WorldWideScience

Sample records for multiple access tdma

  1. A comparison of Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) approaches to satellite service for low data rate Earth stations

    Science.gov (United States)

    Stevens, G.

    1983-01-01

    A technological and economic assessment is made of providing low data rate service to small earth stations by satellite at Ka-band. Various Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) scenarios are examined and compared on the basis of cost to the end user. Very small stations (1 to 2 meters in diameter) are found not to be viable alternatives to available terrestrial services. However, medium size (3 to 5 meters) earth stations appear to be very competitive if a minimum throughput of about 1.5 Mbs is maintained. This constrains the use of such terminals to large users and shared use by smaller users. No advantage was found to the use of FDMA. TDMA had a slight advantage from a total system viewpoint and a very significant advantage in the space segment (about 1/3 the required payload weight for an equivalent capacity).

  2. Fade detector for the FODA-TDMA access scheme

    Science.gov (United States)

    Celandroni, Nedo; Ferro, Erina; Marzoli, Antonio

    1989-05-01

    The First in first out Ordered Demand Assignment-Time Division Multiple Access (FODA-TDMA) satellite access scheme designed for simultaneous transmissions of real time data, like packetized voice and slow-scan images (stream traffic) and data coming from standard EDP applications, such as bulk data tansfer, interactive computer access, mailing, data base enquiry and updating (datagram traffic) is described. When deep fades are experienced due to rain attenuation, the system is able to counter the fade. Techniques to detect the fade are presented.

  3. GSR-TDMA: A Geometric Spatial Reuse-Time Division Multiple Access MAC Protocol for Multihop Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2016-01-01

    Full Text Available The nonnegligible propagation delay of acoustic signals causes spatiotemporal uncertainty that occasionally enables simultaneous, collision-free packet transmission among underwater nodes (UNs. These transmissions can be handled by efficiently managing the channel access of the UNs in the data-link layer. To this end, Geometric Spatial Reuse-TDMA (GSR-TDMA, a new TDMA-based MAC protocol, is designed for use in centralized, multihop underwater acoustic sensor networks (UASNs, and in this case all UNs are periodically scheduled after determining a geometric map according to the information on their location. The scheduling strategy increases the number of UNs that send packets coincidentally via two subscheduling configurations (i.e., interhop and intrahop scheduling. Extensive simulations are used to investigate the reception success rate (RSR and the multihop delay (MHD of GSR-TDMA, and the results are compared to those of previous approaches, including C-MAC and HSR-TDMA. GSR-TDMA outperforms C-MAC; the RSR of GSR-TDMA is 15% higher than that of C-MAC, and the MHD of GSR-TDMA is 30% lower than that of C-MAC at the most. In addition, GSR-TDMA provides even better performance improvements over HSR-TDMA; the RSR of GSR-TDMA is 50% higher than that of HSR-TDMA, and the MHD of GSR-TDMA is an order of 102 lower than that of HSR-TDMA at the most.

  4. Performance Analysis of TDMA Protocol in a Femtocell Network

    Directory of Open Access Journals (Sweden)

    Wanod Kumar

    2014-07-01

    Full Text Available In this paper, we evaluate the performance of TDMA (Time Division Multiple Access protocol using queuing theory in a femtocell network. The fair use of wireless channel among the users of network is carried out using TDMA protocol. The arrival of data packets from M communicating nodes becomes multiple Poisson process. The time slots of TDMA protocol represent c servers to communicate data packets coming from communicating nodes to the input of FAP (Femtocell Access Point. The service time of each server (time slot is exponentially distributed. This complete communication scenario using TDMA protocol is modeled using M/M/c queue. The performance of the protocol is evaluated in terms of mean number in system, average system delay and utilization for varying traffic intensity

  5. Energy-efficient TDMA medium access control protocol scheduling

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerard J.M.

    2000-01-01

    In this paper we study the energy efficiency and channel efficiency of TDMA MAC protocol scheduling mechanisms. Most MAC protocols are based on phase grouping that basically has three phases in a frame: uplink, downlink and reservation. We propose a new mechanism in which we have multiple uplink and

  6. Time division multiple access for vehicular communications

    CERN Document Server

    Omar, Hassan Aboubakr

    2014-01-01

    This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.

  7. Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things.

    Science.gov (United States)

    Sun, Yanjing; Guo, Yiyu; Li, Song; Wu, Dapeng; Wang, Bin

    2018-05-15

    In this paper, a joint non-orthogonal multiple access and time division multiple access (NOMA-TDMA) scheme is proposed in Industrial Internet of Things (IIoT), which allowed multiple sensors to transmit in the same time-frequency resource block using NOMA. The user scheduling, time slot allocation, and power control are jointly optimized in order to maximize the system α -fair utility under transmit power constraint and minimum rate constraint. The optimization problem is nonconvex because of the fractional objective function and the nonconvex constraints. To deal with the original problem, we firstly convert the objective function in the optimization problem into a difference of two convex functions (D.C.) form, and then propose a NOMA-TDMA-DC algorithm to exploit the global optimum. Numerical results show that the NOMA-TDMA scheme significantly outperforms the traditional orthogonal multiple access scheme in terms of both spectral efficiency and user fairness.

  8. Comparison of TCeMA and TDMA for Inter-Satellite Communications using OPNET Simulation

    Science.gov (United States)

    Hain, Regina Rosales; Ramanathan, Ram; Bergamo, Marcos; Wallett, Thomas M.

    2003-01-01

    A robust data link protocol, enabling unique physical and MAC layer technologies and sub-network level protocols, is needed in order to take advantage of the full potential of using both TDMA and CDMA in a satellite communication network. A novel MAC layer protocol, TDMA with CDMA-encoding multiple access (TCeMA) integrated with null-steered digital beam-forming spatial multiplexing, is investigated to support flexible spacecraft communications. Abstract models of the TCeMA and TDMA processes are developed in OPNFiT and a comparison of the performances of TCeMA and TDMA in a satellite network simulation are made. TCeMA provides the better connectivity and capacity with respect to TDMA for satellite communication traffic.

  9. Dynamic Cognitive Self-Organized TDMA for Medium Access Control in Real-Time Vehicle to Vehicle Communications

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2013-01-01

    Full Text Available The emergence of intelligent transport systems has brought out a new set of requirements on wireless communication. To cope with these requirements, several proposals are currently under discussion. In this highly mobile environment, the design of a prompt, efficient, flexible, and reliable medium access control, able to cover the specific constraints of the named real-time communications applications, is still unsolved. This paper presents the original proposal integrating Non-Cooperative Cognitive Time Division Multiple Access (NCC-TDMA based on Cognitive Radio (CR techniques to obtain a mechanism which complies with the requirements of real-time communications. Though the proposed MAC uses a slotted channel, it can be adapted to operate on the physical layer of different standards. The authors’ analysis considers the IEEE WAVE and 802.11p as the standards of reference. The mechanism also offers other advantages, such as avoiding signalling and the adaptation capacity to channel conditions and interferences. The solution is applied to the problem of units merging a convoy. Comparison results between NCC-TDMA and Slotted-Aloha are included.

  10. Random transmission scheme approach for a FMCW TDMA coherent MIMO radar

    NARCIS (Netherlands)

    Belfiori, F.; Rossum, W.L. van; Hoogeboom, P.

    2012-01-01

    In this paper the authors analyze the use of Time Division Multiple Access (TDMA) applied to coherent Multiple-Input Multiple-Output (MIMO) radar systems. One of the main limitations in exploiting the orthogonal condition in the time domain for MIMO radars is the reduction of the unambiguous Doppler

  11. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.; Ho, Pin-Han; Shen, Gangxiang; Shihada, Basem

    2014-01-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  12. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.

    2014-06-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  13. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  14. GCF: Green Conflict Free TDMA Scheduling for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    The last few years have seen the promising growth in the application of wireless sensor networks (WSNs). The contribution of this paper is on a cluster-based time division multiple access (TDMA) scheduling algorithm to improve the performance of WSN applications in terms of energy efficiency, delay...

  15. Theoretical Investigation into Spectral Coexistence of CDMA and TDMA Systems

    Directory of Open Access Journals (Sweden)

    A.M. Abbosh

    2008-12-01

    Full Text Available The scarcity of available radio spectrum presently limits the extension of modern multimedia systems. This paper presents a theoretical investigation into the possibility of using a frequency overlay of a narrowband Code Division Multiple Access (CDMA System and a Time Division Multiple Access (TDMA System to provide a greater spectral efficiency. This paper shows that under certain conditions the two systems can operate in the same frequency band and in the same area with a considerable improvement in the overall capacity of the whole system.

  16. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    (LMAC); the average data latency of S-TDMA is 6.3 ms, 7.02% lower than Preamble-based TDMA (PB-TDMA); the transmission efficiency of S-TDMA is 93.67%, 4.83% higher than IEEE 802.15.6 carrier sense multiple access/collision avoidance (CSMA/CA) protocol. With respect to the challenges of HBC based WBANs, a novel S-TDMA protocol was proposed in this paper. Compared to the traditional protocols, the results demonstrate that S-TDMA successfully meets the delay and transmission efficiency requirements of HBC while keeping a low energy consumption. We also believe that our S-TDMA protocol will promote development of HBC in wearable applications.

  17. Asymmetric Propagation Delay-Aware TDMA MAC Protocol for Mobile Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    A-Ra Cho

    2018-06-01

    Full Text Available The propagation delay in mobile underwater acoustic sensor network (MUASN is asymmetric because of its low sound propagation speed, and this asymmetry grows with the increase in packet travel time, which damages the collision avoidance mechanism of the spatial reuse medium access control (MAC protocols for MUASN. We propose an asymmetric propagation delay-aware time division multiple access (APD-TDMA for a MUASN in which periodic data packet transmission is required for a sink node (SN. Collisions at the SN are avoided by deferring data packet transmission after reception of a beacon packet from the SN, and data packets are arrived at the SN in a packet-train manner. The time-offset, which is the time for a node to wait before the transmission of a data packet after reception of a beacon packet, is determined by estimating the propagation delay over two consecutive cycles such that the idle interval at the SN is minimized, and this time-offset is announced by the beacon packet. Simulation results demonstrate that the APD-TDMA improves the channel access delay and the channel utilization by approximately 20% and 30%, respectively, compared with those of the block time bounded TDMA under the given network conditions.

  18. The FODA-TDMA satellite access scheme - Presentation, study of the system, and results

    Science.gov (United States)

    Celandroni, Nedo; Ferro, Erina

    1991-12-01

    A description is given of FODA-TDMA, a satellite access scheme designed for mixed traffic. The study of the system is presented and the choice of some parameters is justified. A simplified analytic solution is found, describing the steady-state behavior of the system. Some results of the simulation tests for an already existing hardware environment are also presented for the channel speeds of 2 and 8 Mb/s, considering both the stationary and the transient cases. The results of the experimentation at 2 Mb/s on the satellite Eutelsat-F2 are also presented and compared with the results of the simulation.

  19. Implementation of Multiple Access Techniques Applicable for Maritime Satellite Communications

    Directory of Open Access Journals (Sweden)

    Stojce Dimov Ilcev

    2013-12-01

    Full Text Available In this paper are introduced fundamentals, characteristics, advantages and disadvantages of Multiple Access (MA employed as transmission techniques in the Maritime Mobile Satellite Communications (MMSC between ships and Coast Earth Station (CES via Geostationary Earth Orbit (GEO or Not-GEO satellite constellations. In fixed satellite communication, as a rule, especially in MMSC many users are active at the same time. The problem of simultaneous communications between many single or multipoint mobile satellite users can be solved by using MA technique, such as Frequency Division Multiple Access (FDMA, Time Division Multiple Access (TDMA, Code Division Multiple Access (CDMA, Space Division Multiple Access (SDMA and Random (Packet Division Multiple Access (RDMA. Since the resources of the systems such as the transmitting power and the bandwidth are limited, it is advisable to use the channels with complete charge and to create a different MA to the channel. This generates a problem of summation and separation of signals in the transmission and reception parts, respectively. Deciding this problem consists in the development of orthogonal channels of transmission in order to divide signals from various users unambiguously on the reception part.

  20. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Science.gov (United States)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  1. Development of a demand assignment/TDMA system for international business satellite communications

    Science.gov (United States)

    Nohara, Mitsuo; Takeuchi, Yoshio; Takahata, Fumio; Hirata, Yasuo; Yamazaki, Yoshiharu

    An experimental IBS (international business satellite) communications system based on a demand assignment and TDMA (time-division multiple-access) operation has been developed. The system utilizes a limited satellite resource efficiently and provides various kinds of ISDN services totally. A discussion is presented of the IBS network configurations suitable to international communications and describes the developed communications system from the viewpoint of the hardware and software implementation. The performance in terms of the transmission quality and call processing is also demonstrated.

  2. Comparative study of FDMA, TDMA and hybrid 30/20 GHz satellite communications systems for small users

    Science.gov (United States)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    This study compares several satellite uplink and downlink accessing schemes for a Customer Premises Service. Four conceptual system designs are presented: Satellite-Routed FDMA, Frequency-Routed TDMA, Satellite-Switched TDMA, and Processor-Routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, power consumption, and cost. The system capacities are analyzed for a fixed multibeam coverage of CONUS. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  3. A Service Differentiated MAC Protocol for OFDM/TDMA Wireless Systems

    Institute of Scientific and Technical Information of China (English)

    WANG Ying; ZHANG Ping

    2005-01-01

    This paper proposes a Service Differentiated-Dynamic Slotted Multiple Access (SD-DSMA) protocol with QoS guarantee. The Media Access Control (MAC) frame format is variable according to the traffic of uplink and downlink and the traffic of control and data. In addition, the services are divided into two categories, Guaranteed Bandwidth (GB) and Best Effort (BE). Uplink control message slots are designed for the GB users to reduce contention. Taking into consideration the techniques in physical layer, a two-Dimensional Radio Resource Allocation (2-D RRA) method is proposed. The 2-D RRA is an efficient way to allocate radio resources for multi-cell, multi-user OFDM/TDMA system as it takes into consideration both the channel condition and the co-channel interference. The piggyback mechanism and fair scheduling algorithm are adopted for GB services, and the max C/I scheduling algorithm is used for BE services. The simulation results show that the proposed MAC protocol has better performance in terms of delay, probability of successful access request.

  4. Enhanced TDMA Based Anti-Collision Algorithm with a Dynamic Frame Size Adjustment Strategy for Mobile RFID Readers

    Directory of Open Access Journals (Sweden)

    Kwang Cheol Shin

    2009-02-01

    Full Text Available In the fields of production, manufacturing and supply chain management, Radio Frequency Identification (RFID is regarded as one of the most important technologies. Nowadays, Mobile RFID, which is often installed in carts or forklift trucks, is increasingly being applied to the search for and checkout of items in warehouses, supermarkets, libraries and other industrial fields. In using Mobile RFID, since the readers are continuously moving, they can interfere with each other when they attempt to read the tags. In this study, we suggest a Time Division Multiple Access (TDMA based anti-collision algorithm for Mobile RFID readers. Our algorithm automatically adjusts the frame size of each reader without using manual parameters by adopting the dynamic frame size adjustment strategy when collisions occur at a reader. Through experiments on a simulated environment for Mobile RFID readers, we show that the proposed method improves the number of successful transmissions by about 228% on average, compared with Colorwave, a representative TDMA based anti-collision algorithm.

  5. Enhanced TDMA Based Anti-Collision Algorithm with a Dynamic Frame Size Adjustment Strategy for Mobile RFID Readers.

    Science.gov (United States)

    Shin, Kwang Cheol; Park, Seung Bo; Jo, Geun Sik

    2009-01-01

    In the fields of production, manufacturing and supply chain management, Radio Frequency Identification (RFID) is regarded as one of the most important technologies. Nowadays, Mobile RFID, which is often installed in carts or forklift trucks, is increasingly being applied to the search for and checkout of items in warehouses, supermarkets, libraries and other industrial fields. In using Mobile RFID, since the readers are continuously moving, they can interfere with each other when they attempt to read the tags. In this study, we suggest a Time Division Multiple Access (TDMA) based anti-collision algorithm for Mobile RFID readers. Our algorithm automatically adjusts the frame size of each reader without using manual parameters by adopting the dynamic frame size adjustment strategy when collisions occur at a reader. Through experiments on a simulated environment for Mobile RFID readers, we show that the proposed method improves the number of successful transmissions by about 228% on average, compared with Colorwave, a representative TDMA based anti-collision algorithm.

  6. A New MAC Protocol with Pseudo-TDMA Behavior for Supporting Quality of Service in 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available A new medium access control (MAC protocol is proposed for quality-of-service (QoS support in wireless local area networks (WLAN. The protocol is an alternative to the recent enhancement 802.11e. A new priority policy provides the system with better performance by simulating time division multiple access (TDMA functionality. Collisions are reduced and starvation of low-priority classes is prevented by a distributed admission control algorithm. The model performance is found analytically extending previous work on this matter. The results show that a better organization of resources is achieved through this scheme. Throughput analysis is verified with OPNET simulations.

  7. An introduction to testing techniques in the Intelsat TDMA/DSI system. II - Satellite system operations guide (SSOG) tests

    Science.gov (United States)

    Colby, R. J.; Parthasarathy, R.; Stimson, A. L.

    1983-12-01

    The test methods and procedures of the Intelsat TDMA/DSI SSOG are summarized. The overall structure of the SSOG is outlined, and the operational procedures to be followed for joining a new terminal to the system and for normal operations are reviewed, with an emphasis on the roles of the IOC and the TDMA reference and monitoring stations. The testing philosophy (based on minimal interruptions) and the star-test method are explained and illustrated with diagrams, and the test procedures are examined, including modem tests, electrical-path-length equalization, RF/IF downchain tests, protocol tests, nontransmitting protocol tests, IF/RF upchain tests, transmitting protocol tests, baseband tests, and orderwire lineups. The fundamental access discipline of the TDMA system is presented in an appendix.

  8. A Hybrid TDMA/CSMA-Based Wireless Sensor and Data Transmission Network for ORS Intra-Microsatellite Applications.

    Science.gov (United States)

    Wang, Long; Liu, Yong; Yin, Zengshan

    2018-05-12

    To achieve launch-on-demand for Operationally Responsive Space (ORS) missions, in this article, an intra-satellite wireless network (ISWN) is presented. It provides a wireless and modularized scheme for intra-spacecraft sensing and data buses. By removing the wired data bus, the commercial off-the-shelf (COTS) based wireless modular architecture will reduce both the volume and weight of the satellite platform, thus achieving rapid design and cost savings in development and launching. Based on the on-orbit data demand analysis, a hybrid time division multiple access/carrier sense multiple access (TDMA/CSMA) protocol is proposed. It includes an improved clear channel assessment (CCA) mechanism and a traffic adaptive slot allocation method. To analyze the access process, a Markov model is constructed. Then a detailed calculation is given in which the unsaturated cases are considered. Through simulations, the proposed protocol is proved to commendably satisfy the demands and performs better than existing schemes. It helps to build a full-wireless satellite instead of the current wired ones, and will contribute to provide dynamic space capabilities for ORS missions.

  9. RD2: Resilient Dynamic Desynchronization for TDMA over Lossy Networks

    DEFF Research Database (Denmark)

    Hinterhofer, Thomas; Schwefel, Hans-Peter; Tomic, Slobodanka

    2012-01-01

    We present a distributed TDMA negotiation approach for single-hop ad-hoc network communication. It is distributed, resilient to arbitrary transient packet loss and defines a non-overlapping TDMA schedule without the need of global time synchronization. A participating node can dynamically request...

  10. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  11. Det-WiFi: A Multihop TDMA MAC Implementation for Industrial Deterministic Applications Based on Commodity 802.11 Hardware

    Directory of Open Access Journals (Sweden)

    Yujun Cheng

    2017-01-01

    Full Text Available Wireless control system for industrial automation has been gaining increasing popularity in recent years thanks to their ease of deployment and the low cost of their components. However, traditional low sample rate industrial wireless sensor networks cannot support high-speed application, while high-speed IEEE 802.11 networks are not designed for real-time application and not able to provide deterministic feature. Thus, in this paper, we propose Det-WiFi, a real-time TDMA MAC implementation for high-speed multihop industrial application. It is able to support high-speed applications and provide deterministic network features since it combines the advantages of high-speed IEEE802.11 physical layer and a software Time Division Multiple Access (TDMA based MAC layer. We implement Det-WiFi on commercial off-the-shelf hardware and compare the deterministic performance between 802.11s and Det-WiFi under the real industrial environment, which is full of field devices and industrial equipment. We changed the hop number and the packet payload size in each experiment, and all of the results show that Det-WiFi has better deterministic performance.

  12. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  13. Delay-limited capacity of fading multiple access and broadcast channels in the low power regime

    KAUST Repository

    Rezki, Zouheir

    2015-09-11

    We study delay-limited (also called zero-outage) capacity region of the fading multi-access channel (MAC) with Gaussian noise and perfect channel state information (CSI) at the receiver and at the transmitters (CSI-TR), in the low-power regime. We show that for fading channels where the MAC capacity region is strictly positive, it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power, the boundary surface of the capacity region shrinks to a single point corresponding to the sum-rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Using the duality of the Gaussian MAC and broadcast channels (BC), we show that time-sharing (or time division multiple access (TDMA)) is asymptotically optimal. © 2015 IEEE.

  14. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  15. Optimizing TCP Performance in Multi-AP Residential Broadband Connections via Minislot Access

    Directory of Open Access Journals (Sweden)

    Domenico Giustiniano

    2013-01-01

    Full Text Available The high bandwidth demand of Internet applications has recently driven the need of increasing the residential download speed. A practical solution to the problem is to aggregate the bandwidth of 802.11 access points (APs backhauls in range. Since 802.11 devices are usually single radio, the communication to APs on different radio channels requires a time-division multiple access (TDMA policy at the client station. With an in-depth experimental analysis and a customized 802.11 driver, in this paper, we show that the usage of multi-AP TDMA policy may cause degradation of the TCP throughput and an underutilization of the AP backhauls. We then introduce a simple analytical model that accurately predicts the TCP round-trip time (RTT with a multi-AP TDMA policy and propose a resource allocation algorithm to reduce the observed TCP RTT with a very low computational cost. Our proposed scheme runs locally at the client station and improves the aggregate throughput up to 1.5 times compared to state-of-the-art allocations. We finally show that the throughput achieved by our algorithm is very close to the theoretical upper bound in key simulation scenarios.

  16. Results and recommendations from an intercomparison of six Hygroscopicity-TDMA systems

    Directory of Open Access Journals (Sweden)

    A. Massling

    2011-03-01

    Full Text Available The performance of six custom-built Hygrocopicity-Tandem Differential Mobility Analyser (H-TDMA systems was investigated in the frame of an international calibration and intercomparison workshop held in Leipzig, February 2006. The goal of the workshop was to harmonise H-TDMA measurements and develop recommendations for atmospheric measurements and their data evaluation. The H-TDMA systems were compared in terms of the sizing of dry particles, relative humidity (RH uncertainty, and consistency in determination of number fractions of different hygroscopic particle groups. The experiments were performed in an air-conditioned laboratory using ammonium sulphate particles or an external mixture of ammonium sulphate and soot particles.

    The sizing of dry particles of the six H-TDMA systems was within 0.2 to 4.2% of the selected particle diameter depending on investigated size and individual system. Measurements of ammonium sulphate aerosol found deviations equivalent to 4.5% RH from the set point of 90% RH compared to results from previous experiments in the literature. Evaluation of the number fraction of particles within the clearly separated growth factor modes of a laboratory generated externally mixed aerosol was done. The data from the H-TDMAs was analysed with a single fitting routine to investigate differences caused by the different data evaluation procedures used for each H-TDMA. The differences between the H-TDMAs were reduced from +12/−13% to +8/−6% when the same analysis routine was applied. We conclude that a common data evaluation procedure to determine number fractions of externally mixed aerosols will improve the comparability of H-TDMA measurements.

    It is recommended to ensure proper calibration of all flow, temperature and RH sensors in the systems. It is most important to thermally insulate the aerosol humidification unit and the second DMA and to monitor these temperatures to an accuracy of 0.2 °C. For the

  17. Mixing stream and datagram traffic on satellite: A FIFO Order-based Demand Assignment (FODA) Time Division Multiple Access (TDMA) scheme

    Science.gov (United States)

    Beltrame, R.; Bonito, A. B.; Celandroni, N.; Ferro, E.

    1985-11-01

    A FIFO Order based Demand Assignment (FODA) access scheme was designed to handle packetized data and voice traffic in a multiple access satellite broadcast channel of Mbits band. The channel is shared by as many as 64 simultaneously active stations in a range of 255 addressable stations. A sophisticated traffic environment is assumed, including different types of service requirements and an arbitrary load distribution among the stations. The results of 2Mbit/sec simulation tests for an existing hardware environment are presented.

  18. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Science.gov (United States)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  19. Implementation of a light-route TDMA communications satellite system for advanced business networks

    Science.gov (United States)

    Hanson, B.; Smalley, A.; Zuliani, M.

    The application of Light Route TDMA systems to various business communication requirements is discussed. It is noted that full development of this technology for use in advanced business networks will be guided by considerations of flexibility, reliability, security, and cost. The implementation of the TDMA system for demonstrating these advantages to a wide range of public and private organizations is described in detail. Among the advantages offered by this system are point-to-point and point-to-multipoint (broadcast) capability; the ability to vary the mix and quantity of services between destinations in a fully connected mesh network on an almost instantaneous basis through software control; and enhanced reliability with centralized monitor, alarm and control functions by virtue of an overhead channel.

  20. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  1. Optical datacenter network employing slotted (TDMA) operation for dynamic resource allocation

    Science.gov (United States)

    Bakopoulos, P.; Tokas, K.; Spatharakis, C.; Patronas, I.; Landi, G.; Christodoulopoulos, K.; Capitani, M.; Kyriakos, A.; Aziz, M.; Reisis, D.; Varvarigos, E.; Zahavi, E.; Avramopoulos, H.

    2018-02-01

    The soaring traffic demands in datacenter networks (DCNs) are outpacing progresses in CMOS technology, challenging the bandwidth and energy scalability of currently established technologies. Optical switching is gaining traction as a promising path for sustaining the explosive growth of DCNs; however, its practical deployment necessitates extensive modifications to the network architecture and operation, tailored to the technological particularities of optical switches (i.e. no buffering, limitations in radix size and speed). European project NEPHELE is developing an optical network infrastructure that leverages optical switching within a software-defined networking (SDN) framework to overcome the bandwidth and energy scaling challenges of datacenter networks. An experimental validation of the NEPHELE data plane is reported based on commercial off-the-shelf optical components controlled by FPGA boards. To facilitate dynamic allocation of the network resources and perform collision-free routing in a lossless network environment, slotted operation is employed (i.e. using time-division multiple-access - TDMA). Error-free operation of the NEPHELE data plane is verified for 200 μs slots in various scenarios that involve communication between Ethernet hosts connected to custom-designed top-of-rack (ToR) switches, located in the same or in different datacenter pods. Control of the slotted data plane is obtained through an SDN framework comprising an OpenDaylight controller with appropriate add-ons. Communication between servers in the optical-ToR is demonstrated with various routing scenarios, concerning communication between hosts located in the same rack or in different racks, within the same or different datacenter pods. Error-free operation is confirmed for all evaluated scenarios, underpinning the feasibility of the NEPHELE architecture.

  2. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  3. DESYNC: Self-Organizing Desynchronization and TDMA on Wireless Sensor Networks

    OpenAIRE

    Degesys, Julius; Rose, Ian; Patel, Ankit; Nagpal, Radhika

    2006-01-01

    Desynchronization is a novel primitive for sensor networks: it implies that nodes perfectly interleave periodic events to occur in a round-robin schedule. This primitive can be used to evenly distribute sampling burden in a group of nodes, schedule sleep cycles, or organize a collision-free TDMA schedule for transmitting wireless messages. Here we present Desync, a biologically-inspired self-maintaining algorithm for desynchronization in a single-hop network. We present (1) theoretical result...

  4. A Scheduling Algorithm for Minimizing the Packet Error Probability in Clusterized TDMA Networks

    Directory of Open Access Journals (Sweden)

    Arash T. Toyserkani

    2009-01-01

    Full Text Available We consider clustered wireless networks, where transceivers in a cluster use a time-slotted mechanism (TDMA to access a wireless channel that is shared among several clusters. An approximate expression for the packet-loss probability is derived for networks with one or more mutually interfering clusters in Rayleigh fading environments, and the approximation is shown to be good for relevant scenarios. We then present a scheduling algorithm, based on Lagrangian duality, that exploits the derived packet-loss model in an attempt to minimize the average packet-loss probability in the network. Computer simulations of the proposed scheduling algorithm show that a significant increase in network throughput can be achieved compared to uncoordinated scheduling. Empirical trials also indicate that the proposed optimization algorithm almost always converges to an optimal schedule with a reasonable number of iterations. Thus, the proposed algorithm can also be used for bench-marking suboptimal scheduling algorithms.

  5. A hierarchical detection method in external communication for self-driving vehicles based on TDMA

    Science.gov (United States)

    Al-ani, Muzhir Shaban; McDonald-Maier, Klaus

    2018-01-01

    Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302

  6. A hierarchical detection method in external communication for self-driving vehicles based on TDMA.

    Science.gov (United States)

    Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus

    2018-01-01

    Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.

  7. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  8. Multiple Access Communications

    DEFF Research Database (Denmark)

    This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016. The 10 full papers presented in this volume were carefully reviewed and selected from 12 submissions. They were organized in topical...

  9. Compact wireless control network protocol with fast path switching

    Directory of Open Access Journals (Sweden)

    Yasutaka Kawamoto

    2017-08-01

    Full Text Available Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER, such as wireless control networks, often adopt time division multiple access (TDMA. However, it is difficult to add or adjust functions in protocol stacks that use TDMA methods. Therefore, to add or adjust functions easily, we propose NES-SOURCE, a compact wireless control network protocol with a fast path-switching function. NES-SOURCE is implemented using carrier sense multiple access/collision avoidance (CSMA/CA rather than TDMA. Wireless control networks that use TDMA prevent communication failure by duplicating the communication path. If CSMA/CA networks use duplicate paths, collisions occur frequently, and communication will fail. NES-SOURCE switches paths quickly when communication fails, which reduces the effect of communication failures. Since NES-SOURCE is implemented using CSMA/CA rather than TDMA, the implementation scale is less than one-half that of existing network stacks. Furthermore, since NES-SOURCE’s code complexity is low, functions can be added or adjusted easily and quickly. Communication failures occur owing to changes in the communication environment and collisions. Experimental results demonstrate that the proposed NES-SOURCE’s path-switching function reduces the amount of communication failures when the communication environment changes owing to human movement and others. Furthermore, we clarify the relationships among the probability of a changing communication environment, the collision occurrence rate, and the PER of NES-SOURCE.

  10. VSAT communications networks - An overview

    Science.gov (United States)

    Chakraborty, D.

    1988-05-01

    The very-small-aperture-terminal (VSAT) fixed satellite communication network is a star network in which many dispersed micro terminals attempt to send data in a packet form through a random access/time-division multiple-access (RA/TDMA) satellite channel with transmission delay. The basic concept of the VSAT and its service potential are discussed. Two classes of traffic are addressed, namely, business-oriented low-rate-data traffic and bulk data traffic of corporate networks. Satellite access, throughput, and delay are considered. The size of the network population that can be served in an RA/TDMA environment is calculated. User protocols are examined. A typical VSAT business scenario is described.

  11. Optimal Time Allocation in Backscatter Assisted Wireless Powered Communication Networks

    Science.gov (United States)

    Lyu, Bin; Yang, Zhen; Gui, Guan; Sari, Hikmet

    2017-01-01

    This paper proposes a wireless powered communication network (WPCN) assisted by backscatter communication (BackCom). This model consists of a power station, an information receiver and multiple users that can work in either BackCom mode or harvest-then-transmit (HTT) mode. The time block is mainly divided into two parts corresponding to the data backscattering and transmission periods, respectively. The users first backscatter data to the information receiver in time division multiple access (TDMA) during the data backscattering period. When one user works in the BackCom mode, the other users harvest energy from the power station. During the data transmission period, two schemes, i.e., non-orthogonal multiple access (NOMA) and TDMA, are considered. To maximize the system throughput, the optimal time allocation policies are obtained. Simulation results demonstrate the superiority of the proposed model. PMID:28587171

  12. Multiple-Access Quantum-Classical Networks

    Science.gov (United States)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  13. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    Science.gov (United States)

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  14. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2004-01-01

    In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The

  15. Time-division optical interconnects for local-area and micro-area networks

    Science.gov (United States)

    Krol, Mark F.; Boncek, Raymond K.; Johns, Steven T.; Stacy, John L.

    1991-12-01

    This report describes the development of an optical Time-Division Multiple-Access (TDMA) interconnect suitable for applications in local-area and micro-area networks. The advantages of using time-division techniques instead of frequency-division, wavelength-division, or code-division techniques in a shared-medium environment are discussed in detail. Furthermore, a detailed description of the TDMA architecture is presented along with various experiments pertaining to the actual components needed to implement the system. Finally, experimental data is presented for an actual optical TDMA test bed. The experimental data demonstrates the feasibility of the architecture, and shows that currently the system has the capability to accommodate up to 50 channels. The bit-error-rate per channel was measured to be less than 10(exp -9) for pseudo-random bit-sequences.

  16. 47 CFR 2.1093 - Radiofrequency radiation exposure evaluation: portable devices.

    Science.gov (United States)

    2010-10-01

    ...-division multiple-access (TDMA) scheme for transmission of a signal. In general, maximum average power... Services, the General Wireless Communications Service, the Wireless Communications Service, the Maritime Services, the Specialized Mobile Radio Service, the 4.9 GHz Band Service, the Wireless Medical Telemetry...

  17. Quantum internet using code division multiple access

    Science.gov (United States)

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  18. End-to-end Configuration of Wireless Realtime Communication over Heterogeneous Protocols

    DEFF Research Database (Denmark)

    Malinowsky, B.; Grønbæk, Jesper; Schwefel, Hans-Peter

    2015-01-01

    This paper describes a wireless real-time communication system design using two Time Division Multiple Access (TDMA) protocols. Messages are subject to prioritization and queuing. For this interoperation scenario, we show a method for end-to-end configuration of protocols and queue sizes. Such co...

  19. Multiple Access Techniques for Next Generation Wireless: Recent Advances and Future Perspectives

    Directory of Open Access Journals (Sweden)

    Shree Krishna Sharma

    2016-01-01

    Full Text Available The advances in multiple access techniques has been one of the key drivers in moving from one cellular generation to another. Starting from the first generation, several multiple access techniques have been explored in different generations and various emerging multiplexing/multiple access techniques are being investigated for the next generation of cellular networks. In this context, this paper first provides a detailed review on the existing Space Division Multiple Access (SDMA related works. Subsequently, it highlights the main features and the drawbacks of various existing and emerging multiplexing/multiple access techniques. Finally, we propose a novel concept of clustered orthogonal signature division multiple access for the next generation of cellular networks. The proposed concept envisions to employ joint antenna coding in order to enhance the orthogonality of SDMA beams with the objective of enhancing the spectral efficiency of future cellular networks.

  20. Optical code division multiple access fundamentals and applications

    CERN Document Server

    Prucnal, Paul R

    2005-01-01

    Code-division multiple access (CDMA) technology has been widely adopted in cell phones. Its astonishing success has led many to evaluate the promise of this technology for optical networks. This field has come to be known as Optical CDMA (OCDMA). Surveying the field from its infancy to the current state, Optical Code Division Multiple Access: Fundamentals and Applications offers the first comprehensive treatment of OCDMA from technology to systems.The book opens with a historical perspective, demonstrating the growth and development of the technologies that would eventually evolve into today's

  1. Stability Properties of Network Diversity Multiple Access with Multiple-Antenna Reception and Imperfect Collision Multiplicity Estimation

    Directory of Open Access Journals (Sweden)

    Ramiro Samano-Robles

    2013-01-01

    Full Text Available In NDMA (network diversity multiple access, protocol-controlled retransmissions are used to create a virtual MIMO (multiple-input multiple-output system, where collisions can be resolved via source separation. By using this retransmission diversity approach for collision resolution, NDMA is the family of random access protocols with the highest potential throughput. However, several issues remain open today in the modeling and design of this type of protocol, particularly in terms of dynamic stable performance and backlog delay. This paper attempts to partially fill this gap by proposing a Markov model for the study of the dynamic-stable performance of a symmetrical and non-blind NDMA protocol assisted by a multiple-antenna receiver. The model is useful in the study of stability aspects in terms of the backlog-user distribution and average backlog delay. It also allows for the investigation of the different states of the system and the transition probabilities between them. Unlike previous works, the proposed approach considers the imperfect estimation of the collision multiplicity, which is a crucial process to the performance of NDMA. The results suggest that NDMA improves not only the throughput performance over previous solutions, but also the average number of backlogged users, the average backlog delay and, in general, the stability of random access protocols. It is also shown that when multiuser detection conditions degrade, ALOHA-type backlog retransmission becomes relevant to the stable operation of NDMA.

  2. Image transmission in multicore-fiber code-division multiple access network

    Science.gov (United States)

    Yang, Guu-Chang; Kwong, Wing C.

    1997-01-01

    Recently, two-dimensional (2-D) signature patterns were proposed to encode binary digitized image pixels in optical code-division multiple-access (CDMA) networks with 'multicore' fiber. The new technology enables parallel transmission and simultaneous access of 2-D images in multiple-access environment, where these signature patterns are defined as optical orthogonal signature pattern codes (OOSPCs). However, previous work on OOSPCs assumed that the weight of each signature pattern was the same. In this paper, we construct a new family of OOSPCs with the removal of this assumption. Since varying the weight of a user's signature pattern affects that user's performance, this approach is useful for CDMA optical systems with multiple performance requirements.

  3. Orthogonal frequency division multiple access fundamentals and applications

    CERN Document Server

    Jiang, Tao; Zhang, Yan

    2010-01-01

    Supported by the expert-level advice of pioneering researchers, Orthogonal Frequency Division Multiple Access Fundamentals and Applications provides a comprehensive and accessible introduction to the foundations and applications of one of the most promising access technologies for current and future wireless networks. It includes authoritative coverage of the history, fundamental principles, key techniques, and critical design issues of OFDM systems. Covering various techniques of effective resource management for OFDM/OFDMA-based wireless communication systems, this cutting-edge reference:Add

  4. Bandwidth Allocation Method by Service for WDM EPON

    Institute of Scientific and Technical Information of China (English)

    Yongseok; Chang; Changgyu; Choi; Jonghoon; Eom; Sungho; Kim

    2003-01-01

    A WDM(Wavelength Division Multiplexing) EPON(Ethernet Passive Optical Network) is an economical and efficient access network that has attracted significant research attention in recent years. A MAC(Media Access Control) Protocol of PON is based on TDMA(Time Division Multiple Access) basically, we can classify this protocol into a fixed length slot assignment method suitable for leased line supporting Qos(Quality of Service) and a variable length slot assignment method suitable for LAN/MAN with the best ...

  5. Bursty data traffic via satellite: performance comparison between two TDMA access schemes

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Potort?, Francesco; Maral, Gerard

    1997-01-01

    This paper reports the simulation results of a performance comparison between two centralised thin route TDrvlA satellite access schemes, in terms of bursty data transmission delay in the context of LAN interconnection traffic. The schemes compared are CFRA' I, and FODA/IBEA'

  6. Reducing LTE Uplink Transmission Energy by Allocating Resources

    DEFF Research Database (Denmark)

    Lauridsen, Mads; Jensen, Anders Riis; Mogensen, Preben

    2011-01-01

    The effect of physical resource block (PRB) allocation on an LTE modem's transmit power and total modem energy consumption is examined. In this paper the uplink resource blocks are scheduled in either a Frequency Division Multiple Access (FDMA) or Time Division Multiple Access (TDMA) manner......, to determine if low transmission power & long transmission time or high transmission power & short transmission time is most energy efficient. It is important to minimize the LTE modem's energy consumption caused by uplink transmission because it affects phone battery time, and because researchers rarely focus...

  7. Free-space optical code-division multiple-access system design

    Science.gov (United States)

    Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.

    1993-08-01

    This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.

  8. (Sub-)Optimality of Treating Interference as Noise in the Cellular Uplink With Weak Interference

    KAUST Repository

    Gherekhloo, Soheil; Chaaban, Anas; Di, Chen; Sezgin, Aydin

    2015-01-01

    Despite the simplicity of the scheme of treating interference as noise (TIN), it was shown to be sum-capacity optimal in the Gaussian interference channel (IC) with very-weak (noisy) interference. In this paper, the two-user IC is altered by introducing an additional transmitter that wants to communicate with one of the receivers of the IC. The resulting network thus consists of a point-to-point channel interfering with a multiple access channel (MAC) and is denoted by PIMAC. The sum-capacity of the PIMAC is studied with main focus on the optimality of TIN. It turns out that TIN in its naive variant, where all transmitters are active and both receivers use TIN for decoding, is not the best choice for the PIMAC. In fact, a scheme that combines both time division multiple access and TIN (TDMA-TIN) strictly outperforms the naive-TIN scheme. Furthermore, it is shown that in some regimes, TDMA-TIN achieves the sum-capacity for the deterministic PIMAC and the sum-capacity within a constant gap for the Gaussian PIMAC. In addition, it is shown that, even for very-weak interference, there are some regimes where a combination of interference alignment with power control and TIN at the receiver side outperforms TDMA-TIN. As a consequence, on the one hand, TIN in a cellular uplink is approximately optimal in certain regimes. On the other hand, those regimes cannot be simply described by the strength of interference.

  9. (Sub-)Optimality of Treating Interference as Noise in the Cellular Uplink With Weak Interference

    KAUST Repository

    Gherekhloo, Soheil

    2015-11-09

    Despite the simplicity of the scheme of treating interference as noise (TIN), it was shown to be sum-capacity optimal in the Gaussian interference channel (IC) with very-weak (noisy) interference. In this paper, the two-user IC is altered by introducing an additional transmitter that wants to communicate with one of the receivers of the IC. The resulting network thus consists of a point-to-point channel interfering with a multiple access channel (MAC) and is denoted by PIMAC. The sum-capacity of the PIMAC is studied with main focus on the optimality of TIN. It turns out that TIN in its naive variant, where all transmitters are active and both receivers use TIN for decoding, is not the best choice for the PIMAC. In fact, a scheme that combines both time division multiple access and TIN (TDMA-TIN) strictly outperforms the naive-TIN scheme. Furthermore, it is shown that in some regimes, TDMA-TIN achieves the sum-capacity for the deterministic PIMAC and the sum-capacity within a constant gap for the Gaussian PIMAC. In addition, it is shown that, even for very-weak interference, there are some regimes where a combination of interference alignment with power control and TIN at the receiver side outperforms TDMA-TIN. As a consequence, on the one hand, TIN in a cellular uplink is approximately optimal in certain regimes. On the other hand, those regimes cannot be simply described by the strength of interference.

  10. Rendering Intelligence at Physical Layer for Smart Addressing and Multiple Access

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi; Prasad, Ramjee; Cianca, Ernestina

    2010-01-01

    addressing of a node. For a typical closed user group type of network, we propose a multiple access mechanism and network topology which will not only eliminate the need of intelligent core network equipments in the network area , but to use this intelligent physical layer to directly reach any node over......The primary objective of this work is to propose a technique of wireless communication, where we render intelligence to the physical layer. We aim to realize a physical layer that can take part in some processes which is otherwise confined to higher layer signalling activities, like for example...... the fundamentals behind the proposed multiple access scheme and draws out the benefits compared to the existing multiple access processes based on cellular approach....

