WorldWideScience

Sample records for multiple access techniques

  1. Multiple Access Techniques for Next Generation Wireless: Recent Advances and Future Perspectives

    Directory of Open Access Journals (Sweden)

    Shree Krishna Sharma

    2016-01-01

    Full Text Available The advances in multiple access techniques has been one of the key drivers in moving from one cellular generation to another. Starting from the first generation, several multiple access techniques have been explored in different generations and various emerging multiplexing/multiple access techniques are being investigated for the next generation of cellular networks. In this context, this paper first provides a detailed review on the existing Space Division Multiple Access (SDMA related works. Subsequently, it highlights the main features and the drawbacks of various existing and emerging multiplexing/multiple access techniques. Finally, we propose a novel concept of clustered orthogonal signature division multiple access for the next generation of cellular networks. The proposed concept envisions to employ joint antenna coding in order to enhance the orthogonality of SDMA beams with the objective of enhancing the spectral efficiency of future cellular networks.

  2. Implementation of Multiple Access Techniques Applicable for Maritime Satellite Communications

    Directory of Open Access Journals (Sweden)

    Stojce Dimov Ilcev

    2013-12-01

    Full Text Available In this paper are introduced fundamentals, characteristics, advantages and disadvantages of Multiple Access (MA employed as transmission techniques in the Maritime Mobile Satellite Communications (MMSC between ships and Coast Earth Station (CES via Geostationary Earth Orbit (GEO or Not-GEO satellite constellations. In fixed satellite communication, as a rule, especially in MMSC many users are active at the same time. The problem of simultaneous communications between many single or multipoint mobile satellite users can be solved by using MA technique, such as Frequency Division Multiple Access (FDMA, Time Division Multiple Access (TDMA, Code Division Multiple Access (CDMA, Space Division Multiple Access (SDMA and Random (Packet Division Multiple Access (RDMA. Since the resources of the systems such as the transmitting power and the bandwidth are limited, it is advisable to use the channels with complete charge and to create a different MA to the channel. This generates a problem of summation and separation of signals in the transmission and reception parts, respectively. Deciding this problem consists in the development of orthogonal channels of transmission in order to divide signals from various users unambiguously on the reception part.

  3. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  4. Implementation of Multiple Access Techniques Applicable for Maritime Satellite Communications

    OpenAIRE

    Stojce Dimov Ilcev

    2013-01-01

    In this paper are introduced fundamentals, characteristics, advantages and disadvantages of Multiple Access (MA) employed as transmission techniques in the Maritime Mobile Satellite Communications (MMSC) between ships and Coast Earth Station (CES) via Geostationary Earth Orbit (GEO) or Not-GEO satellite constellations. In fixed satellite communication, as a rule, especially in MMSC many users are active at the same time. The problem of simultaneous communications between many single or multip...

  5. Reducing BER of spectral-amplitude coding optical code-division multiple-access systems by single photodiode detection technique

    Science.gov (United States)

    Al-Khafaji, H. M. R.; Aljunid, S. A.; Amphawan, A.; Fadhil, H. A.; Safar, A. M.

    2013-03-01

    In this paper, we present a single photodiode detection (SPD) technique for spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) systems. The proposed technique eliminates both phase-induced intensity noise (PIIN) and multiple-access interference (MAI) in the optical domain. Analytical results show that for 35 simultaneous users transmitting at data rate of 622 Mbps, the bit-error rate (BER) = 1.4x10^-28 for SPD technique is much better compared to 9.3x10^-6 and 9.6x10^-3 for the modified-AND as well as the AND detection techniques, respectively. Moreover, we verified the improved performance afforded by the proposed technique using data transmission simulations.

  6. Code division multiple-access techniques in optical fiber networks. II - Systems performance analysis

    Science.gov (United States)

    Salehi, Jawad A.; Brackett, Charles A.

    1989-08-01

    A technique based on optical orthogonal codes was presented by Salehi (1989) to establish a fiber-optic code-division multiple-access (FO-CDMA) communications system. The results are used to derive the bit error rate of the proposed FO-CDMA system as a function of data rate, code length, code weight, number of users, and receiver threshold. The performance characteristics for a variety of system parameters are discussed. A means of reducing the effective multiple-access interference signal by placing an optical hard-limiter at the front end of the desired optical correlator is presented. Performance calculations are shown for the FO-CDMA with an ideal optical hard-limiter, and it is shown that using a optical hard-limiter would, in general, improve system performance.

  7. Multiple-Access Quantum-Classical Networks

    Science.gov (United States)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  8. Orthogonal frequency division multiple access fundamentals and applications

    CERN Document Server

    Jiang, Tao; Zhang, Yan

    2010-01-01

    Supported by the expert-level advice of pioneering researchers, Orthogonal Frequency Division Multiple Access Fundamentals and Applications provides a comprehensive and accessible introduction to the foundations and applications of one of the most promising access technologies for current and future wireless networks. It includes authoritative coverage of the history, fundamental principles, key techniques, and critical design issues of OFDM systems. Covering various techniques of effective resource management for OFDM/OFDMA-based wireless communication systems, this cutting-edge reference:Add

  9. Interference-Assisted Techniques for Transmission and Multiple Access in Optical Communications

    Science.gov (United States)

    Guan, Xun

    communication (VLC) by adopting PNC, with a newly proposed phase-aligning method. PNC could improve the throughput at the bottlenecking relay node in a VLC system, and the proposed phase aligning method can improve the BER performance. The second part of this thesis discusses another interference-assisted technology in communication, that is, non-orthogonal multiple access (NOMA). NOMA multiplexes signals from multiple users in another dimension: power domain, with a non-orthogonal multiplexing in other dimensions such as time, frequency and code. Three schemes are proposed in this part. The first and the second schemes both realize NOMA in VLC, with different multiuser detection (MUD) techniques and a proposed phase pre-distortion method. Although both can decrease the system BER compared to conventional NOMA, the scheme using joint detection (JD) outperforms the one using successive interference cancellation (SIC). The third scheme investigated in this part is a combination of NOMA and a multicarrier precoding (MP) technology based on an orthogonal circulant transform matrix (OCT). This combination can avoid the complicated adaptive bit loading or electronic equalization, making NOMA more attractive in a practical system.

  10. Electro-optical time gating based on Mach-Zehnder modulator for multiple access interference elimination in optical code-division multiple access networks

    Science.gov (United States)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zheng, Jilin; Zhu, Huatao

    2014-05-01

    An electro-optical time gating technique, which is based on an electrical return-to-zero (RZ) pulse driven Mach-Zehnder modulator (MZM) for eliminating multiple access interference (MAI) in optical code-division multiple access (OCDMA) networks is proposed. This technique is successfully simulated in an eight-user two-dimensional wavelength-hopping time-spreading system, as well as in a three-user temporal phase encoding system. Results show that in both systems the MAI noise is efficiently removed and the average received power penalty improved. Both achieve error-free transmissions at a bit rate of 2.5 Gb/s. In addition, we also individually discuss effects of parameters in two systems, such as the extinction ratio of the MZM, the duty cycle of the driven RZ pulse, and the time misalignment between the driven pulse and the decoded autocorrelation peak, on the output bit error rate performance. Our work shows that employing a common MZM as a thresholder provides another probability and an interesting cost-effective choice for a smart size, low energy, and less complex thresholding technique for integrated detection in OCDMA networks.

  11. Optical Code-Division Multiple Access: Challenges and Solutions

    Science.gov (United States)

    Chen, Lawrence R.

    2003-02-01

    Optical code-division multiple-access (OCDMA) is a technique well-suited for providing the required photonic connectivity in local access networks. Although the principles of OCDMA have been known for many years, it has never delivered on its potential. In this paper, we will describe the key challenges and impediments that have prevented OCDMA from delivering on its potential, as well as discuss possible solutions. We focus on the limitations of one-dimensional codes and the benefit of exploiting the additional degrees of freedom in using multiple dimensions for defining the codes. We discuss the advantages of using differential detection in order to implement bipolar communications. We then show how two-dimensional wavelength-time codes can be appropriately combined with differential detection in order to achieve high performance OCDMA systems with a large number of users operating with good BER performance for a large aggregate capacity. We also discuss the impact of channel coding techniques, for example forward error correction or turbo coding, on BER performance.

  12. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    Science.gov (United States)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  13. Rendering Intelligence at Physical Layer for Smart Addressing and Multiple Access

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi; Prasad, Ramjee; Cianca, Ernestina

    2010-01-01

    addressing of a node. For a typical closed user group type of network, we propose a multiple access mechanism and network topology which will not only eliminate the need of intelligent core network equipments in the network area , but to use this intelligent physical layer to directly reach any node over......The primary objective of this work is to propose a technique of wireless communication, where we render intelligence to the physical layer. We aim to realize a physical layer that can take part in some processes which is otherwise confined to higher layer signalling activities, like for example...... the fundamentals behind the proposed multiple access scheme and draws out the benefits compared to the existing multiple access processes based on cellular approach....

  14. Variable weight Khazani-Syed code using hybrid fixed-dynamic technique for optical code division multiple access system

    Science.gov (United States)

    Anas, Siti Barirah Ahmad; Seyedzadeh, Saleh; Mokhtar, Makhfudzah; Sahbudin, Ratna Kalos Zakiah

    2016-10-01

    Future Internet consists of a wide spectrum of applications with different bit rates and quality of service (QoS) requirements. Prioritizing the services is essential to ensure that the delivery of information is at its best. Existing technologies have demonstrated how service differentiation techniques can be implemented in optical networks using data link and network layer operations. However, a physical layer approach can further improve system performance at a prescribed received signal quality by applying control at the bit level. This paper proposes a coding algorithm to support optical domain service differentiation using spectral amplitude coding techniques within an optical code division multiple access (OCDMA) scenario. A particular user or service has a varying weight applied to obtain the desired signal quality. The properties of the new code are compared with other OCDMA codes proposed for service differentiation. In addition, a mathematical model is developed for performance evaluation of the proposed code using two different detection techniques, namely direct decoding and complementary subtraction.

  15. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.

    2018-03-21

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\\\mathcal{R}_{\\ m tot}$, for general $N$, constrained to: 1) a minimum rate $\\\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\\\mathcal{R}_{\\ m tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\\\mathcal{R}_{\\ m tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  16. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.; Haenggi, Martin; Elsawy, Hesham; Chaaban, Anas; Alouini, Mohamed-Slim

    2018-01-01

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\mathcal{R}_{\\rm tot}$, for general $N$, constrained to: 1) a minimum rate $\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\mathcal{R}_{\\rm tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\mathcal{R}_{\\rm tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  17. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  18. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  19. Multiple Access Communications

    DEFF Research Database (Denmark)

    This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016. The 10 full papers presented in this volume were carefully reviewed and selected from 12 submissions. They were organized in topical...

  20. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  1. Endoscopic treatment of multilocular walled-off pancreatic necrosis with the multiple transluminal gateway technique.

    Science.gov (United States)

    Jagielski, Mateusz; Smoczyński, Marian; Adrych, Krystian

    2017-06-01

    The development of minimally invasive techniques allowed access to the necrotic cavity through transperitoneal, retroperitoneal, transmural and transpapillary routes. The choice of access to walled-off pancreatic necrosis (WOPN) should depend not only on the spread of necrosis, but also on the experience of the clinical center. Herein we describe treatment of a patient with multilocular symptomatic walled-off pancreatic necrosis using minimally invasive techniques. The single transmural access (single transluminal gateway technique - SGT) to the necrotic collection of the patient was ineffective. The second gastrocystostomy was performed using the same minimally invasive technique as an extra way of access to the necrosis (multiple transluminal gateway technique - MTGT). In the described case the performance of the new technique consisting in endoscopic multiplexing transmural access (MTGT) was effective enough and led to complete recovery of the patient.

  2. Low-sampling-rate M-ary multiple access UWB communications in multipath channels

    KAUST Repository

    Alkhodary, Mohammad T.

    2015-08-31

    The desirable characteristics of ultra-wideband (UWB) technology are challenged by formidable sampling frequency, performance degradation in the presence of multi-user interference, and complexity of the receiver due to the channel estimation process. In this paper, a low-rate-sampling technique is used to implement M-ary multiple access UWB communications, in both the detection and channel estimation stages. A novel approach is used for multiple-access-interference (MAI) cancelation for the purpose of channel estimation. Results show reasonable performance of the proposed receiver for different number of users operating many times below Nyquist rate.

  3. Low-sampling-rate M-ary multiple access UWB communications in multipath channels

    KAUST Repository

    Alkhodary, Mohammad T.; Ballal, Tarig; Al-Naffouri, Tareq Y.; Muqaibel, Ali H.

    2015-01-01

    The desirable characteristics of ultra-wideband (UWB) technology are challenged by formidable sampling frequency, performance degradation in the presence of multi-user interference, and complexity of the receiver due to the channel estimation process. In this paper, a low-rate-sampling technique is used to implement M-ary multiple access UWB communications, in both the detection and channel estimation stages. A novel approach is used for multiple-access-interference (MAI) cancelation for the purpose of channel estimation. Results show reasonable performance of the proposed receiver for different number of users operating many times below Nyquist rate.

  4. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  5. Polarization division multiple access with polarization modulation for LOS wireless communications

    Directory of Open Access Journals (Sweden)

    Cao Bin

    2011-01-01

    Full Text Available Abstract In this paper, we discuss a potential multiple access and modulation scheme based on polarized states (PS of electromagnetic (EM waves for line-of-sight (LOS communications. The proposed scheme is theoretic different from the existing polar modulation for EDGE and WCDMA systems. We propose the detailed bit representation (modulation and multiple access scheme using PS. Because of the inflexibility of polarization information in the time and frequency domains, as well as independence of frequency and space, the polarization information can be used independently for wireless communications, i.e., another independent resource domain that can be utilized. Due to the independence between the PS and the specific features of signals (such as waveform, bandwidth and data rate, the discussed polarization division multiple access (PDMA and polarization modulation (PM are expected to improve the spectrum utilization effectively. It is proved that the polarization filtering technique can be adopted in the PDMA-PM wireless communications to separate the multiuser signals and demodulate the bit information representing by PS for desired user. Some theoretical analysis is done to demonstrate the feasibility of the proposed scheme, and the simulation results are made to evaluate the performance of the suggested system.

  6. Channel capacity of TDD-OFDM-MIMO for multiple access points in a wireless single-frequency-network

    DEFF Research Database (Denmark)

    Takatori, Y.; Fitzek, Frank; Tsunekawa, K.

    2005-01-01

    MIMO data transmission scheme, which combines Single-Frequency-Network (SFN) with TDD-OFDM-MIMO applied for wireless LAN networks. In our proposal, we advocate to use SFN for multiple access points (MAP) MIMO data transmission. The goal of this approach is to achieve very high channel capacity in both......The multiple-input-multiple-output (MIMO) technique is the most attractive candidate to improve the spectrum efficiency in the next generation wireless communication systems. However, the efficiency of MIMO techniques reduces in the line of sight (LOS) environments. In this paper, we propose a new...

  7. Pulse patterning effect in optical pulse division multiplexing for flexible single wavelength multiple access optical network

    Science.gov (United States)

    Jung, Sun-Young; Kim, Chang-Hun; Han, Sang-Kook

    2018-05-01

    A demand for high spectral efficiency requires multiple access within a single wavelength, but the uplink signals are significantly degraded because of optical beat interference (OBI) in intensity modulation/direct detection system. An optical pulse division multiplexing (OPDM) technique was proposed that could effectively reduce the OBI via a simple method as long as near-orthogonality is satisfied, but the condition was strict, and thus, the number of multiplexing units was very limited. We propose pulse pattern enhanced OPDM (e-OPDM) to reduce the OBI and improve the flexibility in multiple access within a single wavelength. The performance of the e-OPDM and patterning effect are experimentally verified after 23-km single mode fiber transmission. By employing pulse patterning in OPDM, the tight requirement was relaxed by extending the optical delay dynamic range. This could support more number of access with reduced OBI, which could eventually enhance a multiple access function.

  8. High Dimensional Modulation and MIMO Techniques for Access Networks

    DEFF Research Database (Denmark)

    Binti Othman, Maisara

    Exploration of advanced modulation formats and multiplexing techniques for next generation optical access networks are of interest as promising solutions for delivering multiple services to end-users. This thesis addresses this from two different angles: high dimensionality carrierless...... the capacity per wavelength of the femto-cell network. Bit rate up to 1.59 Gbps with fiber-wireless transmission over 1 m air distance is demonstrated. The results presented in this thesis demonstrate the feasibility of high dimensionality CAP in increasing the number of dimensions and their potentially......) optical access network. 2 X 2 MIMO RoF employing orthogonal frequency division multiplexing (OFDM) with 5.6 GHz RoF signaling over all-vertical cavity surface emitting lasers (VCSEL) WDM passive optical networks (PONs). We have employed polarization division multiplexing (PDM) to further increase...

  9. Quantum internet using code division multiple access

    Science.gov (United States)

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  10. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    Science.gov (United States)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  11. Reduction of the near-far effect in mobile communication systems with Code-Division Multiple-Access

    Science.gov (United States)

    Purchla, Magdalena

    2006-02-01

    In this paper the basic methods for reducing Multiple Access Interference (MAI) and combating the near-far effect in Direct-Sequence Code-Division Multiple-Access (DS-CDMA) mobile communication systems are presented. MAI and the near-far effect are inevitable in DS-CDMA systems with quasi-orthogonal spreading sequences. An effective method of reducing MAI can increase the capacity of the system that is why so many researchers are working in this field. In this article three most important techniques of decreasing MAI are presented: power control, multiuser detection and space-time processing. There is a short introduction to each topic and one or more examples found in literature of algorithms suitable for practical applications (although not all algorithms are yet used in existing systems).

  12. Optical code division multiple access fundamentals and applications

    CERN Document Server

    Prucnal, Paul R

    2005-01-01

    Code-division multiple access (CDMA) technology has been widely adopted in cell phones. Its astonishing success has led many to evaluate the promise of this technology for optical networks. This field has come to be known as Optical CDMA (OCDMA). Surveying the field from its infancy to the current state, Optical Code Division Multiple Access: Fundamentals and Applications offers the first comprehensive treatment of OCDMA from technology to systems.The book opens with a historical perspective, demonstrating the growth and development of the technologies that would eventually evolve into today's

  13. Stability Properties of Network Diversity Multiple Access with Multiple-Antenna Reception and Imperfect Collision Multiplicity Estimation

    Directory of Open Access Journals (Sweden)

    Ramiro Samano-Robles

    2013-01-01

    Full Text Available In NDMA (network diversity multiple access, protocol-controlled retransmissions are used to create a virtual MIMO (multiple-input multiple-output system, where collisions can be resolved via source separation. By using this retransmission diversity approach for collision resolution, NDMA is the family of random access protocols with the highest potential throughput. However, several issues remain open today in the modeling and design of this type of protocol, particularly in terms of dynamic stable performance and backlog delay. This paper attempts to partially fill this gap by proposing a Markov model for the study of the dynamic-stable performance of a symmetrical and non-blind NDMA protocol assisted by a multiple-antenna receiver. The model is useful in the study of stability aspects in terms of the backlog-user distribution and average backlog delay. It also allows for the investigation of the different states of the system and the transition probabilities between them. Unlike previous works, the proposed approach considers the imperfect estimation of the collision multiplicity, which is a crucial process to the performance of NDMA. The results suggest that NDMA improves not only the throughput performance over previous solutions, but also the average number of backlogged users, the average backlog delay and, in general, the stability of random access protocols. It is also shown that when multiuser detection conditions degrade, ALOHA-type backlog retransmission becomes relevant to the stable operation of NDMA.

  14. Dispersion-flattened-fiber based optical thresholder for multiple-access-interference suppression in OCDMA system.

    Science.gov (United States)

    Wang, Xu; Hamanaka, Taro; Wada, Naoya; Kitayama, Ken-Ichi

    2005-07-11

    An optical thresholding technique based on super-continuum generation in dispersion flattened fiber is proposed and experimentally demonstrated to enable data-rate detection in optical code division multiple access networks. The proposed scheme exhibits an excellent discrimination between a desired signal and interference signals with features of pulse reshaping, low insertion loss, polarization independency as well as reasonable operation power.

  15. Image transmission in multicore-fiber code-division multiple access network

    Science.gov (United States)

    Yang, Guu-Chang; Kwong, Wing C.

    1997-01-01

    Recently, two-dimensional (2-D) signature patterns were proposed to encode binary digitized image pixels in optical code-division multiple-access (CDMA) networks with 'multicore' fiber. The new technology enables parallel transmission and simultaneous access of 2-D images in multiple-access environment, where these signature patterns are defined as optical orthogonal signature pattern codes (OOSPCs). However, previous work on OOSPCs assumed that the weight of each signature pattern was the same. In this paper, we construct a new family of OOSPCs with the removal of this assumption. Since varying the weight of a user's signature pattern affects that user's performance, this approach is useful for CDMA optical systems with multiple performance requirements.

  16. Time division multiple access for vehicular communications

    CERN Document Server

    Omar, Hassan Aboubakr

    2014-01-01

    This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.

  17. Free-space optical code-division multiple-access system design

    Science.gov (United States)

    Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.

    1993-08-01

    This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.

  18. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    Science.gov (United States)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  19. Object oriented programming techniques applied to device access and control

    International Nuclear Information System (INIS)

    Goetz, A.; Klotz, W.D.; Meyer, J.

    1992-01-01

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  20. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Alexandr M. Kuzminskiy

    2007-10-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  1. Multiple-Antenna Interference Cancellation for WLAN with MAC Interference Avoidance in Open Access Networks

    Directory of Open Access Journals (Sweden)

    Kuzminskiy Alexandr M

    2007-01-01

    Full Text Available The potential of multiantenna interference cancellation receiver algorithms for increasing the uplink throughput in WLAN systems such as 802.11 is investigated. The medium access control (MAC in such systems is based on carrier sensing multiple-access with collision avoidance (CSMA/CA, which itself is a powerful tool for the mitigation of intrasystem interference. However, due to the spatial dependence of received signal strengths, it is possible for the collision avoidance mechanism to fail, resulting in packet collisions at the receiver and a reduction in system throughput. The CSMA/CA MAC protocol can be complemented in such scenarios by interference cancellation (IC algorithms at the physical (PHY layer. The corresponding gains in throughput are a result of the complex interplay between the PHY and MAC layers. It is shown that semiblind interference cancellation techniques are essential for mitigating the impact of interference bursts, in particular since these are typically asynchronous with respect to the desired signal burst. Semiblind IC algorithms based on second- and higher-order statistics are compared to the conventional no-IC and training-based IC techniques in an open access network (OAN scenario involving home and visiting users. It is found that the semiblind IC algorithms significantly outperform the other techniques due to the bursty and asynchronous nature of the interference caused by the MAC interference avoidance scheme.

  2. Insertion of central venous catheters for hemodialysis using angiographic techniques in patients with previous multiple catheterizations

    Energy Technology Data Exchange (ETDEWEB)

    Kotsikoris, Ioannis, E-mail: gkotsikoris@gmail.com [Department of Vascular Surgery, “Erythros Stauros” General Hospital (Greece); Zygomalas, Apollon, E-mail: azygomalas@upatras.gr [Department of General Surgery, University Hospital of Patras (Greece); Papas, Theofanis, E-mail: pfanis@otenet.gr [Department of Vascular Surgery, “Erythros Stauros” General Hospital (Greece); Maras, Dimitris, E-mail: dimmaras@gmail.com [Department of Vascular Surgery, “Erythros Stauros” General Hospital (Greece); Pavlidis, Polyvios, E-mail: polpavlidis@yahoo.gr [Department of Vascular Surgery, “Erythros Stauros” General Hospital (Greece); Andrikopoulou, Maria, E-mail: madric@gmail.com [Department of Vascular Surgery, “Erythros Stauros” General Hospital (Greece); Tsanis, Antonis, E-mail: atsanis@gmail.com [Department of Interventional Radiology, “Erythros Stauros” General Hospital (Greece); Alivizatos, Vasileios, E-mail: valiviz@hol.gr [Department of General Surgery and Artificial Nutrition Unit, “Agios Andreas” General Hospital of Patras (Greece); Bessias, Nikolaos, E-mail: bessias@otenet.gr [Department of Vascular Surgery, “Erythros Stauros” General Hospital (Greece)

    2012-09-15

    Introduction: Central venous catheter placement is an effective alternative vascular access for dialysis in patients with chronic renal failure. The purpose of this study was to evaluate the insertion of central venous catheters for hemodialysis using angiographic techniques in patients with previous multiple catheterizations in terms of efficacy of the procedure and early complications. Materials and methods: Between 2008 and 2010, the vascular access team of our hospital placed 409 central venous catheters in patients with chronic renal failure. The procedure was performed using the Seldinger blind technique. In 18 (4.4%) cases it was impossible to advance the guidewire, and so the patients were transported to the angiography suite. Results: Using the angiographic technique, the guidewire was advanced in order to position the central venous catheter. The latter was inserted into the subclavian vein in 12 (66.6%) cases, into the internal jugular vein in 4 (22.2%) and into the femoral vein in 2 (11.1%) cases. There was only one complicated case with severe arrhythmia in 1 (5.5%) patient. Conclusion: Our results suggest that insertion of central venous catheters using angiographic techniques in hemodialysis patients with previous multiple catheterizations is a safe and effective procedure with few complications and high success rates.

  3. Insertion of central venous catheters for hemodialysis using angiographic techniques in patients with previous multiple catheterizations

    International Nuclear Information System (INIS)

    Kotsikoris, Ioannis; Zygomalas, Apollon; Papas, Theofanis; Maras, Dimitris; Pavlidis, Polyvios; Andrikopoulou, Maria; Tsanis, Antonis; Alivizatos, Vasileios; Bessias, Nikolaos

    2012-01-01

    Introduction: Central venous catheter placement is an effective alternative vascular access for dialysis in patients with chronic renal failure. The purpose of this study was to evaluate the insertion of central venous catheters for hemodialysis using angiographic techniques in patients with previous multiple catheterizations in terms of efficacy of the procedure and early complications. Materials and methods: Between 2008 and 2010, the vascular access team of our hospital placed 409 central venous catheters in patients with chronic renal failure. The procedure was performed using the Seldinger blind technique. In 18 (4.4%) cases it was impossible to advance the guidewire, and so the patients were transported to the angiography suite. Results: Using the angiographic technique, the guidewire was advanced in order to position the central venous catheter. The latter was inserted into the subclavian vein in 12 (66.6%) cases, into the internal jugular vein in 4 (22.2%) and into the femoral vein in 2 (11.1%) cases. There was only one complicated case with severe arrhythmia in 1 (5.5%) patient. Conclusion: Our results suggest that insertion of central venous catheters using angiographic techniques in hemodialysis patients with previous multiple catheterizations is a safe and effective procedure with few complications and high success rates

  4. Particle Filtering for Multiple Access DS/CDMA Systems DS/CDMA Channel Estimation

    Directory of Open Access Journals (Sweden)

    Rafael Oliveira Ribeiro

    2013-09-01

    Full Text Available This article discusses computational implementation aspects and performance of a Bayesian methodology, namely particle filter (PF. The PF channel estimation technique is directly applied to the channel coefficients estimation of DS/CDMA systems. Simulation results for non-line-of-sight (NLOS Rayleigh fading channel propagation have indicated that the bootstrap PF estimator is capable to provide RMSE in the range of [10-3 ; 10-2] for a wide range of multiple access interference (MAI levels and signal-noise ratio (SNR, and still be able to offer robustness to near-far ratio (NFR effect.

  5. Wavelet based multicarrier code division multiple access ...

    African Journals Online (AJOL)

    This paper presents the study on Wavelet transform based Multicarrier Code Division Multiple Access (MC-CDMA) system for a downlink wireless channel. The performance of the system is studied for Additive White Gaussian Noise Channel (AWGN) and slowly varying multipath channels. The bit error rate (BER) versus ...

  6. Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks

    Directory of Open Access Journals (Sweden)

    Chiwoo Lim

    2018-04-01

    Full Text Available In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA, is proposed for peer discovery of distributed device-to-device (D2D communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR. The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA-based discovery.

  7. The “SAFARI” Technique Using Retrograde Access Via Peroneal Artery Access

    International Nuclear Information System (INIS)

    Zhuang, Kun Da; Tan, Seck Guan; Tay, Kiang Hiong

    2012-01-01

    The “SAFARI” technique or subintimal arterial flossing with antegrade–retrograde intervention is a method for recanalisation of chronic total occlusions (CTOs) when subintimal angioplasty fails. Retrograde access is usually obtained via the popliteal, distal anterior tibial artery (ATA)/dorsalis pedis (DP), or distal posterior tibial artery (PTA). Distal access via the peroneal artery has not been described and has a risk of continued bleeding, leading to compartment syndrome due to its deep location. We describe our experience in two patients with retrograde access via the peroneal artery and the use of balloon-assisted hemostasis for these retrograde punctures. This approach may potentially give more options for endovascular interventions in lower limb CTOs.

  8. A Technique to Speedup Access to Web Contents

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 7; Issue 7. Web Caching - A Technique to Speedup Access to Web Contents. Harsha Srinath Shiva Shankar Ramanna. General Article Volume 7 Issue 7 July 2002 pp 54-62 ... Keywords. World wide web; data caching; internet traffic; web page access.

  9. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  10. Multiple access chaotic digital communication based on generalized synchronization

    International Nuclear Information System (INIS)

    Lu Junguo

    2005-01-01

    A novel method for multiple access chaotic digital communication based on the concept of chaos generalized synchronization and the on-line least square method is proposed. This method can be used for transmitting multiple digital information signals concurrently. We illustrate the method using a Lorenz system driving a Chua's circuit and then examine the robustness of the proposed method with respect to noise in communication channel

  11. The 'SAFARI' Technique Using Retrograde Access Via Peroneal Artery Access

    Energy Technology Data Exchange (ETDEWEB)

    Zhuang, Kun Da, E-mail: zkunda@gmail.com [Singapore General Hospital, Interventional Radiology Centre (Singapore); Tan, Seck Guan [Singapore General Hospital, Department of General Surgery (Singapore); Tay, Kiang Hiong [Singapore General Hospital, Interventional Radiology Centre (Singapore)

    2012-08-15

    The 'SAFARI' technique or subintimal arterial flossing with antegrade-retrograde intervention is a method for recanalisation of chronic total occlusions (CTOs) when subintimal angioplasty fails. Retrograde access is usually obtained via the popliteal, distal anterior tibial artery (ATA)/dorsalis pedis (DP), or distal posterior tibial artery (PTA). Distal access via the peroneal artery has not been described and has a risk of continued bleeding, leading to compartment syndrome due to its deep location. We describe our experience in two patients with retrograde access via the peroneal artery and the use of balloon-assisted hemostasis for these retrograde punctures. This approach may potentially give more options for endovascular interventions in lower limb CTOs.

  12. MULTIPLE ACCESS POINTS WITHIN THE ONLINE CLASSROOM: WHERE STUDENTS LOOK FOR INFORMATION

    Directory of Open Access Journals (Sweden)

    John STEELE

    2017-01-01

    Full Text Available The purpose of this study is to examine the impact of information placement within the confines of the online classroom architecture. Also reviewed was the impact of other variables such as course design, teaching presence and student patterns in looking for information. The sample population included students from a major online university in their first year course sequence. Students were tasked with completing a survey at the end of the course, indicating their preference for accessing information within the online classroom. The qualitative data indicated that student preference is to receive information from multiple access points and sources within the online classroom architecture. Students also expressed a desire to have information delivered through the usage of technology such as email and text messaging. In addition to receiving information from multiple sources, the qualitative data indicated students were satisfied overall, with the current ways in which they received and accessed information within the online classroom setting. Major findings suggest that instructors teaching within the online classroom should have multiple data access points within the classroom architecture. Furthermore, instructors should use a variety of communication venues to enhance the ability for students to access and receive information pertinent to the course.

  13. Experimental demonstration of 2.5 Gbit/S incoherent two-dimensional optical code division multiple access system

    International Nuclear Information System (INIS)

    Glesk, I.; Baby, V.; Bres, C.-S.; Xu, L.; Rand, D.; Prucnal, P.R.

    2004-01-01

    We demonstrated error-free operation of 4 simultaneous users in a fast frequency-hopping time-spreading optical code division multiple access system operating at 2.5 Gbit/s a Star architecture. Effective power penalty was ≤0.5dB. Novel optical code division multiple access receiver based on Terahertz Optical Asymmetric Demultiplexer was demonstrated to eliminate multiple access interference (Authors)

  14. Coronary and peripheral stenting in aorto-ostial protruding stents: The balloon assisted access to protruding stent technique.

    Science.gov (United States)

    Helmy, Tarek A; Sanchez, Carlos E; Bailey, Steven R

    2016-03-01

    Treatment of aorto-ostial in-stent restenosis lesions represents a challenge for interventional cardiologists. Excessive protrusion of the stent into the aorta may lead to multiple technical problems, such as difficult catheter reengagement of the vessel ostium or inability to re-wire through the stent lumen in repeat interventions. We describe a balloon assisted access to protruding stent technique in cases where conventional coaxial engagement of an aorto-ostial protruding stent with the guide catheter or passage of the guide wire through the true lumen is not feasible. This technique is applicable both in coronary and peripheral arteries. © 2015 Wiley Periodicals, Inc.

  15. Multiple-energy Techniques in Industrial Computerized Tomography

    Science.gov (United States)

    Schneberk, D.; Martz, H.; Azevedo, S.

    1990-08-01

    Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

  16. Data access performance through parallelization and vectored access. Some results

    International Nuclear Information System (INIS)

    Furano, F; Hanushevsky, A

    2008-01-01

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network

  17. Techniques to Access Databases and Integrate Data for Hydrologic Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Whelan, Gene; Tenney, Nathan D.; Pelton, Mitchell A.; Coleman, Andre M.; Ward, Duane L.; Droppo, James G.; Meyer, Philip D.; Dorow, Kevin E.; Taira, Randal Y.

    2009-06-17

    This document addresses techniques to access and integrate data for defining site-specific conditions and behaviors associated with ground-water and surface-water radionuclide transport applicable to U.S. Nuclear Regulatory Commission reviews. Environmental models typically require input data from multiple internal and external sources that may include, but are not limited to, stream and rainfall gage data, meteorological data, hydrogeological data, habitat data, and biological data. These data may be retrieved from a variety of organizations (e.g., federal, state, and regional) and source types (e.g., HTTP, FTP, and databases). Available data sources relevant to hydrologic analyses for reactor licensing are identified and reviewed. The data sources described can be useful to define model inputs and parameters, including site features (e.g., watershed boundaries, stream locations, reservoirs, site topography), site properties (e.g., surface conditions, subsurface hydraulic properties, water quality), and site boundary conditions, input forcings, and extreme events (e.g., stream discharge, lake levels, precipitation, recharge, flood and drought characteristics). Available software tools for accessing established databases, retrieving the data, and integrating it with models were identified and reviewed. The emphasis in this review was on existing software products with minimal required modifications to enable their use with the FRAMES modeling framework. The ability of four of these tools to access and retrieve the identified data sources was reviewed. These four software tools were the Hydrologic Data Acquisition and Processing System (HDAPS), Integrated Water Resources Modeling System (IWRMS) External Data Harvester, Data for Environmental Modeling Environmental Data Download Tool (D4EM EDDT), and the FRAMES Internet Database Tools. The IWRMS External Data Harvester and the D4EM EDDT were identified as the most promising tools based on their ability to access and

  18. Techniques to Access Databases and Integrate Data for Hydrologic Modeling

    International Nuclear Information System (INIS)

    Whelan, Gene; Tenney, Nathan D.; Pelton, Mitchell A.; Coleman, Andre M.; Ward, Duane L.; Droppo, James G.; Meyer, Philip D.; Dorow, Kevin E.; Taira, Randal Y.

    2009-01-01

    This document addresses techniques to access and integrate data for defining site-specific conditions and behaviors associated with ground-water and surface-water radionuclide transport applicable to U.S. Nuclear Regulatory Commission reviews. Environmental models typically require input data from multiple internal and external sources that may include, but are not limited to, stream and rainfall gage data, meteorological data, hydrogeological data, habitat data, and biological data. These data may be retrieved from a variety of organizations (e.g., federal, state, and regional) and source types (e.g., HTTP, FTP, and databases). Available data sources relevant to hydrologic analyses for reactor licensing are identified and reviewed. The data sources described can be useful to define model inputs and parameters, including site features (e.g., watershed boundaries, stream locations, reservoirs, site topography), site properties (e.g., surface conditions, subsurface hydraulic properties, water quality), and site boundary conditions, input forcings, and extreme events (e.g., stream discharge, lake levels, precipitation, recharge, flood and drought characteristics). Available software tools for accessing established databases, retrieving the data, and integrating it with models were identified and reviewed. The emphasis in this review was on existing software products with minimal required modifications to enable their use with the FRAMES modeling framework. The ability of four of these tools to access and retrieve the identified data sources was reviewed. These four software tools were the Hydrologic Data Acquisition and Processing System (HDAPS), Integrated Water Resources Modeling System (IWRMS) External Data Harvester, Data for Environmental Modeling Environmental Data Download Tool (D4EM EDDT), and the FRAMES Internet Database Tools. The IWRMS External Data Harvester and the D4EM EDDT were identified as the most promising tools based on their ability to access and

  19. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  20. Optically transparent multiple access networks employing incoherent spectral codes

    NARCIS (Netherlands)

    Huiszoon, B.

    2008-01-01

    This Ph.D. thesis is divided into 7 chapters to provide the reader an overview of the main results achieved in di®erent sub-topics of the study towards optically transparent multiple access networks employing incoherent spectral codes taking into account wireless transmission aspects. The work

  1. Iterative Pilot-Layer Aided Channel Estimation with Emphasis on Interleave-Division Multiple Access Systems

    Directory of Open Access Journals (Sweden)

    Schoeneich Hendrik

    2006-01-01

    Full Text Available Channel estimation schemes suitable for interleave-division multiple access (IDMA systems are presented. Training and data are superimposed. Training-based and semiblind linear channel estimators are derived and their performance is discussed and compared. Monte Carlo simulation results are presented showing that the derived channel estimators in conjunction with a superimposed pilot sequence and chip-by-chip processing are able to track fast-fading frequency-selective channels. As opposed to conventional channel estimation techniques, the BER performance even improves with increasing Doppler spread for typical system parameters. An error performance close to the case of perfect channel knowledge can be achieved with high power efficiency.

  2. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  3. On Buffer-Aided Multiple-Access Relay Channel

    DEFF Research Database (Denmark)

    Liu, Rongkuan; Popovski, Petar; Wang, Gang

    2016-01-01

    This letter treats uplink scenario where M user equipments (UEs) send to a base station (BS), possibly via a common relay station (RS) that is equipped with a buffer. This is a multiple-access relay channel aided by a buffer. We devise a protocol in which the transmission mode is selected...... entirely at the BS, while simultaneously a number of UEs sends new messages to the BS. The results show that the adaptive selection of direct and buffer-aided relay transmissions leads to significant average throughput gains....

  4. A comparison of Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) approaches to satellite service for low data rate Earth stations

    Science.gov (United States)

    Stevens, G.

    1983-01-01

    A technological and economic assessment is made of providing low data rate service to small earth stations by satellite at Ka-band. Various Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) scenarios are examined and compared on the basis of cost to the end user. Very small stations (1 to 2 meters in diameter) are found not to be viable alternatives to available terrestrial services. However, medium size (3 to 5 meters) earth stations appear to be very competitive if a minimum throughput of about 1.5 Mbs is maintained. This constrains the use of such terminals to large users and shared use by smaller users. No advantage was found to the use of FDMA. TDMA had a slight advantage from a total system viewpoint and a very significant advantage in the space segment (about 1/3 the required payload weight for an equivalent capacity).

  5. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  6. Distributed magnetic field positioning system using code division multiple access

    Science.gov (United States)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  7. Lowering data retention voltage in static random access memory array by post fabrication self-improvement of cell stability by multiple stress application

    Science.gov (United States)

    Mizutani, Tomoko; Takeuchi, Kiyoshi; Saraya, Takuya; Kobayashi, Masaharu; Hiramoto, Toshiro

    2018-04-01

    We propose a new version of the post fabrication static random access memory (SRAM) self-improvement technique, which utilizes multiple stress application. It is demonstrated that, using a device matrix array (DMA) test element group (TEG) with intrinsic channel fully depleted (FD) silicon-on-thin-buried-oxide (SOTB) six-transistor (6T) SRAM cells fabricated by the 65 nm technology, the lowering of data retention voltage (DRV) is more effectively achieved than using the previously proposed single stress technique.

  8. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr

    2014-01-28

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user\\'s symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  9. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr; Alouini, Mohamed-Slim

    2014-01-01

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user's symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  10. Employing optical code division multiple access technology in the all fiber loop vibration sensor system

    Science.gov (United States)

    Tseng, Shin-Pin; Yen, Chih-Ta; Syu, Rong-Shun; Cheng, Hsu-Chih

    2013-12-01

    This study proposes a spectral amplitude coding-optical code division multiple access (SAC-OCDMA) framework to access the vibration frequency of a test object on the all fiber loop vibration sensor (AFLVS). Each user possesses an individual SAC, and fiber Bragg grating (FBG) encoders/decoders using multiple FBG arrays were adopted, providing excellent orthogonal properties in the frequency domain. The system also mitigates multiple access interference (MAI) among users. When an optical fiber is bent to a point exceeding the critical radius, the fiber loop sensor becomes sensitive to external physical parameters (e.g., temperature, strain, and vibration). The AFLVS involves placing a fiber loop with a specific radius on a designed vibration platform.

  11. Security of public key encryption technique based on multiple chaotic systems

    International Nuclear Information System (INIS)

    Wang Kai; Pei Wenjiang; Zou Liuhua; Cheung Yiuming; He Zhenya

    2006-01-01

    Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (NP) m , where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications

  12. Single-word multiple-bit upsets in static random access devices

    International Nuclear Information System (INIS)

    Koga, R.; Pinkerton, S.D.; Lie, T.J.; Crawford, K.B.

    1993-01-01

    Energetic ions and protons can cause single event upsets (SEUs) in static random access memory (SRAM) cells. In some cases multiple bits may be upset as the result of a single event. Space-borne electronics systems incorporating high-density SRAM are vulnerable to single-word multiple-bit upsets (SMUs). The authors review here recent observations of SMU, present the results of a systematic investigation of the physical cell arrangements employed in several currently available SRAM device types, and discuss implications for the occurrence and mitigation of SMU

  13. Economic effects of access management techniques in North Carolina.

    Science.gov (United States)

    2010-12-21

    The NCDOT has made significant strides to reduce collisions and increase capacity along : strategic highway corridors across the state. Efforts have led to the implementation of many : different access management techniques along corridors, such as i...

  14. Laparoscopic radical prostatectomy by extraperitoneal access with duplication of the open technique

    Directory of Open Access Journals (Sweden)

    M. Tobias-Machado

    2004-06-01

    Full Text Available INTRODUCTION: The laparoscopic radical prostatectomy is a continually developing technique. Transperitoneal access has been preferred by the majority of centers that employ this technique. Endoscopic extraperitoneal access is used by a few groups, nevertheless it is currently receiving a higher acceptance. In general, the antegrade technique is used, with dissection from the bladder neck to the prostate apex. The objective of the present paper is to describe the extraperitoneal technique with reproduction of the open surgery's surgical steps. SURGICAL TECHNIQUE: With this technique, the dissection of the prostate apex is performed and, following the section of the urethra while preserving the sphincteric apparatus, the Foley catheter is externally tied and internally recovered, which allows cranial traction, similarly to the way it is performed in conventional surgery. The retroprostatic space is posteriorly dissected and the seminal vesicles are identified by anterior and posterior approach, obtaining with this method an optimal exposure of the posterolateral pedicles and the prostate contour. The initial impression is that this technique does not present higher bleeding rate or difficulty level when compared with antegrade surgery. Potential advantages of this technique would be the greater familiarity with surgical steps, isolated extraperitoneal drainage of urine and secretions and a good definition of prostate limits and lateral pedicles, which are critical factors for preserving the neurovascular bundles and avoiding positive surgical margins. A higher number of cases and a long-term follow-up will demonstrate its actual value as a technical option for endoscopic access to the prostate.

  15. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  16. A Multiple-Reception Access Protocol with Interruptions with Mixed Priorities in CDMA Networks

    Institute of Scientific and Technical Information of China (English)

    Lu Xiaowen; Zhu Jinkang

    2003-01-01

    A novel access protocol called Multiple-Reception Access Protocol (MRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach.

  17. Non-Orthogonal Multiple Access for Large-Scale 5G Networks: Interference Aware Design

    KAUST Repository

    Ali, Konpal S.

    2017-09-18

    Non-orthogonal multiple access (NOMA) is promoted as a key component of 5G cellular networks. As the name implies, NOMA operation introduces intracell interference (i.e., interference arising within the cell) to the cellular operation. The intracell interference is managed by careful NOMA design (e.g., user clustering and resource allocation) along with successive interference cancellation. However, most of the proposed NOMA designs are agnostic to intercell interference (i.e., interference from outside the cell), which is a major performance limiting parameter in 5G networks. This article sheds light on the drastic negative-impact of intercell interference on the NOMA performance and advocates interference-aware NOMA design that jointly accounts for both intracell and intercell interference. To this end, a case study for fair NOMA operation is presented and intercell interference mitigation techniques for NOMA networks are discussed. This article also investigates the potential of integrating NOMA with two important 5G transmission schemes, namely, full duplex and device-to-device communication. This is important since the ambitious performance defined by the 3rd Generation Partnership Project (3GPP) for 5G is foreseen to be realized via seamless integration of several new technologies and transmission techniques.

