    2012-03-01

    The 8 invited and 17 contributed papers in this special issue focus on the following topical areas covered at the 2011 Joint IEEE International Frequency Control Symposium and European Frequency and Time Forum, held in San Francisco, California: 1) Materials and Resonators; 2) Oscillators, Synthesizers, and Noise; 3) Microwave Frequency Standards; 4) Sensors and Transducers; 5) Timekeeping and Time and Frequency Transfer; and 6) Optical Frequency Standards.

  12. Significant Learning Experiences and Ignatian Pedagogy: A Case Study of Curricula, Academic Practices, and Graduate Outcomes in Jesuit Universities' Honors Programs

    Science.gov (United States)

    Pampel, Robert

    2017-01-01

    This qualitative, multisite case study used Dee Fink's taxonomy of significant learning as a lens through which to examine the curricular structure, academic practices, and graduate outcomes for honors programs at Jesuit colleges and universities in the United States. Special attention was given to the distinctive quality of Ignatian pedagogy and…

  13. Exploring the Relationship of College Freshmen Honors Students' Effort and Ability Attribution, Interest, and Implicit Theory of Intelligence with Perceived Ability

    Science.gov (United States)

    Siegle, Del; Da Via Rubenstein, Lisa; Pollard, Elizabeth; Romey, Elizabeth

    2010-01-01

    Although there are several explanations for why one succeeds or fails, effort and ability are the major causes that students report. The purpose of the present study was to measure the perceptions of 149 college freshmen enrolled in a university honors program about their skills in 15 talent areas. In addition, this study explored the relationship…

  14. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Marco Passafiume

    2017-03-01

    Full Text Available Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.

  15. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks.

    Science.gov (United States)

    Passafiume, Marco; Maddio, Stefano; Cidronali, Alessandro

    2017-03-29

    Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI) measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality) has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.

  16. Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i

    Directory of Open Access Journals (Sweden)

    De Rango Floriano

    2006-01-01

    Full Text Available This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outlined. The last phase of the authentication process, represented by the 4-way handshake procedure, is shown to be unsafe from DoS attack. This can produce the undesired effect of memory exhaustion if a flooding DoS attack is conducted. In order to avoid DoS attack without increasing the complexity of wireless mobile devices too much and without changing through some further control fields of the frame structure of wireless security protocols, a solution is found and an extension of WPA and IEEE 802.11 is proposed. A protocol extension with three "static" variants and with a resource-aware dynamic approach is considered. The three enhancements to the standard protocols are achieved through some simple changes on the client side and they are robust against DoS and DoS flooding attack. Advantages introduced by the proposal are validated by simulation campaigns and simulation parameters such as attempted attacks, successful attacks, and CPU load, while the algorithm execution time is evaluated. Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different resource availability in terms of CPU and memory or if resource availability significantly changes in time, a dynamic approach that is able to switch among three different modalities could be more suitable.

  17. From Comedy to the Sacramental Play: from Honor to Forgiveness in Lope de Vega

    Directory of Open Access Journals (Sweden)

    J. Enrique Duarte Lueiro

    2017-11-01

    Full Text Available The author of this article reviews the critical bibliography of the sacramental plays by Lope to show how scholars have always considered that this writer adapted elements and resources taken from his comedies into the sacramental plays. Actually, this article analyses the code of honor relevant in comic comedies and tragedies with different results. But this convention is also coherent with the sacramental genre, because it is supported by images and biblical metaphors and, in this case, they force a determined end. Equally, we have to take into consideration that the playwright employs other means specific of the auto sacramental to allow the allegory to operate and connect its two allegorical levels.

  18. A QoS Enhancement Scheme through Joint Control of Clear Channel Assessment Threshold and Contending Window for IEEE 802.11e Broadcasting

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2017-01-01

    Full Text Available In a WLAN, when a great many nodes coexist, the network may readily be congested, thus causing packets dropping and network performance degradation. To solve this issue, a lot of schemes have been proposed. However, most of the previous works attempt to avoid the possible channel congestion by controlling the packets generation rate and/or transmitting power of nodes, while the effects of Clear Channel Assessment (CCA threshold are not well examined. In our paper, a Joint CCA threshold and contending window control algorithm (JCCA is proposed to avoid channel congestion or reduce the congestion probability of broadcasting in an IEEE 802.11e network. Both the network conditions and the priorities of messages are taken into account to improve the broadcasting performance in our paper. According to the simulation results, it can be concluded that our scheme can significantly increase the network throughput as well as packets delivery ratio and reduce the packet transmission delay compared to the IEEE 802.11e and Adaptive Carrier Sensing-Based MAC Designs (ACSBM protocol.

  19. 2011 IEEE Visualization Contest winner: Visualizing unsteady vortical behavior of a centrifugal pump.

    Science.gov (United States)

    Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger

    2012-01-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump's effectiveness. The winning entry split analysis of the pump into three parts based on the pump's functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump.

  20. IEEE [Institute of Electrical and Electronics Engineers] standards and nuclear software quality engineering

    International Nuclear Information System (INIS)

    Daughtrey, T.

    1988-01-01

    Significant new nuclear-specific software standards have recently been adopted under the sponsorship of the American Nuclear Society and the American Society of Mechanical Engineers. The interest of the US Nuclear Regulatory Commission has also been expressed through their issuance of NUREG/CR-4640. These efforts all indicate a growing awareness of the need for thorough, referenceable expressions of the way to build in and evaluate quality in nuclear software. A broader professional perspective can be seen in the growing number of software engineering standards sponsored by the Institute of Electrical and Electronics Engineers (IEEE) Computer Society. This family of standards represents a systematic effort to capture professional consensus on quality practices throughout the software development life cycle. The only omission-the implementation phase-is treated by accepted American National Standards Institute or de facto standards for programming languages