  11. Wavelet based multicarrier code division multiple access ...

    African Journals Online (AJOL)

    This paper presents the study on Wavelet transform based Multicarrier Code Division Multiple Access (MC-CDMA) system for a downlink wireless channel. The performance of the system is studied for Additive White Gaussian Noise Channel (AWGN) and slowly varying multipath channels. The bit error rate (BER) versus ...

  12. Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks

    Directory of Open Access Journals (Sweden)

    Chiwoo Lim

    2018-04-01

    Full Text Available In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA, is proposed for peer discovery of distributed device-to-device (D2D communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR. The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA-based discovery.

  13. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    Science.gov (United States)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  14. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  15. Multiple access chaotic digital communication based on generalized synchronization

    International Nuclear Information System (INIS)

    Lu Junguo

    2005-01-01

    A novel method for multiple access chaotic digital communication based on the concept of chaos generalized synchronization and the on-line least square method is proposed. This method can be used for transmitting multiple digital information signals concurrently. We illustrate the method using a Lorenz system driving a Chua's circuit and then examine the robustness of the proposed method with respect to noise in communication channel

  16. Optical Code-Division Multiple Access: Challenges and Solutions

    Science.gov (United States)

    Chen, Lawrence R.

    2003-02-01

    Optical code-division multiple-access (OCDMA) is a technique well-suited for providing the required photonic connectivity in local access networks. Although the principles of OCDMA have been known for many years, it has never delivered on its potential. In this paper, we will describe the key challenges and impediments that have prevented OCDMA from delivering on its potential, as well as discuss possible solutions. We focus on the limitations of one-dimensional codes and the benefit of exploiting the additional degrees of freedom in using multiple dimensions for defining the codes. We discuss the advantages of using differential detection in order to implement bipolar communications. We then show how two-dimensional wavelength-time codes can be appropriately combined with differential detection in order to achieve high performance OCDMA systems with a large number of users operating with good BER performance for a large aggregate capacity. We also discuss the impact of channel coding techniques, for example forward error correction or turbo coding, on BER performance.

  17. A Dynamic Reallocation Based Window Access Scheme for Enhancing QoS of Vehicular Ad-hoc Networks (VANETs

    Directory of Open Access Journals (Sweden)

    Md. Amirul Islam

    2018-01-01

    Full Text Available This article proposes a new MAC scheme for Vehicle-to-Infrastructure (V2I communications that dynamically reallocates unused TDMA slots. By maintaining a balanced waiting time, the proposed TDMA based scheduling scheme allocates TDMA slots in a rational way to minimize merging and one-hop neighboring collision. The proposed scheme ensures dynamic reallocation of unused slots by using “time slot reassignment” mechanism. The scheme has been simulated in VEINS framework of OMNET++ network simulator and its performance has been compared with other conventional protocols. Experimental results show that our scheme performs better than existing schemes in terms of successfully transmitted data packets.

  18. MULTIPLE ACCESS POINTS WITHIN THE ONLINE CLASSROOM: WHERE STUDENTS LOOK FOR INFORMATION

    Directory of Open Access Journals (Sweden)

    John STEELE

    2017-01-01

    Full Text Available The purpose of this study is to examine the impact of information placement within the confines of the online classroom architecture. Also reviewed was the impact of other variables such as course design, teaching presence and student patterns in looking for information. The sample population included students from a major online university in their first year course sequence. Students were tasked with completing a survey at the end of the course, indicating their preference for accessing information within the online classroom. The qualitative data indicated that student preference is to receive information from multiple access points and sources within the online classroom architecture. Students also expressed a desire to have information delivered through the usage of technology such as email and text messaging. In addition to receiving information from multiple sources, the qualitative data indicated students were satisfied overall, with the current ways in which they received and accessed information within the online classroom setting. Major findings suggest that instructors teaching within the online classroom should have multiple data access points within the classroom architecture. Furthermore, instructors should use a variety of communication venues to enhance the ability for students to access and receive information pertinent to the course.

  19. Experimental demonstration of 2.5 Gbit/S incoherent two-dimensional optical code division multiple access system

    International Nuclear Information System (INIS)

    Glesk, I.; Baby, V.; Bres, C.-S.; Xu, L.; Rand, D.; Prucnal, P.R.

    2004-01-01

    We demonstrated error-free operation of 4 simultaneous users in a fast frequency-hopping time-spreading optical code division multiple access system operating at 2.5 Gbit/s a Star architecture. Effective power penalty was ≤0.5dB. Novel optical code division multiple access receiver based on Terahertz Optical Asymmetric Demultiplexer was demonstrated to eliminate multiple access interference (Authors)

  20. Electro-optical time gating based on Mach-Zehnder modulator for multiple access interference elimination in optical code-division multiple access networks

    Science.gov (United States)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zheng, Jilin; Zhu, Huatao

    2014-05-01

    An electro-optical time gating technique, which is based on an electrical return-to-zero (RZ) pulse driven Mach-Zehnder modulator (MZM) for eliminating multiple access interference (MAI) in optical code-division multiple access (OCDMA) networks is proposed. This technique is successfully simulated in an eight-user two-dimensional wavelength-hopping time-spreading system, as well as in a three-user temporal phase encoding system. Results show that in both systems the MAI noise is efficiently removed and the average received power penalty improved. Both achieve error-free transmissions at a bit rate of 2.5 Gb/s. In addition, we also individually discuss effects of parameters in two systems, such as the extinction ratio of the MZM, the duty cycle of the driven RZ pulse, and the time misalignment between the driven pulse and the decoded autocorrelation peak, on the output bit error rate performance. Our work shows that employing a common MZM as a thresholder provides another probability and an interesting cost-effective choice for a smart size, low energy, and less complex thresholding technique for integrated detection in OCDMA networks.

  1. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    Science.gov (United States)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  2. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  3. Optically transparent multiple access networks employing incoherent spectral codes

    NARCIS (Netherlands)

    Huiszoon, B.

    2008-01-01

    This Ph.D. thesis is divided into 7 chapters to provide the reader an overview of the main results achieved in di®erent sub-topics of the study towards optically transparent multiple access networks employing incoherent spectral codes taking into account wireless transmission aspects. The work

  4. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  5. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  6. M-GCF: Multicolor-Green Conflict Free Scheduling Algorithm for WSN

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    division multiple access (TDMA) scheduling algorithm, Multicolor-Green Conflict Free (M-GCF), for WSNs. The proposed algorithm finds multiple conflict free slots across a three-hop neighbor view. The algorithm shows better slot sharing with fewer conflicts along with good energy efficiency, throughput...... and delay as compared with state-of-the-art solutions. The results also include the performance of M-GCF with varying traffic rates, which also shows good energy efficiency, throughput and delay. The contribution of this paper and the main reason for the improved performance with varying number of nodes...

  7. On Buffer-Aided Multiple-Access Relay Channel

    DEFF Research Database (Denmark)

    Liu, Rongkuan; Popovski, Petar; Wang, Gang

    2016-01-01

    This letter treats uplink scenario where M user equipments (UEs) send to a base station (BS), possibly via a common relay station (RS) that is equipped with a buffer. This is a multiple-access relay channel aided by a buffer. We devise a protocol in which the transmission mode is selected...... entirely at the BS, while simultaneously a number of UEs sends new messages to the BS. The results show that the adaptive selection of direct and buffer-aided relay transmissions leads to significant average throughput gains....

  8. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  9. Distributed magnetic field positioning system using code division multiple access

    Science.gov (United States)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  10. Polarization division multiple access with polarization modulation for LOS wireless communications

    Directory of Open Access Journals (Sweden)

    Cao Bin

    2011-01-01

    Full Text Available Abstract In this paper, we discuss a potential multiple access and modulation scheme based on polarized states (PS of electromagnetic (EM waves for line-of-sight (LOS communications. The proposed scheme is theoretic different from the existing polar modulation for EDGE and WCDMA systems. We propose the detailed bit representation (modulation and multiple access scheme using PS. Because of the inflexibility of polarization information in the time and frequency domains, as well as independence of frequency and space, the polarization information can be used independently for wireless communications, i.e., another independent resource domain that can be utilized. Due to the independence between the PS and the specific features of signals (such as waveform, bandwidth and data rate, the discussed polarization division multiple access (PDMA and polarization modulation (PM are expected to improve the spectrum utilization effectively. It is proved that the polarization filtering technique can be adopted in the PDMA-PM wireless communications to separate the multiuser signals and demodulate the bit information representing by PS for desired user. Some theoretical analysis is done to demonstrate the feasibility of the proposed scheme, and the simulation results are made to evaluate the performance of the suggested system.

  11. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  12. Low-sampling-rate M-ary multiple access UWB communications in multipath channels

    KAUST Repository

    Alkhodary, Mohammad T.

    2015-08-31

    The desirable characteristics of ultra-wideband (UWB) technology are challenged by formidable sampling frequency, performance degradation in the presence of multi-user interference, and complexity of the receiver due to the channel estimation process. In this paper, a low-rate-sampling technique is used to implement M-ary multiple access UWB communications, in both the detection and channel estimation stages. A novel approach is used for multiple-access-interference (MAI) cancelation for the purpose of channel estimation. Results show reasonable performance of the proposed receiver for different number of users operating many times below Nyquist rate.

  13. Low-sampling-rate M-ary multiple access UWB communications in multipath channels

    KAUST Repository

    Alkhodary, Mohammad T.; Ballal, Tarig; Al-Naffouri, Tareq Y.; Muqaibel, Ali H.

    2015-01-01

    The desirable characteristics of ultra-wideband (UWB) technology are challenged by formidable sampling frequency, performance degradation in the presence of multi-user interference, and complexity of the receiver due to the channel estimation process. In this paper, a low-rate-sampling technique is used to implement M-ary multiple access UWB communications, in both the detection and channel estimation stages. A novel approach is used for multiple-access-interference (MAI) cancelation for the purpose of channel estimation. Results show reasonable performance of the proposed receiver for different number of users operating many times below Nyquist rate.

  14. Resource Allocation for Outdoor Visible Light Communications with Energy Harvesting Capabilities

    KAUST Repository

    Abdelhady, Amr Mohamed Abdelaziz

    2018-01-25

    Visible light communication (VLC) is a promising technology that can support high data rate services for outdoor mass gathering night events while permitting energy harvesting. In this paper, a VLC system is considered where a transmitter sends data to multiple users with energy harvesting capabilities. This multi-user VLC scenario can be supported using time division multiple access (TDMA). The achievable rates using TDMA are expressed in terms of the allocated resources per user, represented by average optical intensity and time slots. This allocation is to be optimized in order to maximize the average spectral efficiency while meeting power and quality-of-service (QoS) constraints. Herein, QoS is defined as a worst-case guaranteed rate and a minimum harvested energy. To solve this optimization, the optimality conditions are first derived. Then, an efficient algorithm is developed based on the derived conditions, and its near-optimality is verified through several numerical evaluations. The obtained performance is also compared to lower-complexity algorithms, thus reflecting the performance-complexity trade-off of these algorithms.

  15. Comparison of HfCl4, HfI4, TEMA-Hf, and TDMA-Hf as precursors in early growing stages of HfO2 films deposited by ALD: A DFT study

    International Nuclear Information System (INIS)

    Cortez-Valadez, M.; Fierro, C.; Farias-Mancilla, J.R.; Vargas-Ortiz, A.; Flores-Acosta, M.; Ramírez-Bon, R.; Enriquez-Carrejo, J.L.

    2016-01-01

    Highlights: • Hafnium oxide growth on Si(100) by atomic layer deposition was simulated. • The interface structure was considered as silicate and silicide. • The interface was studied employing DFT. • TDMA-Hf precursor show better interface stability. - Abstract: The final structure of HfO 2 films grown by atomic layer deposition (ALD) after reaction with OH − ions has been analyzed by DFT (density functional theory). The interaction of the precursors: HfCl 4 (hafnium tetrachloride), HfI 4 (hafnium tetraiodide), TEMA-Hf (tetrakis-ethylmethylamino hafnium), and TDMA-Hf (tetrakis-dimethylamino hafnium) with HO–H was studied employing the B3LYP (Becke 3-parameter, Lee–Yang–Parr) hybrid functional and the PBE (Perdew–Burke–Ernzerhof) generalized gradient functional. The structural evolution at the Si(100) surface has been analyzed by LDA (local density approximation). The structural parameters: bond length and bond angle, and the vibrational parameters for the optimized structures are also reported. The presence of hafnium silicate at the interface was detected. The infrared spectra and structural parameters obtained in this work agree with previously reported experimental results.

  16. FODA/IBEA-TDMA - A flexible fade countermeasure system for integrated services in user-oriented networks

    Science.gov (United States)

    Celandroni, N.; Ferro, E.; James, N.; Potorti, F.

    1992-12-01

    A flexible, processor based, TDMA station has been implemented. This station and its associated variable data rate modem enables users to implement very complex frame structures under software control. Burst rates of 512 kb/s-8x192 Mb/s and different coding rates are possible allowing the transmitted bit energy from each station in the network to be adapted to prevailing conditions. The proposed application of the station is the transmission of mixed stream and packet traffic, in a LANs interconnection via satellite environment, using a modification of the FODA technique. The association of the up-link power control feature with the bit and coding rate variation gives the system an interesting ability to cope with fade conditions. The link outage probability is investigated for the Olympus transponder in Ka band. The ability of the system, together with the good performance of Olympus, shows that the Ka band is usable for the above mentioned types of networks without prohibitive fade degradation, at least for limited coverages.

  17. Employing optical code division multiple access technology in the all fiber loop vibration sensor system

    Science.gov (United States)

    Tseng, Shin-Pin; Yen, Chih-Ta; Syu, Rong-Shun; Cheng, Hsu-Chih

    2013-12-01

    This study proposes a spectral amplitude coding-optical code division multiple access (SAC-OCDMA) framework to access the vibration frequency of a test object on the all fiber loop vibration sensor (AFLVS). Each user possesses an individual SAC, and fiber Bragg grating (FBG) encoders/decoders using multiple FBG arrays were adopted, providing excellent orthogonal properties in the frequency domain. The system also mitigates multiple access interference (MAI) among users. When an optical fiber is bent to a point exceeding the critical radius, the fiber loop sensor becomes sensitive to external physical parameters (e.g., temperature, strain, and vibration). The AFLVS involves placing a fiber loop with a specific radius on a designed vibration platform.

  18. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  19. Single-word multiple-bit upsets in static random access devices

    International Nuclear Information System (INIS)

    Koga, R.; Pinkerton, S.D.; Lie, T.J.; Crawford, K.B.

    1993-01-01

    Energetic ions and protons can cause single event upsets (SEUs) in static random access memory (SRAM) cells. In some cases multiple bits may be upset as the result of a single event. Space-borne electronics systems incorporating high-density SRAM are vulnerable to single-word multiple-bit upsets (SMUs). The authors review here recent observations of SMU, present the results of a systematic investigation of the physical cell arrangements employed in several currently available SRAM device types, and discuss implications for the occurrence and mitigation of SMU

  20. Description and Simulation of a Fast Packet Switch Architecture for Communication Satellites

    Science.gov (United States)

    Quintana, Jorge A.; Lizanich, Paul J.

    1995-01-01

    The NASA Lewis Research Center has been developing the architecture for a multichannel communications signal processing satellite (MCSPS) as part of a flexible, low-cost meshed-VSAT (very small aperture terminal) network. The MCSPS architecture is based on a multifrequency, time-division-multiple-access (MF-TDMA) uplink and a time-division multiplex (TDM) downlink. There are eight uplink MF-TDMA beams, and eight downlink TDM beams, with eight downlink dwells per beam. The information-switching processor, which decodes, stores, and transmits each packet of user data to the appropriate downlink dwell onboard the satellite, has been fully described by using VHSIC (Very High Speed Integrated-Circuit) Hardware Description Language (VHDL). This VHDL code, which was developed in-house to simulate the information switching processor, showed that the architecture is both feasible and viable. This paper describes a shared-memory-per-beam architecture, its VHDL implementation, and the simulation efforts.

  1. Pulse patterning effect in optical pulse division multiplexing for flexible single wavelength multiple access optical network

    Science.gov (United States)

    Jung, Sun-Young; Kim, Chang-Hun; Han, Sang-Kook

    2018-05-01

    A demand for high spectral efficiency requires multiple access within a single wavelength, but the uplink signals are significantly degraded because of optical beat interference (OBI) in intensity modulation/direct detection system. An optical pulse division multiplexing (OPDM) technique was proposed that could effectively reduce the OBI via a simple method as long as near-orthogonality is satisfied, but the condition was strict, and thus, the number of multiplexing units was very limited. We propose pulse pattern enhanced OPDM (e-OPDM) to reduce the OBI and improve the flexibility in multiple access within a single wavelength. The performance of the e-OPDM and patterning effect are experimentally verified after 23-km single mode fiber transmission. By employing pulse patterning in OPDM, the tight requirement was relaxed by extending the optical delay dynamic range. This could support more number of access with reduced OBI, which could eventually enhance a multiple access function.

  2. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  3. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  4. A Multiple-Reception Access Protocol with Interruptions with Mixed Priorities in CDMA Networks

    Institute of Scientific and Technical Information of China (English)

    Lu Xiaowen; Zhu Jinkang

    2003-01-01

    A novel access protocol called Multiple-Reception Access Protocol (MRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach.

  5. Cooperative Spatial Reuse with Transmit Beamforming in Multi-rate Wireless Networks

    DEFF Research Database (Denmark)

    Lu, Chenguang; Fitzek, Frank; Eggers, Patrick Claus F.

    2009-01-01

    We present a cooperative spatial reuse (CSR) scheme as a cooperative extension of the current TDMA-based MAC to enable spatial reuse in multi-rate wireless networks. We model spatial reuse as a cooperation problem on utilizing the time slots obtained from the TDMA-based MAC. In CSR, there are two...... operation modes. One is TDMA mode while the other is spatial reuse mode in which links transmit simultaneously. Links contribute their own time slots to form a cooperative group to do spatial reuse. Each link joins the group only if it can benefit in capacity or energy efficiency. Otherwise, the link...... will leave spatial reuse mode and switch back to TDMA. In this work, we focus on the transmit beamforming techniques to enable CSR by interference cancellation on MISO (Multiple Input Single Output) links. We compare the CSR scheme using zero-forcing (ZF) transmit beamforming, namely ZF-CSR, to the TDMA...

  6. Impact of optical hard limiter on the performance of an optical overlapped-code division multiple access system

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Tablieh, Nicole

    2011-08-01

    Throughout this paper, a closed form expression of the multiple access interference (MAI) limited bit error rate (BER) is provided for the multiwavelength optical code-division multiple-access system when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. This system is known in literature as the optical overlapped code division multiple access (OV-CDMA) system. A unified analytical framework is presented emphasizing the impact of optical hard limiter (OHL) on the BER performance of such a system. Results show that the performance of the OV-CDMA system may be highly improved when using OHL preprocessing at the receiver side.

  7. On the Capacity of the 2-User IM-DD Optical Broadcast Channel

    KAUST Repository

    Chaaban, Anas

    2016-02-26

    The capacity of the intensity-modulation directdetection (IM-DD) optical broadcast channel (OBC) is investigated. The OBC is modeled as a Gaussian channel with input-independent noise and both average and peak input constraints. Outer and inner bounds on the capacity region are derived. The outer bounds are based on Bergmans\\' approach. The inner bounds are based on superposition coding with either truncated-Gaussian or discrete input distributions. By comparing the bounds, we observe that the truncated- Gaussian distribution is nearly optimal at high signal-to-noise ratio (SNR). At low SNR on the other hand, on-off keying (OOK) combined with time-division multiple-access (TDMA) is optimal; it achieves any point on the boundary of the developed outer bound. This is interesting in practice since both OOK and TDMA have low complexity. At moderate SNR (typically [0; 8] dB), a discrete input distribution with a small alphabet size achieves a fairly good performance. © 2015 IEEE.

  8. Access to DIII-D data located in multiple files and multiple locations

    International Nuclear Information System (INIS)

    McHarg, B.B. Jr.

    1993-10-01

    The General Atomics DIII-D tokamak fusion experiment is now collecting over 80 MB of data per discharge once every 10 min, and that quantity is expected to double within the next year. The size of the data files, even in compressed format, is becoming increasingly difficult to handle. Data is also being acquired now on a variety of UNIX systems as well as MicroVAX and MODCOMP computer systems. The existing computers collect all the data into a single shot file, and this data collection is taking an ever increasing amount of time as the total quantity of data increases. Data is not available to experimenters until it has been collected into the shot file, which is in conflict with the substantial need for data examination on a timely basis between shots. The experimenters are also spread over many different types of computer systems (possibly located at other sites). To improve data availability and handling, software has been developed to allow individual computer systems to create their own shot files locally. The data interface routine PTDATA that is used to access DIII-D data has been modified so that a user's code on any computer can access data from any computer where that data might be located. This data access is transparent to the user. Breaking up the shot file into separate files in multiple locations also impacts software used for data archiving, data management, and data restoration

  9. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  10. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  11. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.

    2018-03-21

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\\\mathcal{R}_{\\ m tot}$, for general $N$, constrained to: 1) a minimum rate $\\\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\\\mathcal{R}_{\\ m tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\\\mathcal{R}_{\\ m tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  12. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.; Haenggi, Martin; Elsawy, Hesham; Chaaban, Anas; Alouini, Mohamed-Slim

    2018-01-01

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\mathcal{R}_{\\rm tot}$, for general $N$, constrained to: 1) a minimum rate $\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\mathcal{R}_{\\rm tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\mathcal{R}_{\\rm tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  13. Polarization diversity scheme on spectral polarization coding optical code-division multiple-access network

    Science.gov (United States)

    Yen, Chih-Ta; Huang, Jen-Fa; Chang, Yao-Tang; Chen, Bo-Hau

    2010-12-01

    We present an experiment demonstrating the spectral-polarization coding optical code-division multiple-access system introduced with a nonideal state of polarization (SOP) matching conditions. In the proposed system, the encoding and double balanced-detection processes are implemented using a polarization-diversity scheme. Because of the quasiorthogonality of Hadamard codes combining with array waveguide grating routers and a polarization beam splitter, the proposed codec pair can encode-decode multiple code words of Hadamard code while retaining the ability for multiple-access interference cancellation. The experimental results demonstrate that when the system is maintained with an orthogonal SOP for each user, an effective reduction in the phase-induced intensity noise is obtained. The analytical SNR values are found to overstate the experimental results by around 2 dB when the received effective power is large. This is mainly limited by insertion losses of components and a nonflattened optical light source. Furthermore, the matching conditions can be improved by decreasing nonideal influences.

  14. Performance analysis of multiple interference suppression over asynchronous/synchronous optical code-division multiple-access system based on complementary/prime/shifted coding scheme

    Science.gov (United States)

    Nieh, Ta-Chun; Yang, Chao-Chin; Huang, Jen-Fa

    2011-08-01

    A complete complementary/prime/shifted prime (CPS) code family for the optical code-division multiple-access (OCDMA) system is proposed. Based on the ability of complete complementary (CC) code, the multiple-access interference (MAI) can be suppressed and eliminated via spectral amplitude coding (SAC) OCDMA system under asynchronous/synchronous transmission. By utilizing the shifted prime (SP) code in the SAC scheme, the hardware implementation of encoder/decoder can be simplified with a reduced number of optical components, such as arrayed waveguide grating (AWG) and fiber Bragg grating (FBG). This system has a superior performance as compared to previous bipolar-bipolar coding OCDMA systems.

  15. Code division multiple-access techniques in optical fiber networks. II - Systems performance analysis

    Science.gov (United States)

    Salehi, Jawad A.; Brackett, Charles A.

    1989-08-01

    A technique based on optical orthogonal codes was presented by Salehi (1989) to establish a fiber-optic code-division multiple-access (FO-CDMA) communications system. The results are used to derive the bit error rate of the proposed FO-CDMA system as a function of data rate, code length, code weight, number of users, and receiver threshold. The performance characteristics for a variety of system parameters are discussed. A means of reducing the effective multiple-access interference signal by placing an optical hard-limiter at the front end of the desired optical correlator is presented. Performance calculations are shown for the FO-CDMA with an ideal optical hard-limiter, and it is shown that using a optical hard-limiter would, in general, improve system performance.

  16. Multiple Access Interference Reduction Using Received Response Code Sequence for DS-CDMA UWB System

    Science.gov (United States)

    Toh, Keat Beng; Tachikawa, Shin'ichi

    This paper proposes a combination of novel Received Response (RR) sequence at the transmitter and a Matched Filter-RAKE (MF-RAKE) combining scheme receiver system for the Direct Sequence-Code Division Multiple Access Ultra Wideband (DS-CDMA UWB) multipath channel model. This paper also demonstrates the effectiveness of the RR sequence in Multiple Access Interference (MAI) reduction for the DS-CDMA UWB system. It suggests that by using conventional binary code sequence such as the M sequence or the Gold sequence, there is a possibility of generating extra MAI in the UWB system. Therefore, it is quite difficult to collect the energy efficiently although the RAKE reception method is applied at the receiver. The main purpose of the proposed system is to overcome the performance degradation for UWB transmission due to the occurrence of MAI during multiple accessing in the DS-CDMA UWB system. The proposed system improves the system performance by improving the RAKE reception performance using the RR sequence which can reduce the MAI effect significantly. Simulation results verify that significant improvement can be obtained by the proposed system in the UWB multipath channel models.

  17. Implementation of Multiple Access Techniques Applicable for Maritime Satellite Communications

    OpenAIRE

    Stojce Dimov Ilcev

    2013-01-01

    In this paper are introduced fundamentals, characteristics, advantages and disadvantages of Multiple Access (MA) employed as transmission techniques in the Maritime Mobile Satellite Communications (MMSC) between ships and Coast Earth Station (CES) via Geostationary Earth Orbit (GEO) or Not-GEO satellite constellations. In fixed satellite communication, as a rule, especially in MMSC many users are active at the same time. The problem of simultaneous communications between many single or multip...

  18. Comparison of HfCl{sub 4}, HfI{sub 4}, TEMA-Hf, and TDMA-Hf as precursors in early growing stages of HfO{sub 2} films deposited by ALD: A DFT study

    Energy Technology Data Exchange (ETDEWEB)

    Cortez-Valadez, M. [Departamento de Investigación en Física, Universidad de Sonora, Apdo. Postal 5-88, 83190 Hermosillo, Son. (Mexico); Fierro, C.; Farias-Mancilla, J.R. [Instituto de Ingeniería y Tecnología, Departamento de Física y Matemáticas, Universidad Autónoma de Ciudad Juárez, Av. del Charro 450, Cd. Juárez C.P. 32310, Chihuahua (Mexico); Vargas-Ortiz, A. [Universidad Autónoma de Sinaloa, Facultad de Ingeniería Mochis, Ciudad Universitaria, C.P. 81223 Los Mochis, Sinaloa (Mexico); Flores-Acosta, M. [Departamento de Investigación en Física, Universidad de Sonora, Apdo. Postal 5-88, 83190 Hermosillo, Son. (Mexico); Ramírez-Bon, R. [Centro de Investigación y Estudios Avanzados del IPN, Unidad Querétaro, Apdo. Postal 1-798, 76001 Querétaro, Qro. (Mexico); Enriquez-Carrejo, J.L. [Instituto de Ingeniería y Tecnología, Departamento de Física y Matemáticas, Universidad Autónoma de Ciudad Juárez, Av. del Charro 450, Cd. Juárez C.P. 32310, Chihuahua (Mexico); and others

    2016-06-15

    Highlights: • Hafnium oxide growth on Si(100) by atomic layer deposition was simulated. • The interface structure was considered as silicate and silicide. • The interface was studied employing DFT. • TDMA-Hf precursor show better interface stability. - Abstract: The final structure of HfO{sub 2} films grown by atomic layer deposition (ALD) after reaction with OH{sup −} ions has been analyzed by DFT (density functional theory). The interaction of the precursors: HfCl{sub 4} (hafnium tetrachloride), HfI{sub 4} (hafnium tetraiodide), TEMA-Hf (tetrakis-ethylmethylamino hafnium), and TDMA-Hf (tetrakis-dimethylamino hafnium) with HO–H was studied employing the B3LYP (Becke 3-parameter, Lee–Yang–Parr) hybrid functional and the PBE (Perdew–Burke–Ernzerhof) generalized gradient functional. The structural evolution at the Si(100) surface has been analyzed by LDA (local density approximation). The structural parameters: bond length and bond angle, and the vibrational parameters for the optimized structures are also reported. The presence of hafnium silicate at the interface was detected. The infrared spectra and structural parameters obtained in this work agree with previously reported experimental results.

  19. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  20. A distributed Synchronous reservation multiple access control protocol for mobile Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanling; SUN Xianpu; LI Jiandong

    2007-01-01

    This study proposes a new multiple access control protocol named distributed synchronous reservation multiple access control protocol.in which the hidden and exposed terminal problems are solved,and the quality of service(QoS)requirements for real-time traffic are guaranteed.The protocol is founded on time division multiplex address and a different type of traffic is assigned to difierent priority,according to which a node should compete for and reserve the free slots in a different method.Moreover,there is a reservation acknowledgement process before data transmit in each reserved slot,so that the intruded terminal problem is solved.The throughput and average packets drop probability of this protocol are analyzed and simulated in a fully connected network.the results of which indicate that this protocol is efficient enough to support the real-time traffic.and it is more suitable to MANETs.

  1. The Effects of Noncontingent Access to Single-versus Multiple-Stimulus Sets on Self-Injurious Behavior.

    Science.gov (United States)

    DeLeon, Iser G.; Anders, Bonita M.; Rodriguez-Catter, Vanessa; Neidert, Pamela L.

    2000-01-01

    The automatically reinforced self-injury of a girl (age 11) with autism was treated by providing noncontingent access to a single set of preferred toys during 30-minute sessions. Rotating toy sets after 10 minutes or providing access to multiple toy sets resulted in reductions that lasted the entire 30 minutes. (Contains four references.)…

  2. Performance of Non-Orthogonal Multiple Access (NOMA) in mmWave wireless communications for 5G networks

    DEFF Research Database (Denmark)

    Marcano, Andrea; Christiansen, Henrik Lehrmann

    2017-01-01

    Among the key technologies that have been identified as capacity boosters for fifth generation - 5G - mobile networks, are millimeter wave (mmWave) transmissions and non-orthogonal multiple access (NOMA). The large amount of spectrum available at mmWave frequencies combined with a more effective...... use of available resources, helps improving the overall capacity. NOMA, unlike orthogonal multiple access (OMA) methods, allows sharing the same frequency resources at the same time, by implementing adaptive power allocation. In this paper we present a performance analysis of NOMA in mmWave cells...

  3. Performance enhancement of optical code-division multiple-access systems using transposed modified Walsh code

    Science.gov (United States)

    Sikder, Somali; Ghosh, Shila

    2018-02-01

    This paper presents the construction of unipolar transposed modified Walsh code (TMWC) and analysis of its performance in optical code-division multiple-access (OCDMA) systems. Specifically, the signal-to-noise ratio, bit error rate (BER), cardinality, and spectral efficiency were investigated. The theoretical analysis demonstrated that the wavelength-hopping time-spreading system using TMWC was robust against multiple-access interference and more spectrally efficient than systems using other existing OCDMA codes. In particular, the spectral efficiency was calculated to be 1.0370 when TMWC of weight 3 was employed. The BER and eye pattern for the designed TMWC were also successfully obtained using OptiSystem simulation software. The results indicate that the proposed code design is promising for enhancing network capacity.

  4. Power Allocation in Multiple Access Networks: Implementation Aspects via Verhulst and Perron-Frobenius Models

    Directory of Open Access Journals (Sweden)

    Fábio Engel de Camargo

    2012-11-01

    Full Text Available In this work, the Verhulst model and the Perron-Frobenius theorem are applied on the power control problem which is a concern in multiple access communication networks due to the multiple access interference. This paper deals with the performance versus complexity tradeoff of both power control algorithm (PCA, as well as highlights the computational cost aspects regarding the implementability of distributed PCA (DPCA version for both algorithms. As a proof-of-concept the DPCA implementation is carried out deploying a commercial point-floating DSP platform. Numerical results in terms of DSP cycles and computational time as well indicate a feasibility of implementing the PCA-Verhulst model in 2G and 3G cellular systems; b high computational cost for the PCA-Perron-Frobenius model.

  5. Downlink resource allocation for multichannel TDMA visible light communications

    KAUST Repository

    Abdelhady, Amr Mohamed Abdelaziz; Amin, Osama; Chaaban, Anas; Alouini, Mohamed-Slim

    2017-01-01

    Optical wireless communications (OWC) in general and resource allocation in OWC networks particularly have gained lots of attention recently. In this work, we consider the resource allocation problem of a visible light communication downlink transmission system based on time division multiple access with the objective of maximizing spectral efficiency (SE). As for the operational conditions, we impose constraints on the average optical intensity, the energy consumption and the quality-of-service. To solve the non-convex problem, we transform the objective function into a difference of concave functions by solving a second order differential inequality. Then, we propose a low-complexity algorithm to solve the resource allocation problem. Finally, we show by simulations the SE performance gains achieved by optimizing the power allocation over equal power allocation in the considered system. Numerical results show the SE gains achieved by using this solution.

  6. Downlink resource allocation for multichannel TDMA visible light communications

    KAUST Repository

    Abdelhady, Amr Mohamed Abdelaziz

    2017-05-12

    Optical wireless communications (OWC) in general and resource allocation in OWC networks particularly have gained lots of attention recently. In this work, we consider the resource allocation problem of a visible light communication downlink transmission system based on time division multiple access with the objective of maximizing spectral efficiency (SE). As for the operational conditions, we impose constraints on the average optical intensity, the energy consumption and the quality-of-service. To solve the non-convex problem, we transform the objective function into a difference of concave functions by solving a second order differential inequality. Then, we propose a low-complexity algorithm to solve the resource allocation problem. Finally, we show by simulations the SE performance gains achieved by optimizing the power allocation over equal power allocation in the considered system. Numerical results show the SE gains achieved by using this solution.

  7. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    Science.gov (United States)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  8. Multiuser chirp modulation for underwater acoustic channel based on VTRM

    Directory of Open Access Journals (Sweden)

    Fei Yuan

    2017-05-01

    Full Text Available In this paper, an ascheme is proposed for multiuser underwater acoustic communication by using the multi-chirp rate signals. It differs from the well known TDMA (Time Division Multiple Access, FDMA (Frequency Division Multiple Access or CDMA (Code Division Multiple Access, by assigning each users with different chirp-rate carriers instead of the time, frequency or PN code. Multi-chirp rate signals can be separated from each other by FrFT (Fractional Fourier Transform, which can be regarded as the chirp-based decomposing, and superior to the match filter in the underwater acoustic channel. VTRM (Virtual Time Reverse Mirror is applied into the system to alleviate the ISI caused by the multipatch and make the equalization more simple. Results of computer simulations and pool experiments prove that the proposed multiuser underwater acoustic communication based on the multi-chirp rate exhibit well performance. Outfield experments carrie out in Xiamen Port show that using about 10 kHz bandwidth, four users could communicate at the same time with 425 bps with low BER and can match the UAC application.

  9. Gigabit Ethernet signal transmission using asynchronous optical code division multiple access.

    Science.gov (United States)

    Ma, Philip Y; Fok, Mable P; Shastri, Bhavin J; Wu, Ben; Prucnal, Paul R

    2015-12-15

    We propose and experimentally demonstrate a novel architecture for interfacing and transmitting a Gigabit Ethernet (GbE) signal using asynchronous incoherent optical code division multiple access (OCDMA). This is the first such asynchronous incoherent OCDMA system carrying GbE data being demonstrated to be working among multi-users where each user is operating with an independent clock/data rate and is granted random access to the network. Three major components, the GbE interface, the OCDMA transmitter, and the OCDMA receiver are discussed in detail. The performance of the system is studied and characterized through measuring eye diagrams, bit-error rate and packet loss rate in real-time file transfer. Our Letter also addresses the near-far problem and realizes asynchronous transmission and detection of signal.

  10. Sum-Rate Enhancement in Multiuser MIMO Decode-and-Forward Relay Broadcasting Channel with Energy Harvesting Relays

    KAUST Repository

    Benkhelifa, Fatma

    2016-09-20

    In this paper, we consider a multiuser multipleinput multiple-output (MIMO) decode-and-forward (DF) relay broadcasting channel (BC) with single source, multiple energy harvesting (EH) relays and multiple destinations. All the nodes are equipped with multiple antennas. The EH and information decoding (ID) tasks at the relays and destinations are separated over the time, which is termed as the time switching (TS) scheme. As optimal solutions for the sum-rate maximization problems of BC channels and the MIMO interference channels are hard to obtain, the end-to-end sum rate maximization problem of a multiuser MIMO DF relay BC channel is even harder. In this paper, we propose to tackle a simplified problem where we employ the block diagonalization (BD) procedure at the source, and we mitigate the interference between the relaydestination channels using an algorithm similar to the BD method. In order to show the relevance of our low complex proposed solution, we compare it to the minimum mean-square error (MMSE) solution that was shown in the literature to be equivalent to the solution of the sum-rate maximization in MIMO broadcasting interfering channels. We also investigate the time division multiple access (TDMA) solution which separates all the information transmissions from the source to the relays and from the relays to the destinations over time. We provide numerical results to show the relevance of our proposed solution, in comparison with the no co-channel interference (CCI) case, the TDMA based solution and the MMSE based solution.

  11. Sum-Rate Enhancement in Multiuser MIMO Decode-and-Forward Relay Broadcasting Channel with Energy Harvesting Relays

    KAUST Repository

    Benkhelifa, Fatma; Salem, Ahmed Sultan; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we consider a multiuser multipleinput multiple-output (MIMO) decode-and-forward (DF) relay broadcasting channel (BC) with single source, multiple energy harvesting (EH) relays and multiple destinations. All the nodes are equipped with multiple antennas. The EH and information decoding (ID) tasks at the relays and destinations are separated over the time, which is termed as the time switching (TS) scheme. As optimal solutions for the sum-rate maximization problems of BC channels and the MIMO interference channels are hard to obtain, the end-to-end sum rate maximization problem of a multiuser MIMO DF relay BC channel is even harder. In this paper, we propose to tackle a simplified problem where we employ the block diagonalization (BD) procedure at the source, and we mitigate the interference between the relaydestination channels using an algorithm similar to the BD method. In order to show the relevance of our low complex proposed solution, we compare it to the minimum mean-square error (MMSE) solution that was shown in the literature to be equivalent to the solution of the sum-rate maximization in MIMO broadcasting interfering channels. We also investigate the time division multiple access (TDMA) solution which separates all the information transmissions from the source to the relays and from the relays to the destinations over time. We provide numerical results to show the relevance of our proposed solution, in comparison with the no co-channel interference (CCI) case, the TDMA based solution and the MMSE based solution.

  12. Optical code-division multiple-access networks

    Science.gov (United States)

    Andonovic, Ivan; Huang, Wei

    1999-04-01

    This review details the approaches adopted to implement classical code division multiple access (CDMA) principles directly in the optical domain, resulting in all optical derivatives of electronic systems. There are a number of ways of realizing all-optical CDMA systems, classified as incoherent and coherent based on spreading in the time and frequency dimensions. The review covers the basic principles of optical CDMA (OCDMA), the nature of the codes used in these approaches and the resultant limitations on system performance with respect to the number of stations (code cardinality), the number of simultaneous users (correlation characteristics of the families of codes), concluding with consideration of network implementation issues. The latest developments will be presented with respect to the integration of conventional time spread codes, used in the bulk of the demonstrations of these networks to date, with wavelength division concepts, commonplace in optical networking. Similarly, implementations based on coherent correlation with the aid of a local oscillator will be detailed and comparisons between approaches will be drawn. Conclusions regarding the viability of these approaches allowing the goal of a large, asynchronous high capacity optical network to be realized will be made.

  13. Beat Noise Cancellation in 2-D Optical Code-Division Multiple-Access Systems Using Optical Hard-Limiter Array

    Science.gov (United States)

    Dang, Ngoc T.; Pham, Anh T.; Cheng, Zixue

    We analyze the beat noise cancellation in two-dimensional optical code-division multiple-access (2-D OCDMA) systems using an optical hard-limiter (OHL) array. The Gaussian shape of optical pulse is assumed and the impact of pulse propagation is considered. We also take into account the receiver noise and multiple access interference (MAI) in the analysis. The numerical results show that, when OHL array is employed, the system performance is greatly improved compared with the cases without OHL array. Also, parameters needed for practical system design are comprehensively analyzed.

  14. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.; Aï ssa, Sonia

    2012-01-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary's reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  15. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.

    2012-09-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary\\'s reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  16. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  17. Reduction of the near-far effect in mobile communication systems with Code-Division Multiple-Access

    Science.gov (United States)

    Purchla, Magdalena

    2006-02-01

    In this paper the basic methods for reducing Multiple Access Interference (MAI) and combating the near-far effect in Direct-Sequence Code-Division Multiple-Access (DS-CDMA) mobile communication systems are presented. MAI and the near-far effect are inevitable in DS-CDMA systems with quasi-orthogonal spreading sequences. An effective method of reducing MAI can increase the capacity of the system that is why so many researchers are working in this field. In this article three most important techniques of decreasing MAI are presented: power control, multiuser detection and space-time processing. There is a short introduction to each topic and one or more examples found in literature of algorithms suitable for practical applications (although not all algorithms are yet used in existing systems).

  18. Interim Service ISDN Satellite (ISIS) hardware experiment development for advanced ISDN satellite designs and experiments

    Science.gov (United States)

    Pepin, Gerard R.

    1992-01-01

    The Interim Service Integrated Service Digital Network (ISDN) Satellite (ISIS) Hardware Experiment Development for Advanced Satellite Designs describes the development of the ISDN Satellite Terminal Adapter (ISTA) capable of translating ISDN protocol traffic into Time Division Multiple Access (TDMA) signals for use by a communications satellite. The ISTA connects the Type 1 Network Termination (NT1) via the U-interface on the line termination side of the CPE to the RS-499 interface for satellite uplink. The same ISTA converts in the opposite direction the RS-499 to U-interface data with a simple switch setting.

  19. Interim Service ISDN Satellite (ISIS) hardware experiment design for advanced ISDN satellite design and experiments

    Science.gov (United States)

    Pepin, Gerard R.

    1992-01-01

    The Interim Service Integrated Services Digital Network (ISDN) Satellite (ISIS) Hardware Experiment Design for Advanced Satellite Designs describes the design of the ISDN Satellite Terminal Adapter (ISTA) capable of translating ISDN protocol traffic into time division multiple access (TDMA) signals for use by a communications satellite. The ISTA connects the Type 1 Network Termination (NT1) via the U-interface on the line termination side of the CPE to the V.35 interface for satellite uplink. The same ISTA converts in the opposite direction the V.35 to U-interface data with a simple switch setting.

  20. Cross Layer QoS Provisioning in Home Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Brewka, Lukasz Jerzy; Ruepp, Sarah Renée

    2011-01-01

    This paper introduces an innovative QoS provisioning scheme in home networks, by utilizing Optical Wireless (OW) MAC specification proposed by Home Gigabit Access Project (OMEGA) project. The specification is characterized by its resource reservation protocol and the use of Time Division Multiple...... Access (TDMA). By adopting OW MAC to the widely supported Universal Plug and Play – Quality of Service (UPnP-QoS) Architecture in the simulated home domain, algorithms for cross layer mapping QoS requirements are proposed. Compared to utilizing WLAN MAC, our scheme is able to provide guaranteed Qo......S levels to streams with different priorities, especially to delay-sensitive services. Efficiencies of the algorithms and network performance are validated by analyzing the results collected from OPNET simulation models....

  1. Design of the frame structure for a multiservice interactive system using ATM-PON

    Science.gov (United States)

    Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae

    1998-10-01

    The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.