  18. Impact of optical hard limiter on the performance of an optical overlapped-code division multiple access system

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Tablieh, Nicole

    2011-08-01

    Throughout this paper, a closed form expression of the multiple access interference (MAI) limited bit error rate (BER) is provided for the multiwavelength optical code-division multiple-access system when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. This system is known in literature as the optical overlapped code division multiple access (OV-CDMA) system. A unified analytical framework is presented emphasizing the impact of optical hard limiter (OHL) on the BER performance of such a system. Results show that the performance of the OV-CDMA system may be highly improved when using OHL preprocessing at the receiver side.

  19. Multiple sectioning and perforation techniques for TEM sub-surface studies

    International Nuclear Information System (INIS)

    Lee, E.H.; Rowcliffe, A.F.

    1978-01-01

    Techniques for preparing multiple electron transparent regions at several depth levels below the surface of a metal disk specimen are described. These techniques are relatively rapid and find application in many areas involving surface studies. Examples are shown of multiple thin areas produced at intervals of approximately 200 nm below the original surface of a stainless steel bombarded with 4 MeV Ni +2 ions for void swelling studies

  20. Access to DIII-D data located in multiple files and multiple locations

    International Nuclear Information System (INIS)

    McHarg, B.B. Jr.

    1993-10-01

    The General Atomics DIII-D tokamak fusion experiment is now collecting over 80 MB of data per discharge once every 10 min, and that quantity is expected to double within the next year. The size of the data files, even in compressed format, is becoming increasingly difficult to handle. Data is also being acquired now on a variety of UNIX systems as well as MicroVAX and MODCOMP computer systems. The existing computers collect all the data into a single shot file, and this data collection is taking an ever increasing amount of time as the total quantity of data increases. Data is not available to experimenters until it has been collected into the shot file, which is in conflict with the substantial need for data examination on a timely basis between shots. The experimenters are also spread over many different types of computer systems (possibly located at other sites). To improve data availability and handling, software has been developed to allow individual computer systems to create their own shot files locally. The data interface routine PTDATA that is used to access DIII-D data has been modified so that a user's code on any computer can access data from any computer where that data might be located. This data access is transparent to the user. Breaking up the shot file into separate files in multiple locations also impacts software used for data archiving, data management, and data restoration

  1. Traffic-Adaptive, Flow-Specific Medium Access for Wireless Networks

    Science.gov (United States)

    2009-09-01

    51 b. Carrier Sense Multiple Access (CSMA).................................52 c. MACA and MACAW...Figure 17. Comparison of collision avoidance techniques proposed in MACA , MACAW, and MACA -BI (From [132...low power listening lrd ......................long range dependent MAC .................medium access control MACA

  2. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  3. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  4. Polarization diversity scheme on spectral polarization coding optical code-division multiple-access network

    Science.gov (United States)

    Yen, Chih-Ta; Huang, Jen-Fa; Chang, Yao-Tang; Chen, Bo-Hau

    2010-12-01

    We present an experiment demonstrating the spectral-polarization coding optical code-division multiple-access system introduced with a nonideal state of polarization (SOP) matching conditions. In the proposed system, the encoding and double balanced-detection processes are implemented using a polarization-diversity scheme. Because of the quasiorthogonality of Hadamard codes combining with array waveguide grating routers and a polarization beam splitter, the proposed codec pair can encode-decode multiple code words of Hadamard code while retaining the ability for multiple-access interference cancellation. The experimental results demonstrate that when the system is maintained with an orthogonal SOP for each user, an effective reduction in the phase-induced intensity noise is obtained. The analytical SNR values are found to overstate the experimental results by around 2 dB when the received effective power is large. This is mainly limited by insertion losses of components and a nonflattened optical light source. Furthermore, the matching conditions can be improved by decreasing nonideal influences.

  5. Performance analysis of multiple interference suppression over asynchronous/synchronous optical code-division multiple-access system based on complementary/prime/shifted coding scheme

    Science.gov (United States)

    Nieh, Ta-Chun; Yang, Chao-Chin; Huang, Jen-Fa

    2011-08-01

    A complete complementary/prime/shifted prime (CPS) code family for the optical code-division multiple-access (OCDMA) system is proposed. Based on the ability of complete complementary (CC) code, the multiple-access interference (MAI) can be suppressed and eliminated via spectral amplitude coding (SAC) OCDMA system under asynchronous/synchronous transmission. By utilizing the shifted prime (SP) code in the SAC scheme, the hardware implementation of encoder/decoder can be simplified with a reduced number of optical components, such as arrayed waveguide grating (AWG) and fiber Bragg grating (FBG). This system has a superior performance as compared to previous bipolar-bipolar coding OCDMA systems.

  6. Multiple Access Interference Reduction Using Received Response Code Sequence for DS-CDMA UWB System

    Science.gov (United States)

    Toh, Keat Beng; Tachikawa, Shin'ichi

    This paper proposes a combination of novel Received Response (RR) sequence at the transmitter and a Matched Filter-RAKE (MF-RAKE) combining scheme receiver system for the Direct Sequence-Code Division Multiple Access Ultra Wideband (DS-CDMA UWB) multipath channel model. This paper also demonstrates the effectiveness of the RR sequence in Multiple Access Interference (MAI) reduction for the DS-CDMA UWB system. It suggests that by using conventional binary code sequence such as the M sequence or the Gold sequence, there is a possibility of generating extra MAI in the UWB system. Therefore, it is quite difficult to collect the energy efficiently although the RAKE reception method is applied at the receiver. The main purpose of the proposed system is to overcome the performance degradation for UWB transmission due to the occurrence of MAI during multiple accessing in the DS-CDMA UWB system. The proposed system improves the system performance by improving the RAKE reception performance using the RR sequence which can reduce the MAI effect significantly. Simulation results verify that significant improvement can be obtained by the proposed system in the UWB multipath channel models.

  7. [Thrombosis in vascular accesses for haemodialysis: rescue treatment using invasive vascular radiological techniques].

    Science.gov (United States)

    García Medina, J; Lacasa Pérez, N; Muray Cases, S; Pérez Garrido, I; García Medina, V

    2009-01-01

    The purpose of this paper is to communicate our experience in the salvage of thrombosed haemodialysis vascular accesses using interventional radiology techniques. In the last four years, we have treated, by radiological means, 101 thrombosed haemodialysis vascular accesses. There were 44 autologous arteriovenous fistulas (43.56%) and 57 PTFE grafts (56.44%). There were 69 men (68.3%) and 32 women (31.7%). The mean age was 67.73 years (range 33-84). The mean vascular access age was 23.79 months (range 1-132). Manual catheter-directed aspiration was used. Fragmented, triturated or pushed the thrombus against the pulmonary circulation was avoided in all cases. 78 accesses were salvaged (77.2%). Autologous fistulas average and PTFE grafts success rate were 84.44% and 71.42% respectively. Angioplasty in one or more lesions after thromboaspiration was performed in all accesses, except six (5.9%). Metallic endoprostheses were implanted in 14 accesses (13.9%). Mean follow-up was 9 months (range 0-44). Primary patency was 42.3% +/- 5 at 6 months and 32% +/- 4 at one year. Autologous fistulas patency was better than PTFE grafts patency (p better than PTFE grafts. This justifies interventional radiology techniques in these situations.

  8. Benefits of the Multiple Echo Technique for Ultrasonic Thickness Testing

    Energy Technology Data Exchange (ETDEWEB)

    Elder, J.; Vandekamp, R.

    2011-02-10

    Much effort has been put into determining methods to make accurate thickness measurements, especially at elevated temperatures. An accuracy of +/- 0.001 inches is typically noted for commercial ultrasonic thickness gauges and ultrasonic thickness techniques. Codes and standards put limitations on many inspection factors including equipment, calibration tolerance and temperature variations. These factors are important and should be controlled, but unfortunately do not guarantee accurate and repeatable measurements in the field. Most technicians long for a single technique that is best for every situation, unfortunately, there are no 'silver bullets' when it comes to nondestructive testing. This paper will describe and discuss some of the major contributors to measurement error as well as some advantages and limitations of multiple echo techniques and why multiple echo techniques should be more widely utilized for ultrasonic thickness measurements.

  9. Multiple-walled BN nanotubes obtained with a mechanical alloying technique

    International Nuclear Information System (INIS)

    Rosas, G.; Sistos, J.; Ascencio, J.A.; Medina, A.; Perez, R.

    2005-01-01

    An experimental method to obtain multiple-walled nanotubes of BN using low energy is presented. The method is based on the use of mechanical alloying techniques with elemental boron powders and nitrogen gas mixed in an autoclave at room temperature. The chemical and structural characteristics of the multiple-walled nanotubes were obtained using different techniques, such as X-ray diffraction, transmission electron microscopy, EELS microanalysis, high-resolution electron microscopy images and theoretical simulations based on the multisliced approach of the electron diffraction theory. This investigation clearly illustrates the production of multiple-wall BN nanotubes at room temperature. These results open up a new kind of synthesis method with low expense and important perspectives for use in large-quantity production. (orig.)

  10. Comparison of 3 airway access techniques during suspected spine injury management in American football.

    Science.gov (United States)

    Toler, Julianne D; Petschauer, Meredith A; Mihalik, Jason P; Oyama, Sakiko; Halverson, S Doug; Guskiewicz, Kevin M

    2010-03-01

    To determine how head movement and time to access airway were affected by 3 emergency airway access techniques used in American football. Prospective counterbalanced design. University research laboratory. Eighteen certified athletic trainers (ATCs) and 18 noncertified students (NCSs). Each participant performed 1 trial of each of the 3 after airway access techniques: quick release mechanism (QRM), cordless screwdriver (CSD), and pocket mask insertion (PMI). Time to task completion in seconds, head movement in each plane (sagittal, frontal, and transverse), maximum head movement in each plane, helmet movement in each plane, and maximum helmet movement in each plane. We observed a significant difference between all 3 techniques with respect to time required to achieve airway access (F(2,68) = 263.88; P football athlete experiencing respiratory arrest in the presence of a suspected cervical spine injury. In the event the athlete does not present with respiratory arrest, the facemask may be removed carefully with a pocket mask ready. Medical professionals must be familiar with differences in equipment and the effects these may have on the management of the spine-injured athlete.

  11. A distributed Synchronous reservation multiple access control protocol for mobile Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanling; SUN Xianpu; LI Jiandong

    2007-01-01

    This study proposes a new multiple access control protocol named distributed synchronous reservation multiple access control protocol.in which the hidden and exposed terminal problems are solved,and the quality of service(QoS)requirements for real-time traffic are guaranteed.The protocol is founded on time division multiplex address and a different type of traffic is assigned to difierent priority,according to which a node should compete for and reserve the free slots in a different method.Moreover,there is a reservation acknowledgement process before data transmit in each reserved slot,so that the intruded terminal problem is solved.The throughput and average packets drop probability of this protocol are analyzed and simulated in a fully connected network.the results of which indicate that this protocol is efficient enough to support the real-time traffic.and it is more suitable to MANETs.

  12. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  13. The Effects of Noncontingent Access to Single-versus Multiple-Stimulus Sets on Self-Injurious Behavior.

    Science.gov (United States)

    DeLeon, Iser G.; Anders, Bonita M.; Rodriguez-Catter, Vanessa; Neidert, Pamela L.

    2000-01-01

    The automatically reinforced self-injury of a girl (age 11) with autism was treated by providing noncontingent access to a single set of preferred toys during 30-minute sessions. Rotating toy sets after 10 minutes or providing access to multiple toy sets resulted in reductions that lasted the entire 30 minutes. (Contains four references.)…

  14. Performance of Non-Orthogonal Multiple Access (NOMA) in mmWave wireless communications for 5G networks

    DEFF Research Database (Denmark)

    Marcano, Andrea; Christiansen, Henrik Lehrmann

    2017-01-01

    Among the key technologies that have been identified as capacity boosters for fifth generation - 5G - mobile networks, are millimeter wave (mmWave) transmissions and non-orthogonal multiple access (NOMA). The large amount of spectrum available at mmWave frequencies combined with a more effective...... use of available resources, helps improving the overall capacity. NOMA, unlike orthogonal multiple access (OMA) methods, allows sharing the same frequency resources at the same time, by implementing adaptive power allocation. In this paper we present a performance analysis of NOMA in mmWave cells...

  15. Performance enhancement of optical code-division multiple-access systems using transposed modified Walsh code

    Science.gov (United States)

    Sikder, Somali; Ghosh, Shila

    2018-02-01

    This paper presents the construction of unipolar transposed modified Walsh code (TMWC) and analysis of its performance in optical code-division multiple-access (OCDMA) systems. Specifically, the signal-to-noise ratio, bit error rate (BER), cardinality, and spectral efficiency were investigated. The theoretical analysis demonstrated that the wavelength-hopping time-spreading system using TMWC was robust against multiple-access interference and more spectrally efficient than systems using other existing OCDMA codes. In particular, the spectral efficiency was calculated to be 1.0370 when TMWC of weight 3 was employed. The BER and eye pattern for the designed TMWC were also successfully obtained using OptiSystem simulation software. The results indicate that the proposed code design is promising for enhancing network capacity.

  16. Power Allocation in Multiple Access Networks: Implementation Aspects via Verhulst and Perron-Frobenius Models

    Directory of Open Access Journals (Sweden)

    Fábio Engel de Camargo

    2012-11-01

    Full Text Available In this work, the Verhulst model and the Perron-Frobenius theorem are applied on the power control problem which is a concern in multiple access communication networks due to the multiple access interference. This paper deals with the performance versus complexity tradeoff of both power control algorithm (PCA, as well as highlights the computational cost aspects regarding the implementability of distributed PCA (DPCA version for both algorithms. As a proof-of-concept the DPCA implementation is carried out deploying a commercial point-floating DSP platform. Numerical results in terms of DSP cycles and computational time as well indicate a feasibility of implementing the PCA-Verhulst model in 2G and 3G cellular systems; b high computational cost for the PCA-Perron-Frobenius model.

  17. Subxyphoid access of the normal pericardium: a novel drug delivery technique.

    Science.gov (United States)

    Laham, R J; Simons, M; Hung, D

    1999-05-01

    The pericardial space may potentially serve as a drug delivery reservoir that might be used to deliver therapeutic substances to the heart. This study describes a novel delivery technique that enables safe and rapid percutaneous subxyphoid access of the normal pericardium in a large animal model (49 Yorkshire pigs). An epidural introducer needle (Tuohy-17) is advanced gently under fluoroscopic guidance with a continuous positive pressure of 20-30 mm Hg (achieved by saline infusion using an intraflow system). The positive pressure is intended to push the right ventricle (with a lower pressure) away from the needle's path. Entry of the pericardial space is suspected after an increase in the saline flow through the intraflow system. Access to the pericardial space is confirmed by the injection of 1 ml of diluted contrast under fluoroscopy. A soft floppy-tip 0.025" guidewire is then advanced to the pericardial space and the needle is exchanged for an infusion catheter. Access of the pericardial space was achieved in all animals without any adverse events and without any hemodynamic compromise even with the delivery of fluid volumes as large as 50 ml. Histologic examination in 15 animals 4 weeks after pericardial access did not reveal any delivery-related myocardial damage. The safety, ease, and absence of hemodynamic compromise make this technique a potentially useful method for intrapericardial drug delivery and a good alternative to standard pericardiocentesis in patients with small pericardial effusions at higher risk for complications.

  18. Using multiple linear regression techniques to quantify carbon ...

    African Journals Online (AJOL)

    Fallow ecosystems provide a significant carbon stock that can be quantified for inclusion in the accounts of global carbon budgets. Process and statistical models of productivity, though useful, are often technically rigid as the conditions for their application are not easy to satisfy. Multiple regression techniques have been ...

  19. A new multiple noncontinuous puncture (pointage technique for corneal tattooing

    Directory of Open Access Journals (Sweden)

    Jin Hyoung Park

    2015-10-01

    Full Text Available AIM:To assess the safety and cosmetic efficacy of a new multiple noncontinuous transepithelial puncture technique for tattooing a decompensated cornea.METHODS:It was anon-comparative clinical case series study.The study examines 33 eyes in 33 patients with total corneal opacity due to corneal decompensation, which developed following intraocular surgery.Corneal tattooing was performed using the multiple noncontinuous transepithelial puncture technique (i.e. pointage. The safety of this new surgical strategy was assessed by occurrence of adverse events for the follow-up period. The cosmetic efficacy was determined by the patient’s cosmetic satisfaction and independent observer’s opinion about patient appearance.RESULTS:Seven women and 26 men were included in the study. The mean age was 46.4±17.5y (range:7-67. In total, 30 of 33 patients (91% reported cosmetic satisfaction within the follow-up period. Only 3 patients (9% required additional tattooing due to cosmetic unsatisfaction. Cosmetic outcomes were analyzed and classified as excellent or good in 13 (39% and 17 (52% patients, respectively. No serious adverse events developed, except delayed epithelial healing in 3 cases.CONCLUSION:The cosmetic outcomes of the multiple noncontinuous transepithelial puncture technique for corneal tattooing were good. The safety of this method is higher than conventional procedures. This new procedure also provides improved cost-effectiveness and safety over current corneal tattooing techniques.

  20. Gigabit Ethernet signal transmission using asynchronous optical code division multiple access.

    Science.gov (United States)

    Ma, Philip Y; Fok, Mable P; Shastri, Bhavin J; Wu, Ben; Prucnal, Paul R

    2015-12-15

    We propose and experimentally demonstrate a novel architecture for interfacing and transmitting a Gigabit Ethernet (GbE) signal using asynchronous incoherent optical code division multiple access (OCDMA). This is the first such asynchronous incoherent OCDMA system carrying GbE data being demonstrated to be working among multi-users where each user is operating with an independent clock/data rate and is granted random access to the network. Three major components, the GbE interface, the OCDMA transmitter, and the OCDMA receiver are discussed in detail. The performance of the system is studied and characterized through measuring eye diagrams, bit-error rate and packet loss rate in real-time file transfer. Our Letter also addresses the near-far problem and realizes asynchronous transmission and detection of signal.

  1. Teaching Multiple Online Sections/Courses: Tactics and Techniques

    Science.gov (United States)

    Bates, Rodger; LaBrecque, Bryan; Fortner, Emily

    2016-01-01

    The challenge of teaching online increases as the number of sections or courses increase in a semester. The tactics and techniques which enrich online instruction in the tradition of quality matters can be modified and adapted to the demands of multiple instructional needs during a semester. This paper addresses time management and instructional…

  2. Endoscopic ultrasonography-guided pancreatic duct access: techniques and literature review of pancreatography, transmural drainage and rendezvous techniques.

    Science.gov (United States)

    Itoi, Takao; Kasuya, Kazuhiko; Sofuni, Atsushi; Itokawa, Fumihide; Kurihara, Toshio; Yasuda, Ichiro; Nakai, Yousuke; Isayama, Hiroyuki; Moriyasu, Fuminori

    2013-05-01

    Endoscopic ultrasonography-guided (EUS)-guided pancreatic interventions have gained increasing attention. Here we review EUS-guided pancreatic duct (PD) access techniques and outcomes. EUS-guided PD intervention is divided into two types, antegrade and rendezvous techniques, following EUS-guided pancreatography. In the antegrade technique, pancreaticoenterostomy is carried out by stent placement between the PD and the stomach, duodenum, or jejunum. Transenteric antegrade PD stenting is conducted by stent placement, advancing anteriorly into the PD through the pancreatic tract. The rendezvous technique is carried out by using a guidewire through the papilla or anastomotic site for retrograde stent insertion. In terms of EUS-guided PD stenting, 11 case reports totaling 75 patients (35 normal anatomy, 40 altered anatomy) have been published. The technical success rate was greater than 70%. Early adverse events, including severe hematoma and severe pancreatitis,occurred in seven (63.6%) of 11 reports. Regarding the rendezvous technique, 12 case reports totaling 52 patients (22 normal anatomy, 30 altered anatomy) have been published. The technical success rate ranged from 25% to 100%. It was 48% in one report that involved more than 20 cases. Once stents were placed, all patients became free of symptoms. Early mild adverse events occurred in four (36.4%) of 11 reports. In conclusion, although it can be risky because of possible serious or even fatal adverse events, including pancreatic juice leakage, perforation and severe acute pancreatitis, EUS-PD access seems to be promising for treating symptomatic pancreatic diseases caused by PD stricture and pancreaticoenterostomy stricture. © 2013 The Authors. Digestive Endoscopy © 2013 Japan Gastroenterological Endoscopy Society.

  3. Fade detector for the FODA-TDMA access scheme

    Science.gov (United States)

    Celandroni, Nedo; Ferro, Erina; Marzoli, Antonio

    1989-05-01

    The First in first out Ordered Demand Assignment-Time Division Multiple Access (FODA-TDMA) satellite access scheme designed for simultaneous transmissions of real time data, like packetized voice and slow-scan images (stream traffic) and data coming from standard EDP applications, such as bulk data tansfer, interactive computer access, mailing, data base enquiry and updating (datagram traffic) is described. When deep fades are experienced due to rain attenuation, the system is able to counter the fade. Techniques to detect the fade are presented.

  4. Optical code-division multiple-access networks

    Science.gov (United States)

    Andonovic, Ivan; Huang, Wei

    1999-04-01

    This review details the approaches adopted to implement classical code division multiple access (CDMA) principles directly in the optical domain, resulting in all optical derivatives of electronic systems. There are a number of ways of realizing all-optical CDMA systems, classified as incoherent and coherent based on spreading in the time and frequency dimensions. The review covers the basic principles of optical CDMA (OCDMA), the nature of the codes used in these approaches and the resultant limitations on system performance with respect to the number of stations (code cardinality), the number of simultaneous users (correlation characteristics of the families of codes), concluding with consideration of network implementation issues. The latest developments will be presented with respect to the integration of conventional time spread codes, used in the bulk of the demonstrations of these networks to date, with wavelength division concepts, commonplace in optical networking. Similarly, implementations based on coherent correlation with the aid of a local oscillator will be detailed and comparisons between approaches will be drawn. Conclusions regarding the viability of these approaches allowing the goal of a large, asynchronous high capacity optical network to be realized will be made.

  5. Application of multiplicative array techniques for multibeam sounder systems

    Digital Repository Service at National Institute of Oceanography (India)

    Chakraborty, B.

    modification in terms of additional computation or hardware for improved array gain. The present work is devoted towards the study of a better beamforming method i.e. a multiplicative array technique with some modification proposEd. by Brown and Rowland...

  6. Beat Noise Cancellation in 2-D Optical Code-Division Multiple-Access Systems Using Optical Hard-Limiter Array

    Science.gov (United States)

    Dang, Ngoc T.; Pham, Anh T.; Cheng, Zixue

    We analyze the beat noise cancellation in two-dimensional optical code-division multiple-access (2-D OCDMA) systems using an optical hard-limiter (OHL) array. The Gaussian shape of optical pulse is assumed and the impact of pulse propagation is considered. We also take into account the receiver noise and multiple access interference (MAI) in the analysis. The numerical results show that, when OHL array is employed, the system performance is greatly improved compared with the cases without OHL array. Also, parameters needed for practical system design are comprehensively analyzed.

  7. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.; Aï ssa, Sonia

    2012-01-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary's reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  8. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.

    2012-09-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary\\'s reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  9. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  10. Spatial-phase code-division multiple-access system with multiplexed Fourier holography switching for reconfigurable optical interconnection

    Science.gov (United States)

    Takasago, Kazuya; Takekawa, Makoto; Shirakawa, Atsushi; Kannari, Fumihiko

    2000-05-01

    A new, to our knowledge, space-variant optical interconnection system based on a spatial-phase code-division multiple-access technique with multiplexed Fourier holography is described. In this technique a signal beam is spread over wide spatial frequencies by an M -sequence pseudorandom phase code. At a receiver side a selected signal beam is properly decoded, and at the same time its spatial pattern is shaped with a Fourier hologram, which is recorded by light that is encoded with the same M -sequence phase mask as the desired signal beam and by light whose spatial beam pattern is shaped to a signal routing pattern. Using the multiplexed holography, we can simultaneously route multisignal flows into individually specified receiver elements. The routing pattern can also be varied by means of switching the encoding phase code or replacing the hologram. We demonstrated a proof-of-principle experiment with a doubly multiplexed hologram that enables simultaneous routing of two signal beams. Using a numerical model, we showed that the proposed scheme can manage more than 250 routing patterns for one signal flow with one multiplexed hologram at a signal-to-noise ratio of 5.

  11. SURGERY FOR TUMORS OF THE FOURTH VENTRICLE: THE CHARACTERISTICS OF ACCESSES AND THE ROLE OF ENDOSCOPIC TECHNIQUES

    Directory of Open Access Journals (Sweden)

    V. B. Karakhan

    2012-01-01

    Full Text Available The use of current accesses to the tumors of the fourth ventricle, which fill and compress from the outside its cavity, was assessed in 28 patients. Original associated endomicrosurgical techniques were used. Two groups and five topographic types of fourth ventricle tumors are identified. Basic accesses — telovelar and supracerebellar — eliminate the necessity of dissecting the vermis cerebelli. The key endoscopic technique is to provide a simultaneous survey of the lower and upper poles of a tumor during its removal. The technique of trochlear removal of metastatic nodes from the fourth ventricle is shown. The benefits of endoscopic techniques are to early examine the vulnerable vascular and neural structures blocked by a tumor at the access step; to reduce the volume of an access itself and the traction of cerebellar and truncal structures; to completely survey the Sylvian aqueduct without additionally displacing or dissecting the vermis cerebelli; to maintain optical sharpness within sight of differently remote microstructures. Overall, incorporation of the endoscopic method realizes the principle of mini-invasive neurosurgery. 

  12. Applying contemporary statistical techniques

    CERN Document Server

    Wilcox, Rand R

    2003-01-01

    Applying Contemporary Statistical Techniques explains why traditional statistical methods are often inadequate or outdated when applied to modern problems. Wilcox demonstrates how new and more powerful techniques address these problems far more effectively, making these modern robust methods understandable, practical, and easily accessible.* Assumes no previous training in statistics * Explains how and why modern statistical methods provide more accurate results than conventional methods* Covers the latest developments on multiple comparisons * Includes recent advanc

  13. Popliteal versus tibial retrograde access for subintimal arterial flossing with antegrade-retrograde intervention (SAFARI) technique.

    Science.gov (United States)

    Hua, W R; Yi, M Q; Min, T L; Feng, S N; Xuan, L Z; Xing, J

    2013-08-01

    This study aimed to ascertain differences in benefit and effectiveness of popliteal versus tibial retrograde access in subintimal arterial flossing with the antegrade-retrograde intervention (SAFARI) technique. This was a retrospective study of SAFARI-assisted stenting for long chronic total occlusion (CTO) of TASC C and D superficial femoral lesions. 38 cases had superficial femoral artery lesions (23 TASC C and 15 TASC D). All 38 cases underwent SAFARI-assisted stenting. The ipsilateral popliteal artery was retrogradely punctured in 17 patients. A distal posterior tibial (PT) or dorsalis pedis (DP) artery was retrogradely punctured in 21 patients, and 16 of them were punctured after open surgical exposure. SAFARI technical success was achieved in all cases. There was no significant difference in 1-year primary patency (75% vs. 78.9%, p = .86), secondary patency (81.2% vs. 84.2%, p = .91) and access complications (p = 1.00) between popliteal and tibial retrograde access. There was statistical difference in operation time between popliteal (140.1 ± 28.4 min) and tibial retrograde access with PT/DP punctures after surgical vessel exposure (120.4 ± 23.0 min, p = .04). The SAFARI technique is a safe and feasible option for patients with infrainguinal CTO (TASC II C and D). The PT or DP as the retrograde access after surgical vessel exposure is a good choice when using the SAFARI technique. Copyright © 2013 European Society for Vascular Surgery. Published by Elsevier Ltd. All rights reserved.

  14. Preliminary application of a single-port access technique for laparoscopic ovariohysterectomy in dogs

    Science.gov (United States)

    Sánchez-Margallo, F. M.; Tapia-Araya, A.; Díaz-Güemes, I.

    2015-01-01

    Laparoscopic ovariohysterectomy using single-portal access was performed in nine selected owned dogs admitted for elective ovariohysterectomy and the surgical technique and outcomes were detailed. A multiport device (SILS Port, Covidien, USA) was placed at the umbilical area through a single 3 cm incision. Three cannulae were introduced in the multiport device through the access channels and laparoscopic ovariohysterectomy was performed using a 5-mm sealing device, a 5-mm articulating grasper and a 5-mm 30° laparoscope. The mean total operative time was 52.66±15.20 minutes and the mean skin incision during surgery was 3.09±0.20 cm. Of the nine cases examined, in the one with an ovarian tumour, the technique was converted to multiport laparoscopy introducing an additional 5-mm trocar. No surgical complications were encountered and intraoperative blood loss was minimum in all animals. Clashing of the instruments and reduced triangulation were the main limitations of this technique. The combination of articulated and straight instruments facilitated triangulation towards the surgical field and dissection capability. One month after surgery a complete wound healing was observed in all animals. The present data showed that ovariohysterectomy performed with a single-port access is technically feasible in dogs. The unique abdominal incision minimises the abdominal trauma with good cosmetic results. PMID:26568831

  15. Efficient access of compressed data

    International Nuclear Information System (INIS)

    Eggers, S.J.; Shoshani, A.

    1980-06-01

    A compression technique is presented that allows a high degree of compression but requires only logarithmic access time. The technique is a constant suppression scheme, and is most applicable to stable databases whose distribution of constants is fairly clustered. Furthermore, the repeated use of the technique permits the suppression of a multiple number of different constants. Of particular interest is the application of the constant suppression technique to databases the composite key of which is made up of an incomplete cross product of several attribute domains. The scheme for compressing the full cross product composite key is well known. This paper, however, also handles the general, incomplete case by applying the constant suppression technique in conjunction with a composite key suppression scheme

  16. Lexical access changes in patients with multiple sclerosis: a two-year follow-up study.

    Science.gov (United States)

    Sepulcre, Jorge; Peraita, Herminia; Goni, Joaquin; Arrondo, Gonzalo; Martincorena, Inigo; Duque, Beatriz; Velez de Mendizabal, Nieves; Masdeu, Joseph C; Villoslada, Pablo

    2011-02-01

    The aim of the study was to analyze lexical access strategies in patients with multiple sclerosis (MS) and their changes over time. We studied lexical access strategies during semantic and phonemic verbal fluency tests and also confrontation naming in a 2-year prospective cohort of 45 MS patients and 20 healthy controls. At baseline, switching lexical access strategy (both in semantic and in phonemic verbal fluency tests) and confrontation naming were significantly impaired in MS patients compared with controls. After 2 years follow-up, switching score decreased, and cluster size increased over time in semantic verbal fluency tasks, suggesting a failure in the retrieval of lexical information rather than an impairment of the lexical pool. In conclusion, these findings underline the significant presence of lexical access problems in patients with MS and could point out their key role in the alterations of high-level communications abilities in MS.

  17. Above the nominal limit performance evaluation of multiwavelength optical code-division multiple-access systems

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Fortier, Paul; Shalaby, Hossam M. H.

    2009-03-01

    We provide an analysis for the performance of a multiwavelength optical code-division multiple-access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one-coincidence sequences with nonrepeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of the MW-OCDMA system can be critically affected when working above the nominal limit, an event that can happen when the network operates at a high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed medium access control (MAC) protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T, while the R3T is better at very high transmission rates. In general, it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  18. An access technology delivery protocol for children with severe and multiple disabilities: a case demonstration.

    Science.gov (United States)

    Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom

    2014-08-01

    This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.

  19. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  20. Optical Code-Division Multiple-Access and Wavelength Division Multiplexing: Hybrid Scheme Review

    OpenAIRE

    P. Susthitha Menon; Sahbudin Shaari; Isaac A.M. Ashour; Hesham A. Bakarman

    2012-01-01

    Problem statement: Hybrid Optical Code-Division Multiple-Access (OCDMA) and Wavelength-Division Multiplexing (WDM) have flourished as successful schemes for expanding the transmission capacity as well as enhancing the security for OCDMA. However, a comprehensive review related to this hybrid system are lacking currently. Approach: The purpose of this paper is to review the literature on OCDMA-WDM overlay systems, including our hybrid approach of one-dimensional coding of SAC OCDMA with WDM si...

  1. Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications

    Science.gov (United States)

    Zhang, Jian-Guo

    1996-12-01

    Strict optical orthogonal codes are presented for purely asynchronous optical code-division multiple-access (CDMA) applications. The proposed code can strictly guarantee the peaks of its cross-correlation functions and the sidelobes of any of its autocorrelation functions to have a value of 1 in purely asynchronous data communications. The basic theory of the proposed codes is given. An experiment on optical CDMA systems is also demonstrated to verify the characteristics of the proposed code.

  2. Simple lock-in detection technique utilizing multiple harmonics for digital PGC demodulators.

    Science.gov (United States)

    Duan, Fajie; Huang, Tingting; Jiang, Jiajia; Fu, Xiao; Ma, Ling

    2017-06-01

    A simple lock-in detection technique especially suited for digital phase-generated carrier (PGC) demodulators is proposed in this paper. It mixes the interference signal with rectangular waves whose Fourier expansions contain multiple odd or multiple even harmonics of the carrier to recover the quadrature components needed for interference phase demodulation. In this way, the use of a multiplier is avoided and the efficiency of the algorithm is improved. Noise performance with regard to light intensity variation and circuit noise is analyzed theoretically for both the proposed technique and the traditional lock-in technique, and results show that the former provides a better signal-to-noise ratio than the latter with proper modulation depth and average interference phase. Detailed simulations were conducted and the theoretical analysis was verified. A fiber-optic Michelson interferometer was constructed and the feasibility of the proposed technique is demonstrated.

  3. Spectral amplitude coding OCDMA using and subtraction technique.

    Science.gov (United States)

    Hasoon, Feras N; Aljunid, S A; Samad, M D A; Abdullah, Mohamad Khazani; Shaari, Sahbudin

    2008-03-20

    An optical decoding technique is proposed for a spectral-amplitude-coding-optical code division multiple access, namely, the AND subtraction technique. The theory is being elaborated and experimental results have been done by comparing a double-weight code against the existing code, Hadamard. We have proved that the and subtraction technique gives better bit error rate performance than the conventional complementary subtraction technique against the received power level.

  4. Percutaneous Endovascular Salvage Techniques for Implanted Venous Access Device Dysfunction

    International Nuclear Information System (INIS)

    Breault, Stéphane; Glauser, Frédéric; Babaker, Malik; Doenz, Francesco; Qanadli, Salah Dine

    2015-01-01

    PurposeImplanted venous access devices (IVADs) are often used in patients who require long-term intravenous drug administration. The most common causes of device dysfunction include occlusion by fibrin sheath and/or catheter adherence to the vessel wall. We present percutaneous endovascular salvage techniques to restore function in occluded catheters. The aim of this study was to evaluate the feasibility, safety, and efficacy of these techniques.Methods and MaterialsThrough a femoral or brachial venous access, a snare is used to remove fibrin sheath around the IVAD catheter tip. If device dysfunction is caused by catheter adherences to the vessel wall, a new “mechanical adhesiolysis” maneuver was performed. IVAD salvage procedures performed between 2005 and 2013 were analyzed. Data included clinical background, catheter tip position, success rate, recurrence, and rate of complication.ResultsEighty-eight salvage procedures were performed in 80 patients, mostly women (52.5 %), with a mean age of 54 years. Only a minority (17.5 %) of evaluated catheters were located at an optimal position (i.e., cavoatrial junction ±1 cm). Mechanical adhesiolysis or other additional maneuvers were used in 21 cases (24 %). Overall technical success rate was 93.2 %. Malposition and/or vessel wall adherences were the main cause of technical failure. No complications were noted.ConclusionThese IVAD salvage techniques are safe and efficient. When a catheter is adherent to the vessel wall, mechanical adhesiolysis maneuvers allow catheter mobilization and a greater success rate with no additional risk. In patients who still require long-term use of their IVAD, these procedures can be performed safely to avoid catheter replacement

  5. Percutaneous Endovascular Salvage Techniques for Implanted Venous Access Device Dysfunction

    Energy Technology Data Exchange (ETDEWEB)

    Breault, Stéphane, E-mail: stephane.breault@chuv.ch [Lausanne University Hospital, Diagnostic and Interventional Radiology Department (Switzerland); Glauser, Frédéric, E-mail: frederic.glauser@chuv.ch [Lausanne University Hospital, Angiology and Diagnostic and Interventional Radiology Departments (Switzerland); Babaker, Malik, E-mail: malik.babaker@chuv.ch; Doenz, Francesco, E-mail: francesco.doenz@chuv.ch; Qanadli, Salah Dine, E-mail: salah.qanadli@chuv.ch [Lausanne University Hospital, Diagnostic and Interventional Radiology Department (Switzerland)

    2015-06-15

    PurposeImplanted venous access devices (IVADs) are often used in patients who require long-term intravenous drug administration. The most common causes of device dysfunction include occlusion by fibrin sheath and/or catheter adherence to the vessel wall. We present percutaneous endovascular salvage techniques to restore function in occluded catheters. The aim of this study was to evaluate the feasibility, safety, and efficacy of these techniques.Methods and MaterialsThrough a femoral or brachial venous access, a snare is used to remove fibrin sheath around the IVAD catheter tip. If device dysfunction is caused by catheter adherences to the vessel wall, a new “mechanical adhesiolysis” maneuver was performed. IVAD salvage procedures performed between 2005 and 2013 were analyzed. Data included clinical background, catheter tip position, success rate, recurrence, and rate of complication.ResultsEighty-eight salvage procedures were performed in 80 patients, mostly women (52.5 %), with a mean age of 54 years. Only a minority (17.5 %) of evaluated catheters were located at an optimal position (i.e., cavoatrial junction ±1 cm). Mechanical adhesiolysis or other additional maneuvers were used in 21 cases (24 %). Overall technical success rate was 93.2 %. Malposition and/or vessel wall adherences were the main cause of technical failure. No complications were noted.ConclusionThese IVAD salvage techniques are safe and efficient. When a catheter is adherent to the vessel wall, mechanical adhesiolysis maneuvers allow catheter mobilization and a greater success rate with no additional risk. In patients who still require long-term use of their IVAD, these procedures can be performed safely to avoid catheter replacement.

  6. System performances of optical space code-division multiple-access-based fiber-optic two-dimensional parallel data link.

    Science.gov (United States)

    Nakamura, M; Kitayama, K

    1998-05-10

    Optical space code-division multiple access is a scheme to multiplex and link data between two-dimensional processors such as smart pixels and spatial light modulators or arrays of optical sources like vertical-cavity surface-emitting lasers. We examine the multiplexing characteristics of optical space code-division multiple access by using optical orthogonal signature patterns. The probability density function of interference noise in interfering optical orthogonal signature patterns is calculated. The bit-error rate is derived from the result and plotted as a function of receiver threshold, code length, code weight, and number of users. Furthermore, we propose a prethresholding method to suppress the interference noise, and we experimentally verify that the method works effectively in improving system performance.

  7. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  8. Effective use of multibeam antenna and space-time multiple access technology in modern mobile communication systems

    OpenAIRE

    Moskalets, N. V.

    2015-01-01

    A possibility for efficient use of radio-frequency spectrum and of corresponding increase in productivity of mobile communication system with space-time multiple access obtained by use of multibeam antenna of base station is considered.

  9. Multiple matings among glossina and the sterile male technique

    International Nuclear Information System (INIS)

    Pinhao, R.C.

    1980-01-01

    The fact that multiple matings are a common phenomenon among glossina turns the sterile male technique into a competition not between adult insects but between two types of sperm, and the proportion of females inseminated with the one or the other is given by the binomial (p+q)sup(n), where p is the percentage of normal males, q the percentage of sterile males and n the average number of matings per female. However, multiple matings cannot damage the effectiveness of the technique unless two conditions are present either separately or simultaneously: precocious death of the spermatozoa and reduced inseminating potential among the sterile males. Study of the factors which can alter the inseminating potential is thus important for those who wish to use the sterile male technique. These factors are of three kinds: factors connected with quality, with quantity and with availability. The first are associated with the nature and intensity of the alterations brought about in the spermatozoa by the sterilizing agent, the second with possible variations in the amount of sperm reaching the spermotheca, the third with the behaviour of the sterile males in the nature - that is, the question whether sterilization has a favourable or unfavourable influence on their chances of mating with wild females. The author describes his observations of the quantity of sperm produced by Glossina morsitans submorsitans males from the colony reared at the Institute for Tropical Hygiene and Medicine in Lisbon, compares them with the observations of other authors and discusses their practical significance. Specific research is suggested. Advantages from assessing the behaviour of colonies not by female productivity but by male inseminating potential, and appropriate laboratory techniques

  10. Video Multiple Watermarking Technique Based on Image Interlacing Using DWT

    Directory of Open Access Journals (Sweden)

    Mohamed M. Ibrahim

    2014-01-01

    Full Text Available Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. In the nonblind watermarking systems, the need of the original host file in the watermark recovery operation makes an overhead over the system resources, doubles memory capacity, and doubles communications bandwidth. In this paper, a robust video multiple watermarking technique is proposed to solve this problem. This technique is based on image interlacing. In this technique, three-level discrete wavelet transform (DWT is used as a watermark embedding/extracting domain, Arnold transform is used as a watermark encryption/decryption method, and different types of media (gray image, color image, and video are used as watermarks. The robustness of this technique is tested by applying different types of attacks such as: geometric, noising, format-compression, and image-processing attacks. The simulation results show the effectiveness and good performance of the proposed technique in saving system resources, memory capacity, and communications bandwidth.

  11. Video multiple watermarking technique based on image interlacing using DWT.

    Science.gov (United States)

    Ibrahim, Mohamed M; Abdel Kader, Neamat S; Zorkany, M

    2014-01-01

    Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. In the nonblind watermarking systems, the need of the original host file in the watermark recovery operation makes an overhead over the system resources, doubles memory capacity, and doubles communications bandwidth. In this paper, a robust video multiple watermarking technique is proposed to solve this problem. This technique is based on image interlacing. In this technique, three-level discrete wavelet transform (DWT) is used as a watermark embedding/extracting domain, Arnold transform is used as a watermark encryption/decryption method, and different types of media (gray image, color image, and video) are used as watermarks. The robustness of this technique is tested by applying different types of attacks such as: geometric, noising, format-compression, and image-processing attacks. The simulation results show the effectiveness and good performance of the proposed technique in saving system resources, memory capacity, and communications bandwidth.

  12. Performance analysis of commercial multiple-input-multiple-output access point in distributed antenna system.

    Science.gov (United States)

    Fan, Yuting; Aighobahi, Anthony E; Gomes, Nathan J; Xu, Kun; Li, Jianqiang

    2015-03-23

    In this paper, we experimentally investigate the throughput of IEEE 802.11n 2x2 multiple-input-multiple-output (MIMO) signals in a radio-over-fiber-based distributed antenna system (DAS) with different fiber lengths and power imbalance. Both a MIMO-supported access point (AP) and a spatial-diversity-supported AP were separately employed in the experiments. Throughput measurements were carried out with wireless users at different locations in a typical office environment. For the different fiber length effect, the results indicate that MIMO signals can maintain high throughput when the fiber length difference between the two remote antenna units (RAUs) is under 100 m and falls quickly when the length difference is greater. For the spatial diversity signals, high throughput can be maintained even when the difference is 150 m. On the other hand, the separation of the MIMO antennas allows additional freedom in placing the antennas in strategic locations for overall improved system performance, although it may also lead to received power imbalance problems. The results show that the throughput performance drops in specific positions when the received power imbalance is above around 13 dB. Hence, there is a trade-off between the extent of the wireless coverage for moderate bit-rates and the area over which peak bit-rates can be achieved.

  13. A technique for the management of screw access opening in cement-retained implant restorations

    Directory of Open Access Journals (Sweden)

    Hamid Kermanshah

    2014-01-01

    Full Text Available Introduction: Abutment screw loosening has been considered as a common complication of implant-supported dental prostheses. This problem is more important in cement-retained implant restorations due to their invisible position of the screw access opening. Case Report: This report describes a modified retrievability method for cement-retained implant restorations in the event of abutment screw loosening. The screw access opening was marked with ceramic stain and its porcelain surface was treated using hydrofluoric acid (HF, silane, and adhesive to bond to composite resin. Discussion: The present modified technique facilitates screw access opening and improves the bond between the porcelain and composite resin.

  14. Using Direct Sub-Level Entity Access to Improve Nuclear Stockpile Simulation Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Parker, Robert Y. [Brigham Young Univ., Provo, UT (United States)

    1999-08-01

    Direct sub-level entity access is a seldom-used technique in discrete-event simulation modeling that addresses the accessibility of sub-level entity information. The technique has significant advantages over more common, alternative modeling methods--especially where hierarchical entity structures are modeled. As such, direct sub-level entity access is often preferable in modeling nuclear stockpile, life-extension issues, an area to which it has not been previously applied. Current nuclear stockpile, life-extension models were demonstrated to benefit greatly from the advantages of direct sub-level entity access. In specific cases, the application of the technique resulted in models that were up to 10 times faster than functionally equivalent models where alternative techniques were applied. Furthermore, specific implementations of direct sub-level entity access were observed to be more flexible, efficient, functional, and scalable than corresponding implementations using common modeling techniques. Common modeling techniques (''unbatch/batch'' and ''attribute-copying'') proved inefficient and cumbersome in handling many nuclear stockpile modeling complexities, including multiple weapon sites, true defect analysis, and large numbers of weapon and subsystem types. While significant effort was required to enable direct sub-level entity access in the nuclear stockpile simulation models, the enhancements were worth the effort--resulting in more efficient, more capable, and more informative models that effectively addressed the complexities of the nuclear stockpile.

  15. Average Likelihood Methods of Classification of Code Division Multiple Access (CDMA)

    Science.gov (United States)

    2016-05-01

    subject to code matrices that follows the structure given by (113). [⃗ yR y⃗I ] = √ Es 2L [ GR1 −GI1 GI2 GR2 ] [ QR −QI QI QR ] [⃗ bR b⃗I ] + [⃗ nR n⃗I... QR ] [⃗ b+ b⃗− ] + [⃗ n+ n⃗− ] (115) The average likelihood for type 4 CDMA (116) is a special case of type 1 CDMA with twice the code length and...AVERAGE LIKELIHOOD METHODS OF CLASSIFICATION OF CODE DIVISION MULTIPLE ACCESS (CDMA) MAY 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  16. A Mindfulness-Based Decentering Technique Increases the Cognitive Accessibility of Health and Weight Loss Related Goals

    Directory of Open Access Journals (Sweden)

    Katy Tapper

    2018-04-01

    Full Text Available Previous research has shown that a mindfulness-based decentering technique can help individuals resist eating chocolate over a 5-day period. However, it is unclear how this technique exerts its effect. This study explored one potential mechanism; that decentering increases the cognitive accessibility of relevant goals. Male and female participants (n = 90 spent 5 min practicing either a decentering or relaxation (control technique. They then viewed a picture of a chocolate bar for 3 min whilst either applying the decentering technique or letting their mind wander (control. Finally, all participants completed 20 letter strings, rated their motivation for weight loss and for healthy eating, and indicated whether or not they were dieting to lose weight. As predicted, those who had applied the decentering technique produced a greater number of health and weight loss related words when completing the letter strings, compared to those who had simply let their mind wander (p < 0.001. However, contrary to predictions, these effects were not significantly greater amongst those who were more motivated to lose weight or eat healthily, or amongst those who were dieting to lose weight, though the means were in the predicted directions. The results suggest that this particular mindfulness technique may increase the accessibility of relevant goals. Further research would be needed to (a compare effects with other strategies that prompt individuals to remember their goals, (b examine other potential mechanisms of action, and (c confirm that effects on self-control are mediated by increased goal accessibility.

  17. Techniques for Performance Improvement of Integer Multiplication in Cryptographic Applications

    Directory of Open Access Journals (Sweden)

    Robert Brumnik

    2014-01-01

    Full Text Available The problem of arithmetic operations performance in number fields is actively researched by many scientists, as evidenced by significant publications in this field. In this work, we offer some techniques to increase performance of software implementation of finite field multiplication algorithm, for both 32-bit and 64-bit platforms. The developed technique, called “delayed carry mechanism,” allows to preventing necessity to consider a significant bit carry at each iteration of the sum accumulation loop. This mechanism enables reducing the total number of additions and applies the modern parallelization technologies effectively.

  18. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2015-01-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  19. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman

    2015-03-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  20. Nonadditivity of quantum capacities of quantum multiple-access channels and the butterfly network

    International Nuclear Information System (INIS)

    Huang Peng; He Guangqiang; Zhu Jun; Zeng Guihua

    2011-01-01

    Multipartite quantum information transmission without additional classical resources is investigated. We show purely quantum superadditivity of quantum capacity regions of quantum memoryless multiple-access (MA) channels, which are not entanglement breaking. Also, we find that the superadditivity holds when the MA channel extends to the quantum butterfly network, which can achieve quantum network coding. The present widespread effects for the channels which enable entanglement distribution have not been revealed for multipartite scenarios.

  1. Cascaded holographic polymer reflection grating filters for optical-code-division multiple-access applications.

    Science.gov (United States)

    Kostuk, Raymond K; Maeda, Wendi; Chen, Chia-Hung; Djordjevic, Ivan; Vasic, Bane

    2005-12-10

    We evaluate the use of edge-illuminated holographic Bragg filters formed in phenanthrenequinone-doped poly(methyl methacrylate) for optical-code-division multiple-access (OCDMA) coding and decoding applications. Experimental cascaded Bragg filters are formed to select two different wavelengths with a fixed distance between the gratings and are directly coupled to a fiber-measurement system. The configuration and tolerances of the cascaded gratings are shown to be practical for time-wavelength OCDMA applications.

  2. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  3. ADNP-CSMA Random Multiple Access protocol application with the function of monitoring in Ad Hoc network

    Directory of Open Access Journals (Sweden)

    Zhan Gang

    2016-01-01

    Full Text Available In Ad Hoc networks,the net work of mobile nodes exchange information with their wireless transceiver equipment,the network throughput is in increased,compared to other such multiple hops network.Moreover along with the rapid development of modern information,communication business also will be increase.However,the access and adaptive of previous CSMA protocol are insufficient.According to these properties,this paper presents a kind of adaptive dual clock with monitoring function P-CSMA random multiple access protocol(ADNP-CSMA,and discusses two kinds of P-CSMA.ACK with monitoring function is introduced to maintain the stability of the whole system,and the introduction of dual clock mechanism reduces the channel of idle period.It calculate the system throughput expression through the method of average period,and the simulation results show that the system is constant in the case of high load throughput.

  4. Constructing a two bands optical code-division multiple-access network of bipolar optical access codecs using Walsh-coded liquid crystal modulators

    Science.gov (United States)

    Yen, Chih-Ta; Huang, Jen-Fa; Chih, Ping-En

    2014-08-01

    We propose and experimentally demonstrated the two bands optical code-division multiple-access (OCDMA) network over bipolar Walsh-coded liquid-crystal modulators (LCMs) and driven by green light and red light lasers. Achieving system performance depends on the construction of a decoder that implements a true bipolar correlation using only unipolar signals and intensity detection for each band. We took advantage of the phase delay characteristics of LCMs to construct a prototype optical coder/decoder (codec). Matched and unmatched Walsh signature codes were evaluated to detect correlations among multiuser data in the access network. By using LCMs, a red and green laser light source was spectrally encoded and the summed light dots were complementary decoded. Favorable contrast on auto- and cross-correlations indicates that binary information symbols can be properly recovered using a balanced photodetector.

  5. Hermitian symmetry free optical-single-carrier frequency division multiple access for visible light communication

    Science.gov (United States)

    Azim, Ali W.; Le Guennec, Yannis; Maury, Ghislaine

    2018-05-01

    Optical-orthogonal frequency division multiplexing (O-OFDM) is an effective scheme for visible light communications (VLC), offering a candid extension to multiple access (MA) scenarios, i.e., O-OFDMA. However, O-OFDMA exhibits high peak-to-average power ratio (PAPR), which exacerbates the non-linear distortions from the light emitting diode (LED). To overcome high PAPR while sustaining MA, optical-single-carrier frequency-division multiple access (O-SCFDMA) is used. For both O-OFDMA and O-SCFDMA, Hermitian symmetry (HS) constraint is imposed in frequency-domain (FD) to obtain a real-valued time-domain (TD) signal for intensity modulation-direct detection (IM-DD) implementation of VLC. Howbeit, HS results in an increase of PAPR for O-SCFDMA. In this regard, we propose HS free (HSF) O-SCFDMA (HSFO-SCFDMA). We compare HSFO-SCFDMA with several approaches in key parameters, such as, bit error rate (BER), optical power penalty, PAPR, quantization, electrical power efficiency and system complexity. BER performance and optical power penalty is evaluated considering multipath VLC channel and taking into account the bandwidth limitation of LED in combination with its optimized driver. It is illustrated that HSFO-SCFDMA outperforms other alternatives.

  6. How old is too old? A contribution to the discussion on age limits for assisted reproduction technique access.

    Science.gov (United States)

    Kocourková, Jiřina; Konečná, Hana; Burcin, Boris; Kučera, Tomáš

    2015-05-01

    In 2012, the Czech Republic established the women's age limit for access to assisted reproduction techniques at age 49 years. In this paper, the acceptability of this age limit from the children's perspective in the Czech Republic is assessed. Although the necessity of balancing the interests of parents and children is acknowledged, little research has taken children's interests into account. We have attempted to map out 'children's interests', asking older children and adolescents (aged 11-25 years) how old they would prefer their parents to be: Czech respondents would prefer to have younger parents. This finding is consistent with the optimal biological childbearing age rather than with the current postponement to a later age. So far, assisted reproduction techniques have been largely regarded as a medical treatment justifying the current women's age limit of 49 years. Had the children's perspective been taken into account, this age limit might have been lower than 49 years. We propose that reproductive health policy should adequately reflect multiple perspectives as an integral part of a multi-layered support system of a society. Copyright © 2015 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  7. Heterodyne detection using spectral line pairing for spectral phase encoding optical code division multiple access and dynamic dispersion compensation.

    Science.gov (United States)

    Yang, Yi; Foster, Mark; Khurgin, Jacob B; Cooper, A Brinton

    2012-07-30

    A novel coherent optical code-division multiple access (OCDMA) scheme is proposed that uses spectral line pairing to generate signals suitable for heterodyne decoding. Both signal and local reference are transmitted via a single optical fiber and a simple balanced receiver performs sourceless heterodyne detection, canceling speckle noise and multiple-access interference (MAI). To validate the idea, a 16 user fully loaded phase encoded system is simulated. Effects of fiber dispersion on system performance are studied as well. Both second and third order dispersion management is achieved by using a spectral phase encoder to adjust phase shifts of spectral components at the optical network unit (ONU).

  8. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  9. Multiple Solutions of Nonlinear Boundary Value Problems of Fractional Order: A New Analytic Iterative Technique

    Directory of Open Access Journals (Sweden)

    Omar Abu Arqub

    2014-01-01

    Full Text Available The purpose of this paper is to present a new kind of analytical method, the so-called residual power series, to predict and represent the multiplicity of solutions to nonlinear boundary value problems of fractional order. The present method is capable of calculating all branches of solutions simultaneously, even if these multiple solutions are very close and thus rather difficult to distinguish even by numerical techniques. To verify the computational efficiency of the designed proposed technique, two nonlinear models are performed, one of them arises in mixed convection flows and the other one arises in heat transfer, which both admit multiple solutions. The results reveal that the method is very effective, straightforward, and powerful for formulating these multiple solutions.

  10. Chip-interleaved optical code division multiple access relying on a photon-counting iterative successive interference canceller for free-space optical channels.

    Science.gov (United States)

    Zhou, Xiaolin; Zheng, Xiaowei; Zhang, Rong; Hanzo, Lajos

    2013-07-01

    In this paper, we design a novel Poisson photon-counting based iterative successive interference cancellation (SIC) scheme for transmission over free-space optical (FSO) channels in the presence of both multiple access interference (MAI) as well as Gamma-Gamma atmospheric turbulence fading, shot-noise and background light. Our simulation results demonstrate that the proposed scheme exhibits a strong MAI suppression capability. Importantly, an order of magnitude of BER improvements may be achieved compared to the conventional chip-level optical code-division multiple-access (OCDMA) photon-counting detector.

  11. Capacity Bounds for the Gaussian IM-DD Optical Multiple-Access Channel

    KAUST Repository

    Chaaban, Anas; Al-Ebraheemy, Omer M. S.; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Optical wireless communications (OWC) is a promising technology for closing the mismatch between the growing number of connected devices and the limited wireless network capabilities. Similar to downlink, uplink can also benefit from OWC for establishing connectivity between such devices and an optical access point. In this context, the incoherent intensitymodulation and direct-detection (IM-DD) scheme is desirable in practice. Hence, it is important to understand the fundamental limits of communication rates over an OWC uplink employing IM-DD, i.e., the channel capacity. This uplink, modeled as a Gaussian multiple-access channel (MAC) for indoors OWC, is studied in this paper, under the IM-DD constraints which form the main difference with the standard Gaussian MAC commonly studied in the radio-frequency context. Capacity region outer and inner bounds for this channel are derived. The bounds are fairly close at high signal-to-noise ratio (SNR), where a truncated- Gaussian input distribution achieves the capacity region within a constant gap. Furthermore, the bounds coincide at low SNR showing the optimality of on-off keying combined with successive cancellation decoding in this regime. At moderate SNR, an optimized uniformly-spaced discrete input distribution achieves fairly good performance.

  12. Capacity Bounds for the Gaussian IM-DD Optical Multiple-Access Channel

    KAUST Repository

    Chaaban, Anas

    2017-03-18

    Optical wireless communications (OWC) is a promising technology for closing the mismatch between the growing number of connected devices and the limited wireless network capabilities. Similar to downlink, uplink can also benefit from OWC for establishing connectivity between such devices and an optical access point. In this context, the incoherent intensitymodulation and direct-detection (IM-DD) scheme is desirable in practice. Hence, it is important to understand the fundamental limits of communication rates over an OWC uplink employing IM-DD, i.e., the channel capacity. This uplink, modeled as a Gaussian multiple-access channel (MAC) for indoors OWC, is studied in this paper, under the IM-DD constraints which form the main difference with the standard Gaussian MAC commonly studied in the radio-frequency context. Capacity region outer and inner bounds for this channel are derived. The bounds are fairly close at high signal-to-noise ratio (SNR), where a truncated- Gaussian input distribution achieves the capacity region within a constant gap. Furthermore, the bounds coincide at low SNR showing the optimality of on-off keying combined with successive cancellation decoding in this regime. At moderate SNR, an optimized uniformly-spaced discrete input distribution achieves fairly good performance.

  13. Representations of Multiple-Valued Logic Functions

    CERN Document Server

    Stankovic, Radomir S

    2012-01-01

    Compared to binary switching functions, multiple-valued functions offer more compact representations of the information content of signals modeled by logic functions and, therefore, their use fits very well in the general settings of data compression attempts and approaches. The first task in dealing with such signals is to provide mathematical methods for their representation in a way that will make their application in practice feasible.Representation of Multiple-Valued Logic Functions is aimed at providing an accessible introduction to these mathematical techniques that are necessary for ap

  14. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  15. Iterative Pilot-Layer Aided Channel Estimation with Emphasis on Interleave-Division Multiple Access Systems

    OpenAIRE

    Schoeneich Hendrik; Hoeher Peter Adam

    2006-01-01

    Channel estimation schemes suitable for interleave-division multiple access (IDMA) systems are presented. Training and data are superimposed. Training-based and semiblind linear channel estimators are derived and their performance is discussed and compared. Monte Carlo simulation results are presented showing that the derived channel estimators in conjunction with a superimposed pilot sequence and chip-by-chip processing are able to track fast-fading frequency-selective channels. As opposed ...

  16. A Novel Technique to Detect Code for SAC-OCDMA System

    Science.gov (United States)

    Bharti, Manisha; Kumar, Manoj; Sharma, Ajay K.

    2018-04-01

    The main task of optical code division multiple access (OCDMA) system is the detection of code used by a user in presence of multiple access interference (MAI). In this paper, new method of detection known as XOR subtraction detection for spectral amplitude coding OCDMA (SAC-OCDMA) based on double weight codes has been proposed and presented. As MAI is the main source of performance deterioration in OCDMA system, therefore, SAC technique is used in this paper to eliminate the effect of MAI up to a large extent. A comparative analysis is then made between the proposed scheme and other conventional detection schemes used like complimentary subtraction detection, AND subtraction detection and NAND subtraction detection. The system performance is characterized by Q-factor, BER and received optical power (ROP) with respect to input laser power and fiber length. The theoretical and simulation investigations reveal that the proposed detection technique provides better quality factor, security and received power in comparison to other conventional techniques. The wide opening of eye in case of proposed technique also proves its robustness.

  17. Filter multiplexing by use of spatial Code Division Multiple Access approach.

    Science.gov (United States)

    Solomon, Jonathan; Zalevsky, Zeev; Mendlovic, David; Monreal, Javier Garcia

    2003-02-10

    The increasing popularity of optical communication has also brought a demand for a broader bandwidth. The trend, naturally, was to implement methods from traditional electronic communication. One of the most effective traditional methods is Code Division Multiple Access. In this research, we suggest the use of this approach for spatial coding applied to images. The approach is to multiplex several filters into one plane while keeping their mutual orthogonality. It is shown that if the filters are limited by their bandwidth, the output of all the filters can be sampled in the original image resolution and fully recovered through an all-optical setup. The theoretical analysis of such a setup is verified in an experimental demonstration.

  18. Doing Ethics: A Universal Technique in an Accessibility Context

    Directory of Open Access Journals (Sweden)

    Christopher Simpson

    2003-05-01

    Full Text Available Whether a student, a retiree or in professional practice, today one confronts many situations where it would be helpful to have a particular way of sifting through issues to determine appropriate courses of action. Gordon Preece (2002 writing on a recent topical issue put it this way: 'The womb is like an ethical war-zone. Embryonic stem-cell research, deaf lesbians choosing deaf-babies, IVF embryos chosen and conceived to save existing children, single and lesbian women accessing IVF. Hardly a day goes by without a new ethical dilemma. The pace of technological change and precedent makes it almost impossible to keep up. ' This paper gives the background that gave rise to this technique, the process itself, and then makes use of exemplary scenarios to illustrate how the procedure can be useful to practitioners. One scenario illustrates the approach, while a second illustrates the value in designing appropriate scenarios. The paper ends with suggestions of how the technique, first used in a student context, can be extended to suit professionals from different disciplines as multi-disciplinary teams engage in activities such as building websites.

  19. Multiple k Nearest Neighbor Query Processing in Spatial Network Databases

    DEFF Research Database (Denmark)

    Xuegang, Huang; Jensen, Christian Søndergaard; Saltenis, Simonas

    2006-01-01

    This paper concerns the efficient processing of multiple k nearest neighbor queries in a road-network setting. The assumed setting covers a range of scenarios such as the one where a large population of mobile service users that are constrained to a road network issue nearest-neighbor queries...... for points of interest that are accessible via the road network. Given multiple k nearest neighbor queries, the paper proposes progressive techniques that selectively cache query results in main memory and subsequently reuse these for query processing. The paper initially proposes techniques for the case...... where an upper bound on k is known a priori and then extends the techniques to the case where this is not so. Based on empirical studies with real-world data, the paper offers insight into the circumstances under which the different proposed techniques can be used with advantage for multiple k nearest...

  20. A Novel Technique Using a Protection Filter During Fibrin Sheath Removal for Implanted Venous Access Device Dysfunction

    Energy Technology Data Exchange (ETDEWEB)

    Sotiriadis, Charalampos; Hajdu, Steven David [University Hospital of Lausanne, Cardiothoracic and Vascular Unit, Department of Radiology (Switzerland); Degrauwe, Sophie [University Hospital of Lausanne, Department of Cardiology (Switzerland); Barras, Heloise; Qanadli, Salah Dine, E-mail: salah.qanadli@chuv.ch [University Hospital of Lausanne, Cardiothoracic and Vascular Unit, Department of Radiology (Switzerland)

    2016-08-15

    With the increased use of implanted venous access devices (IVADs) for continuous long-term venous access, several techniques such as percutaneous endovascular fibrin sheath removal, have been described, to maintain catheter function. Most standard techniques do not capture the stripped fibrin sheath, which is subsequently released in the pulmonary circulation and may lead to symptomatic pulmonary embolism. The presented case describes an endovascular technique which includes stripping, capture, and removal of fibrin sheath using a novel filter device. A 64-year-old woman presented with IVAD dysfunction. Stripping was performed using a co-axial snare to the filter to capture the fibrin sheath. The captured fragment was subsequently removed for visual and pathological verification. No immediate complication was observed and the patient was discharged the day of the procedure.

  1. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  2. Nonorthogonal multiple access and carrierless amplitude phase modulation for flexible multiuser provisioning in 5G mobile networks

    NARCIS (Netherlands)

    Altabas, J.A.; Rommel, S.; Puerta, R.; Izquierdo, D.; Ignacio Garces, J.; Antonio Lazaro, J.; Vegas Olmos, J.J.; Tafur Monroy, I.

    2017-01-01

    In this paper, a combined nonorthogonal multiple access (NOMA) and multiband carrierless amplitude phase modulation (multiCAP) scheme is proposed for capacity enhancement of and flexible resource provisioning in 5G mobile networks. The proposed scheme is experimentally evaluated over a W-band

  3. Performance analysis of 2D asynchronous hard-limiting optical code-division multiple access system through atmospheric scattering channel

    Science.gov (United States)

    Zhao, Yaqin; Zhong, Xin; Wu, Di; Zhang, Ye; Ren, Guanghui; Wu, Zhilu

    2013-09-01

    Optical code-division multiple access (OCDMA) systems usually allocate orthogonal or quasi-orthogonal codes to the active users. When transmitting through atmospheric scattering channel, the coding pulses are broadened and the orthogonality of the codes is worsened. In truly asynchronous case, namely both the chips and the bits are asynchronous among each active user, the pulse broadening affects the system performance a lot. In this paper, we evaluate the performance of a 2D asynchronous hard-limiting wireless OCDMA system through atmospheric scattering channel. The probability density function of multiple access interference in truly asynchronous case is given. The bit error rate decreases as the ratio of the chip period to the root mean square delay spread increases and the channel limits the bit rate to different levels when the chip period varies.

  4. Post-Coma Persons with Extensive Multiple Disabilities Use Microswitch Technology to Access Selected Stimulus Events or Operate a Radio Device

    Science.gov (United States)

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella

    2011-01-01

    The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II…

  5. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  6. Multiple Intimate Partner Violence Experiences: Knowledge, Access, Utilization and Barriers to Utilization of Resources by Women of the African Diaspora.

    Science.gov (United States)

    Sabri, Bushra; Huerta, Julia; Alexander, Kamila A; St Vil, Noelle M; Campbell, Jacquelyn C; Callwood, Gloria B

    2015-11-01

    This study examined knowledge, access, utilization, and barriers to use of resources among Black women exposed to multiple types of intimate partner violence in Baltimore, Maryland and the U.S. Virgin Islands (USVI). We analyzed quantitative survey data collected by 163 women recruited from primary care, prenatal or family planning clinics in Baltimore and the USVI. In addition we analyzed qualitative data from in-depth interviews with 11 women. Quantitative data were analyzed using descriptive statistics and qualitative data were analyzed using thematic analysis. A substantial proportion of Black women with multiple types of violence experiences lacked knowledge of, did not have access to, and did not use resources. Barriers to resource use were identified at the individual, relationship, and community levels. There is need for programs to develop awareness, promote access and utilization of resources, and eliminate barriers to resource use among abused Black women.

  7. Performance analysis of spectral-phase-encoded optical code-division multiple-access system regarding the incorrectly decoded signal as a nonstationary random process

    Science.gov (United States)

    Yan, Meng; Yao, Minyu; Zhang, Hongming

    2005-11-01

    The performance of a spectral-phase-encoded (SPE) optical code-division multiple-access (OCDMA) system is analyzed. Regarding the incorrectly decoded signal (IDS) as a nonstationary random process, we derive a novel probability distribution for it. The probability distribution of the IDS is considered a chi-squared distribution with degrees of freedom r=1, which is more reasonable and accurate than in previous work. The bit error rate (BER) of an SPE OCDMA system under multiple-access interference is evaluated. Numerical results show that the system can sustain very low BER even when there are multiple simultaneous users, and as the code length becomes longer or the initial pulse becomes shorter, the system performs better.

  8. Allocation and management issues in multiple-transaction open access transmission networks

    Science.gov (United States)

    Tao, Shu

    This thesis focuses on some key issues related to allocation and management by the independent grid operator (IGO) of unbundled services in multiple-transaction open access transmission networks. The three unbundled services addressed in the thesis are transmission real power losses, reactive power support requirements from generation sources, and transmission congestion management. We develop the general framework that explicitly represents multiple transactions undertaken simultaneously in the transmission grid. This framework serves as the basis for formulating various problems treated in the thesis. We use this comprehensive framework to develop a physical-flow-based mechanism to allocate the total transmission losses to each transaction using the system. An important property of the allocation scheme is its capability to effectively deal with counter flows that result in the presence of specific transactions. Using the loss allocation results as the basis, we construct the equivalent loss compensation concept and apply it to develop flexible and effective procedures for compensating losses in multiple-transaction networks. We present a new physical-flow-based mechanism for allocating the reactive power support requirements provided by generators in multiple-transaction networks. The allocatable reactive support requirements are formulated as the sum of two specific components---the voltage magnitude variation component and the voltage angle variation component. The formulation utilizes the multiple-transaction framework and makes use of certain simplifying approximations. The formulation leads to a natural allocation as a function of the amount of each transaction. The physical interpretation of each allocation as a sensitivity of the reactive output of a generator is discussed. We propose a congestion management allocation scheme for multiple-transaction networks. The proposed scheme determines the allocation of congestion among the transactions on a physical

  9. Venous Access Ports: Indications, Implantation Technique, Follow-Up, and Complications

    Energy Technology Data Exchange (ETDEWEB)

    Walser, Eric M., E-mail: walser.eric@mayo.edu [Mayo Clinic, Department of Radiology (United States)

    2012-08-15

    The subcutaneous venous access device (SVAD or 'port') is a critical component in the care of patients with chronic disease. The modern SVAD provides reliable access for blood withdrawal and medication administration with minimal disruption to a patient's lifestyle. Because of improved materials and catheter technology, today's ports are lighter and stronger and capable of high-pressure injections of contrast for cross-sectional imaging. The majority of SVAD placement occurs in interventional radiology departments due to their ability to provide this service at lower costs, lower, complication rates, and greater volumes. Port-insertion techniques vary depending on the operator, but all consist of catheter placement in the central venous circulation followed by subcutaneous pocket creation and port attachment to the catheter with fixation and closure of the pocket. Venous access challenges occasionally occur in patients with central vein occlusions, necessitating catheterization of collateral veins or port placement in alternate locations. Complications of SVADs include those associated with the procedure as well as short- (<30 days) and long-term problems. Procedural and early complications are quite rare due to the near-universal use of real-time ultrasound guidance for vein puncture, but they can include hematoma, catheter malposition, arrhythmias, and pneumothorax. Late problems include both thrombotic complications (native venous or port-catheter thrombosis) and infections (tunnel or pocket infections or catheter-associated bloodstream infections). Most guidelines suggest that 0.3 infections/1000 catheter days is an appropriate upper threshold for the insertion of SVADs.

  10. [Investigation of RNA viral genome amplification by multiple displacement amplification technique].

    Science.gov (United States)

    Pang, Zheng; Li, Jian-Dong; Li, Chuan; Liang, Mi-Fang; Li, De-Xin

    2013-06-01

    In order to facilitate the detection of newly emerging or rare viral infectious diseases, a negative-strand RNA virus-severe fever with thrombocytopenia syndrome bunyavirus, and a positive-strand RNA virus-dengue virus, were used to investigate RNA viral genome unspecific amplification by multiple displacement amplification technique from clinical samples. Series of 10-fold diluted purified viral RNA were utilized as analog samples with different pathogen loads, after a series of reactions were sequentially processed, single-strand cDNA, double-strand cDNA, double-strand cDNA treated with ligation without or with supplemental RNA were generated, then a Phi29 DNA polymerase depended isothermal amplification was employed, and finally the target gene copies were detected by real time PCR assays to evaluate the amplification efficiencies of various methods. The results showed that multiple displacement amplification effects of single-strand or double-strand cDNA templates were limited, while the fold increases of double-strand cDNA templates treated with ligation could be up to 6 X 10(3), even 2 X 10(5) when supplemental RNA existed, and better results were obtained when viral RNA loads were lower. A RNA viral genome amplification system using multiple displacement amplification technique was established in this study and effective amplification of RNA viral genome with low load was achieved, which could provide a tool to synthesize adequate viral genome for multiplex pathogens detection.

  11. WATER TEMPERATURE and other data from MULTIPLE SHIPS from 1983-01-01 to 1992-12-31 (NODC Accession 9400224)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains data collected as part of Shipboard Environmental data Acquisition System (SEAS) II program. The cruises were conducted using multiple ships....

  12. Occluded Brescia-Cimino Hemodialysis Fistulas: Endovascular Treatment with Both Brachial Arterial and Venous Access Using the Pull-Through Technique

    International Nuclear Information System (INIS)

    Miyayama, Shiro; Matsui, Osamu; Taki, Keiichi; Minami, Tetsuya; Shinmura, Rieko; Ito, Chiharu; Takamatsu, Shigeyuki; Kobayashi, Miki; Ushiogi, Yashuyuki

    2005-01-01

    We retrospectively evaluated the usefulness of both arterial and venous access with the pull-through technique in endovascular treatment of totally occluded Brescia-Cimino fistulas. We treated 26 patients (17 men, 9 women; age range 43-82 years, mean age 66 years) with occluded Brescia-Cimino fistulas. First, the occluded segment was traversed from the antegrade brachial arterial access using a microcatheter-guidewire system. Second, the vein was retrogradely punctured after confirmation of all diseased segments, and a 0.014- or 0.016-inch guidewire was pulled through the venous access when the occluded segment was long. All interventions including thrombolysis, thromboaspiration, angioplasty, and stent placement were performed via the venous access. The occlusion was successfully crossed via the brachial arterial access in 23 patients (88%). In 2 patients it was done from the venous approach. In the remaining patient it was not possible to traverse the occluded segment. The pull-through technique was successful in all 19 attempts. Clinical success was achieved in 96%, the primary patency rates at 6, 12, and 18 months were 83%, 78%, and 69%, the primary assisted patency rates were 92%, 92%, and 72%, and the secondary patency rates were 92%, 92%, and 92%, respectively. Minor complications in 5 patients included venous perforation in 2 (8%), venous rupture in 1 (4%), and regional hematoma in 2 (8%). Our study suggests that endovascular treatments with both arterial and venous access using the pull-through technique are highly effective in restoring function in totally occluded Brescia-Cimino fistulas

  13. A novel fiber-free technique for brain activity imaging in multiple freely behaving mice

    Science.gov (United States)

    Inagaki, Shigenori; Agetsuma, Masakazu; Nagai, Takeharu

    2018-02-01

    Brain functions and related psychiatric disorders have been investigated by recording electrophysiological field potential. When recording it, a conventional method requires fiber-based apparatus connected to the brain, which however hampers the simultaneous measurement in multiple animals (e.g. by a tangle of fibers). Here, we propose a fiber-free recording technique in conjunction with a ratiometric bioluminescent voltage indicator. Our method allows investigation of electrophysiological filed potential dynamics in multiple freely behaving animals simultaneously over a long time period. Therefore, this fiber-free technique opens up the way to investigate a new mechanism of brain function that governs social behaviors and animal-to-animal interaction.

  14. Multiple-indicator dilution technique for characterization of normal and retrograde flow in once-through rat liver perfusions

    International Nuclear Information System (INIS)

    St-Pierre, M.V.; Schwab, A.J.; Goresky, C.A.; Lee, W.F.; Pang, K.S.

    1989-01-01

    The technique of normal and retrograde rat liver perfusion has been widely used to probe zonal differences in drug-metabolizing activities. The validity of this approach mandates the same tissue spaces being accessed by substrates during both normal and retrograde perfusions. Using the multiple-indicator dilution technique, we presently examine the extent to which retrograde perfusion alters the spaces accessible to noneliminated references. A bolus dose of 51Cr-labeled red blood cells, 125I-albumin, 14C-sucrose and 3H2O was injected into the portal (normal) or hepatic (retrograde) vein of rat livers perfused at 10 ml per min per liver. The outflow perfusate was serially collected over 220 sec to characterize the transit times and the distribution spaces of the labels. During retrograde perfusion, red blood cells, albumin and sucrose profiles peaked later and lower than during normal perfusion, whereas the water curves were similar. The transit times of red blood cells, albumin and sucrose were longer (p less than 0.005), whereas those for water did not change. Consequently, retrograde flow resulted in significantly larger sinusoidal blood volumes (45%), albumin Disse space (42%) and sucrose Disse space (25%) than during normal flow, whereas the distribution spaces for total and intracellular water remained unaltered. The distension of the vascular tree was confirmed by electron microscopy, by which occasional isolated foci of widened intercellular recesses and spaces of Disse were observed. Cellular ultrastructure was otherwise unchanged, and there was no difference found between normal and retrograde perfusion for bile flow rates, AST release, perfusion pressure, oxygen consumption and metabolic removal of ethanol, a substrate with flow-limited distribution, which equilibrates rapidly with cell water (hepatic extraction ratios were virtually identical: normal vs. retrograde, 0.50 vs. 0.48 at 6 to 7.4 mM input concentration)

  15. Mitigation of Beat Noise in Time Wavelength Optical Code-Division Multiple-Access Systems

    Science.gov (United States)

    Bazan, Taher M.; Harle, David; Andonovic, Ivan

    2006-11-01

    This paper presents an analysis of two methods for enhancing the performance of two-dimensional time wavelength Optical code-division multiple-access systems by mitigating the effects of beat noise. The first methodology makes use of an optical hard limiter (OHL) in the receiver prior to the optical correlator; a general formula for the error probability as a function of crosstalk level for systems adopting OHLs is given, and the implications of the OHL's nonideal transfer characteristics are then examined. The second approach adopts pulse position modulation, and system performance is estimated and compared to that associated with on off keying.

  16. Techniques necessary for multiple tracer quantitative small-animal imaging studies

    International Nuclear Information System (INIS)

    Sharp, Terry L.; Dence, Carmen S.; Engelbach, John A.; Herrero, Pilar; Gropler, Robert J.; Welch, Michael J.

    2005-01-01

    Introduction: An increasing number and variety of studies on rodent models are being conducted using small-animal positron emission tomography scanners. We aimed to determine if animal handling techniques could be developed to perform routine animal imaging in a timely and efficient manner and with minimal effect on animal physiology. These techniques need to be reproducible in the same animal while maintaining hemodynamic and physiological stability. Methods: The necessary techniques include (a) the use of inhalant anesthesia, (b) arterial and venous cannulation for multiple tracer administrations and blood sampling, (c) development of small-volume analytic columns and techniques and (d) measurement of the physiological environment during the imaging session. Results: We provide an example of a cardiac imaging study using four radiotracers ( 15 O-water, 1-[ 11 C]-acetate, 1-[ 11 C]-palmitate and 1-[ 11 C]-glucose) injected into normal rats. Plasma substrates, CO 2 production and total metabolites were measured. The animals remained anesthetized over the entire imaging session, and their physiological state was maintained. Conclusion: The intrastudy stability of the physiological measurements and substrate levels and interstudy reproducibility of the measurements are reported

  17. Temperature, salinity, nutrients, and meteorological data collected from 1926 to 1991 aboard multiple platforms in Caspian Sea (NODC Accession 0072200)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NODC Accession 0072200 contains temperature, salinity, nutrients, and meteorological data collected from 1926 to 1991 aboard multiple platforms in Caspian Sea.

  18. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  19. White matter damage impairs access to consciousness in multiple sclerosis.

    Science.gov (United States)

    Reuter, Françoise; Del Cul, Antoine; Malikova, Irina; Naccache, Lionel; Confort-Gouny, Sylviane; Cohen, Laurent; Cherif, André Ali; Cozzone, Patrick J; Pelletier, Jean; Ranjeva, Jean-Philippe; Dehaene, Stanislas; Audoin, Bertrand

    2009-01-15

    Global neuronal workspace theory predicts that damage to long-distance white matter (WM) tracts should impair access to consciousness during the perception of brief stimuli. To address this issue, we studied visual backward masking in 18 patients at the very first clinical stage of multiple sclerosis (MS), a neurological disease characterized by extensive WM damage, and in 18 matched healthy subjects. In our masking paradigm, the visibility of a digit stimulus increases non-linearly as a function of the interval duration between this target and a subsequent mask. In order to characterize quantitatively, for each subject, the transition between non-conscious and conscious perception of the stimulus, we used non-linear regression to fit a sigmoid curve to objective performance and subjective visibility reports as a function of target-mask delay. The delay corresponding to the inflexion point of the sigmoid, where visibility suddenly increases, was termed the "non-linear transition threshold" and used as a summary measure of masking efficiency. Objective and subjective non-linear transition thresholds were highly correlated across subjects in both groups, and were higher in patients compared to controls. In patients, variations in the non-linear transition threshold were inversely correlated to the Magnetization transfer ratio (MTR) values inside the right dorsolateral prefrontal WM, the right occipito-frontal fasciculus and the left cerebellum. This study provides clinical evidence of a relationship between impairments of conscious access and integrity of large WM bundles, particularly involving prefrontal cortex, as predicted by global neuronal workspace theory.

  20. Optimized scheduling technique of null subcarriers for peak power control in 3GPP LTE downlink.

    Science.gov (United States)

    Cho, Soobum; Park, Sang Kyu

    2014-01-01

    Orthogonal frequency division multiple access (OFDMA) is a key multiple access technique for the long term evolution (LTE) downlink. However, high peak-to-average power ratio (PAPR) can cause the degradation of power efficiency. The well-known PAPR reduction technique, dummy sequence insertion (DSI), can be a realistic solution because of its structural simplicity. However, the large usage of subcarriers for the dummy sequences may decrease the transmitted data rate in the DSI scheme. In this paper, a novel DSI scheme is applied to the LTE system. Firstly, we obtain the null subcarriers in single-input single-output (SISO) and multiple-input multiple-output (MIMO) systems, respectively; then, optimized dummy sequences are inserted into the obtained null subcarrier. Simulation results show that Walsh-Hadamard transform (WHT) sequence is the best for the dummy sequence and the ratio of 16 to 20 for the WHT and randomly generated sequences has the maximum PAPR reduction performance. The number of near optimal iteration is derived to prevent exhausted iterations. It is also shown that there is no bit error rate (BER) degradation with the proposed technique in LTE downlink system.

  1. Vascular access in critical limb ischemia.

    Science.gov (United States)

    Kang, Won Yu; Campia, Umberto; Ota, Hideaki; Didier, Romain J; Negi, Smita I; Kiramijyan, Sarkis; Koifman, Edward; Baker, Nevin C; Magalhaes, Marco A; Lipinski, Michael J; Escarcega, Ricardo O; Torguson, Rebecca; Waksman, Ron; Bernardo, Nelson L

    2016-01-01

    Currently, percutaneous endovascular intervention is considered a first line of therapy for treating patients with critical limb ischemia. As the result of remarkable development of techniques and technologies, percutaneous endovascular intervention has led to rates of limb salvage comparable to those achieved with bypass surgery, with fewer complications, even in the presence of lower rates of long-term patency. Currently, interventionalists have a multiplicity of access routes including smaller arteries, with both antegrade and retrograde approaches. Therefore, the choice of the optimal access site has become an integral part of the success of the percutaneous intervention. By understanding the technical aspects, as well as the advantages and limitations of each approach, the interventionalists can improve clinical outcomes in patients with severe peripheral arterial disease. This article reviews the access routes in critical limb ischemia, their advantages and disadvantages, and the clinical outcomes of each. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  3. A sectional-splinting technique for impressing multiple implant units by eliminating the use of an open tray

    Directory of Open Access Journals (Sweden)

    Suryakant C. Deogade

    2014-01-01

    Full Text Available Since the inception of root form implant dentistry by P-I Branemark in the early 1980′s, so many technical advances have been put forward by several authors. However, the open tray impression technique is still performed for impressing multiple implant fixtures as it was first described in the original Branemark procedure manual. The most critical aspect for a successful implant-supported restoration is the passive and an accurate fit of superstructures to avoid preload and loading stresses. Splinting impression technique in multiple implants has gained popularity. Auto-polymerizing acrylic resin is among the most routinely practiced splinting material for multiple implant units. However, unfortunately, it exhibits shrinkage, which makes an impression quite inaccurate. This case report presents the solution to minimize the shrinkage of resin by utilizing sectional-splinting technique as advocated in the previous implant literature.

  4. Analysis of multiple instructional techniques on the understanding and retention of select mechanical topics

    Science.gov (United States)

    Fetsco, Sara Elizabeth

    There are several topics that introductory physics students typically have difficulty understanding. The purpose of this thesis is to investigate if multiple instructional techniques will help students to better understand and retain the material. The three units analyzed in this study are graphing motion, projectile motion, and conservation of momentum. For each unit students were taught using new or altered instructional methods including online laboratory simulations, inquiry labs, and interactive demonstrations. Additionally, traditional instructional methods such as lecture and problem sets were retained. Effectiveness was measured through pre- and post-tests and student opinion surveys. Results suggest that incorporating multiple instructional techniques into teaching will improve student understanding and retention. Students stated that they learned well from all of the instructional methods used except the online simulations.

  5. Preparation of thin actinide metal disks using a multiple disk casting technique

    International Nuclear Information System (INIS)

    Conner, W.V.

    1975-01-01

    A casting technique has been developed for preparing multiple actinide metal disks which have a minimum thickness of 0.006 inch. This technique was based on an injection casting procedure which utilizes the weight of a tantalum metal rod to force the molten metal into the mold cavity. Using the proper mold design and casting parameters, it has been possible to prepare ten 1/2 inch diameter neptunium or plutonium metal disks in a single casting, This casting technique is capable of producing disks which are very uniform. The average thickness of the disks from a typical casting will vary no more than 0.001 inch and the variation in the thickness of the individual disks will range from 0.0001 to 0.0005 inch. (Auth.)

  6. Preparation of thin actinide metal disks using a multiple disk casting technique

    International Nuclear Information System (INIS)

    Conner, W.V.

    1976-01-01

    A casting technique has been developed for preparing multiple actinide metal disks which have a minimum thickness of 0.006 inch. This technique was based on an injection casting procedure which utilizes the weight of a tantalum metal rod to force the molten metal into the mold cavity. Using the proper mold design and casting parameters, it has been possible to prepare ten 1/2 inch diameter neptunium or plutonium metal disks in a single casting. This casting technique is capable of producing disks which are very uniform. The average thickness of the disks from a typical casting will vary no more than 0.001 inch and the variation in the thickness of the individual disks will range from 0.0001 to 0.0005 inch. (author)

  7. Delay-limited capacity of fading multiple access and broadcast channels in the low power regime

    KAUST Repository

    Rezki, Zouheir

    2015-09-11

    We study delay-limited (also called zero-outage) capacity region of the fading multi-access channel (MAC) with Gaussian noise and perfect channel state information (CSI) at the receiver and at the transmitters (CSI-TR), in the low-power regime. We show that for fading channels where the MAC capacity region is strictly positive, it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power, the boundary surface of the capacity region shrinks to a single point corresponding to the sum-rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Using the duality of the Gaussian MAC and broadcast channels (BC), we show that time-sharing (or time division multiple access (TDMA)) is asymptotically optimal. © 2015 IEEE.

  8. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system.

    Science.gov (United States)

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes.

  9. Source coherence impairments in a direct detection direct sequence optical code-division multiple-access system

    Science.gov (United States)

    Fsaifes, Ihsan; Lepers, Catherine; Lourdiane, Mounia; Gallion, Philippe; Beugin, Vincent; Guignard, Philippe

    2007-02-01

    We demonstrate that direct sequence optical code- division multiple-access (DS-OCDMA) encoders and decoders using sampled fiber Bragg gratings (S-FBGs) behave as multipath interferometers. In that case, chip pulses of the prime sequence codes generated by spreading in time-coherent data pulses can result from multiple reflections in the interferometers that can superimpose within a chip time duration. We show that the autocorrelation function has to be considered as the sum of complex amplitudes of the combined chip as the laser source coherence time is much greater than the integration time of the photodetector. To reduce the sensitivity of the DS-OCDMA system to the coherence time of the laser source, we analyze the use of sparse and nonperiodic quadratic congruence and extended quadratic congruence codes.

  10. Collectively loading programs in a multiple program multiple data environment

    Science.gov (United States)

    Aho, Michael E.; Attinella, John E.; Gooding, Thomas M.; Gooding, Thomas M.; Miller, Samuel J.

    2016-11-08

    Techniques are disclosed for loading programs efficiently in a parallel computing system. In one embodiment, nodes of the parallel computing system receive a load description file which indicates, for each program of a multiple program multiple data (MPMD) job, nodes which are to load the program. The nodes determine, using collective operations, a total number of programs to load and a number of programs to load in parallel. The nodes further generate a class route for each program to be loaded in parallel, where the class route generated for a particular program includes only those nodes on which the program needs to be loaded. For each class route, a node is selected using a collective operation to be a load leader which accesses a file system to load the program associated with a class route and broadcasts the program via the class route to other nodes which require the program.