  2. Lexical access changes in patients with multiple sclerosis: a two-year follow-up study.

    Science.gov (United States)

    Sepulcre, Jorge; Peraita, Herminia; Goni, Joaquin; Arrondo, Gonzalo; Martincorena, Inigo; Duque, Beatriz; Velez de Mendizabal, Nieves; Masdeu, Joseph C; Villoslada, Pablo

    2011-02-01

    The aim of the study was to analyze lexical access strategies in patients with multiple sclerosis (MS) and their changes over time. We studied lexical access strategies during semantic and phonemic verbal fluency tests and also confrontation naming in a 2-year prospective cohort of 45 MS patients and 20 healthy controls. At baseline, switching lexical access strategy (both in semantic and in phonemic verbal fluency tests) and confrontation naming were significantly impaired in MS patients compared with controls. After 2 years follow-up, switching score decreased, and cluster size increased over time in semantic verbal fluency tasks, suggesting a failure in the retrieval of lexical information rather than an impairment of the lexical pool. In conclusion, these findings underline the significant presence of lexical access problems in patients with MS and could point out their key role in the alterations of high-level communications abilities in MS.

  3. Above the nominal limit performance evaluation of multiwavelength optical code-division multiple-access systems

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Fortier, Paul; Shalaby, Hossam M. H.

    2009-03-01

    We provide an analysis for the performance of a multiwavelength optical code-division multiple-access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one-coincidence sequences with nonrepeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of the MW-OCDMA system can be critically affected when working above the nominal limit, an event that can happen when the network operates at a high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed medium access control (MAC) protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T, while the R3T is better at very high transmission rates. In general, it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  4. An access technology delivery protocol for children with severe and multiple disabilities: a case demonstration.

    Science.gov (United States)

    Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom

    2014-08-01

    This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.

  5. Optical Code-Division Multiple-Access and Wavelength Division Multiplexing: Hybrid Scheme Review

    OpenAIRE

    P. Susthitha Menon; Sahbudin Shaari; Isaac A.M. Ashour; Hesham A. Bakarman

    2012-01-01

    Problem statement: Hybrid Optical Code-Division Multiple-Access (OCDMA) and Wavelength-Division Multiplexing (WDM) have flourished as successful schemes for expanding the transmission capacity as well as enhancing the security for OCDMA. However, a comprehensive review related to this hybrid system are lacking currently. Approach: The purpose of this paper is to review the literature on OCDMA-WDM overlay systems, including our hybrid approach of one-dimensional coding of SAC OCDMA with WDM si...

  6. Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications

    Science.gov (United States)

    Zhang, Jian-Guo

    1996-12-01

    Strict optical orthogonal codes are presented for purely asynchronous optical code-division multiple-access (CDMA) applications. The proposed code can strictly guarantee the peaks of its cross-correlation functions and the sidelobes of any of its autocorrelation functions to have a value of 1 in purely asynchronous data communications. The basic theory of the proposed codes is given. An experiment on optical CDMA systems is also demonstrated to verify the characteristics of the proposed code.

  7. Reservation centre of Telecom I satellite French Telecommunication network offers a new service of switched digital circuit

    Science.gov (United States)

    Felix, J.

    The management center and new circuit switching services offered by the French Telecom I network are described. Attention is focused on business services. The satellite has a 125 Mbit/sec capability distributed over 5 frequency bands, yielding the equivalent of 1800 channels. Data are transmitted in digitized bursts with TDMA techniques. Besides the management center, Telecom I interfaces with 310 local network antennas with access managed by the center through a reservation service and protocol assignment. The center logs and supervises alarms and network events, monitors traffic, logs taxation charges and manages the man-machine dialog for TDMA and terrestrial operations. Time slots are arranged in terms of minimal 10 min segments. The reservations can be directly accessed by up to 1000 terminals. All traffic is handled on a call-by-call basis.

  8. Channel capacity of TDD-OFDM-MIMO for multiple access points in a wireless single-frequency-network

    DEFF Research Database (Denmark)

    Takatori, Y.; Fitzek, Frank; Tsunekawa, K.

    2005-01-01

    MIMO data transmission scheme, which combines Single-Frequency-Network (SFN) with TDD-OFDM-MIMO applied for wireless LAN networks. In our proposal, we advocate to use SFN for multiple access points (MAP) MIMO data transmission. The goal of this approach is to achieve very high channel capacity in both......The multiple-input-multiple-output (MIMO) technique is the most attractive candidate to improve the spectrum efficiency in the next generation wireless communication systems. However, the efficiency of MIMO techniques reduces in the line of sight (LOS) environments. In this paper, we propose a new...

  9. Reducing BER of spectral-amplitude coding optical code-division multiple-access systems by single photodiode detection technique

    Science.gov (United States)

    Al-Khafaji, H. M. R.; Aljunid, S. A.; Amphawan, A.; Fadhil, H. A.; Safar, A. M.

    2013-03-01

    In this paper, we present a single photodiode detection (SPD) technique for spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) systems. The proposed technique eliminates both phase-induced intensity noise (PIIN) and multiple-access interference (MAI) in the optical domain. Analytical results show that for 35 simultaneous users transmitting at data rate of 622 Mbps, the bit-error rate (BER) = 1.4x10^-28 for SPD technique is much better compared to 9.3x10^-6 and 9.6x10^-3 for the modified-AND as well as the AND detection techniques, respectively. Moreover, we verified the improved performance afforded by the proposed technique using data transmission simulations.

  10. System performances of optical space code-division multiple-access-based fiber-optic two-dimensional parallel data link.

    Science.gov (United States)

    Nakamura, M; Kitayama, K

    1998-05-10

    Optical space code-division multiple access is a scheme to multiplex and link data between two-dimensional processors such as smart pixels and spatial light modulators or arrays of optical sources like vertical-cavity surface-emitting lasers. We examine the multiplexing characteristics of optical space code-division multiple access by using optical orthogonal signature patterns. The probability density function of interference noise in interfering optical orthogonal signature patterns is calculated. The bit-error rate is derived from the result and plotted as a function of receiver threshold, code length, code weight, and number of users. Furthermore, we propose a prethresholding method to suppress the interference noise, and we experimentally verify that the method works effectively in improving system performance.

  11. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  12. Effective use of multibeam antenna and space-time multiple access technology in modern mobile communication systems

    OpenAIRE

    Moskalets, N. V.

    2015-01-01

    A possibility for efficient use of radio-frequency spectrum and of corresponding increase in productivity of mobile communication system with space-time multiple access obtained by use of multibeam antenna of base station is considered.

  13. Performance analysis of commercial multiple-input-multiple-output access point in distributed antenna system.

    Science.gov (United States)

    Fan, Yuting; Aighobahi, Anthony E; Gomes, Nathan J; Xu, Kun; Li, Jianqiang

    2015-03-23

    In this paper, we experimentally investigate the throughput of IEEE 802.11n 2x2 multiple-input-multiple-output (MIMO) signals in a radio-over-fiber-based distributed antenna system (DAS) with different fiber lengths and power imbalance. Both a MIMO-supported access point (AP) and a spatial-diversity-supported AP were separately employed in the experiments. Throughput measurements were carried out with wireless users at different locations in a typical office environment. For the different fiber length effect, the results indicate that MIMO signals can maintain high throughput when the fiber length difference between the two remote antenna units (RAUs) is under 100 m and falls quickly when the length difference is greater. For the spatial diversity signals, high throughput can be maintained even when the difference is 150 m. On the other hand, the separation of the MIMO antennas allows additional freedom in placing the antennas in strategic locations for overall improved system performance, although it may also lead to received power imbalance problems. The results show that the throughput performance drops in specific positions when the received power imbalance is above around 13 dB. Hence, there is a trade-off between the extent of the wireless coverage for moderate bit-rates and the area over which peak bit-rates can be achieved.

  14. Average Likelihood Methods of Classification of Code Division Multiple Access (CDMA)

    Science.gov (United States)

    2016-05-01

    subject to code matrices that follows the structure given by (113). [⃗ yR y⃗I ] = √ Es 2L [ GR1 −GI1 GI2 GR2 ] [ QR −QI QI QR ] [⃗ bR b⃗I ] + [⃗ nR n⃗I... QR ] [⃗ b+ b⃗− ] + [⃗ n+ n⃗− ] (115) The average likelihood for type 4 CDMA (116) is a special case of type 1 CDMA with twice the code length and...AVERAGE LIKELIHOOD METHODS OF CLASSIFICATION OF CODE DIVISION MULTIPLE ACCESS (CDMA) MAY 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  15. Intrusion Detection of DoS Attacks in WSNs Using Classification ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Abstract- Wireless Sensor Networks (WSNs) consist of a large number of ... have limited energy and memory capacity [2]. The computation of ..... Access (TDMA) schedules for the data transmission time slots. Here the attacker ...

  16. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    Science.gov (United States)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  17. Dispersion-flattened-fiber based optical thresholder for multiple-access-interference suppression in OCDMA system.

    Science.gov (United States)

    Wang, Xu; Hamanaka, Taro; Wada, Naoya; Kitayama, Ken-Ichi

    2005-07-11

    An optical thresholding technique based on super-continuum generation in dispersion flattened fiber is proposed and experimentally demonstrated to enable data-rate detection in optical code division multiple access networks. The proposed scheme exhibits an excellent discrimination between a desired signal and interference signals with features of pulse reshaping, low insertion loss, polarization independency as well as reasonable operation power.

  18. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2015-01-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  19. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman

    2015-03-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  20. Nonadditivity of quantum capacities of quantum multiple-access channels and the butterfly network

    International Nuclear Information System (INIS)

    Huang Peng; He Guangqiang; Zhu Jun; Zeng Guihua

    2011-01-01

    Multipartite quantum information transmission without additional classical resources is investigated. We show purely quantum superadditivity of quantum capacity regions of quantum memoryless multiple-access (MA) channels, which are not entanglement breaking. Also, we find that the superadditivity holds when the MA channel extends to the quantum butterfly network, which can achieve quantum network coding. The present widespread effects for the channels which enable entanglement distribution have not been revealed for multipartite scenarios.

  1. Cascaded holographic polymer reflection grating filters for optical-code-division multiple-access applications.

    Science.gov (United States)

    Kostuk, Raymond K; Maeda, Wendi; Chen, Chia-Hung; Djordjevic, Ivan; Vasic, Bane

    2005-12-10

    We evaluate the use of edge-illuminated holographic Bragg filters formed in phenanthrenequinone-doped poly(methyl methacrylate) for optical-code-division multiple-access (OCDMA) coding and decoding applications. Experimental cascaded Bragg filters are formed to select two different wavelengths with a fixed distance between the gratings and are directly coupled to a fiber-measurement system. The configuration and tolerances of the cascaded gratings are shown to be practical for time-wavelength OCDMA applications.

  2. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  3. ADNP-CSMA Random Multiple Access protocol application with the function of monitoring in Ad Hoc network

    Directory of Open Access Journals (Sweden)

    Zhan Gang

    2016-01-01

    Full Text Available In Ad Hoc networks,the net work of mobile nodes exchange information with their wireless transceiver equipment,the network throughput is in increased,compared to other such multiple hops network.Moreover along with the rapid development of modern information,communication business also will be increase.However,the access and adaptive of previous CSMA protocol are insufficient.According to these properties,this paper presents a kind of adaptive dual clock with monitoring function P-CSMA random multiple access protocol(ADNP-CSMA,and discusses two kinds of P-CSMA.ACK with monitoring function is introduced to maintain the stability of the whole system,and the introduction of dual clock mechanism reduces the channel of idle period.It calculate the system throughput expression through the method of average period,and the simulation results show that the system is constant in the case of high load throughput.

  4. Constructing a two bands optical code-division multiple-access network of bipolar optical access codecs using Walsh-coded liquid crystal modulators

    Science.gov (United States)

    Yen, Chih-Ta; Huang, Jen-Fa; Chih, Ping-En

    2014-08-01

    We propose and experimentally demonstrated the two bands optical code-division multiple-access (OCDMA) network over bipolar Walsh-coded liquid-crystal modulators (LCMs) and driven by green light and red light lasers. Achieving system performance depends on the construction of a decoder that implements a true bipolar correlation using only unipolar signals and intensity detection for each band. We took advantage of the phase delay characteristics of LCMs to construct a prototype optical coder/decoder (codec). Matched and unmatched Walsh signature codes were evaluated to detect correlations among multiuser data in the access network. By using LCMs, a red and green laser light source was spectrally encoded and the summed light dots were complementary decoded. Favorable contrast on auto- and cross-correlations indicates that binary information symbols can be properly recovered using a balanced photodetector.

  5. Hermitian symmetry free optical-single-carrier frequency division multiple access for visible light communication

    Science.gov (United States)

    Azim, Ali W.; Le Guennec, Yannis; Maury, Ghislaine

    2018-05-01

    Optical-orthogonal frequency division multiplexing (O-OFDM) is an effective scheme for visible light communications (VLC), offering a candid extension to multiple access (MA) scenarios, i.e., O-OFDMA. However, O-OFDMA exhibits high peak-to-average power ratio (PAPR), which exacerbates the non-linear distortions from the light emitting diode (LED). To overcome high PAPR while sustaining MA, optical-single-carrier frequency-division multiple access (O-SCFDMA) is used. For both O-OFDMA and O-SCFDMA, Hermitian symmetry (HS) constraint is imposed in frequency-domain (FD) to obtain a real-valued time-domain (TD) signal for intensity modulation-direct detection (IM-DD) implementation of VLC. Howbeit, HS results in an increase of PAPR for O-SCFDMA. In this regard, we propose HS free (HSF) O-SCFDMA (HSFO-SCFDMA). We compare HSFO-SCFDMA with several approaches in key parameters, such as, bit error rate (BER), optical power penalty, PAPR, quantization, electrical power efficiency and system complexity. BER performance and optical power penalty is evaluated considering multipath VLC channel and taking into account the bandwidth limitation of LED in combination with its optimized driver. It is illustrated that HSFO-SCFDMA outperforms other alternatives.

  6. Heterodyne detection using spectral line pairing for spectral phase encoding optical code division multiple access and dynamic dispersion compensation.

    Science.gov (United States)

    Yang, Yi; Foster, Mark; Khurgin, Jacob B; Cooper, A Brinton

    2012-07-30

    A novel coherent optical code-division multiple access (OCDMA) scheme is proposed that uses spectral line pairing to generate signals suitable for heterodyne decoding. Both signal and local reference are transmitted via a single optical fiber and a simple balanced receiver performs sourceless heterodyne detection, canceling speckle noise and multiple-access interference (MAI). To validate the idea, a 16 user fully loaded phase encoded system is simulated. Effects of fiber dispersion on system performance are studied as well. Both second and third order dispersion management is achieved by using a spectral phase encoder to adjust phase shifts of spectral components at the optical network unit (ONU).

  7. Hygroscopic properties of Amazonian biomass burning and European background HULIS and investigation of their effects on surface tension with two models linking H-TDMA to CCNC data

    Directory of Open Access Journals (Sweden)

    E. O. Fors

    2010-06-01

    Full Text Available HUmic-LIke Substances (HULIS have been identified as major contributors to the organic carbon in atmospheric aerosol. The term "HULIS" is used to describe the organic material found in aerosol particles that resembles the humic organic material in rivers and sea water and in soils. In this study, two sets of filter samples from atmospheric aerosols were collected at different sites. One set of samples was collected at the K-puszta rural site in Hungary, about 80 km SE of Budapest, and a second was collected at a site in Rondônia, Amazonia, Brazil, during the Large-Scale Biosphere-Atmosphere Experiment in Amazonia – Smoke Aerosols, Clouds, Rainfall and Climate (LBA-SMOCC biomass burning season experiment. HULIS were extracted from the samples and their hygroscopic properties were studied using a Hygroscopicity Tandem Differential Mobility Analyzer (H-TDMA at relative humidity (RH <100%, and a cloud condensation nucleus counter (CCNC at RH >100%. The H-TDMA measurements were carried out at a dry diameter of 100 nm and for RH ranging from 30 to 98%. At 90% RH the HULIS samples showed diameter growth factors between 1.04 and 1.07, reaching values of 1.4 at 98% RH. The cloud nucleating properties of the two sets of aerosol samples were analysed using two types of thermal static cloud condensation nucleus counters. Two different parameterization models were applied to investigate the potential effect of HULIS surface activity, both yielding similar results. For the K-puszta winter HULIS sample, the surface tension at the point of activation was estimated to be lowered by between 34% (47.7 mN/m and 31% (50.3 mN/m for dry sizes between 50 and 120 nm in comparison to pure water. A moderate lowering was also observed for the entire water soluble aerosol sample, including both organic and inorganic compounds, where the surface tension was decreased by between 2% (71.2 mN/m and 13% (63.3 mN/m.

  8. Chip-interleaved optical code division multiple access relying on a photon-counting iterative successive interference canceller for free-space optical channels.

    Science.gov (United States)

    Zhou, Xiaolin; Zheng, Xiaowei; Zhang, Rong; Hanzo, Lajos

    2013-07-01

    In this paper, we design a novel Poisson photon-counting based iterative successive interference cancellation (SIC) scheme for transmission over free-space optical (FSO) channels in the presence of both multiple access interference (MAI) as well as Gamma-Gamma atmospheric turbulence fading, shot-noise and background light. Our simulation results demonstrate that the proposed scheme exhibits a strong MAI suppression capability. Importantly, an order of magnitude of BER improvements may be achieved compared to the conventional chip-level optical code-division multiple-access (OCDMA) photon-counting detector.

  9. Capacity Bounds for the Gaussian IM-DD Optical Multiple-Access Channel

    KAUST Repository

    Chaaban, Anas; Al-Ebraheemy, Omer M. S.; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Optical wireless communications (OWC) is a promising technology for closing the mismatch between the growing number of connected devices and the limited wireless network capabilities. Similar to downlink, uplink can also benefit from OWC for establishing connectivity between such devices and an optical access point. In this context, the incoherent intensitymodulation and direct-detection (IM-DD) scheme is desirable in practice. Hence, it is important to understand the fundamental limits of communication rates over an OWC uplink employing IM-DD, i.e., the channel capacity. This uplink, modeled as a Gaussian multiple-access channel (MAC) for indoors OWC, is studied in this paper, under the IM-DD constraints which form the main difference with the standard Gaussian MAC commonly studied in the radio-frequency context. Capacity region outer and inner bounds for this channel are derived. The bounds are fairly close at high signal-to-noise ratio (SNR), where a truncated- Gaussian input distribution achieves the capacity region within a constant gap. Furthermore, the bounds coincide at low SNR showing the optimality of on-off keying combined with successive cancellation decoding in this regime. At moderate SNR, an optimized uniformly-spaced discrete input distribution achieves fairly good performance.

  10. Capacity Bounds for the Gaussian IM-DD Optical Multiple-Access Channel

    KAUST Repository

    Chaaban, Anas

    2017-03-18

    Optical wireless communications (OWC) is a promising technology for closing the mismatch between the growing number of connected devices and the limited wireless network capabilities. Similar to downlink, uplink can also benefit from OWC for establishing connectivity between such devices and an optical access point. In this context, the incoherent intensitymodulation and direct-detection (IM-DD) scheme is desirable in practice. Hence, it is important to understand the fundamental limits of communication rates over an OWC uplink employing IM-DD, i.e., the channel capacity. This uplink, modeled as a Gaussian multiple-access channel (MAC) for indoors OWC, is studied in this paper, under the IM-DD constraints which form the main difference with the standard Gaussian MAC commonly studied in the radio-frequency context. Capacity region outer and inner bounds for this channel are derived. The bounds are fairly close at high signal-to-noise ratio (SNR), where a truncated- Gaussian input distribution achieves the capacity region within a constant gap. Furthermore, the bounds coincide at low SNR showing the optimality of on-off keying combined with successive cancellation decoding in this regime. At moderate SNR, an optimized uniformly-spaced discrete input distribution achieves fairly good performance.

  11. Measurement of ambient aerosol hydration state at Great Smoky Mountains National Park in the southeastern United States

    Directory of Open Access Journals (Sweden)

    N. F. Taylor

    2011-12-01

    Full Text Available We present results from two field deployments of a unique tandem differential mobility analyzer (TDMA configuration with two primary capabilities: identifying alternative stable or meta-stable ambient aerosol hydration states associated with hysteresis in aerosol hydration behavior and determining the actual Ambient hydration State (AS-TDMA. This data set is the first to fully classify the ambient hydration state of aerosols despite recognition that hydration state significantly impacts the roles of aerosols in climate, visibility and heterogeneous chemistry. The AS-TDMA was installed at a site in eastern Tennessee on the border of Great Smoky Mountains National Park for projects during the summer of 2006 and winter of 2007–2008. During the summer, 12% of the aerosols sampled in continuous AS-TDMA measurements were found to posses two possible hydration states under ambient conditions. In every case, the more hydrated of the possible states was occupied. The remaining 88% did not posses multiple possible states. In continuous measurements during the winter, 49% of the aerosols sampled possessed two possible ambient hydration states; the remainder possessed only one. Of those aerosols with multiple possible ambient hydration states, 65% occupied the more hydrated state; 35% occupied the less hydrated state. This seasonal contrast is supported by differences in the fine particulate (PM2.5 composition and ambient RH as measured during the two study periods. In addition to seasonal summaries, this work includes case studies depicting the variation of hydration state with changing atmospheric conditions.

  12. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  13. Iterative Pilot-Layer Aided Channel Estimation with Emphasis on Interleave-Division Multiple Access Systems

    OpenAIRE

    Schoeneich Hendrik; Hoeher Peter Adam

    2006-01-01

    Channel estimation schemes suitable for interleave-division multiple access (IDMA) systems are presented. Training and data are superimposed. Training-based and semiblind linear channel estimators are derived and their performance is discussed and compared. Monte Carlo simulation results are presented showing that the derived channel estimators in conjunction with a superimposed pilot sequence and chip-by-chip processing are able to track fast-fading frequency-selective channels. As opposed ...

  14. Filter multiplexing by use of spatial Code Division Multiple Access approach.

    Science.gov (United States)

    Solomon, Jonathan; Zalevsky, Zeev; Mendlovic, David; Monreal, Javier Garcia

    2003-02-10

    The increasing popularity of optical communication has also brought a demand for a broader bandwidth. The trend, naturally, was to implement methods from traditional electronic communication. One of the most effective traditional methods is Code Division Multiple Access. In this research, we suggest the use of this approach for spatial coding applied to images. The approach is to multiplex several filters into one plane while keeping their mutual orthogonality. It is shown that if the filters are limited by their bandwidth, the output of all the filters can be sampled in the original image resolution and fully recovered through an all-optical setup. The theoretical analysis of such a setup is verified in an experimental demonstration.

  15. Particle Filtering for Multiple Access DS/CDMA Systems DS/CDMA Channel Estimation

    Directory of Open Access Journals (Sweden)

    Rafael Oliveira Ribeiro

    2013-09-01

    Full Text Available This article discusses computational implementation aspects and performance of a Bayesian methodology, namely particle filter (PF. The PF channel estimation technique is directly applied to the channel coefficients estimation of DS/CDMA systems. Simulation results for non-line-of-sight (NLOS Rayleigh fading channel propagation have indicated that the bootstrap PF estimator is capable to provide RMSE in the range of [10-3 ; 10-2] for a wide range of multiple access interference (MAI levels and signal-noise ratio (SNR, and still be able to offer robustness to near-far ratio (NFR effect.

  16. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  17. Chip-Level Channel Equalization in WCDMA Downlink

    Directory of Open Access Journals (Sweden)

    Kari Hooli

    2002-08-01

    Full Text Available The most important third generation (3G cellular communications standard is based on wideband CDMA (WCDMA. Receivers based on TDMA style channel equalization at the chip level have been proposed for a WCDMA downlink employing long spreading sequences to ensure adequate performance even with a high number of active users. These receivers equalize the channel prior to despreading, thus restoring the orthogonality of users and resulting in multiple-access interference (MAI suppression. In this paper, an overview of chip-level channel equalizers is delivered with special attention to adaptation methods suitable for the WCDMA downlink. Numerical examples on the equalizers′ performance are given in Rayleigh fading frequency-selective channels.

  18. Nonorthogonal multiple access and carrierless amplitude phase modulation for flexible multiuser provisioning in 5G mobile networks

    NARCIS (Netherlands)

    Altabas, J.A.; Rommel, S.; Puerta, R.; Izquierdo, D.; Ignacio Garces, J.; Antonio Lazaro, J.; Vegas Olmos, J.J.; Tafur Monroy, I.

    2017-01-01

    In this paper, a combined nonorthogonal multiple access (NOMA) and multiband carrierless amplitude phase modulation (multiCAP) scheme is proposed for capacity enhancement of and flexible resource provisioning in 5G mobile networks. The proposed scheme is experimentally evaluated over a W-band

  19. Performance analysis of 2D asynchronous hard-limiting optical code-division multiple access system through atmospheric scattering channel

    Science.gov (United States)

    Zhao, Yaqin; Zhong, Xin; Wu, Di; Zhang, Ye; Ren, Guanghui; Wu, Zhilu

    2013-09-01

    Optical code-division multiple access (OCDMA) systems usually allocate orthogonal or quasi-orthogonal codes to the active users. When transmitting through atmospheric scattering channel, the coding pulses are broadened and the orthogonality of the codes is worsened. In truly asynchronous case, namely both the chips and the bits are asynchronous among each active user, the pulse broadening affects the system performance a lot. In this paper, we evaluate the performance of a 2D asynchronous hard-limiting wireless OCDMA system through atmospheric scattering channel. The probability density function of multiple access interference in truly asynchronous case is given. The bit error rate decreases as the ratio of the chip period to the root mean square delay spread increases and the channel limits the bit rate to different levels when the chip period varies.

  20. Gigabit Satellite Network for NASA's Advanced Communication Technology Satellite (ACTS)

    Science.gov (United States)

    Hoder, Douglas; Bergamo, Marcos

    1996-01-01

    The advanced communication technology satellite (ACTS) gigabit satellite network provides long-haul point-to-point and point-to-multipoint full-duplex SONET services over NASA's ACTS. at rates up to 622 Mbit/s (SONET OC-12), with signal quality comparable to that obtained with terrestrial fiber networks. Data multiplexing over the satellite is accomplished using time-division multiple access (TDMA) techniques coordinated with the switching and beam hopping facilities provided by ACTS. Transmissions through the satellite are protected with Reed-Solomon encoding. providing virtually error-free transmission under most weather conditions. Unique to the system are a TDMA frame structure and satellite synchronization mechanism that allow: (a) very efficient utilization of the satellite capacity: (b) over-the-satellite dosed-loop synchronization of the network in configurations with up to 64 ground stations: and (c) ground station initial acquisition without collisions with existing signalling or data traffic. The user interfaces are compatible with SONET standards, performing the function of conventional SONET multiplexers and. as such. can be: readily integrated with standard SONET fiber-based terrestrial networks. Management of the network is based upon the simple network management protocol (SNMP). and includes an over-the-satellite signalling network and backup terrestrial internet (IP-based) connectivity. A description of the ground stations is also included.

  1. Equal gain combining for cooperative spectrum sensing in cognitive radio networks

    KAUST Repository

    Hamza, Doha R.

    2014-08-01

    Sensing with equal gain combining (SEGC), a novel cooperative spectrum sensing technique for cognitive radio networks, is proposed. Cognitive radios simultaneously transmit their sensing results to the fusion center (FC) over multipath fading reporting channels. The cognitive radios estimate the phases of the reporting channels and use those estimates for coherent combining of the sensing results at the FC. A global decision is made at the FC by comparing the received signal with a threshold. We obtain the global detection probabilities and secondary throughput exactly through a moment generating function approach. We verify our solution via system simulation and demonstrate that the Chernoff bound and central limit theory approximation are not tight. The cases of hard sensing and soft sensing are considered and we provide examples in which hard sensing is advantageous to soft sensing. We contrast the performance of SEGC with maximum ratio combining of the sensors\\' results and provide examples where the former is superior. Furthermore, we evaluate the performance of SEGC against existing orthogonal reporting techniques such as time division multiple access (TDMA). SEGC performance always dominates that of TDMA in terms of secondary throughput. We also study the impact of phase and synchronization errors and demonstrate the robustness of the SEGC technique against such imperfections. © 2002-2012 IEEE.

  2. Post-Coma Persons with Extensive Multiple Disabilities Use Microswitch Technology to Access Selected Stimulus Events or Operate a Radio Device

    Science.gov (United States)

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella

    2011-01-01

    The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II…

  3. Interference-Assisted Techniques for Transmission and Multiple Access in Optical Communications

    Science.gov (United States)

    Guan, Xun

    Optical communications can be in wired or wireless form. Fiber optics communication (FOC) connects transmitters and receivers with optical fiber. Benefiting from its high bandwidth, low cost per volume and stability, it gains a significant market share in long-haul networks, access networks and data centers. Meanwhile, optical wireless communication (OWC) is also emerging as a crucial player in the communication market. In OWC, free-space optical communication (FSO) and visible light communication (VLC) are being studied and commercially deployed extensively. Interference is a common phenomenon in multi-user communication systems. In both FOC and OWC, interference has long been treated as a detrimental effect. However, it could also be beneficial to system applications. The effort of harnessing interference has spurred numerous innovations. Interesting examples are physical-layer network coding (PNC) and non-orthogonal multiple access (NOMA). The first part of this thesis in on the topic of PNC. PNC was firstly proposed in wireless communication to improve the throughput of a two-way relay network (TWRN). As a variation of network coding (NC), PNC turns the common channel interference (CCI) as a natural network coding operation. In this thesis, PNC is introduced into optical communication. Three schemes are proposed in different scenarios. Firstly, PNC is applied to a coherent optical orthogonal frequency division multiplexing (CO-OFDM) system so as to improve the throughput of the multicast network. The optical signal to noise ratio (OSNR) penalty is quite low. Secondly, we investigate the application of PNC in an OFDM passive optical network (OFDM-PON) supporting heterogeneous services. It is found that only minor receiver power penalties are observed to realize PNC-based virtual private networks (VPN), both in the wired service part and the wireless service part in an OFDM-PON with heterogeneous services. Thirdly, we innovate relay-based visible light

  4. Multiple Intimate Partner Violence Experiences: Knowledge, Access, Utilization and Barriers to Utilization of Resources by Women of the African Diaspora.

    Science.gov (United States)

    Sabri, Bushra; Huerta, Julia; Alexander, Kamila A; St Vil, Noelle M; Campbell, Jacquelyn C; Callwood, Gloria B

    2015-11-01

    This study examined knowledge, access, utilization, and barriers to use of resources among Black women exposed to multiple types of intimate partner violence in Baltimore, Maryland and the U.S. Virgin Islands (USVI). We analyzed quantitative survey data collected by 163 women recruited from primary care, prenatal or family planning clinics in Baltimore and the USVI. In addition we analyzed qualitative data from in-depth interviews with 11 women. Quantitative data were analyzed using descriptive statistics and qualitative data were analyzed using thematic analysis. A substantial proportion of Black women with multiple types of violence experiences lacked knowledge of, did not have access to, and did not use resources. Barriers to resource use were identified at the individual, relationship, and community levels. There is need for programs to develop awareness, promote access and utilization of resources, and eliminate barriers to resource use among abused Black women.

  5. Performance analysis of spectral-phase-encoded optical code-division multiple-access system regarding the incorrectly decoded signal as a nonstationary random process

    Science.gov (United States)

    Yan, Meng; Yao, Minyu; Zhang, Hongming

    2005-11-01

    The performance of a spectral-phase-encoded (SPE) optical code-division multiple-access (OCDMA) system is analyzed. Regarding the incorrectly decoded signal (IDS) as a nonstationary random process, we derive a novel probability distribution for it. The probability distribution of the IDS is considered a chi-squared distribution with degrees of freedom r=1, which is more reasonable and accurate than in previous work. The bit error rate (BER) of an SPE OCDMA system under multiple-access interference is evaluated. Numerical results show that the system can sustain very low BER even when there are multiple simultaneous users, and as the code length becomes longer or the initial pulse becomes shorter, the system performs better.

  6. Allocation and management issues in multiple-transaction open access transmission networks

    Science.gov (United States)

    Tao, Shu

    This thesis focuses on some key issues related to allocation and management by the independent grid operator (IGO) of unbundled services in multiple-transaction open access transmission networks. The three unbundled services addressed in the thesis are transmission real power losses, reactive power support requirements from generation sources, and transmission congestion management. We develop the general framework that explicitly represents multiple transactions undertaken simultaneously in the transmission grid. This framework serves as the basis for formulating various problems treated in the thesis. We use this comprehensive framework to develop a physical-flow-based mechanism to allocate the total transmission losses to each transaction using the system. An important property of the allocation scheme is its capability to effectively deal with counter flows that result in the presence of specific transactions. Using the loss allocation results as the basis, we construct the equivalent loss compensation concept and apply it to develop flexible and effective procedures for compensating losses in multiple-transaction networks. We present a new physical-flow-based mechanism for allocating the reactive power support requirements provided by generators in multiple-transaction networks. The allocatable reactive support requirements are formulated as the sum of two specific components---the voltage magnitude variation component and the voltage angle variation component. The formulation utilizes the multiple-transaction framework and makes use of certain simplifying approximations. The formulation leads to a natural allocation as a function of the amount of each transaction. The physical interpretation of each allocation as a sensitivity of the reactive output of a generator is discussed. We propose a congestion management allocation scheme for multiple-transaction networks. The proposed scheme determines the allocation of congestion among the transactions on a physical

  7. WATER TEMPERATURE and other data from MULTIPLE SHIPS from 1983-01-01 to 1992-12-31 (NODC Accession 9400224)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains data collected as part of Shipboard Environmental data Acquisition System (SEAS) II program. The cruises were conducted using multiple ships....

  8. Mitigation of Beat Noise in Time Wavelength Optical Code-Division Multiple-Access Systems

    Science.gov (United States)

    Bazan, Taher M.; Harle, David; Andonovic, Ivan

    2006-11-01

    This paper presents an analysis of two methods for enhancing the performance of two-dimensional time wavelength Optical code-division multiple-access systems by mitigating the effects of beat noise. The first methodology makes use of an optical hard limiter (OHL) in the receiver prior to the optical correlator; a general formula for the error probability as a function of crosstalk level for systems adopting OHLs is given, and the implications of the OHL's nonideal transfer characteristics are then examined. The second approach adopts pulse position modulation, and system performance is estimated and compared to that associated with on off keying.

  9. Efficient Bandwidth Allocation for Integrated Services in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    An efficient bandwidth allocation scheme is proposed for supporting intergrated services in wireless ATM networks. These include CBR, VBR amd ABR types of traffic. The proposed scheme is based om A-PRMA for carrying ATM traffic in a dynamic TDMA type access system. It allows mobile users to adjust...

  10. Temperature, salinity, nutrients, and meteorological data collected from 1926 to 1991 aboard multiple platforms in Caspian Sea (NODC Accession 0072200)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NODC Accession 0072200 contains temperature, salinity, nutrients, and meteorological data collected from 1926 to 1991 aboard multiple platforms in Caspian Sea.

  11. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  12. White matter damage impairs access to consciousness in multiple sclerosis.

    Science.gov (United States)

    Reuter, Françoise; Del Cul, Antoine; Malikova, Irina; Naccache, Lionel; Confort-Gouny, Sylviane; Cohen, Laurent; Cherif, André Ali; Cozzone, Patrick J; Pelletier, Jean; Ranjeva, Jean-Philippe; Dehaene, Stanislas; Audoin, Bertrand

    2009-01-15

    Global neuronal workspace theory predicts that damage to long-distance white matter (WM) tracts should impair access to consciousness during the perception of brief stimuli. To address this issue, we studied visual backward masking in 18 patients at the very first clinical stage of multiple sclerosis (MS), a neurological disease characterized by extensive WM damage, and in 18 matched healthy subjects. In our masking paradigm, the visibility of a digit stimulus increases non-linearly as a function of the interval duration between this target and a subsequent mask. In order to characterize quantitatively, for each subject, the transition between non-conscious and conscious perception of the stimulus, we used non-linear regression to fit a sigmoid curve to objective performance and subjective visibility reports as a function of target-mask delay. The delay corresponding to the inflexion point of the sigmoid, where visibility suddenly increases, was termed the "non-linear transition threshold" and used as a summary measure of masking efficiency. Objective and subjective non-linear transition thresholds were highly correlated across subjects in both groups, and were higher in patients compared to controls. In patients, variations in the non-linear transition threshold were inversely correlated to the Magnetization transfer ratio (MTR) values inside the right dorsolateral prefrontal WM, the right occipito-frontal fasciculus and the left cerebellum. This study provides clinical evidence of a relationship between impairments of conscious access and integrity of large WM bundles, particularly involving prefrontal cortex, as predicted by global neuronal workspace theory.

  13. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr

    2014-01-28

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user\\'s symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  14. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr; Alouini, Mohamed-Slim

    2014-01-01

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user's symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  15. Bandwidth Efficient Hybrid Synchronization for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2015-01-01

    Data collection and transmission are the fundamental operations of Wireless Sensor Networks (WSNs). A key challenge in effective data collection and transmission is to schedule and synchronize the activities of the nodes with the global clock. This paper proposes the Bandwidth Efficient Hybrid...... in the network and then perform the pair-wise synchronization. With the mobility of node, the structure frequently changes causing an increase in energy consumption. To mitigate the problem BESDA aggregate data with the notion of a global timescale throughout the network and schedule based time-division multiple...... accesses (TDMA) techniques as MAC layer protocol. It reduces the collision of packets. Simulation results show that BESDA is energy efficient, with increased throughput, and has less delay as compared with state-of-the-art....

  16. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system.

    Science.gov (United States)

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes.

  17. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system

    Science.gov (United States)

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes.

  18. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    Science.gov (United States)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  19. Multiple Coaxial Catheter System for Reliable Access in Interventional Stroke Therapy

    International Nuclear Information System (INIS)

    Kulcsar, Zsolt; Yilmaz, Hasan; Bonvin, Christophe; Lovblad, Karl O.; Ruefenacht, Daniel A.

    2010-01-01

    In some patients with acute cerebral vessel occlusion, navigating mechanical thrombectomy systems is difficult due to tortuous anatomy of the aortic arch, carotid arteries, or vertebral arteries. Our purpose was to describe a multiple coaxial catheter system used for mechanical revascularization that helps navigation and manipulations in tortuous vessels. A triple or quadruple coaxial catheter system was built in 28 consecutive cases presenting with acute ischemic stroke. All cases were treated by mechanical thrombectomy with the Penumbra System. In cases of unsuccessful thrombo-aspiration, additional thrombolysis or angioplasty with stent placement was used for improving recanalization. The catheter system consisted of an outermost 8-Fr and an intermediate 6-Fr guiding catheter, containing the inner Penumbra reperfusion catheters. The largest, 4.1-Fr, reperfusion catheter was navigated over a Prowler Select Plus microcatheter. The catheter system provided access to reach the cerebral lesions and provided stability for the mechanically demanding manipulations of thromboaspiration and stent navigation in all cases. Apart from their mechanical role, the specific parts of the system could also provide access to different types of interventions, like carotid stenting through the 8-Fr guiding catheter and intracranial stenting and thrombolysis through the Prowler Select Plus microcatheter. In this series, there were no complications related to the catheter system. In conclusion, building up a triple or quadruple coaxial system proved to be safe and efficient in our experience for the mechanical thrombectomy treatment of acute ischemic stroke.

  20. On the Capacity Region of the Intensity-Modulation Direct-Detection Optical Broadcast Channel

    KAUST Repository

    Chaaban, Anas

    2015-08-11

    The capacity of the intensity-modulation direct-detection free-space optical broadcast channel (OBC) is investigated. The Gaussian model with input-independent Gaussian noise is used, with both average and peak intensity constraints. An outer bound on the capacity region is derived by adapting Bergmans\\' approach to the OBC. Inner bounds are derived by using superposition coding with either truncated-Gaussian distributions or discrete distributions. While the discrete input distribution achieves higher rates than the truncated-Gaussian distribution, the latter allows expressing the achievable rate region in a closed form. At high signal-to-noise ratio (SNR), it is shown that the truncated-Gaussian distribution is nearly optimal. It achieves the symmetric-capacity within a constant gap (independent of SNR), which approaches half a bit as the number of users grows large. It also achieves the capacity region within a constant gap, which depends on the number of users. At low SNR, it is shown that on-off keying with time-division multiple-access (TDMA) is optimal, as it achieves any point on the boundary of the developed outer bound. This is interesting in practice since both OOK and TDMA have low complexity. At moderate SNR (typically [0,8] dB), a discrete distribution with a small alphabet size achieves a fairly good performance in terms of symmetric rate.

  1. Modular approach for satellite communication ground terminals

    Science.gov (United States)

    Gould, G. R.

    1984-01-01

    The trend in satellite communications is toward completely digital, time division multiple access (TDMA) systems with uplink and downlink data rates dictated by the type of service offered. Trunking terminals will operate in the 550 MBPS (megabit per second) region uplink and downlink, whereas customer premise service (CPS) terminals will operate in the 25 to 10 MBPS region uplink and in the 200 MBPS region downlink. Additional criteria for the ground terminals will be to maintain clock sychronization with the system and burst time integrity to within a matter of nanoseconds, to process required order-fire information, to provide adaptive data scrambing, and to compensate for variations in the user input output data rates, and for changes in range in the satellite communications links resulting from satellite perturbations in orbit. To achieve the required adaptability of a ground terminal to the above mentioned variables, programmable building blocks can be developed that will meet all of these requirements. To maintain system synchronization, i.e., all bursted data arriving at the satellite within assigned TDMA windows, ground terminal transmit data rates and burst timing must be maintained within tight tolerances. With a programmable synchronizer as the heart of the terminal timing generation, variable data rates and burst timing tolerances are achievable. In essence, the unit inputs microprocessor generated timing words and outputs discrete timing pulses.

  2. Measurements of stimulated-Raman-scattering-induced tilt in spectral-amplitude-coding optical code-division multiple-access systems

    Science.gov (United States)

    Al-Qazwini, Zaineb A. T.; Abdullah, Mohamad K.; Mokhtar, Makhfudzah B.

    2009-01-01

    We measure the stimulated Raman scattering (SRS)-induced tilt in spectral-amplitude-coding optical code-division multiple-access (SAC-OCDMA) systems as a function of system main parameters (transmission distance, power per chip, and number of users) via computer simulations. The results show that SRS-induced tilt significantly increases as transmission distance, power per chip, or number of users grows.

  3. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  4. A Unified Framework of the Performance Evaluation of Optical Time-Wavelength Code-Division Multiple-Access Systems

    Science.gov (United States)

    Inaty, Elie

    In this paper, we provide an analysis to the performance of optical time-wavelength code-division multiple-access (OTW-CDMA) network when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one coincidence sequences with non-repeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of OTW-CDMA system may be critically affected when working above the nominal limit; an event that may happen when the network operates at high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed MAC protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T; while the R3T is better at very high transmission rates. However, in general it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  5. Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network

    International Nuclear Information System (INIS)

    Grudka, Andrzej; Horodecki, Pawel

    2010-01-01

    We analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative borderline between superadditivities of bipartite and multipartite systems.

  6. Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure

    OpenAIRE

    Xie, Jianwei; Ulukus, Sennur

    2014-01-01

    The sum secure degrees of freedom (s.d.o.f.) of two fundamental multi-user network structures, the K-user Gaussian multiple access (MAC) wiretap channel and the K-user interference channel (IC) with secrecy constraints, have been determined recently as K(K-1)/(K(K-1)+1) [1,2] and K(K-1)/(2K-1) [3,4], respectively. In this paper, we determine the entire s.d.o.f. regions of these two channel models. The converse for the MAC follows from a middle step in the converse of [1,2]. The converse for t...