  11. Multiple time scale dynamics

    CERN Document Server

    Kuehn, Christian

    2015-01-01

    This book provides an introduction to dynamical systems with multiple time scales. The approach it takes is to provide an overview of key areas, particularly topics that are less available in the introductory form.  The broad range of topics included makes it accessible for students and researchers new to the field to gain a quick and thorough overview. The first of its kind, this book merges a wide variety of different mathematical techniques into a more unified framework. The book is highly illustrated with many examples and exercises and an extensive bibliography. The target audience of this  book are senior undergraduates, graduate students as well as researchers interested in using the multiple time scale dynamics theory in nonlinear science, either from a theoretical or a mathematical modeling perspective. 

  12. Improved BER based on intensity noise alleviation using developed detection technique for incoherent SAC-OCDMA systems

    Science.gov (United States)

    Al-Khafaji, Hamza M. R.; Aljunid, S. A.; Fadhil, Hilal A.

    2012-06-01

    The major drawback of incoherent spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) systems is their inherent intensity noise originating due to the incoherency of the broadband light sources. In this paper, we propose a developed detection technique named the modified-AND subtraction detection for incoherent SAC-OCDMA systems. This detection technique is based upon decreasing the received signal strength during the decoding process by dividing the spectrum of the utilized code sequence. The proposed technique is capable of mitigating the intensity noise effect, as well as suppressing the multiple-access interference impact. Based on modified quadratic congruence (MQC) code, the analytical results reveal that the modified-AND detection offer best bit-error rate (BER) performance and enables MQC code to support higher transmission rate up to 1.25 Gb/s compared to conventional AND detection. Furthermore, we ascertained that the proposed technique enhances the system performance using a simulation experiment.

  13. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    Science.gov (United States)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  14. Multiple Coaxial Catheter System for Reliable Access in Interventional Stroke Therapy

    International Nuclear Information System (INIS)

    Kulcsar, Zsolt; Yilmaz, Hasan; Bonvin, Christophe; Lovblad, Karl O.; Ruefenacht, Daniel A.

    2010-01-01

    In some patients with acute cerebral vessel occlusion, navigating mechanical thrombectomy systems is difficult due to tortuous anatomy of the aortic arch, carotid arteries, or vertebral arteries. Our purpose was to describe a multiple coaxial catheter system used for mechanical revascularization that helps navigation and manipulations in tortuous vessels. A triple or quadruple coaxial catheter system was built in 28 consecutive cases presenting with acute ischemic stroke. All cases were treated by mechanical thrombectomy with the Penumbra System. In cases of unsuccessful thrombo-aspiration, additional thrombolysis or angioplasty with stent placement was used for improving recanalization. The catheter system consisted of an outermost 8-Fr and an intermediate 6-Fr guiding catheter, containing the inner Penumbra reperfusion catheters. The largest, 4.1-Fr, reperfusion catheter was navigated over a Prowler Select Plus microcatheter. The catheter system provided access to reach the cerebral lesions and provided stability for the mechanically demanding manipulations of thromboaspiration and stent navigation in all cases. Apart from their mechanical role, the specific parts of the system could also provide access to different types of interventions, like carotid stenting through the 8-Fr guiding catheter and intracranial stenting and thrombolysis through the Prowler Select Plus microcatheter. In this series, there were no complications related to the catheter system. In conclusion, building up a triple or quadruple coaxial system proved to be safe and efficient in our experience for the mechanical thrombectomy treatment of acute ischemic stroke.

  15. Measurements of stimulated-Raman-scattering-induced tilt in spectral-amplitude-coding optical code-division multiple-access systems

    Science.gov (United States)

    Al-Qazwini, Zaineb A. T.; Abdullah, Mohamad K.; Mokhtar, Makhfudzah B.

    2009-01-01

    We measure the stimulated Raman scattering (SRS)-induced tilt in spectral-amplitude-coding optical code-division multiple-access (SAC-OCDMA) systems as a function of system main parameters (transmission distance, power per chip, and number of users) via computer simulations. The results show that SRS-induced tilt significantly increases as transmission distance, power per chip, or number of users grows.

  16. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  17. Random-Access Technique for Self-Organization of 5G Millimeter-Wave Cellular Communications

    Directory of Open Access Journals (Sweden)

    Jasper Meynard Arana

    2016-01-01

    Full Text Available The random-access (RA technique is a key procedure in cellular networks and self-organizing networks (SONs, but the overall processing time of this technique in millimeter-wave (mm-wave cellular systems with directional beams is very long because RA preambles (RAPs should be transmitted in all directions of Tx and Rx beams. In this paper, two different types of preambles (RAP-1 and RAP-2 are proposed to reduce the processing time in the RA stage. After analyzing the correlation property, false-alarm probability, and detection probability of the proposed RAPs, we perform simulations to show that the RAP-2 is suitable for RA in mm-wave cellular systems with directional beams because of the smaller processing time and high detection probability in multiuser environments.

  18. Single port access for laparoscopic lateral segmentectomy.

    Science.gov (United States)

    Inoue, Yoshihiro; Asakuma, Mitsuhiro; Hirokawa, Fumitoshi; Hayashi, Michihiro; Shimizu, Tetsunosuke; Uchiyama, Kazuhisa

    2017-12-01

    Single-port access laparoscopic lateral segmentectomy (LLS) has been developed as a novel minimally invasive surgery. We have experience with this LLS technique. To report our technique and patients' postoperative course in a series of single-port access LLS performed in our department. We also examine the cosmetic outcome, safety, and utility of the procedure. Between February 2010 and October 2016, 54 patients who underwent single- or multiple-port laparoscopic or open lateral segmentectomy (LS) were retrospectively analyzed with respect to cosmetic outcome, safety, and utility. In the single LLS group, the laparoscopic procedure was successfully completed for all 14 patients. The median operative time was significantly shorter in the single LLS group (123 min; range: 50-270 min) than in the other groups. Estimated blood loss was also significantly lower in the single LLS group (10 ml; range: 0-330 ml). During the first 7 postoperative days, the visual analog scale pain score and the use of additional analgesia were not significantly different between groups. The single LLS group had a 7.1% complication rate (Clavien-Dindo classification > IIIA); this was not significantly different between groups. Single-port access LLS is a procedure with excellent cosmetic results, although, with regard to invasiveness, there are no major differences from conventional LLS.

  19. A Unified Framework of the Performance Evaluation of Optical Time-Wavelength Code-Division Multiple-Access Systems

    Science.gov (United States)

    Inaty, Elie

    In this paper, we provide an analysis to the performance of optical time-wavelength code-division multiple-access (OTW-CDMA) network when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one coincidence sequences with non-repeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of OTW-CDMA system may be critically affected when working above the nominal limit; an event that may happen when the network operates at high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed MAC protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T; while the R3T is better at very high transmission rates. However, in general it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  20. Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network

    International Nuclear Information System (INIS)

    Grudka, Andrzej; Horodecki, Pawel

    2010-01-01

    We analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative borderline between superadditivities of bipartite and multipartite systems.

  1. Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure

    OpenAIRE

    Xie, Jianwei; Ulukus, Sennur

    2014-01-01

    The sum secure degrees of freedom (s.d.o.f.) of two fundamental multi-user network structures, the K-user Gaussian multiple access (MAC) wiretap channel and the K-user interference channel (IC) with secrecy constraints, have been determined recently as K(K-1)/(K(K-1)+1) [1,2] and K(K-1)/(2K-1) [3,4], respectively. In this paper, we determine the entire s.d.o.f. regions of these two channel models. The converse for the MAC follows from a middle step in the converse of [1,2]. The converse for t...

  2. Multiple predictor smoothing methods for sensitivity analysis: Description of techniques

    International Nuclear Information System (INIS)

    Storlie, Curtis B.; Helton, Jon C.

    2008-01-01

    The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (i) locally weighted regression (LOESS), (ii) additive models, (iii) projection pursuit regression, and (iv) recursive partitioning regression. Then, in the second and concluding part of this presentation, the indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present

  3. Ultrafast all-optical code-division multiple-access networks

    Science.gov (United States)

    Kwong, Wing C.; Prucnal, Paul R.; Liu, Yanming

    1992-12-01

    In optical code-division multiple access (CDMA), the architecture of optical encoders/decoders is another important factor that needs to be considered, besides the correlation properties of those already extensively studied optical codes. The architecture of optical encoders/decoders affects, for example, the amount of power loss and length of optical delays that are associated with code sequence generation and correlation, which, in turn, affect the power budget, size, and cost of an optical CDMA system. Various CDMA coding architectures are studied in the paper. In contrast to the encoders/decoders used in prime networks (i.e., prime encodes/decoders), which generate, select, and correlate code sequences by a parallel combination of fiber-optic delay-lines, and in 2n networks (i.e., 2n encoders/decoders), which generate and correlate code sequences by a serial combination of 2 X 2 passive couplers and fiber delays with sequence selection performed in a parallel fashion, the modified 2n encoders/decoders generate, select, and correlate code sequences by a serial combination of directional couplers and delays. The power and delay- length requirements of the modified 2n encoders/decoders are compared to that of the prime and 2n encoders/decoders. A 100 Mbit/s optical CDMA experiment in free space demonstrating the feasibility of the all-serial coding architecture using a serial combination of 50/50 beam splitters and retroreflectors at 10 Tchip/s (i.e., 100,000 chip/bit) with 100 fs laser pulses is reported.

  4. Mixing stream and datagram traffic on satellite: A FIFO Order-based Demand Assignment (FODA) Time Division Multiple Access (TDMA) scheme

    Science.gov (United States)

    Beltrame, R.; Bonito, A. B.; Celandroni, N.; Ferro, E.

    1985-11-01

    A FIFO Order based Demand Assignment (FODA) access scheme was designed to handle packetized data and voice traffic in a multiple access satellite broadcast channel of Mbits band. The channel is shared by as many as 64 simultaneously active stations in a range of 255 addressable stations. A sophisticated traffic environment is assumed, including different types of service requirements and an arbitrary load distribution among the stations. The results of 2Mbit/sec simulation tests for an existing hardware environment are presented.

  5. A New Time-Hopping Multiple Access Communication System Simulator: Application to Ultra-Wideband

    Directory of Open Access Journals (Sweden)

    José M. Páez-Borrallo

    2005-03-01

    Full Text Available Time-hopping ultra-wideband technology presents some very attractive features for future indoor wireless systems in terms of achievable transmission rate and multiple access capabilities. This paper develops an algorithm to design time-hopping system simulators specially suitable for ultra-wideband, which takes advantage of some of the specific characteristics of this kind of systems. The algorithm allows an improvement of both the time capabilities and the achievable sampling rate and can be used to research into the influence of different parameters on the performance of the system. An additional result is the validation of a new general performance formula for time-hopping ultra-wideband systems with multipath channels.

  6. Incidence of vascular complications during lateral lumbar interbody fusion: an examination of the mini-open access technique.

    Science.gov (United States)

    Kueper, Janina; Fantini, Gary A; Walker, Brendon R; Aichmair, Alexander; Hughes, Alexander P

    2015-04-01

    This article examines the incidence and management of vascular injury during Lateral Lumbar Interbody Fusion (LLIF). The details of the mini-open access technique are presented. A total of 900 patients who underwent a LLIF at an average 1.94 levels (range: 1-5 levels) by one of six fellowship trained surgeons on 1,754 levels from 2006 to 2013 were identified. The incidence of intraoperative vascular injury was retrospectively determined from the Operative Records. The management of vascular injury was evaluated. The mini-open access adapted by our institution for LLIF is described. The incidence of major vascular complication in our series was 1/900. The incidence of minor vascular injury was 4/900. The overall incidence of vascular injury was calculated to be 0.056 % per case and 0.029 % per level. All minor vascular injuries were identified to be segmental vessel lacerations, which were readily ligated under direct visualization without further extension of the incision with no clinical sequelae. The laceration of the abdominal aorta, the major vascular complication of this series, was emergently repaired through an exploratory laparotomy. None of the patients suffered long-term sequelae from their intraoperative vascular injuries. The mini-open lateral access technique for LLIF provides for minimal risk of vascular injury to the lumbar spine. In the rare event of minor vascular injury, the mini-open access approach allows for immediate visualization, confirmation and repair of the vessel with no long-term sequelae.

  7. Super-Resolution Enhancement From Multiple Overlapping Images: A Fractional Area Technique

    Science.gov (United States)

    Michaels, Joshua A.

    With the availability of large quantities of relatively low-resolution data from several decades of space borne imaging, methods of creating an accurate, higher-resolution image from the multiple lower-resolution images (i.e. super-resolution), have been developed almost since such imagery has been around. The fractional-area super-resolution technique developed in this thesis has never before been documented. Satellite orbits, like Landsat, have a quantifiable variation, which means each image is not centered on the exact same spot more than once and the overlapping information from these multiple images may be used for super-resolution enhancement. By splitting a single initial pixel into many smaller, desired pixels, a relationship can be created between them using the ratio of the area within the initial pixel. The ideal goal for this technique is to obtain smaller pixels with exact values and no error, yielding a better potential result than those methods that yield interpolated pixel values with consequential loss of spatial resolution. A Fortran 95 program was developed to perform all calculations associated with the fractional-area super-resolution technique. The fractional areas are calculated using traditional trigonometry and coordinate geometry and Linear Algebra Package (LAPACK; Anderson et al., 1999) is used to solve for the higher-resolution pixel values. In order to demonstrate proof-of-concept, a synthetic dataset was created using the intrinsic Fortran random number generator and Adobe Illustrator CS4 (for geometry). To test the real-life application, digital pictures from a Sony DSC-S600 digital point-and-shoot camera with a tripod were taken of a large US geological map under fluorescent lighting. While the fractional-area super-resolution technique works in perfect synthetic conditions, it did not successfully produce a reasonable or consistent solution in the digital photograph enhancement test. The prohibitive amount of processing time (up to

  8. Performance evaluation of modulation and multiple access schemes in ultraviolet optical wireless connections for two atmosphere thickness cases.

    Science.gov (United States)

    Raptis, Nikos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-08-01

    The exploitation of optical wireless communication channels in a non-line-of-sight regime is studied for point-to-point and networking configurations considering the use of light-emitting diodes. Two environments with different scattering center densities are considered, assuming operation at 265 nm. The bit error rate performance of both pulsed and multicarrier modulation schemes is examined, using numerical approaches. In the networking scenario, a central node only receives data, one node transmits useful data, and the rest of them act as interferers. The performance of the desirable node's transmissions is evaluated. The access to the medium is controlled by a code division multiple access scheme.

  9. Initial Clinical Experience in Multiple Myeloma Staging by Means of Whole-Body Resonance Techniques

    International Nuclear Information System (INIS)

    Gallego, J. I.; Concepcion, L.; Alonso, S.; Sanchez, B.; Manzi, F.

    2003-01-01

    To develop a magnetic resonance (MR) exploratory technique equivalent to serial bone X-ray, and to compare their precision in the staging of multiple myeloma (MM) patients. Multiple acquisition T1-weights TSE and STIR sequences in the coronal plane were performed. Ten healthy volunteers and 11 multiple myeloma diagnosed patients were included. The visualization of bony structures was particularly noted,with special attention given to those which would normally be included in a serial bone X-ray. In the case of the patients, a comparison was made between diagnostic capacities of the MR sequences. MR highlighters significantly more (p<0.05) bony elements than did the serial bone X-ray. This was greatly due to a sequential displacement of the scanner bed, allowing for field-of-views which were minimally from head to third proximal of the leg. Magnetic resonance detected a significantly higher number (p<0.05) of lesions. It was, in turn, capable of revealing greater lesion extensions, even to the point of implying staging classification changes in 18% of the patients. The utilization of whole-body MR techniques in multiple myeloma patients is feasible and clinically beneficial. MR is both more sensitive and more specific than serial bone X-ray for evaluation of bony lesions in MM. It is currently serving as a valid alternative in a growing numbers of patients. (Author) 10 refs

  10. Access technique and its problems in parenteral nutrition - Guidelines on Parenteral Nutrition, Chapter 9.

    Science.gov (United States)

    Jauch, K W; Schregel, W; Stanga, Z; Bischoff, S C; Brass, P; Hartl, W; Muehlebach, S; Pscheidl, E; Thul, P; Volk, O

    2009-11-18

    Catheter type, access technique, and the catheter position should be selected considering to the anticipated duration of PN aiming at the lowest complication risks (infectious and non-infectious). Long-term (>7-10 days) parenteral nutrition (PN) requires central venous access whereas for PN 3 weeks subcutaneous tunnelled catheters or port systems are appropriate. CVC (central venous catheter) should be flushed with isotonic NaCl solution before and after PN application and during CVC occlusions. Strict indications are required for central venous access placement and the catheter should be removed as soon as possible if not required any more. Blood samples should not to be taken from the CVC. If catheter infection is suspected, peripheral blood-culture samples and culture samples from each catheter lumen should be taken simultaneously. Removal of the CVC should be carried out immediately if there are pronounced signs of local infection at the insertion site and/or clinical suspicion of catheter-induced sepsis. In case PN is indicated for a short period (max. 7-10 days), a peripheral venous access can be used if no hyperosmolar solutions (>800 mosm/L) or solutions with a high titration acidity or alkalinity are used. A peripheral venous catheter (PVC) can remain in situ for as long as it is clinically required unless there are signs of inflammation at the insertion site.

  11. Comparison of peripheral nerve stimulator versus ultrasonography guided axillary block using multiple injection technique.

    Science.gov (United States)

    Kumar, Alok; Sharma, Dk; Sibi, Maj E; Datta, Barun; Gogoi, Biraj

    2014-01-01

    The established methods of nerve location were based on either proper motor response on nerve stimulation (NS) or ultrasound guidance. In this prospective, randomised, observer-blinded study, we compared ultrasound guidance with NS for axillary brachial plexus block using 0.5% bupivacaine with the multiple injection techniques. A total of 120 patients receiving axillary brachial plexus block with 0.5% bupivacaine, using a multiple injection technique, were randomly allocated to receive either NS (group NS, n = 60), or ultrasound guidance (group US, n = 60) for nerve location. A blinded observer recorded the onset of sensory and motor blocks, skin punctures, needle redirections, procedure-related pain and patient satisfaction. The median (range) number of skin punctures were 2 (2-4) in group US and 3 (2-5) in group NS (P =0.27). Insufficient block was observed in three patient (5%) of group US and four patients (6.67%) of group NS (P > =0.35). Patient acceptance was similarly good in the two groups. Multiple injection axillary blocks with ultrasound guidance provided similar success rates and comparable incidence of complications as compared with NS guidance with 20 ml 0.5% bupivacaine.

  12. Comparison of peripheral nerve stimulator versus ultrasonography guided axillary block using multiple injection technique

    Directory of Open Access Journals (Sweden)

    Alok Kumar

    2014-01-01

    Full Text Available Background: The established methods of nerve location were based on either proper motor response on nerve stimulation (NS or ultrasound guidance. In this prospective, randomised, observer-blinded study, we compared ultrasound guidance with NS for axillary brachial plexus block using 0.5% bupivacaine with the multiple injection techniques. Methods : A total of 120 patients receiving axillary brachial plexus block with 0.5% bupivacaine, using a multiple injection technique, were randomly allocated to receive either NS (group NS, n = 60, or ultrasound guidance (group US, n = 60 for nerve location. A blinded observer recorded the onset of sensory and motor blocks, skin punctures, needle redirections, procedure-related pain and patient satisfaction. Results: The median (range number of skin punctures were 2 (2-4 in group US and 3 (2-5 in group NS (P =0.27. Insufficient block was observed in three patient (5% of group US and four patients (6.67% of group NS (P > =0.35. Patient acceptance was similarly good in the two groups. Conclusion: Multiple injection axillary blocks with ultrasound guidance provided similar success rates and comparable incidence of complications as compared with NS guidance with 20 ml 0.5% bupivacaine.

  13. Boosting the FM-Index on the GPU: Effective Techniques to Mitigate Random Memory Access.

    Science.gov (United States)

    Chacón, Alejandro; Marco-Sola, Santiago; Espinosa, Antonio; Ribeca, Paolo; Moure, Juan Carlos

    2015-01-01

    The recent advent of high-throughput sequencing machines producing big amounts of short reads has boosted the interest in efficient string searching techniques. As of today, many mainstream sequence alignment software tools rely on a special data structure, called the FM-index, which allows for fast exact searches in large genomic references. However, such searches translate into a pseudo-random memory access pattern, thus making memory access the limiting factor of all computation-efficient implementations, both on CPUs and GPUs. Here, we show that several strategies can be put in place to remove the memory bottleneck on the GPU: more compact indexes can be implemented by having more threads work cooperatively on larger memory blocks, and a k-step FM-index can be used to further reduce the number of memory accesses. The combination of those and other optimisations yields an implementation that is able to process about two Gbases of queries per second on our test platform, being about 8 × faster than a comparable multi-core CPU version, and about 3 × to 5 × faster than the FM-index implementation on the GPU provided by the recently announced Nvidia NVBIO bioinformatics library.

  14. Multiple regression and beyond an introduction to multiple regression and structural equation modeling

    CERN Document Server

    Keith, Timothy Z

    2014-01-01

    Multiple Regression and Beyond offers a conceptually oriented introduction to multiple regression (MR) analysis and structural equation modeling (SEM), along with analyses that flow naturally from those methods. By focusing on the concepts and purposes of MR and related methods, rather than the derivation and calculation of formulae, this book introduces material to students more clearly, and in a less threatening way. In addition to illuminating content necessary for coursework, the accessibility of this approach means students are more likely to be able to conduct research using MR or SEM--and more likely to use the methods wisely. Covers both MR and SEM, while explaining their relevance to one another Also includes path analysis, confirmatory factor analysis, and latent growth modeling Figures and tables throughout provide examples and illustrate key concepts and techniques For additional resources, please visit: http://tzkeith.com/.

  15. A Technique of Fuzzy C-Mean in Multiple Linear Regression Model toward Paddy Yield

    Science.gov (United States)

    Syazwan Wahab, Nur; Saifullah Rusiman, Mohd; Mohamad, Mahathir; Amira Azmi, Nur; Che Him, Norziha; Ghazali Kamardan, M.; Ali, Maselan

    2018-04-01

    In this paper, we propose a hybrid model which is a combination of multiple linear regression model and fuzzy c-means method. This research involved a relationship between 20 variates of the top soil that are analyzed prior to planting of paddy yields at standard fertilizer rates. Data used were from the multi-location trials for rice carried out by MARDI at major paddy granary in Peninsular Malaysia during the period from 2009 to 2012. Missing observations were estimated using mean estimation techniques. The data were analyzed using multiple linear regression model and a combination of multiple linear regression model and fuzzy c-means method. Analysis of normality and multicollinearity indicate that the data is normally scattered without multicollinearity among independent variables. Analysis of fuzzy c-means cluster the yield of paddy into two clusters before the multiple linear regression model can be used. The comparison between two method indicate that the hybrid of multiple linear regression model and fuzzy c-means method outperform the multiple linear regression model with lower value of mean square error.

  16. Comparison of static conformal field with multiple noncoplanar arc techniques for stereotactic radiosurgery or stereotactic radiotherapy

    International Nuclear Information System (INIS)

    Hamilton, Russell J.; Kuchnir, Franca T.; Sweeney, Patrick; Rubin, Steven J.; Dujovny, Manuel; Pelizzari, Charles A.; Chen, George T. Y.

    1995-01-01

    Purpose: Compare the use of static conformal fields with the use of multiple noncoplanar arcs for stereotactic radiosurgery or stereotactic radiotherapy treatment of intracranial lesions. Evaluate the efficacy of these treatment techniques to deliver dose distributions comparable to those considered acceptable in current radiotherapy practice. Methods and Materials: A previously treated radiosurgery case of a patient presenting with an irregularly shaped intracranial lesion was selected. Using a three-dimensional (3D) treatment-planning system, treatment plans using a single isocenter multiple noncoplanar arc technique and multiple noncoplanar conformal static fields were generated. Isodose distributions and dose volume histograms (DVHs) were computed for each treatment plan. We required that the 80% (of maximum dose) isodose surface enclose the target volume for all treatment plans. The prescription isodose was set equal to the minimum target isodose. The DVHs were analyzed to evaluate and compare the different treatment plans. Results: The dose distribution in the target volume becomes more uniform as the number of conformal fields increases. The volume of normal tissue receiving low doses (> 10% of prescription isodose) increases as the number of static fields increases. The single isocenter multiple arc plan treats the greatest volume of normal tissue to low doses, approximately 1.6 times more volume than that treated by four static fields. The volume of normal tissue receiving high (> 90% of prescription isodose) and intermediate (> 50% of prescription isodose) doses decreases by 29 and 22%, respectively, as the number of static fields is increased from four to eight. Increasing the number of static fields to 12 only further reduces the high and intermediate dose volumes by 10 and 6%, respectively. The volume receiving the prescription dose is more than 3.5 times larger than the target volume for all treatment plans. Conclusions: Use of a multiple noncoplanar

  17. Wavelength-encoding/temporal-spreading optical code division multiple-access system with in-fiber chirped moiré gratings.

    Science.gov (United States)

    Chen, L R; Smith, P W; de Sterke, C M

    1999-07-20

    We propose an optical code division multiple-access (OCDMA) system that uses in-fiber chirped moiré gratings (CMG's) for encoding and decoding of broadband pulses. In reflection the wavelength-selective and dispersive nature of CMG's can be used to implement wavelength-encoding/temporal-spreading OCDMA. We give examples of codes designed around the constraints imposed by the encoding devices and present numerical simulations that demonstrate the proposed concept.

  18. High Multiplicity Searches at the LHC Using Jet Masses

    Energy Technology Data Exchange (ETDEWEB)

    Hook, Anson; /SLAC /Stanford U., Appl. Phys. Dept.; Izaguirre, Eder; /SLAC /Stanford U., Phys. Dept.; Lisanti, Mariangela; /Princeton U.; Wacker, Jay G.; /SLAC /Stanford U., ITP

    2012-04-24

    This article introduces a new class of searches for physics beyond the Standard Model that improves the sensitivity to signals with high jet multiplicity. The proposed searches gain access to high multiplicity signals by reclustering events into large-radius, or 'fat', jets and by requiring that each event has multiple massive jets. This technique is applied to supersymmetric scenarios in which gluinos are pair-produced and then subsequently decay to final states with either moderate quantities of missing energy or final states without missing energy. In each of these scenarios, the use of jet mass improves the estimated reach in gluino mass by 20% to 50% over current LHC searches.

  19. A New Prime Code for Synchronous Optical Code Division Multiple-Access Networks

    Directory of Open Access Journals (Sweden)

    Huda Saleh Abbas

    2018-01-01

    Full Text Available A new spreading code based on a prime code for synchronous optical code-division multiple-access networks that can be used in monitoring applications has been proposed. The new code is referred to as “extended grouped new modified prime code.” This new code has the ability to support more terminal devices than other prime codes. In addition, it patches subsequences with “0s” leading to lower power consumption. The proposed code has an improved cross-correlation resulting in enhanced BER performance. The code construction and parameters are provided. The operating performance, using incoherent on-off keying modulation and incoherent pulse position modulation systems, has been analyzed. The performance of the code was compared with other prime codes. The results demonstrate an improved performance, and a BER floor of 10−9 was achieved.

  20. Building a new predictor for multiple linear regression technique-based corrective maintenance turnaround time.

    Science.gov (United States)

    Cruz, Antonio M; Barr, Cameron; Puñales-Pozo, Elsa

    2008-01-01

    This research's main goals were to build a predictor for a turnaround time (TAT) indicator for estimating its values and use a numerical clustering technique for finding possible causes of undesirable TAT values. The following stages were used: domain understanding, data characterisation and sample reduction and insight characterisation. Building the TAT indicator multiple linear regression predictor and clustering techniques were used for improving corrective maintenance task efficiency in a clinical engineering department (CED). The indicator being studied was turnaround time (TAT). Multiple linear regression was used for building a predictive TAT value model. The variables contributing to such model were clinical engineering department response time (CE(rt), 0.415 positive coefficient), stock service response time (Stock(rt), 0.734 positive coefficient), priority level (0.21 positive coefficient) and service time (0.06 positive coefficient). The regression process showed heavy reliance on Stock(rt), CE(rt) and priority, in that order. Clustering techniques revealed the main causes of high TAT values. This examination has provided a means for analysing current technical service quality and effectiveness. In doing so, it has demonstrated a process for identifying areas and methods of improvement and a model against which to analyse these methods' effectiveness.

  1. Does the Implantation Technique for Totally Implantable Venous Access Ports (TIVAPs) Influence Long-Term Outcome?

    Science.gov (United States)

    Biacchi, Daniele; Sammartino, Paolo; Sibio, Simone; Accarpio, Fabio; Cardi, Maurizio; Sapienza, Paolo; De Cesare, Alessandro; Atta, Joseph Maher Fouad; Impagnatiello, Alessio; Di Giorgio, Angelo

    2016-02-01

    Totally implantable venous access ports (TIVAP) are eventually explanted for various reasons, related or unrelated to the implantation technique used. Having more information on long-term explantation would help improve placement techniques. From a series of 1572 cancer patients who had TIVAPs implanted in our center with the cutdown technique or Seldinger technique, we studied the 542 patients who returned to us to have their TIVAP explanted after 70 days or more. As outcome measures we distinguished between TIVAPs explanted for long-term complications (infection, catheter-, reservoir-, and patient-related complications) and TIVAPs no longer needed. Univariate and multivariate analyses were run to investigate the reasons for explantation and their possible correlation with implantation techniques. The most common reason for explantation was infection (47.6 %), followed by catheter-related (20.8 %), patient-related (14.7 %), and reservoir-related complications (4.7 %). In the remaining 12.2 % of cases, the TIVAP was explanted complication free after the planned treatments ended. Infection correlated closely with longer TIVAP use. Univariate and multivariate analyses identified the Seldinger technique as a major risk factor for venous thrombosis and catheter dislocation. The need for long-term TIVAP explantation in about one-third of cancer patients is related to the implantation techniques used.

  2. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  3. Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks

    Directory of Open Access Journals (Sweden)

    DongHo Kang

    2014-01-01

    Full Text Available Internet of Things (IoT consists of several tiny devices connected together to form a collaborative computing environment. Recently IoT technologies begin to merge with supervisory control and data acquisition (SCADA sensor networks to more efficiently gather and analyze real-time data from sensors in industrial environments. But SCADA sensor networks are becoming more and more vulnerable to cyber-attacks due to increased connectivity. To safely adopt IoT technologies in the SCADA environments, it is important to improve the security of SCADA sensor networks. In this paper we propose a multiple filtering technique based on whitelists to detect illegitimate packets. Our proposed system detects the traffic of network and application protocol attacks with a set of whitelists collected from normal traffic.

  4. Multiuser Random Coding Techniques for Mismatched Decoding

    OpenAIRE

    Scarlett, Jonathan; Martinez, Alfonso; Guillén i Fàbregas, Albert

    2016-01-01

    This paper studies multiuser random coding techniques for channel coding with a given (possibly suboptimal) decoding rule. For the mismatched discrete memoryless multiple-access channel, an error exponent is obtained that is tight with respect to the ensemble average, and positive within the interior of Lapidoth's achievable rate region. This exponent proves the ensemble tightness of the exponent of Liu and Hughes in the case of maximum-likelihood decoding. An equivalent dual form of Lapidoth...

  5. Datafish Multiphase Data Mining Technique to Match Multiple Mutually Inclusive Independent Variables in Large PACS Databases.

    Science.gov (United States)

    Kelley, Brendan P; Klochko, Chad; Halabi, Safwan; Siegal, Daniel

    2016-06-01

    Retrospective data mining has tremendous potential in research but is time and labor intensive. Current data mining software contains many advanced search features but is limited in its ability to identify patients who meet multiple complex independent search criteria. Simple keyword and Boolean search techniques are ineffective when more complex searches are required, or when a search for multiple mutually inclusive variables becomes important. This is particularly true when trying to identify patients with a set of specific radiologic findings or proximity in time across multiple different imaging modalities. Another challenge that arises in retrospective data mining is that much variation still exists in how image findings are described in radiology reports. We present an algorithmic approach to solve this problem and describe a specific use case scenario in which we applied our technique to a real-world data set in order to identify patients who matched several independent variables in our institution's picture archiving and communication systems (PACS) database.

  6. Photoelectrode Fabrication of Dye-Sensitized Nanosolar Cells Using Multiple Spray Coating Technique

    Directory of Open Access Journals (Sweden)

    Chien-Chih Chen

    2013-01-01

    Full Text Available This paper presents a spray coating technique for fabricating nanoporous film of photoelectrode in dye-sensitized nanosolar cells (DSSCs. Spray coating can quickly fabricate nanoporous film of the photoelectrode with lower cost, which can further help the DSSCs to be commercialized in the future. This paper analyzed photoelectric conversion efficiency of the DSSCs using spray coated photoelectrode in comparison with the photoelectrode made with the doctor blade method. Spray coating can easily control transmittance of the photoelectrode through the multiple spray coating process. This work mainly used a dispersant with help of ultrasonic oscillation to prepare the required nano-TiO2 solution and then sprayed it on the ITO glasses. In this work, a motor-operated conveyor belt was built to transport the ITO glasses automatically for multiple spray coating and drying alternately. Experiments used transmittance of the photoelectrode as a fabrication parameter to analyze photoelectric conversion efficiency of the DSSCs. The influencing factors of the photoelectrode transmittance during fabrication are the spray flow rate, the spray distance, and the moving speed of the conveyor belt. The results show that DSSC with the photoelectrode transmittance of ca. 68.0 ± 1.5% and coated by the spray coating technique has the best photoelectric conversion efficiency in this work.

  7. Towards ubiquitous access of computer-assisted surgery systems.

    Science.gov (United States)

    Liu, Hui; Lufei, Hanping; Shi, Weishong; Chaudhary, Vipin

    2006-01-01

    Traditional stand-alone computer-assisted surgery (CAS) systems impede the ubiquitous and simultaneous access by multiple users. With advances in computing and networking technologies, ubiquitous access to CAS systems becomes possible and promising. Based on our preliminary work, CASMIL, a stand-alone CAS server developed at Wayne State University, we propose a novel mobile CAS system, UbiCAS, which allows surgeons to retrieve, review and interpret multimodal medical images, and to perform some critical neurosurgical procedures on heterogeneous devices from anywhere at anytime. Furthermore, various optimization techniques, including caching, prefetching, pseudo-streaming-model, and compression, are used to guarantee the QoS of the UbiCAS system. UbiCAS enables doctors at remote locations to actively participate remote surgeries, share patient information in real time before, during, and after the surgery.

  8. PRESSURE - WATER and Other Data from MULTIPLE SHIPS and Other Platforms From World-Wide Distribution from 19950101 to 19951231 (NODC Accession 9600078)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The accession contains Salinity Temperature and Depth (STD) data in the (TESAC) format. This contains one year data that was sent as radio messages from multiple...

  9. WATER TEMPERATURE and Other Data from MULTIPLE SHIPS From NE Atlantic (limit-40 W) and Others from 19500831 to 19881231 (NODC Accession 9200060)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains contains chlorophyll data collected from 1958-1988 using multiple ships. Marine pigments, productivity, and associated chemistry data were...

  10. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Salam A. Zummo

    2009-02-01

    Full Text Available We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  11. Access technique and its problems in parenteral nutrition – Guidelines on Parenteral Nutrition, Chapter 9

    Directory of Open Access Journals (Sweden)

    Bischoff, S. C.

    2009-11-01

    Full Text Available Catheter type, access technique, and the catheter position should be selected considering to the anticipated duration of PN aiming at the lowest complication risks (infectious and non-infectious. Long-term (>7–10 days parenteral nutrition (PN requires central venous access whereas for PN 3 weeks subcutaneous tunnelled catheters or port systems are appropriate. CVC (central venous catheter should be flushed with isotonic NaCl solution before and after PN application and during CVC occlusions. Strict indications are required for central venous access placement and the catheter should be removed as soon as possible if not required any more. Blood samples should not to be taken from the CVC. If catheter infection is suspected, peripheral blood-culture samples and culture samples from each catheter lumen should be taken simultaneously. Removal of the CVC should be carried out immediately if there are pronounced signs of local infection at the insertion site and/or clinical suspicion of catheter-induced sepsis. In case PN is indicated for a short period (max. 7–10 days, a peripheral venous access can be used if no hyperosmolar solutions (>800 mosm/L or solutions with a high titration acidity or alkalinity are used. A peripheral venous catheter (PVC can remain in situ for as long as it is clinically required unless there are signs of inflammation at the insertion site.

  12. Retrospective Study on Laser Treatment of Oral Vascular Lesions Using the "Leopard Technique": The Multiple Spot Irradiation Technique with a Single-Pulsed Wave.

    Science.gov (United States)

    Miyazaki, Hidetaka; Ohshiro, Takafumi; Romeo, Umberto; Noguchi, Tadahide; Maruoka, Yutaka; Gaimari, Gianfranco; Tomov, Georgi; Wada, Yoshitaka; Tanaka, Kae; Ohshiro, Toshio; Asamura, Shinichi

    2018-06-01

    This study aimed to retrospectively evaluate the efficacy and safety of laser treatment of oral vascular lesions using the multiple spot irradiation technique with a single-pulsed wave. In laser therapy for vascular lesions, heat accumulation induced by excessive irradiation can cause adverse events postoperatively, including ulcer formation, resultant scarring, and severe pain. To prevent heat accumulation and side effects, we have applied a multiple pulsed spot irradiation technique, the so-called "leopard technique" (LT) to oral vascular lesions. This approach was originally proposed for laser treatment of nevi. It can avoid thermal concentration at the same spot and spare the epithelium, which promotes smooth healing. The goal of the study was to evaluate this procedure and treatment outcomes. The subjects were 46 patients with 47 oral vascular lesions treated with the LT using a Nd:YAG laser (1064 nm), including 24 thick lesions treated using a combination of the LT and intralesional photocoagulation. All treatment outcomes were satisfactory without serious complications such as deep ulcer formation, scarring, bleeding, or severe swelling. Laser therapy with the LT is a promising less-invasive treatment for oral vascular lesions.

  13. Comparison of a novel real-time SonixGPS needle-tracking ultrasound technique with traditional ultrasound for vascular access in a phantom gel model.

    Science.gov (United States)

    Kopac, Daniel S; Chen, Jerry; Tang, Raymond; Sawka, Andrew; Vaghadia, Himat

    2013-09-01

    Ultrasound-guided percutaneous vascular access for endovascular procedures is well established in surgical practice. Despite this, rates of complications from venous and arterial access procedures remain a significant cause of morbidity. We hypothesized that the use of a new technique of vascular access using an ultrasound with a novel needle-guidance positioning system (GPS) would lead to improved success rates of vascular puncture for both in-plane and out-of-plane techniques compared with traditional ultrasound. A prospective, randomized crossover study of medical students from all years of medical school was conducted using a phantom gel model. Each medical student performed three ultrasound-guided punctures with each of the four modalities (in-plane no GPS, in-plane with GPS, out-of-plane no GPS, out-of-plane with GPS) for a total of 12 attempts. The success or failure was judged by the ability to aspirate a simulated blood solution from the model. The time to successful puncture was also recorded. A poststudy validated NASA Task Load Index workload questionnaire was conducted to assess the student's perceptions of the two different techniques. A total of 30 students completed the study. There was no significant difference seen in the mean times of vascular access for each of the modalities. Higher success rates for vascular access using the GPS for both the in-plane (94% vs 91%) and the out-of-plane (86% vs 70%) views were observed; however, this was not statistically significant. The students perceived the mental demand (median 12.0 vs 14.00; P = .035) and effort to be lower (mean 11.25 vs 14.00; P = .044) as well as the performance to be higher (mean 15.50 vs 14.00; P = .041) for the GPS vs the traditional ultrasound-guided technique. Students also perceived their ability to access vessels increased with the aid of the GPS (7.00 vs 6.50; P = .007). The majority of students expressed a preference for GPS (26/30, 87%) as opposed to the traditional counterpart

  14. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  15. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate...

  16. Investigation of multiple visualisation techniques and dynamic queries in conjunction with direct sonification to support the browsing of audio resources

    OpenAIRE

    Brazil, Eoin

    2003-01-01

    non-peer-reviewed In this thesis, a prototype system for the browsing of audio resources was developed and an initial evaluation of this system was performed. The main contributions of this thesis are dynamic queries and multiple visualisation techniques in conjunction with direct sonification. Dynamic queries are queries that provide immediate feedback while maintaining consistency between the queries themselves and the graphical/auditory display. The multiple visualisation techniques are...

  17. Synthetic Minority Oversampling Technique and Fractal Dimension for Identifying Multiple Sclerosis

    Science.gov (United States)

    Zhang, Yu-Dong; Zhang, Yin; Phillips, Preetha; Dong, Zhengchao; Wang, Shuihua

    Multiple sclerosis (MS) is a severe brain disease. Early detection can provide timely treatment. Fractal dimension can provide statistical index of pattern changes with scale at a given brain image. In this study, our team used susceptibility weighted imaging technique to obtain 676 MS slices and 880 healthy slices. We used synthetic minority oversampling technique to process the unbalanced dataset. Then, we used Canny edge detector to extract distinguishing edges. The Minkowski-Bouligand dimension was a fractal dimension estimation method and used to extract features from edges. Single hidden layer neural network was used as the classifier. Finally, we proposed a three-segment representation biogeography-based optimization to train the classifier. Our method achieved a sensitivity of 97.78±1.29%, a specificity of 97.82±1.60% and an accuracy of 97.80±1.40%. The proposed method is superior to seven state-of-the-art methods in terms of sensitivity and accuracy.

  18. Teaching Individuals with Profound Multiple Disabilities to Access Preferred Stimuli with Multiple Microswitches

    Science.gov (United States)

    Tam, Gee May; Phillips, Katrina J.; Mudford, Oliver C.

    2011-01-01

    We replicated and extended previous research on microswitch facilitated choice making by individuals with profound multiple disabilities. Following an assessment of stimulus preferences, we taught 6 adults with profound multiple disabilities to emit 2 different responses to activate highly preferred stimuli. All participants learnt to activate…

  19. Optical CDMA and WDMA in the access network

    Science.gov (United States)

    Sargent, Edward H.; Stok, Andrew

    2003-08-01

    Optical CDMA provides one avenue to sharing the vast bandwidth of optical fiber among a number of active users in a network. In this work we address two questions central to considering the areas of applicability of CDMA in optics: (1) How do we compare fairly optical CDMA codes of different families, and what do we conclude? (2) How do we compare optical CDMA performance with that of conventional optical WDMA? To answer the first question, we present a method of comparing optical CDMA codes of different families, sizes and weights. We outline why the traditional performance metric of bit-error rate versus number of simultaneous users is lacking and propose a different performance measure -- the peak throughput normalized with respect to the size of the code. This metric is used to show that optical-orthogonal codes (OOCs) with a weight of 4 perform best at low offered loads while OOCs with weight 5 should be used at higher offered loads. By applying the technique across different families of codes, we demonstrate that multi-wavelength OOCs (MWOOCs) perform better than both OOCs (by a factor of approximately 1.25) and asymmetric prime-hop codes (by a factor of approximately 3.5), over a wide range of offered loads. In answer to the second question, we present a comparison of the performance of optical code-division multiple-access (CDMA) systems with that of a wavelength-division multiple-access (WDMA) system. The multiple-access techniques are applied in a time-slotted broadcast local-area network. The utilization, defined as the throughput per unit of time-domain bandwidth expansion, and packet delay are used as metrics of performance. When more than seven wavelengths are available, optical CDMA systems using asymmetric prime-hop codes and all-optical signal processing are shown to have higher peak utilization and lower corresponding delay than a WDMA system with the same number of wavelengths. When the encoders/decoders operate at the chip rate, the utilization

  20. Fiber Bragg grating for spectral phase optical code-division multiple-access encoding and decoding

    Science.gov (United States)

    Fang, Xiaohui; Wang, Dong-Ning; Li, Shichen

    2003-08-01

    A new method for realizing spectral phase optical code-division multiple-access (OCDMA) coding based on step chirped fiber Bragg gratings (SCFBGs) is proposed and the corresponding encoder/decoder is presented. With this method, a mapping code is introduced for the m-sequence address code and the phase shift can be inserted into the subgratings of the SCFBG according to the mapping code. The transfer matrix method together with Fourier transform is used to investigate the characteristics of the encoder/decoder. The factors that influence the correlation property of the encoder/decoder, including index modulation and bandwidth of the subgrating, are identified. The system structure is simple and good correlation output can be obtained. The performance of the OCDMA system based on SCFBGs has been analyzed.

  1. Comparison of Venae Sectio vs. modified Seldinger Technique for Totally Implantable Access Ports; Portas-trial [ISRCTN:52368201

    Directory of Open Access Journals (Sweden)

    Luntz S

    2006-06-01

    Full Text Available Abstract Background The insertion of a Totally Implantable Access Port (TIAP is a routinely employed technique in patients who need a safe and permanent venous access. The number of TIAP implantations is increasing constantly mainly due to advanced treatment options for malignant diseases. Therefore it is important to identify the implantation technique which has the optimal benefit/risk ratio for the patient. Study design A single-centre, randomized, controlled superiority trial to compare two different TIAP implantation techniques. Sample size: 160 patients will be included and randomized intra-operatively. Eligibility criteria: Age equal or older than 18 years, patients scheduled for primary elective implantation of a TIAP in local anaesthesia and a signed informed consent. Primary endpoint: Primary success rate of the randomized technique. Intervention: Venae Sectio in combination with the Seldinger Technique (guide wire and a peel away sheath will be used to place a TIAP. Reference treatment: Conventional Venae Sectio will be used with a direct insertion of the TIAP without guide wire or peel away sheath. Duration of study: Approximately 20 months. Organisation/Responsibility The trial will be conducted in compliance with the protocol and in accordance with the moral, ethical, and scientific principles governing clinical research as set out in the Declaration of Helsinki (1989 and Good Clinical Practice (GCP. The trial will also be carried out in keeping with local and regulatory requirements. The Klinisches Studienzentrum Chirurgie (KSC – Centre of Clinical Trials in Surgery at the Department of Surgery, University Hospital Heidelberg is responsible for planning and conduction of the trial. Documentation of patient's data will be accomplished via electronical Case Report Files (eCRF with MACRO®-Software by the KSC. Randomization, data management, monitoring and biometry are provided by the independent Koordinierungszentrum f

  2. Robotic technique improves entry point alignment for intramedullary nailing of femur fractures compared to the conventional technique: a cadaveric study.

    Science.gov (United States)

    Suero, Eduardo M; Westphal, Ralf; Citak, Musa; Hawi, Nael; Liodakis, Emmanouil; Krettek, Christian; Stuebig, Timo

    2017-08-11

    We aimed to test whether a robotic technique would offer more accurate access to the proximal femoral medullary cavity for insertion of an intramedullary nail compared to the conventional manual technique. The medullary cavity of ten femur specimens was accessed in a conventional fashion using fluoroscopic control. In ten additional femur specimens, ISO-C 3D scans were obtained and a computer program calculated the ideal location of the cavity opening based on the trajectory of the medullary canal. In both techniques, the surgeon opened the cavity using a drill and inserted a radiopaque tube that matched the diameter of the cavity. The mean difference in angle between the proximal opening and the medullary canal in the shaft of the femur was calculated for both groups. Robotic cavity opening was more accurate than the manual technique, with a mean difference in trajectory between the proximal opening and the shaft canal of 2.0° (95% CI 0.6°-3.5°) compared to a mean difference of 4.3° (95% CI 2.11°-6.48°) using the manual technique (P = 0.0218). The robotic technique was more accurate than the manual procedure for identifying the optimal location for opening the medullary canal for insertion of an intramedullary nail. Additional advantages may include a reduction in total radiation exposure, as only one ISO-C 3D scan is needed, as opposed to multiple radiographs when using the manual technique.

  3. Single, double or multiple-injection techniques for non-ultrasound guided axillary brachial plexus block in adults undergoing surgery of the lower arm.

    Science.gov (United States)

    Chin, Ki Jinn; Alakkad, Husni; Cubillos, Javier E

    2013-08-08

    Regional anaesthesia comprising axillary block of the brachial plexus is a common anaesthetic technique for distal upper limb surgery. This is an update of a review first published in 2006 and updated in 2011. To compare the relative effects (benefits and harms) of three injection techniques (single, double and multiple) of axillary block of the brachial plexus for distal upper extremity surgery. We considered these effects primarily in terms of anaesthetic effectiveness; the complication rate (neurological and vascular); and pain and discomfort caused by performance of the block. We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (The Cochrane Library), MEDLINE, EMBASE and reference lists of trials. We contacted trial authors. The date of the last search was March 2013 (updated from March 2011). We included randomized controlled trials that compared double with single-injection techniques, multiple with single-injection techniques, or multiple with double-injection techniques for axillary block in adults undergoing surgery of the distal upper limb. We excluded trials using ultrasound-guided techniques. Independent study selection, risk of bias assessment and data extraction were performed by at least two investigators. We undertook meta-analysis. The 21 included trials involved a total of 2148 participants who received regional anaesthesia for hand, wrist, forearm or elbow surgery. Risk of bias assessment indicated that trial design and conduct were generally adequate; the most common areas of weakness were in blinding and allocation concealment.Eight trials comparing double versus single injections showed a statistically significant decrease in primary anaesthesia failure (risk ratio (RR 0.51), 95% confidence interval (CI) 0.30 to 0.85). Subgroup analysis by method of nerve location showed that the effect size was greater when neurostimulation was used rather than the transarterial technique.Eight trials comparing multiple with single

  4. Human mixed lymphocyte cultures. Evaluation of microculture technique utilizing the multiple automated sample harvester (MASH)

    Science.gov (United States)

    Thurman, G. B.; Strong, D. M.; Ahmed, A.; Green, S. S.; Sell, K. W.; Hartzman, R. J.; Bach, F. H.

    1973-01-01

    Use of lymphocyte cultures for in vitro studies such as pretransplant histocompatibility testing has established the need for standardization of this technique. A microculture technique has been developed that has facilitated the culturing of lymphocytes and increased the quantity of cultures feasible, while lowering the variation between replicate samples. Cultures were prepared for determination of tritiated thymidine incorporation using a Multiple Automated Sample Harvester (MASH). Using this system, the parameters that influence the in vitro responsiveness of human lymphocytes to allogeneic lymphocytes have been investigated. PMID:4271568

  5. Pediatric vascular access

    International Nuclear Information System (INIS)

    Donaldson, James S.

    2006-01-01

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  6. Nuclear techniques in the development of fertilizer practices for multiple cropping systems

    International Nuclear Information System (INIS)

    1986-12-01

    This document summarizes the results of a coordinated research programme. Eight Member States of the FAO and IAEA carried out a series of field studies aimed at identifying optimum practices for the use of fertilizers in multiple cropping systems and for maximizing the contribution of atmospheric nitrogen biologically fixed by the legume component of such systems to the non-fixing cereal component or to the succeeding crop. Isotope techniques allowed the researchers to accurately determine the uptake of specific nutrients and to compare selected treatments

  7. Continuous analog of multiplicative algebraic reconstruction technique for computed tomography

    Science.gov (United States)

    Tateishi, Kiyoko; Yamaguchi, Yusaku; Abou Al-Ola, Omar M.; Kojima, Takeshi; Yoshinaga, Tetsuya

    2016-03-01

    We propose a hybrid dynamical system as a continuous analog to the block-iterative multiplicative algebraic reconstruction technique (BI-MART), which is a well-known iterative image reconstruction algorithm for computed tomography. The hybrid system is described by a switched nonlinear system with a piecewise smooth vector field or differential equation and, for consistent inverse problems, the convergence of non-negatively constrained solutions to a globally stable equilibrium is guaranteed by the Lyapunov theorem. Namely, we can prove theoretically that a weighted Kullback-Leibler divergence measure can be a common Lyapunov function for the switched system. We show that discretizing the differential equation by using the first-order approximation (Euler's method) based on the geometric multiplicative calculus leads to the same iterative formula of the BI-MART with the scaling parameter as a time-step of numerical discretization. The present paper is the first to reveal that a kind of iterative image reconstruction algorithm is constructed by the discretization of a continuous-time dynamical system for solving tomographic inverse problems. Iterative algorithms with not only the Euler method but also the Runge-Kutta methods of lower-orders applied for discretizing the continuous-time system can be used for image reconstruction. A numerical example showing the characteristics of the discretized iterative methods is presented.

  8. Mobile and Accessible Learning for MOOCs

    Science.gov (United States)

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  9. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  10. Self-normalizing multiple-echo technique for measuring the in vivo apparent diffusion coefficient

    International Nuclear Information System (INIS)

    Perman, W.H.; Gado, M.; Sandstrom, J.C.

    1989-01-01

    This paper presents work to develop a new technique for quantitating the in vivo apparent diffusion/perfusion coefficient (ADC) by obtaining multiple data points from only two images with the capability to normalize the data from consecutive images, thus minimizing the effect of interimage variation. Two multiple-echo (six-to eight-echo) cardiac-gated images are obtained, one without and one with additional diffusion/perfusion encoding gradients placed about the 180 RF pulses of all but the first echo. Since the first echoes of both images have identical pulse sequence parameters, variations in signal intensity-between the first echoes represent image-to-image variation. The signal intensities of the subsequent echoes with additional diffusion/perfusion encoding gradients are then normalized by using the ratio of the first-echo signal intensities

  11. Impression of multiple implants using photogrammetry: description of technique and case presentation.

    Science.gov (United States)

    Peñarrocha-Oltra, David; Agustín-Panadero, Rubén; Bagán, Leticia; Giménez, Beatriz; Peñarrocha, María

    2014-07-01

    To describe a technique for registering the positions of multiple dental implants using a system based on photogrammetry. A case is presented in which a prosthetic treatment was performed using this technique. Three Euroteknika® dental implants were placed to rehabilitate a 55-year-old male patient with right posterior maxillary edentulism. Three months later, the positions of the implants were registered using a photogrammetry-based stereo-camera (PICcamera®). After processing patient and implant data, special abutments (PICabutment®) were screwed onto each implant. The PICcamera® was then used to capture images of the implant positions, automatically taking 150 images in less than 60 seconds. From this information a file was obtained describing the relative positions - angles and distances - of each implant in vector form. Information regarding the soft tissues was obtained from an alginate impression that was cast in plaster and scanned. A Cr-Co structure was obtained using CAD/CAM, and its passive fit was verified in the patient's mouth using the Sheffield test and the screw resistance test. Twelve months after loading, peri-implant tissues were healthy and no marginal bone loss was observed. The clinical application of this new system using photogrammetry to record the position of multiple dental implants facilitated the rehabilitation of a patient with posterior maxillary edentulism by means of a prosthesis with optimal fit. The prosthetic process was accurate, fast, simple to apply and comfortable for the patient.

  12. Multiple Input - Multiple Output (MIMO) SAR

    Data.gov (United States)

    National Aeronautics and Space Administration — This effort will research and implement advanced Multiple-Input Multiple-Output (MIMO) Synthetic Aperture Radar (SAR) techniques which have the potential to improve...

  13. Transcystic cholangiogram access via rubber band with early withdrawal after liver transplantation: a safe technique.

    Science.gov (United States)

    Innocenti, F; Hepp, J; Humeres, R; Rios, H; Suárez, L; Zapata, R; Sanhueza, E; Rius, M

    2004-01-01

    Since different techniques have been described for cholangiogram access after liver transplantation, we compared two different methods for patients with duct-to-duct biliary anastomoses. Adult liver transplant patients from program inception in 1993 to May 2003 in whom a duct-to-duct biliary anastomosis with a T-tube choledochostomy were compared with those having a transcystic duct catheter using a rubber band. We excluded 10 patients in which a different technique was used or graft or patient survived less than 21 days. Group A (n = 28,) had a number 10 T-tube exteriorized through the recipient main bile duct; and group B (n = 33) a number 5 Bard ureteral stent tied to the cystic stump with reabsorbable suture and secured with a hemorrhoidal rubber ligature. The biliary complication rate was lower among the transcystic catheter group (9.1%, 3/33) compared to the T-tube group (35.7%, 10/28). Postcatheter withdrawal peritonitis was present in two patients in the T-tube group, one of whom required emergency laparotomy. A satisfactory postoperative cholangiogram was obtained in both groups. The transcystic catheter was withdrawn on average at 29 days, compared to 136 days in the T-tube group. Both techniques are equally effective in obtaining a satisfactory postoperative cholangiogram. However, the transcystic catheter technique allows a significantly earlier withdrawal with fewer complications compared to the T-tube technique.

  14. Opportunities for Process Monitoring Techniques at Delayed Access Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Curtis, Michael M.; Gitau, Ernest TN; Johnson, Shirley J.; Schanfein, Mark; Toomey, Christopher

    2013-09-20

    Except for specific cases where the International Atomic Energy Agency (IAEA) maintains a continuous presence at a facility (such as the Japanese Rokkasho Reprocessing Plant), there is always a period of time or delay between the moment a State is notified or aware of an upcoming inspection, and the time the inspector actually enters the material balance area or facility. Termed by the authors as “delayed access,” this period of time between inspection notice and inspector entrance to a facility poses a concern. Delayed access also has the potential to reduce the effectiveness of measures applied as part of the Safeguards Approach for a facility (such as short-notice inspections). This report investigates the feasibility of using process monitoring to address safeguards challenges posed by delayed access at a subset of facility types.

  15. CAS (CHEMICAL ABSTRACTS SOCIETY) PARAMETER CODES and Other Data from MULTIPLE SHIPS From Caribbean Sea and Others from 19790205 to 19890503 (NCEI Accession 9100017)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The accession contains Chemical Abstracts Society (CAS) parameter codes and Other Data from MULTIPLE SHIPS From Caribbean Sea and Gulf of Mexico from February 5,...

  16. Characterization and Optimization of LDPC Codes for the 2-User Gaussian Multiple Access Channel

    Directory of Open Access Journals (Sweden)

    Declercq David

    2007-01-01

    Full Text Available We address the problem of designing good LDPC codes for the Gaussian multiple access channel (MAC. The framework we choose is to design multiuser LDPC codes with joint belief propagation decoding on the joint graph of the 2-user case. Our main result compared to existing work is to express analytically EXIT functions of the multiuser decoder with two different approximations of the density evolution. This allows us to propose a very simple linear programming optimization for the complicated problem of LDPC code design with joint multiuser decoding. The stability condition for our case is derived and used in the optimization constraints. The codes that we obtain for the 2-user case are quite good for various rates, especially if we consider the very simple optimization procedure.

  17. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  18. Access to destinations : annual accessibility measure for the Twin Cities Metropolitan Region.

    Science.gov (United States)

    2012-11-01

    This report summarizes previous phases of the Access to Destinations project and applies the techniques developed : over the course of the project to conduct an evaluation of accessibility in the Twin Cities metropolitan region for : 2010. It describ...

  19. A new basaltic glass microanalytical reference material for multiple techniques

    Science.gov (United States)

    Wilson, Steve; Koenig, Alan; Lowers, Heather

    2012-01-01

    The U.S. Geological Survey (USGS) has been producing reference materials since the 1950s. Over 50 materials have been developed to cover bulk rock, sediment, and soils for the geological community. These materials are used globally in geochemistry, environmental, and analytical laboratories that perform bulk chemistry and/or microanalysis for instrument calibration and quality assurance testing. To answer the growing demand for higher spatial resolution and sensitivity, there is a need to create a new generation of microanalytical reference materials suitable for a variety of techniques, such as scanning electron microscopy/X-ray spectrometry (SEM/EDS), electron probe microanalysis (EPMA), laser ablation inductively coupled mass spectrometry (LA-ICP-MS), and secondary ion mass spectrometry (SIMS). As such, the microanalytical reference material (MRM) needs to be stable under the beam, be homogeneous at scales of better than 10–25 micrometers for the major to ultra-trace element level, and contain all of the analytes (elements or isotopes) of interest. Previous development of basaltic glasses intended for LA-ICP-MS has resulted in a synthetic basaltic matrix series of glasses (USGS GS-series) and a natural basalt series of glasses (BCR-1G, BHVO-2G, and NKT-1G). These materials have been useful for the LA-ICP-MS community but were not originally intended for use by the electron or ion beam community. A material developed from start to finish with intended use in multiple microanalytical instruments would be useful for inter-laboratory and inter-instrument platform comparisons. This article summarizes the experiments undertaken to produce a basalt glass reference material suitable for distribution as a multiple-technique round robin material. The goal of the analytical work presented here is to demonstrate that the elemental homogeneity of the new glass is acceptable for its use as a reference material. Because the round robin exercise is still underway, only

  20. System health monitoring using multiple-model adaptive estimation techniques

    Science.gov (United States)

    Sifford, Stanley Ryan

    Monitoring system health for fault detection and diagnosis by tracking system parameters concurrently with state estimates is approached using a new multiple-model adaptive estimation (MMAE) method. This novel method is called GRid-based Adaptive Parameter Estimation (GRAPE). GRAPE expands existing MMAE methods by using new techniques to sample the parameter space. GRAPE expands on MMAE with the hypothesis that sample models can be applied and resampled without relying on a predefined set of models. GRAPE is initially implemented in a linear framework using Kalman filter models. A more generalized GRAPE formulation is presented using extended Kalman filter (EKF) models to represent nonlinear systems. GRAPE can handle both time invariant and time varying systems as it is designed to track parameter changes. Two techniques are presented to generate parameter samples for the parallel filter models. The first approach is called selected grid-based stratification (SGBS). SGBS divides the parameter space into equally spaced strata. The second approach uses Latin Hypercube Sampling (LHS) to determine the parameter locations and minimize the total number of required models. LHS is particularly useful when the parameter dimensions grow. Adding more parameters does not require the model count to increase for LHS. Each resample is independent of the prior sample set other than the location of the parameter estimate. SGBS and LHS can be used for both the initial sample and subsequent resamples. Furthermore, resamples are not required to use the same technique. Both techniques are demonstrated for both linear and nonlinear frameworks. The GRAPE framework further formalizes the parameter tracking process through a general approach for nonlinear systems. These additional methods allow GRAPE to either narrow the focus to converged values within a parameter range or expand the range in the appropriate direction to track the parameters outside the current parameter range boundary

  1. Uncorrelated multiple conductive filament nucleation and rupture in ultra-thin high-κ dielectric based resistive random access memory

    KAUST Repository

    Wu, Xing

    2011-08-29

    Resistive switching in transition metal oxides could form the basis for next-generation non-volatile memory (NVM). It has been reported that the current in the high-conductivity state of several technologically relevant oxide materials flows through localized filaments, but these filaments have been characterized only individually, limiting our understanding of the possibility of multiple conductive filaments nucleation and rupture and the correlation kinetics of their evolution. In this study, direct visualization of uncorrelated multiple conductive filaments in ultra-thin HfO2-based high-κ dielectricresistive random access memory (RRAM) device has been achieved by high-resolution transmission electron microscopy (HRTEM), along with electron energy loss spectroscopy(EELS), for nanoscale chemical analysis. The locations of these multiple filaments are found to be spatially uncorrelated. The evolution of these microstructural changes and chemical properties of these filaments will provide a fundamental understanding of the switching mechanism for RRAM in thin oxide films and pave way for the investigation into improving the stability and scalability of switching memory devices.

  2. Magnetic resonance techniques for investigation of multiple sclerosis

    Science.gov (United States)

    MacKay, Alex; Laule, Cornelia; Li, David K. B.; Meyers, Sandra M.; Russell-Schulz, Bretta; Vavasour, Irene M.

    2014-11-01

    Multiple sclerosis (MS) is a common neurological disease which can cause loss of vision and balance, muscle weakness, impaired speech, fatigue, cognitive dysfunction and even paralysis. The key pathological processes in MS are inflammation, edema, myelin loss, axonal loss and gliosis. Unfortunately, the cause of MS is still not understood and there is currently no cure. Magnetic resonance imaging (MRI) is an important clinical and research tool for MS. 'Conventional' MRI images of MS brain reveal bright lesions, or plaques, which demark regions of severe tissue damage. Conventional MRI has been extremely valuable for the diagnosis and management of people who have MS and also for the assessment of therapies designed to reduce inflammation and promote repair. While conventional MRI is clearly valuable, it lack pathological specificity and, in some cases, sensitivity to non-lesional pathology. Advanced MR techniques have been developed to provide information that is more sensitive and specific than what is available with clinical scanning. Diffusion tensor imaging and magnetization transfer provide a general but non-specific measure of the pathological state of brain tissue. MR spectroscopy provides concentrations of brain metabolites which can be related to specific pathologies. Myelin water imaging was designed to assess brain myelination and has proved useful for measuring myelin loss in MS. To combat MS, it is crucial that the pharmaceutical industry finds therapies which can reverse the neurodegenerative processes which occur in the disease. The challenge for magnetic resonance researchers is to design imaging techniques which can provide detailed pathological information relating to the mechanisms of MS therapies. This paper briefly describes the pathologies of MS and demonstrates how MS-associated pathologies can be followed using both conventional and advanced MR imaging protocols.

  3. Comparison of a Ring On-Chip Network and a Code-Division Multiple-Access On-Chip Network

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2007-01-01

    Full Text Available Two network-on-chip (NoC designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, data transfer principles, network node structures, and their asynchronous designs. Both the synchronous and the asynchronous designs of the two on-chip networks are realized using a hardware-description language (HDL in order to make the entire designs suit the commonly used synchronous design tools and flow. The performance estimation and comparison of the two NoC designs which are based on the HDL realizations are addressed. By comparing the two NoC designs, the advantages and disadvantages of applying direct connection and CDMA connection schemes in an on-chip communication network are discussed.

  4. Tailoring Chirped Moiré Fiber Bragg Gratings for Wavelength-Division-Multiplexing and Optical Code-Division Multiple-Access Applications

    Science.gov (United States)

    Chen, Lawrence R.; Smith, Peter W. E.

    The design and fabrication of chirped Moiré fiber Bragg gratings (CMGs) are presented, which can be used in either (1) transmission as passband filters for providing wavelength selectivity in wavelength-division-multiplexed (WDM) systems or (2) reflection as encoding/decoding elements to decompose short broadband pulses in both wavelength and time in order to implement an optical code-division multiple-access (OCDMA) system. In transmission, the fabricated CMGs have single or multiple flattened passbands ( 12 dB isolation and near constant in-band group delay. It is shown that these filters do not produce any measurable dispersion-induced power penalties when used to provide wavelength selectivity in 2.5 Gbit/s systems. It is also demonstrated how CMGs can be used in reflection to encode/decode short pulses from a wavelength-tunable mode-locked Er-doped fiber laser.

  5. WDM Optical Access Network for Full-Duplex and Reconfigurable Capacity Assignment Based on PolMUX Technique

    Directory of Open Access Journals (Sweden)

    Jose Mora

    2014-12-01

    Full Text Available We present a novel bidirectional WDM-based optical access network featuring reconfigurable capacity assignment. The architecture relies on the PolMUX technique allowing a compact, flexible, and bandwidth-efficient router in addition to source-free ONUs and color-less ONUs for cost/complexity minimization. Moreover, the centralized architecture contemplates remote management and control of polarization. High-quality transmission of digital signals is demonstrated through different routing scenarios where all channels are dynamically assigned in both downlink and uplink directions.

  6. Combined interpretation of multiple geophysical techniques: an archaeological case study

    Science.gov (United States)

    Riedl, S.; Reichmann, S.; Tronicke, J.; Lück, E.

    2009-04-01

    In order to locate and ascertain the dimensions of an ancient orangery, we explored an area of about 70 m x 60 m in the Rheinsberg Palace Garden (Germany) with multiple geophysical techniques. The Rheinsberg Park, situated about 100 km northwest of Berlin, Germany, was established by the Prussian emperors in the 18th century. Due to redesign of the architecture and the landscaping during the past 300 years, buildings were dismantled and detailed knowledge about some original buildings got lost. We surveyed an area close to a gazebo where, after historical sources, an orangery was planned around the year 1740. However, today it is not clear to what extent this plan has been realized and if remains of this building are still buried in the subsurface. Applied geophysical techniques include magnetic gradiometry, frequency domain electromagnetic (FDEM) and direct current (DC) resistivity mapping as well as ground penetrating radar (GPR). To get an overview of the site, we performed FDEM electrical conductivity mapping using an EM38 instrument and magnetic gradiometry with caesium magnetometers. Both data sets were collected with an in- and crossline data point spacing of ca. 10 cm and 50 cm, respectively. DC resistivity surveying was performed using a pole-pole electrode configuration with an electrode spacing of 1.5 m and a spacing of 1.0 m between individual readings. A 3-D GPR survey was conducted using 200 MHz antennae and in- and crossline spacing of ca. 10 cm and 40 cm, respectively. A standard processing sequence including 3-D migration was applied. A combined interpretation of all collected data sets illustrates that the magnetic gradient and the EM38 conductivity maps is are dominated by anomalies from metallic water pipes from belonging to the irrigation system of the park. The DC resistivity map outlines a rectangular area which might indicate the extension of a former building south of the gazebo. The 3-D GPR data set provides further insights about

  7. Totally implantable vascular access device (TIVAD) placement: a modified technique that takes post-procedure aesthetic aspects into account.

    Science.gov (United States)

    Liberale, Gabriel

    2017-04-01

    Major progress has been made in breast cancer reconstruction surgery. The standard technique for totally implanted vascular access device (TIVAD) implantation generally requires an incision for port insertion on the anterior part of the thorax that leaves a scar in the middle of the neckline in patients who have undergone mastectomy with complex breast reconstruction. The aim of this technical note is to report our revised surgical technique for TIVAD placement. In patients with breast cancer, we take a lateralized approach, performing an oblique incision on the lowest part of the deltopectoral groove. This allows us to introduce the port and to place it on the anterolateral part of the thorax, thus avoiding an unaesthetic scar on the anterior part of the thorax. Our modified technique for TIVAD implantation is described.

  8. Novel anti-jamming technique for OCDMA network through FWM in SOA based wavelength converter

    Science.gov (United States)

    Jyoti, Vishav; Kaler, R. S.

    2013-06-01

    In this paper, we propose a novel anti-jamming technique for optical code division multiple access (OCDMA) network through four wave mixing (FWM) in semiconductor optical amplifier (SOA) based wavelength converter. OCDMA signal can be easily jammed with high power jamming signal. It is shown that wavelength conversion through four wave mixing in SOA has improved capability of jamming resistance. It is observed that jammer has no effect on OCDMA network even at high jamming powers by using the proposed technique.

  9. Technique and Patient Selection Criteria of Right Anterior Mini-Thoracotomy for Minimal Access Aortic Valve Replacement.

    Science.gov (United States)

    Tavakoli, Reza; Leprince, Pascal; Gassmann, Max; Jamshidi, Peiman; Yamani, Nassrin; Amour, Julien; Lebreton, Guillaume

    2018-03-26

    Aortic valve stenosis has become the most prevalent valvular heart disease in developed countries, and is due to the aging of these populations. The incidence of the pathology increases with growing age after 65 years. Conventional surgical aortic valve replacement through median sternotomy has been the gold standard of patient care for symptomatic aortic valve stenosis. However, as the risk profile of patients worsens, other therapeutic strategies have been introduced in an attempt to maintain the excellent results obtained by the established surgical treatment. One of these approaches is represented by transcatheter aortic valve implantation. Although the outcomes of high-risk patients undergoing treatment for symptomatic aortic valve stenosis have improved with transcatheter aortic valve replacement, many patients with this condition remain candidates for surgical aortic valve replacement. In order to reduce the surgical trauma in patients who are candidates for surgical aortic valve replacement, minimally invasive approaches have garnered interest during the past decade. Since the introduction of right anterior thoracotomy for aortic valve replacement in 1993, right anterior mini-thoracotomy and upper hemi-sternotomy have become the predominant incisional approaches among cardiac surgeons performing minimal access aortic valve replacement. Beside the location of the incision, the arterial cannulation site represents the second major landmark of minimal access techniques for aortic valve replacement. The two most frequently used arterial cannulation sites include central aortic and peripheral femoral approaches. With the purpose of reducing surgical trauma in these patients, we have opted for a right anterior mini-thoracotomy approach with a central aortic cannulation site. This protocol describes in detail a technique for minimally invasive aortic valve replacement and provides recommendations for patient selection criteria, including cardiac computer

  10. MPTCP Tunnel: An Architecture for Aggregating Bandwidth of Heterogeneous Access Networks

    Directory of Open Access Journals (Sweden)

    Xiaolan Liu

    2018-01-01

    Full Text Available Fixed and cellular networks are two typical access networks provided by operators. Fixed access network is widely employed; nevertheless, its bandwidth is sometimes not sufficient enough to meet user bandwidth requirements. Meanwhile, cellular access network owns unique advantages of wider coverage, faster increasing link speed, more flexible deployment, and so forth. Therefore, it is attractive for operators to mitigate the bandwidth shortage by bundling these two. Actually, there have been existing schemes proposed to aggregate the bandwidth of two access networks, whereas they all have their own problems, like packet reordering or extra latency overhead. To address this problem, we design new architecture, MPTCP Tunnel, to aggregate the bandwidth of multiple heterogeneous access networks from the perspective of operators. MPTCP Tunnel uses MPTCP, which solves the reordering problem essentially, to bundle multiple access networks. Besides, MPTCP Tunnel sets up only one MPTCP connection at play which adapts itself to multiple traffic types and TCP flows. Furthermore, MPTCP Tunnel forwards intact IP packets through access networks, maintaining the end-to-end TCP semantics. Experimental results manifest that MPTCP Tunnel can efficiently aggregate the bandwidth of multiple access networks and is more adaptable to the increasing heterogeneity of access networks than existing mechanisms.

  11. Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria

    OpenAIRE

    Chimaobi Valentine Okolo; Chizoba Obidigbo

    2015-01-01

    As a basic physiology need, threat to sufficient food production is threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revea...

  12. Multiple and high-throughput droplet reactions via combination of microsampling technique and microfluidic chip

    KAUST Repository

    Wu, Jinbo

    2012-11-20

    Microdroplets offer unique compartments for accommodating a large number of chemical and biological reactions in tiny volume with precise control. A major concern in droplet-based microfluidics is the difficulty to address droplets individually and achieve high throughput at the same time. Here, we have combined an improved cartridge sampling technique with a microfluidic chip to perform droplet screenings and aggressive reaction with minimal (nanoliter-scale) reagent consumption. The droplet composition, distance, volume (nanoliter to subnanoliter scale), number, and sequence could be precisely and digitally programmed through the improved sampling technique, while sample evaporation and cross-contamination are effectively eliminated. Our combined device provides a simple model to utilize multiple droplets for various reactions with low reagent consumption and high throughput. © 2012 American Chemical Society.

  13. S-band multiple-access interference study for advanced tracking and data relay satellite systems

    Science.gov (United States)

    Peng, Wei-Chung; Yang, Chau-Chin

    1990-01-01

    The results of a study on the effect of mutual interference among S-band multiple access (SMA) system users of advanced tracking and data relay satellite system (ATDRSS) are presented. In the ATDRSS era, the SMA system is required to support data rates ranging from 10 kb/s to 3 Mb/s. The system will consist of four advanced tracking and data relay satellites (ATDRS) each supporting up to five telemetry links. All users have 10 MHz bandwidth with their carrier frequency equal to 2.2875 GHz. A hybrid SDMA/CDMA scheme is used to mitigate the effect of the interference among system users. SMA system interference probability is evaluated with CLASS software. User link margin degradation due to mutual interference between two users is evaluated. System interference probability is evaluated for the projected 1996 mission model, a reference mission model, and a modified reference mission model.

  14. Power efficient MIMO techniques for 3GPP LTE and beyond

    OpenAIRE

    Beh, KC; Han, C; Nicolaou, M; Armour, SMD; Doufexi, A

    2009-01-01

    Environmental issues and the need to reduce energy consumption for lowering operating costs have pushed power efficiency to become one of the major issues of current research in the field of wireless networks. The objective of the Green Radio research programme (Core 5) of Mobile VCE is to deliver reduced power consumption of radio access networks. This paper attempts to show that an efficient exploitation of multiple antenna techniques and multiuser diversity in both the time, frequency as w...

  15. Treatment of hemodialysis vascular access rupture irresponsive to prolonged balloon tamponade: Retrospective evaluation of the effectiveness of N-butyl cyanoacrylate seal-off technique

    Energy Technology Data Exchange (ETDEWEB)

    Weng, Mei Jul; Liang, Huei Lung; Pan, Huay Ben [Dept. of Radiology, Kaohsiung Veterans General Hospital, Kaohsiung (China); Chen, Matt Chiung Yu [Dept. of Radiology, Yuan' s General Hospital, Kaohsiung (China)

    2013-01-15

    The current study retrospectively evaluated whether the percutaneous N-butyl cyanoacrylate (NBCA) seal-off technique is an effective treatment for controlling the angioplasty-related ruptures, which are irresponsive to prolonged balloon tamponade, during interventions for failed or failing hemodialysis vascular accesses. We reviewed 1588 interventions performed during a 2-year period for dysfunction and/or failed hemodialysis vascular access sites in 1569 patients. For the angioplasty-related ruptures, which could not be controlled with repeated prolonged balloon tamponade, the rupture sites were sealed off with an injection of a glue mixture (NBCA and lipiodol), via a needle/needle sheath to the rupture site, under a sonographic guidance. Technical success rate, complications and clinical success rate were reported. The post-seal-off primary and secondary functional patency rates were calculated by a survival analysis with the Kaplan-Meier method. Twenty ruptures irresponsive to prolonged balloon tamponade occurred in 1588 interventions (1.3%). Two technical failures were noted; one was salvaged with a bailout stent-graft insertion and the other was lost after access embolization. Eighteen accesses (90.0%) were salvaged with the seal-off technique; of them, 16 ruptures were completely sealed off, and two lesions were controlled as acute pseudoaneurysms. Acute pseudoaneurysms were corrected with stentgraft insertion in one patient, and access ligation in the other. The most significant complication during the follow-up was delayed pseudoaneurysm, which occurred in 43.8% (7 of 16) of the completely sealed off accesses. Delayed pseudoaneurysms were treated with surgical revision (n = 2), access ligation (n = 2) and observation (n = 3). During the follow-up, despite the presence of pseudoaneurysms (acute = 1, delayed = 7), a high clinical success rate of 94.4% (17 of 18) was achieved, and they were utilized for hemodialysis at the mean of 411.0 days. The post

  16. submitter Studies of CMS data access patterns with machine learning techniques

    CERN Document Server

    De Luca, Silvia

    This thesis presents a study of the Grid data access patterns in distributed analysis in the CMS experiment at the LHC accelerator. This study ranges from the deep analysis of the historical patterns of access to the most relevant data types in CMS, to the exploitation of a supervised Machine Learning classification system to set-up a machinery able to eventually predict future data access patterns - i.e. the so-called dataset “popularity” of the CMS datasets on the Grid - with focus on specific data types. All the CMS workflows run on the Worldwide LHC Computing Grid (WCG) computing centers (Tiers), and in particular the distributed analysis systems sustains hundreds of users and applications submitted every day. These applications (or “jobs”) access different data types hosted on disk storage systems at a large set of WLCG Tiers. The detailed study of how this data is accessed, in terms of data types, hosting Tiers, and different time periods, allows to gain precious insight on storage occupancy ove...

  17. Multiple regression technique for Pth degree polynominals with and without linear cross products

    Science.gov (United States)

    Davis, J. W.

    1973-01-01

    A multiple regression technique was developed by which the nonlinear behavior of specified independent variables can be related to a given dependent variable. The polynomial expression can be of Pth degree and can incorporate N independent variables. Two cases are treated such that mathematical models can be studied both with and without linear cross products. The resulting surface fits can be used to summarize trends for a given phenomenon and provide a mathematical relationship for subsequent analysis. To implement this technique, separate computer programs were developed for the case without linear cross products and for the case incorporating such cross products which evaluate the various constants in the model regression equation. In addition, the significance of the estimated regression equation is considered and the standard deviation, the F statistic, the maximum absolute percent error, and the average of the absolute values of the percent of error evaluated. The computer programs and their manner of utilization are described. Sample problems are included to illustrate the use and capability of the technique which show the output formats and typical plots comparing computer results to each set of input data.

  18. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  19. How to achieve ultrasound-guided femoral venous access: the new standard of care in the electrophysiology laboratory.

    Science.gov (United States)

    Wiles, Benedict M; Child, Nicholas; Roberts, Paul R

    2017-06-01

    Bedside vascular ultrasound machines are increasingly available. They are used to facilitate safer vascular access across a number of different specialties. In the electrophysiology laboratory however, where patients are frequently anticoagulated and require the insertion of multiple venous sheaths, anatomical landmark techniques predominate. Despite the high number of vascular complications associated with electrophysiological procedures and the increasing evidence to support its use in electrophysiology, ultrasound remains underutilised. A new standard of care is required. A comprehensive technical report, providing a detailed explanation of this important technique, will provide other electrophysiology centres with the knowledge and justification for adopting ultrasound guidance as their standard practice. We review the increasing body of evidence which demonstrates that routine ultrasound usage can substantially improve the safety of femoral venous access in the electrophysiology laboratory. We offer a comprehensive technical report to guide operators through the process of ultrasound-guided venous access, with a specific focus on the electrophysiology laboratory. Additionally, we detail a novel technique which utilises real-time colour Doppler ultrasound to accurately identify needle tip location during venous puncture. The use of vascular ultrasound to guide femoral venous cannulation is rapid, inexpensive and easily learnt. Ultrasound is readily available and offers the potential to significantly reduce vascular complications in the unique setting of the electrophysiology laboratory. Ultrasound guidance to achieve femoral venous access should be the new standard of care in electrophysiology.

  20. Common Femoral Artery Access on YouTube: What Practices are Being Shown and Who is Delivering the Message?

    Science.gov (United States)

    Pitcher, Grayson S; Newton, Daniel H; Amendola, Michael F

    Novice learners are increasingly turning to YouTube as a learning resource for surgical procedures. One example of such a procedure is common femoral artery puncture and sheath placement. Practitioners in several specialties perform this procedure to access the arterial system for angiography and intervention. We set forth to compare the techniques demonstrated on YouTube by the various specialists, as well as compare each specialty׳s prevalence on this website. YouTube (www.youtube.com) was accessed in December 2015 at multiple time points with a cleared-cache web browser for the keyword search categories: "femoral artery access," "femoral access," and "angiography access." The top 500 videos from each of these keyword searches were analyzed. Videos were categorized by practitioner specialty, technique, duration of video, age of video, and total views. Videos with clear demonstration of femoral artery access were included in the analysis. All industry videos were excluded from the analysis. Categorical variables were compared using Fisher׳s exact test, and continuous variables were compared with the Student׳s t-test. A total of 2460, 4680 and 1800 videos were found for each keyword search, respectively. Of these, 33 videos clearly demonstrated femoral artery access technique. Vascular specialists, compared to interventional cardiology and radiology, had fewer videos (n = 4 vs. 14) and older videos (3.5 ± 2.1y vs. 2.25 ± 0.5y, p YouTube and other online resources are being used by novice learners, vascular specialists are underrepresented for femoral artery access, a foundational vascular procedure. Other practitioners demonstrate videos with landmark-guided access and rarely demonstrate ultrasound use. As recognized vascular experts, vascular surgeons should improve their visibility in online learning resources. Copyright © 2017 Association of Program Directors in Surgery. All rights reserved.

  1. Distributed Storage Algorithm for Geospatial Image Data Based on Data Access Patterns.

    Directory of Open Access Journals (Sweden)

    Shaoming Pan

    Full Text Available Declustering techniques are widely used in distributed environments to reduce query response time through parallel I/O by splitting large files into several small blocks and then distributing those blocks among multiple storage nodes. Unfortunately, however, many small geospatial image data files cannot be further split for distributed storage. In this paper, we propose a complete theoretical system for the distributed storage of small geospatial image data files based on mining the access patterns of geospatial image data using their historical access log information. First, an algorithm is developed to construct an access correlation matrix based on the analysis of the log information, which reveals the patterns of access to the geospatial image data. Then, a practical heuristic algorithm is developed to determine a reasonable solution based on the access correlation matrix. Finally, a number of comparative experiments are presented, demonstrating that our algorithm displays a higher total parallel access probability than those of other algorithms by approximately 10-15% and that the performance can be further improved by more than 20% by simultaneously applying a copy storage strategy. These experiments show that the algorithm can be applied in distributed environments to help realize parallel I/O and thereby improve system performance.

  2. Distributed Storage Algorithm for Geospatial Image Data Based on Data Access Patterns.

    Science.gov (United States)

    Pan, Shaoming; Li, Yongkai; Xu, Zhengquan; Chong, Yanwen

    2015-01-01

    Declustering techniques are widely used in distributed environments to reduce query response time through parallel I/O by splitting large files into several small blocks and then distributing those blocks among multiple storage nodes. Unfortunately, however, many small geospatial image data files cannot be further split for distributed storage. In this paper, we propose a complete theoretical system for the distributed storage of small geospatial image data files based on mining the access patterns of geospatial image data using their historical access log information. First, an algorithm is developed to construct an access correlation matrix based on the analysis of the log information, which reveals the patterns of access to the geospatial image data. Then, a practical heuristic algorithm is developed to determine a reasonable solution based on the access correlation matrix. Finally, a number of comparative experiments are presented, demonstrating that our algorithm displays a higher total parallel access probability than those of other algorithms by approximately 10-15% and that the performance can be further improved by more than 20% by simultaneously applying a copy storage strategy. These experiments show that the algorithm can be applied in distributed environments to help realize parallel I/O and thereby improve system performance.

  3. Innovations in the Endovascular Management of Critical Limb Ischemia: Retrograde Tibiopedal Access and Advanced Percutaneous Techniques.

    Science.gov (United States)

    Mustapha, Jihad A; Diaz-Sandoval, Larry J; Saab, Fadi

    2017-08-01

    Retrograde tibiopedal access and interventions have contributed to advance of endovascular techniques to treat critical limb ischemia (CLI) patients. This review encompasses the spectrum from advanced diagnostic imaging and technical therapeutic approaches for infrapopliteal occlusions, to a discussion of current standards and future directions. Contemporary studies of infrapopliteal angioplasty show suboptimal short-term and 1-year clinical outcomes. Comparative data is needed to shift the focus from PTA to disruptive treatment modalities that can further improve outcomes. Retrograde pedal access has emerged as an important tool to facilitate successfully percutaneous revascularization and limb salvage in patients with CLI. To efficiently approach the complexity of CLI, new thought processes are needed to change the reigning paradigms. Retrograde tibial-pedal access has shown improvement in the rate of successful revascularizations and is an important tool in the amputation-prevention armamentarium. Additional technologies may further improve success rates. Drug-eluting stents have shown better outcomes than PTA in patients with focal infrapopliteal lesions. Registry data have demonstrated the advantage of several atherectomy devices in the tibial arteries. More recently, bioresorbable vascular scaffolds have been used successfully, and further studies with drug-coated balloons are underway. Interventional operators are now even working in the inframalleolar space to reconstitute the plantar arch. Well-conducted studies are needed to generate high-quality evidence in the field of critical limb ischemia management.

  4. Straight configuration saphenous vein transposition to popliteal artery for vascular access.

    Science.gov (United States)

    Caco, Gentian; Golemi, Dhurata; Likaj, Eriola

    2017-03-21

    The saphenous vein is commonly used as a vascular graft in peripheral artery surgery but rarely used for vascular access. The literature on straight configuration saphenous vein transposition to the popliteal artery is scarce. Here we present two cases of straight configuration saphenous vein transposition to the popliteal artery for vascular access, the surgical technique and respective follow-up. Two young men, aged 29 and 36 years, were chosen for lower-limb vascular access for hemodialysis. The first patient was paraplegic since birth. He used his arms to move so upper extremity vascular access was avoided. The second patient presented with an infected upper extremity arteriovenous graft (AVG) and after multiple closed AVFs he had no more available arm veins. Both patients received autologous lower extremity straight configuration saphenous vein transpositions to the popliteal artery under spinal anesthesia in May and October 2012, respectively. Cannulation of the fistula was allowed after one month. There were no early complications. Slight swelling on the leg appeared in one of the patients. Both fistulas were still functional after 36 and 32 months, respectively. The straight configuration saphenous vein transposition to popliteal artery is simple to perform, offers a long and straight segment for cannulation and may be a suitable autologous vascular access in selected patients.

  5. PHEA-PLA biocompatible nanoparticles by technique of solvent evaporation from multiple emulsions.

    Science.gov (United States)

    Cavallaro, Gennara; Craparo, Emanuela Fabiola; Sardo, Carla; Lamberti, Gaetano; Barba, Anna Angela; Dalmoro, Annalisa

    2015-11-30

    Nanocarriers of amphiphilic polymeric materials represent versatile delivery systems for poorly water soluble drugs. In this work the technique of solvent evaporation from multiple emulsions was applied to produce nanovectors based on new amphiphilic copolymer, the α,β-poly(N-2-hydroxyethyl)-DL-aspartamide-polylactic acid (PHEA-PLA), purposely synthesized to be used in the controlled release of active molecules poorly soluble in water. To this aim an amphiphilic derivative of PHEA, a hydrophilic polymer, was synthesized by derivatization of the polymeric backbone with hydrophobic grafts of polylactic acid (PLA). The achieved copolymer was thus used to produce nanoparticles loaded with α tocopherol (vitamin E) adopted as lipophilic model molecule. Applying a protocol based on solvent evaporation from multiple emulsions assisted by ultrasonic energy and optimizing the emulsification process (solvent selection/separation stages), PHEA-PLA nanostructured particles with total α tocopherol entrapment efficiency (100%), were obtained. The drug release is expected to take place in lower times with respect to PLA due to the presence of the hydrophilic PHEA, therefore the produced nanoparticles can be used for semi-long term release drug delivery systems. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Security and reliability analysis of diversity combining techniques in SIMO mixed RF/FSO with multiple users

    KAUST Repository

    Abd El-Malek, Ahmed H.; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we investigate the impact of different diversity combining techniques on the security and reliability analysis of a single-input-multiple-output (SIMO) mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic multiuser scheduling. In this model, the user of the best channel among multiple users communicates with a multiple antennas relay node over an RF link, and then, the relay node employs amplify-and-forward (AF) protocol in retransmitting the user data to the destination over an FSO link. Moreover, the authorized transmission is assumed to be attacked by a single passive RF eavesdropper equipped with multiple antennas. Therefore, the system security reliability trade-off analysis is investigated. Closed-form expressions for the system outage probability and the system intercept probability are derived. Then, the newly derived expressions are simplified to their asymptotic formulas at the high signal-to-noise- ratio (SNR) region. Numerical results are presented to validate the achieved exact and asymptotic results and to illustrate the impact of various system parameters on the system performance. © 2016 IEEE.