  7. Ultrafast all-optical code-division multiple-access networks

    Science.gov (United States)

    Kwong, Wing C.; Prucnal, Paul R.; Liu, Yanming

    1992-12-01

    In optical code-division multiple access (CDMA), the architecture of optical encoders/decoders is another important factor that needs to be considered, besides the correlation properties of those already extensively studied optical codes. The architecture of optical encoders/decoders affects, for example, the amount of power loss and length of optical delays that are associated with code sequence generation and correlation, which, in turn, affect the power budget, size, and cost of an optical CDMA system. Various CDMA coding architectures are studied in the paper. In contrast to the encoders/decoders used in prime networks (i.e., prime encodes/decoders), which generate, select, and correlate code sequences by a parallel combination of fiber-optic delay-lines, and in 2n networks (i.e., 2n encoders/decoders), which generate and correlate code sequences by a serial combination of 2 X 2 passive couplers and fiber delays with sequence selection performed in a parallel fashion, the modified 2n encoders/decoders generate, select, and correlate code sequences by a serial combination of directional couplers and delays. The power and delay- length requirements of the modified 2n encoders/decoders are compared to that of the prime and 2n encoders/decoders. A 100 Mbit/s optical CDMA experiment in free space demonstrating the feasibility of the all-serial coding architecture using a serial combination of 50/50 beam splitters and retroreflectors at 10 Tchip/s (i.e., 100,000 chip/bit) with 100 fs laser pulses is reported.

  8. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Alexandr M. Kuzminskiy

    2007-10-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  9. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Kuzminskiy Alexandr M

    2007-01-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  10. A New Time-Hopping Multiple Access Communication System Simulator: Application to Ultra-Wideband

    Directory of Open Access Journals (Sweden)

    José M. Páez-Borrallo

    2005-03-01

    Full Text Available Time-hopping ultra-wideband technology presents some very attractive features for future indoor wireless systems in terms of achievable transmission rate and multiple access capabilities. This paper develops an algorithm to design time-hopping system simulators specially suitable for ultra-wideband, which takes advantage of some of the specific characteristics of this kind of systems. The algorithm allows an improvement of both the time capabilities and the achievable sampling rate and can be used to research into the influence of different parameters on the performance of the system. An additional result is the validation of a new general performance formula for time-hopping ultra-wideband systems with multipath channels.

  11. Comparison of HfCl4, HfI4, TEMA-Hf, and TDMA-Hf as precursors in early growing stages of HfO2 films deposited by ALD: A DFT study

    Science.gov (United States)

    Cortez-Valadez, M.; Fierro, C.; Farias-Mancilla, J. R.; Vargas-Ortiz, A.; Flores-Acosta, M.; Ramírez-Bon, R.; Enriquez-Carrejo, J. L.; Soubervielle-Montalvo, C.; Mani-Gonzalez, P. G.

    2016-06-01

    The final structure of HfO2 films grown by atomic layer deposition (ALD) after reaction with OH- ions has been analyzed by DFT (density functional theory). The interaction of the precursors: HfCl4 (hafnium tetrachloride), HfI4 (hafnium tetraiodide), TEMA-Hf (tetrakis-ethylmethylamino hafnium), and TDMA-Hf (tetrakis-dimethylamino hafnium) with HO-H was studied employing the B3LYP (Becke 3-parameter, Lee-Yang-Parr) hybrid functional and the PBE (Perdew-Burke-Ernzerhof) generalized gradient functional. The structural evolution at the Si(100) surface has been analyzed by LDA (local density approximation). The structural parameters: bond length and bond angle, and the vibrational parameters for the optimized structures are also reported. The presence of hafnium silicate at the interface was detected. The infrared spectra and structural parameters obtained in this work agree with previously reported experimental results.

  12. Performance evaluation of modulation and multiple access schemes in ultraviolet optical wireless connections for two atmosphere thickness cases.

    Science.gov (United States)

    Raptis, Nikos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-08-01

    The exploitation of optical wireless communication channels in a non-line-of-sight regime is studied for point-to-point and networking configurations considering the use of light-emitting diodes. Two environments with different scattering center densities are considered, assuming operation at 265 nm. The bit error rate performance of both pulsed and multicarrier modulation schemes is examined, using numerical approaches. In the networking scenario, a central node only receives data, one node transmits useful data, and the rest of them act as interferers. The performance of the desirable node's transmissions is evaluated. The access to the medium is controlled by a code division multiple access scheme.

  13. Wavelength-encoding/temporal-spreading optical code division multiple-access system with in-fiber chirped moiré gratings.

    Science.gov (United States)

    Chen, L R; Smith, P W; de Sterke, C M

    1999-07-20

    We propose an optical code division multiple-access (OCDMA) system that uses in-fiber chirped moiré gratings (CMG's) for encoding and decoding of broadband pulses. In reflection the wavelength-selective and dispersive nature of CMG's can be used to implement wavelength-encoding/temporal-spreading OCDMA. We give examples of codes designed around the constraints imposed by the encoding devices and present numerical simulations that demonstrate the proposed concept.

  14. A New Prime Code for Synchronous Optical Code Division Multiple-Access Networks

    Directory of Open Access Journals (Sweden)

    Huda Saleh Abbas

    2018-01-01

    Full Text Available A new spreading code based on a prime code for synchronous optical code-division multiple-access networks that can be used in monitoring applications has been proposed. The new code is referred to as “extended grouped new modified prime code.” This new code has the ability to support more terminal devices than other prime codes. In addition, it patches subsequences with “0s” leading to lower power consumption. The proposed code has an improved cross-correlation resulting in enhanced BER performance. The code construction and parameters are provided. The operating performance, using incoherent on-off keying modulation and incoherent pulse position modulation systems, has been analyzed. The performance of the code was compared with other prime codes. The results demonstrate an improved performance, and a BER floor of 10−9 was achieved.

  15. Iterative Pilot-Layer Aided Channel Estimation with Emphasis on Interleave-Division Multiple Access Systems

    Directory of Open Access Journals (Sweden)

    Schoeneich Hendrik

    2006-01-01

    Full Text Available Channel estimation schemes suitable for interleave-division multiple access (IDMA systems are presented. Training and data are superimposed. Training-based and semiblind linear channel estimators are derived and their performance is discussed and compared. Monte Carlo simulation results are presented showing that the derived channel estimators in conjunction with a superimposed pilot sequence and chip-by-chip processing are able to track fast-fading frequency-selective channels. As opposed to conventional channel estimation techniques, the BER performance even improves with increasing Doppler spread for typical system parameters. An error performance close to the case of perfect channel knowledge can be achieved with high power efficiency.

  16. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  17. PRESSURE - WATER and Other Data from MULTIPLE SHIPS and Other Platforms From World-Wide Distribution from 19950101 to 19951231 (NODC Accession 9600078)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The accession contains Salinity Temperature and Depth (STD) data in the (TESAC) format. This contains one year data that was sent as radio messages from multiple...

  18. WATER TEMPERATURE and Other Data from MULTIPLE SHIPS From NE Atlantic (limit-40 W) and Others from 19500831 to 19881231 (NODC Accession 9200060)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains contains chlorophyll data collected from 1958-1988 using multiple ships. Marine pigments, productivity, and associated chemistry data were...

  19. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Salam A. Zummo

    2009-02-01

    Full Text Available We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  20. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  1. Teaching Individuals with Profound Multiple Disabilities to Access Preferred Stimuli with Multiple Microswitches

    Science.gov (United States)

    Tam, Gee May; Phillips, Katrina J.; Mudford, Oliver C.

    2011-01-01

    We replicated and extended previous research on microswitch facilitated choice making by individuals with profound multiple disabilities. Following an assessment of stimulus preferences, we taught 6 adults with profound multiple disabilities to emit 2 different responses to activate highly preferred stimuli. All participants learnt to activate…

  2. Fiber Bragg grating for spectral phase optical code-division multiple-access encoding and decoding

    Science.gov (United States)

    Fang, Xiaohui; Wang, Dong-Ning; Li, Shichen

    2003-08-01

    A new method for realizing spectral phase optical code-division multiple-access (OCDMA) coding based on step chirped fiber Bragg gratings (SCFBGs) is proposed and the corresponding encoder/decoder is presented. With this method, a mapping code is introduced for the m-sequence address code and the phase shift can be inserted into the subgratings of the SCFBG according to the mapping code. The transfer matrix method together with Fourier transform is used to investigate the characteristics of the encoder/decoder. The factors that influence the correlation property of the encoder/decoder, including index modulation and bandwidth of the subgrating, are identified. The system structure is simple and good correlation output can be obtained. The performance of the OCDMA system based on SCFBGs has been analyzed.

  3. Mobile and Accessible Learning for MOOCs

    Science.gov (United States)

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  4. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  5. CAS (CHEMICAL ABSTRACTS SOCIETY) PARAMETER CODES and Other Data from MULTIPLE SHIPS From Caribbean Sea and Others from 19790205 to 19890503 (NCEI Accession 9100017)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The accession contains Chemical Abstracts Society (CAS) parameter codes and Other Data from MULTIPLE SHIPS From Caribbean Sea and Gulf of Mexico from February 5,...

  6. Characterization and Optimization of LDPC Codes for the 2-User Gaussian Multiple Access Channel

    Directory of Open Access Journals (Sweden)

    Declercq David

    2007-01-01

    Full Text Available We address the problem of designing good LDPC codes for the Gaussian multiple access channel (MAC. The framework we choose is to design multiuser LDPC codes with joint belief propagation decoding on the joint graph of the 2-user case. Our main result compared to existing work is to express analytically EXIT functions of the multiuser decoder with two different approximations of the density evolution. This allows us to propose a very simple linear programming optimization for the complicated problem of LDPC code design with joint multiuser decoding. The stability condition for our case is derived and used in the optimization constraints. The codes that we obtain for the 2-user case are quite good for various rates, especially if we consider the very simple optimization procedure.

  7. Uncorrelated multiple conductive filament nucleation and rupture in ultra-thin high-κ dielectric based resistive random access memory

    KAUST Repository

    Wu, Xing

    2011-08-29

    Resistive switching in transition metal oxides could form the basis for next-generation non-volatile memory (NVM). It has been reported that the current in the high-conductivity state of several technologically relevant oxide materials flows through localized filaments, but these filaments have been characterized only individually, limiting our understanding of the possibility of multiple conductive filaments nucleation and rupture and the correlation kinetics of their evolution. In this study, direct visualization of uncorrelated multiple conductive filaments in ultra-thin HfO2-based high-κ dielectricresistive random access memory (RRAM) device has been achieved by high-resolution transmission electron microscopy (HRTEM), along with electron energy loss spectroscopy(EELS), for nanoscale chemical analysis. The locations of these multiple filaments are found to be spatially uncorrelated. The evolution of these microstructural changes and chemical properties of these filaments will provide a fundamental understanding of the switching mechanism for RRAM in thin oxide films and pave way for the investigation into improving the stability and scalability of switching memory devices.

  8. Spectral-Efficiency - Illumination Pareto Front for Energy Harvesting Enabled VLC System

    KAUST Repository

    Abdelhady, Amr Mohamed Abdelaziz

    2017-12-13

    The continuous improvement in optical energy harvesting devices motivates visible light communication (VLC) system developers to utilize such available free energy sources. An outdoor VLC system is considered where an optical base station sends data to multiple users that are capable of harvesting the optical energy. The proposed VLC system serves multiple users using time division multiple access (TDMA) with unequal time and power allocation, which are allocated to improve the system performance. The adopted optical system provides users with illumination and data communication services. The outdoor optical design objective is to maximize the illumination, while the communication design objective is to maximize the spectral efficiency (SE). The design objectives are shown to be conflicting, therefore, a multiobjective optimization problem is formulated to obtain the Pareto front performance curve for the proposed system. To this end, the marginal optimization problems are solved first using low complexity algorithms. Then, based on the proposed algorithms, a low complexity algorithm is developed to obtain an inner bound of the Pareto front for the illumination-SE tradeoff. The inner bound for the Pareto-front is shown to be close to the optimal Pareto-frontier via several simulation scenarios for different system parameters.

  9. Comparison of a Ring On-Chip Network and a Code-Division Multiple-Access On-Chip Network

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2007-01-01

    Full Text Available Two network-on-chip (NoC designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, data transfer principles, network node structures, and their asynchronous designs. Both the synchronous and the asynchronous designs of the two on-chip networks are realized using a hardware-description language (HDL in order to make the entire designs suit the commonly used synchronous design tools and flow. The performance estimation and comparison of the two NoC designs which are based on the HDL realizations are addressed. By comparing the two NoC designs, the advantages and disadvantages of applying direct connection and CDMA connection schemes in an on-chip communication network are discussed.

  10. Tailoring Chirped Moiré Fiber Bragg Gratings for Wavelength-Division-Multiplexing and Optical Code-Division Multiple-Access Applications

    Science.gov (United States)

    Chen, Lawrence R.; Smith, Peter W. E.

    The design and fabrication of chirped Moiré fiber Bragg gratings (CMGs) are presented, which can be used in either (1) transmission as passband filters for providing wavelength selectivity in wavelength-division-multiplexed (WDM) systems or (2) reflection as encoding/decoding elements to decompose short broadband pulses in both wavelength and time in order to implement an optical code-division multiple-access (OCDMA) system. In transmission, the fabricated CMGs have single or multiple flattened passbands ( 12 dB isolation and near constant in-band group delay. It is shown that these filters do not produce any measurable dispersion-induced power penalties when used to provide wavelength selectivity in 2.5 Gbit/s systems. It is also demonstrated how CMGs can be used in reflection to encode/decode short pulses from a wavelength-tunable mode-locked Er-doped fiber laser.

  11. Data access performance through parallelization and vectored access. Some results

    International Nuclear Information System (INIS)

    Furano, F; Hanushevsky, A

    2008-01-01

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network

  12. MPTCP Tunnel: An Architecture for Aggregating Bandwidth of Heterogeneous Access Networks

    Directory of Open Access Journals (Sweden)

    Xiaolan Liu

    2018-01-01

    Full Text Available Fixed and cellular networks are two typical access networks provided by operators. Fixed access network is widely employed; nevertheless, its bandwidth is sometimes not sufficient enough to meet user bandwidth requirements. Meanwhile, cellular access network owns unique advantages of wider coverage, faster increasing link speed, more flexible deployment, and so forth. Therefore, it is attractive for operators to mitigate the bandwidth shortage by bundling these two. Actually, there have been existing schemes proposed to aggregate the bandwidth of two access networks, whereas they all have their own problems, like packet reordering or extra latency overhead. To address this problem, we design new architecture, MPTCP Tunnel, to aggregate the bandwidth of multiple heterogeneous access networks from the perspective of operators. MPTCP Tunnel uses MPTCP, which solves the reordering problem essentially, to bundle multiple access networks. Besides, MPTCP Tunnel sets up only one MPTCP connection at play which adapts itself to multiple traffic types and TCP flows. Furthermore, MPTCP Tunnel forwards intact IP packets through access networks, maintaining the end-to-end TCP semantics. Experimental results manifest that MPTCP Tunnel can efficiently aggregate the bandwidth of multiple access networks and is more adaptable to the increasing heterogeneity of access networks than existing mechanisms.

  13. Optical soliton communication using ultra-short pulses

    CERN Document Server

    Sadegh Amiri, Iraj

    2015-01-01

    This brief analyzes the characteristics of a microring resonator (MRR) to perform communication using ultra-short soliton pulses. The raising of nonlinear refractive indices, coupling coefficients and radius of the single microring resonator leads to decrease in input power and round trips wherein the bifurcation occurs. As a result, bifurcation or chaos behaviors are seen at lower input power of 44 W, where the nonlinear refractive index is n2=3.2×10−20 m2/W. Using a decimal convertor system, these ultra-short signals can be converted into quantum information. Results show that multi solitons with FWHM and FSR of 10 pm and 600 pm can be generated respectively. The multi optical soliton with FWHM and FSR of 325 pm and 880 nm can be incorporated with a time division multiple access (TDMA) system wherein the transportation of quantum information is performed.

  14. S-band multiple-access interference study for advanced tracking and data relay satellite systems

    Science.gov (United States)

    Peng, Wei-Chung; Yang, Chau-Chin

    1990-01-01

    The results of a study on the effect of mutual interference among S-band multiple access (SMA) system users of advanced tracking and data relay satellite system (ATDRSS) are presented. In the ATDRSS era, the SMA system is required to support data rates ranging from 10 kb/s to 3 Mb/s. The system will consist of four advanced tracking and data relay satellites (ATDRS) each supporting up to five telemetry links. All users have 10 MHz bandwidth with their carrier frequency equal to 2.2875 GHz. A hybrid SDMA/CDMA scheme is used to mitigate the effect of the interference among system users. SMA system interference probability is evaluated with CLASS software. User link margin degradation due to mutual interference between two users is evaluated. System interference probability is evaluated for the projected 1996 mission model, a reference mission model, and a modified reference mission model.

  15. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  16. Integración óptima de sistemas de antenas adaptivas en redes inalámbricas multihop ad hoc utilizando TDMA generalizado como protocolo de acceso al medio

    Directory of Open Access Journals (Sweden)

    M. Sánchez

    2007-11-01

    Full Text Available En este artículo se estudia la integración efectiva de sistemas de antenas adaptivas (AAS para mejorar el desempeño, en términos de capacidad de tráfico (throughput y retardo de paquetes, en redes de transmisión de datos inalámbricas multihop ad hoc utilizando TDMA generalizado como protocolo de acceso al medio. El diseño óptimo del sistema para maximizar el throughput total de la red se deriva analíticamente tanto para tráfico unicast como para tráfico multicast y se válida mediante la simulación de eventos discretos. Los resultados mostraron una ganancia significativa como producto de la utilización de AAS con respecto al desempeño de sistemas que utilizan antenas omnidireccionales. La transmisión a través de antena omnidireccional y recepción direccional es más adecuada para la transmisión de tráfico multicast. Para tráfico unicast el uso de transmisión y recepción direccional es más conveniente, lo que resulta en mucha mayor ganancia con respecto a la transmisión y recepción omnidireccional.

  17. Comparison of neural network applications for channel assignment in cellular TDMA networks and dynamically sectored PCS networks

    Science.gov (United States)

    Hortos, William S.

    1997-04-01

    The use of artificial neural networks (NNs) to address the channel assignment problem (CAP) for cellular time-division multiple access and code-division multiple access networks has previously been investigated by this author and many others. The investigations to date have been based on a hexagonal cell structure established by omnidirectional antennas at the base stations. No account was taken of the use of spatial isolation enabled by directional antennas to reduce interference between mobiles. Any reduction in interference translates into increased capacity and consequently alters the performance of the NNs. Previous studies have sought to improve the performance of Hopfield- Tank network algorithms and self-organizing feature map algorithms applied primarily to static channel assignment (SCA) for cellular networks that handle uniformly distributed, stationary traffic in each cell for a single type of service. The resulting algorithms minimize energy functions representing interference constraint and ad hoc conditions that promote convergence to optimal solutions. While the structures of the derived neural network algorithms (NNAs) offer the potential advantages of inherent parallelism and adaptability to changing system conditions, this potential has yet to be fulfilled the CAP for emerging mobile networks. The next-generation communication infrastructures must accommodate dynamic operating conditions. Macrocell topologies are being refined to microcells and picocells that can be dynamically sectored by adaptively controlled, directional antennas and programmable transceivers. These networks must support the time-varying demands for personal communication services (PCS) that simultaneously carry voice, data and video and, thus, require new dynamic channel assignment (DCA) algorithms. This paper examines the impact of dynamic cell sectoring and geometric conditioning on NNAs developed for SCA in omnicell networks with stationary traffic to improve the metrics

  18. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  19. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  20. Effect of beat noise on the performance of two-dimensional time-spreading/wavelength-hopping optical code-division multiple-access systems

    Science.gov (United States)

    Bazan, T.; Harle, D.; Andonovic, I.; Meenakshi, M.

    2005-03-01

    The effect of beat noise on optical code-division multiple-access (OCDMA) systems using a range of two-dimensional (2-D) time-spreading/wavelength-hopping (TW) code families is presented. A derivation of a general formula for the error probability of the system is given. The properties of the 2-D codes--namely, the structure, length, and cross-correlation characteristics--are found to have a great influence on system performance. Improved performance can be obtained by use of real-time dynamic thresholding.

  1. Performance enhancement of successive interference cancellation scheme based on spectral amplitude coding for optical code-division multiple-access systems using Hadamard codes

    Science.gov (United States)

    Eltaif, Tawfig; Shalaby, Hossam M. H.; Shaari, Sahbudin; Hamarsheh, Mohammad M. N.

    2009-04-01

    A successive interference cancellation scheme is applied to optical code-division multiple-access (OCDMA) systems with spectral amplitude coding (SAC). A detailed analysis of this system, with Hadamard codes used as signature sequences, is presented. The system can easily remove the effect of the strongest signal at each stage of the cancellation process. In addition, simulation of the prose system is performed in order to validate the theoretical results. The system shows a small bit error rate at a large number of active users compared to the SAC OCDMA system. Our results reveal that the proposed system is efficient in eliminating the effect of the multiple-user interference and in the enhancement of the overall performance.

  2. Performance analysis for a chaos-based code-division multiple access system in wide-band channel

    Directory of Open Access Journals (Sweden)

    Ciprian Doru Giurcăneanu

    2015-08-01

    Full Text Available Code-division multiple access technology is widely used in telecommunications and its performance has been extensively investigated in the past. Theoretical results for the case of wide-band transmission channel were not available until recently. The novel formulae which have been published in 2014 can have an important impact on the future of wireless multiuser communications, but limitations come from the Gaussian approximations used in their derivation. In this Letter, the authors obtain more accurate expressions of the bit error rate (BER for the case when the model of the wide-band channel is two-ray, with Rayleigh fading. In the authors’ approach, the spreading sequences are assumed to be generated by logistic map given by Chebyshev polynomial function of order two. Their theoretical and experimental results show clearly that the previous results on BER, which rely on the crude Gaussian approximation, are over-pessimistic.

  3. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    Science.gov (United States)

    Musick, Charles R [Castro Valley, CA; Critchlow, Terence [Livermore, CA; Ganesh, Madhaven [San Jose, CA; Slezak, Tom [Livermore, CA; Fidelis, Krzysztof [Brentwood, CA

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  4. A design of a wavelength-hopping time-spreading incoherent optical code division multiple access system

    International Nuclear Information System (INIS)

    Glesk, I.; Baby, V.

    2005-01-01

    We present the architecture and code design for a highly scalable, 2.5 Gb/s per user optical code division multiple access (OCDMA) system. The system is scalable to 100 potential and more than 10 simultaneous users, each with a bit error rate (BER) of less than 10 -9 . The system architecture uses a fast wavelength-hopping, time-spreading codes. Unlike frequency and phase sensitive coherent OCDMA systems, this architecture utilizes standard on off keyed optical pulses allocated in the time and wavelength dimensions. This incoherent OCDMA approach is compatible with existing WDM optical networks and utilizes off the shelf components. We discuss the novel optical subsystem design for encoders and decoders that enable the realization of a highly scalable incoherent OCDMA system with rapid reconfigurability. A detailed analysis of the scalability of the two dimensional code is presented and select network deployment architectures for OCDMA are discussed (Authors)

  5. Non-Orthogonal Multiple Access for Large-Scale 5G Networks: Interference Aware Design

    KAUST Repository

    Ali, Konpal S.

    2017-09-18

    Non-orthogonal multiple access (NOMA) is promoted as a key component of 5G cellular networks. As the name implies, NOMA operation introduces intracell interference (i.e., interference arising within the cell) to the cellular operation. The intracell interference is managed by careful NOMA design (e.g., user clustering and resource allocation) along with successive interference cancellation. However, most of the proposed NOMA designs are agnostic to intercell interference (i.e., interference from outside the cell), which is a major performance limiting parameter in 5G networks. This article sheds light on the drastic negative-impact of intercell interference on the NOMA performance and advocates interference-aware NOMA design that jointly accounts for both intracell and intercell interference. To this end, a case study for fair NOMA operation is presented and intercell interference mitigation techniques for NOMA networks are discussed. This article also investigates the potential of integrating NOMA with two important 5G transmission schemes, namely, full duplex and device-to-device communication. This is important since the ambitious performance defined by the 3rd Generation Partnership Project (3GPP) for 5G is foreseen to be realized via seamless integration of several new technologies and transmission techniques.

  6. Advanced architectures and the required technologies for next-generation communications satellite systems

    Science.gov (United States)

    Arnold, Ray; Naderi, F. Michael

    1988-01-01

    The hardware requirements for multibeam operation and onboard data processing and switching on future communication satellites are reviewed. Topics addressed include multiple-beam antennas, frequency-addressable beams, baseband vs IF switching, FDM/TDMA systems, and bulk demodulators. The proposed use of these technologies in the NASA ACTS, Italsat, and the Japanese ETS-VI is discussed in detail and illustrated with extensive diagrams, maps, drawings, and tables of projected performance data.

  7. An orthogonal wavelet division multiple-access processor architecture for LTE-advanced wireless/radio-over-fiber systems over heterogeneous networks

    Science.gov (United States)

    Mahapatra, Chinmaya; Leung, Victor CM; Stouraitis, Thanos

    2014-12-01

    The increase in internet traffic, number of users, and availability of mobile devices poses a challenge to wireless technologies. In long-term evolution (LTE) advanced system, heterogeneous networks (HetNet) using centralized coordinated multipoint (CoMP) transmitting radio over optical fibers (LTE A-ROF) have provided a feasible way of satisfying user demands. In this paper, an orthogonal wavelet division multiple-access (OWDMA) processor architecture is proposed, which is shown to be better suited to LTE advanced systems as compared to orthogonal frequency division multiple access (OFDMA) as in LTE systems 3GPP rel.8 (3GPP, http://www.3gpp.org/DynaReport/36300.htm). ROF systems are a viable alternative to satisfy large data demands; hence, the performance in ROF systems is also evaluated. To validate the architecture, the circuit is designed and synthesized on a Xilinx vertex-6 field-programmable gate array (FPGA). The synthesis results show that the circuit performs with a clock period as short as 7.036 ns (i.e., a maximum clock frequency of 142.13 MHz) for transform size of 512. A pipelined version of the architecture reduces the power consumption by approximately 89%. We compare our architecture with similar available architectures for resource utilization and timing and provide performance comparison with OFDMA systems for various quality metrics of communication systems. The OWDMA architecture is found to perform better than OFDMA for bit error rate (BER) performance versus signal-to-noise ratio (SNR) in wireless channel as well as ROF media. It also gives higher throughput and mitigates the bad effect of peak-to-average-power ratio (PAPR).

  8. Opportunistic spectrum access in cognitive radio based on channel switching

    KAUST Repository

    Gaaloul, Fakhreddine; Yang, Hongchuan; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    This paper investigates the performance of a cognitive radio transceiver that can monitor multiple channels and opportunistically use any one of them should it be available. In our work, we propose and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. Two switching strategies, namely the switch and examine and the switch and stay strategies, are proposed. For these proposed access schemes, we investigate their performance by deriving the analytical expression of the novel metric of the average access duration and the average waiting time and based on these two metrics a time average SU throughput formula is proposed to predict the performance of the secondary cognitive system. © 2012 ICST.

  9. Reduced feedback selective cluster index scheduling with user pre-selection for next-generation multi-input multi-output orthogonal frequency division multiple access system

    OpenAIRE

    Nicolaou, M; Doufexi, A; Armour, SMD; Sun, Y

    2011-01-01

    The joint use of opportunistic scheduling and orthogonal frequency division multiple access (OFDMA) provide significant gains in environments of low mobility and scatter for which channel variations are low. The downside of opportunistic scheduling in multicarrier systems such as OFDMA, lies in the substantial uplink overhead required to feed back by the mobile stations (MSs) describing users' instantaneous link conditions. This study presents a novel approach towards multicarrier opportunist...

  10. Lowering data retention voltage in static random access memory array by post fabrication self-improvement of cell stability by multiple stress application

    Science.gov (United States)

    Mizutani, Tomoko; Takeuchi, Kiyoshi; Saraya, Takuya; Kobayashi, Masaharu; Hiramoto, Toshiro

    2018-04-01

    We propose a new version of the post fabrication static random access memory (SRAM) self-improvement technique, which utilizes multiple stress application. It is demonstrated that, using a device matrix array (DMA) test element group (TEG) with intrinsic channel fully depleted (FD) silicon-on-thin-buried-oxide (SOTB) six-transistor (6T) SRAM cells fabricated by the 65 nm technology, the lowering of data retention voltage (DRV) is more effectively achieved than using the previously proposed single stress technique.

  11. Optical orthogonal code-division multiple-access system - Part 2: Multibits/sequence-period OOCDMA

    Science.gov (United States)

    Kwon, Hyuck M.

    1994-08-01

    In a recently proposed optical orthogonal code division multiple-access (OOCDMA) system, one bit of user's data is transmitted per sequence-period, and a threshold is employed for the final bit decision. In this paper, a system that can transmit multibits per sequence-period is introduced, and avalanche photodiode (APD) noise, thermal noise, and interference, are included. This system, derived by exploiting orthogonal properties of the OOCDMA code sequence and using a maximum search (instead of a threshold) in the final decision, is log(sub 2) F times higher in throughput, where F is sequence-period. For example, four orders of magnitude are better in bit error probability at - 56 dBW received laser power, with F = 1000 chips, 10 'marks' in a sequence, and 10 users of 30 Mb/s data rate for one-bit/sequence-period and 270 Mb/s data rate for multibits/sequence-period system. Furthermore, an exact analysis is performed for the log(sub 2)F bits/sequence-period system with a hard-limiter placed before the receiver, and its performance is compared to the performance without hard-limiter, for the chip-synchronous case. The improvement from using a hard-limiter is significant in the log(sub 2)F bits/sequence-period OCCDMA system.

  12. Trafikkoptimering i satellittsystemer

    OpenAIRE

    Breivik, Anders

    2003-01-01

    The thesis deals with the traffic optimization problem arizing in SS/TDMA satellite systems. This problem is known in existing literature both as the "bipartite scheduling problem" and the "timeslot asssignment problem". One aim of the thesis is to serve as an intoduction to the field, and to present extisting results and proofs in a thorough and accessible manner. It is also the aim of the thesis to generalize certain existing results to the case where the number of antennas is less tha...

  13. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  14. Tunable optical frequency comb enabled scalable and cost-effective multiuser orthogonal frequency-division multiple access passive optical network with source-free optical network units.

    Science.gov (United States)

    Chen, Chen; Zhang, Chongfu; Liu, Deming; Qiu, Kun; Liu, Shuang

    2012-10-01

    We propose and experimentally demonstrate a multiuser orthogonal frequency-division multiple access passive optical network (OFDMA-PON) with source-free optical network units (ONUs), enabled by tunable optical frequency comb generation technology. By cascading a phase modulator (PM) and an intensity modulator and dynamically controlling the peak-to-peak voltage of a PM driven signal, a tunable optical frequency comb source can be generated. It is utilized to assist the configuration of a multiple source-free ONUs enhanced OFDMA-PON where simultaneous and interference-free multiuser upstream transmission over a single wavelength can be efficiently supported. The proposed multiuser OFDMA-PON is scalable and cost effective, and its feasibility is successfully verified by experiment.

  15. Case studies of natural resource access in Jharkhand, India

    DEFF Research Database (Denmark)

    Sareen, Siddharth

    This policy brief illustrates that decentralisation can only effectively support residents’ access to natural resources if it both resolves policy overlaps at multiple levels to bring about inclusive and equitable access and aligns policies with ground realities for specific natural resources....

  16. Traffic-Adaptive, Flow-Specific Medium Access for Wireless Networks

    Science.gov (United States)

    2009-09-01

    51 b. Carrier Sense Multiple Access (CSMA).................................52 c. MACA and MACAW...Figure 17. Comparison of collision avoidance techniques proposed in MACA , MACAW, and MACA -BI (From [132...low power listening lrd ......................long range dependent MAC .................medium access control MACA

  17. GEOM/GEOM[a]/1/ queue with late arrival system with delayed access and delayed multiple working vacations

    Directory of Open Access Journals (Sweden)

    Cheng Jiang

    2014-01-01

    Full Text Available This paper considers a discrete-time bulk-service queue with infinite buffer space and delay multiple working vacations. Considering a late arrival system with delayed access (LAS-AD, it is assumed that the inter-arrival times, service times, vacation times are all geometrically distributed. The server does not take a vacation immediately at service complete epoch but keeps idle period. According to a bulk-service rule, at least one customer is needed to start a service with a maximum serving capacity 'a'. Using probability analysis method and displacement operator method, the queue length and the probability generating function of waiting time at pre-arrival epochs are obtained. Furthermore, the outside observer’s observation epoch queue length distributions are given. Finally, computational examples with numerical results in the form of graphs and tables are discussed.

  18. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  19. ECS: Efficient Communication Scheduling for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lu Hong

    2011-03-01

    Full Text Available TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs, because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols.

  20. Variable Scheduling to Mitigate Channel Losses in Energy-Efficient Body Area Networks

    Directory of Open Access Journals (Sweden)

    Lavy Libman

    2012-11-01

    Full Text Available We consider a typical body area network (BAN setting in which sensor nodes send data to a common hub regularly on a TDMA basis, as defined by the emerging IEEE 802.15.6 BAN standard. To reduce transmission losses caused by the highly dynamic nature of the wireless channel around the human body, we explore variable TDMA scheduling techniques that allow the order of transmissions within each TDMA round to be decided on the fly, rather than being fixed in advance. Using a simple Markov model of the wireless links, we devise a number of scheduling algorithms that can be performed by the hub, which aim to maximize the expected number of successful transmissions in a TDMA round, and thereby significantly reduce transmission losses as compared with a static TDMA schedule. Importantly, these algorithms do not require a priori knowledge of the statistical properties of the wireless channels, and the reliability improvement is achieved entirely via shuffling the order of transmissions among devices, and does not involve any additional energy consumption (e.g., retransmissions. We evaluate these algorithms directly on an experimental set of traces obtained from devices strapped to human subjects performing regular daily activities, and confirm that the benefits of the proposed variable scheduling algorithms extend to this practical setup as well.

  1. PENERAPAN MULTIPLE INTELEGENSI DALAM KEGIATAN BELAJAR-MENGAJAR

    OpenAIRE

    Nur Samsiyah

    2016-01-01

    Multiple intelegence is integrated inteligence possessed by anyone. Intelligence has been difined as the composition of ability and skill. Multiple intelligence consists of nine types of intelligence, i.e. linguistic, logic-mathematic, spatial, musical, kinesthetic, interpersonal, intrapersonal, naturalistic and extencial intelligence, each of which has its own characteristics. Multiple intelligence learning strategy empowers students to access information through intelligence that they do ha...

  2. Household trends in access to improved water sources and sanitation facilities in Vietnam and associated factors: findings from the Multiple Indicator Cluster Surveys, 2000-2011.

    Science.gov (United States)

    Tuyet-Hanh, Tran Thi; Lee, Jong-Koo; Oh, Juhwan; Van Minh, Hoang; Ou Lee, Chul; Hoan, Le Thi; Nam, You-Seon; Long, Tran Khanh

    2016-01-01

    Despite progress made by the Millennium Development Goal (MDG) number 7.C, Vietnam still faces challenges with regard to the provision of access to safe drinking water and basic sanitation. This paper describes household trends in access to improved water sources and sanitation facilities separately, and analyses factors associated with access to improved water sources and sanitation facilities in combination. Secondary data from the Vietnam Multiple Indicator Cluster Survey in 2000, 2006, and 2011 were analyzed. Descriptive statistics and tests of significance describe trends over time in access to water and sanitation by location, demographic and socio-economic factors. Binary logistic regressions (2000, 2006, and 2011) describe associations between access to water and sanitation, and geographic, demographic, and socio-economic factors. There have been some outstanding developments in access to improved water sources and sanitation facilities from 2000 to 2011. In 2011, the proportion of households with access to improved water sources and sanitation facilities reached 90% and 77%, respectively, meeting the 2015 MDG targets for safe drinking water and basic sanitation set at 88% and 75%, respectively. However, despite these achievements, in 2011, only 74% of households overall had access to combined improved drinking water and sanitation facilities. There were also stark differences between regions. In 2011, only 47% of households had access to both improved water and sanitation facilities in the Mekong River Delta compared with 94% in the Red River Delta. In 2011, households in urban compared to rural areas were more than twice as likely (odds ratio [OR]: 2.2; 95% confidence interval [CI]: 1.9-2.5) to have access to improved water and sanitation facilities in combination, and households in the highest compared with the lowest wealth quintile were over 40 times more likely (OR: 42.3; 95% CI: 29.8-60.0). More efforts are required to increase household access to

  3. Isochronous wireless network for real-time communication in industrial automation

    CERN Document Server

    Trsek, Henning

    2016-01-01

    This dissertation proposes and investigates an isochronous wireless network for industrial control applications with guaranteed latencies and jitter. Based on a requirements analysis of real industrial applications and the characterisation of the wireless channel, the solution approach is developed. It consists of a TDMA-based medium access control, a dynamic resource allocation and the provision of a global time base for the wired and the wireless network. Due to the global time base, the solution approach allows a seamless and synchronous integration into existing wired Real-time Ethernet systems.

  4. Second-Order Optimal Array Receivers for Synchronization of BPSK, MSK, and GMSK Signals Corrupted by Noncircular Interferences

    Directory of Open Access Journals (Sweden)

    Chevalier Pascal

    2007-01-01

    Full Text Available The synchronization and/or time acquisition problem in the presence of interferences has been strongly studied these last two decades, mainly to mitigate the multiple access interferences from other users in DS/CDMA systems. Among the available receivers, only some scarce receivers may also be used in other contexts such as F/TDMA systems. However, these receivers assume implicitly or explicitly circular (or proper interferences and become suboptimal for noncircular (or improper interferences. Such interferences are characteristic in particular of radio communication networks using either rectilinear (or monodimensional modulations such as BPSK modulation or modulation becoming quasirectilinear after a preprocessing such as MSK, GMSK, or OQAM modulations. For this reason, the purpose of this paper is to introduce and to analyze the performance of second-optimal array receivers for synchronization and/or time acquisition of BPSK, MSK, and GMSK signals corrupted by noncircular interferences. For given performances and in the presence of rectilinear signal and interferences, the proposed receiver allows a reduction of the number of sensors by a factor at least equal to two.

  5. Wide-band cable systems at SLAC

    International Nuclear Information System (INIS)

    Struven, W.

    1983-01-01

    SLAC's first cable TV system was installed in 1979 to remotely monitor a narrow pulse which was generated in the west end of the klystron gallery. When Stanford Linear Collider (SLC) experimental work started at the west end of the accelerator, the original 1979 cable was upgraded to a bidirectional system so that 2 MBaud point-to-point data and several video and 9600 baud channels could be transmitted. The implementation of the SLC requires a complete upgrading of the accelerator control system. The system is based on a distributed processing configuration using a PDP11/780 VAX in the Main Control Center (MCC) and Intel single-board computers in a multibus configuration along the accelerator. The high-speed data linking is supplied by a 1 MBaud Time Division Multiple Access (TDMA) Network. The same cable is used to provide video, low-speed data, voice and high-speed point-to-point data services. The transmission system will utilize a wideband midsplit cable facility to collect and distribute signals to all parts of the network

  6. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  7. Full-diversity partial interference cancellation for multi-user wireless relaying networks

    KAUST Repository

    El Astal, M. T O

    2013-12-01

    We focus on the uplink channel of multi-user wireless relaying networks in a coverage extension scenario. The network consists of two users, a single half duplex (HD) relay and a destination, all equipped with multiple antennas. Perfect channel state information (CSI) is assumed to be available exclusively at the receiving nodes (i.e., the relay and the destination) while the users are assumed to be completely blind. The communication through the considered network takes place over two phases. During the first phase, both users send their information concurrently to the relay. The second phase consists of decoding the received data and forwarding it simultaneously to the destination. A transmission scheme that achieves full-diversity under partial interference cancellation (PIC) group decoding is proposed. Unlike many existing schemes, it allows the concurrent transmission in both phases while achieving the full-diversity gain of full time division multiple access (TDMA) transmission regardless of the number of antennas at each node. Numerical comparison with existing schemes in the literature is provided to corroborate our theoretical claims. It is found that our interference cancellation (IC) scheme clearly outperforms existing schemes at the expense of an affordable increase in decoding complexity at both of the relay and destination. © 2013 IEEE.

  8. Full-diversity partial interference cancellation for multi-user wireless relaying networks

    KAUST Repository

    El Astal, M. T O; Ismail, Amr; Alouini, Mohamed-Slim; Olivier, Jan Corné

    2013-01-01

    We focus on the uplink channel of multi-user wireless relaying networks in a coverage extension scenario. The network consists of two users, a single half duplex (HD) relay and a destination, all equipped with multiple antennas. Perfect channel state information (CSI) is assumed to be available exclusively at the receiving nodes (i.e., the relay and the destination) while the users are assumed to be completely blind. The communication through the considered network takes place over two phases. During the first phase, both users send their information concurrently to the relay. The second phase consists of decoding the received data and forwarding it simultaneously to the destination. A transmission scheme that achieves full-diversity under partial interference cancellation (PIC) group decoding is proposed. Unlike many existing schemes, it allows the concurrent transmission in both phases while achieving the full-diversity gain of full time division multiple access (TDMA) transmission regardless of the number of antennas at each node. Numerical comparison with existing schemes in the literature is provided to corroborate our theoretical claims. It is found that our interference cancellation (IC) scheme clearly outperforms existing schemes at the expense of an affordable increase in decoding complexity at both of the relay and destination. © 2013 IEEE.

  9. Variable weight Khazani-Syed code using hybrid fixed-dynamic technique for optical code division multiple access system

    Science.gov (United States)

    Anas, Siti Barirah Ahmad; Seyedzadeh, Saleh; Mokhtar, Makhfudzah; Sahbudin, Ratna Kalos Zakiah

    2016-10-01

    Future Internet consists of a wide spectrum of applications with different bit rates and quality of service (QoS) requirements. Prioritizing the services is essential to ensure that the delivery of information is at its best. Existing technologies have demonstrated how service differentiation techniques can be implemented in optical networks using data link and network layer operations. However, a physical layer approach can further improve system performance at a prescribed received signal quality by applying control at the bit level. This paper proposes a coding algorithm to support optical domain service differentiation using spectral amplitude coding techniques within an optical code division multiple access (OCDMA) scenario. A particular user or service has a varying weight applied to obtain the desired signal quality. The properties of the new code are compared with other OCDMA codes proposed for service differentiation. In addition, a mathematical model is developed for performance evaluation of the proposed code using two different detection techniques, namely direct decoding and complementary subtraction.

  10. Structure for common access and support of fuel cell stacks

    Science.gov (United States)

    Walsh, Michael M.

    2000-01-01

    A structure provides common support and access to multiple fuel cells externally mounted thereto. The structure has openings leading to passages defined therein for providing the access. Various other fuel cell power system components are connected at the openings, such as reactant and coolant sources.

  11. SCOAP3 and Open Access

    CERN Document Server

    Mele, Salvatore; D'Agostino, Dan; Dyas-Correia, Sharon

    2009-01-01

    SCOAP3 is an innovative Open Access initiative for publishing in high-energy physics. The model is viewed by many as a potential solution to multiple issues related to the financial crisis, the peer review system, scholarly communication, and the need to support institutional repositories. This installment of “The Balance Point” presents articles written by three Open Access advocates, outlining the SCOAP3 proposal, benefits of participation, and some of the roles libraries, publishers and scientists can play in making important changes to scholarly communication. Contributors discuss scalability and transferability issues of SCOAP3, as well as other matters of concern.

  12. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  13. Upgrade of hybrid fibre coax networks towards bi-directional access

    NARCIS (Netherlands)

    Khoe, G.D.; Wolters, R.P.C.; Boom, van den H.P.A.; Prati, G.

    1997-01-01

    In this paper we describe an upgrade scenario for Hybrid Fibre Coax (HFC) CATV Networks towards hi-directional access. The communication system described has been newly designed, and is based on the use of Direct Sequence- Code Division Multiple-Access (DS-CDMA). Due to its spread-spectrum

  14. Household trends in access to improved water sources and sanitation facilities in Vietnam and associated factors: findings from the Multiple Indicator Cluster Surveys, 2000–2011

    Science.gov (United States)

    Tuyet-Hanh, Tran Thi; Lee, Jong-Koo; Oh, Juhwan; Van Minh, Hoang; Ou Lee, Chul; Hoan, Le Thi; Nam, You-Seon; Long, Tran Khanh

    2016-01-01

    Background Despite progress made by the Millennium Development Goal (MDG) number 7.C, Vietnam still faces challenges with regard to the provision of access to safe drinking water and basic sanitation. Objective This paper describes household trends in access to improved water sources and sanitation facilities separately, and analyses factors associated with access to improved water sources and sanitation facilities in combination. Design Secondary data from the Vietnam Multiple Indicator Cluster Survey in 2000, 2006, and 2011 were analyzed. Descriptive statistics and tests of significance describe trends over time in access to water and sanitation by location, demographic and socio-economic factors. Binary logistic regressions (2000, 2006, and 2011) describe associations between access to water and sanitation, and geographic, demographic, and socio-economic factors. Results There have been some outstanding developments in access to improved water sources and sanitation facilities from 2000 to 2011. In 2011, the proportion of households with access to improved water sources and sanitation facilities reached 90% and 77%, respectively, meeting the 2015 MDG targets for safe drinking water and basic sanitation set at 88% and 75%, respectively. However, despite these achievements, in 2011, only 74% of households overall had access to combined improved drinking water and sanitation facilities. There were also stark differences between regions. In 2011, only 47% of households had access to both improved water and sanitation facilities in the Mekong River Delta compared with 94% in the Red River Delta. In 2011, households in urban compared to rural areas were more than twice as likely (odds ratio [OR]: 2.2; 95% confidence interval [CI]: 1.9–2.5) to have access to improved water and sanitation facilities in combination, and households in the highest compared with the lowest wealth quintile were over 40 times more likely (OR: 42.3; 95% CI: 29.8–60.0). Conclusions More

  15. Household trends in access to improved water sources and sanitation facilities in Vietnam and associated factors: findings from the Multiple Indicator Cluster Surveys, 2000–2011

    Directory of Open Access Journals (Sweden)

    Tran Thi Tuyet-Hanh

    2016-02-01

    Full Text Available Background: Despite progress made by the Millennium Development Goal (MDG number 7.C, Vietnam still faces challenges with regard to the provision of access to safe drinking water and basic sanitation. Objective: This paper describes household trends in access to improved water sources and sanitation facilities separately, and analyses factors associated with access to improved water sources and sanitation facilities in combination. Design: Secondary data from the Vietnam Multiple Indicator Cluster Survey in 2000, 2006, and 2011 were analyzed. Descriptive statistics and tests of significance describe trends over time in access to water and sanitation by location, demographic and socio-economic factors. Binary logistic regressions (2000, 2006, and 2011 describe associations between access to water and sanitation, and geographic, demographic, and socio-economic factors. Results: There have been some outstanding developments in access to improved water sources and sanitation facilities from 2000 to 2011. In 2011, the proportion of households with access to improved water sources and sanitation facilities reached 90% and 77%, respectively, meeting the 2015 MDG targets for safe drinking water and basic sanitation set at 88% and 75%, respectively. However, despite these achievements, in 2011, only 74% of households overall had access to combined improved drinking water and sanitation facilities. There were also stark differences between regions. In 2011, only 47% of households had access to both improved water and sanitation facilities in the Mekong River Delta compared with 94% in the Red River Delta. In 2011, households in urban compared to rural areas were more than twice as likely (odds ratio [OR]: 2.2; 95% confidence interval [CI]: 1.9–2.5 to have access to improved water and sanitation facilities in combination, and households in the highest compared with the lowest wealth quintile were over 40 times more likely (OR: 42.3; 95% CI: 29.8–60

  16. Optical Multiple Access Network (OMAN) for advanced processing satellite applications

    Science.gov (United States)

    Mendez, Antonio J.; Gagliardi, Robert M.; Park, Eugene; Ivancic, William D.; Sherman, Bradley D.

    1991-01-01

    An OMAN breadboard for exploring advanced processing satellite circuit switch applications is introduced. Network architecture, hardware trade offs, and multiple user interference issues are presented. The breadboard test set up and experimental results are discussed.

  17. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-18

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  18. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine; Alouini, Mohamed-Slim; Radaydeh, Redha M.; Yang, Hong-Chuan

    2012-01-01

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  19. Embedding multiple self-organisation functionalities in future radio access networks

    NARCIS (Netherlands)

    Jansen, T.; Amirijoo, M.; Türke, U.; Jorguseski, L.; Zetterberg, K.; Nascimento, J.R.V. do; Schmelz, L.C.; Turk, J.; Balan, I.

    2009-01-01

    Wireless network operators today allocate considerable manual effort in managing their networks. A viable solution for lowering the manual effort is to introduce self-organisation functionalities. In this paper we discuss the challenges that are encountered when embedding multiple self-organisation

  20. A method for detecting the presence of organic fraction in nucleation mode sized particles

    Directory of Open Access Journals (Sweden)

    P. Vaattovaara

    2005-01-01

    Full Text Available New particle formation and growth has a very important role in many climate processes. However, the overall knowlegde of the chemical composition of atmospheric nucleation mode (particle diameter, d<20 nm and the lower end of Aitken mode particles (d≤50 nm is still insufficient. In this work, we have applied the UFO-TDMA (ultrafine organic tandem differential mobility analyzer method to shed light on the presence of an organic fraction in the nucleation mode size class in different atmospheric environments. The basic principle of the organic fraction detection is based on our laboratory UFO-TDMA measurements with organic and inorganic compounds. Our laboratory measurements indicate that the usefulness of the UFO-TDMA in the field experiments would arise especially from the fact that atmospherically the most relevant inorganic compounds do not grow in subsaturated ethanol vapor, when particle size is 10 nm in diameter and saturation ratio is about 86% or below it. Furthermore, internally mixed particles composed of ammonium bisulfate and sulfuric acid with sulfuric acid mass fraction ≤33% show no growth at 85% saturation ratio. In contrast, 10 nm particles composed of various oxidized organic compounds of atmospheric relevance are able to grow in those conditions. These discoveries indicate that it is possible to detect the presence of organics in atmospheric nucleation mode sized particles using the UFO-TDMA method. In the future, the UFO-TDMA is expected to be an important aid to describe the composition of atmospheric newly-formed particles.

  1. Spatial-phase code-division multiple-access system with multiplexed Fourier holography switching for reconfigurable optical interconnection

    Science.gov (United States)

    Takasago, Kazuya; Takekawa, Makoto; Shirakawa, Atsushi; Kannari, Fumihiko

    2000-05-01

    A new, to our knowledge, space-variant optical interconnection system based on a spatial-phase code-division multiple-access technique with multiplexed Fourier holography is described. In this technique a signal beam is spread over wide spatial frequencies by an M -sequence pseudorandom phase code. At a receiver side a selected signal beam is properly decoded, and at the same time its spatial pattern is shaped with a Fourier hologram, which is recorded by light that is encoded with the same M -sequence phase mask as the desired signal beam and by light whose spatial beam pattern is shaped to a signal routing pattern. Using the multiplexed holography, we can simultaneously route multisignal flows into individually specified receiver elements. The routing pattern can also be varied by means of switching the encoding phase code or replacing the hologram. We demonstrated a proof-of-principle experiment with a doubly multiplexed hologram that enables simultaneous routing of two signal beams. Using a numerical model, we showed that the proposed scheme can manage more than 250 routing patterns for one signal flow with one multiplexed hologram at a signal-to-noise ratio of 5.

  2. Deja Vu--The Access/Success Pendulum

    Science.gov (United States)

    Gandara, Patricia; Orfield, Gary

    2010-01-01

    In education, reform tends to follow cycles, often bouncing from one extreme to another without considering the possibility of incorporating multiple perspectives simultaneously. Policies aimed at helping more underrepresented students enter college and complete degrees have bounced from one pole to another, embracing access as the primary goal…

  3. An Effective Key Management Approach to Differential Access Control in Dynamic Environments

    OpenAIRE

    Yogesh Karandikar; Xukai Zou; Yuanshun Dai

    2006-01-01

    Applications like e-newspaper or interactive online gaming have more than one resource and a large number of users. There is a many-to-many relationship between users and resources; each user can access multiple resources and multiple users can access each resource. The resources are independent and each resource needs to be encrypted by a different Resource Encryption Key (REK). Each REK needs to be distributed to all subscribers of the resource and each subscriber must get all the REKs he/s...

  4. Satcom access in the Evolved Packet Core

    NARCIS (Netherlands)

    Cano Soveri, M.D.; Norp, A.H.J.; Popova, M.P.

    2011-01-01

    Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is

  5. Satcom access in the evolved packet core

    NARCIS (Netherlands)

    Cano, M.D.; Norp, A.H.J.; Popova, M.P.

    2012-01-01

    Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is

  6. Secure, web-accessible call rosters for academic radiology departments.

    Science.gov (United States)

    Nguyen, A V; Tellis, W M; Avrin, D E

    2000-05-01

    Traditionally, radiology department call rosters have been posted via paper and bulletin boards. Frequently, changes to these lists are made by multiple people independently, but often not synchronized, resulting in confusion among the house staff and technical staff as to who is on call and when. In addition, multiple and disparate copies exist in different sections of the department, and changes made would not be propagated to all the schedules. To eliminate such difficulties, a paperless call scheduling application was developed. Our call scheduling program allowed Java-enabled web access to a database by designated personnel from each radiology section who have privileges to make the necessary changes. Once a person made a change, everyone accessing the database would see the modification. This eliminates the chaos resulting from people swapping shifts at the last minute and not having the time to record or broadcast the change. Furthermore, all changes to the database were logged. Users are given a log-in name and password and can only edit their section; however, all personnel have access to all sections' schedules. Our applet was written in Java 2 using the latest technology in database access. We access our Interbase database through the DataExpress and DB Swing (Borland, Scotts Valley, CA) components. The result is secure access to the call rosters via the web. There are many advantages to the web-enabled access, mainly the ability for people to make changes and have the changes recorded and propagated in a single virtual location and available to all who need to know.

  7. Management Challenges of Launching Multiple Payloads for Multiple Customers

    OpenAIRE

    Callen, Dave

    1999-01-01

    Orbital has provided launch services for multiple satellites as a means to provide greater economy for access to space. These include satellites from NASA, 000, commercial companies, universities, and foreign governments. While satellite customers view shared launches as a means to achieve reduced launch costs, this approach adds many complexities that a traditional launch service provider does not have to address for a dedicated launch. This paper will discuss some of the challenges associat...

  8. Oceanographic Data from Multiple Platforms from 18700722 to 19890507 (NODC Accession 9400170)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains salinity/temperature/depth (STD) profiles and other hydrographic data, mostly in the Sea of Japan. More than a century of profile data from...

  9. Transparent mediation-based access to multiple yeast data sources using an ontology driven interface.

    Science.gov (United States)

    Briache, Abdelaali; Marrakchi, Kamar; Kerzazi, Amine; Navas-Delgado, Ismael; Rossi Hassani, Badr D; Lairini, Khalid; Aldana-Montes, José F

    2012-01-25

    Saccharomyces cerevisiae is recognized as a model system representing a simple eukaryote whose genome can be easily manipulated. Information solicited by scientists on its biological entities (Proteins, Genes, RNAs...) is scattered within several data sources like SGD, Yeastract, CYGD-MIPS, BioGrid, PhosphoGrid, etc. Because of the heterogeneity of these sources, querying them separately and then manually combining the returned results is a complex and time-consuming task for biologists most of whom are not bioinformatics expert. It also reduces and limits the use that can be made on the available data. To provide transparent and simultaneous access to yeast sources, we have developed YeastMed: an XML and mediator-based system. In this paper, we present our approach in developing this system which takes advantage of SB-KOM to perform the query transformation needed and a set of Data Services to reach the integrated data sources. The system is composed of a set of modules that depend heavily on XML and Semantic Web technologies. User queries are expressed in terms of a domain ontology through a simple form-based web interface. YeastMed is the first mediation-based system specific for integrating yeast data sources. It was conceived mainly to help biologists to find simultaneously relevant data from multiple data sources. It has a biologist-friendly interface easy to use. The system is available at http://www.khaos.uma.es/yeastmed/.

  10. Multiple group membership and well-being

    DEFF Research Database (Denmark)

    Sønderlund, Anders L.; Morton, Thomas A.; Ryan, Michelle K.

    2017-01-01

    multiple group membership and well-being, but only for individuals high in SIC. This effect was mediated by perceived identity expression and access to social support. Study 2 (N = 104) also found that multiple group memberships indirectly contributed to well-being via perceived identity expression......A growing body of research points to the value of multiple group memberships for individual well-being. However, much of this work considers group memberships very broadly and in terms of number alone. We conducted two correlational studies exploring how the relationship between multiple group...... and social support, as well as identity compatibility and perceived social inclusion. But, in this study the relationship between multiple group memberships and well-being outcomes was moderated by the perceived value and visibility of group memberships to others. Specifically, possessing multiple, devalued...

  11. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. Scope of Contributions This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis Manuscript Submission To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  12. A reliable, delay bounded and less complex communication protocol for multicluster FANETs

    Directory of Open Access Journals (Sweden)

    Wajiya Zafar

    2017-02-01

    Full Text Available Recently, Flying Ad-hoc Networks (FANETs, enabling ad-hoc networking between Unmanned Aerial Vehicles (UAVs is gaining importance in several military and civilian applications. The sensitivity of the applications requires adaptive; efficient; delay bounded and scalable communication network among UAVs for data transmission. Due to communication protocol complexity; rigidity; cost of commercial-off-the-shelf (COT components; limited radio bandwidth; high mobility and computational resources; maintaining the desired level of Quality of Service (QoS becomes a daunting task. For the first time in this research we propose multicluster FANETs for efficient network management; the proposed scheme considerably reduces communication cost and optimizes network performance as well as exploit low power; less complex and low cost IEEE 802.15.4 (MAC protocol for intercluster and intracluster communication. In this research both beacon enabled mode and beaconless modes have been investigated with Guaranteed Time Slots (GTS and virtual Time Division Multiple Access (TDMA respectively. The methodology plays a key role towards reserving bandwidth for latency critical applications; eliminate collisions and medium access delays. Moreover analysis ad-hoc routing protocols including two proactive (OLSR, DSDV and one reactive (AODV is also presented. The results shows that the proposed scheme guarantees high packet delivery ratios while maintaining acceptable levels of latency requirements comparable with more complex and dedicatedly designed protocols in literature.

  13. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    Directory of Open Access Journals (Sweden)

    Gongliang Liu

    2014-01-01

    Full Text Available In order to overcome the shortcomings of existing medium access control (MAC protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  14. Does Technical Success of Angioplasty in Dysfunctional Hemodialysis Accesses Correlate with Access Patency?

    Energy Technology Data Exchange (ETDEWEB)

    Sidhu, Arshdeep; Tan, Kong T.; Noel-Lamy, Maxime; Simons, Martin E.; Rajan, Dheeraj K., E-mail: dheeraj.rajan@uhn.ca [University Health Network, University of Toronto, Division of Vascular and Interventional Radiology, Peter Munk Cardiac Center (Canada)

    2016-10-15

    PurposeTo study if <30 % residual stenosis post angioplasty (PTA) correlates with primary access circuit patency, and if any variables predict technical success.Materials and MethodsA prospective observational study was performed between January 2009 and December 2012, wherein 76 patients underwent 154 PTA events in 56 prosthetic grafts (AVG) and 98 autogenous fistulas (AVF). Data collected included patient age, gender, lesion location and laterality, access type and location, number of prior interventions, and transonic flow rates pre- and postintervention. Impact of technical outcome on access patency was assessed. Univariate logistic regression was used to assess the impact of variables on technical success with significant factors assessed with a multiple variable model.ResultsTechnical success rates of PTA in AVFs and AVGs were 79.6 and 76.7 %, respectively. Technical failures of PTA were associated with an increased risk of patency loss among circuits with AVFs (p < 0.05), but not with AVGs (p = 0.7). In AVFs, primary access patency rates between technical successes and failures at three and 6 months were 74.4 versus 61.9 % (p = 0.3) and 53.8 versus 23.8 % (p < 0.05), respectively. In AVGs, primary access patency rates between technical successes and failures at three and six months were 72.1 versus 53.9 % (p = 0.5) and 33.6 versus 38.5 % (p = 0.8), respectively. Transonic flow rates did not significantly differ among technically successful or failed outcomes at one or three months.ConclusionTechnical failures of PTA had a significant impact on access patency among AVFs with a trend toward poorer access patency within AVGs.

  15. Does Technical Success of Angioplasty in Dysfunctional Hemodialysis Accesses Correlate with Access Patency?

    International Nuclear Information System (INIS)

    Sidhu, Arshdeep; Tan, Kong T.; Noel-Lamy, Maxime; Simons, Martin E.; Rajan, Dheeraj K.

    2016-01-01

    PurposeTo study if <30 % residual stenosis post angioplasty (PTA) correlates with primary access circuit patency, and if any variables predict technical success.Materials and MethodsA prospective observational study was performed between January 2009 and December 2012, wherein 76 patients underwent 154 PTA events in 56 prosthetic grafts (AVG) and 98 autogenous fistulas (AVF). Data collected included patient age, gender, lesion location and laterality, access type and location, number of prior interventions, and transonic flow rates pre- and postintervention. Impact of technical outcome on access patency was assessed. Univariate logistic regression was used to assess the impact of variables on technical success with significant factors assessed with a multiple variable model.ResultsTechnical success rates of PTA in AVFs and AVGs were 79.6 and 76.7 %, respectively. Technical failures of PTA were associated with an increased risk of patency loss among circuits with AVFs (p < 0.05), but not with AVGs (p = 0.7). In AVFs, primary access patency rates between technical successes and failures at three and 6 months were 74.4 versus 61.9 % (p = 0.3) and 53.8 versus 23.8 % (p < 0.05), respectively. In AVGs, primary access patency rates between technical successes and failures at three and six months were 72.1 versus 53.9 % (p = 0.5) and 33.6 versus 38.5 % (p = 0.8), respectively. Transonic flow rates did not significantly differ among technically successful or failed outcomes at one or three months.ConclusionTechnical failures of PTA had a significant impact on access patency among AVFs with a trend toward poorer access patency within AVGs.

  16. A global workspace model for phenomenal and access consciousness.

    Science.gov (United States)

    Raffone, Antonino; Pantani, Martina

    2010-06-01

    Both the global workspace theory and Block's distinction between phenomenal and access consciousness, are central in the current debates about consciousness and the neural correlates of consciousness. In this article, a unifying global workspace model for phenomenal and access consciousness is proposed. In the model, recurrent neural interactions take place in distinct yet interacting access and phenomenal brain loops. The effectiveness of feedback signaling onto sensory cortical maps is emphasized for the neural correlates of phenomenal consciousness. Two forms of top-down attention, attention for perception and attention for access, play differential roles for phenomenal and access consciousness. The model is implemented in a neural network form, with the simulation of single and multiple visual object processing, and of the attentional blink. 2010 Elsevier Inc. All rights reserved.

  17. Understanding and improving access to prompt and effective malaria treatment and care in rural Tanzania: the ACCESS Programme.

    Science.gov (United States)

    Hetzel, Manuel W; Iteba, Nelly; Makemba, Ahmed; Mshana, Christopher; Lengeler, Christian; Obrist, Brigit; Schulze, Alexander; Nathan, Rose; Dillip, Angel; Alba, Sandra; Mayumana, Iddy; Khatib, Rashid A; Njau, Joseph D; Mshinda, Hassan

    2007-06-29

    Prompt access to effective treatment is central in the fight against malaria. However, a variety of interlinked factors at household and health system level influence access to timely and appropriate treatment and care. Furthermore, access may be influenced by global and national health policies. As a consequence, many malaria episodes in highly endemic countries are not treated appropriately. The ACCESS Programme aims at understanding and improving access to prompt and effective malaria treatment and care in a rural Tanzanian setting. The programme's strategy is based on a set of integrated interventions, including social marketing for improved care seeking at community level as well as strengthening of quality of care at health facilities. This is complemented by a project that aims to improve the performance of drug stores. The interventions are accompanied by a comprehensive set of monitoring and evaluation activities measuring the programme's performance and (health) impact. Baseline data demonstrated heterogeneity in the availability of malaria treatment, unavailability of medicines and treatment providers in certain areas as well as quality problems with regard to drugs and services. The ACCESS Programme is a combination of multiple complementary interventions with a strong evaluation component. With this approach, ACCESS aims to contribute to the development of a more comprehensive access framework and to inform and support public health professionals and policy-makers in the delivery of improved health services.

  18. Design and simulations of a spectral efficient optical code division multiple access scheme using alternated energy differentiation and single-user soft-decision demodulation

    Science.gov (United States)

    A. Garba, Aminata

    2017-01-01

    This paper presents a new approach to optical Code Division Multiple Access (CDMA) network transmission scheme using alternated amplitude sequences and energy differentiation at the transmitters to allow concurrent and secure transmission of several signals. The proposed system uses error control encoding and soft-decision demodulation to reduce the multi-user interference at the receivers. The design of the proposed alternated amplitude sequences, the OCDMA energy modulators and the soft decision, single-user demodulators are also presented. Simulation results show that the proposed scheme allows achieving spectral efficiencies higher than several reported results for optical CDMA and much higher than the Gaussian CDMA capacity limit.

  19. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in

  20. Iterative Fusion of Distributed Decisions over the Gaussian Multiple-Access Channel Using Concatenated BCH-LDGM Codes

    Directory of Open Access Journals (Sweden)

    Crespo PedroM

    2011-01-01

    Full Text Available This paper focuses on the data fusion scenario where nodes sense and transmit the data generated by a source to a common destination, which estimates the original information from more accurately than in the case of a single sensor. This work joins the upsurge of research interest in this topic by addressing the setup where the sensed information is transmitted over a Gaussian Multiple-Access Channel (MAC. We use Low Density Generator Matrix (LDGM codes in order to keep the correlation between the transmitted codewords, which leads to an improved received Signal-to-Noise Ratio (SNR thanks to the constructive signal addition at the receiver front-end. At reception, we propose a joint decoder and estimator that exchanges soft information between the LDGM decoders and a data fusion stage. An error-correcting Bose, Ray-Chaudhuri, Hocquenghem (BCH code is further applied suppress the error floor derived from the ambiguity of the MAC channel when dealing with correlated sources. Simulation results are presented for several values of and diverse LDGM and BCH codes, based on which we conclude that the proposed scheme outperforms significantly (by up to 6.3 dB the suboptimum limit assuming separation between Slepian-Wolf source coding and capacity-achieving channel coding.

  1. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  2. DEPTH - OBSERVATION and Other Data from MULTIPLE SHIPS (NODC Accession 9700185)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — STD and other data were collected from the Mediterranean Sea and other locations from multiple ships. Data include profiles of temperature, salinity, and oxygen...

  3. On the scalability of uncoordinated multiple access for the Internet of Things

    KAUST Repository

    Chisci, Giovanni

    2017-11-16

    The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However, LPWA networks rely on variations of uncoordinated spectrum access, either for data transmissions or scheduling requests, thus imposing a scalability problem to the IoT. This paper presents a novel spatiotemporal model to study the scalability of the ALOHA medium access. In particular, the developed mathematical model relies on stochastic geometry and queueing theory to account for spatial and temporal attributes of the IoT. To this end, the scalability of the ALOHA is characterized by the percentile of IoT devices that can be served while keeping their queues stable. The results highlight the scalability problem of ALOHA and quantify the extend to which ALOHA can support in terms of number of devices, traffic requirement, and transmission rate.

  4. Assessing communication accessibility in the university classroom: towards a goal of universal hearing accessibility.

    Science.gov (United States)

    Cheesman, Margaret F; Jennings, Mary Beth; Klinger, Lisa

    2013-01-01

    Measures of accessibility typically focus on the physical environment and aspects relating to getting into and out of spaces. The transient sound environment is less well characterized in typical accessibility measures. Hearing accessibility measures can be based upon physical indices or functional assessment. The physical measures are indices that use signal-to-noise ratios to evaluate audibility while the functional assessment tool adopts universal design for hearing (UDH) principles derived from principles of universal design. The UDH principles include (1) Optimization of the hearing environment for all; (2) Optimization of interactions between persons and objects to promote better hearing in an environment; (3) Optimization of opportunities for people to have multiple choices of interactions with one another; (4) Optimization of opportunities for people to perform different activities in and across environments; (5) Optimization of opportunities for people to have safe, private, and secure use of the environment while minimizing distraction, interference, or cognitive loading; and (6) Optimization of opportunities for people to use the environment without extra steps for hearing access during preparatory, use and/or after use phases. This paper compares the two approaches using case examples from post-secondary classrooms in order to describe the potential advantages and limitations of each.

  5. On the golden road : Open access publishing in particle physics

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    The particle physics community has over the last 15 years achieved so-called full green open access through the wide dissemination ofpreprints via arXiv, a central subject repository managed by Cornell University. However, green open access does not alleviate the economical difficulties of libraries as these still are expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold open access by converting a set of the existing core journals to open access. A working party works now to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open access Publishing in Particle Physics). This consortium will engage with publishers towards building a sustainable model for open access publishing. In this model, subscription fees from multiple institutions are replaced with contracts with publishers of open access journals where the SCOAP3 consort...

  6. On the golden road Open access publishing in particle physics

    CERN Document Server

    CERN. Geneva; Yeomans, Joanne

    2007-01-01

    The particle physics community has over the last 15 years achieved so-called full green open access through the wide dissemination ofpreprints via arXiv, a central subject repository managed by Cornell University. However, green open access does not alleviate the economical difficulties of libraries as these still are expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold open access by converting a set of the existing core journals to open access. A working party works now to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open access Publishing in Particle Physics). This consortium will engage with publishers towards building a sustainable model for open access publishing. In this model, subscription fees from multiple institutions are replaced with contracts with publishers of open access journals where the SCOAP3 consorti...

  7. Quasi-ADS-B Based UAV Conflict Detection and Resolution to Manned Aircraft

    Directory of Open Access Journals (Sweden)

    Chin E. Lin

    2015-01-01

    Full Text Available A Conflict Detection and Resolution (CD&R system for manned/unmanned aerial vehicle (UAV based on Automatic Dependent Surveillance-Broadcast (ADS-B concept is designed and verified in this paper. The 900 MHz XBee-Pro is selected as data transponder to broadcast flight information among participating aircraft in omnirange. Standard Compact Position Report (CPR format packet data are automatically broadcasted by ID sequencing under Quasi-ADS-B mechanism. Time Division Multiple Access (TDMA monitoring checks the designated time slot and reallocates the conflict ID. This mechanism allows the transponder to effectively share data with multiple aircraft in near airspace. The STM32f103 microprocessor is designed to handle RF, GPS, and flight data with Windows application on manned aircraft and ground control station simultaneously. Different conflict detection and collision avoidance algorithms can be implemented into the system to ensure flight safety. The proposed UAV/CD&R using Quasi-ADS-B transceiver is tested using ultralight aircraft flying at 100–120 km/hr speed in small airspace for mission simulation. The proposed hardware is also useful to additional applications to mountain hikers for emergency search and rescue. The fundamental function by the proposed UAV/CD&R using Quasi-ADS-B is verified with effective signal broadcasting for surveillance and efficient collision alert and avoidance performance to low altitude flights.

  8. PENERAPAN MULTIPLE INTELEGENSI DALAM KEGIATAN BELAJAR-MENGAJAR

    Directory of Open Access Journals (Sweden)

    Nur Samsiyah

    2016-11-01

    Full Text Available Multiple intelegence is integrated inteligence possessed by anyone. Intelligence has been difined as the composition of ability and skill. Multiple intelligence consists of nine types of intelligence, i.e. linguistic, logic-mathematic, spatial, musical, kinesthetic, interpersonal, intrapersonal, naturalistic and extencial intelligence, each of which has its own characteristics. Multiple intelligence learning strategy empowers students to access information through intelligence that they do have respectively. To activate the students’ multiple intelligence, teachers can train the students to listening, reading, writing and balanced-intelligence. This strategy can be adopted by teachers with ubique focus for each student with his/ her most outstanding intelligence.

  9. UNIVERSAL INTERFACE TO MULTIPLE OPERATIONS SYSTEMS

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    1986-01-01

    Alternative ways to provide access to operations systems that maintain, test, and configure complex telephone networks are being explored. It is suggested that a universal interface that provides simultaneous access to multiple operations systems that execute in different hardware and software...... environments, can be provided by an architecture that is based on the separation of presentation issues from application issues and on a modular interface management system that consists of a virtual user interface, physical user interface, and interface agent. The interface functionality that is needed...

  10. Understanding and improving access to prompt and effective malaria treatment and care in rural Tanzania: the ACCESS Programme

    Directory of Open Access Journals (Sweden)

    Alba Sandra

    2007-06-01

    Full Text Available Abstract Background Prompt access to effective treatment is central in the fight against malaria. However, a variety of interlinked factors at household and health system level influence access to timely and appropriate treatment and care. Furthermore, access may be influenced by global and national health policies. As a consequence, many malaria episodes in highly endemic countries are not treated appropriately. Project The ACCESS Programme aims at understanding and improving access to prompt and effective malaria treatment and care in a rural Tanzanian setting. The programme's strategy is based on a set of integrated interventions, including social marketing for improved care seeking at community level as well as strengthening of quality of care at health facilities. This is complemented by a project that aims to improve the performance of drug stores. The interventions are accompanied by a comprehensive set of monitoring and evaluation activities measuring the programme's performance and (health impact. Baseline data demonstrated heterogeneity in the availability of malaria treatment, unavailability of medicines and treatment providers in certain areas as well as quality problems with regard to drugs and services. Conclusion The ACCESS Programme is a combination of multiple complementary interventions with a strong evaluation component. With this approach, ACCESS aims to contribute to the development of a more comprehensive access framework and to inform and support public health professionals and policy-makers in the delivery of improved health services.

  11. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  12. Efficient accesses of data structures using processing near memory

    Science.gov (United States)

    Jayasena, Nuwan S.; Zhang, Dong Ping; Diez, Paula Aguilera

    2018-05-22

    Systems, apparatuses, and methods for implementing efficient queues and other data structures. A queue may be shared among multiple processors and/or threads without using explicit software atomic instructions to coordinate access to the queue. System software may allocate an atomic queue and corresponding queue metadata in system memory and return, to the requesting thread, a handle referencing the queue metadata. Any number of threads may utilize the handle for accessing the atomic queue. The logic for ensuring the atomicity of accesses to the atomic queue may reside in a management unit in the memory controller coupled to the memory where the atomic queue is allocated.

  13. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    Science.gov (United States)

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  14. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  15. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.

  16. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  17. A novel radio-tolerant astaxanthin-producing bacterium reveals a new astaxanthin derivative: astaxanthin dirhamnoside.

    Science.gov (United States)

    Asker, Dalal; Awad, Tarek S; Beppu, Teruhiko; Ueda, Kenji

    2012-01-01

    Astaxanthin is a red ketocarotenoid that exhibits extraordinary health-promoting activities such as antioxidant, anti-inflammatory, antitumor, and immune booster. The recent discovery of the beneficial roles of astaxanthin against many degenerative diseases such as cancers, heart diseases, and exercise-induced fatigue has raised its market demand as a nutraceutical and medicinal ingredient in aquaculture, food, and pharmaceutical industries. To satisfy the growing demand for this high-value nutraceuticals ingredient and consumer interest in natural products, many research efforts are being made to discover novel microbial producers with effective biotechnological production of astaxanthin. Using a rapid screening method based on 16S rRNA gene, and effective HPLC-Diodearray-MS methods for carotenoids analysis, we succeeded to isolate a unique astaxanthin-producing bacterium (strain TDMA-17(T)) that belongs to the family Sphingomonadaceae (Asker et al., Appl Microbiol Biotechnol 77: 383-392, 2007). In this chapter, we provide a detailed description of effective HPLC-Diodearray-MS methods for rapid analysis and identification of the carotenoids produced by strain TDMA-17(T). We also describe the methods of isolation and identification for a novel bacterial carotenoid (astaxanthin derivative), a major carotenoid that is produced by strain TDMA-17(T). Finally, we describe the polyphasic taxonomic analysis of strain TDMA-17(T) and the description of a novel species belonging to genus Sphingomonas.

  18. Vascular access in critical limb ischemia.

    Science.gov (United States)

    Kang, Won Yu; Campia, Umberto; Ota, Hideaki; Didier, Romain J; Negi, Smita I; Kiramijyan, Sarkis; Koifman, Edward; Baker, Nevin C; Magalhaes, Marco A; Lipinski, Michael J; Escarcega, Ricardo O; Torguson, Rebecca; Waksman, Ron; Bernardo, Nelson L

    2016-01-01

    Currently, percutaneous endovascular intervention is considered a first line of therapy for treating patients with critical limb ischemia. As the result of remarkable development of techniques and technologies, percutaneous endovascular intervention has led to rates of limb salvage comparable to those achieved with bypass surgery, with fewer complications, even in the presence of lower rates of long-term patency. Currently, interventionalists have a multiplicity of access routes including smaller arteries, with both antegrade and retrograde approaches. Therefore, the choice of the optimal access site has become an integral part of the success of the percutaneous intervention. By understanding the technical aspects, as well as the advantages and limitations of each approach, the interventionalists can improve clinical outcomes in patients with severe peripheral arterial disease. This article reviews the access routes in critical limb ischemia, their advantages and disadvantages, and the clinical outcomes of each. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. OFDM Towards Fixed and Mobile Broadband Wireless Access

    DEFF Research Database (Denmark)

    Shanker Jha, Uma; Prasad, Ramjee

    ) and orthogonal frequency division multiple access (OFDMA) schemes. Essential features of IEEE 802.16d (fixed) and 802.16e (mobile) and the role of the WiMAX Forum in defining interoperability and certification criteria. Important requirements, trade-offs, and other critical design considerations. Key issues...

  20. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger

  1. Analysis of the Decoupled Access for Downlink and Uplink in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Smiljkovikj, K.; Popovski, Petar; Gavrilovska, L.

    2015-01-01

    Wireless cellular networks evolve towards a heterogeneous infrastructure, featuring multiple types of Base Stations (BSs), such as Femto BSs (FBSs) and Macro BSs (MBSs). A wireless device observes multiple points (BSs) through which it can access the infrastructure and it may choose to receive th...

  2. Heuristic query optimization for query multiple table and multiple clausa on mobile finance application

    Science.gov (United States)

    Indrayana, I. N. E.; P, N. M. Wirasyanti D.; Sudiartha, I. KG

    2018-01-01

    Mobile application allow many users to access data from the application without being limited to space, space and time. Over time the data population of this application will increase. Data access time will cause problems if the data record has reached tens of thousands to millions of records.The objective of this research is to maintain the performance of data execution for large data records. One effort to maintain data access time performance is to apply query optimization method. The optimization used in this research is query heuristic optimization method. The built application is a mobile-based financial application using MySQL database with stored procedure therein. This application is used by more than one business entity in one database, thus enabling rapid data growth. In this stored procedure there is an optimized query using heuristic method. Query optimization is performed on a “Select” query that involves more than one table with multiple clausa. Evaluation is done by calculating the average access time using optimized and unoptimized queries. Access time calculation is also performed on the increase of population data in the database. The evaluation results shown the time of data execution with query heuristic optimization relatively faster than data execution time without using query optimization.

  3. Representations of Multiple-Valued Logic Functions

    CERN Document Server

    Stankovic, Radomir S

    2012-01-01

    Compared to binary switching functions, multiple-valued functions offer more compact representations of the information content of signals modeled by logic functions and, therefore, their use fits very well in the general settings of data compression attempts and approaches. The first task in dealing with such signals is to provide mathematical methods for their representation in a way that will make their application in practice feasible.Representation of Multiple-Valued Logic Functions is aimed at providing an accessible introduction to these mathematical techniques that are necessary for ap

  4. Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution.

    Science.gov (United States)

    Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian

    2013-01-28

    We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile.

  5. BATHYTHERMOGRAPH (XBT) from multiple German platforms: 19730101 to 19831231 (NODC Accession 8400184)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Ocean Station Data and Bathythermograph (XBT) data were collected from Helgoland Biological Stations using multiple German ships (ANTON DOHRN, GAUSS, FRIEDRICH...

  6. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  7. Routes to DNA accessibility: alternative pathways for nucleosome unwinding.

    Science.gov (United States)

    Schlingman, Daniel J; Mack, Andrew H; Kamenetska, Masha; Mochrie, Simon G J; Regan, Lynne

    2014-07-15

    The dynamic packaging of DNA into chromatin is a key determinant of eukaryotic gene regulation and epigenetic inheritance. Nucleosomes are the basic unit of chromatin, and therefore the accessible states of the nucleosome must be the starting point for mechanistic models regarding these essential processes. Although the existence of different unwound nucleosome states has been hypothesized, there have been few studies of these states. The consequences of multiple states are far reaching. These states will behave differently in all aspects, including their interactions with chromatin remodelers, histone variant exchange, and kinetic properties. Here, we demonstrate the existence of two distinct states of the unwound nucleosome, which are accessible at physiological forces and ionic strengths. Using optical tweezers, we measure the rates of unwinding and rewinding for these two states and show that the rewinding rates from each state are different. In addition, we show that the probability of unwinding into each state is dependent on the applied force and ionic strength. Our results demonstrate not only that multiple unwound states exist but that their accessibility can be differentially perturbed, suggesting possible roles for these states in gene regulation. For example, different histone variants or modifications may facilitate or suppress access to DNA by promoting unwinding into one state or the other. We anticipate that the two unwound states reported here will be the basis for future models of eukaryotic transcriptional control. Copyright © 2014 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  8. Collectively loading programs in a multiple program multiple data environment

    Science.gov (United States)

    Aho, Michael E.; Attinella, John E.; Gooding, Thomas M.; Gooding, Thomas M.; Miller, Samuel J.

    2016-11-08

    Techniques are disclosed for loading programs efficiently in a parallel computing system. In one embodiment, nodes of the parallel computing system receive a load description file which indicates, for each program of a multiple program multiple data (MPMD) job, nodes which are to load the program. The nodes determine, using collective operations, a total number of programs to load and a number of programs to load in parallel. The nodes further generate a class route for each program to be loaded in parallel, where the class route generated for a particular program includes only those nodes on which the program needs to be loaded. For each class route, a node is selected using a collective operation to be a load leader which accesses a file system to load the program associated with a class route and broadcasts the program via the class route to other nodes which require the program.

  9. Optimizing multiple-choice tests as tools for learning.

    Science.gov (United States)

    Little, Jeri L; Bjork, Elizabeth Ligon

    2015-01-01

    Answering multiple-choice questions with competitive alternatives can enhance performance on a later test, not only on questions about the information previously tested, but also on questions about related information not previously tested-in particular, on questions about information pertaining to the previously incorrect alternatives. In the present research, we assessed a possible explanation for this pattern: When multiple-choice questions contain competitive incorrect alternatives, test-takers are led to retrieve previously studied information pertaining to all of the alternatives in order to discriminate among them and select an answer, with such processing strengthening later access to information associated with both the correct and incorrect alternatives. Supporting this hypothesis, we found enhanced performance on a later cued-recall test for previously nontested questions when their answers had previously appeared as competitive incorrect alternatives in the initial multiple-choice test, but not when they had previously appeared as noncompetitive alternatives. Importantly, however, competitive alternatives were not more likely than noncompetitive alternatives to be intruded as incorrect responses, indicating that a general increased accessibility for previously presented incorrect alternatives could not be the explanation for these results. The present findings, replicated across two experiments (one in which corrective feedback was provided during the initial multiple-choice testing, and one in which it was not), thus strongly suggest that competitive multiple-choice questions can trigger beneficial retrieval processes for both tested and related information, and the results have implications for the effective use of multiple-choice tests as tools for learning.

  10. System Design and Cataloging Meet the User: User Interfaces to Online Public Access Catalogs.

    Science.gov (United States)

    Yee, Martha M.

    1991-01-01

    Discusses features of online public access catalogs: (1) demonstration of relationships between records; (2) provision of entry vocabularies; (3) arrangement of multiple entries on the screen; (4) provision of access points; (5) display of single records; and (6) division of catalogs into separate files or indexes. User studies and other research…

  11. FTTH: the overview of existing technologies

    Science.gov (United States)

    Nowak, Dawid; Murphy, John

    2005-06-01

    The growing popularity of the Internet is the key driver behind the development of new access methods which would enable a customer to experience a true broadband. Amongst various technologies, the access methods based on the optical fiber are getting more and more attention as they offer the ultimate solution in delivering different services to the customers' premises. Three different architectures have been proposed that facilitate the roll out of Fiber-to-the-Home (FTTH) infrastructure. Point-to-point Ethernet networks are the most straightforward and already matured solution. Different flavors of Passive Optical Networks (PONs) with Time Division Multiplexing Access (TDMA) are getting more widespread as necessary equipment is becoming available on the market. The third main contender are PONs withWavelength DivisionMultiplexing Access (WDMA). Although still in their infancy, the laboratory tests show that they have many advantages over present solutions. In this paper we show a brief comparison of these three access methods. In our analysis the architecture of each solution is presented. The applicability of each system is looked at from different viewpoint and their advantages and disadvantages are highlighted.

  12. AIDA: Accelerator Integrated Data Access

    International Nuclear Information System (INIS)

    MacKenzie, Ronald R.

    2002-01-01

    All Control Systems that grow to any size have a variety of data that are stored in different formats on different nodes in the network. Examples include sensor value and status, archived sensor data, device oriented support data and relationships, message logs, application and machine configurations etc. Each type of data typically has a different programming interface. Higher-level applications need to access a logically related set of data that is in different data stores and may require different processing. AIDA is envisioned to be a distributed service that allows applications access to this wide variety of Control System data in a consistent way that is language and machine independent. It has the additional goal of providing an object-oriented layer for constructing applications on top of multiple existing conventional systems like EPICS or the SLC Control System. Motivation, design overview and current status will be presented

  13. [Improving global access to new vaccines: intellectual property, technology transfer, and regulatory pathways].

    Science.gov (United States)

    Crager, Sara Eve

    2015-01-01

    The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers.

  14. Improving global access to new vaccines: intellectual property, technology transfer, and regulatory pathways.

    Science.gov (United States)

    Crager, Sara Eve

    2014-11-01

    The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers.

  15. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  16. On-board processing for telecommunications satellites

    Science.gov (United States)

    Nuspl, P. P.; Dong, G.

    1991-01-01

    In this decade, communications satellite systems will probably face dramatic challenges from alternative transmission means. To balance and overcome such competition, and to prepare for new requirements, INTELSAT has developed several on-board processing techniques, including Satellite-Switched TDMA (SS-TDMA), Satellite-Switched FDMA (SS-FDMA), several Modulators/Demodulators (Modem), a Multicarrier Multiplexer and Demodulator MCDD), an International Business Service (IBS)/Intermediate Data Rate (IDR) BaseBand Processor (BBP), etc. Some proof-of-concept hardware and software were developed, and tested recently in the INTELSAT Technical Laboratories. These techniques and some test results are discussed.