  7. Security and reliability analysis of diversity combining techniques in SIMO mixed RF/FSO with multiple users

    KAUST Repository

    Abd El-Malek, Ahmed H.

    2016-07-26

    In this paper, we investigate the impact of different diversity combining techniques on the security and reliability analysis of a single-input-multiple-output (SIMO) mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic multiuser scheduling. In this model, the user of the best channel among multiple users communicates with a multiple antennas relay node over an RF link, and then, the relay node employs amplify-and-forward (AF) protocol in retransmitting the user data to the destination over an FSO link. Moreover, the authorized transmission is assumed to be attacked by a single passive RF eavesdropper equipped with multiple antennas. Therefore, the system security reliability trade-off analysis is investigated. Closed-form expressions for the system outage probability and the system intercept probability are derived. Then, the newly derived expressions are simplified to their asymptotic formulas at the high signal-to-noise- ratio (SNR) region. Numerical results are presented to validate the achieved exact and asymptotic results and to illustrate the impact of various system parameters on the system performance. © 2016 IEEE.

  8. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  9. The hologram principles and techniques

    CERN Document Server

    Richardson, Martin J

    2018-01-01

    Written by Martin Richardson (an acclaimed leader and pioneer in the field) and John Wiltshire, The Hologram: Principles and Techniques is an important book that explores the various types of hologram in their multiple forms and explains how to create and apply the technology. The authors offer an insightful overview of the currently available recording materials, chemical formulas, and laser technology that includes the history of phase imaging and laser science. Accessible and comprehensive, the text contains a step-by-step guide to the production of holograms. In addition, The Hologram outlines the most common problems encountered in producing satisfactory images in the laboratory, as well as dealing with the wide range of optical and chemical techniques used in commercial holography. The Hologram is a well-designed instructive tool, involving three distinct disciplines: physics, chemistry, and graphic arts. This vital resource offers a guide to the development and understanding of the recording of mater...

  10. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  11. Fovea sparing internal limiting membrane peeling using multiple parafoveal curvilinear peels for myopic foveoschisis: technique and outcome.

    Science.gov (United States)

    Jin, Haiying; Zhang, Qi; Zhao, Peiquan

    2016-10-18

    To introduce a modified surgical technique, the "parafoveal multiple curvelinear internal limiting membrane (ILM) peeling", to preserve epi-foveal ILM in myopic foveoschisis surgery. Consecutive patients with myopic foveoschisis were enrolled in the present prospective interventional case series. The surgeries were performed using transconjunctival 23-gauge system. The macular area was divided into quadrants. ILM was peeled off in a curvilinear manner centered around the site that was away from the central fovea in each quadrant. Shearing forces were used to control the direction to keep the peeling away from central fovea. ILM at central fovea of about 500 to 1000 μm was preserved by this technique. This technique was performed in 20 eyes of 20 consecutive patients. Epi-foveal ILM was successfully preserved in all cases using the technique. Patients were followed up for more than 12 months. The mean postoperative logMAR visual acuity improved from 1.67 ± 0.65 preoperatively to 1.15 ± 0.49 (P = 0.015; paired t-test). Postoperative OCT examinations showed that full-thickness macular holes (MHs) did not developed in any case. Central fovea thickness decreased from 910 ± 261 μm preoperatively to 125 ± 85 postoperatively (P = 0.001; paired t-test). Fovea sparing ILM peeling using multiple parafoveal curvilinear peels prevents the development of postoperative full-thickness MHs in eyes with myopic foveoschisis.

  12. Stent tunnel technique to save thrombosed native hemodialysis fistula with extensive venous aneurysm

    Directory of Open Access Journals (Sweden)

    Rabellino M

    2017-07-01

    Full Text Available Martin Rabellino,1 Guillermo J Rosa-Diez,2 Sergio A Shinzato,1 Pablo Rodriguez,1 Oscar A Peralta,1 Maria S Crucelegui,2 Rosario Luxardo,2 Agustina Heredia-Martinez,2 Mariela I Bedini-Rocca,2 Ricardo D García-Mónaco1 1Department of Angiography and Endovascular Therapy, 2Department of Nephrology, Hospital Italiano de Buenos Aires, Buenos Aires, Argentina Introduction and purpose: The increasing number of patients undergoing hemodialysis and the limited number of access sites have resulted in an increasing number of techniques to maintain vascular access for hemodialysis. Thrombosed arteriovenous (AV fistulas with large venous aneurysms have poor treatment results, with both endovascular and surgical techniques, leading to a high rate of definitive AV access loss. The purpose of this study was to review the feasibility and initial results of this novel endovascular treatment of thrombosed AV fistulas with large venous aneurysms.Materials and methods: A novel endovascular treatment technique of inserting nitinol auto-expandable uncovered stents stretching through the whole puncture site area, thus creating a tunnel inside the thrombus, was retrospectively analyzed and described.Results: A total of 17 stents were placed in 10 hemodialysis fistulas, with a mean venous coverage length of 17.8 cm. In all the cases, 100% technical success was achieved, with complete restoration of blood flow in all patients. There were no procedure-related complications. The mean follow-up was 167 days (range 60–420 days, with a primary and assisted patency of 80% and 100%, respectively. No multiple trans-stent struts-related complications were observed. Three stent fractures were diagnosed with plain films at the site of puncture without consequence in the venous access permeability.Conclusion: The “stent tunnel technique” is a feasible, safe and effective alternative to salvage native hemodialysis access, thus extending the function of the venous access with

  13. Vascular access in pediatric patients in the emergency department: types of access, indications, and complications [digest].

    Science.gov (United States)

    Whitney, Rachel; Langhan, Melissa; Pade, Kathryn H

    2017-06-22

    Vascular access is a potentially life-saving procedure that is a mainstay of emergency medicine practice. There are a number of challenges associated with obtaining and maintaining vascular access, and the choice of the route of access and equipment used will depend on patient- and provider-specific factors. In this issue, the indications and complications of peripheral intravenous access, intraosseous access, and central venous access are reviewed. Timely and effective assessment and management of difficult-access patients, pain control techniques that can assist vascular access, and contraindications to each type of vascular access are also discussed. [Points & Pearls is a digest of Pediatric Emergency Medicine Practice].

  14. Ultrasound-guided antegrade access during laparoscopic pyeloplasty in infants less than one year of age: A point of technique

    Directory of Open Access Journals (Sweden)

    Arvind Ganpule

    2012-01-01

    Full Text Available Background: Access to urethras and ureters of infants may be hazardous and injurious through an endoscopic route. Placement and removal of stents in infants requires anaesthesia and access through these small caliber urethras. We describe our technique of placing antegrade splint during a laparoscopic pyeloplasty in these infants. Materials and Methods: An ultrasound-guided percutaneous renal access is obtained. Telescopic metal two part needle is passed into the kidney over a guide wire. A second guide wire is passed through the telescopic metal two part needle. The tract is dilated with 14 Fr screw dilator. Over one guide wire, a 5 Fr ureteric catheter is passed and coiled in the renal pelvis. Over the other wire, a 14 Fr malecot catheter is placed as nephrostomy. Laparoscopic pyeloplasty is then done. During pyelotomy, the ureteric catheter is pulled and advanced through the ureter before the pyeloplasty is completed. The ureteric catheter thus acts as a splint across the anastomosis. Ureteric catheter is removed on the 3 rd post operative day and nephrostomy is clamped. Nephrostomy is removed on 4 th post operative day if child is asymptomatic. The modified technique was successfully done in five patients aged less than one year old. All patients tolerated the procedure well. Post operative period was uneventful in all. Conclusion: Ultrasound-guided ante grade nephroureteral ureteral splint for infant laparoscopic pyeloplasty is safe. It avoids the need for urethral instrumentation for insertion and removal of stents in these small patients.

  15. Implementing New-age Authentication Techniques using OpenID for Security Automation

    OpenAIRE

    Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar

    2010-01-01

    Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...

  16. Simultaneous rotational and vibrational CARS generation through a multiple-frequency combination technique

    International Nuclear Information System (INIS)

    Alden, M.; Bengtsson, P.E.; Edner, H.

    1987-01-01

    One most promising laser technique for probing combustion processes is coherent anti-Stokes Raman scattering (CARS), which due to its coherent nature and signal strength is applied in several real-world applications. Until today almost all CARS experiments are based on probing the population of molecular vibrational energy levels. However, there are several reasons rotational CARS, i.e. probing of rotational energy levels, may provide a complement to or even a better choice than vibrational CARS. Recently an alternative way to produce rotational CARS spectra is proposed, which is based on a multiple-frequency combination technique. The energy-level diagram for this process is presented. Two dye laser beams at ω/sub r/, and one fix frequency laser beam at ω/sub g/ are employed. ω/sub r,1/ and ω/sub r,2/ are two frequencies of many possible pairs with a frequency difference matching a rotational transition in a molecule. The excitation induced by ω/sub r,1/ and ω/sub r,2/ is then scattered by the narrowband ω/sub g/ beam resulting in a CARS beam ω/sub g/ at ω/sub g/ + ω/sub r,1/ - ω/sub r,2/. An interesting feature with this technique is that it is possible to generate simultaneously a rotational and vibrational CARS spectrum by using a double-folded boxcars phase matching approach. The authors believe that the proposed technique for producing rotational and vibration CARS spectra could be of interest, e.g., when measuring in highly turbulent flows. In this case the rotational CARS spectra could use for temperature measurements in the cooler parts, whereas vibrational CARS are to be preferred when measuring in the hotter parts

  17. Effect of beat noise on the performance of two-dimensional time-spreading/wavelength-hopping optical code-division multiple-access systems

    Science.gov (United States)

    Bazan, T.; Harle, D.; Andonovic, I.; Meenakshi, M.

    2005-03-01

    The effect of beat noise on optical code-division multiple-access (OCDMA) systems using a range of two-dimensional (2-D) time-spreading/wavelength-hopping (TW) code families is presented. A derivation of a general formula for the error probability of the system is given. The properties of the 2-D codes--namely, the structure, length, and cross-correlation characteristics--are found to have a great influence on system performance. Improved performance can be obtained by use of real-time dynamic thresholding.

  18. A single-gradient junction technique to replace multiple-junction shifts for craniospinal irradiation treatment

    International Nuclear Information System (INIS)

    Hadley, Austin; Ding, George X.

    2014-01-01

    Craniospinal irradiation (CSI) requires abutting fields at the cervical spine. Junction shifts are conventionally used to prevent setup error–induced overdosage/underdosage from occurring at the same location. This study compared the dosimetric differences at the cranial-spinal junction between a single-gradient junction technique and conventional multiple-junction shifts and evaluated the effect of setup errors on the dose distributions between both techniques for a treatment course and single fraction. Conventionally, 2 lateral brain fields and a posterior spine field(s) are used for CSI with weekly 1-cm junction shifts. We retrospectively replanned 4 CSI patients using a single-gradient junction between the lateral brain fields and the posterior spine field. The fields were extended to allow a minimum 3-cm field overlap. The dose gradient at the junction was achieved using dose painting and intensity-modulated radiation therapy planning. The effect of positioning setup errors on the dose distributions for both techniques was simulated by applying shifts of ± 3 and 5 mm. The resulting cervical spine doses across the field junction for both techniques were calculated and compared. Dose profiles were obtained for both a single fraction and entire treatment course to include the effects of the conventional weekly junction shifts. Compared with the conventional technique, the gradient-dose technique resulted in higher dose uniformity and conformity to the target volumes, lower organ at risk (OAR) mean and maximum doses, and diminished hot spots from systematic positioning errors over the course of treatment. Single-fraction hot and cold spots were improved for the gradient-dose technique. The single-gradient junction technique provides improved conformity, dose uniformity, diminished hot spots, lower OAR mean and maximum dose, and one plan for the entire treatment course, which reduces the potential human error associated with conventional 4-shifted plans

  19. Multiple-Input Multiple-Output OFDM with Index Modulation

    OpenAIRE

    Basar, Ertugrul

    2015-01-01

    Orthogonal frequency division multiplexing with index modulation (OFDM-IM) is a novel multicarrier transmission technique which has been proposed as an alternative to classical OFDM. The main idea of OFDM-IM is the use of the indices of the active subcarriers in an OFDM system as an additional source of information. In this work, we propose multiple-input multiple-output OFDM-IM (MIMO-OFDM-IM) scheme by combining OFDM-IM and MIMO transmission techniques. The low complexity transceiver structu...

  20. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Science.gov (United States)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  1. Non-Imaging Acoustical Properties in Monitoring Arteriovenous Hemodialysis Access. A Review

    Directory of Open Access Journals (Sweden)

    Anas Mohd Noor

    2015-12-01

    Full Text Available The limitations of the gold standard angiography technique in arteriovenous access surveillance have opened a gap for researchers to find the best way to monitor this condition with low-cost, non-invasive and continuous bedside monitoring. The phonoangiography technique has been developed prior to these limits. This measurement and monitoring technique, associated with intelligence signal processing, promises better analysis for early detection of hemodialysis access problems, such as stenosis and thrombosis. Some research groups have shown that the phonoangiography technique could identify as many as 20% of vascular diameter changes and also its frequency characteristics due to hemodialysis access problems. The frequency characteristics of these acoustical signals are presented and discussed in detail to understand the association with the stenosis level, blood flows, sensor locations, fundamental frequency bands of normal and abnormal conditions, and also the spectral energy produced. This promising technique could be used in the near future as a tool for pre-diagnosis of arteriovenous access before any further access correction by surgical techniques is required. This paper provides an extensive review of various arteriovenous access monitoring techniques based on non-imaging acoustical properties.

  2. Performance enhancement of successive interference cancellation scheme based on spectral amplitude coding for optical code-division multiple-access systems using Hadamard codes

    Science.gov (United States)

    Eltaif, Tawfig; Shalaby, Hossam M. H.; Shaari, Sahbudin; Hamarsheh, Mohammad M. N.

    2009-04-01

    A successive interference cancellation scheme is applied to optical code-division multiple-access (OCDMA) systems with spectral amplitude coding (SAC). A detailed analysis of this system, with Hadamard codes used as signature sequences, is presented. The system can easily remove the effect of the strongest signal at each stage of the cancellation process. In addition, simulation of the prose system is performed in order to validate the theoretical results. The system shows a small bit error rate at a large number of active users compared to the SAC OCDMA system. Our results reveal that the proposed system is efficient in eliminating the effect of the multiple-user interference and in the enhancement of the overall performance.

  3. Comparison of EUS-guided rendezvous and precut papillotomy techniques for biliary access (with videos).

    Science.gov (United States)

    Dhir, Vinay; Bhandari, Suryaprakash; Bapat, Mukta; Maydeo, Amit

    2012-02-01

    .4% vs 6.9%, P = .27). Retrospective nonrandomized study design; highly selective patient cohort. In this study, the EUS-guided rendezvous technique was found to be superior to precut papillotomy for single-session biliary access. Prospective randomized trials are needed to confirm these preliminary but promising findings. Copyright © 2012 American Society for Gastrointestinal Endoscopy. Published by Mosby, Inc. All rights reserved.

  4. Performance analysis for a chaos-based code-division multiple access system in wide-band channel

    Directory of Open Access Journals (Sweden)

    Ciprian Doru Giurcăneanu

    2015-08-01

    Full Text Available Code-division multiple access technology is widely used in telecommunications and its performance has been extensively investigated in the past. Theoretical results for the case of wide-band transmission channel were not available until recently. The novel formulae which have been published in 2014 can have an important impact on the future of wireless multiuser communications, but limitations come from the Gaussian approximations used in their derivation. In this Letter, the authors obtain more accurate expressions of the bit error rate (BER for the case when the model of the wide-band channel is two-ray, with Rayleigh fading. In the authors’ approach, the spreading sequences are assumed to be generated by logistic map given by Chebyshev polynomial function of order two. Their theoretical and experimental results show clearly that the previous results on BER, which rely on the crude Gaussian approximation, are over-pessimistic.

  5. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    Science.gov (United States)

    Musick, Charles R [Castro Valley, CA; Critchlow, Terence [Livermore, CA; Ganesh, Madhaven [San Jose, CA; Slezak, Tom [Livermore, CA; Fidelis, Krzysztof [Brentwood, CA

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  6. A design of a wavelength-hopping time-spreading incoherent optical code division multiple access system

    International Nuclear Information System (INIS)

    Glesk, I.; Baby, V.

    2005-01-01

    We present the architecture and code design for a highly scalable, 2.5 Gb/s per user optical code division multiple access (OCDMA) system. The system is scalable to 100 potential and more than 10 simultaneous users, each with a bit error rate (BER) of less than 10 -9 . The system architecture uses a fast wavelength-hopping, time-spreading codes. Unlike frequency and phase sensitive coherent OCDMA systems, this architecture utilizes standard on off keyed optical pulses allocated in the time and wavelength dimensions. This incoherent OCDMA approach is compatible with existing WDM optical networks and utilizes off the shelf components. We discuss the novel optical subsystem design for encoders and decoders that enable the realization of a highly scalable incoherent OCDMA system with rapid reconfigurability. A detailed analysis of the scalability of the two dimensional code is presented and select network deployment architectures for OCDMA are discussed (Authors)

  7. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  8. Non-visual Web Browsing: Beyond Web Accessibility.

    Science.gov (United States)

    Ramakrishnan, I V; Ashok, Vikas; Billah, Syed Masum

    2017-07-01

    People with vision impairments typically use screen readers to browse the Web. To facilitate non-visual browsing, web sites must be made accessible to screen readers, i.e., all the visible elements in the web site must be readable by the screen reader. But even if web sites are accessible, screen-reader users may not find them easy to use and/or easy to navigate. For example, they may not be able to locate the desired information without having to listen to a lot of irrelevant contents. These issues go beyond web accessibility and directly impact web usability. Several techniques have been reported in the accessibility literature for making the Web usable for screen reading. This paper is a review of these techniques. Interestingly, the review reveals that understanding the semantics of the web content is the overarching theme that drives these techniques for improving web usability.

  9. Characterising and modelling regolith stratigraphy using multiple geophysical techniques

    Science.gov (United States)

    Thomas, M.; Cremasco, D.; Fotheringham, T.; Hatch, M. A.; Triantifillis, J.; Wilford, J.

    2013-12-01

    Regolith is the weathered, typically mineral-rich layer from fresh bedrock to land surface. It encompasses soil (A, E and B horizons) that has undergone pedogenesis. Below is the weathered C horizon that retains at least some of the original rocky fabric and structure. At the base of this is the lower regolith boundary of continuous hard bedrock (the R horizon). Regolith may be absent, e.g. at rocky outcrops, or may be many 10's of metres deep. Comparatively little is known about regolith, and critical questions remain regarding composition and characteristics - especially deeper where the challenge of collecting reliable data increases with depth. In Australia research is underway to characterise and map regolith using consistent methods at scales ranging from local (e.g. hillslope) to continental scales. These efforts are driven by many research needs, including Critical Zone modelling and simulation. Pilot research in South Australia using digitally-based environmental correlation techniques modelled the depth to bedrock to 9 m for an upland area of 128 000 ha. One finding was the inability to reliably model local scale depth variations over horizontal distances of 2 - 3 m and vertical distances of 1 - 2 m. The need to better characterise variations in regolith to strengthen models at these fine scales was discussed. Addressing this need, we describe high intensity, ground-based multi-sensor geophysical profiling of three hillslope transects in different regolith-landscape settings to characterise fine resolution (i.e. a number of frequencies; multiple frequency, multiple coil electromagnetic induction; and high resolution resistivity. These were accompanied by georeferenced, closely spaced deep cores to 9 m - or to core refusal. The intact cores were sub-sampled to standard depths and analysed for regolith properties to compile core datasets consisting of: water content; texture; electrical conductivity; and weathered state. After preprocessing (filtering, geo

  10. Modified multiphotodiode balanced detection technique for improving SAC-OCDMA networks

    Science.gov (United States)

    Tseng, Shin-Pin

    2015-06-01

    The aim of this study was to develop a feasible modified multiphotodiode balanced detection (MMBD) technique suitable for application in spectral-amplitude-coding optical code-division multiple-access networks, which could mitigate the effect of phase-induced intensity noise (PIIN). Because PIIN is related to the beating between optical signals with wavelengths arriving simultaneously at a balanced photodetector, combining spectral partitioning and an MMBD scheme facilitates reducing PIIN, which tends to dominate performance. Therefore, the system using the proposed scheme exhibited an enhanced performance.

  11. An Improved Clutter Suppression Method for Weather Radars Using Multiple Pulse Repetition Time Technique

    Directory of Open Access Journals (Sweden)

    Yingjie Yu

    2017-01-01

    Full Text Available This paper describes the implementation of an improved clutter suppression method for the multiple pulse repetition time (PRT technique based on simulated radar data. The suppression method is constructed using maximum likelihood methodology in time domain and is called parametric time domain method (PTDM. The procedure relies on the assumption that precipitation and clutter signal spectra follow a Gaussian functional form. The multiple interleaved pulse repetition frequencies (PRFs that are used in this work are set to four PRFs (952, 833, 667, and 513 Hz. Based on radar simulation, it is shown that the new method can provide accurate retrieval of Doppler velocity even in the case of strong clutter contamination. The obtained velocity is nearly unbiased for all the range of Nyquist velocity interval. Also, the performance of the method is illustrated on simulated radar data for plan position indicator (PPI scan. Compared with staggered 2-PRT transmission schemes with PTDM, the proposed method presents better estimation accuracy under certain clutter situations.

  12. A field comparison of multiple techniques to quantify groundwater - surface-water interactions

    Science.gov (United States)

    González-Pinzón, Ricardo; Ward, Adam S; Hatch, Christine E; Wlostowski, Adam N; Singha, Kamini; Gooseff, Michael N.; Haggerty, Roy; Harvey, Judson; Cirpka, Olaf A; Brock, James T

    2015-01-01

    implementing multiple techniques through collaborative research.

  13. Ultra-processed food product brands on Facebook pages: highly accessed by Brazilians through their marketing techniques.

    Science.gov (United States)

    Horta, Paula M; Rodrigues, Fernanda T; Dos Santos, Luana C

    2018-06-01

    To analyse the content and extent of marketing of ultra-processed food products (UPP) and their brand pages on Facebook, which are highly accessed by Brazilians. Descriptive. Sixteen UPP brand pages on Facebook were selected from 250 pages that were the most liked by Brazilians in October 2015. We analysed the frequency of 'likes' and members 'talking about' each one of the pages, in addition to fifteen marketing techniques used in the previous year (September 2014 to October 2015). The number of posts, likes, 'shares' and 'commentaries', and the mean number of likes, shares and commentaries per post, were collected for one month, from 23 September to 23 October 2015. The two most liked pages were: Coke® (93 673 979 likes) and McDonald's® (59 749 819 likes). Regarding the number of people talking about the pages, McDonald's led with 555 891 commentaries, followed by Coke (287 274), Burger King® (246 148) and Kibon® (244 523). All pages used marketing techniques, which included photos, user conversations, presence of brand elements and links. Videos were observed on 93·8 % of the pages; promotions on 68·8 %; and celebrities on 62·5 %. In one month, Garoto®, Outback® and Coke were brands that published more than one post per day. Kibon achieved the highest ratio of likes per post (285 845·50) and Burger King had the highest mean shares per post (10 083·93), including commentaries per post (7958·13). UPP marketing is extensively used on Facebook pages and is highly accessed by Brazilians, with UPP companies employing a diversity of marketing strategies.

  14. Research on Innovating, Applying Multiple Paths Routing Technique Based on Fuzzy Logic and Genetic Algorithm for Routing Messages in Service - Oriented Routing

    Directory of Open Access Journals (Sweden)

    Nguyen Thanh Long

    2015-02-01

    Full Text Available MANET (short for Mobile Ad-Hoc Network consists of a set of mobile network nodes, network configuration changes very fast. In content based routing, data is transferred from source node to request nodes is not based on destination addresses. Therefore, it is very flexible and reliable, because source node does not need to know destination nodes. If We can find multiple paths that satisfies bandwidth requirement, split the original message into multiple smaller messages to transmit concurrently on these paths. On destination nodes, combine separated messages into the original message. Hence it can utilize better network resources, causes data transfer rate to be higher, load balancing, failover. Service Oriented Routing is inherited from the model of content based routing (CBR, combined with several advanced techniques such as Multicast, multiple path routing, Genetic algorithm to increase the data rate, and data encryption to ensure information security. Fuzzy logic is a logical field study evaluating the accuracy of the results based on the approximation of the components involved, make decisions based on many factors relative accuracy based on experimental or mathematical proof. This article presents some techniques to support multiple path routing from one network node to a set of nodes with guaranteed quality of service. By using these techniques can decrease the network load, congestion, use network resources efficiently.

  15. Multiple-Choice Testing Using Immediate Feedback--Assessment Technique (IF AT®) Forms: Second-Chance Guessing vs. Second-Chance Learning?

    Science.gov (United States)

    Merrel, Jeremy D.; Cirillo, Pier F.; Schwartz, Pauline M.; Webb, Jeffrey A.

    2015-01-01

    Multiple choice testing is a common but often ineffective method for evaluating learning. A newer approach, however, using Immediate Feedback Assessment Technique (IF AT®, Epstein Educational Enterprise, Inc.) forms, offers several advantages. In particular, a student learns immediately if his or her answer is correct and, in the case of an…

  16. A Technique for Estimating Intensity of Emotional Expressions and Speaking Styles in Speech Based on Multiple-Regression HSMM

    Science.gov (United States)

    Nose, Takashi; Kobayashi, Takao

    In this paper, we propose a technique for estimating the degree or intensity of emotional expressions and speaking styles appearing in speech. The key idea is based on a style control technique for speech synthesis using a multiple regression hidden semi-Markov model (MRHSMM), and the proposed technique can be viewed as the inverse of the style control. In the proposed technique, the acoustic features of spectrum, power, fundamental frequency, and duration are simultaneously modeled using the MRHSMM. We derive an algorithm for estimating explanatory variables of the MRHSMM, each of which represents the degree or intensity of emotional expressions and speaking styles appearing in acoustic features of speech, based on a maximum likelihood criterion. We show experimental results to demonstrate the ability of the proposed technique using two types of speech data, simulated emotional speech and spontaneous speech with different speaking styles. It is found that the estimated values have correlation with human perception.

  17. An orthogonal wavelet division multiple-access processor architecture for LTE-advanced wireless/radio-over-fiber systems over heterogeneous networks

    Science.gov (United States)

    Mahapatra, Chinmaya; Leung, Victor CM; Stouraitis, Thanos

    2014-12-01

    The increase in internet traffic, number of users, and availability of mobile devices poses a challenge to wireless technologies. In long-term evolution (LTE) advanced system, heterogeneous networks (HetNet) using centralized coordinated multipoint (CoMP) transmitting radio over optical fibers (LTE A-ROF) have provided a feasible way of satisfying user demands. In this paper, an orthogonal wavelet division multiple-access (OWDMA) processor architecture is proposed, which is shown to be better suited to LTE advanced systems as compared to orthogonal frequency division multiple access (OFDMA) as in LTE systems 3GPP rel.8 (3GPP, http://www.3gpp.org/DynaReport/36300.htm). ROF systems are a viable alternative to satisfy large data demands; hence, the performance in ROF systems is also evaluated. To validate the architecture, the circuit is designed and synthesized on a Xilinx vertex-6 field-programmable gate array (FPGA). The synthesis results show that the circuit performs with a clock period as short as 7.036 ns (i.e., a maximum clock frequency of 142.13 MHz) for transform size of 512. A pipelined version of the architecture reduces the power consumption by approximately 89%. We compare our architecture with similar available architectures for resource utilization and timing and provide performance comparison with OFDMA systems for various quality metrics of communication systems. The OWDMA architecture is found to perform better than OFDMA for bit error rate (BER) performance versus signal-to-noise ratio (SNR) in wireless channel as well as ROF media. It also gives higher throughput and mitigates the bad effect of peak-to-average-power ratio (PAPR).

  18. Opportunistic spectrum access in cognitive radio based on channel switching

    KAUST Repository

    Gaaloul, Fakhreddine; Yang, Hongchuan; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    This paper investigates the performance of a cognitive radio transceiver that can monitor multiple channels and opportunistically use any one of them should it be available. In our work, we propose and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. Two switching strategies, namely the switch and examine and the switch and stay strategies, are proposed. For these proposed access schemes, we investigate their performance by deriving the analytical expression of the novel metric of the average access duration and the average waiting time and based on these two metrics a time average SU throughput formula is proposed to predict the performance of the secondary cognitive system. © 2012 ICST.

  19. Reduced feedback selective cluster index scheduling with user pre-selection for next-generation multi-input multi-output orthogonal frequency division multiple access system

    OpenAIRE

    Nicolaou, M; Doufexi, A; Armour, SMD; Sun, Y

    2011-01-01

    The joint use of opportunistic scheduling and orthogonal frequency division multiple access (OFDMA) provide significant gains in environments of low mobility and scatter for which channel variations are low. The downside of opportunistic scheduling in multicarrier systems such as OFDMA, lies in the substantial uplink overhead required to feed back by the mobile stations (MSs) describing users' instantaneous link conditions. This study presents a novel approach towards multicarrier opportunist...

  20. Self-taught axillary vein access without venography for pacemaker implantation: prospective randomized comparison with the cephalic vein access.

    Science.gov (United States)

    Squara, Fabien; Tomi, Julien; Scarlatti, Didier; Theodore, Guillaume; Moceri, Pamela; Ferrari, Emile

    2017-12-01

    Axillary vein access for pacemaker implantation is uncommon in many centres because of the lack of training in this technique. We assessed whether the introduction of the axillary vein technique was safe and efficient as compared with cephalic vein access, in a centre where no operators had any previous experience in axillary vein puncture. Patients undergoing pacemaker implantation were randomized to axillary or cephalic vein access. All three operators had no experience nor training in axillary vein puncture, and self-learned the technique by reading a published review. Axillary vein puncture was fluoroscopy-guided without contrast venography. Cephalic access was performed by dissection of delto-pectoral groove. Venous access success, venous access duration (from skin incision to guidewire or lead in superior vena cava), procedure duration, X-ray exposure, and peri-procedural (1 month) complications were recorded. results We randomized 74 consecutive patients to axillary (n = 37) or cephalic vein access (n = 37). Axillary vein was successfully accessed in 30/37 (81.1%) patients vs. 28/37 (75.7%) of cephalic veins (P = 0.57). Venous access time was shorter in axillary group than in cephalic group [5.7 (4.4-8.3) vs. 12.2 (10.5-14.8) min, P < 0.001], as well as procedure duration [34.8 (30.6-38.4) vs. 42.0 (39.1-46.6) min, P = 0.043]. X-ray exposure and peri-procedural overall complications were comparable in both groups. Axillary puncture was safe and faster than cephalic access even for the five first procedures performed by each operator. Self-taught axillary vein puncture for pacemaker implantation seems immediately safe and faster than cephalic vein access, when performed by electrophysiologists trained to pacemaker implantation but not to axillary vein puncture. Published on behalf of the European Society of Cardiology. All rights reserved. © The Author 2017. For Permissions, please email: journals.permissions@oup.com.

  1. Application of Soft Computing Techniques and Multiple Regression Models for CBR prediction of Soils

    Directory of Open Access Journals (Sweden)

    Fatimah Khaleel Ibrahim

    2017-08-01

    Full Text Available The techniques of soft computing technique such as Artificial Neutral Network (ANN have improved the predicting capability and have actually discovered application in Geotechnical engineering. The aim of this research is to utilize the soft computing technique and Multiple Regression Models (MLR for forecasting the California bearing ratio CBR( of soil from its index properties. The indicator of CBR for soil could be predicted from various soils characterizing parameters with the assist of MLR and ANN methods. The data base that collected from the laboratory by conducting tests on 86 soil samples that gathered from different projects in Basrah districts. Data gained from the experimental result were used in the regression models and soft computing techniques by using artificial neural network. The liquid limit, plastic index , modified compaction test and the CBR test have been determined. In this work, different ANN and MLR models were formulated with the different collection of inputs to be able to recognize their significance in the prediction of CBR. The strengths of the models that were developed been examined in terms of regression coefficient (R2, relative error (RE% and mean square error (MSE values. From the results of this paper, it absolutely was noticed that all the proposed ANN models perform better than that of MLR model. In a specific ANN model with all input parameters reveals better outcomes than other ANN models.

  2. An application of the edge effect in measuring accessibility to multiple food retailer types in Southwestern Ontario, Canada

    Science.gov (United States)

    2011-01-01

    Background Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS) to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores), both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Results Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. Conclusion By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the actual distance necessary to

  3. An application of the edge effect in measuring accessibility to multiple food retailer types in southwestern Ontario, Canada.

    Science.gov (United States)

    Sadler, Richard C; Gilliland, Jason A; Arku, Godwin

    2011-05-15

    Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS) to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores), both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the actual distance necessary to travel for food. Research on

  4. An application of the edge effect in measuring accessibility to multiple food retailer types in Southwestern Ontario, Canada

    Directory of Open Access Journals (Sweden)

    Arku Godwin

    2011-05-01

    Full Text Available Abstract Background Trends in food retailing associated with the consolidation of smaller-format retailers into fewer, larger-format supercentres have left some rural areas with fewer sources of nutritious, affordable food. Access to nutritious, affordable food is essential for good dietary habits and combating health issues such as type-2 diabetes, obesity, and cardiovascular disease. Many studies on food environments use inaccurate or incomplete methods for locating food retailers, which may be responsible for mischaracterising food deserts. This study uses databases of every residence in and every food retailer in and around Middlesex County, Ontario, Canada. Residences were geocoded to their precise address, and network analysis techniques were performed in a geographic information system (GIS to determine distances between every residence and different types of food retailers (grocery stores, fast food, fruit and vegetable sources, grocery stores plus fruit and vegetable sources, variety stores, both when considering and neglecting facilities outside the area of study, to account for a deficiency in analysis termed the 'edge effect'. Results Analysis of household accessibility to food outlets by neighbourhood socioeconomic distress level indicated that residents in the most distressed neighbourhoods tended to have better accessibility to all types of food retailers. In the most distressed neighbourhoods, 79 percent of residences were within walking distance of a grocery store, compared to only 10 percent in the least distressed neighbourhoods. When the edge effect was neglected, 37 percent of distance estimates proved inaccurate. Average accessibility to all food retailer types improved dramatically when food outlets adjacent to the study area were considered, thereby controlling for the edge effect. Conclusion By neglecting to consider food retailers just outside study area boundaries, previous studies may significantly over-report the

  5. Radiation scattering techniques

    International Nuclear Information System (INIS)

    Edmonds, E.A.

    1986-01-01

    Radiation backscattering techniques are useful when access to an item to be inspected is restricted to one side. These techniques are very sensitive to geometrical effects. Scattering processes and their application to the determination of voids, thickness measuring, well-logging and the use of x-ray fluorescence techniques are discussed. (U.K.)

  6. Optical orthogonal code-division multiple-access system - Part 2: Multibits/sequence-period OOCDMA

    Science.gov (United States)

    Kwon, Hyuck M.

    1994-08-01

    In a recently proposed optical orthogonal code division multiple-access (OOCDMA) system, one bit of user's data is transmitted per sequence-period, and a threshold is employed for the final bit decision. In this paper, a system that can transmit multibits per sequence-period is introduced, and avalanche photodiode (APD) noise, thermal noise, and interference, are included. This system, derived by exploiting orthogonal properties of the OOCDMA code sequence and using a maximum search (instead of a threshold) in the final decision, is log(sub 2) F times higher in throughput, where F is sequence-period. For example, four orders of magnitude are better in bit error probability at - 56 dBW received laser power, with F = 1000 chips, 10 'marks' in a sequence, and 10 users of 30 Mb/s data rate for one-bit/sequence-period and 270 Mb/s data rate for multibits/sequence-period system. Furthermore, an exact analysis is performed for the log(sub 2)F bits/sequence-period system with a hard-limiter placed before the receiver, and its performance is compared to the performance without hard-limiter, for the chip-synchronous case. The improvement from using a hard-limiter is significant in the log(sub 2)F bits/sequence-period OCCDMA system.

  7. Performance Analysis of SAC Optical PPM-CDMA System-Based Interference Rejection Technique

    Science.gov (United States)

    Alsowaidi, N.; Eltaif, Tawfig; Mokhtar, M. R.

    2016-03-01

    In this paper, we aim to theoretically analyse optical code division multiple access (OCDMA) system that based on successive interference cancellation (SIC) using pulse position modulation (PPM), considering the interference between the users, imperfection cancellation occurred during the cancellation process and receiver noises. Spectral amplitude coding (SAC) scheme is used to suppress the overlapping between the users and reduce the receiver noises effect. The theoretical analysis of the multiple access interference (MAI)-limited performance of this approach indicates the influence of the size of M-ary PPM on OCDMA system. The OCDMA system performance improves with increasing M-ary PPM. Therefore, it was found that the SIC/SAC-OCDMA system using PPM technique along with modified prime (MPR) codes used as signature sequence code offers significant improvement over the one without cancellation and it can support up to 103 users at the benchmarking value of bit error rate (BER) = 10-9 with prime number p = 11 while the system without cancellation scheme can support only up to 52 users.

  8. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  9. Unbundling in Current Broadband and Next-Generation Ultra-Broadband Access Networks

    Science.gov (United States)

    Gaudino, Roberto; Giuliano, Romeo; Mazzenga, Franco; Valcarenghi, Luca; Vatalaro, Francesco

    2014-05-01

    This article overviews the methods that are currently under investigation for implementing multi-operator open-access/shared-access techniques in next-generation access ultra-broadband architectures, starting from the traditional "unbundling-of-the-local-loop" techniques implemented in legacy twisted-pair digital subscriber line access networks. A straightforward replication of these copper-based unbundling-of-the-local-loop techniques is usually not feasible on next-generation access networks, including fiber-to-the-home point-to-multipoint passive optical networks. To investigate this issue, the article first gives a concise description of traditional copper-based unbundling-of-the-local-loop solutions, then focalizes on both next-generation access hybrid fiber-copper digital subscriber line fiber-to-the-cabinet scenarios and on fiber to the home by accounting for the mix of regulatory and technological reasons driving the next-generation access migration path, focusing mostly on the European situation.

  10. A Robust Parametric Technique for Multipath Channel Estimation in the Uplink of a DS-CDMA System

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available The problem of estimating the multipath channel parameters of a new user entering the uplink of an asynchronous direct sequence-code division multiple access (DS-CDMA system is addressed. The problem is described via a least squares (LS cost function with a rich structure. This cost function, which is nonlinear with respect to the time delays and linear with respect to the gains of the multipath channel, is proved to be approximately decoupled in terms of the path delays. Due to this structure, an iterative procedure of 1D searches is adequate for time delays estimation. The resulting method is computationally efficient, does not require any specific pilot signal, and performs well for a small number of training symbols. Simulation results show that the proposed technique offers a better estimation accuracy compared to existing related methods, and is robust to multiple access interference.

  11. Statistical Analysis of Coherent Ultrashort Light Pulse CDMA With Multiple Optical Amplifiers Using Additive Noise Model

    Science.gov (United States)

    Jamshidi, Kambiz; Salehi, Jawad A.

    2005-05-01

    This paper describes a study of the performance of various configurations for placing multiple optical amplifiers in a typical coherent ultrashort light pulse code-division multiple access (CULP-CDMA) communication system using the additive noise model. For this study, a comprehensive performance analysis was developed that takes into account multiple-access noise, noise due to optical amplifiers, and thermal noise using the saddle-point approximation technique. Prior to obtaining the overall system performance, the input/output statistical models for different elements of the system such as encoders/decoders,star coupler, and optical amplifiers were obtained. Performance comparisons between an ideal and lossless quantum-limited case and a typical CULP-CDMA with various losses exhibit more than 30 dB more power requirement to obtain the same bit-error rate (BER). Considering the saturation effect of optical amplifiers, this paper discusses an algorithm for amplifiers' gain setting in various stages of the network in order to overcome the nonlinear effects on signal modulation in optical amplifiers. Finally, using this algorithm,various configurations of multiple optical amplifiers in CULP-CDMA are discussed and the rules for the required optimum number of amplifiers are shown with their corresponding optimum locations to be implemented along the CULP-CDMA system.

  12. Digital signal processing for wireless communication using Matlab

    CERN Document Server

    Gopi, E S

    2016-01-01

    This book examines signal processing techniques used in wireless communication illustrated by using the Matlab program. The author discusses these techniques as they relate to Doppler spread; delay spread; Rayleigh and Rician channel modeling; rake receiver; diversity techniques; MIMO and OFDM -based transmission techniques; and array signal processing. Related topics such as detection theory, link budget, multiple access techniques, and spread spectrum are also covered.   ·         Illustrates signal processing techniques involved in wireless communication using Matlab ·         Discusses multiple access techniques such as Frequency division multiple access, Time division multiple access, and Code division multiple access ·         Covers band pass modulation techniques such as Binary phase shift keying, Differential phase shift keying, Quadrature phase shift keying, Binary frequency shift keying, Minimum shift keying, and Gaussian minimum shift keying.

  13. Geomorphological and Geoelectric Techniques for Kwoi's Multiple Tremor Assessment

    Science.gov (United States)

    Dikedi, P. N.

    2017-12-01

    This work epicentres on geomorphological and geoelectric techniques for multiple tremor assessment in Kwoi, Nigeria. Earth tremor occurrences have been noted by Akpan and Yakubu (2010) within the last 70 years, in nine regions in Nigeria; on September 11,12,20,22, 23 and 24, 2016, additional earth tremors rocked the village of Kwoi eleven times. Houses cracked and collapsed, a rock split and slid and smoke evolved at N9027''5.909''', E800'44.951'', from an altitude of 798m. By employing the Ohmega Meter and Schlumberger configuration, four VES points are sounded for subsurface structure characterisation. Thereafter, a cylindrical steel ring is hammered into the ground at the first point (VES 1) and earth samples are scooped from this location; this procedure is repeated for other points (VES 2, 3 and 4). Winresist, Geo-earth, and Surfer version 12.0.626 software are employed to generate geo-sections, lithology, resistivity profile, Iso resistivity and Isopach maps, of the region. Outcome of results reveal some lithological formations of lateritic topsoil, fractured basement and fresh basement; additionally, results reveal 206.6m, 90.7m, 73.2m and 99.4m fractured basement thicknesses for four points. Scooped samples are transferred to the specimen stage of a Scanning Electron Microscope (SEM). SEM images show rounded inter-granular boundaries—the granular structures act like micro-wheels making the upper crustal mass susceptible to movement at the slightest vibration. Collapsed buildings are sited around VES1 location; samples from VES 1 are the most well fragmented sample owing to multiple microfractures—this result explains why VES 1 has the thickest fractured basement. Abrupt frictional sliding occurs between networks of fault lines; there is a likelihood that friction is most intense at the rock slide site on N9027'21.516'' and E800'44.9993'', VES 1 at N9027'5.819'' and E8005'3.1120'' and smoke sites—holo-centres are suspected below these locations. The

  14. Laboratory model study of newly deposited dredger fills using improved multiple-vacuum preloading technique

    Directory of Open Access Journals (Sweden)

    Jingjin Liu

    2017-10-01

    Full Text Available Problems continue to be encountered concerning the traditional vacuum preloading method in field during the treatment of newly deposited dredger fills. In this paper, an improved multiple-vacuum preloading method was developed to consolidate newly dredger fills that are hydraulically placed in seawater for land reclamation in Lingang Industrial Zone of Tianjin City, China. With this multiple-vacuum preloading method, the newly deposited dredger fills could be treated effectively by adopting a novel moisture separator and a rapid improvement technique without sand cushion. A series of model tests was conducted in the laboratory for comparing the results from the multiple-vacuum preloading method and the traditional one. Ten piezometers and settlement plates were installed to measure the variations in excess pore water pressures and moisture content, and vane shear strength was measured at different positions. The testing results indicate that water discharge–time curves obtained by the traditional vacuum preloading method can be divided into three phases: rapid growth phase, slow growth phase, and steady phase. According to the process of fluid flow concentrated along tiny ripples and building of larger channels inside soils during the whole vacuum loading process, the fluctuations of pore water pressure during each loading step are divided into three phases: steady phase, rapid dissipation phase, and slow dissipation phase. An optimal loading pattern which could have a best treatment effect was proposed for calculating the water discharge and pore water pressure of soil using the improved multiple-vacuum preloading method. For the newly deposited dredger fills at Lingang Industrial Zone of Tianjin City, the best loading step was 20 kPa and the loading of 40–50 kPa produced the highest drainage consolidation. The measured moisture content and vane shear strength were discussed in terms of the effect of reinforcement, both of which indicate

  15. A Simple, Safe Technique for Thorough Seroma Evacuation in the Outpatient Setting

    Directory of Open Access Journals (Sweden)

    Julie E. Park, MD, FACS

    2014-09-01

    Full Text Available Summary: Seroma formation, a common postoperative complication in reconstructive cases, can lead to capsular contracture and increased office visits and expenses. The authors present a safe, novel technique for ensuring the thorough removal of serous fluid in the outpatient setting. By relying on access with an angiocatheter, potential injury to permanent implants is minimized. The use of low continuous wall suction obviates the need of manual suction via multiple syringes and offers a rapid and thorough evacuation of all types of seromas.