  17. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Energy Technology Data Exchange (ETDEWEB)

    Ohmacht, Martin

    2017-08-15

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  18. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Science.gov (United States)

    Ohmacht, Martin

    2014-09-09

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  19. Multiple time scale dynamics

    CERN Document Server

    Kuehn, Christian

    2015-01-01

    This book provides an introduction to dynamical systems with multiple time scales. The approach it takes is to provide an overview of key areas, particularly topics that are less available in the introductory form.  The broad range of topics included makes it accessible for students and researchers new to the field to gain a quick and thorough overview. The first of its kind, this book merges a wide variety of different mathematical techniques into a more unified framework. The book is highly illustrated with many examples and exercises and an extensive bibliography. The target audience of this  book are senior undergraduates, graduate students as well as researchers interested in using the multiple time scale dynamics theory in nonlinear science, either from a theoretical or a mathematical modeling perspective. 

  20. Information system architecture to support transparent access to distributed, heterogeneous data sources

    International Nuclear Information System (INIS)

    Brown, J.C.

    1994-08-01

    Quality situation assessment and decision making require access to multiple sources of data and information. Insufficient accessibility to data exists for many large corporations and Government agencies. By utilizing current advances in computer technology, today's situation analyst's have a wealth of information at their disposal. There are many potential solutions to the information accessibility problem using today's technology. The United States Department of Energy (US-DOE) faced this problem when dealing with one class of problem in the US. The result of their efforts has been the creation of the Tank Waste Information Network System -- TWINS. The TWINS solution combines many technologies to address problems in several areas such as User Interfaces, Transparent Access to Multiple Data Sources, and Integrated Data Access. Data related to the complex is currently distributed throughout several US-DOE installations. Over time, each installation has adopted their own set of standards as related to information management. Heterogeneous hardware and software platforms exist both across the complex and within a single installation. Standards for information management vary between US-DOE mission areas within installations. These factors contribute to the complexity of accessing information in a manner that enhances the performance and decision making process of the analysts. This paper presents one approach taken by the DOE to resolve the problem of distributed, heterogeneous, multi-media information management for the HLW Tank complex. The information system architecture developed for the DOE by the TWINS effort is one that is adaptable to other problem domains and uses

  1. The services and operational characteristics of the Eutelsat system

    Science.gov (United States)

    Galante, F. M.

    The Eutelsat satellite multiservice system (SMS) based on the French Telecom 1 and the European ECS satellites is characterized. Circuit-switched, reserved, full-time-leased, and part-time-leased services will be offered to business customers in point-to-point or point-to-multipoint configurations and in one-way or two-way modes for such purposes as video or audio conferencing, computer-to-computer data transfer, remote printing, packet-switched data transfer, fast facsimile, slow-scan TV, and electronic mail. Maps of the coverage zones and a block diagram of the monitoring and control network are provided, and consideration is given to the ground-station requirements and the access schemes (SCPC/FDMA for ECS; TDMA for Telecom 1).

  2. Random access with adaptive packet aggregation in LTE/LTE-A.

    Science.gov (United States)

    Zhou, Kaijie; Nikaein, Navid

    While random access presents a promising solution for efficient uplink channel access, the preamble collision rate can significantly increase when massive number of devices simultaneously access the channel. To address this issue and improve the reliability of the random access, an adaptive packet aggregation method is proposed. With the proposed method, a device does not trigger a random access for every single packet. Instead, it starts a random access when the number of aggregated packets reaches a given threshold. This method reduces the packet collision rate at the expense of an extra latency, which is used to accumulate multiple packets into a single transmission unit. Therefore, the tradeoff between packet loss rate and channel access latency has to be carefully selected. We use semi-Markov model to derive the packet loss rate and channel access latency as functions of packet aggregation number. Hence, the optimal amount of aggregated packets can be found, which keeps the loss rate below the desired value while minimizing the access latency. We also apply for the idea of packet aggregation for power saving, where a device aggregates as many packets as possible until the latency constraint is reached. Simulations are carried out to evaluate our methods. We find that the packet loss rate and/or power consumption are significantly reduced with the proposed method.

  3. The Multiple Pendulum Problem via Maple[R

    Science.gov (United States)

    Salisbury, K. L.; Knight, D. G.

    2002-01-01

    The way in which computer algebra systems, such as Maple, have made the study of physical problems of some considerable complexity accessible to mathematicians and scientists with modest computational skills is illustrated by solving the multiple pendulum problem. A solution is obtained for four pendulums with no restriction on the size of the…

  4. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  5. Endovascular interventions for multiple trauma

    International Nuclear Information System (INIS)

    Kinstner, C.; Funovics, M.

    2014-01-01

    In recent years interventional radiology has significantly changed the management of injured patients with multiple trauma. Currently nearly all vessels can be reached within a reasonably short time with the help of specially preshaped catheters and guide wires to achieve bleeding control of arterial und venous bleeding. Whereas bleeding control formerly required extensive open surgery, current interventional methods allow temporary vessel occlusion (occlusion balloons), permanent embolization and stenting. In injured patients with multiple trauma preinterventional procedural planning is performed with the help of multidetector computed tomography whenever possible. Interventional radiology not only allows minimization of therapeutic trauma but also a considerably shorter treatment time. Interventional bleeding control has developed into a standard method in the management of vascular trauma of the chest and abdomen as well as in vascular injuries of the upper and lower extremities when open surgical access is associated with increased risk. Additionally, pelvic trauma, vascular trauma of the superior thoracic aperture and parenchymal arterial lacerations of organs that can be at least partially preserved are primarily managed by interventional methods. In an interdisciplinary setting interventional radiology provides a safe and efficient means of rapid bleeding control in nearly all vascular territories in addition to open surgical access. (orig.) [de

  6. The academic, economic and societal impacts of Open Access: an evidence-based review.

    Science.gov (United States)

    Tennant, Jonathan P; Waldner, François; Jacques, Damien C; Masuzzo, Paola; Collister, Lauren B; Hartgerink, Chris H J

    2016-01-01

    Ongoing debates surrounding Open Access to the scholarly literature are multifaceted and complicated by disparate and often polarised viewpoints from engaged stakeholders. At the current stage, Open Access has become such a global issue that it is critical for all involved in scholarly publishing, including policymakers, publishers, research funders, governments, learned societies, librarians, and academic communities, to be well-informed on the history, benefits, and pitfalls of Open Access. In spite of this, there is a general lack of consensus regarding the potential pros and cons of Open Access at multiple levels. This review aims to be a resource for current knowledge on the impacts of Open Access by synthesizing important research in three major areas: academic, economic and societal. While there is clearly much scope for additional research, several key trends are identified, including a broad citation advantage for researchers who publish openly, as well as additional benefits to the non-academic dissemination of their work. The economic impact of Open Access is less well-understood, although it is clear that access to the research literature is key for innovative enterprises, and a range of governmental and non-governmental services. Furthermore, Open Access has the potential to save both publishers and research funders considerable amounts of financial resources, and can provide some economic benefits to traditionally subscription-based journals. The societal impact of Open Access is strong, in particular for advancing citizen science initiatives, and leveling the playing field for researchers in developing countries. Open Access supersedes all potential alternative modes of access to the scholarly literature through enabling unrestricted re-use, and long-term stability independent of financial constraints of traditional publishers that impede knowledge sharing. However, Open Access has the potential to become unsustainable for research communities if

  7. The academic, economic and societal impacts of Open Access: an evidence-based review

    Science.gov (United States)

    Tennant, Jonathan P.; Waldner, François; Jacques, Damien C.; Masuzzo, Paola; Collister, Lauren B.; Hartgerink, Chris. H. J.

    2016-01-01

    Ongoing debates surrounding Open Access to the scholarly literature are multifaceted and complicated by disparate and often polarised viewpoints from engaged stakeholders. At the current stage, Open Access has become such a global issue that it is critical for all involved in scholarly publishing, including policymakers, publishers, research funders, governments, learned societies, librarians, and academic communities, to be well-informed on the history, benefits, and pitfalls of Open Access. In spite of this, there is a general lack of consensus regarding the potential pros and cons of Open Access at multiple levels. This review aims to be a resource for current knowledge on the impacts of Open Access by synthesizing important research in three major areas: academic, economic and societal. While there is clearly much scope for additional research, several key trends are identified, including a broad citation advantage for researchers who publish openly, as well as additional benefits to the non-academic dissemination of their work. The economic impact of Open Access is less well-understood, although it is clear that access to the research literature is key for innovative enterprises, and a range of governmental and non-governmental services. Furthermore, Open Access has the potential to save both publishers and research funders considerable amounts of financial resources, and can provide some economic benefits to traditionally subscription-based journals. The societal impact of Open Access is strong, in particular for advancing citizen science initiatives, and leveling the playing field for researchers in developing countries. Open Access supersedes all potential alternative modes of access to the scholarly literature through enabling unrestricted re-use, and long-term stability independent of financial constraints of traditional publishers that impede knowledge sharing. However, Open Access has the potential to become unsustainable for research communities if

  8. Providing Access and Visualization to Global Cloud Properties from GEO Satellites

    Science.gov (United States)

    Chee, T.; Nguyen, L.; Minnis, P.; Spangenberg, D.; Palikonda, R.; Ayers, J. K.

    2015-12-01

    Providing public access to cloud macro and microphysical properties is a key concern for the NASA Langley Research Center Cloud and Radiation Group. This work describes a tool and method that allows end users to easily browse and access cloud information that is otherwise difficult to acquire and manipulate. The core of the tool is an application-programming interface that is made available to the public. One goal of the tool is to provide a demonstration to end users so that they can use the dynamically generated imagery as an input into their own work flows for both image generation and cloud product requisition. This project builds upon NASA Langley Cloud and Radiation Group's experience with making real-time and historical satellite cloud product imagery accessible and easily searchable. As we see the increasing use of virtual supply chains that provide additional value at each link there is value in making satellite derived cloud product information available through a simple access method as well as allowing users to browse and view that imagery as they need rather than in a manner most convenient for the data provider. Using the Open Geospatial Consortium's Web Processing Service as our access method, we describe a system that uses a hybrid local and cloud based parallel processing system that can return both satellite imagery and cloud product imagery as well as the binary data used to generate them in multiple formats. The images and cloud products are sourced from multiple satellites and also "merged" datasets created by temporally and spatially matching satellite sensors. Finally, the tool and API allow users to access information that spans the time ranges that our group has information available. In the case of satellite imagery, the temporal range can span the entire lifetime of the sensor.

  9. WCDMA Uplink Interference Assessment from Multiple High Altitude Platform Configurations

    Directory of Open Access Journals (Sweden)

    Grace D

    2008-01-01

    Full Text Available Abstract We investigate the possibility of multiple high altitude platform (HAP coverage of a common cell area using a wideband code division multiple access (WCDMA system. In particular, we study the uplink system performance of the system. The results show that depending on the traffic demand and the type of service used, there is a possibility of deploying 3–6 HAPs covering the same cell area. The results also show the effect of cell radius on performance and the position of the multiple HAP base stations which give the worst performance.

  10. OR.NET RT: how service-oriented medical device architecture meets real-time communication.

    Science.gov (United States)

    Pfeiffer, Jonas H; Kasparick, Martin; Strathen, Benjamin; Dietz, Christian; Dingler, Max E; Lueth, Tim C; Timmermann, Dirk; Radermacher, Klaus; Golatowski, Frank

    2018-02-23

    Today's landscape of medical devices is dominated by stand-alone systems and proprietary interfaces lacking cross-vendor interoperability. This complicates or even impedes the innovation of novel, intelligent assistance systems relying on the collaboration of medical devices. Emerging approaches use the service-oriented architecture (SOA) paradigm based on Internet protocol (IP) to enable communication between medical devices. While this works well for scenarios with no or only soft timing constraints, the underlying best-effort communication scheme is insufficient for time critical data. Real-time (RT) networks are able to reliably guarantee fixed latency boundaries, for example, by using time division multiple access (TDMA) communication patterns. However, deterministic RT networks come with their own limitations such as tedious, inflexible configuration and a more restricted bandwidth allocation. In this contribution we overcome the drawbacks of both approaches by describing and implementing mechanisms that allow the two networks to interact. We introduce the first implementation of a medical device network that offers hard RT guarantees for control and sensor data and integrates into SOA networks. Based on two application examples we show how the flexibility of SOA networks and the reliability of RT networks can be combined to achieve an open network infrastructure for medical devices in the operating room (OR).

  11. Mesh Network Architecture for Enabling Inter-Spacecraft Communication

    Science.gov (United States)

    Becker, Christopher; Merrill, Garrick

    2017-01-01

    To enable communication between spacecraft operating in a formation or small constellation, a mesh network architecture was developed and tested using a time division multiple access (TDMA) communication scheme. The network is designed to allow for the exchange of telemetry and other data between spacecraft to enable collaboration between small spacecraft. The system uses a peer-to-peer topology with no central router, so that it does not have a single point of failure. The mesh network is dynamically configurable to allow for addition and subtraction of new spacecraft into the communication network. Flight testing was performed using an unmanned aerial system (UAS) formation acting as a spacecraft analogue and providing a stressing environment to prove mesh network performance. The mesh network was primarily devised to provide low latency, high frequency communication but is flexible and can also be configured to provide higher bandwidth for applications desiring high data throughput. The network includes a relay functionality that extends the maximum range between spacecraft in the network by relaying data from node to node. The mesh network control is implemented completely in software making it hardware agnostic, thereby allowing it to function with a wide variety of existing radios and computing platforms..

  12. Temperature estimation of induction machines based on wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Y. Huang

    2018-04-01

    Full Text Available In this paper, a fourth-order Kalman filter (KF algorithm is implemented in the wireless sensor node to estimate the temperatures of the stator winding, the rotor cage and the stator core in the induction machine. Three separate wireless sensor nodes are used as the data acquisition systems for different input signals. Six Hall sensors are used to acquire the three-phase stator currents and voltages of the induction machine. All of them are processed to root mean square (rms in ampere and volt. A rotary encoder is mounted for the rotor speed and Pt-1000 is used for the temperature of the coolant air. The processed signals in the physical unit are transmitted wirelessly to the host wireless sensor node, where the KF is implemented with fixed-point arithmetic in Contiki OS. Time-division multiple access (TDMA is used to make the wireless transmission more stable. Compared to the floating-point implementation, the fixed-point implementation has the same estimation accuracy at only about one-fifth of the computation time. The temperature estimation system can work under any work condition as long as there are currents through the machine. It can also be rebooted for estimation even when wireless transmission has collapsed or packages are missing.

  13. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  14. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  15. Hyperdatabase: A schema for browsing multiple databases

    Energy Technology Data Exchange (ETDEWEB)

    Shepherd, M A [Dalhousie Univ., Halifax (Canada). Computer Science Div.; Watters, C R [Waterloo Univ., Waterloo (Canada). Computer Science Dept.

    1990-05-01

    In order to insure effective information retrieval, a user may need to search multiple databases on multiple systems. Although front end systems have been developed to assist the user in accessing different systems, they access one retrieval system at a time and the search has to be repeated for each required database on each retrieval system. More importantly, the user interacts with the results as independent sessions. This paper models multiple bibliographic databases distributed over one or more retrieval systems as a hyperdatabase, i.e., a single virtual database. The hyperdatabase is viewed as a hypergraph in which each node represents a bibliographic item and the links among nodes represent relations among the items. In the response to a query, bibliographic items are extracted from the hyperdatabase and linked together to form a transient hypergraph. This hypergraph is transient in the sense that it is ``created`` in response to a query and only ``exists`` for the duration of the query session. A hypertext interface permits the user to browse the transient hypergraph in a nonlinear manner. The technology to implement a system based on this model is available now, consisting of powerful workstation, distributed processing, high-speed communications, and CD-ROMs. As the technology advances and costs decrease such systems should be generally available. (author). 13 refs, 5 figs.

  16. Hyperdatabase: A schema for browsing multiple databases

    International Nuclear Information System (INIS)

    Shepherd, M.A.; Watters, C.R.

    1990-05-01

    In order to insure effective information retrieval, a user may need to search multiple databases on multiple systems. Although front end systems have been developed to assist the user in accessing different systems, they access one retrieval system at a time and the search has to be repeated for each required database on each retrieval system. More importantly, the user interacts with the results as independent sessions. This paper models multiple bibliographic databases distributed over one or more retrieval systems as a hyperdatabase, i.e., a single virtual database. The hyperdatabase is viewed as a hypergraph in which each node represents a bibliographic item and the links among nodes represent relations among the items. In the response to a query, bibliographic items are extracted from the hyperdatabase and linked together to form a transient hypergraph. This hypergraph is transient in the sense that it is ''created'' in response to a query and only ''exists'' for the duration of the query session. A hypertext interface permits the user to browse the transient hypergraph in a nonlinear manner. The technology to implement a system based on this model is available now, consisting of powerful workstation, distributed processing, high-speed communications, and CD-ROMs. As the technology advances and costs decrease such systems should be generally available. (author). 13 refs, 5 figs

  17. Multiple regression and beyond an introduction to multiple regression and structural equation modeling

    CERN Document Server

    Keith, Timothy Z

    2014-01-01

    Multiple Regression and Beyond offers a conceptually oriented introduction to multiple regression (MR) analysis and structural equation modeling (SEM), along with analyses that flow naturally from those methods. By focusing on the concepts and purposes of MR and related methods, rather than the derivation and calculation of formulae, this book introduces material to students more clearly, and in a less threatening way. In addition to illuminating content necessary for coursework, the accessibility of this approach means students are more likely to be able to conduct research using MR or SEM--and more likely to use the methods wisely. Covers both MR and SEM, while explaining their relevance to one another Also includes path analysis, confirmatory factor analysis, and latent growth modeling Figures and tables throughout provide examples and illustrate key concepts and techniques For additional resources, please visit: http://tzkeith.com/.

  18. Hierarchy Bayesian model based services awareness of high-speed optical access networks

    Science.gov (United States)

    Bai, Hui-feng

    2018-03-01

    As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.

  19. Internet accessible hot cell with gamma spectroscopy at the Missouri S and T nuclear reactor

    Energy Technology Data Exchange (ETDEWEB)

    Grant, Edwin [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States); Mueller, Gary, E-mail: gmueller@mst.edu [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States); Castano, Carlos; Usman, Shoaib; Kumar, Arvind [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States)

    2011-08-15

    Highlights: > A dual-chambered internet-accessible heavily shielded facility has been built. > The facility allows distance users to analyze neutron irradiated samples remotely. > The Missouri S and T system uses computer automation with user feedback. > The system can analyze multiple samples and assist several researchers concurrently. - Abstract: A dual-chambered internet-accessible heavily shielded facility with pneumatic access to the University of Missouri Science and Technology (Missouri S and T) 200 kW Research Nuclear Reactor (MSTR) core has been built and is currently available for irradiation and analysis of samples. The facility allows authorized distance users engaged in collaborative activities with Missouri S and T to remotely manipulate and analyze neutron irradiated samples. The system consists of two shielded compartments, one for multiple sample storage, and the other dedicated exclusively for radiation measurements and spectroscopy. The second chamber has multiple detector ports, with graded shielding, and has the capability to support gamma spectroscopy using radiation detectors such as an HPGe detector. Both these chambers are connected though a rapid pneumatic system with access to the MSTR nuclear reactor core. This new internet-based system complements the MSTR's current bare pneumatic tube (BPT) and cadmium lined pneumatic tube (CPT) facilities. The total transportation time between the core and the hot cell, for samples weighing 10 g, irradiated in the MSTR core, is roughly 3.0 s. This work was funded by the DOE grant number DE-FG07-07ID14852 and expands the capabilities of teaching and research at the MSTR. It allows individuals who do not have on-site access to a nuclear reactor facility to remotely participate in research and educational activities.

  20. Internet accessible hot cell with gamma spectroscopy at the Missouri S and T nuclear reactor

    International Nuclear Information System (INIS)

    Grant, Edwin; Mueller, Gary; Castano, Carlos; Usman, Shoaib; Kumar, Arvind

    2011-01-01

    Highlights: → A dual-chambered internet-accessible heavily shielded facility has been built. → The facility allows distance users to analyze neutron irradiated samples remotely. → The Missouri S and T system uses computer automation with user feedback. → The system can analyze multiple samples and assist several researchers concurrently. - Abstract: A dual-chambered internet-accessible heavily shielded facility with pneumatic access to the University of Missouri Science and Technology (Missouri S and T) 200 kW Research Nuclear Reactor (MSTR) core has been built and is currently available for irradiation and analysis of samples. The facility allows authorized distance users engaged in collaborative activities with Missouri S and T to remotely manipulate and analyze neutron irradiated samples. The system consists of two shielded compartments, one for multiple sample storage, and the other dedicated exclusively for radiation measurements and spectroscopy. The second chamber has multiple detector ports, with graded shielding, and has the capability to support gamma spectroscopy using radiation detectors such as an HPGe detector. Both these chambers are connected though a rapid pneumatic system with access to the MSTR nuclear reactor core. This new internet-based system complements the MSTR's current bare pneumatic tube (BPT) and cadmium lined pneumatic tube (CPT) facilities. The total transportation time between the core and the hot cell, for samples weighing 10 g, irradiated in the MSTR core, is roughly 3.0 s. This work was funded by the DOE grant number DE-FG07-07ID14852 and expands the capabilities of teaching and research at the MSTR. It allows individuals who do not have on-site access to a nuclear reactor facility to remotely participate in research and educational activities.

  1. Demonstration of two-user, 10-Gbits/s optical code-division multiple-access system implemented by using cascaded longperiod fiber gratings formed in dispersion-compensating fiber with inner-cladding structure

    DEFF Research Database (Denmark)

    Kim, Sun-Jong; Eom, T.J.; Kim, T.Y.

    2005-01-01

    A two-user, 10-Gbits/s optical code-division multiple-access system implemented by using cascaded long-period fiber gratings formed in a dispersion-compensating fiber (DCF) is demonstrated. Our results show that the sensitivity of cladding modes to the refractive index change on the cladding...... surface is greatly reduced by utilizing the inner-cladding mode of the DCF. Two pairs of encoder/decoder are constructed and the performance is evaluated by measuring bit error rate (BER). With an interferer, a BER of 1.5 X 10(-12) is measured at a received optical power of -6 dBm....

  2. Access block in NSW hospitals, 1999-2001: does the definition matter?

    Science.gov (United States)

    Forero, Roberto; Mohsin, Mohammed; Bauman, Adrian E; Ieraci, Sue; Young, Lis; Phung, Hai N; Hillman, Kenneth M; McCarthy, Sally M; Hugelmeyer, C David

    2004-01-19

    To estimate the magnitude of access block and its trend over time in New South Wales hospitals, using different definitions of access block, and to explore its association with clinical and non-clinical factors. An epidemiological study using the Emergency Department Information System datasets (1 January 1999 to 31 December 2001) from a sample of 55 NSW hospitals. Prevalence of access block measured by four different definitions; strength of association between access block, type of hospital, year of presentation, mode and time of arrival, triage category (an indicator of urgency), age and sex. Rates of access block (for all four definitions) increased between 1999 and 2001 by 1%-2% per year. There were increases across all regions of NSW, but urban regions in particular. Patients presenting to Principal Referral hospitals and those who arrived at night were more likely to experience access block. After adjusting for triage category and year of presentation, the mode of arrival, time of arrival, type of hospital, age and sex were significantly associated with access block. Access block continues to increase across NSW, whatever the definition used. We recommend that hospitals in NSW and Australia move to the use of one standard definition of access block, as our study suggests there is no significant additional information emerging from the use of multiple definitions.

  3. Initial results of centralized autonomous orbit determination of the new-generation BDS satellites with inter-satellite link measurements

    Science.gov (United States)

    Tang, Chengpan; Hu, Xiaogong; Zhou, Shanshi; Liu, Li; Pan, Junyang; Chen, Liucheng; Guo, Rui; Zhu, Lingfeng; Hu, Guangming; Li, Xiaojie; He, Feng; Chang, Zhiqiao

    2018-01-01

    Autonomous orbit determination is the ability of navigation satellites to estimate the orbit parameters on-board using inter-satellite link (ISL) measurements. This study mainly focuses on data processing of the ISL measurements as a new measurement type and its application on the centralized autonomous orbit determination of the new-generation Beidou navigation satellite system satellites for the first time. The ISL measurements are dual one-way measurements that follow a time division multiple access (TDMA) structure. The ranging error of the ISL measurements is less than 0.25 ns. This paper proposes a derivation approach to the satellite clock offsets and the geometric distances from TDMA dual one-way measurements without a loss of accuracy. The derived clock offsets are used for time synchronization, and the derived geometry distances are used for autonomous orbit determination. The clock offsets from the ISL measurements are consistent with the L-band two-way satellite, and time-frequency transfer clock measurements and the detrended residuals vary within 0.5 ns. The centralized autonomous orbit determination is conducted in a batch mode on a ground-capable server for the feasibility study. Constant hardware delays are present in the geometric distances and become the largest source of error in the autonomous orbit determination. Therefore, the hardware delays are estimated simultaneously with the satellite orbits. To avoid uncertainties in the constellation orientation, a ground anchor station that "observes" the satellites with on-board ISL payloads is introduced into the orbit determination. The root-mean-square values of orbit determination residuals are within 10.0 cm, and the standard deviation of the estimated ISL hardware delays is within 0.2 ns. The accuracy of the autonomous orbits is evaluated by analysis of overlap comparison and the satellite laser ranging (SLR) residuals and is compared with the accuracy of the L-band orbits. The results indicate

  4. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  5. WCDMA Uplink Interference Assessment from Multiple High Altitude Platform Configurations

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2008-06-01

    Full Text Available We investigate the possibility of multiple high altitude platform (HAP coverage of a common cell area using a wideband code division multiple access (WCDMA system. In particular, we study the uplink system performance of the system. The results show that depending on the traffic demand and the type of service used, there is a possibility of deploying 3–6 HAPs covering the same cell area. The results also show the effect of cell radius on performance and the position of the multiple HAP base stations which give the worst performance.

  6. Priority and Negotiation Based Dynamic Spectrum Allocation Scheme for Multiple Radio Access Network Operators

    Science.gov (United States)

    Kim, Hoon; Hyon, Taein; Lee, Yeonwoo

    Most of previous works have presented the dynamic spectrum allocation (DSA) gain achieved by utilizing the time or regional variations in traffic demand between multi-network operators (NOs). In this paper, we introduce the functionalities required for the entities related with the spectrum sharing and allocation and propose a spectrum allocation algorithm while considering the long-term priority between NOs, the priority between multiple class services, and the urgent bandwidth request. To take into account the priorities among the NOs and the priorities of multiple class services, a spectrum sharing metric (SSM) is proposed, while a negotiation procedure is proposed to treat the urgent bandwidth request.

  7. Performance of asynchronous fiber-optic code division multiple access system based on three-dimensional wavelength/time/space codes and its link analysis.

    Science.gov (United States)

    Singh, Jaswinder

    2010-03-10

    A novel family of three-dimensional (3-D) wavelength/time/space codes for asynchronous optical code-division-multiple-access (CDMA) systems with "zero" off-peak autocorrelation and "unity" cross correlation is reported. Antipodal signaling and differential detection is employed in the system. A maximum of [(W x T+1) x W] codes are generated for unity cross correlation, where W and T are the number of wavelengths and time chips used in the code and are prime. The conditions for violation of the cross-correlation constraint are discussed. The expressions for number of generated codes are determined for various code dimensions. It is found that the maximum number of codes are generated for S systems. The codes have a code-set-size to code-size ratio greater than W/S. For instance, with a code size of 2065 (59 x 7 x 5), a total of 12,213 users can be supported, and 130 simultaneous users at a bit-error rate (BER) of 10(-9). An arrayed-waveguide-grating-based reconfigurable encoder/decoder design for 2-D implementation for the 3-D codes is presented so that the need for multiple star couplers and fiber ribbons is eliminated. The hardware requirements of the coders used for various modulation/detection schemes are given. The effect of insertion loss in the coders is shown to be significantly reduced with loss compensation by using an amplifier after encoding. An optical CDMA system for four users is simulated and the results presented show the improvement in performance with the use of loss compensation.

  8. NAC-NOR mutations in tomato Penjar accessions attenuate multiple metabolic processes and prolong the fruit shelf life.

    Science.gov (United States)

    Kumar, Rakesh; Tamboli, Vajir; Sharma, Rameshwar; Sreelakshmi, Yellamaraju

    2018-09-01

    Several Penjar accessions of tomato grown in the Mediterranean exhibit prolonged shelf life and harbor alcobaca mutation. To uncover the metabolic basis underlying shelf life, we compared four Penjar accessions to Ailsa Craig. Three accessions bore alcobaca mutation, whereas the fourth was a novel NAC-NOR allele. Cuticle composition of Penjars varied widely during fruit ripening. All Penjars exhibited delayed ripening, prolonged on-vine and off-vine shelf life, low ethylene emission, and carotenoid levels. Metabolic profiling revealed shifts in Krebs cycle intermediates, amino acids, and γ-aminobutyric acid levels indicating the attenuation of respiration in Penjars during post-harvest storage. Penjar fruits also showed concerted downregulation of several cell-wall modifying genes and related metabolites. The high ABA and sucrose levels at the onset of senescence in Penjar fruits likely contribute to reduced water loss. Our analyses reveal that the attenuation of various metabolic processes by NAC-NOR mutation likely prolongs the shelf life of Penjar fruits. Copyright © 2018 Elsevier Ltd. All rights reserved.

  9. The NCAR Research Data Archive's Hybrid Approach for Data Discovery and Access

    Science.gov (United States)

    Schuster, D.; Worley, S. J.

    2013-12-01

    The NCAR Research Data Archive (RDA http://rda.ucar.edu) maintains a variety of data discovery and access capabilities for it's 600+ dataset collections to support the varying needs of a diverse user community. In-house developed and standards-based community tools offer services to more than 10,000 users annually. By number of users the largest group is external and access the RDA through web based protocols; the internal NCAR HPC users are fewer in number, but typically access more data volume. This paper will detail the data discovery and access services maintained by the RDA to support both user groups, and show metrics that illustrate how the community is using the services. The distributed search capability enabled by standards-based community tools, such as Geoportal and an OAI-PMH access point that serves multiple metadata standards, provide pathways for external users to initially discover RDA holdings. From here, in-house developed web interfaces leverage primary discovery level metadata databases that support keyword and faceted searches. Internal NCAR HPC users, or those familiar with the RDA, may go directly to the dataset collection of interest and refine their search based on rich file collection metadata. Multiple levels of metadata have proven to be invaluable for discovery within terabyte-sized archives composed of many atmospheric or oceanic levels, hundreds of parameters, and often numerous grid and time resolutions. Once users find the data they want, their access needs may vary as well. A THREDDS data server running on targeted dataset collections enables remote file access through OPENDAP and other web based protocols primarily for external users. In-house developed tools give all users the capability to submit data subset extraction and format conversion requests through scalable, HPC based delayed mode batch processing. Users can monitor their RDA-based data processing progress and receive instructions on how to access the data when it is

  10. What versus where: Investigating how autobiographical memory retrieval differs when accessed with thematic versus spatial information.

    Science.gov (United States)

    Sheldon, Signy; Chu, Sonja

    2017-09-01

    Autobiographical memory research has investigated how cueing distinct aspects of a past event can trigger different recollective experiences. This research has stimulated theories about how autobiographical knowledge is accessed and organized. Here, we test the idea that thematic information organizes multiple autobiographical events whereas spatial information organizes individual past episodes by investigating how retrieval guided by these two forms of information differs. We used a novel autobiographical fluency task in which participants accessed multiple memory exemplars to event theme and spatial (location) cues followed by a narrative description task in which they described the memories generated to these cues. Participants recalled significantly more memory exemplars to event theme than to spatial cues; however, spatial cues prompted faster access to past memories. Results from the narrative description task revealed that memories retrieved via event theme cues compared to spatial cues had a higher number of overall details, but those recalled to the spatial cues were recollected with a greater concentration on episodic details than those retrieved via event theme cues. These results provide evidence that thematic information organizes and integrates multiple memories whereas spatial information prompts the retrieval of specific episodic content from a past event.

  11. A novel IPTV program multiplex access system to EPON

    Science.gov (United States)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  12. Demand access communications for TDRSS users

    Science.gov (United States)

    Zillig, David; Weinberg, Aaron; Mcomber, Robert

    1994-01-01

    The Tracking and Data Relay Satellite System (TDRSS) has long been used to provide reliable low and high-data rate relay services between user spacecraft in Earth orbit and the ground. To date, these TDRSS services have been implemented via prior scheduling based upon estimates of user needs and mission event timelines. While this approach may be necessary for large users that require greater amounts of TDRSS resources, TDRSS can potentially offer the planned community of smaller science missions (e.g., the small explorer missions), and other emerging users, the unique opportunity for services on demand. In particular, innovative application of the existing TDRSS Multiple Access (MA) subsystem, with its phased array antenna, could be used to implement true demand access services without modification to either the TDRSS satellites or the user transponder, thereby introducing operational and performance benefits to both the user community and the Space Network. In this paper, candidate implementations of demand access service via the TDRSS MA subsystem are examined in detail. Both forward and return link services are addressed and a combination of qualitative and quantitative assessments are provided. The paper also identifies further areas for investigation in this ongoing activity that is being conducted by GSFC/Code 531 under the NASA Code O Advanced Systems Program.

  13. Crowdsourcing e-book accessibility information and the impact on staff development

    Directory of Open Access Journals (Sweden)

    Victoria Dobson

    2017-07-01

    Full Text Available For students with print impairments, e-books offer great potential to remove barriers to information. However, for various reasons, not all e-books are fully accessible. Significant variability exists between different platforms and titles. To benchmark e-book accessibility, a group of library and disability professionals across the UK higher education sector organized a crowdsourced e-book accessibility audit, using simple criteria to capture end-user experiences. The audit can act as a framework for librarians and e-book providers to discuss accessibility and effect improvements. This audit was of 275 e-books from 65 publishers across 44 platforms, resulting in an interactive spreadsheet on the project website and individual feedback reports for each platform. Most of the volunteer auditors had little accessibility expertise so a by-product of the process was training to introduce key accessibility concepts and support for those using the audit tool. This paper explores the process, including key findings from a follow-up questionnaire for testers. The results indicate increased awareness of e-book accessibility and empathy for disabled learners and an appetite for further training, in particular using e-books with screen reading and text-to-speech software. The study suggests crowdsourced research can be highly effective on multiple levels.

  14. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    Science.gov (United States)

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E; Ramakrishnan, I V

    2017-05-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access-an early forerunner of true ubiquitous access-screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments.

  15. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  16. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  17. Evaluation of 19,460 Wheat Accessions Conserved in the Indian National Genebank to Identify New Sources of Resistance to Rust and Spot Blotch Diseases

    Science.gov (United States)

    Jacob, Sherry R.; Srinivasan, Kalyani; Radhamani, J.; Parimalan, R.; Sivaswamy, M.; Tyagi, Sandhya; Yadav, Mamata; Kumari, Jyotisna; Deepali; Sharma, Sandeep; Bhagat, Indoo; Meeta, Madhu; Bains, N. S.; Chowdhury, A. K.; Saha, B. C.; Bhattacharya, P. M.; Kumari, Jyoti; Singh, M. C.; Gangwar, O. P.; Prasad, P.; Bharadwaj, S. C.; Gogoi, Robin; Sharma, J. B.; GM, Sandeep Kumar; Saharan, M. S.; Bag, Manas; Roy, Anirban; Prasad, T. V.; Sharma, R. K.; Dutta, M.; Sharma, Indu; Bansal, K. C.

    2016-01-01

    A comprehensive germplasm evaluation study of wheat accessions conserved in the Indian National Genebank was conducted to identify sources of rust and spot blotch resistance. Genebank accessions comprising three species of wheat–Triticum aestivum, T. durum and T. dicoccum were screened sequentially at multiple disease hotspots, during the 2011–14 crop seasons, carrying only resistant accessions to the next step of evaluation. Wheat accessions which were found to be resistant in the field were then assayed for seedling resistance and profiled using molecular markers. In the primary evaluation, 19,460 accessions were screened at Wellington (Tamil Nadu), a hotspot for wheat rusts. We identified 4925 accessions to be resistant and these were further evaluated at Gurdaspur (Punjab), a hotspot for stripe rust and at Cooch Behar (West Bengal), a hotspot for spot blotch. The second round evaluation identified 498 accessions potentially resistant to multiple rusts and 868 accessions potentially resistant to spot blotch. Evaluation of rust resistant accessions for seedling resistance against seven virulent pathotypes of three rusts under artificial epiphytotic conditions identified 137 accessions potentially resistant to multiple rusts. Molecular analysis to identify different combinations of genetic loci imparting resistance to leaf rust, stem rust, stripe rust and spot blotch using linked molecular markers, identified 45 wheat accessions containing known resistance genes against all three rusts as well as a QTL for spot blotch resistance. The resistant germplasm accessions, particularly against stripe rust, identified in this study can be excellent potential candidates to be employed for breeding resistance into the background of high yielding wheat cultivars through conventional or molecular breeding approaches, and are expected to contribute toward food security at national and global levels. PMID:27942031

  18. Evaluation of 19,460 Wheat Accessions Conserved in the Indian National Genebank to Identify New Sources of Resistance to Rust and Spot Blotch Diseases.

    Directory of Open Access Journals (Sweden)

    Sundeep Kumar

    Full Text Available A comprehensive germplasm evaluation study of wheat accessions conserved in the Indian National Genebank was conducted to identify sources of rust and spot blotch resistance. Genebank accessions comprising three species of wheat-Triticum aestivum, T. durum and T. dicoccum were screened sequentially at multiple disease hotspots, during the 2011-14 crop seasons, carrying only resistant accessions to the next step of evaluation. Wheat accessions which were found to be resistant in the field were then assayed for seedling resistance and profiled using molecular markers. In the primary evaluation, 19,460 accessions were screened at Wellington (Tamil Nadu, a hotspot for wheat rusts. We identified 4925 accessions to be resistant and these were further evaluated at Gurdaspur (Punjab, a hotspot for stripe rust and at Cooch Behar (West Bengal, a hotspot for spot blotch. The second round evaluation identified 498 accessions potentially resistant to multiple rusts and 868 accessions potentially resistant to spot blotch. Evaluation of rust resistant accessions for seedling resistance against seven virulent pathotypes of three rusts under artificial epiphytotic conditions identified 137 accessions potentially resistant to multiple rusts. Molecular analysis to identify different combinations of genetic loci imparting resistance to leaf rust, stem rust, stripe rust and spot blotch using linked molecular markers, identified 45 wheat accessions containing known resistance genes against all three rusts as well as a QTL for spot blotch resistance. The resistant germplasm accessions, particularly against stripe rust, identified in this study can be excellent potential candidates to be employed for breeding resistance into the background of high yielding wheat cultivars through conventional or molecular breeding approaches, and are expected to contribute toward food security at national and global levels.

  19. Evaluation of 19,460 Wheat Accessions Conserved in the Indian National Genebank to Identify New Sources of Resistance to Rust and Spot Blotch Diseases.

    Science.gov (United States)

    Kumar, Sundeep; Archak, Sunil; Tyagi, R K; Kumar, Jagdish; Vk, Vikas; Jacob, Sherry R; Srinivasan, Kalyani; Radhamani, J; Parimalan, R; Sivaswamy, M; Tyagi, Sandhya; Yadav, Mamata; Kumari, Jyotisna; Deepali; Sharma, Sandeep; Bhagat, Indoo; Meeta, Madhu; Bains, N S; Chowdhury, A K; Saha, B C; Bhattacharya, P M; Kumari, Jyoti; Singh, M C; Gangwar, O P; Prasad, P; Bharadwaj, S C; Gogoi, Robin; Sharma, J B; Gm, Sandeep Kumar; Saharan, M S; Bag, Manas; Roy, Anirban; Prasad, T V; Sharma, R K; Dutta, M; Sharma, Indu; Bansal, K C

    2016-01-01

    A comprehensive germplasm evaluation study of wheat accessions conserved in the Indian National Genebank was conducted to identify sources of rust and spot blotch resistance. Genebank accessions comprising three species of wheat-Triticum aestivum, T. durum and T. dicoccum were screened sequentially at multiple disease hotspots, during the 2011-14 crop seasons, carrying only resistant accessions to the next step of evaluation. Wheat accessions which were found to be resistant in the field were then assayed for seedling resistance and profiled using molecular markers. In the primary evaluation, 19,460 accessions were screened at Wellington (Tamil Nadu), a hotspot for wheat rusts. We identified 4925 accessions to be resistant and these were further evaluated at Gurdaspur (Punjab), a hotspot for stripe rust and at Cooch Behar (West Bengal), a hotspot for spot blotch. The second round evaluation identified 498 accessions potentially resistant to multiple rusts and 868 accessions potentially resistant to spot blotch. Evaluation of rust resistant accessions for seedling resistance against seven virulent pathotypes of three rusts under artificial epiphytotic conditions identified 137 accessions potentially resistant to multiple rusts. Molecular analysis to identify different combinations of genetic loci imparting resistance to leaf rust, stem rust, stripe rust and spot blotch using linked molecular markers, identified 45 wheat accessions containing known resistance genes against all three rusts as well as a QTL for spot blotch resistance. The resistant germplasm accessions, particularly against stripe rust, identified in this study can be excellent potential candidates to be employed for breeding resistance into the background of high yielding wheat cultivars through conventional or molecular breeding approaches, and are expected to contribute toward food security at national and global levels.

  20. Mass transfer effects in hygroscopic measurements of aerosol particles

    Directory of Open Access Journals (Sweden)

    M. N. Chan

    2005-01-01

    Full Text Available The tandem differential mobility analyzer (TDMA has been widely utilized to measure the hygroscopicity of laboratory-generated and atmospheric submicrometer particles. An important concern in investigating the hygroscopicity of the particles is if the particles have attained equilibrium state in the measurements. We present a literature survey to investigate the mass transfer effects in hygroscopicity measurements. In most TDMA studies, a residence time in the order of seconds is used for humidification (or dehumidification. NaCl and (NH42SO4 particles are usually used to verify the equilibrium measurements during this residence time, which is presumed to be sufficient for other particles. There have been observations that not all types of submicrometer particles, including atmospheric particles, attain their equilibrium sizes within this time scale. We recommend that experimentation with different residence times be conducted and that the residence time should be explicitly stated in future TDMA measurements. Mass transfer effects may also exist in the measurements of other properties related to the water uptake of atmospheric particles such as relative humidity dependent light scattering coefficients and cloud condensation nuclei activity.

  1. Multiple Soft Fault Diagnosis of Bjt Circuits

    Directory of Open Access Journals (Sweden)

    Tadeusiewicz Michał

    2014-12-01

    Full Text Available This paper deals with multiple soft fault diagnosis of nonlinear analog circuits comprising bipolar transistors characterized by the Ebers-Moll model. Resistances of the circuit and beta forward factor of a transistor are considered as potentially faulty parameters. The proposed diagnostic method exploits a strongly nonlinear set of algebraic type equations, which may possess multiple solutions, and is capable of finding different sets of the parameters values which meet the diagnostic test. The equations are written on the basis of node analysis and include DC voltages measured at accessible nodes, as well as some measured currents. The unknown variables are node voltages and the parameters which are considered as potentially faulty. The number of these parameters is larger than the number of the accessible nodes. To solve the set of equations the block relaxation method is used with different assignments of the variables to the blocks. Next, the solutions are corrected using the Newton-Raphson algorithm. As a result, one or more sets of the parameters values which satisfy the diagnostic test are obtained. The proposed approach is illustrated with a numerical example.

  2. High Multiplicity Searches at the LHC Using Jet Masses

    Energy Technology Data Exchange (ETDEWEB)

    Hook, Anson; /SLAC /Stanford U., Appl. Phys. Dept.; Izaguirre, Eder; /SLAC /Stanford U., Phys. Dept.; Lisanti, Mariangela; /Princeton U.; Wacker, Jay G.; /SLAC /Stanford U., ITP

    2012-04-24

    This article introduces a new class of searches for physics beyond the Standard Model that improves the sensitivity to signals with high jet multiplicity. The proposed searches gain access to high multiplicity signals by reclustering events into large-radius, or 'fat', jets and by requiring that each event has multiple massive jets. This technique is applied to supersymmetric scenarios in which gluinos are pair-produced and then subsequently decay to final states with either moderate quantities of missing energy or final states without missing energy. In each of these scenarios, the use of jet mass improves the estimated reach in gluino mass by 20% to 50% over current LHC searches.

  3. Performance Analysis of DPSK-OCDMA System for Optical Access Network

    Science.gov (United States)

    Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer

    2016-03-01

    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.

  4. Demonstration of two-user, 10-Gbits/s optical code-division multiple-access system implemented by using cascaded long-period fiber gratings formed in dispersion-compensating fiber with inner-cladding structure

    Science.gov (United States)

    Kim, Sun-Jong; Eom, Tae-Jung; Kim, Tae-Young; Lee, Byeong Ha; Park, Chang-Soo

    2005-09-01

    A two-user, 10-Gbits/s optical code-division multiple-access system implemented by using cascaded long-period fiber gratings formed in a dispersion-compensating fiber (DCF) is demonstrated. Our results show that the sensitivity of cladding modes to the refractive index change on the cladding surface is greatly reduced by utilizing the inner-cladding mode of the DCF. Two pairs of encoder/decoder are constructed and the performance is evaluated by measuring bit error rate (BER). With an interferer, a BER of 1.5×10-12 is measured at a received optical power of -6 dBm.

  5. SUMMIT (Serially Unified Multicenter Multiple Sclerosis Investigation): creating a repository of deeply phenotyped contemporary multiple sclerosis cohorts.

    Science.gov (United States)

    Bove, Riley; Chitnis, Tanuja; Cree, Bruce Ac; Tintoré, Mar; Naegelin, Yvonne; Uitdehaag, Bernard Mj; Kappos, Ludwig; Khoury, Samia J; Montalban, Xavier; Hauser, Stephen L; Weiner, Howard L

    2017-08-01

    There is a pressing need for robust longitudinal cohort studies in the modern treatment era of multiple sclerosis. Build a multiple sclerosis (MS) cohort repository to capture the variability of disability accumulation, as well as provide the depth of characterization (clinical, radiologic, genetic, biospecimens) required to adequately model and ultimately predict a patient's course. Serially Unified Multicenter Multiple Sclerosis Investigation (SUMMIT) is an international multi-center, prospectively enrolled cohort with over a decade of comprehensive follow-up on more than 1000 patients from two large North American academic MS Centers (Brigham and Women's Hospital (Comprehensive Longitudinal Investigation of Multiple Sclerosis at the Brigham and Women's Hospital (CLIMB; BWH)) and University of California, San Francisco (Expression/genomics, Proteomics, Imaging, and Clinical (EPIC))). It is bringing online more than 2500 patients from additional international MS Centers (Basel (Universitätsspital Basel (UHB)), VU University Medical Center MS Center Amsterdam (MSCA), Multiple Sclerosis Center of Catalonia-Vall d'Hebron Hospital (Barcelona clinically isolated syndrome (CIS) cohort), and American University of Beirut Medical Center (AUBMC-Multiple Sclerosis Interdisciplinary Research (AMIR)). We provide evidence for harmonization of two of the initial cohorts in terms of the characterization of demographics, disease, and treatment-related variables; demonstrate several proof-of-principle analyses examining genetic and radiologic predictors of disease progression; and discuss the steps involved in expanding SUMMIT into a repository accessible to the broader scientific community.

  6. Access and Use of New ICT Resources in Romanian Schools

    Science.gov (United States)

    Onofrei, Smaranda Gabriela

    2016-01-01

    In the context of a digital age that marks all sectors of modern life, access and use of new technologies and the Internet by digital natives is an area with multiple speculations based on relatively little empirical research. It was noted that young people of this generation share a global common culture characterized more by their experience in…

  7. A Novel CSR-Based Sparse Matrix-Vector Multiplication on GPUs

    Directory of Open Access Journals (Sweden)

    Guixia He

    2016-01-01

    Full Text Available Sparse matrix-vector multiplication (SpMV is an important operation in scientific computations. Compressed sparse row (CSR is the most frequently used format to store sparse matrices. However, CSR-based SpMVs on graphic processing units (GPUs, for example, CSR-scalar and CSR-vector, usually have poor performance due to irregular memory access patterns. This motivates us to propose a perfect CSR-based SpMV on the GPU that is called PCSR. PCSR involves two kernels and accesses CSR arrays in a fully coalesced manner by introducing a middle array, which greatly alleviates the deficiencies of CSR-scalar (rare coalescing and CSR-vector (partial coalescing. Test results on a single C2050 GPU show that PCSR fully outperforms CSR-scalar, CSR-vector, and CSRMV and HYBMV in the vendor-tuned CUSPARSE library and is comparable with a most recently proposed CSR-based algorithm, CSR-Adaptive. Furthermore, we extend PCSR on a single GPU to multiple GPUs. Experimental results on four C2050 GPUs show that no matter whether the communication between GPUs is considered or not PCSR on multiple GPUs achieves good performance and has high parallel efficiency.

  8. Towards ubiquitous access of computer-assisted surgery systems.

    Science.gov (United States)

    Liu, Hui; Lufei, Hanping; Shi, Weishong; Chaudhary, Vipin

    2006-01-01

    Traditional stand-alone computer-assisted surgery (CAS) systems impede the ubiquitous and simultaneous access by multiple users. With advances in computing and networking technologies, ubiquitous access to CAS systems becomes possible and promising. Based on our preliminary work, CASMIL, a stand-alone CAS server developed at Wayne State University, we propose a novel mobile CAS system, UbiCAS, which allows surgeons to retrieve, review and interpret multimodal medical images, and to perform some critical neurosurgical procedures on heterogeneous devices from anywhere at anytime. Furthermore, various optimization techniques, including caching, prefetching, pseudo-streaming-model, and compression, are used to guarantee the QoS of the UbiCAS system. UbiCAS enables doctors at remote locations to actively participate remote surgeries, share patient information in real time before, during, and after the surgery.

  9. Data Transmission and Access Protection of Community Medical Internet of Things

    Directory of Open Access Journals (Sweden)

    Xunbao Wang

    2017-01-01

    Full Text Available On the basis of Internet of Things (IoT technologies, Community Medical Internet of Things (CMIoT is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirectional identity authentication and fragmented multipath data transmission are used, and for the downlink data protection, fine grained access control and dynamic authorization are used. Through theoretical analysis and experiment evaluation, it is proved that the community medical data can be effectively protected in the transmission and access process without high performance loss.

  10. [Effects of construct accessibility and self-schema on person memory].

    Science.gov (United States)

    Kitamura, H

    1991-10-01

    The present study investigated the relationship among construct accessibility, self-schema and person memory. Three hundred and thirty-four subjects received 40 behavioral descriptions of a stimulus person, consisting of eight specific behaviors on each of five trait-dimensions. Subjects also rated personality traits of their acquaintances and themselves on nine-point bipolar scales and ranked the importance of the five trait-dimensions. Weights, which subjects assigned to each of the five dimensions, were calculated as indices of construct accessibility. Self-schema scores of each subject were also calculated based on his/her ratings. Multiple regression analyses indicated that the dimensional weights and self-schema scores were positively correlated with the recall performance of the descriptions of the stimulus person. The schematics recalled significantly more descriptions than the aschematics, whether their self-schema was positive or negative. Subjects who had positive self-schema showed higher construct accessibility than the aschematics. It was argued that the relationship between construct accessibility and self-schema might be affected by motivational factors such as self-esteem.

  11. Multiple-User, Multitasking, Virtual-Memory Computer System

    Science.gov (United States)

    Generazio, Edward R.; Roth, Don J.; Stang, David B.

    1993-01-01

    Computer system designed and programmed to serve multiple users in research laboratory. Provides for computer control and monitoring of laboratory instruments, acquisition and anlaysis of data from those instruments, and interaction with users via remote terminals. System provides fast access to shared central processing units and associated large (from megabytes to gigabytes) memories. Underlying concept of system also applicable to monitoring and control of industrial processes.

  12. Administrator Interest is Perceived to Encourage Faculty and Librarian Involvement in Open Access Activities

    Directory of Open Access Journals (Sweden)

    Eamon C. Tewell

    2014-09-01

    Full Text Available A Review of: Reinsfelder, T.L., & Anderson, J.A. (2013. Observations and perceptions of academic administrator influence on open access initiatives. Journal of Academic Librarianship, 39(6: 481-487. http://dx.doi.org/10.1016/j.acalib.2013.08.014 Abstract Objective – To better understand the roles and influence of senior-level academic administrators, such as provosts, on open access (OA activities at the institutional level, including whether librarians perform these activities regardless of administrative interest. Design – Web-based survey questionnaire combined with multiple regression analysis. Settings – The research was conducted online using surveys emailed to potential participants at not-for-profit public and private academic institutions in the United States with a FTE of greater than 1000. Subjects – Academic library directors at selected colleges and universities. Methods – Using directory information from the National Center for Education Statistics (NCES and filtering institutions according to not-for-profit status, size, and special focus, a survey sample of 1135 colleges and universities was obtained. Library websites were used to acquire contact information for library directors. In summer 2012 the 43-item survey questionnaire was distributed to respondents online using Qualtrics. The four primary variables were each comprised of multiple questionnaire items and validated using factor analysis, and the data was explored using multiple regression. Main Results – The survey received 298 respondents for a 26% response rate, though the number of incomplete responses is not stated. Among four stakeholder groups (faculty, publishers, librarians, and senior academic administrators, library directors perceived librarians as having the greatest influence in regards to the adoption of open access (mean = .7056, followed by faculty (.3792, administrators (.1881, and publishers as having a negative impact (–.3684. A positive

  13. Reasoning with alternative explanations in physics: The cognitive accessibility rule

    Science.gov (United States)

    Heckler, Andrew F.; Bogdan, Abigail M.

    2018-06-01

    A critical component of scientific reasoning is the consideration of alternative explanations. Recognizing that decades of cognitive psychology research have demonstrated that relative cognitive accessibility, or "what comes to mind," strongly affects how people reason in a given context, we articulate a simple "cognitive accessibility rule", namely that alternative explanations are considered less frequently when an explanation with relatively high accessibility is offered first. In a series of four experiments, we test the cognitive accessibility rule in the context of consideration of alternative explanations for six physical scenarios commonly found in introductory physics curricula. First, we administer free recall and recognition tasks to operationally establish and distinguish between the relative accessibility and availability of common explanations for the physical scenarios. Then, we offer either high or low accessibility explanations for the physical scenarios and determine the extent to which students consider alternatives to the given explanations. We find two main results consistent across algebra- and calculus-based university level introductory physics students for multiple answer formats. First, we find evidence that, at least for some contexts, most explanatory factors are cognitively available to students but not cognitively accessible. Second, we empirically verify the cognitive accessibility rule and demonstrate that the rule is strongly predictive, accounting for up to 70% of the variance of the average student consideration of alternative explanations across scenarios. Overall, we find that cognitive accessibility can help to explain biases in the consideration of alternatives in reasoning about simple physical scenarios, and these findings lend support to the growing number of science education studies demonstrating that tasks relevant to science education curricula often involve rapid, automatic, and potentially predictable processes and

  14. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    Science.gov (United States)

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  15. 76 FR 68518 - Request for Information: Public Access to Peer-Reviewed Scholarly Publications Resulting From...

    Science.gov (United States)

    2011-11-04

    ... archiving publications and making them publically accessible be used to grow the economy and improve the... can ensure long-term stewardship if content is distributed across multiple private sources? (4) Are...

  16. 76 FR 80418 - Request for Information: Public Access to Peer-Reviewed Scholarly Publications Resulting From...

    Science.gov (United States)

    2011-12-23

    ... archiving publications and making them publically accessible be used to grow the economy and improve the... can ensure long-term stewardship if content is distributed across multiple private sources? (4) Are...

  17. Optical CDMA and WDMA in the access network

    Science.gov (United States)

    Sargent, Edward H.; Stok, Andrew

    2003-08-01

    Optical CDMA provides one avenue to sharing the vast bandwidth of optical fiber among a number of active users in a network. In this work we address two questions central to considering the areas of applicability of CDMA in optics: (1) How do we compare fairly optical CDMA codes of different families, and what do we conclude? (2) How do we compare optical CDMA performance with that of conventional optical WDMA? To answer the first question, we present a method of comparing optical CDMA codes of different families, sizes and weights. We outline why the traditional performance metric of bit-error rate versus number of simultaneous users is lacking and propose a different performance measure -- the peak throughput normalized with respect to the size of the code. This metric is used to show that optical-orthogonal codes (OOCs) with a weight of 4 perform best at low offered loads while OOCs with weight 5 should be used at higher offered loads. By applying the technique across different families of codes, we demonstrate that multi-wavelength OOCs (MWOOCs) perform better than both OOCs (by a factor of approximately 1.25) and asymmetric prime-hop codes (by a factor of approximately 3.5), over a wide range of offered loads. In answer to the second question, we present a comparison of the performance of optical code-division multiple-access (CDMA) systems with that of a wavelength-division multiple-access (WDMA) system. The multiple-access techniques are applied in a time-slotted broadcast local-area network. The utilization, defined as the throughput per unit of time-domain bandwidth expansion, and packet delay are used as metrics of performance. When more than seven wavelengths are available, optical CDMA systems using asymmetric prime-hop codes and all-optical signal processing are shown to have higher peak utilization and lower corresponding delay than a WDMA system with the same number of wavelengths. When the encoders/decoders operate at the chip rate, the utilization

  18. An application of the edge effect in measuring accessibility to multiple food retailer types in Southwestern Ontario, Canada

    Science.gov (United States)

    2011-01-01

    Background Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS) to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores), both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Results Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. Conclusion By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the actual distance necessary to

  19. An application of the edge effect in measuring accessibility to multiple food retailer types in southwestern Ontario, Canada.

    Science.gov (United States)

    Sadler, Richard C; Gilliland, Jason A; Arku, Godwin

    2011-05-15

    Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS) to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores), both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the actual distance necessary to travel for food. Research on

  20. An application of the edge effect in measuring accessibility to multiple food retailer types in Southwestern Ontario, Canada

    Directory of Open Access Journals (Sweden)

    Arku Godwin

    2011-05-01

    Full Text Available Abstract Background Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores, both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Results Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. Conclusion By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the

  1. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  2. A sustainable business model for Open-Access journal publishing a proposed plan for High-Energy Physics

    CERN Document Server

    Vigen, Jens

    2007-01-01

    The High Energy Physics community over the last 15 years has achieved so-called full green Open Access through the wide dissemination of preprints via arXiv, a central subject repository managed by Cornell University. However, green Open Access does not alleviate the economic difficulties of libraries as they are still expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold Open Access by converting a set of the existing core journals to Open Access. A Working Party has been established to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). This consortium will engage with publishers to build a sustainable model for Open Access publishing. In this model, subscription fees from multiple institutions are replaced by contracts with publishers of Open Access journals, where the SCOAP3 conso...

  3. SEA SURFACE TEMPERATURE and Other Data from MULTIPLE SHIPS From Sea of Japan from 19930101 to 19930630 (NODC Accession 9300173)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The sea surface temperature data in this accession was collected in Sea of Japan. Data in this accession was collected over a six month period from thermistor. The...

  4. Peripheral arteriovenous fistula as vascular access for long-term chemotherapy.

    Science.gov (United States)

    Kovalyov, Oleksiy O; Kostyuk, Oleksandr G; Tkachuk, Tetyana V

    To provide long-term vascular access in clinical oncology peripheral forearm veins (up to 95% of patients in Ukraine), central venous access and "complete implanted vascular systems" are used most often. Many oncology patients have contraindications to catheterization of superior vena cava. Besides, exploitation of central veins is associated with potential technical and infectious complications. The aim - to study short-term and long-term results of arteriovenous fistula exploitation as vascular access for continuous anticancer therapy. Peripheral venous bed status in 41 oncology patients taking long-term chemotherapy treatment is analyzed in the article. Doppler sonography, morphologic and immune histochemical analyses were used in the study. Doppler sonography found qualitative and quantitative changes in forearm veins at different time periods after initiation of chemotherapy in the majority of patients. The major morphologic manifestations of venous wall damage were chemical phlebitis, local or extended hardening of venous wall, venous thrombosis and extravasations with necrosis and subsequent paravasal tissue sclerosis. Alternative vascular access created in 12 patients completely met the adequacy criteria (safety, multiple use, longevity, realization of the designed therapy program). The conclusion was made about inapplicability of forearm veins for long-term administration of cytostatic agents. If it is impossible to use central veins, arteriovenous fistula can become an alternative vascular access.

  5. The Sound Access Parent Outcomes Instrument (SAPOI): Construction of a new instrument for children with severe multiple disabilities who use cochlear implants or hearing aids.

    Science.gov (United States)

    Hayward, Denyse V; Ritter, Kathryn; Mousavi, Amin; Vatanapour, Shabnam

    2016-01-01

    To report on the Phase 2 development of the Sound Access Parent Outcomes Instrument (SAPOI), a new instrument focused on formalizing outcomes that parents of children with severe multiple disabilities (SMD) who use amplification prioritize as important. Phase 2 of this project involved item selection and refinement of the SAPOI based on (a) Phase 1 study participant input, (b) clinical specialist feedback, and (c) test-retest instrument reliability. Phase 1 participant responses were utilized to construct a draft version of the SAPOI. Next, clinical specialists examined the instrument for content validity and utility and instrument reliability was examined through a test-retest process with parents of children with SMD. The draft SAPOI was constructed based on Phase 1 participant input. Clinical specialists supported content validity and utility of the instrument and the inclusion of 19 additional items across four categories, namely Child Affect, Child Interaction, Parent Well-being, and Child's Device Use. The SAPOI was completed twice at one-month intervals by parents of children with SMD to examine instrument reliability across the four categories (Child Affect, Child Interaction, Parent Well-being, and Child's Device Use). Instrument reliability was strong-to-excellent across all four sections. The SAPOI shows promise as a much-needed addition to the assessment battery currently used for children with SMD who use cochlear implants and hearing aids. It provides valuable information regarding outcomes resulting from access to sound in this population that currently used assessments do not identify.

  6. Research on an uplink carrier sense multiple access algorithm of large indoor visible light communication networks based on an optical hard core point process.

    Science.gov (United States)

    Nan, Zhufen; Chi, Xuefen

    2016-12-20

    The IEEE 802.15.7 protocol suggests that it could coordinate the channel access process based on the competitive method of carrier sensing. However, the directionality of light and randomness of diffuse reflection would give rise to a serious imperfect carrier sense (ICS) problem [e.g., hidden node (HN) problem and exposed node (EN) problem], which brings great challenges in realizing the optical carrier sense multiple access (CSMA) mechanism. In this paper, the carrier sense process implemented by diffuse reflection light is modeled as the choice of independent sets. We establish an ICS model with the presence of ENs and HNs for the multi-point to multi-point visible light communication (VLC) uplink communications system. Considering the severe optical ICS problem, an optical hard core point process (OHCPP) is developed, which characterizes the optical CSMA for the indoor VLC uplink communications system. Due to the limited coverage of the transmitted optical signal, in our OHCPP, the ENs within the transmitters' carrier sense region could be retained provided that they could not corrupt the ongoing communications. Moreover, because of the directionality of both light emitting diode (LED) transmitters and receivers, theoretical analysis of the HN problem becomes difficult. In this paper, we derive the closed-form expression for approximating the outage probability and transmission capacity of VLC networks with the presence of HNs and ENs. Simulation results validate the analysis and also show the existence of an optimal physical carrier-sensing threshold that maximizes the transmission capacity for a given emission angle of LED.

  7. Multiple channel programmable coincidence counter

    Science.gov (United States)

    Arnone, Gaetano J.

    1990-01-01

    A programmable digital coincidence counter having multiple channels and featuring minimal dead time. Neutron detectors supply electrical pulses to a synchronizing circuit which in turn inputs derandomized pulses to an adding circuit. A random access memory circuit connected as a programmable length shift register receives and shifts the sum of the pulses, and outputs to a serializer. A counter is input by the adding circuit and downcounted by the seralizer, one pulse at a time. The decoded contents of the counter after each decrement is output to scalers.

  8. On Planning of FTTH Access Networks with and without Redundancy

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Haraldsson, Gustav; Gutierrez Lopez, Jose Manuel

    2010-01-01

    This paper presents a planning analysis of FTTH access network with and without redundancy. Traditionally, access networks are planned only without redundancy, which is mainly due to lowering the cost of deployment. As fiber optics provide a huge amount of capacity, more and more services are being...... offered on a single fiber connection. As a single point of failure in fiber connection can cause multiple service deprivation therefore redundancy is very crucial. In this work, an automated planning model was used to test different scenarios of implementation. A cost estimation is presented in terms...... of digging and amount of fiber used. Three topologies, including the traditional one “tree topology”, were test with combination of various passive optical technologies....

  9. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  10. How does electronic cigarette access affect adolescent smoking?

    Science.gov (United States)

    Friedman, Abigail S

    2015-12-01

    Understanding electronic cigarettes' effect on tobacco smoking is a central economic and policy issue. This paper examines the causal impact of e-cigarette access on conventional cigarette use by adolescents. Regression analyses consider how state bans on e-cigarette sales to minors influence smoking rates among 12 to 17 year olds. Such bans yield a statistically significant 0.9 percentage point increase in recent smoking in this age group, relative to states without such bans. Results are robust to multiple specifications as well as several falsification and placebo checks. This effect is both consistent with e-cigarette access reducing smoking among minors, and large: banning electronic cigarette sales to minors counteracts 70 percent of the downward pre-trend in teen cigarette smoking for a given two-year period. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

    Directory of Open Access Journals (Sweden)

    Davy Preuveneers

    2017-09-01

    Full Text Available Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate microservice based data processing workflows from a security point of view, i.e., (1 how to constrain data processing workflows with respect to dynamic authorization policies granting or denying access to certain microservice results depending on the flow of the data; (2 how to let multiple microservices contribute to a collective data-driven authorization decision and (3 how to put adequate measures in place such that the data within each individual microservice is protected against illegitimate access from unauthorized users or other microservices. Due to this multifold objective, enforcing access control on the data endpoints to prevent information leakage or preserve one’s privacy becomes far more challenging, as authorization policies can have dependencies and decision outcomes cross-cutting data in multiple microservices. To address this challenge, we present and evaluate a workflow-oriented authorization framework that enforces authorization policies in a decentralized manner and where the delegated policy evaluation leverages feature toggles that are managed at runtime by software circuit breakers to secure the distributed data processing workflows. The benefit of our solution is that, on the one hand, authorization policies restrict access to the data endpoints of the microservices, and on the other hand, microservices can safely rely on other data endpoints to collectively evaluate cross-cutting access control decisions without having to rely on a shared storage backend holding all the necessary information for the policy evaluation.

  12. Policies and programs to facilitate access to targeted cancer therapies in Thailand.

    Directory of Open Access Journals (Sweden)

    Rosarin Sruamsiri

    Full Text Available Increasing access to clinically beneficial targeted cancer medicines is a challenge in every country due to their high cost. We describe the interplay of innovative policies and programs involving multiple stakeholders to facilitate access to these medicines in Thailand, as well as the utilization of selected targeted therapies over time.We selected two medicines on the 2013 Thai national list of essential medicines (NLEM [letrozole and imatinib] and three unlisted medicines for the same indications [trastuzumab, nilotinib and dasatinib]. We created timelines of access policies and programs for these products based on scientific and grey literature. Using IMS Health sales data, we described the trajectories of sales volumes of the study medicines between January 2001 and December 2012. We compared estimated average numbers of patients treated before and after the implementation of policies and programs for each product.Different stakeholders implemented multiple interventions to increase access to the study medicines for different patient populations. During 2007-2009, the Thai Government created a special NLEM category with different coverage requirements for payers and issued compulsory licenses; payers negotiated prices with manufacturers and engaged in pooled procurement; pharmaceutical companies expanded patient assistance programs and lowered prices in different ways. Compared to before the interventions, estimated numbers of patients treated with each medicine increased significantly afterwards: for letrozole from 645 (95% CI 366-923 to 3683 (95% CI 2,748-4,618; for imatinib from 103 (95% CI 72-174 to 350 (95% CI 307-398; and for trastuzumab from 68 (95% CI 45-118 to 412 (95% CI 344-563.Government, payers, and manufacturers implemented multi-pronged approaches to facilitate access to targeted cancer therapies for the Thai population, which differed by medicine. Routine monitoring is needed to assess clinical and economic impacts of these

  13. Multiple carcinomas in the hemodialysis access induced ischemic hand of a renal transplant patient.

    NARCIS (Netherlands)

    Hoek, F. van; Tits, H.W.H.J.; Lijnschoten, I. Van; Haas, B.D. De; Scheltinga, M.R.M.

    2010-01-01

    Long term immunosuppression following organ transplantation promotes the onset of skin cancers. A renal transplant patient developed multiple hyperkeratotic nodi in the left hand and digital pain following prolonged immunosuppression. Several skin abnormalities were observed in an ischemic and

  14. The effect of menstruation on chosen physiological and biochemical reactions caused by the physical effort with the submaximal intensity

    Directory of Open Access Journals (Sweden)

    P Zieliński

    2003-03-01

    Full Text Available The aim of this work was to determine the influence of the menstruation phase on changes of respective indicators of the gas exchange and on biochemical parameters of blood during physical efforts with the sub-maximal intensity. Fifteen female students of the Academy of Physical Education took part in the study. Girls were aged from 19 to 22 years old and did not practice sports. The effort tests were conducted in the follicular and luteal phase of two succeeding menstrual cycles. As far the aerobic capacity determination is concerned, one cyclo-ergometric test with graded effort was conducted and it was performed till the “refusal”. It allowed to mark a threshold (TDMA and a maximal level of physiological and biochemical indicators. Basing on the results of the graded test individual loads were determined for every next effort trial (repeated 4 times in every phase of the two succeeding menstrual cycles. The aim of this trial was to evaluate the reaction of women’s constitution on work with the sub-maximal intensity. The above trial consisted on two 10 min efforts divided with the 2 min pause (the first effort with the intensity of 80% of the TDMA threshold, second with the intensity bigger about 30-40% of difference between TDMA and a maximal load established by the graded test. The research did not reveal statistically significant differentiation as considering effort changes of basic physiological and biochemical indicators, determining reaction of women’s organisms on work with the sub- and over- threshold intensity (TDMA. It showed that menstruation has not significant effect on the level of changes of analysed parameters caused by the physical effort with the sub-maximal intensity.

  15. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  16. Improving access to medicines in low and middle income countries: corporate responsibilities in context.

    Science.gov (United States)

    Leisinger, Klaus Michael; Garabedian, Laura Faden; Wagner, Anita Katharina

    2012-12-01

    More than two billion people in low- and middle-income countries (LMIC) lack adequate access to essential medicines. In this paper, we make strong public health, human rights and economic arguments for improving access to medicines in LMIC and discuss the different roles and responsibilities of key stakeholders, including national governments, the international community, and non-governmental organizations (NGOs). We then establish a framework of pharmaceutical firms' corporate responsibilities - the "must," the "ought to," and the "can" dimensions - and make recommendations for actionable business strategies for improving access to medicines. We discuss controversial topics, such as pharmaceutical profits and patents, with the goal of building consensus around facts and working towards a solution. We conclude that partnerships and collaboration among multiple stakeholders are urgently needed to improve equitable access to medicines in LMIC.

  17. Assessing the model transferability for prediction of transcription factor binding sites based on chromatin accessibility.

    Science.gov (United States)

    Liu, Sheng; Zibetti, Cristina; Wan, Jun; Wang, Guohua; Blackshaw, Seth; Qian, Jiang

    2017-07-27

    Computational prediction of transcription factor (TF) binding sites in different cell types is challenging. Recent technology development allows us to determine the genome-wide chromatin accessibility in various cellular and developmental contexts. The chromatin accessibility profiles provide useful information in prediction of TF binding events in various physiological conditions. Furthermore, ChIP-Seq analysis was used to determine genome-wide binding sites for a range of different TFs in multiple cell types. Integration of these two types of genomic information can improve the prediction of TF binding events. We assessed to what extent a model built upon on other TFs and/or other cell types could be used to predict the binding sites of TFs of interest. A random forest model was built using a set of cell type-independent features such as specific sequences recognized by the TFs and evolutionary conservation, as well as cell type-specific features derived from chromatin accessibility data. Our analysis suggested that the models learned from other TFs and/or cell lines performed almost as well as the model learned from the target TF in the cell type of interest. Interestingly, models based on multiple TFs performed better than single-TF models. Finally, we proposed a universal model, BPAC, which was generated using ChIP-Seq data from multiple TFs in various cell types. Integrating chromatin accessibility information with sequence information improves prediction of TF binding.The prediction of TF binding is transferable across TFs and/or cell lines suggesting there are a set of universal "rules". A computational tool was developed to predict TF binding sites based on the universal "rules".

  18. Single port access for laparoscopic lateral segmentectomy.

    Science.gov (United States)

    Inoue, Yoshihiro; Asakuma, Mitsuhiro; Hirokawa, Fumitoshi; Hayashi, Michihiro; Shimizu, Tetsunosuke; Uchiyama, Kazuhisa

    2017-12-01

    Single-port access laparoscopic lateral segmentectomy (LLS) has been developed as a novel minimally invasive surgery. We have experience with this LLS technique. To report our technique and patients' postoperative course in a series of single-port access LLS performed in our department. We also examine the cosmetic outcome, safety, and utility of the procedure. Between February 2010 and October 2016, 54 patients who underwent single- or multiple-port laparoscopic or open lateral segmentectomy (LS) were retrospectively analyzed with respect to cosmetic outcome, safety, and utility. In the single LLS group, the laparoscopic procedure was successfully completed for all 14 patients. The median operative time was significantly shorter in the single LLS group (123 min; range: 50-270 min) than in the other groups. Estimated blood loss was also significantly lower in the single LLS group (10 ml; range: 0-330 ml). During the first 7 postoperative days, the visual analog scale pain score and the use of additional analgesia were not significantly different between groups. The single LLS group had a 7.1% complication rate (Clavien-Dindo classification > IIIA); this was not significantly different between groups. Single-port access LLS is a procedure with excellent cosmetic results, although, with regard to invasiveness, there are no major differences from conventional LLS.

  19. A JEE RESTful service to access Conditions Data in ATLAS

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00081940; Gallas, Elizabeth

    2015-01-01

    Usage of Conditions Data in ATLAS is extensive for offline reconstruction and analysis (e.g.: alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemata (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemata at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of a Java application providing DB access via RESTful services, deployed inside an application server (JBoss WildFly). The services allow navigation over multiple schemata via simple URLs. The data can be retrieved either in XML or JSON formats, via simple clients (like curl or Web browser...

  20. A JEE RESTful service to access Conditions Data in ATLAS

    CERN Document Server

    Formica, Andrea; The ATLAS collaboration

    2015-01-01

    Usage of Conditions Data in ATLAS is extensive for offline reconstruction and analysis (for example: alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemas (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemas at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of an intermediate java application server (JBoss), where an application delivering access to the DB via RESTful services has been deployed. The services allow navigation over multiple schema content, via simple URLs. The queried data can be retrieved either in XML or JSON formats, vi...

  1. A JEE RESTful service to access Conditions Data in ATLAS

    Science.gov (United States)

    Formica, Andrea; Gallas, E. J.

    2015-12-01

    Usage of condition data in ATLAS is extensive for offline reconstruction and analysis (e.g. alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemas (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemas at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of a Java application providing DB access via REST services, deployed inside an application server (JBoss WildFly). The services allow navigation over multiple schemas via simple URLs. The data can be retrieved either in XML or JSON formats, via simple clients (like curl or Web browsers).

  2. Acquired Severe Disabilities and Complex Health Care Needs: Access to Inclusive Education

    Science.gov (United States)

    Ballard, Sarah L.; Dymond, Stacy K.

    2016-01-01

    This case study examined one high school student's access to inclusive education and experiences in an inclusive English class after he acquired severe disabilities and complex health care needs from a nontraumatic brain injury. Multiple sources of data (i.e., interviews, field notes, and documents) were collected and analyzed to formulate…

  3. Energy challenges in optical access and aggregation networks.

    Science.gov (United States)

    Kilper, Daniel C; Rastegarfar, Houman

    2016-03-06

    Scalability is a critical issue for access and aggregation networks as they must support the growth in both the size of data capacity demands and the multiplicity of access points. The number of connected devices, the Internet of Things, is growing to the tens of billions. Prevailing communication paradigms are reaching physical limitations that make continued growth problematic. Challenges are emerging in electronic and optical systems and energy increasingly plays a central role. With the spectral efficiency of optical systems approaching the Shannon limit, increasing parallelism is required to support higher capacities. For electronic systems, as the density and speed increases, the total system energy, thermal density and energy per bit are moving into regimes that become impractical to support-for example requiring single-chip processor powers above the 100 W limit common today. We examine communication network scaling and energy use from the Internet core down to the computer processor core and consider implications for optical networks. Optical switching in data centres is identified as a potential model from which scalable access and aggregation networks for the future Internet, with the application of integrated photonic devices and intelligent hybrid networking, will emerge. © 2016 The Author(s).

  4. Despite Increased Insurance Coverage, Nonwhite Sexual Minorities Still Experience Disparities In Access To Care.

    Science.gov (United States)

    Hsieh, Ning; Ruther, Matt

    2017-10-01

    Previous studies suggest that members of sexual minority groups have poorer access to health services than heterosexuals. However, few studies have examined how sexual orientation interacts with gender and race to affect health care experience. Moreover, little is known about the role in health care disparities played by economic strains such as unemployment and poverty, which may result from prejudice and discrimination based on sexual orientation. Using data for 2013-15 from the National Health Interview Survey, we found that most members of sexual minority groups no longer have higher uninsurance rates than heterosexuals, but many continue to experience poorer access to high-quality care. Gay nonwhite men, bisexual white women, and bisexual and lesbian nonwhite women are disadvantaged in multiple aspects of access, compared to straight white men. Only some of these disparities are attributable to economic factors, which implies that noneconomic barriers to care are substantial. Our results suggest that the intersection of multiple social identities can reveal important gaps in health care experience. Making culturally sensitive services available may be key to closing the gaps. Project HOPE—The People-to-People Health Foundation, Inc.

  5. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to

  6. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    Leach, M J; Sumikawa, D; Webster, C

    1999-01-01

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  7. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  8. High Dimensional Modulation and MIMO Techniques for Access Networks

    DEFF Research Database (Denmark)

    Binti Othman, Maisara

    Exploration of advanced modulation formats and multiplexing techniques for next generation optical access networks are of interest as promising solutions for delivering multiple services to end-users. This thesis addresses this from two different angles: high dimensionality carrierless...... the capacity per wavelength of the femto-cell network. Bit rate up to 1.59 Gbps with fiber-wireless transmission over 1 m air distance is demonstrated. The results presented in this thesis demonstrate the feasibility of high dimensionality CAP in increasing the number of dimensions and their potentially......) optical access network. 2 X 2 MIMO RoF employing orthogonal frequency division multiplexing (OFDM) with 5.6 GHz RoF signaling over all-vertical cavity surface emitting lasers (VCSEL) WDM passive optical networks (PONs). We have employed polarization division multiplexing (PDM) to further increase...

  9. A Microstrip Patch-Fed Short Backfire Antenna for the Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) Array

    Science.gov (United States)

    Nessel, James A.; Kory, Carol L.; Lambert, Kevin M.; Acosta, Roberto J.

    2006-01-01

    Short Backfire Antennas (SBAs) are widely utilized for mobile satellite communications, tracking, telemetry, and wireless local area network (WLAN) applications due to their compact structure and excellent radiation characteristics [1-3]. Typically, these SBA s consist of an excitation element (i.e., a half-wavelength dipole), a reflective bottom plane, a planar sub-reflector located above the "exciter", and an outer circular rim. This configuration is capable of achieving gains on the order of 13-15 dBi, but with relatively narrow bandwidths (approx.3%-5%), making it incompatible with the requirements of the next generation enhanced Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) array [1]. Several attempts have been made to enhance the bandwidth performance of the common dipole-fed SBA by employing various other feeding mechanisms (e.g., waveguide, slot) with moderate success [4-5]. In this paper, a novel method of using a microstrip patch is employed for the first time to excite an SBA. The patch element is fed via two H-shaped slots electromagnetically coupled to a broadband hybrid coupler to maintain a wide bandwidth, as well as provide for dual circular polarization capabilities.

  10. Routes to DNA Accessibility: Alternative Pathways for Nucleosome Unwinding

    OpenAIRE

    Schlingman, Daniel J.; Mack, Andrew H.; Kamenetska, Masha; Mochrie, Simon G.J.; Regan, Lynne

    2014-01-01

    The dynamic packaging of DNA into chromatin is a key determinant of eukaryotic gene regulation and epigenetic inheritance. Nucleosomes are the basic unit of chromatin, and therefore the accessible states of the nucleosome must be the starting point for mechanistic models regarding these essential processes. Although the existence of different unwound nucleosome states has been hypothesized, there have been few studies of these states. The consequences of multiple states are far reaching. Thes...

  11. Who's Got the Booze? The Role of Access to Alcohol in the Relations Between Social Status and Individual Use.

    Science.gov (United States)

    Deutsch, Arielle R; Steinley, Douglas; Sher, Kenneth J; Slutske, Wendy S

    2017-09-01

    The findings of previous research that examined relationships between popularity and alcohol use in adolescents have been mixed, and few hypotheses have proposed mechanisms for this relationship. The current study expands on previous literature (a) by examining a possible mechanism that can explain the relation between popularity and alcohol use (home access to alcohol) and (b) by using another sociometric measure ("betweenness"), beyond popularity, that may relate more to home alcohol access. Using network-level data from adolescents in 9th-11th grades in eight schools within two in-home waves of the National Longitudinal Study of Adolescent to Adult Health (Add Health), we examined two sociometric measures of social status: popularity (number of schoolmates who nominated participants as a friend) and betweenness (level of ties participants have to multiple social subgroups within a network). Betweenness, but not popularity, related to later alcohol use. Having home access to alcohol positively related to later alcohol use, and having friends with home access to alcohol negatively related to later alcohol use. Alcohol access was also related to later sociometric status. Friends' alcohol access negatively related to later betweenness, and personal alcohol access moderated other pathways predicting betweenness. Betweenness appears to play a unique role in the association between social status and alcohol use in adolescent social networks. This is potentially tied to specific ways in which adolescents may be able to access alcohol (through home or through friends with access at home). More research is necessary to examine the ways in which multiple sociometric statuses relate to the contexts in which adolescents access and use alcohol.

  12. Wheelchair users, access and exclusion in South African higher education.

    Science.gov (United States)

    Chiwandire, Desire; Vincent, Louise

    2017-01-01

    South Africa's Constitution guarantees everyone, including persons with disabilities, the right to education. A variety of laws are in place obliging higher education institutions to provide appropriate physical access to education sites for all. In practice, however, many buildings remain inaccessible to people with physical disabilities. To describe what measures South African universities are taking to make their built environments more accessible to students with diverse types of disabilities, and to assess the adequacy of such measures. We conducted semi-structured in-depth face-to-face interviews with disability unit staff members (DUSMs) based at 10 different public universities in South Africa. Challenges with promoting higher education accessibility for wheelchair users include the preservation and heritage justification for failing to modify older buildings, ad hoc approaches to creating accessible environments and failure to address access to toilets, libraries and transport facilities for wheelchair users. South African universities are still not places where all students are equally able to integrate socially. DUSMs know what ought to be done to make campuses more accessible and welcoming to students with disabilities and should be empowered to play a leading role in sensitising non-disabled members of universities, to create greater awareness of, and appreciation for, the multiple ways in which wheelchair user students continue to be excluded from full participation in university life. South African universities need to adopt a systemic approach to inclusion, which fosters an understanding of inclusion as a fundamental right rather than as a luxury.

  13. Learning Task Knowledge from Dialog and Web Access

    Directory of Open Access Journals (Sweden)

    Vittorio Perera

    2015-06-01

    Full Text Available We present KnoWDiaL, an approach for Learning and using task-relevant Knowledge from human-robot Dialog and access to the Web. KnoWDiaL assumes that there is an autonomous agent that performs tasks, as requested by humans through speech. The agent needs to “understand” the request, (i.e., to fully ground the task until it can proceed to plan for and execute it. KnoWDiaL contributes such understanding by using and updating a Knowledge Base, by dialoguing with the user, and by accessing the web. We believe that KnoWDiaL, as we present it, can be applied to general autonomous agents. However, we focus on our work with our autonomous collaborative robot, CoBot, which executes service tasks in a building, moving around and transporting objects between locations. Hence, the knowledge acquired and accessed consists of groundings of language to robot actions, and building locations, persons, and objects. KnoWDiaL handles the interpretation of voice commands, is robust regarding speech recognition errors, and is able to learn commands involving referring expressions in an open domain, (i.e., without requiring a lexicon. We present in detail the multiple components of KnoWDiaL, namely a frame-semantic parser, a probabilistic grounding model, a web-based predicate evaluator, a dialog manager, and the weighted predicate-based Knowledge Base. We illustrate the knowledge access and updates from the dialog and Web access, through detailed and complete examples. We further evaluate the correctness of the predicate instances learned into the Knowledge Base, and show the increase in dialog efficiency as a function of the number of interactions. We have extensively and successfully used KnoWDiaL in CoBot dialoguing and accessing the Web, and extract a few corresponding example sequences from captured videos.

  14. Radiation exposure and patient experience during percutaneous coronary intervention using radial and femoral artery access

    International Nuclear Information System (INIS)

    Geijer, Haakan; Persliden, Jan

    2004-01-01

    The aim of this study was to evaluate radiation dose and patient discomfort/pain in radial artery access vs femoral artery access in percutaneous coronary intervention (PCI). Dose-area product (DAP) was measured non-randomised for 114 procedures using femoral access and for 55 using radial access. The patients also responded to a questionnaire concerning discomfort and pain during and after the procedure. The mean DAP was 69.8 Gy cm 2 using femoral access and 70.5 Gy cm 2 using radial access. Separating the access site from confounding factors with a multiple regression, there was a 13% reduction in DAP when using radial access (p=0.038). Procedure times did not differ (p=0.81). Bed confinement was much longer in the femoral access group (448 vs 76 min, p=0.000). With femoral access, there was a significantly higher patient grading for chest (p=0.001) and back pain (p=0.003) during the procedure and for access site (p=0.000) and back pain (p=0.000) after the procedure. Thirty-two femoral access patients (28%) were given morphine-type analgesics in the post-procedure period compared to three radial access patients (5%, p=0.001). DAP does not increase when using radial instead of femoral access and the patients grade discomfort and pain much lower when using radial access. Radial access is thus beneficial to use. (orig.)

  15. Multiple social identities and stereotype threat: imbalance, accessibility, and working memory.

    Science.gov (United States)

    Rydell, Robert J; McConnell, Allen R; Beilock, Sian L

    2009-05-01

    In 4 experiments, the authors showed that concurrently making positive and negative self-relevant stereotypes available about performance in the same ability domain can eliminate stereotype threat effects. Replicating past work, the authors demonstrated that introducing negative stereotypes about women's math performance activated participants' female social identity and hurt their math performance (i.e., stereotype threat) by reducing working memory. Moving beyond past work, it was also demonstrated that concomitantly presenting a positive self-relevant stereotype (e.g., college students are good at math) increased the relative accessibility of females' college student identity and inhibited their gender identity, eliminating attendant working memory deficits and contingent math performance decrements. Furthermore, subtle manipulations in questions presented in the demographic section of a math test eliminated stereotype threat effects that result from women reporting their gender before completing the test. This work identifies the motivated processes through which people's social identities became active in situations in which self-relevant stereotypes about a stigmatized group membership and a nonstigmatized group membership were available. In addition, it demonstrates the downstream consequences of this pattern of activation on working memory and performance. Copyright (c) 2009 APA, all rights reserved.