  16. The new technique of using the epigastric arteries in renal transplantation with multiple renal arteries

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Amirzargar

    2013-01-01

    Full Text Available The most common anatomic variant seen in the donor kidneys for renal transplantation is multiple renal arteries (MRA, which can cause an increased risk of complications. We describe the long-term outcomes of 16 years of experience in 76 kidney transplantations with MRAs. In a new reconstruction technique, we remove arterial clamps after anastomosing the donor to the recipient′s main renal vessels, which cause backflow from accessory arteries to prevent thrombosis. By this technique, we reduce the ischemic times as well as the operating times. Both in live or cadaver donor kidneys, lower polar arteries were anastomosed to the inferior epigastric artery and upper polar arteries were anastomosed to the superior epigastric arteries. Injection of Papaverine and ablation of sympathic nerves of these arteries dilate and prevent them from post-operative spasm. Follow-up DTPA renal scan in all patients showed good perfusion and function of the transplanted kidney, except two cases of polar arterial thrombosis. Mean creatinine levels during at least two years of follow-up remained acceptable. Patient and graft survival were excellent. No cases of ATN, hypertension, rejection and urologic complications were found. In conclusion, this technique can be safely and successfully utilized for renal transplantation with kidneys having MRAs, and may be associated with a lower complication rate and better graft function compared with the existing techniques.

  17. Central Venous Access

    International Nuclear Information System (INIS)

    Ganeshan, Arul; Warakaulle, Dinuke R.; Uberoi, Raman

    2007-01-01

    Central venous access plays an important role in the management of an ever-increasing population of patients ranging from those that are critically ill to patients with difficult clinical access. Interventional radiologists are key in delivering this service and should be familiar with the wide range of techniques and catheters now available to them. A comprehensive description of these catheters with regard to indications, technical aspects of catheterization, success rates, and associated early and late complications, as well as a review of various published guidelines on central venous catheter insertion are given in this article

  18. Adaptive algebraic reconstruction technique

    International Nuclear Information System (INIS)

    Lu Wenkai; Yin Fangfang

    2004-01-01

    Algebraic reconstruction techniques (ART) are iterative procedures for reconstructing objects from their projections. It is proven that ART can be computationally efficient by carefully arranging the order in which the collected data are accessed during the reconstruction procedure and adaptively adjusting the relaxation parameters. In this paper, an adaptive algebraic reconstruction technique (AART), which adopts the same projection access scheme in multilevel scheme algebraic reconstruction technique (MLS-ART), is proposed. By introducing adaptive adjustment of the relaxation parameters during the reconstruction procedure, one-iteration AART can produce reconstructions with better quality, in comparison with one-iteration MLS-ART. Furthermore, AART outperforms MLS-ART with improved computational efficiency

  19. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    Energy Technology Data Exchange (ETDEWEB)

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors

  20. Tunable optical frequency comb enabled scalable and cost-effective multiuser orthogonal frequency-division multiple access passive optical network with source-free optical network units.

    Science.gov (United States)

    Chen, Chen; Zhang, Chongfu; Liu, Deming; Qiu, Kun; Liu, Shuang

    2012-10-01

    We propose and experimentally demonstrate a multiuser orthogonal frequency-division multiple access passive optical network (OFDMA-PON) with source-free optical network units (ONUs), enabled by tunable optical frequency comb generation technology. By cascading a phase modulator (PM) and an intensity modulator and dynamically controlling the peak-to-peak voltage of a PM driven signal, a tunable optical frequency comb source can be generated. It is utilized to assist the configuration of a multiple source-free ONUs enhanced OFDMA-PON where simultaneous and interference-free multiuser upstream transmission over a single wavelength can be efficiently supported. The proposed multiuser OFDMA-PON is scalable and cost effective, and its feasibility is successfully verified by experiment.

  1. Case studies of natural resource access in Jharkhand, India

    DEFF Research Database (Denmark)

    Sareen, Siddharth

    This policy brief illustrates that decentralisation can only effectively support residents’ access to natural resources if it both resolves policy overlaps at multiple levels to bring about inclusive and equitable access and aligns policies with ground realities for specific natural resources....

  2. Impact of airway gas exchange on the multiple inert gas elimination technique: theory.

    Science.gov (United States)

    Anderson, Joseph C; Hlastala, Michael P

    2010-03-01

    The multiple inert gas elimination technique (MIGET) provides a method for estimating alveolar gas exchange efficiency. Six soluble inert gases are infused into a peripheral vein. Measurements of these gases in breath, arterial blood, and venous blood are interpreted using a mathematical model of alveolar gas exchange (MIGET model) that neglects airway gas exchange. A mathematical model describing airway and alveolar gas exchange predicts that two of these gases, ether and acetone, exchange primarily within the airways. To determine the effect of airway gas exchange on the MIGET, we selected two additional gases, toluene and m-dichlorobenzene, that have the same blood solubility as ether and acetone and minimize airway gas exchange via their low water solubility. The airway-alveolar gas exchange model simulated the exchange of toluene, m-dichlorobenzene, and the six MIGET gases under multiple conditions of alveolar ventilation-to-perfusion, VA/Q, heterogeneity. We increased the importance of airway gas exchange by changing bronchial blood flow, Qbr. From these simulations, we calculated the excretion and retention of the eight inert gases and divided the results into two groups: (1) the standard MIGET gases which included acetone and ether and (2) the modified MIGET gases which included toluene and m-dichlorobenzene. The MIGET mathematical model predicted distributions of ventilation and perfusion for each grouping of gases and multiple perturbations of VA/Q and Qbr. Using the modified MIGET gases, MIGET predicted a smaller dead space fraction, greater mean VA, greater log(SDVA), and more closely matched the imposed VA distribution than that using the standard MIGET gases. Perfusion distributions were relatively unaffected.

  3. GEOM/GEOM[a]/1/ queue with late arrival system with delayed access and delayed multiple working vacations

    Directory of Open Access Journals (Sweden)

    Cheng Jiang

    2014-01-01

    Full Text Available This paper considers a discrete-time bulk-service queue with infinite buffer space and delay multiple working vacations. Considering a late arrival system with delayed access (LAS-AD, it is assumed that the inter-arrival times, service times, vacation times are all geometrically distributed. The server does not take a vacation immediately at service complete epoch but keeps idle period. According to a bulk-service rule, at least one customer is needed to start a service with a maximum serving capacity 'a'. Using probability analysis method and displacement operator method, the queue length and the probability generating function of waiting time at pre-arrival epochs are obtained. Furthermore, the outside observer’s observation epoch queue length distributions are given. Finally, computational examples with numerical results in the form of graphs and tables are discussed.

  4. Cluster analysis technique for assessing variability in cowpea (Vigna unguiculata L. Walp accessions from Nigeria

    Directory of Open Access Journals (Sweden)

    Ajayi Abiola Toyin

    2013-01-01

    Full Text Available The genetic variability among 10 accessions of cowpea, Vigna unguiculata (L. Walp was studied by the use of 13 qualitative and 13 quantitative traits. From the results on qualitative traits, dendrogram grouped the 10 accessions into two major clusters, 1 and 2.Cluster 1 had 3 accessions and cluster 2 had 2 sub-clusters (I and II, having 2 accessions in sub-cluster I and 5 accessions in sub-cluster II. The dendrogram revealed two major clusters, 1 and 2, for quantitative data, for the 10 accessions. At distance of 4 and 6, cluster 1 had two sub-clusters (I and II, with sub-cluster I having 5 accessions, sub-cluster II having 4 accessions while cluster 2 had only 1 accession. This study made the observation that identification of the right agro-morphological traits of high discriminating capacity is essential, before embarking on any genetic diversity; as it was revealed that some traits discriminated more efficiently among the accessions than others. A group of accessions, which are NGSA1, NGSA2, NGSA3, NGSA4, NGSA7, NGSA9 and NGSA10, was identified as being different from the others for number of seeds per pod, pod length, plant height, peduncle length, seed weight and number of pods per plant. These accessions may be good for cowpea improvement programs.

  5. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  6. "Open Access" Requires Clarification: Medical Journal Publication Models Evolve.

    Science.gov (United States)

    Lubowitz, James H; Brand, Jefferson C; Rossi, Michael J; Provencher, Matthew T

    2017-03-01

    While Arthroscopy journal is a traditional subscription model journal, our companion journal Arthroscopy Techniques is "open access." We used to believe open access simply meant online and free of charge. However, while open-access journals are free to readers, in 2017 authors must make a greater sacrifice in the form of an article-processing charge (APC). Again, while this does not apply to Arthroscopy, the APC will apply to Arthroscopy Techniques. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  7. Improving Conductivity Image Quality Using Block Matrix-based Multiple Regularization (BMMR Technique in EIT: A Simulation Study

    Directory of Open Access Journals (Sweden)

    Tushar Kanti Bera

    2011-06-01

    Full Text Available A Block Matrix based Multiple Regularization (BMMR technique is proposed for improving conductivity image quality in EIT. The response matrix (JTJ has been partitioned into several sub-block matrices and the highest eigenvalue of each sub-block matrices has been chosen as regularization parameter for the nodes contained by that sub-block. Simulated boundary data are generated for circular domain with circular inhomogeneity and the conductivity images are reconstructed in a Model Based Iterative Image Reconstruction (MoBIIR algorithm. Conductivity images are reconstructed with BMMR technique and the results are compared with the Single-step Tikhonov Regularization (STR and modified Levenberg-Marquardt Regularization (LMR methods. It is observed that the BMMR technique reduces the projection error and solution error and improves the conductivity reconstruction in EIT. Result show that the BMMR method also improves the image contrast and inhomogeneity conductivity profile and hence the reconstructed image quality is enhanced. ;doi:10.5617/jeb.170 J Electr Bioimp, vol. 2, pp. 33-47, 2011

  8. American Thyroid Association Statement on Remote-Access Thyroid Surgery.

    Science.gov (United States)

    Berber, Eren; Bernet, Victor; Fahey, Thomas J; Kebebew, Electron; Shaha, Ashok; Stack, Brendan C; Stang, Michael; Steward, David L; Terris, David J

    2016-03-01

    Remote-access techniques have been described over the recent years as a method of removing the thyroid gland without an incision in the neck. However, there is confusion related to the number of techniques available and the ideal patient selection criteria for a given technique. The aims of this review were to develop a simple classification of these approaches, describe the optimal patient selection criteria, evaluate the outcomes objectively, and define the barriers to adoption. A review of the literature was performed to identify the described techniques. A simple classification was developed. Technical details, outcomes, and the learning curve were described. Expert opinion consensus was formulated regarding recommendations for patient selection and performance of remote-access thyroid surgery. Remote-access thyroid procedures can be categorized into endoscopic or robotic breast, bilateral axillo-breast, axillary, and facelift approaches. The experience in the United States involves the latter two techniques. The limited data in the literature suggest long operative times, a steep learning curve, and higher costs with remote-access thyroid surgery compared with conventional thyroidectomy. Nevertheless, a consensus was reached that, in appropriate hands, it can be a viable option for patients with unilateral small nodules who wish to avoid a neck incision. Remote-access thyroidectomy has a role in a small group of patients who fit strict selection criteria. These approaches require an additional level of expertise, and therefore should be done by surgeons performing a high volume of thyroid and robotic surgery.

  9. Reconstruction of elongated bubbles fusing the information from multiple optical probes through a Bayesian inference technique

    Energy Technology Data Exchange (ETDEWEB)

    Chakraborty, Shubhankar; Das, Prasanta Kr., E-mail: pkd@mech.iitkgp.ernet.in [Department of Mechanical Engineering, Indian Institute of Technology Kharagpur, Kharagpur 721302 (India); Roy Chaudhuri, Partha [Department of Physics, Indian Institute of Technology Kharagpur, Kharagpur 721302 (India)

    2016-07-15

    In this communication, a novel optical technique has been proposed for the reconstruction of the shape of a Taylor bubble using measurements from multiple arrays of optical sensors. The deviation of an optical beam passing through the bubble depends on the contour of bubble surface. A theoretical model of the deviation of a beam during the traverse of a Taylor bubble through it has been developed. Using this model and the time history of the deviation captured by the sensor array, the bubble shape has been reconstructed. The reconstruction has been performed using an inverse algorithm based on Bayesian inference technique and Markov chain Monte Carlo sampling algorithm. The reconstructed nose shape has been compared with the true shape, extracted through image processing of high speed images. Finally, an error analysis has been performed to pinpoint the sources of the errors.

  10. Probabilistic images (PBIS): A concise image representation technique for multiple parameters

    International Nuclear Information System (INIS)

    Wu, L.C.; Yeh, S.H.; Chen, Z.; Liu, R.S.

    1984-01-01

    Based on m parametric images (PIs) derived from a dynamic series (DS), each pixel of DS is regarded as an m-dimensional vector. Given one set of normal samples (pixels) N and another of abnormal samples A, probability density functions (pdfs) of both sets are estimated. Any unknown sample is classified into N or A by calculating the probability of its being in the abnormal set using the Bayes' theorem. Instead of estimating the multivariate pdfs, a distance ratio transformation is introduced to map the m-dimensional sample space to one dimensional Euclidean space. Consequently, the image that localizes the regional abnormalities is characterized by the probability of being abnormal. This leads to the new representation scheme of PBIs. Tc-99m HIDA study for detecting intrahepatic lithiasis (IL) was chosen as an example of constructing PBI from 3 parameters derived from DS and such a PBI was compared with those 3 PIs, namely, retention ratio image (RRI), peak time image (TNMAX) and excretion mean transit time image (EMTT). 32 normal subjects and 20 patients with proved IL were collected and analyzed. The resultant sensitivity and specificity of PBI were 97% and 98% respectively. They were superior to those of any of the 3 PIs: RRI (94/97), TMAX (86/88) and EMTT (94/97). Furthermore, the contrast of PBI was much better than that of any other image. This new image formation technique, based on multiple parameters, shows the functional abnormalities in a structural way. Its good contrast makes the interpretation easy. This technique is powerful compared to the existing parametric image method

  11. Neutron Multiplicity Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Frame, Katherine Chiyoko [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-06-28

    Neutron multiplicity measurements are widely used for nondestructive assay (NDA) of special nuclear material (SNM). When combined with isotopic composition information, neutron multiplicity analysis can be used to estimate the spontaneous fission rate and leakage multiplication of SNM. When combined with isotopic information, the total mass of fissile material can also be determined. This presentation provides an overview of this technique.

  12. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  13. Event Streams Clustering Using Machine Learning Techniques

    Directory of Open Access Journals (Sweden)

    Hanen Bouali

    2015-10-01

    Full Text Available Data streams are usually of unbounded lengths which push users to consider only recent observations by focusing on a time window, and ignore past data. However, in many real world applications, past data must be taken in consideration to guarantee the efficiency, the performance of decision making and to handle data streams evolution over time. In order to build a selectively history to track the underlying event streams changes, we opt for the continuously data of the sliding window which increases the time window based on changes over historical data. In this paper, to have the ability to access to historical data without requiring any significant storage or multiple passes over the data. In this paper, we propose a new algorithm for clustering multiple data streams using incremental support vector machine and data representative points’ technique. The algorithm uses a sliding window model for the most recent clustering results and data representative points to model the old data clustering results. Our experimental results on electromyography signal show a better clustering than other present in the literature

  14. PENERAPAN MULTIPLE INTELEGENSI DALAM KEGIATAN BELAJAR-MENGAJAR

    OpenAIRE

    Nur Samsiyah

    2016-01-01

    Multiple intelegence is integrated inteligence possessed by anyone. Intelligence has been difined as the composition of ability and skill. Multiple intelligence consists of nine types of intelligence, i.e. linguistic, logic-mathematic, spatial, musical, kinesthetic, interpersonal, intrapersonal, naturalistic and extencial intelligence, each of which has its own characteristics. Multiple intelligence learning strategy empowers students to access information through intelligence that they do ha...

  15. Household trends in access to improved water sources and sanitation facilities in Vietnam and associated factors: findings from the Multiple Indicator Cluster Surveys, 2000-2011.

    Science.gov (United States)

    Tuyet-Hanh, Tran Thi; Lee, Jong-Koo; Oh, Juhwan; Van Minh, Hoang; Ou Lee, Chul; Hoan, Le Thi; Nam, You-Seon; Long, Tran Khanh

    2016-01-01

    Despite progress made by the Millennium Development Goal (MDG) number 7.C, Vietnam still faces challenges with regard to the provision of access to safe drinking water and basic sanitation. This paper describes household trends in access to improved water sources and sanitation facilities separately, and analyses factors associated with access to improved water sources and sanitation facilities in combination. Secondary data from the Vietnam Multiple Indicator Cluster Survey in 2000, 2006, and 2011 were analyzed. Descriptive statistics and tests of significance describe trends over time in access to water and sanitation by location, demographic and socio-economic factors. Binary logistic regressions (2000, 2006, and 2011) describe associations between access to water and sanitation, and geographic, demographic, and socio-economic factors. There have been some outstanding developments in access to improved water sources and sanitation facilities from 2000 to 2011. In 2011, the proportion of households with access to improved water sources and sanitation facilities reached 90% and 77%, respectively, meeting the 2015 MDG targets for safe drinking water and basic sanitation set at 88% and 75%, respectively. However, despite these achievements, in 2011, only 74% of households overall had access to combined improved drinking water and sanitation facilities. There were also stark differences between regions. In 2011, only 47% of households had access to both improved water and sanitation facilities in the Mekong River Delta compared with 94% in the Red River Delta. In 2011, households in urban compared to rural areas were more than twice as likely (odds ratio [OR]: 2.2; 95% confidence interval [CI]: 1.9-2.5) to have access to improved water and sanitation facilities in combination, and households in the highest compared with the lowest wealth quintile were over 40 times more likely (OR: 42.3; 95% CI: 29.8-60.0). More efforts are required to increase household access to

  16. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  17. Comparison of multiple support excitation solution techniques for piping systems

    International Nuclear Information System (INIS)

    Sterkel, H.P.; Leimbach, K.R.

    1980-01-01

    Design and analysis of nuclear power plant piping systems exposed to a variety of dynamic loads often require multiple support excitation analysis by modal or direct time integration methods. Both methods have recently been implemented in the computer program KWUROHR for static and dynamic analysis of piping systems, following the previous implementation of the multiple support excitation response spectrum method (see papers K 6/15 and K 6/15a of the SMiRT-4 Conference). The results of multiple support excitation response spectrum analyses can be examined by carrying out the equivalent time history analyses which do not distort the time phase relationship between the excitations at different support points. A frequent point of discussion is multiple versus single support excitation. A single support excitation analysis is computationally straightforward and tends to be on the conservative side, as the numerical results show. A multiple support excitation analysis, however, does not incur much more additional computer cost than the expenditure for an initial static solution involving three times the number, L, of excitation levels, i.e. 3L static load cases. The results are more realistic than those from a single support excitation analysis. A number of typical nuclear plant piping systems have been analyzed using single and multiple support excitation algorithms for: (1) the response spectrum method, (2) the modal time history method via the Wilson, Newmark and Goldberg integration operators and (3) the direct time history method via the Wilson integration operator. Characteristic results are presented to compare the computational quality of all three methods. (orig.)

  18. Early cost estimating for road construction projects using multiple regression techniques

    Directory of Open Access Journals (Sweden)

    Ibrahim Mahamid

    2011-12-01

    Full Text Available The objective of this study is to develop early cost estimating models for road construction projects using multiple regression techniques, based on 131 sets of data collected in the West Bank in Palestine. As the cost estimates are required at early stages of a project, considerations were given to the fact that the input data for the required regression model could be easily extracted from sketches or scope definition of the project. 11 regression models are developed to estimate the total cost of road construction project in US dollar; 5 of them include bid quantities as input variables and 6 include road length and road width. The coefficient of determination r2 for the developed models is ranging from 0.92 to 0.98 which indicate that the predicted values from a forecast models fit with the real-life data. The values of the mean absolute percentage error (MAPE of the developed regression models are ranging from 13% to 31%, the results compare favorably with past researches which have shown that the estimate accuracy in the early stages of a project is between ±25% and ±50%.

  19. APPLICATION OF OBJECT ORIENTED PROGRAMMING TECHNIQUES IN FRONT END COMPUTERS

    International Nuclear Information System (INIS)

    SKELLY, J.F.

    1997-01-01

    The Front End Computer (FEC) environment imposes special demands on software, beyond real time performance and robustness. FEC software must manage a diverse inventory of devices with individualistic timing requirements and hardware interfaces. It must implement network services which export device access to the control system at large, interpreting a uniform network communications protocol into the specific control requirements of the individual devices. Object oriented languages provide programming techniques which neatly address these challenges, and also offer benefits in terms of maintainability and flexibility. Applications are discussed which exhibit the use of inheritance, multiple inheritance and inheritance trees, and polymorphism to address the needs of FEC software

  20. Ant colony optimisation-direct cover: a hybrid ant colony direct cover technique for multi-level synthesis of multiple-valued logic functions

    Science.gov (United States)

    Abd-El-Barr, Mostafa

    2010-12-01

    The use of non-binary (multiple-valued) logic in the synthesis of digital systems can lead to savings in chip area. Advances in very large scale integration (VLSI) technology have enabled the successful implementation of multiple-valued logic (MVL) circuits. A number of heuristic algorithms for the synthesis of (near) minimal sum-of products (two-level) realisation of MVL functions have been reported in the literature. The direct cover (DC) technique is one such algorithm. The ant colony optimisation (ACO) algorithm is a meta-heuristic that uses constructive greediness to explore a large solution space in finding (near) optimal solutions. The ACO algorithm mimics the ant's behaviour in the real world in using the shortest path to reach food sources. We have previously introduced an ACO-based heuristic for the synthesis of two-level MVL functions. In this article, we introduce the ACO-DC hybrid technique for the synthesis of multi-level MVL functions. The basic idea is to use an ant to decompose a given MVL function into a number of levels and then synthesise each sub-function using a DC-based technique. The results obtained using the proposed approach are compared to those obtained using existing techniques reported in the literature. A benchmark set consisting of 50,000 randomly generated 2-variable 4-valued functions is used in the comparison. The results obtained using the proposed ACO-DC technique are shown to produce efficient realisation in terms of the average number of gates (as a measure of chip area) needed for the synthesis of a given MVL function.

  1. Resolvent-Techniques for Multiple Exercise Problems

    International Nuclear Information System (INIS)

    Christensen, Sören; Lempa, Jukka

    2015-01-01

    We study optimal multiple stopping of strong Markov processes with random refraction periods. The refraction periods are assumed to be exponentially distributed with a common rate and independent of the underlying dynamics. Our main tool is using the resolvent operator. In the first part, we reduce infinite stopping problems to ordinary ones in a general strong Markov setting. This leads to explicit solutions for wide classes of such problems. Starting from this result, we analyze problems with finitely many exercise rights and explain solution methods for some classes of problems with underlying Lévy and diffusion processes, where the optimal characteristics of the problems can be identified more explicitly. We illustrate the main results with explicit examples

  2. Resolvent-Techniques for Multiple Exercise Problems

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, Sören, E-mail: christensen@math.uni-kiel.de [Christian–Albrechts-University in Kiel, Mathematical Institute (Germany); Lempa, Jukka, E-mail: jukka.lempa@hioa.no [Oslo and Akershus University College, School of business, Faculty of Social Sciences (Norway)

    2015-02-15

    We study optimal multiple stopping of strong Markov processes with random refraction periods. The refraction periods are assumed to be exponentially distributed with a common rate and independent of the underlying dynamics. Our main tool is using the resolvent operator. In the first part, we reduce infinite stopping problems to ordinary ones in a general strong Markov setting. This leads to explicit solutions for wide classes of such problems. Starting from this result, we analyze problems with finitely many exercise rights and explain solution methods for some classes of problems with underlying Lévy and diffusion processes, where the optimal characteristics of the problems can be identified more explicitly. We illustrate the main results with explicit examples.

  3. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  4. How Equalization Techniques Affect the TCP Performance of MC-CDMA Systems in Correlated Fading Channels

    Directory of Open Access Journals (Sweden)

    Giacomo Leonardi

    2007-12-01

    Full Text Available This paper investigates the impact of several equalization techniques for multicarrier code division multiple access systems on the performance at both lower and upper layers (i.e., physical and TCP layers. Classical techniques such as maximal ratio combining, equal gain combining, orthogonality restoring combining, minimum mean square error, as well as a partial equalization (PE are investigated in time- and frequency-correlated fading channels with various numbers of interferers. Their impact on the performance at upper level is then studied. The results are obtained through an integrated simulation platform carefully reproducing all main aspects affecting the quality of service perceived by the final user, allowing an investigation of the real gain produced by signal processing techniques at TCP level.

  5. NOTES performed using multiple ports of entry: Current experience and potential implications for urologic applications.

    Science.gov (United States)

    Lima, Estevao; Rolanda, Carla; Correia-Pinto, Jorge

    2009-05-01

    An isolated transgastric port raises serious limitations in performing natural orifice translumenal endoscopic surgery (NOTES) complex procedures in the urology field. In an attempt to overcome these limitations, several solutions has been advanced, such as the hybrid approach (adding a single abdominal port access) or the pure NOTES combined approach (joining multiple natural orifice ports). To review the current state of experimental and clinical results of multiple ports in NOTES, a literature search of PubMed was performed, seeking publications from January 2002 to 2008 on NOTES. In addition, we looked at pertinent abstracts of annual meetings of the American Urological Association, the European Association of Urology, and the World Congress of Endourology from 2007. Multiple ports of entry seem to be necessary, mainly for moderately complex procedures. Thus, we could find studies using the hybrid approach (combination of transgastric or transvaginal access with a single transabdominal port), or using the pure NOTES combined approach (transgastric and transvesical, transvaginal and transcolonic, or transgastric and transvaginal). There is still limited experience in humans using these approaches, and no comparative studies exist to date. It is predictable that for moderately complex procedures, we will need multiple ports, so the transvaginal-transabdominal (hybrid) approach is the most appealing, whereas in a pure NOTES perspective, the transgastric-transvesical approach seems to be the preferred approach. We are waiting for new equipment and instruments that are more appropriate for these novel techniques.

  6. Structure for common access and support of fuel cell stacks

    Science.gov (United States)

    Walsh, Michael M.

    2000-01-01

    A structure provides common support and access to multiple fuel cells externally mounted thereto. The structure has openings leading to passages defined therein for providing the access. Various other fuel cell power system components are connected at the openings, such as reactant and coolant sources.

  7. Bipolar radiofrequency ablation of benign thyroid nodules using a multiple overlapping shot technique in a 3-month follow-up.

    Science.gov (United States)

    Kohlhase, Konstantin David; Korkusuz, Yücel; Gröner, Daniel; Erbelding, Christian; Happel, Christian; Luboldt, Wolfgang; Grünwald, Frank

    2016-08-01

    Purpose The aim of this study was to evaluate the decrease of benign thyroid nodules after bipolar radiofrequency ablation (RFA) in a 3-month follow-up using a multiple overlapping shot technique ('MOST'). Methods A total of 18 patients with 20 symptomatic benign thyroid nodules (17 cold nodules, 3 hyperfunctioning nodules) were treated in one single session by bipolar RFA. Bipolar ablation was performed using MOST. The nodule volumes were measured prior to ablation and 3 months after the procedure using ultrasound. The population consisted of either solid (>80% solid tissue within the volume of interest), complex, or cystic nodules (nodule volume (ΔV), median 5.3 mL (range 0.13-43.1 mL), corresponding to a relative reduction in mean of 56 ± 17.9%. Median initial volume was 8 mL (range 0.48-62 mL); 3 months after ablation a median volume of 2.3 mL (range 0.3-32 mL) was measured. Nodule growth ≥50% occurred in 70% (14 nodules). At the follow-up no complications such as infections, persisting pain, nerve injuries or immunogen stimulation occurred. Patients with cold nodules (15) remained euthyroid, with hyperfunctioning nodules either euthyroid (2) or latent hypofunctional (1). Conclusion The use of bipolar RFA is an effective, safe and suitable thermoablative technique to treat benign thyroid nodules. Combined with the multiple overlapping shot technique it allows sufficient ablation.

  8. Diagnosis of soil-transmitted helminthiasis in an Amazonic community of Peru using multiple diagnostic techniques.

    Science.gov (United States)

    Machicado, Jorge D; Marcos, Luis A; Tello, Raul; Canales, Marco; Terashima, Angelica; Gotuzzo, Eduardo

    2012-06-01

    An observational descriptive study was conducted in a Shipibo-Conibo/Ese'Eja community of the rainforest in Peru to compare the Kato-Katz method and the spontaneous sedimentation in tube technique (SSTT) for the diagnosis of intestinal parasites as well as to report the prevalence of soil-transmitted helminth (STH) infections in this area. A total of 73 stool samples were collected and analysed by several parasitological techniques, including Kato-Katz, SSTT, modified Baermann technique (MBT), agar plate culture, Harada-Mori culture and the direct smear examination. Kato-Katz and SSTT had the same rate of detection for Ascaris lumbricoides (5%), Trichuris trichiura (5%), hookworm (14%) and Hymenolepis nana (26%). The detection rate for Strongyloides stercoralis larvae was 16% by SSTT and 0% by Kato-Katz, but 18% by agar plate culture and 16% by MBT. The SSTT also had the advantage of detecting multiple intestinal protozoa such as Blastocystis hominis (40%), Giardia intestinalis (29%) and Entamoeba histolytica/E. dispar (16%). The most common intestinal parasites found in this community were B. hominis, G. intestinalis, H. nana, S. stercoralis and hookworm. In conclusion, the SSTT is not inferior to Kato-Katz for the diagnosis of common STH infections but is largely superior for detecting intestinal protozoa and S. stercoralis larvae. Copyright © 2012 Royal Society of Tropical Medicine and Hygiene. Published by Elsevier Ltd. All rights reserved.

  9. SCOAP3 and Open Access

    CERN Document Server

    Mele, Salvatore; D'Agostino, Dan; Dyas-Correia, Sharon

    2009-01-01

    SCOAP3 is an innovative Open Access initiative for publishing in high-energy physics. The model is viewed by many as a potential solution to multiple issues related to the financial crisis, the peer review system, scholarly communication, and the need to support institutional repositories. This installment of “The Balance Point” presents articles written by three Open Access advocates, outlining the SCOAP3 proposal, benefits of participation, and some of the roles libraries, publishers and scientists can play in making important changes to scholarly communication. Contributors discuss scalability and transferability issues of SCOAP3, as well as other matters of concern.

  10. Technical strategies and anatomic considerations for parapedicular access to thoracic and lumbar vertebral bodies

    International Nuclear Information System (INIS)

    Beall, Douglas P.; Martin, Hal D.; Stapp, Annette M.; Puckett, Timothy A.; Stechison, M.T.; Braswell, John J.

    2007-01-01

    To investigate and illustrate a variation on the traditional percutaneous access to the vertebral body via a parapedicular approach. An effective parapedicular access technique that could safely and reliably guide the needle tip into the center of the vertebral body was developed from cadaver dissection observations for the purpose of clinical use. A total of 102 vertebral compression fractures from T-4 to L-5 were treated via the parapedicular access at our institution between July 2005 and March 2006. There were 72 patients between the ages of 17 and 96 years (mean age: 68.2 years) who underwent treatment. The cadaver dissection revealed a relatively avascular and aneural portion of the vertebral body along the superior margin of the vertebral body-pedicle junction. A total 102 vertebral fractures were treated using the parapedicular access technique without any recognized clinical complications from the needle access or the instrumentation. The thoracic and lumbar vertebral bodies may be safely, reliably, and reproducibly accessed using a percutaneous parapedicular access technique. The technique presented represents a relatively avascular and aneural approach to vertebral body. (orig.)

  11. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis

  12. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  13. Modern techniques and technologies for unbundled access in the local loop

    Science.gov (United States)

    Bacis Vasile, Irina Bristena; Schiopu, Paul; Marghescu, Cristina

    2015-02-01

    The efficient and unbundled use of the existing telecommunications infrastructure represents a major goal for the development of the services offered by telecommunications providers. A major telecommunications operator can provide services to a subscriber using a copper wire pair or part of the frequency spectrum of a copper wire pair, together with other operators, through a process of unbundling access in the local loop. Since access to the vocal band is an already solved problem, concerns turn to the broadband access with xDSL service delivery on ungrouped subscriber loops; besides the legal and economic aspects involved this has become an engineering problem also. The local loop unbundling methods have a substantial technical impact. This impact should be taken into account right from the design stage and then in the standardization stage of broadband systems intended to operate on copper wire pairs in the local loop. These systems are known under the generic term of xDSL and began to be analyzed in the late 90s. xDSL became the dominant solution for providing Internet at a reasonable price for both residential and business subscribers. In this massive development scenario, certain problems will arise from the early stages of deployment, and another type of problems will occur later on when a large number of systems will be installed in a single beam.

  14. Upgrade of hybrid fibre coax networks towards bi-directional access

    NARCIS (Netherlands)

    Khoe, G.D.; Wolters, R.P.C.; Boom, van den H.P.A.; Prati, G.

    1997-01-01

    In this paper we describe an upgrade scenario for Hybrid Fibre Coax (HFC) CATV Networks towards hi-directional access. The communication system described has been newly designed, and is based on the use of Direct Sequence- Code Division Multiple-Access (DS-CDMA). Due to its spread-spectrum

  15. Ultrasonography-guided peripheral intravenous access versus traditional approaches in patients with difficult intravenous access.

    Science.gov (United States)

    Costantino, Thomas G; Parikh, Aman K; Satz, Wayne A; Fojtik, John P

    2005-11-01

    We assess the success rate of emergency physicians in placing peripheral intravenous catheters in difficult-access patients who were unsuccessfully cannulated by emergency nurses. A technique using real-time ultrasonographic guidance by 2 physicians was compared with traditional approaches using palpation and landmark guidance. This was a prospective, systematically allocated study of all patients requiring intravenous access who presented to 2 university hospitals between October 2003 and March 2004. Inclusion criterion was the inability of any available nurse to obtain intravenous access after at least 3 attempts on a subgroup of patients who had a history of difficult intravenous access because of obesity, history of intravenous drug abuse, or chronic medical problems. Exclusion criterion was the need for central venous access. Patients presenting on odd days were allocated to the ultrasonographic-guided group, and those presenting on even days were allocated to the traditional-approach group. Endpoints were successful cannulation, number of sticks, time, and patient satisfaction. Sixty patients were enrolled, 39 on odd days and 21 on even days. Success rate was greater for the ultrasonographic group (97%) versus control (33%), difference in proportions of 64% (95% confidence interval [CI] 39% to 71%). The ultrasonographic group required less overall time (13 minutes versus 30 minutes, for a difference of 17 [95% CI 0.8 to 25.6]), less time to successful cannulation from first percutaneous puncture (4 minutes versus 15 minutes, for a difference of 11 [95% CI 8.2 to 19.4]), and fewer percutaneous punctures (1.7 versus 3.7, for a difference of 2.0 [95% CI 1.27 to 2.82]) and had greater patient satisfaction (8.7 versus 5.7, for a difference of 3.0 [95% CI 1.82 to 4.29]) than the traditional landmark approach. Ultrasonographic-guided peripheral intravenous access is more successful than traditional "blind" techniques, requires less time, decreases the number of

  16. Sub-Coronal Inflatable Penile Prosthesis Placement With Modified No-Touch Technique: A Step-by-Step Approach With Outcomes.

    Science.gov (United States)

    Weinberg, Aaron C; Pagano, Matthew J; Deibert, Christopher M; Valenzuela, Robert J

    2016-02-01

    The surgical treatment of disorders of male sexual function requires specific exposure to correct the underlying problem safely and efficiently. Currently, sub-coronal exposure is used for treatment of phimosis, Peyronie's disease plaque (PDP), and semirigid penile prosthesis insertion. Infra-pubic and scrotal incisions are used for inflatable penile prosthesis (IPP) placement. However, men who present with several disorders might require multiple procedures and surgical incisions. To report a prospective review of our surgical experience and outcomes with a single sub-coronal incision for IPP placement with a modified no-touch technique. This approach allows for access to the entire corporal body for multiple reconstructive procedures. Two hundred men had IPPs placed through a sub-coronal incision using our modified no-touch technique. The penis was degloved to the level of the penoscrotal junction and the dartos muscle was everted and secured to the drapes. This allowed exclusion of the scrotal and penile skin from the operative field. After artificial erection, the patient's corpora were inspected for PDP and other abnormalities. Penoscrotal IPP models were placed in all cases with insertion proximal to the penoscrotal junction. After placement of the IPP, the abnormalities were repaired. Feasibility of the procedure, operative times, complication rate, utilization of accessory, reconstructive procedures, and post-operative penile length. Of the 200 men who had IPP placement, 92 had PDP that was treated, 106 (53%) consented to circumcision, 24 (12%) had their reservoir placed ectopically, and 31 (16%) had a prosthesis exchanged through the sub-coronal technique. Mean operative time was 73 minutes (39-161 minutes). Specialists in the surgical treatment of disorders of male sexual function can perform multiple procedures safely and easily through a modified no-touch single sub-coronal incision. This approach allows access to the entire corporal body, providing

  17. Household trends in access to improved water sources and sanitation facilities in Vietnam and associated factors: findings from the Multiple Indicator Cluster Surveys, 2000–2011

    Science.gov (United States)

    Tuyet-Hanh, Tran Thi; Lee, Jong-Koo; Oh, Juhwan; Van Minh, Hoang; Ou Lee, Chul; Hoan, Le Thi; Nam, You-Seon; Long, Tran Khanh

    2016-01-01

    Background Despite progress made by the Millennium Development Goal (MDG) number 7.C, Vietnam still faces challenges with regard to the provision of access to safe drinking water and basic sanitation. Objective This paper describes household trends in access to improved water sources and sanitation facilities separately, and analyses factors associated with access to improved water sources and sanitation facilities in combination. Design Secondary data from the Vietnam Multiple Indicator Cluster Survey in 2000, 2006, and 2011 were analyzed. Descriptive statistics and tests of significance describe trends over time in access to water and sanitation by location, demographic and socio-economic factors. Binary logistic regressions (2000, 2006, and 2011) describe associations between access to water and sanitation, and geographic, demographic, and socio-economic factors. Results There have been some outstanding developments in access to improved water sources and sanitation facilities from 2000 to 2011. In 2011, the proportion of households with access to improved water sources and sanitation facilities reached 90% and 77%, respectively, meeting the 2015 MDG targets for safe drinking water and basic sanitation set at 88% and 75%, respectively. However, despite these achievements, in 2011, only 74% of households overall had access to combined improved drinking water and sanitation facilities. There were also stark differences between regions. In 2011, only 47% of households had access to both improved water and sanitation facilities in the Mekong River Delta compared with 94% in the Red River Delta. In 2011, households in urban compared to rural areas were more than twice as likely (odds ratio [OR]: 2.2; 95% confidence interval [CI]: 1.9–2.5) to have access to improved water and sanitation facilities in combination, and households in the highest compared with the lowest wealth quintile were over 40 times more likely (OR: 42.3; 95% CI: 29.8–60.0). Conclusions More

  18. Household trends in access to improved water sources and sanitation facilities in Vietnam and associated factors: findings from the Multiple Indicator Cluster Surveys, 2000–2011

    Directory of Open Access Journals (Sweden)

    Tran Thi Tuyet-Hanh

    2016-02-01

    Full Text Available Background: Despite progress made by the Millennium Development Goal (MDG number 7.C, Vietnam still faces challenges with regard to the provision of access to safe drinking water and basic sanitation. Objective: This paper describes household trends in access to improved water sources and sanitation facilities separately, and analyses factors associated with access to improved water sources and sanitation facilities in combination. Design: Secondary data from the Vietnam Multiple Indicator Cluster Survey in 2000, 2006, and 2011 were analyzed. Descriptive statistics and tests of significance describe trends over time in access to water and sanitation by location, demographic and socio-economic factors. Binary logistic regressions (2000, 2006, and 2011 describe associations between access to water and sanitation, and geographic, demographic, and socio-economic factors. Results: There have been some outstanding developments in access to improved water sources and sanitation facilities from 2000 to 2011. In 2011, the proportion of households with access to improved water sources and sanitation facilities reached 90% and 77%, respectively, meeting the 2015 MDG targets for safe drinking water and basic sanitation set at 88% and 75%, respectively. However, despite these achievements, in 2011, only 74% of households overall had access to combined improved drinking water and sanitation facilities. There were also stark differences between regions. In 2011, only 47% of households had access to both improved water and sanitation facilities in the Mekong River Delta compared with 94% in the Red River Delta. In 2011, households in urban compared to rural areas were more than twice as likely (odds ratio [OR]: 2.2; 95% confidence interval [CI]: 1.9–2.5 to have access to improved water and sanitation facilities in combination, and households in the highest compared with the lowest wealth quintile were over 40 times more likely (OR: 42.3; 95% CI: 29.8–60

  19. Mapping the evolution of 'food deserts' in a Canadian city: Supermarket accessibility in London, Ontario, 1961–2005

    Directory of Open Access Journals (Sweden)

    Gilliland Jason

    2008-04-01

    Full Text Available Abstract Background A growing body of research suggests that the suburbanization of food retailers in North America and the United Kingdom in recent decades has contributed to the emergence of urban 'food deserts', or disadvantaged areas of cities with relatively poor access to healthy and affordable food. This paper explores the evolution of food deserts in a mid-sized Canadian city (London, Ontario by using a geographic information system (GIS to map the precise locations of supermarkets in 1961 and 2005; multiple techniques of network analysis were used to assess changing levels of supermarket access in relation to neighbourhood location, socioeconomic characteristics, and access to public transit. Results The findings indicate that residents of inner-city neighbourhoods of low socioeconomic status have the poorest access to supermarkets. Furthermore, spatial inequalities in access to supermarkets have increased over time, particularly in the inner-city neighbourhoods of Central and East London, where distinct urban food deserts now exist. Conclusion Contrary to recent findings in larger Canadian cities, we conclude that urban food deserts exist in London, Ontario. Policies aimed at improving public health must also recognize the spatial, as well as socioeconomic, inequities with respect to access to healthy and affordable food. Additional research is necessary to better understand how supermarket access influences dietary behaviours and related health outcomes.

  20. Mapping the evolution of 'food deserts' in a Canadian city: Supermarket accessibility in London, Ontario, 1961–2005

    Science.gov (United States)

    Larsen, Kristian; Gilliland, Jason

    2008-01-01

    Background A growing body of research suggests that the suburbanization of food retailers in North America and the United Kingdom in recent decades has contributed to the emergence of urban 'food deserts', or disadvantaged areas of cities with relatively poor access to healthy and affordable food. This paper explores the evolution of food deserts in a mid-sized Canadian city (London, Ontario) by using a geographic information system (GIS) to map the precise locations of supermarkets in 1961 and 2005; multiple techniques of network analysis were used to assess changing levels of supermarket access in relation to neighbourhood location, socioeconomic characteristics, and access to public transit. Results The findings indicate that residents of inner-city neighbourhoods of low socioeconomic status have the poorest access to supermarkets. Furthermore, spatial inequalities in access to supermarkets have increased over time, particularly in the inner-city neighbourhoods of Central and East London, where distinct urban food deserts now exist. Conclusion Contrary to recent findings in larger Canadian cities, we conclude that urban food deserts exist in London, Ontario. Policies aimed at improving public health must also recognize the spatial, as well as socioeconomic, inequities with respect to access to healthy and affordable food. Additional research is necessary to better understand how supermarket access influences dietary behaviours and related health outcomes. PMID:18423005

  1. Optical Multiple Access Network (OMAN) for advanced processing satellite applications

    Science.gov (United States)

    Mendez, Antonio J.; Gagliardi, Robert M.; Park, Eugene; Ivancic, William D.; Sherman, Bradley D.

    1991-01-01

    An OMAN breadboard for exploring advanced processing satellite circuit switch applications is introduced. Network architecture, hardware trade offs, and multiple user interference issues are presented. The breadboard test set up and experimental results are discussed.

  2. Multiple sensitive estimation and optimal sample size allocation in the item sum technique.

    Science.gov (United States)

    Perri, Pier Francesco; Rueda García, María Del Mar; Cobo Rodríguez, Beatriz

    2018-01-01

    For surveys of sensitive issues in life sciences, statistical procedures can be used to reduce nonresponse and social desirability response bias. Both of these phenomena provoke nonsampling errors that are difficult to deal with and can seriously flaw the validity of the analyses. The item sum technique (IST) is a very recent indirect questioning method derived from the item count technique that seeks to procure more reliable responses on quantitative items than direct questioning while preserving respondents' anonymity. This article addresses two important questions concerning the IST: (i) its implementation when two or more sensitive variables are investigated and efficient estimates of their unknown population means are required; (ii) the determination of the optimal sample size to achieve minimum variance estimates. These aspects are of great relevance for survey practitioners engaged in sensitive research and, to the best of our knowledge, were not studied so far. In this article, theoretical results for multiple estimation and optimal allocation are obtained under a generic sampling design and then particularized to simple random sampling and stratified sampling designs. Theoretical considerations are integrated with a number of simulation studies based on data from two real surveys and conducted to ascertain the efficiency gain derived from optimal allocation in different situations. One of the surveys concerns cannabis consumption among university students. Our findings highlight some methodological advances that can be obtained in life sciences IST surveys when optimal allocation is achieved. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-18

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  4. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine; Alouini, Mohamed-Slim; Radaydeh, Redha M.; Yang, Hong-Chuan

    2012-01-01

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  5. Empowering Learners with Mobile Open-Access Learning Initiatives

    Science.gov (United States)

    Mills, Michael, Ed.; Wake, Donna, Ed.