  16. Capacity bounds for the 2-user Gaussian IM-DD optical multiple-access channel

    KAUST Repository

    Al-Ebraheemy, Omer M. S.

    2016-11-01

    Optical wireless communications (OWC) is a potential solution for coping with the mismatch between the users growing demand for higher data-rates and the wireless network capabilities. In this paper, a multi-user OWC scenario is studied from an in formation-theoretic perspective. The studied network consists of two users communicating simultaneously with one access point using OWC, thus establishing an optical uplink channel. The capacity of this network is an important metric which reflects the highest possible communication rates that can be achieved over this channel. Capacity outer and inner bounds are derived, and are shown to be fairly tight in the high signal-to-noise ratio regime. © 2016 IEEE.

  17. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  18. Distributed Storage Algorithm for Geospatial Image Data Based on Data Access Patterns.

    Directory of Open Access Journals (Sweden)

    Shaoming Pan

    Full Text Available Declustering techniques are widely used in distributed environments to reduce query response time through parallel I/O by splitting large files into several small blocks and then distributing those blocks among multiple storage nodes. Unfortunately, however, many small geospatial image data files cannot be further split for distributed storage. In this paper, we propose a complete theoretical system for the distributed storage of small geospatial image data files based on mining the access patterns of geospatial image data using their historical access log information. First, an algorithm is developed to construct an access correlation matrix based on the analysis of the log information, which reveals the patterns of access to the geospatial image data. Then, a practical heuristic algorithm is developed to determine a reasonable solution based on the access correlation matrix. Finally, a number of comparative experiments are presented, demonstrating that our algorithm displays a higher total parallel access probability than those of other algorithms by approximately 10-15% and that the performance can be further improved by more than 20% by simultaneously applying a copy storage strategy. These experiments show that the algorithm can be applied in distributed environments to help realize parallel I/O and thereby improve system performance.

  19. Distributed Storage Algorithm for Geospatial Image Data Based on Data Access Patterns.

    Science.gov (United States)

    Pan, Shaoming; Li, Yongkai; Xu, Zhengquan; Chong, Yanwen

    2015-01-01

    Declustering techniques are widely used in distributed environments to reduce query response time through parallel I/O by splitting large files into several small blocks and then distributing those blocks among multiple storage nodes. Unfortunately, however, many small geospatial image data files cannot be further split for distributed storage. In this paper, we propose a complete theoretical system for the distributed storage of small geospatial image data files based on mining the access patterns of geospatial image data using their historical access log information. First, an algorithm is developed to construct an access correlation matrix based on the analysis of the log information, which reveals the patterns of access to the geospatial image data. Then, a practical heuristic algorithm is developed to determine a reasonable solution based on the access correlation matrix. Finally, a number of comparative experiments are presented, demonstrating that our algorithm displays a higher total parallel access probability than those of other algorithms by approximately 10-15% and that the performance can be further improved by more than 20% by simultaneously applying a copy storage strategy. These experiments show that the algorithm can be applied in distributed environments to help realize parallel I/O and thereby improve system performance.

  20. Simulation of neutron multiplicity measurements using Geant4. Open source software for nuclear arms control

    Energy Technology Data Exchange (ETDEWEB)

    Kuett, Moritz

    2016-07-07

    Nuclear arms control, including nuclear safeguards and verification technologies for nuclear disarmament typically use software as part of many different technological applications. This thesis proposes to use three open source criteria for such software, allowing users and developers to have free access to a program, have access to the full source code and be able to publish modifications for the program. This proposition is presented and analyzed in detail, together with the description of the development of ''Open Neutron Multiplicity Simulation'', an open source software tool to simulate neutron multiplicity measurements. The description includes physical background of the method, details of the developed program and a comprehensive set of validation calculations.

  1. A sustainable business model for Open-Access journal publishing: a proposed plan for High-Energy Physics

    Directory of Open Access Journals (Sweden)

    Jens Vigen

    2008-01-01

    Full Text Available The High Energy Physics community over the last 15 years has achieved so-called full green Open Access through the wide dissemination of preprints via arXiv, a central subject repository managed by Cornell University. However, green Open Access does not alleviate the economic difficulties of libraries as they are still expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold Open Access by converting a set of the existing core journals to Open Access. A Working Party has been established to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics. This consortium will engage with publishers to build a sustainable model for Open Access publishing. In this model, subscription fees from multiple institutions are replaced by contracts with publishers of Open Access journals, where the SCOAP3 consortium is a single financial partner.

  2. Straight configuration saphenous vein transposition to popliteal artery for vascular access.

    Science.gov (United States)

    Caco, Gentian; Golemi, Dhurata; Likaj, Eriola

    2017-03-21

    The saphenous vein is commonly used as a vascular graft in peripheral artery surgery but rarely used for vascular access. The literature on straight configuration saphenous vein transposition to the popliteal artery is scarce. Here we present two cases of straight configuration saphenous vein transposition to the popliteal artery for vascular access, the surgical technique and respective follow-up. Two young men, aged 29 and 36 years, were chosen for lower-limb vascular access for hemodialysis. The first patient was paraplegic since birth. He used his arms to move so upper extremity vascular access was avoided. The second patient presented with an infected upper extremity arteriovenous graft (AVG) and after multiple closed AVFs he had no more available arm veins. Both patients received autologous lower extremity straight configuration saphenous vein transpositions to the popliteal artery under spinal anesthesia in May and October 2012, respectively. Cannulation of the fistula was allowed after one month. There were no early complications. Slight swelling on the leg appeared in one of the patients. Both fistulas were still functional after 36 and 32 months, respectively. The straight configuration saphenous vein transposition to popliteal artery is simple to perform, offers a long and straight segment for cannulation and may be a suitable autologous vascular access in selected patients.

  3. Medicaid expansion and access to care among cancer survivors: a baseline overview.

    Science.gov (United States)

    Tarazi, Wafa W; Bradley, Cathy J; Harless, David W; Bear, Harry D; Sabik, Lindsay M

    2016-06-01

    Medicaid expansion under the Affordable Care Act facilitates access to care among vulnerable populations, but 21 states have not yet expanded the program. Medicaid expansions may provide increased access to care for cancer survivors, a growing population with chronic conditions. We compare access to health care services among cancer survivors living in non-expansion states to those living in expansion states, prior to Medicaid expansion under the Affordable Care Act. We use the 2012 and 2013 Behavioral Risk Factor Surveillance System to estimate multiple logistic regression models to compare inability to see a doctor because of cost, having a personal doctor, and receiving an annual checkup in the past year between cancer survivors who lived in non-expansion states and survivors who lived in expansion states. Cancer survivors in non-expansion states had statistically significantly lower odds of having a personal doctor (adjusted odds ratio [AOR] 0.76, 95 % confidence interval [CI] 0.63-0.92, p Medicaid could potentially leave many cancer survivors with limited access to routine care. Existing disparities in access to care are likely to widen between cancer survivors in Medicaid non-expansion and expansion states.

  4. Apollo: giving application developers a single point of access to public health models using structured vocabularies and Web services.

    Science.gov (United States)

    Wagner, Michael M; Levander, John D; Brown, Shawn; Hogan, William R; Millett, Nicholas; Hanna, Josh

    2013-01-01

    This paper describes the Apollo Web Services and Apollo-SV, its related ontology. The Apollo Web Services give an end-user application a single point of access to multiple epidemic simulators. An end user can specify an analytic problem-which we define as a configuration and a query of results-exactly once and submit it to multiple epidemic simulators. The end user represents the analytic problem using a standard syntax and vocabulary, not the native languages of the simulators. We have demonstrated the feasibility of this design by implementing a set of Apollo services that provide access to two epidemic simulators and two visualizer services.

  5. Efficient access of compressed data

    International Nuclear Information System (INIS)

    Eggers, S.J.; Shoshani, A.

    1980-06-01

    A compression technique is presented that allows a high degree of compression but requires only logarithmic access time. The technique is a constant suppression scheme, and is most applicable to stable databases whose distribution of constants is fairly clustered. Furthermore, the repeated use of the technique permits the suppression of a multiple number of different constants. Of particular interest is the application of the constant suppression technique to databases the composite key of which is made up of an incomplete cross product of several attribute domains. The scheme for compressing the full cross product composite key is well known. This paper, however, also handles the general, incomplete case by applying the constant suppression technique in conjunction with a composite key suppression scheme

  6. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  7. Two-port access versus four-port access laparoscopic ovarian cystectomy.

    Science.gov (United States)

    Choi, Won-Kyu; Kim, Jang-Kew; Yang, Jung-Bo; Ko, Young-Bok; Nam, Sang-Lyun; Lee, Ki-Hwan

    2014-09-01

    This study was conducted to compare the surgical outcomes between two-port access and four-port access laparoscopic ovarian cystectomy. Four hundred and eighty nine patients who had received two-port access laparoscopic ovarian cystectomy (n=175) and four-port access laparoscopic ovarian cystectomy (n=314) in Chungnam National University Hospital from January 2009 to August 2012 were analyzed retrospectively. The data were compared between the bilaterality of the cysts and cyst diameter of less than 6 cm and 6 cm or more. There were no significant differences in patient's age, parity, body weight, body mass index and history of previous surgery between the two-port and four-port access laparoscopy group. Bilaterality of ovarian cysts was more in fourport access laparoscopy group (13.7% vs. 32.5%, P=0.000). There were no significant differences in operation time, hemoglobin change, hospital stay, adhesiolysis, transfusion, and insertion of hemo-vac between the two-port and four-port access laparoscopy group for size matched compare. However additional analgesics were more in four-port access laparoscopy group for unilateral ovarian cystectomy. Two-port access laparoscopic surgery was feasible and safe for unilateral and bilateral ovarian cystectomy compare with four-port access laparoscopic surgery.

  8. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  9. Registration, Access and Use of Personal Knowledge in Organizations

    DEFF Research Database (Denmark)

    Haraldsdottir, Ragna Kemp; Gunnlaugsdóttir, Jóhanna; Hvannberg, Ebba Thora

    2018-01-01

    demonstrate that organizational strategies portray elaborate intentions regarding knowledge seeking and sharing, while less emphasis is put on knowledge registration or management. Interviewees expressed lack of appropriate actions to support PKR. Access and use of PKR is limited and the organizations still...... organizations support PKR, and how PKR facilitates the flow of information and knowledge. This paper examines how different information management professionals access and use PKR. It is a multiple case study, with 43 semi-structured interviews and an analysis of strategic documents. The purpose is to shed...... light on strategic intentions with PKR, its collaborative tasks and qualities. A conceptual model was built for this purpose. The aim is to better understand how PKR works and to examine how information on education, training and the skills of employees is managed in organizations. The findings...

  10. Remote Sensing Open Access Journal: Increasing Impact through Quality Publications

    Directory of Open Access Journals (Sweden)

    Prasad S. Thenkabail

    2014-08-01

    Full Text Available Remote Sensing, an open access journal (http://www.mdpi.com/journal/remotesensing has grown at rapid pace since its first publication five years ago, and has acquired a strong reputation. It is a “pathfinder” being the first open access journal in remote sensing. For those academics who were used to waiting a year or two for their peer-reviewed scientific work to be reviewed, revised, edited, and published, Remote Sensing offers a publication time frame that is unheard of (in most cases, less than four months. However, we do this after multiple peer-reviews, multiple revisions, much editorial scrutiny and decision-making, and professional editing by an editorial office before a paper is published online in our tight time frame, bringing a paradigm shift in scientific publication. As a result, there has been a swift increase in submissions of higher and higher quality manuscripts from the best authors and institutes working on Remote Sensing, Geographic Information Systems (GIS, Global Navigation Satellite System (GNSS, GIScience, and all related geospatial science and technologies from around the world. The purpose of this editorial is to update everyone interested in Remote Sensing on the progress made over the last year, and provide an outline of our vision for the immediate future. [...

  11. Front/back office considerations in the operational access to long-term care for older people : Findings of a multiple case study

    NARCIS (Netherlands)

    Schipper, E.C.C.; Meijboom, B.R.; Luijkx, K.G.; Schols, J.M.G.A.

    2013-01-01

    Background Organizations that provide long-term care in the Netherlands are reconsidering the operational access to their services. Principles of operations management, such as front/back office configurations, might improve the redesign of operational access. Once a client gains entrance to the

  12. Endoscopic treatment of multilocular walled-off pancreatic necrosis with the multiple transluminal gateway technique.

    Science.gov (United States)

    Jagielski, Mateusz; Smoczyński, Marian; Adrych, Krystian

    2017-06-01

    The development of minimally invasive techniques allowed access to the necrotic cavity through transperitoneal, retroperitoneal, transmural and transpapillary routes. The choice of access to walled-off pancreatic necrosis (WOPN) should depend not only on the spread of necrosis, but also on the experience of the clinical center. Herein we describe treatment of a patient with multilocular symptomatic walled-off pancreatic necrosis using minimally invasive techniques. The single transmural access (single transluminal gateway technique - SGT) to the necrotic collection of the patient was ineffective. The second gastrocystostomy was performed using the same minimally invasive technique as an extra way of access to the necrosis (multiple transluminal gateway technique - MTGT). In the described case the performance of the new technique consisting in endoscopic multiplexing transmural access (MTGT) was effective enough and led to complete recovery of the patient.

  13. How resource poor households value and access poultry: Village poultry keeping in Tigray, Ethiopia

    NARCIS (Netherlands)

    Aklilu, H.A.; Udo, H.M.J.; Almekinders, C.J.M.; Zijpp, van der A.J.

    2008-01-01

    This study examines the role of poultry in the livelihoods of rural households and the ownership of poultry and related technology in three locations with different market access in Tigray, Ethiopia. The study employed multiple methods such as individual and group open interviews, a cross-sectional

  14. Open access

    NARCIS (Netherlands)

    Valkenburg, P.M.

    2015-01-01

    Open access week Van 19 tot en met 25 oktober 2015 vond wereldwijd de Open Access Week plaats. Tijdens deze week werden er over de hele wereld evenementen georganiseerd waar open access een rol speelt. Ook in Nederland zijn er diverse symposia, workshops en debatten georganiseerd zoals het debat in

  15. Video Modeling and Observational Learning to Teach Gaming Access to Students with ASD

    Science.gov (United States)

    Spriggs, Amy D.; Gast, David L.; Knight, Victoria F.

    2016-01-01

    The purpose of this study was to evaluate both video modeling and observational learning to teach age-appropriate recreation and leisure skills (i.e., accessing video games) to students with autism spectrum disorder. Effects of video modeling were evaluated via a multiple probe design across participants and criteria for mastery were based on…

  16. Optimality of Multichannel Myopic Sensing in the Presence of Sensing Error for Opportunistic Spectrum Access

    Directory of Open Access Journals (Sweden)

    Xiaofeng Jiang

    2013-01-01

    Full Text Available The optimization problem for the performance of opportunistic spectrum access is considered in this study. A user, with the limited sensing capacity, has opportunistic access to a communication system with multiple channels. The user can only choose several channels to sense and decides whether to access these channels based on the sensing information in each time slot. Meanwhile, the presence of sensing error is considered. A reward is obtained when the user accesses a channel. The objective is to maximize the expected (discounted or average reward accrued over an infinite horizon. This problem can be formulated as a partially observable Markov decision process. This study shows the optimality of the simple and robust myopic policy which focuses on maximizing the immediate reward. The results show that the myopic policy is optimal in the case of practical interest.

  17. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  18. Data Access System for Hydrology

    Science.gov (United States)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  19. Using Direct Sub-Level Entity Access to Improve Nuclear Stockpile Simulation Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Parker, Robert Y. [Brigham Young Univ., Provo, UT (United States)

    1999-08-01

    Direct sub-level entity access is a seldom-used technique in discrete-event simulation modeling that addresses the accessibility of sub-level entity information. The technique has significant advantages over more common, alternative modeling methods--especially where hierarchical entity structures are modeled. As such, direct sub-level entity access is often preferable in modeling nuclear stockpile, life-extension issues, an area to which it has not been previously applied. Current nuclear stockpile, life-extension models were demonstrated to benefit greatly from the advantages of direct sub-level entity access. In specific cases, the application of the technique resulted in models that were up to 10 times faster than functionally equivalent models where alternative techniques were applied. Furthermore, specific implementations of direct sub-level entity access were observed to be more flexible, efficient, functional, and scalable than corresponding implementations using common modeling techniques. Common modeling techniques (''unbatch/batch'' and ''attribute-copying'') proved inefficient and cumbersome in handling many nuclear stockpile modeling complexities, including multiple weapon sites, true defect analysis, and large numbers of weapon and subsystem types. While significant effort was required to enable direct sub-level entity access in the nuclear stockpile simulation models, the enhancements were worth the effort--resulting in more efficient, more capable, and more informative models that effectively addressed the complexities of the nuclear stockpile.

  20. Access to environmental resources and physical activity levels of adults in Hawaii.

    Science.gov (United States)

    Geller, Karly S; Nigg, Claudio R; Ollberding, Nicholas J; Motl, Robert W; Horwath, Caroline; Dishman, Rodney K

    2015-03-01

    Examine associations between physical activity (PA) and spatial accessibility to environmental PA resources in Hawaii. Metabolic equivalents (METs) of mild, moderate, and strenuous PA were compared for accessibility with environmental PA resources within a population-based sample of Hawaiian adults (n = 381). Multiple linear regression estimated differences in PA levels for residing further from a PA resource or residing in an area with a greater number of resources. No associations were found in the total sample. Analyses within subsamples stratified by ethnicity revealed that greater spatial accessibility to a PA resource was positively associated with strenuous PA among Caucasians (P = .04) but negatively associated with moderate PA among Native Hawaiians (P = .00). The lack of association in the total sample may be a consequence of Hawaii's unique environment. Results of stratified sample analyses are unique, providing groundwork for future examinations within parallel environments and among similar ethnic groups. © 2012 APJPH.

  1. Data Management for Flexible Access - Implementation and Lessons Learned from work with Multiple User Communities

    Science.gov (United States)

    Benedict, K. K.; Scott, S.; Hudspeth, W. B.

    2012-12-01

    There is no shortage of community-specific and generic data discovery and download platforms and protocols (e.g. CUAHSI HIS, DataONE, GeoNetwork Open Source, GeoPortal, OGC CSW, OAI PMH), documentation standards (e.g. FGDC, ISO 19115, EML, Dublin Core), data access and visualization standards and models (e.g. OGC WxS, OpenDAP), and general-purpose web service models (i.e. REST & SOAP) upon which Geo-informatics cyberinfrastructure (CI) may be built. When attempting to develop a robust platform that may service a wide variety of users and use cases the challenge is one of identifying which existing platform (if any) may support those current needs while also allowing for future expansion for additional capabilities. In the case of the implementation of a data storage, discovery and delivery platform to support the multiple projects at the Earth Data Analysis Center at UNM, no single platform or protocol met the joint requirements of two initial applications (the New Mexico Resource Geographic Information System [http://rgis.unm.edu] and the New Mexico EPSCoR Data Portal [http://nmepscor.org/dataportal]) and furthermore none met anticipated additional requirements as new applications of the platform emerged. As a result of this assessment three years ago EDAC embarked on the development of the Geographic Storage, Transformation, and Retrieval Engine (GSToRE) platform as a general purpose platform upon which n-tiered geospatially enabled data intensive applications could be built. When initially released in 2010 the focus was on the publication of dynamically generated Open Geospatial Consortium services based upon a PostgreSQL/PostGIS backend database. The identification of additional service interface requirements (implementation of the DataONE API and CUAHSI WaterML services), use cases provided by the NM EPSCoR education working group, and expanded metadata publication needs have led to a significant update to the underlying data management tier for GSToRE - the

  2. An Extended Two-Phase Method for Accessing Sections of Out-of-Core Arrays

    Directory of Open Access Journals (Sweden)

    Rajeev Thakur

    1996-01-01

    Full Text Available A number of applications on parallel computers deal with very large data sets that cannot fit in main memory. In such applications, data must be stored in files on disks and fetched into memory during program execution. Parallel programs with large out-of-core arrays stored in files must read/write smaller sections of the arrays from/to files. In this article, we describe a method for accessing sections of out-of-core arrays efficiently. Our method, the extended two-phase method, uses collective l/O: Processors cooperate to combine several l/O requests into fewer larger granularity requests, to reorder requests so that the file is accessed in proper sequence, and to eliminate simultaneous l/O requests for the same data. In addition, the l/O workload is divided among processors dynamically, depending on the access requests. We present performance results obtained from two real out-of-core parallel applications – matrix multiplication and a Laplace's equation solver – and several synthetic access patterns, all on the Intel Touchstone Delta. These results indicate that the extended two-phase method significantly outperformed a direct (noncollective method for accessing out-of-core array sections.

  3. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  4. Initiatives driving accelerated access to medicines in Europe: Review of recent concepts and developments

    Directory of Open Access Journals (Sweden)

    Mia Gannedahl

    2018-03-01

    Full Text Available Improving timely patient access to new medicines, particularly in areas with high unmet need, has been a healthcare priority during the past 5–10 years, with several new regulatory initiatives from the European Medicines Agency, as well as on national level within the European Union. Nevertheless, evidence suggests that medicines going through these regulatory initiatives experience variable reimbursement outcomes due to uncertainties in the clinical or economic evidence base. New initiatives, including the adaptive pathways concept, have therefore been introduced that embrace a holistic view of a medicine’s route to patient access. These involve expanded clusters of stakeholders working together to prospectively influence and design evidence generation strategies, including use of real-world evidence, to ensure that development plans meet the needs of multiple stakeholders including regulatory agencies and health technology assessment bodies. Multi-stakeholder dialogues, provided through scientific advice, are already available for medicines in Europe in various forms and are important tools for regulators, health technology assessment bodies and pharmaceutical companies to develop evidence generation plans optimised to support decision-making on marketing authorisation and reimbursement of new medicines. Multiple stakeholder groups have been actively engaged in advancing developments of initiatives driving timely access and it is likely to continue due to the need to balance this with affordability. The aim of this article is to provide a review of the latest, as well as a future perspective on, developments with respect to accelerated access of medicines in the European Union with a particular focus on procedures for formal scientific advice.

  5. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  6. Multiple choice exams of medical knowledge with open books and web access? A validity study

    DEFF Research Database (Denmark)

    O'Neill, Lotte; Simonsen, Eivind Ortind; Knudsen, Ulla Breth

    2015-01-01

    Background: Open book tests have been suggested to lower test anxiety and promote deeper learning strategies. In the Aarhus University medical program, ¼ of the curriculum assess students’ medical knowledge with ‘open book, open web’ (OBOW) multiple choice examinations. We found little existing...

  7. Auction pricing of network access for North American railways

    DEFF Research Database (Denmark)

    Harrod, Steven

    2013-01-01

    The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate...... that the infrastructure entity will receive approximately 15.6% less than the true value of the contracted train paths. This loss of revenue threatens the objective of reducing government subsidy for the railway network. (C) 2012 Elsevier Ltd. All rights reserved....

  8. Action research to improve methods of delivery and feedback in an Access Grid Room environment

    Science.gov (United States)

    McArthur, Lynne C.; Klass, Lara; Eberhard, Andrew; Stacey, Andrew

    2011-12-01

    This article describes a qualitative study which was undertaken to improve the delivery methods and feedback opportunity in honours mathematics lectures which are delivered through Access Grid Rooms. Access Grid Rooms are facilities that provide two-way video and audio interactivity across multiple sites, with the inclusion of smart boards. The principal aim was to improve the student learning experience, given the new environment. The specific aspects of the course delivery that the study focused on included presentation of materials and provision of opportunities for interaction between the students and between students and lecturers. The practical considerations in the delivery of distance learning are well documented in the literature, and similar problems arise in the Access Grid Room environment; in particular, those of limited access to face-to-face interaction and the reduction in peer support. The nature of the Access Grid Room classes implies that students studying the same course can be physically situated in different cities, and possibly in different countries. When studying, it is important that students have opportunity to discuss new concepts with others; particularly their peers and their lecturer. The Access Grid Room environment also presents new challenges for the lecturer, who must learn new skills in the delivery of materials. The unique nature of Access Grid Room technology offers unprecedented opportunity for effective course delivery and positive outcomes for students, and was developed in response to a need to be able to interact with complex data, other students and the instructor, in real-time, at a distance and from multiple sites. This is a relatively new technology and as yet there has been little or no studies specifically addressing the use and misuse of the technology. The study found that the correct placement of cameras and the use of printed material and smart boards were all crucial to the student experience. In addition, the

  9. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon

    2011-08-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.

  10. Tunneling and Origin of Large Access Resistance in Layered-Crystal Organic Transistors

    Science.gov (United States)

    Hamai, Takamasa; Arai, Shunto; Minemawari, Hiromi; Inoue, Satoru; Kumai, Reiji; Hasegawa, Tatsuo

    2017-11-01

    Layered crystallinity of organic semiconductors is crucial to obtaining high-performance organic thin-film transistors (OTFTs), as it allows both smooth-channel-gate-insulator interface formation and efficient two-dimensional carrier transport along the interface. However, the role of vertical transport across the crystalline molecular layers in device operations has not been a crucial subject so far. Here, we show that the interlayer carrier transport causes unusual nonlinear current-voltage characteristics and enormous access resistance in extremely high-quality single-crystal OTFTs based on 2-decyl-7-phenyl[1]-benzothieno[3 ,2 -b ][1]benzothiophene (Ph -BTBT -C10 ) that involve inherent multiple semiconducting π -conjugated layers interposed, respectively, by electrically inert alkyl-chain layers. The output characteristics present layer-number (n )-dependent nonlinearity that becomes more evident at larger n (1 ≤n ≤15 ), demonstrating tunneling across multiple alkyl-chain layers. The n -dependent device mobility and four-probe measurements reveal that the alkyl-chain layers generate a large access resistance that suppresses the device mobility from the intrinsic value of about 20 cm2 V-1 s-1 . Our findings clarify the reason why device characteristics are distributed in single-crystal OTFTs.

  11. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  12. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  13. Creating Multiple Pathways in the Arts: A New York City Case Study

    Science.gov (United States)

    Maguire, Cindy; Mishook, Jacob; Garcia, Ivonne; de Gaillande, Genevieve

    2013-01-01

    Increasingly, education policy makers understand the importance of students and families having access to a range of high quality educational opportunities inside and outside of school, 365 days a year. This paper explores the concept of multiple pathways in arts education to further conceptualize and build upon such opportunities, inside and…

  14. Discovery of accessible locations using region-based geo-social data

    KAUST Repository

    Wang, Yan

    2018-03-17

    Geo-social data plays a significant role in location discovery and recommendation. In this light, we propose and study a novel problem of discovering accessible locations in spatial networks using region-based geo-social data. Given a set Q of query regions, the top-k accessible location discovery query (k ALDQ) finds k locations that have the highest spatial-density correlations to Q. Both the spatial distances between locations and regions and the POI (point of interest) density within the regions are taken into account. We believe that this type of k ALDQ query can bring significant benefit to many applications such as travel planning, facility allocation, and urban planning. Three challenges exist in k ALDQ: (1) how to model the spatial-density correlation practically, (2) how to prune the search space effectively, and (3) how to schedule the searches from multiple query regions. To tackle the challenges and process k ALDQ effectively and efficiently, we first define a series of spatial and density metrics to model the spatial-density correlation. Then we propose a novel three-phase solution with a pair of upper and lower bounds of the spatial-density correlation and a heuristic scheduling strategy to schedule multiple query regions. Finally, we conduct extensive experiments on real and synthetic spatial data to demonstrate the performance of the developed solutions.

  15. Lexical semantic access and letter access are involved in different aspects of reading

    DEFF Research Database (Denmark)

    Poulsen, Mads

    ). In this subset sample, both letter access and lexical access accounted for unique variance in reading fluency. The pattern of effects for lexical access did not change by controlling for serial rapid naming (RAN). Conclusions: The results suggest that letter access and lexical access are important for different......Purpose: This study investigated the effects of lexical access speed and letter access speed on reading fluency and reading comprehension. We hypothesized that 1) letter access speed would correlate with reading fluency but not comprehension, while 2) lexical access speed would influence reading...... comprehension. For readers who are struggling with recoding, most of the reading effort is probably tied up with recoding, leaving little to be explained by lexical access. Therefore we expected that 3) lexical access speed would primarily predict reading fluency for readers who were no longer struggling...

  16. Space Access for Small Satellites on the K-1

    Science.gov (United States)

    Faktor, L.

    Affordable access to space remains a major obstacle to realizing the increasing potential of small satellites systems. On a per kilogram basis, small launch vehicles are simply too expensive for the budgets of many small satellite programs. Opportunities for rideshare with larger payloads on larger launch vehicles are still rare, given the complications associated with coordinating delivery schedules and deployment orbits. Existing contractual mechanisms are also often inadequate to facilitate the launch of multiple payload customers on the same flight. Kistler Aerospace Corporation is committed to lowering the price and enhancing the availability of space access for small satellite programs through the fully-reusable K-1 launch vehicle. Kistler has been working with a number of entities, including Astrium Ltd., AeroAstro, and NASA, to develop innovative approaches to small satellite missions. The K-1 has been selected by NASA as a Flight Demonstration Vehicle for the Space Launch Initiative. NASA has purchased the flight results during the first four K-1 launches on the performance of 13 advanced launch vehicle technologies embedded in the K-1 vehicle. On K-1 flights #2-#4, opportunities exist for small satellites to rideshare to low-earth orbit for a low-launch price. Kistler's flight demonstration contract with NASA also includes options to fly Add-on Technology Experiment flights. Opportunities exist for rideshare payloads on these flights as well. Both commercial and government customers may take advantage of the rideshare pricing. Kistler is investigating the feasibility of flying dedicated, multiple small payload missions. Such a mission would launch multiple small payloads from a single customer or small payloads from different customers. The orbit would be selected to be compatible with the requirements of as many small payload customers as possible, and make use of reusable hardware, standard interfaces (such as the existing MPAS) and verification plans

  17. Game-theoretic interference coordination approaches for dynamic spectrum access

    CERN Document Server

    Xu, Yuhua

    2016-01-01

    Written by experts in the field, this book is based on recent research findings in dynamic spectrum access for cognitive radio networks. It establishes a game-theoretic framework and presents cutting-edge technologies for distributed interference coordination. With game-theoretic formulation and the designed distributed learning algorithms, it provides insights into the interactions between multiple decision-makers and the converging stable states. Researchers, scientists and engineers in the field of cognitive radio networks will benefit from the book, which provides valuable information, useful methods and practical algorithms for use in emerging 5G wireless communication.

  18. Discursive Policy Webs in a Globalisation Era: A Discussion of Access to Professions and Trades for Immigrant Professionals in Ontario, Canada

    Science.gov (United States)

    Goldberg, Michelle P.

    2006-01-01

    This article explores the link between discourse and policy using a discursive web metaphor. It develops the notion of policy as a discursive web based on a post-positivist framework that recognises the way multiple discourses from multiple voices interact in a complex web of power relationships to influence reality. Using Ontario's Access to…

  19. Data Transmission and Access Protection of Community Medical Internet of Things

    OpenAIRE

    Wang, Xunbao; Chen, Fulong; Ye, Heping; Yang, Jie; Zhu, Junru; Zhang, Ziyang; Huang, Yakun

    2017-01-01

    On the basis of Internet of Things (IoT) technologies, Community Medical Internet of Things (CMIoT) is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirect...

  20. Cellular 5G Access for Massive Internet of Things

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Pratas, Nuno; Stefanovic, Cedomir

    2017-01-01

    The Internet of Things (IoT) refers to the paradigm of physical and virtual “things” that communicate and collaborate over the Internet, with minimal or no human intervention. There are multiple ways in which an IoT device can be connected to the Internet. Cellular technologies are seen as viable...... candidates in this respect, due to their maturity, worldwide availability and the use of reserved spectrum. However, current cellular systems are not well-equipped to efficiently and reliably support IoT traffic, particularly in the radio access part, as they are designed for low number of high......-rate connections and not for high number of low-rate IoT connections. In this chapter we outline the main features of the IoT traffic types, review operation of the current cellular access and provide some guidelines how to address its shortcomings and evolve it in order to support IoT services. However...

  1. Cognitive Multiple-Antenna Network with Outage and Rate Margins at the Primary System

    DEFF Research Database (Denmark)

    Maham, Behrouz; Popovski, Petar

    2015-01-01

    In the common model for spectrum sharing, cognitive users can access the spectrum as long as the target performance in the legitimate primary system is not violated. In this paper, we consider a downlink primary multiple-inputsingle- output (MISO) system which operates under a controlled interfer...

  2. Public Access and Open Access: Is There a Difference? | Poster

    Science.gov (United States)

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.

  3. Moving toward a universally accessible web: Web accessibility and education.

    Science.gov (United States)

    Kurt, Serhat

    2017-12-08

    The World Wide Web is an extremely powerful source of information, inspiration, ideas, and opportunities. As such, it has become an integral part of daily life for a great majority of people. Yet, for a significant number of others, the internet offers only limited value due to the existence of barriers which make accessing the Web difficult, if not impossible. This article illustrates some of the reasons that achieving equality of access to the online world of education is so critical, explores the current status of Web accessibility, discusses evaluative tools and methods that can help identify accessibility issues in educational websites, and provides practical recommendations and guidelines for resolving some of the obstacles that currently hinder the achievability of the goal of universal Web access.

  4. A new 2D mesh routing approach for networks on chip Une nouvelle ...

    African Journals Online (AJOL)

    a modified XY routing and a communication load-based clustering technique. We show that our .... (TDMA), Round-Robin and fixed priority. B. routing. Figure.3: Router ..... Algorithms for Wireless Sensor Networks,” Computer. Communications ...

  5. Self care programs and multiple sclerosis: physical therapeutics treatment - literature review.

    Science.gov (United States)

    Demaille-Wlodyka, S; Donze, C; Givron, P; Gallien, P

    2011-03-01

    To clarify the therapeutic education program impact with multiple sclerosis patients, literature review. Highlight contents and efficacy. A non-systematic review on Medline, PubMed and Cochrane library databases from 1966 to 2010 using the following keywords: "multiple sclerosis", "self-care", "self-management" and specific symptoms keywords. Clinical trials and randomized clinical trials, as well as literature reviews published in English, French and German will be analyzed. Counseling is a part of the non-pharmacological management of chronic illnesses such as multiple sclerosis. Symptoms' diversity and the different clinical forms limit standardized programs of self-care management, applicable to patients. In the literature review, counseling programs have often low metrology. A behavior change with patients and medical staff could exist. To empower the patient, to reduce symptoms' impact and to improve treatment access are the aims of educational therapy. Therapeutic education program for multiple sclerosis patients could progress with their standardization and assessment, for each sign. To promote the educational therapy of multiple sclerosis patients, a specific training for medical staff, as specific financing are necessary. 2011 Elsevier Masson SAS. All rights reserved.

  6. Multi-tool accessibility assessment of government department websites:a case-study with JKGAD.

    Science.gov (United States)

    Ismail, Abid; Kuppusamy, K S; Nengroo, Ab Shakoor

    2017-08-02

    Nature of being accessible to all categories of users is one of the primary factors for enabling the wider reach of the resources published through World Wide Web. The accessibility of websites has been analyzed through W3C guidelines with the help of various tools. This paper presents a multi-tool accessibility assessment of government department websites belonging to the Indian state of Jammu and Kashmir. A comparative analysis of six accessibility tools is also presented with 14 different parameters. The accessibility analysis tools used in this study for analysis are aChecker, Cynthia Says, Tenon, wave, Mauve, and Hera. These tools provide us the results of selected websites accessibility status on Web Content Accessibility Guidelines (WCAG) 1.0 and 2.0. It was found that there are variations in accessibility analysis results when using different accessibility metrics to measure the accessibility of websites. In addition to this, we have identified the guidelines which have frequently been violated. It was observed that there is a need for incorporating the accessibility component features among the selected websites. This paper presents a set of suggestions to improve the accessibility status of these sites so that the information and services provided by these sites shall reach a wider spectrum of audience without any barrier. Implications for rehabilitation The following points indicates that this case study of JKGAD websites comes under Rehabilitation focused on Visually Impaired users. Due to the universal nature of web, it should be accessible to all according to WCAG guidelines framed by World Wide Web Consortium. In this paper we have identified multiple accessibility barriers for persons with visual impairment while browsing the Jammu and Kashmir Government websites. Multi-tool analysis has been done to pin-point the potential barriers for persons with visually Impaired. Usability analysis has been performed to check whether these websites are suitable

  7. Developing an EarthCube Governance Structure for Big Data Preservation and Access

    Science.gov (United States)

    Leetaru, H. E.; Leetaru, K. H.

    2012-12-01

    The underlying vision of the NSF EarthCube initiative is of an enduring resource serving the needs of the earth sciences for today and the future. We must therefore view this effort through the lens of what the earth sciences will need tomorrow and on how the underlying processes of data compilation, preservation, and access interplay with the scientific processes within the communities EarthCube will serve. Key issues that must be incorporated into the EarthCube governance structure include authentication, retrieval, and unintended use cases, the emerging role of whole-corpus data mining, and how inventory, citation, and archive practices will impact the ability of scientists to use EarthCube's collections into the future. According to the National Academies, the US federal government spends over $140 billion dollars a year in support of the nation's research base. Yet, a critical issue confronting all of the major scientific disciplines in building upon this investment is the lack of processes that guide how data are preserved for the long-term, ensuring that studies can be replicated and that experimental data remains accessible as new analytic methods become available or theories evolve. As datasets are used years or even decades after their creation, far richer metadata is needed to describe the underlying simulation, smoothing algorithms or bounding parameters of the data collection process. This is even truer as data are increasingly used outside their intended disciplines, as geoscience researchers apply algorithms from one discipline to datasets from another, where their analytical techniques may make extensive assumptions about the data. As science becomes increasingly interdisciplinary and emerging computational approaches begin applying whole-corpus methodologies and blending multiple archives together, we are facing new data access modalities distinct from the needs of the past, drawing into focus the question of centralized versus distributed

  8. Access Customized Forms

    OpenAIRE

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  9. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  10. Resource Discovery and Universal Access: Understanding Enablers and Barriers from the User Perspective

    OpenAIRE

    Beyene, Wondwossen

    2016-01-01

    Resource discovery tools are keys to explore, find , and retrieve resources from multitudes of collections hosted by library and information systems. Modern resource discovery tools provide facet - rich interfaces that provide multiple alternatives to ex pose resources for their potential users and help them navigate to the resources they need. This paper examines one of those tools from the perspective of universal access, ...

  11. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  12. Characterizing the nature of visual conscious access: the distinction between features and locations.

    Science.gov (United States)

    Huang, Liqiang

    2010-08-24

    The difference between the roles of features and locations has been a central topic in the theoretical debates on visual attention. A recent theory proposed that momentary visual awareness is limited to one Boolean map, that is the linkage of one feature per dimension with a set of locations (L. Huang & H. Pashler, 2007). This theory predicts that: (a) access to the features of a set of objects is inefficient whereas access to their locations is efficient; (b) shuffling the locations of objects disrupts access to their features whereas shuffling the features of objects has little impact on access to their locations. Both of these predictions were confirmed in Experiments 1 and 2. Experiments 3 and 4 showed that this feature/location distinction remains when the task involves the detection of changes to old objects rather than the coding of new objects. Experiments 5 and 6 showed that, in a pre-specified set, one missing location can be readily detected, but detecting one missing color is difficult. Taken together, multiple locations seem to be accessed and represented together as a holistic pattern, but features have to be handled as separate labels, one at a time, and do not constitute a pattern in featural space.

  13. From spatial to social accessibility: How socio-economic factors can affect accessibility?

    OpenAIRE

    Mercier , Aurélie

    2016-01-01

    The concept of accessibility cannot only focus on " spatial accessibility " measurement but has to integer a " social accessibility " level to take into account individual inequalities and socioeconomic disparities to access to urban opportunities. In this context, this contribution focuses on socioeconomic disparities integration on accessibility measurement, considering the Lyon case study. The paper is divided into three parts The first part aims to present a method for integrating the soc...

  14. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  15. Multiple k Nearest Neighbor Query Processing in Spatial Network Databases

    DEFF Research Database (Denmark)

    Xuegang, Huang; Jensen, Christian Søndergaard; Saltenis, Simonas

    2006-01-01

    This paper concerns the efficient processing of multiple k nearest neighbor queries in a road-network setting. The assumed setting covers a range of scenarios such as the one where a large population of mobile service users that are constrained to a road network issue nearest-neighbor queries...... for points of interest that are accessible via the road network. Given multiple k nearest neighbor queries, the paper proposes progressive techniques that selectively cache query results in main memory and subsequently reuse these for query processing. The paper initially proposes techniques for the case...... where an upper bound on k is known a priori and then extends the techniques to the case where this is not so. Based on empirical studies with real-world data, the paper offers insight into the circumstances under which the different proposed techniques can be used with advantage for multiple k nearest...

  16. Leakage current characteristics of the multiple metal alloy nanodot memory

    International Nuclear Information System (INIS)

    Lee, Gae Hun; Lee, Jung Min; Yang, Hyung Jun; Song, Yun Heub; Bea, Ji Chel; Tanaka, Tetsu

    2010-01-01

    The leakage current characteristics of a multiple metal alloy nanodot device for a nonvolatile random access memory using FePt materials are investigated. Several annealing conditions are evaluated and optimized to suppress the leakage current and to better the memory characterisctics. This work confirmed that the annealing condition of 700 .deg. C in a high vacuum ambience (under 1 x 10 -5 Pa) simultaneously provided good cell characteristics from a high dot density of over 1 x 10 13 /cm 2 and a low leakage current. In addition, a smaller nanodot diameter was found to give a lower leakage current for the multiple nanodot memory. Finally, for the proposed annealing condition, the quadruple FePt multiple nanodot memory with a 2-nm dot diameter provided good leakage current characteristics, showing a threshold voltage shift of under 5% at an initial retention stage of 1000 sec.

  17. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  18. Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.

    Science.gov (United States)

    Tipton, Stephen J; Forkey, Sara; Choi, Young B

    2016-04-01

    This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual's Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today's technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.

  19. Evaluation of the challenges faced in increasing contraceptive access within a community college population.

    Science.gov (United States)

    Lamme, Jacqueline; Edelman, Alison; Padua, Emily; Jensen, Jeffrey T

    2017-01-01

    Research demonstrates removing barriers to access, decreasing costs and offering same-day placement of long-acting reversible contraception (LARC) increases contraceptive uptake in young women. For those in community college (CC), LARC utilization might reduce the risk of dropout and improve degree completion. We identified a local school who had documented an unmet need for on-campus services through a recent student assessment. We then established an on-campus, same day contraceptive clinic at the CC as part of a clinical trial. We found that students did not use the service even after multiple attempts to increase awareness and we ended the study. Here, we report lessons learned from attempting research in this environment in addition to results from a follow-up survey to determine why students did not access the clinical resource. Students reported that they already had good access to contraception and preferred to get their healthcare off-campus. This study demonstrates the complexities of studying highly focused interventions to influence access to care in the current health care environment with ever changing regulations. NCT02735551 . Registered April 6, 2016.

  20. Mechanisms and maneouvers of forest resource access and its implications for rural livelihoods in the high forest zone of Ghana

    OpenAIRE

    Tetteh, Herbert

    2015-01-01

    The management of Ghana's Forests has attracted diverse social actors with multiple interests from the state (Forestry Commission, FC) to local level (local forest users). This has resulted in processes and mechanisms within and outside the legal system of gaining access to the forests and related resources. Mechanisms within the legal system include the forest governance policies which necessitates gaining access through a permit from the FC. The bureaucratic an...