    2017-01-01

    Education has been progressing at a rapid pace ever since educators have been able to harness the power of mobile technology. Open-access learning techniques provide more students with the opportunity to engage in educational opportunities that may have been previously restricted. "Empowering Learners with Mobile Open-Access Learning…

  6. Embedding multiple self-organisation functionalities in future radio access networks

    NARCIS (Netherlands)

    Jansen, T.; Amirijoo, M.; Türke, U.; Jorguseski, L.; Zetterberg, K.; Nascimento, J.R.V. do; Schmelz, L.C.; Turk, J.; Balan, I.

    2009-01-01

    Wireless network operators today allocate considerable manual effort in managing their networks. A viable solution for lowering the manual effort is to introduce self-organisation functionalities. In this paper we discuss the challenges that are encountered when embedding multiple self-organisation

  7. Modified Truncated Multiplicity Analysis to Improve Verification of Uranium Fuel Cycle Materials

    International Nuclear Information System (INIS)

    LaFleur, A.; Miller, K.; Swinhoe, M.; Belian, A.; Croft, S.

    2015-01-01

    Accurate verification of 235U enrichment and mass in UF6 storage cylinders and the UO2F2 holdup contained in the process equipment is needed to improve international safeguards and nuclear material accountancy at uranium enrichment plants. Small UF6 cylinders (1.5'' and 5'' diameter) are used to store the full range of enrichments from depleted to highly-enriched UF6. For independent verification of these materials, it is essential that the 235U mass and enrichment measurements do not rely on facility operator declarations. Furthermore, in order to be deployed by IAEA inspectors to detect undeclared activities (e.g., during complementary access), it is also imperative that the measurement technique is quick, portable, and sensitive to a broad range of 235U masses. Truncated multiplicity analysis is a technique that reduces the variance in the measured count rates by only considering moments 1, 2, and 3 of the multiplicity distribution. This is especially important for reducing the uncertainty in the measured doubles and triples rates in environments with a high cosmic ray background relative to the uranium signal strength. However, we believe that the existing truncated multiplicity analysis throws away too much useful data by truncating the distribution after the third moment. This paper describes a modified truncated multiplicity analysis method that determines the optimal moment to truncate the multiplicity distribution based on the measured data. Experimental measurements of small UF6 cylinders and UO2F2 working reference materials were performed at Los Alamos National Laboratory (LANL). The data were analyzed using traditional and modified truncated multiplicity analysis to determine the optimal moment to truncate the multiplicity distribution to minimize the uncertainty in the measured count rates. The results from this analysis directly support nuclear safeguards at enrichment plants and provide a more accurate verification method for UF6

  8. A Dataset and a Technique for Generalized Nuclear Segmentation for Computational Pathology.

    Science.gov (United States)

    Kumar, Neeraj; Verma, Ruchika; Sharma, Sanuj; Bhargava, Surabhi; Vahadane, Abhishek; Sethi, Amit

    2017-07-01

    Nuclear segmentation in digital microscopic tissue images can enable extraction of high-quality features for nuclear morphometrics and other analysis in computational pathology. Conventional image processing techniques, such as Otsu thresholding and watershed segmentation, do not work effectively on challenging cases, such as chromatin-sparse and crowded nuclei. In contrast, machine learning-based segmentation can generalize across various nuclear appearances. However, training machine learning algorithms requires data sets of images, in which a vast number of nuclei have been annotated. Publicly accessible and annotated data sets, along with widely agreed upon metrics to compare techniques, have catalyzed tremendous innovation and progress on other image classification problems, particularly in object recognition. Inspired by their success, we introduce a large publicly accessible data set of hematoxylin and eosin (H&E)-stained tissue images with more than 21000 painstakingly annotated nuclear boundaries, whose quality was validated by a medical doctor. Because our data set is taken from multiple hospitals and includes a diversity of nuclear appearances from several patients, disease states, and organs, techniques trained on it are likely to generalize well and work right out-of-the-box on other H&E-stained images. We also propose a new metric to evaluate nuclear segmentation results that penalizes object- and pixel-level errors in a unified manner, unlike previous metrics that penalize only one type of error. We also propose a segmentation technique based on deep learning that lays a special emphasis on identifying the nuclear boundaries, including those between the touching or overlapping nuclei, and works well on a diverse set of test images.

  9. Distributed Synchronization Technique for OFDMA-Based Wireless Mesh Networks Using a Bio-Inspired Algorithm

    Directory of Open Access Journals (Sweden)

    Mi Jeong Kim

    2015-07-01

    Full Text Available In this paper, a distributed synchronization technique based on a bio-inspired algorithm is proposed for an orthogonal frequency division multiple access (OFDMA-based wireless mesh network (WMN with a time difference of arrival. The proposed time- and frequency-synchronization technique uses only the signals received from the neighbor nodes, by considering the effect of the propagation delay between the nodes. It achieves a fast synchronization with a relatively low computational complexity because it is operated in a distributed manner, not requiring any feedback channel for the compensation of the propagation delays. In addition, a self-organization scheme that can be effectively used to construct 1-hop neighbor nodes is proposed for an OFDMA-based WMN with a large number of nodes. The performance of the proposed technique is evaluated with regard to the convergence property and synchronization success probability using a computer simulation.

  10. Distributed Synchronization Technique for OFDMA-Based Wireless Mesh Networks Using a Bio-Inspired Algorithm.

    Science.gov (United States)

    Kim, Mi Jeong; Maeng, Sung Joon; Cho, Yong Soo

    2015-07-28

    In this paper, a distributed synchronization technique based on a bio-inspired algorithm is proposed for an orthogonal frequency division multiple access (OFDMA)-based wireless mesh network (WMN) with a time difference of arrival. The proposed time- and frequency-synchronization technique uses only the signals received from the neighbor nodes, by considering the effect of the propagation delay between the nodes. It achieves a fast synchronization with a relatively low computational complexity because it is operated in a distributed manner, not requiring any feedback channel for the compensation of the propagation delays. In addition, a self-organization scheme that can be effectively used to construct 1-hop neighbor nodes is proposed for an OFDMA-based WMN with a large number of nodes. The performance of the proposed technique is evaluated with regard to the convergence property and synchronization success probability using a computer simulation.

  11. Deja Vu--The Access/Success Pendulum

    Science.gov (United States)

    Gandara, Patricia; Orfield, Gary

    2010-01-01

    In education, reform tends to follow cycles, often bouncing from one extreme to another without considering the possibility of incorporating multiple perspectives simultaneously. Policies aimed at helping more underrepresented students enter college and complete degrees have bounced from one pole to another, embracing access as the primary goal…

  12. An Effective Key Management Approach to Differential Access Control in Dynamic Environments

    OpenAIRE

    Yogesh Karandikar; Xukai Zou; Yuanshun Dai

    2006-01-01

    Applications like e-newspaper or interactive online gaming have more than one resource and a large number of users. There is a many-to-many relationship between users and resources; each user can access multiple resources and multiple users can access each resource. The resources are independent and each resource needs to be encrypted by a different Resource Encryption Key (REK). Each REK needs to be distributed to all subscribers of the resource and each subscriber must get all the REKs he/s...

  13. Satcom access in the Evolved Packet Core

    NARCIS (Netherlands)

    Cano Soveri, M.D.; Norp, A.H.J.; Popova, M.P.

    2011-01-01

    Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is

  14. Satcom access in the evolved packet core

    NARCIS (Netherlands)

    Cano, M.D.; Norp, A.H.J.; Popova, M.P.

    2012-01-01

    Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is

  15. Techniques For Measuring Absorption Coefficients In Crystalline Materials

    Science.gov (United States)

    Klein, Philipp H.

    1981-10-01

    Absorption coefficients smaller than 0.001 cm-1 can, with more or less difficulty, be measured by several techniques. With diligence, all methods can be refined to permit measurement of absorption coefficients as small as 0.00001 cm-1. Spectral data are most readily obtained by transmission (spectrophotometric) methods, using multiple internal reflection to increase effective sample length. Emissivity measurements, requiring extreme care in the elimination of detector noise and stray light, nevertheless afford the most accessible spectral data in the 0.0001 to 0.00001 cm-1 range. Single-wavelength informa-tion is most readily obtained with modifications of laser calorimetry. Thermo-couple detection of energy absorbed from a laser beam is convenient, but involves dc amplification techniques and is susceptible to stray-light problems. Photoacoustic detection, using ac methods, tends to diminish errors of these types, but at some expense in experimental complexity. Laser calorimetry has been used for measurements of absorption coefficients as small as 0.000003 cm-1. Both transmission and calorimetric data, taken as functions of intensity, have been used for measurement of nonlinear absorption coefficients.

  16. Secure, web-accessible call rosters for academic radiology departments.

    Science.gov (United States)

    Nguyen, A V; Tellis, W M; Avrin, D E

    2000-05-01

    Traditionally, radiology department call rosters have been posted via paper and bulletin boards. Frequently, changes to these lists are made by multiple people independently, but often not synchronized, resulting in confusion among the house staff and technical staff as to who is on call and when. In addition, multiple and disparate copies exist in different sections of the department, and changes made would not be propagated to all the schedules. To eliminate such difficulties, a paperless call scheduling application was developed. Our call scheduling program allowed Java-enabled web access to a database by designated personnel from each radiology section who have privileges to make the necessary changes. Once a person made a change, everyone accessing the database would see the modification. This eliminates the chaos resulting from people swapping shifts at the last minute and not having the time to record or broadcast the change. Furthermore, all changes to the database were logged. Users are given a log-in name and password and can only edit their section; however, all personnel have access to all sections' schedules. Our applet was written in Java 2 using the latest technology in database access. We access our Interbase database through the DataExpress and DB Swing (Borland, Scotts Valley, CA) components. The result is secure access to the call rosters via the web. There are many advantages to the web-enabled access, mainly the ability for people to make changes and have the changes recorded and propagated in a single virtual location and available to all who need to know.

  17. Insights from Classifying Visual Concepts with Multiple Kernel Learning

    Science.gov (United States)

    Binder, Alexander; Nakajima, Shinichi; Kloft, Marius; Müller, Christina; Samek, Wojciech; Brefeld, Ulf; Müller, Klaus-Robert; Kawanabe, Motoaki

    2012-01-01

    Combining information from various image features has become a standard technique in concept recognition tasks. However, the optimal way of fusing the resulting kernel functions is usually unknown in practical applications. Multiple kernel learning (MKL) techniques allow to determine an optimal linear combination of such similarity matrices. Classical approaches to MKL promote sparse mixtures. Unfortunately, 1-norm regularized MKL variants are often observed to be outperformed by an unweighted sum kernel. The main contributions of this paper are the following: we apply a recently developed non-sparse MKL variant to state-of-the-art concept recognition tasks from the application domain of computer vision. We provide insights on benefits and limits of non-sparse MKL and compare it against its direct competitors, the sum-kernel SVM and sparse MKL. We report empirical results for the PASCAL VOC 2009 Classification and ImageCLEF2010 Photo Annotation challenge data sets. Data sets (kernel matrices) as well as further information are available at http://doc.ml.tu-berlin.de/image_mkl/(Accessed 2012 Jun 25). PMID:22936970

  18. Image Based Solution to Occlusion Problem for Multiple Robots Navigation

    Directory of Open Access Journals (Sweden)

    Taj Mohammad Khan

    2012-04-01

    Full Text Available In machine vision, occlusions problem is always a challenging issue in image based mapping and navigation tasks. This paper presents a multiple view vision based algorithm for the development of occlusion-free map of the indoor environment. The map is assumed to be utilized by the mobile robots within the workspace. It has wide range of applications, including mobile robot path planning and navigation, access control in restricted areas, and surveillance systems. We used wall mounted fixed camera system. After intensity adjustment and background subtraction of the synchronously captured images, the image registration was performed. We applied our algorithm on the registered images to resolve the occlusion problem. This technique works well even in the existence of total occlusion for a longer period.

  19. Management Challenges of Launching Multiple Payloads for Multiple Customers

    OpenAIRE

    Callen, Dave

    1999-01-01

    Orbital has provided launch services for multiple satellites as a means to provide greater economy for access to space. These include satellites from NASA, 000, commercial companies, universities, and foreign governments. While satellite customers view shared launches as a means to achieve reduced launch costs, this approach adds many complexities that a traditional launch service provider does not have to address for a dedicated launch. This paper will discuss some of the challenges associat...

  20. Oceanographic Data from Multiple Platforms from 18700722 to 19890507 (NODC Accession 9400170)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains salinity/temperature/depth (STD) profiles and other hydrographic data, mostly in the Sea of Japan. More than a century of profile data from...

  1. Transparent mediation-based access to multiple yeast data sources using an ontology driven interface.

    Science.gov (United States)

    Briache, Abdelaali; Marrakchi, Kamar; Kerzazi, Amine; Navas-Delgado, Ismael; Rossi Hassani, Badr D; Lairini, Khalid; Aldana-Montes, José F

    2012-01-25

    Saccharomyces cerevisiae is recognized as a model system representing a simple eukaryote whose genome can be easily manipulated. Information solicited by scientists on its biological entities (Proteins, Genes, RNAs...) is scattered within several data sources like SGD, Yeastract, CYGD-MIPS, BioGrid, PhosphoGrid, etc. Because of the heterogeneity of these sources, querying them separately and then manually combining the returned results is a complex and time-consuming task for biologists most of whom are not bioinformatics expert. It also reduces and limits the use that can be made on the available data. To provide transparent and simultaneous access to yeast sources, we have developed YeastMed: an XML and mediator-based system. In this paper, we present our approach in developing this system which takes advantage of SB-KOM to perform the query transformation needed and a set of Data Services to reach the integrated data sources. The system is composed of a set of modules that depend heavily on XML and Semantic Web technologies. User queries are expressed in terms of a domain ontology through a simple form-based web interface. YeastMed is the first mediation-based system specific for integrating yeast data sources. It was conceived mainly to help biologists to find simultaneously relevant data from multiple data sources. It has a biologist-friendly interface easy to use. The system is available at http://www.khaos.uma.es/yeastmed/.

  2. Multiple group membership and well-being

    DEFF Research Database (Denmark)

    Sønderlund, Anders L.; Morton, Thomas A.; Ryan, Michelle K.

    2017-01-01

    multiple group membership and well-being, but only for individuals high in SIC. This effect was mediated by perceived identity expression and access to social support. Study 2 (N = 104) also found that multiple group memberships indirectly contributed to well-being via perceived identity expression......A growing body of research points to the value of multiple group memberships for individual well-being. However, much of this work considers group memberships very broadly and in terms of number alone. We conducted two correlational studies exploring how the relationship between multiple group...... and social support, as well as identity compatibility and perceived social inclusion. But, in this study the relationship between multiple group memberships and well-being outcomes was moderated by the perceived value and visibility of group memberships to others. Specifically, possessing multiple, devalued...

  3. Market access through bound tariffs

    DEFF Research Database (Denmark)

    Sala, Davide; Yalcin, Erdal; Schröder, Philipp

    2010-01-01

    on the risk that exporters face in destination markets. The present paper formalizes the underlying interaction of risk, fixed export costs and firms' market entry decisions based on techniques known from the real options literature; doing so we highlight the important role of bound tariffs at the extensive...... margin of trade. We find that bound tariffs are more effective with higher risk destination markets, that a large binding overhang may still command substantial market access, and that reductions in bound tariffs generate effective market access even when bound rates are above current and longterm...

  4. Market Access through Bound Tariffs

    DEFF Research Database (Denmark)

    Sala, Davide; Schröder, Philipp J.H.; Yalcin, Erdal

    on the risk that exporters face in destination markets. The present paper formalizes the underlying interaction of risk, fixed export costs and firms' market entry decisions based on techniques known from the real options literature; doing so we highlight the important role of bound tariffs at the extensive...... margin of trade. We find that bound tariffs are more effective with higher risk destination markets, that a large binding overhang may still command substantial market access, and that reductions in bound tariffs generate effective market access even when bound rates are above current and long...

  5. Simultaneous Iliac Vein Bovine Pericardial Patch Venoplasty and Creation of PTFE Lower Limb Arteriovenous Fistula Graft for Rescue Vascular Access.

    Science.gov (United States)

    Meecham, Lewis; Fisher, Owain; Kirby, George; Evans, Richard; Buxton, Pauline; Legge, Jocelyn; Rajagopalan, Sriram; Asquith, John; Pherwani, Arun

    2016-10-01

    We present a case of external iliac vein patch venoplasty to accommodate rescue vascular access via a polytetrafluoroethylene loop arteriovenous fistula graft (AVG) for a patient with multiple central venous stenoses. A 35-year-old female with anti-glomerular basement membrane antibody disease required rescue vascular access for hemodialysis. Repeated occlusion and/or thrombosis of long-term central venous access cannulae, to facilitate dialysis, had caused stenosis of brachiocephalic veins: right external iliac vein and occlusion of the left common iliac vein. A previous right brachiobasilic fistula had occluded within 1 year. No other upper limb options for arteriovenous fistula (AVF) were available. A right external iliac vein bovine patch angioplasty concurrently with a polytetrafluoroethylene AV graft between common femoral artery and common femoral vein was performed to restore venous patency and allow rescue dialysis access. At 3-year follow-up, the fistula remains widely patent with 2 L/min flow rates and no recurrent stenosis to the treated iliac vein. She has not required any further surgical or interventional radiological procedures to maintain fistula or central venous patency. Central venous stenosis or occlusion is common for patients requiring dialysis, especially those with multiple previous long-term central venous cannulations. If restriction of outflow is present, AVF may fail. Venous patch angioplasty in these cases is a successful technique, allowing AVF formation and long-term patency. Central venous stenosis can be treated successfully with patch venoplasty to accommodate AVF/AVG formation for rescue vascular access; this is a potentially lifesaving intervention for patients requiring dialysis. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. Mouse epileptic seizure detection with multiple EEG features and simple thresholding technique

    Science.gov (United States)

    Tieng, Quang M.; Anbazhagan, Ashwin; Chen, Min; Reutens, David C.

    2017-12-01

    Objective. Epilepsy is a common neurological disorder characterized by recurrent, unprovoked seizures. The search for new treatments for seizures and epilepsy relies upon studies in animal models of epilepsy. To capture data on seizures, many applications require prolonged electroencephalography (EEG) with recordings that generate voluminous data. The desire for efficient evaluation of these recordings motivates the development of automated seizure detection algorithms. Approach. A new seizure detection method is proposed, based on multiple features and a simple thresholding technique. The features are derived from chaos theory, information theory and the power spectrum of EEG recordings and optimally exploit both linear and nonlinear characteristics of EEG data. Main result. The proposed method was tested with real EEG data from an experimental mouse model of epilepsy and distinguished seizures from other patterns with high sensitivity and specificity. Significance. The proposed approach introduces two new features: negative logarithm of adaptive correlation integral and power spectral coherence ratio. The combination of these new features with two previously described features, entropy and phase coherence, improved seizure detection accuracy significantly. Negative logarithm of adaptive correlation integral can also be used to compute the duration of automatically detected seizures.

  7. Multiple photon resonances

    International Nuclear Information System (INIS)

    Elliott, C.J.; Feldman, B.J.

    1979-02-01

    A detailed theoretical analysis is presented of the interaction of intense near-resonant monochromatic radiation with an N-level anharmonic oscillator. In particular, the phenomenon of multiple photon resonance, the process by which an N-level system resonantly absorbs two or more photons simultaneously, is investigated. Starting from the Schroedinger equation, diagrammatic techniques are developed that allow the resonant process to be analyzed quantitatively, in analogy with well-known two-level coherent phenomena. In addition, multiple photon Stark shifts of the resonances, shifts absent in two-level theory, are obtained from the diagrams. Insights into the nature of multiple photon resonances are gained by comparing the quantum mechanical system with classical coupled pendulums whose equations of motion possess identical eigenvalues and eigenvectors. In certain limiting cases, including that of the resonantly excited N-level harmonic oscillator and that of the equally spaced N-level system with equal matrix elements, analytic results are derived. The influence of population relaxation and phase-disrupting collisions on the multiple photon process are also analyzed, the latter by extension of the diagrammatic technique to the density matrix equations of motion. 11 figures

  8. Characterization of microenvironment polarity and solvent accessibility of polysilsesquioxane xerogels by the fluorescent probe technique

    Energy Technology Data Exchange (ETDEWEB)

    Shea, K.J.; Zhu, H.D. [Univ., of California, Irvine, CA (United States). Dept. of Chemistry; Loy, D.A. [Sandia National Labs., Albuquerque, NM (United States)

    1995-05-01

    Poly (1, 4 bis(triethoxysilyl)benzene) (PTESB), a representative of a new type of organic-inorganic hybrid polysilsesquioxane material, was characterized by fluorescence spectroscopy for both microenvironmental polarity and solvent accessibility. A dansyl fluorescent molecule was incorporated into the bulk as well as onto the surface of both PTESB and silica materials. Information about the microenvironment polarity and accessibility of PTESB to various organic solvents was determined and compared to that of silica gel. This study found that both the bulk and surface of PTESB are less polar than that of the silica material. The silica material is accessible to polar solvents and water, while YMB is accessible to polar solvents but not to water. The hydrophobicity of PTESB differentiates these new materials from silica gel.

  9. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. Scope of Contributions This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis Manuscript Submission To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  10. Open laparoscopic access for primary trocar using modified Hasson's technique

    International Nuclear Information System (INIS)

    Khan, Abdul R.

    2003-01-01

    To describe the safety and efficacy of open laproscopic acess for the primary trocar using modified Hasson's technique for laparoscopic surgery in children. All 100 laproscopic procedures performed at King Khalid University Hospital, Riyadh,Kingdom of Saudi Arabia, between January 1999 and April 2001 using modified Hasson's technique were prospectively evaluated.They were aged from 3 months to 12 years. One hunred children who had open laproscopic acess during the study period had diagnosis of acute appendicitis (n=57), impalpable undescended tests (n=29), gallstones (n=5) , varicocele (n==3) and others (n=6). Three children had minor operativecomplications (2cases of pre-peritoneal placement of trocar which were recognized immediately and the other had omental bleedigs). Two children had post-operative complications related to primary acess (one port infection and other port site hematoma). Acess to abdominal cavity was generally secured in in 3-12 minutes (average4+-2). Clincal follow-up ranged from 3-14 months. Open laprascopic acess using modified Hasson's technique was associated with no major or life-threatening complication. Minor operative (3%) and post-operative(2%) complications occured in the first 100 cases. Modified Hasson's technique for primary trocar acessing the abdominal cavity is a safe and effective method, and is recommended for all laproscopic procedures in chidren. (author)

  11. Does Technical Success of Angioplasty in Dysfunctional Hemodialysis Accesses Correlate with Access Patency?

    Energy Technology Data Exchange (ETDEWEB)

    Sidhu, Arshdeep; Tan, Kong T.; Noel-Lamy, Maxime; Simons, Martin E.; Rajan, Dheeraj K., E-mail: dheeraj.rajan@uhn.ca [University Health Network, University of Toronto, Division of Vascular and Interventional Radiology, Peter Munk Cardiac Center (Canada)

    2016-10-15

    PurposeTo study if <30 % residual stenosis post angioplasty (PTA) correlates with primary access circuit patency, and if any variables predict technical success.Materials and MethodsA prospective observational study was performed between January 2009 and December 2012, wherein 76 patients underwent 154 PTA events in 56 prosthetic grafts (AVG) and 98 autogenous fistulas (AVF). Data collected included patient age, gender, lesion location and laterality, access type and location, number of prior interventions, and transonic flow rates pre- and postintervention. Impact of technical outcome on access patency was assessed. Univariate logistic regression was used to assess the impact of variables on technical success with significant factors assessed with a multiple variable model.ResultsTechnical success rates of PTA in AVFs and AVGs were 79.6 and 76.7 %, respectively. Technical failures of PTA were associated with an increased risk of patency loss among circuits with AVFs (p < 0.05), but not with AVGs (p = 0.7). In AVFs, primary access patency rates between technical successes and failures at three and 6 months were 74.4 versus 61.9 % (p = 0.3) and 53.8 versus 23.8 % (p < 0.05), respectively. In AVGs, primary access patency rates between technical successes and failures at three and six months were 72.1 versus 53.9 % (p = 0.5) and 33.6 versus 38.5 % (p = 0.8), respectively. Transonic flow rates did not significantly differ among technically successful or failed outcomes at one or three months.ConclusionTechnical failures of PTA had a significant impact on access patency among AVFs with a trend toward poorer access patency within AVGs.

  12. Does Technical Success of Angioplasty in Dysfunctional Hemodialysis Accesses Correlate with Access Patency?

    International Nuclear Information System (INIS)

    Sidhu, Arshdeep; Tan, Kong T.; Noel-Lamy, Maxime; Simons, Martin E.; Rajan, Dheeraj K.

    2016-01-01

    PurposeTo study if <30 % residual stenosis post angioplasty (PTA) correlates with primary access circuit patency, and if any variables predict technical success.Materials and MethodsA prospective observational study was performed between January 2009 and December 2012, wherein 76 patients underwent 154 PTA events in 56 prosthetic grafts (AVG) and 98 autogenous fistulas (AVF). Data collected included patient age, gender, lesion location and laterality, access type and location, number of prior interventions, and transonic flow rates pre- and postintervention. Impact of technical outcome on access patency was assessed. Univariate logistic regression was used to assess the impact of variables on technical success with significant factors assessed with a multiple variable model.ResultsTechnical success rates of PTA in AVFs and AVGs were 79.6 and 76.7 %, respectively. Technical failures of PTA were associated with an increased risk of patency loss among circuits with AVFs (p < 0.05), but not with AVGs (p = 0.7). In AVFs, primary access patency rates between technical successes and failures at three and 6 months were 74.4 versus 61.9 % (p = 0.3) and 53.8 versus 23.8 % (p < 0.05), respectively. In AVGs, primary access patency rates between technical successes and failures at three and six months were 72.1 versus 53.9 % (p = 0.5) and 33.6 versus 38.5 % (p = 0.8), respectively. Transonic flow rates did not significantly differ among technically successful or failed outcomes at one or three months.ConclusionTechnical failures of PTA had a significant impact on access patency among AVFs with a trend toward poorer access patency within AVGs.

  13. A global workspace model for phenomenal and access consciousness.

    Science.gov (United States)

    Raffone, Antonino; Pantani, Martina

    2010-06-01

    Both the global workspace theory and Block's distinction between phenomenal and access consciousness, are central in the current debates about consciousness and the neural correlates of consciousness. In this article, a unifying global workspace model for phenomenal and access consciousness is proposed. In the model, recurrent neural interactions take place in distinct yet interacting access and phenomenal brain loops. The effectiveness of feedback signaling onto sensory cortical maps is emphasized for the neural correlates of phenomenal consciousness. Two forms of top-down attention, attention for perception and attention for access, play differential roles for phenomenal and access consciousness. The model is implemented in a neural network form, with the simulation of single and multiple visual object processing, and of the attentional blink. 2010 Elsevier Inc. All rights reserved.

  14. Understanding and improving access to prompt and effective malaria treatment and care in rural Tanzania: the ACCESS Programme.

    Science.gov (United States)

    Hetzel, Manuel W; Iteba, Nelly; Makemba, Ahmed; Mshana, Christopher; Lengeler, Christian; Obrist, Brigit; Schulze, Alexander; Nathan, Rose; Dillip, Angel; Alba, Sandra; Mayumana, Iddy; Khatib, Rashid A; Njau, Joseph D; Mshinda, Hassan

    2007-06-29

    Prompt access to effective treatment is central in the fight against malaria. However, a variety of interlinked factors at household and health system level influence access to timely and appropriate treatment and care. Furthermore, access may be influenced by global and national health policies. As a consequence, many malaria episodes in highly endemic countries are not treated appropriately. The ACCESS Programme aims at understanding and improving access to prompt and effective malaria treatment and care in a rural Tanzanian setting. The programme's strategy is based on a set of integrated interventions, including social marketing for improved care seeking at community level as well as strengthening of quality of care at health facilities. This is complemented by a project that aims to improve the performance of drug stores. The interventions are accompanied by a comprehensive set of monitoring and evaluation activities measuring the programme's performance and (health) impact. Baseline data demonstrated heterogeneity in the availability of malaria treatment, unavailability of medicines and treatment providers in certain areas as well as quality problems with regard to drugs and services. The ACCESS Programme is a combination of multiple complementary interventions with a strong evaluation component. With this approach, ACCESS aims to contribute to the development of a more comprehensive access framework and to inform and support public health professionals and policy-makers in the delivery of improved health services.

  15. Design and simulations of a spectral efficient optical code division multiple access scheme using alternated energy differentiation and single-user soft-decision demodulation

    Science.gov (United States)

    A. Garba, Aminata

    2017-01-01

    This paper presents a new approach to optical Code Division Multiple Access (CDMA) network transmission scheme using alternated amplitude sequences and energy differentiation at the transmitters to allow concurrent and secure transmission of several signals. The proposed system uses error control encoding and soft-decision demodulation to reduce the multi-user interference at the receivers. The design of the proposed alternated amplitude sequences, the OCDMA energy modulators and the soft decision, single-user demodulators are also presented. Simulation results show that the proposed scheme allows achieving spectral efficiencies higher than several reported results for optical CDMA and much higher than the Gaussian CDMA capacity limit.

  16. IMPLANTABLE RESONATORS – A TECHNIQUE FOR REPEATED MEASUREMENT OF OXYGEN AT MULTIPLE DEEP SITES WITH IN VIVO EPR

    Science.gov (United States)

    Li, Hongbin; Hou, Huagang; Sucheta, Artur; Williams, Benjamin B.; Lariviere, Jean P.; Khan, Nadeem; Lesniewski, Piotr N.; Swartz, Harold M.

    2013-01-01

    EPR oximetry using implantable resonators allow measurements at much deeper sites than are possible with surface resonators (> 80 mm vs. 10 mm) and have greater sensitivity at any depth. We report here the development of an improvement of the technique that now enables us to obtain the information from multiple sites and at a variety of depths. The measurements from the various sites are resolved using a simple magnetic field gradient. In the rat brain multi-probe implanted resonators measured pO2 at several sites simultaneously for over 6 months to record under normoxic, hypoxic and hyperoxic conditions. This technique also facilitates measurements in moving parts of the animal such as the heart, because the orientation of the paramagnetic material relative to the sensitive small loop is not altered by the motion. The measured response is very fast, enabling measurements in real time of physiological and pathological changes such as experimental cardiac ischemia in the mouse heart. The technique also is quite useful for following changes in tumor pO2, including applications with simultaneous measurements in tumors and adjacent normal tissues. PMID:20204802

  17. History of the Buttonhole Technique.

    Science.gov (United States)

    Misra, Madhukar

    2015-01-01

    The constant side method of access cannulation in hemodialysis, popularly known as the 'buttonhole' method, has an interesting history. Dr. Zbylut J. Twardowski, a Polish nephrologist, discovered this technique by pure serendipity in 1972. A patient with a complicated vascular access history and limited options for cannulation was repeatedly 'stuck' at the same sites by a nurse. Soon it was noticed that the cannulation at the same spot became easier with time. Since the needles were being reused, the sharpness of the needles decreased with time and the bluntness of the needle seemed to minimize the damage to the cannulation tract (another serendipity!). This method soon became popular among patients, and many patients started using this technique. This chapter traces the invention of this technique and its subsequent development following Dr. Twardowski's emigration to the USA. © 2015 S. Karger AG, Basel.

  18. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in

  19. KBLAS: An Optimized Library for Dense Matrix-Vector Multiplication on GPU Accelerators

    KAUST Repository

    Abdelfattah, Ahmad

    2016-05-11

    KBLAS is an open-source, high-performance library that provides optimized kernels for a subset of Level 2 BLAS functionalities on CUDA-enabled GPUs. Since performance of dense matrix-vector multiplication is hindered by the overhead of memory accesses, a double-buffering optimization technique is employed to overlap data motion with computation. After identifying a proper set of tuning parameters, KBLAS efficiently runs on various GPU architectures while avoiding code rewriting and retaining compliance with the standard BLAS API. Another optimization technique allows ensuring coalesced memory access when dealing with submatrices, especially for high-level dense linear algebra algorithms. All KBLAS kernels have been leveraged to a multi-GPU environment, which requires the introduction of new APIs. Considering general matrices, KBLAS is very competitive with existing state-of-the-art kernels and provides a smoother performance across a wide range of matrix dimensions. Considering symmetric and Hermitian matrices, the KBLAS performance outperforms existing state-of-the-art implementations on all matrix sizes and achieves asymptotically up to 50% and 60% speedup against the best competitor on single GPU and multi-GPUs systems, respectively. Performance results also validate our performance model. A subset of KBLAS highperformance kernels have been integrated into NVIDIA\\'s standard BLAS implementation (cuBLAS) for larger dissemination, starting from version 6.0. © 2016 ACM.

  20. Iterative Fusion of Distributed Decisions over the Gaussian Multiple-Access Channel Using Concatenated BCH-LDGM Codes

    Directory of Open Access Journals (Sweden)

    Crespo PedroM

    2011-01-01

    Full Text Available This paper focuses on the data fusion scenario where nodes sense and transmit the data generated by a source to a common destination, which estimates the original information from more accurately than in the case of a single sensor. This work joins the upsurge of research interest in this topic by addressing the setup where the sensed information is transmitted over a Gaussian Multiple-Access Channel (MAC. We use Low Density Generator Matrix (LDGM codes in order to keep the correlation between the transmitted codewords, which leads to an improved received Signal-to-Noise Ratio (SNR thanks to the constructive signal addition at the receiver front-end. At reception, we propose a joint decoder and estimator that exchanges soft information between the LDGM decoders and a data fusion stage. An error-correcting Bose, Ray-Chaudhuri, Hocquenghem (BCH code is further applied suppress the error floor derived from the ambiguity of the MAC channel when dealing with correlated sources. Simulation results are presented for several values of and diverse LDGM and BCH codes, based on which we conclude that the proposed scheme outperforms significantly (by up to 6.3 dB the suboptimum limit assuming separation between Slepian-Wolf source coding and capacity-achieving channel coding.

  1. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  2. Treatment of severe mitral regurgitation caused by lesions in both leaflets using multiple mitral valve plasty techniques in a small dog

    Directory of Open Access Journals (Sweden)

    Satoko Yokoyama

    2017-11-01

    Full Text Available Mitral valve plasty (MVP is preferred over mitral valve replacement (MVR for mitral regurgitation in humans because of its favorable effect on quality of life. In small dogs, it is difficult to repair multiple lesions in both leaflets using MVP. Herein, we report a case of severe mitral regurgitation caused by multiple severe lesions in the posterior leaflet (PL in a mixed Chihuahua. Initially, we had planned MVR with an artificial valve. However, MVP combined with artificial chordal reconstruction of both leaflets, semicircular suture annuloplasty, and valvuloplasty using a newly devised direct scallop suture for the PL was attempted in this dog. The dog recovered well and showed no adverse cardiac signs, surviving two major operations. The dog died 4 years and 10 months after the MVP due to non-cardiovascular disease. Our additional technique of using a direct scallop suture seemed useful for PL repair involving multiple scallops in a small dog.

  3. DEPTH - OBSERVATION and Other Data from MULTIPLE SHIPS (NODC Accession 9700185)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — STD and other data were collected from the Mediterranean Sea and other locations from multiple ships. Data include profiles of temperature, salinity, and oxygen...

  4. On the scalability of uncoordinated multiple access for the Internet of Things

    KAUST Repository

    Chisci, Giovanni

    2017-11-16

    The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However, LPWA networks rely on variations of uncoordinated spectrum access, either for data transmissions or scheduling requests, thus imposing a scalability problem to the IoT. This paper presents a novel spatiotemporal model to study the scalability of the ALOHA medium access. In particular, the developed mathematical model relies on stochastic geometry and queueing theory to account for spatial and temporal attributes of the IoT. To this end, the scalability of the ALOHA is characterized by the percentile of IoT devices that can be served while keeping their queues stable. The results highlight the scalability problem of ALOHA and quantify the extend to which ALOHA can support in terms of number of devices, traffic requirement, and transmission rate.

  5. Assessing communication accessibility in the university classroom: towards a goal of universal hearing accessibility.

    Science.gov (United States)

    Cheesman, Margaret F; Jennings, Mary Beth; Klinger, Lisa

    2013-01-01

    Measures of accessibility typically focus on the physical environment and aspects relating to getting into and out of spaces. The transient sound environment is less well characterized in typical accessibility measures. Hearing accessibility measures can be based upon physical indices or functional assessment. The physical measures are indices that use signal-to-noise ratios to evaluate audibility while the functional assessment tool adopts universal design for hearing (UDH) principles derived from principles of universal design. The UDH principles include (1) Optimization of the hearing environment for all; (2) Optimization of interactions between persons and objects to promote better hearing in an environment; (3) Optimization of opportunities for people to have multiple choices of interactions with one another; (4) Optimization of opportunities for people to perform different activities in and across environments; (5) Optimization of opportunities for people to have safe, private, and secure use of the environment while minimizing distraction, interference, or cognitive loading; and (6) Optimization of opportunities for people to use the environment without extra steps for hearing access during preparatory, use and/or after use phases. This paper compares the two approaches using case examples from post-secondary classrooms in order to describe the potential advantages and limitations of each.

  6. On the golden road : Open access publishing in particle physics

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    The particle physics community has over the last 15 years achieved so-called full green open access through the wide dissemination ofpreprints via arXiv, a central subject repository managed by Cornell University. However, green open access does not alleviate the economical difficulties of libraries as these still are expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold open access by converting a set of the existing core journals to open access. A working party works now to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open access Publishing in Particle Physics). This consortium will engage with publishers towards building a sustainable model for open access publishing. In this model, subscription fees from multiple institutions are replaced with contracts with publishers of open access journals where the SCOAP3 consort...

  7. On the golden road Open access publishing in particle physics

    CERN Document Server

    CERN. Geneva; Yeomans, Joanne

    2007-01-01

    The particle physics community has over the last 15 years achieved so-called full green open access through the wide dissemination ofpreprints via arXiv, a central subject repository managed by Cornell University. However, green open access does not alleviate the economical difficulties of libraries as these still are expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold open access by converting a set of the existing core journals to open access. A working party works now to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open access Publishing in Particle Physics). This consortium will engage with publishers towards building a sustainable model for open access publishing. In this model, subscription fees from multiple institutions are replaced with contracts with publishers of open access journals where the SCOAP3 consorti...

  8. PENERAPAN MULTIPLE INTELEGENSI DALAM KEGIATAN BELAJAR-MENGAJAR

    Directory of Open Access Journals (Sweden)

    Nur Samsiyah

    2016-11-01

    Full Text Available Multiple intelegence is integrated inteligence possessed by anyone. Intelligence has been difined as the composition of ability and skill. Multiple intelligence consists of nine types of intelligence, i.e. linguistic, logic-mathematic, spatial, musical, kinesthetic, interpersonal, intrapersonal, naturalistic and extencial intelligence, each of which has its own characteristics. Multiple intelligence learning strategy empowers students to access information through intelligence that they do have respectively. To activate the students’ multiple intelligence, teachers can train the students to listening, reading, writing and balanced-intelligence. This strategy can be adopted by teachers with ubique focus for each student with his/ her most outstanding intelligence.

  9. Treatment of hand ischemia following angioaccess surgery using the distal revascularization interval-ligation technique with preservation of vascular access: description of an 18-case series.

    Science.gov (United States)

    Sessa, Carmine; Riehl, Gregory; Porcu, Paolo; Pichot, Olivier; Palacin, Pedro; Maghlaoua, Mohamed; Magne, Jean-Luc

    2004-11-01

    Hand ischemia is a rare complication of angioaccess surgery for hemodialysis. Management usually requires ligation of the arteriovenous fistula (AVF). The purpose of this report is to describe our experience with the use of the distal revascularization interval-ligation (DRIL) technique for treatment of ischemia without ligation of the AVF. From January 1999 to September 2002, the DRIL technique was used to treat 18 patients (10 men, 8 women, 10 diabetic patients) with severe paresthesia of the hand (n = 9) and finger necrosis (n = 10). The AVF was located at the elbow in 16 patients and at the wrist in 2 patients. Mean flow distal to the AVF was less than 10 mL in 5 patients, less than 5 mL in 10, and unmeasurable in 3. The conduit used for all DRIL arterial bypasses, including 15 brachiobrachial bypasses, 1 axillobrachial bypass, 1 brachioradial bypass, and 1 radioradial bypass, was the great saphenous vein graft. Trophic manifestations required finger amputation in five patients, pulpar necrosis resection in four, and transmetacarpal amputation of the index finger in one patient. Symptoms disappeared in 13 patients (73%) and improved in 5 (27%). The time required for healing of finger amputations and trophic manifestations ranged from 15 days to 2 months. Mean arterial flow through the DRIL bypass was 50 mL/min (range, 20-90 mL/min). With a mean follow-up interval of 16 months (range, 5-48 months), primary patency of the DRIL artery bypass and AVF was 94% and the limb salvage rate was 100%. The DRIL technique is the most effective procedure for treatment of angioaccess-induced hand ischemia. This technique can be used to achieve persistent relief of symptoms with continued access patency. The DRIL artery bypass improves vacularization of the hand, and ligature of the artery stops the vascular steal without affecting hemodialysis access. The DRIL technique should be proposed as first-line treatment for hand ischemia due to AVF for hemodialysis.

  10. Developing an EarthCube Governance Structure for Big Data Preservation and Access

    Science.gov (United States)

    Leetaru, H. E.; Leetaru, K. H.

    2012-12-01

    The underlying vision of the NSF EarthCube initiative is of an enduring resource serving the needs of the earth sciences for today and the future. We must therefore view this effort through the lens of what the earth sciences will need tomorrow and on how the underlying processes of data compilation, preservation, and access interplay with the scientific processes within the communities EarthCube will serve. Key issues that must be incorporated into the EarthCube governance structure include authentication, retrieval, and unintended use cases, the emerging role of whole-corpus data mining, and how inventory, citation, and archive practices will impact the ability of scientists to use EarthCube's collections into the future. According to the National Academies, the US federal government spends over $140 billion dollars a year in support of the nation's research base. Yet, a critical issue confronting all of the major scientific disciplines in building upon this investment is the lack of processes that guide how data are preserved for the long-term, ensuring that studies can be replicated and that experimental data remains accessible as new analytic methods become available or theories evolve. As datasets are used years or even decades after their creation, far richer metadata is needed to describe the underlying simulation, smoothing algorithms or bounding parameters of the data collection process. This is even truer as data are increasingly used outside their intended disciplines, as geoscience researchers apply algorithms from one discipline to datasets from another, where their analytical techniques may make extensive assumptions about the data. As science becomes increasingly interdisciplinary and emerging computational approaches begin applying whole-corpus methodologies and blending multiple archives together, we are facing new data access modalities distinct from the needs of the past, drawing into focus the question of centralized versus distributed

  11. Crowdfunding and the Expansion of Access to Startup Capital

    OpenAIRE

    Kurt Stanberry; Forrest Aven

    2014-01-01

    This paper analyzes recent developments in crowdfunding, a new financing technique to improve access to capital. The United States Congress and President Obama, in a rare show of bipartisan action, passed the JOBS Act in 2012 (the Jumpstart Our Business Startups Act). The law is designed to stimulate economic growth and expand job creation by improving access to public capital markets for emerging growth companies. Furthermore, the US is not the only nation attempting to expand access to capi...

  12. UNIVERSAL INTERFACE TO MULTIPLE OPERATIONS SYSTEMS

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    1986-01-01

    Alternative ways to provide access to operations systems that maintain, test, and configure complex telephone networks are being explored. It is suggested that a universal interface that provides simultaneous access to multiple operations systems that execute in different hardware and software...... environments, can be provided by an architecture that is based on the separation of presentation issues from application issues and on a modular interface management system that consists of a virtual user interface, physical user interface, and interface agent. The interface functionality that is needed...

  13. [Difference between perinatal mortality in multiple pregnancies obtained spontaneously versus assisted reproduction].

    Science.gov (United States)

    del Rayo Rivas-Ortiz, Yazmín; Hernández-Herrera, Ricardo Jorge

    2010-06-01

    Recently assisted reproduction techniques are more common, which increases multiple pregnancies and adverse perinatal outcomes. Some authors report increased mortality in multiple pregnancies products obtained by techniques of assisted reproduction vs. conceived spontaneously, although other authors found no significant difference. To evaluate mortality rate of multiple pregnancies comparing those obtained by assisted reproduction vs. spontaneous conception. Retrospective, observational and comparative study. We included pregnant women with 3 or more products that went to the Unidad Médica de Alta Especialidad No. 23, IMSS, in Monterrey, NL (Mexico), between 2002-2008. We compared the number of complicated pregnancies and dead products obtained by a technique of assisted reproduction vs. spontaneous. 68 multiple pregnancies were included. On average, spontaneously conceived fetuses had more weeks of gestation and more birth weight than those achieved by assisted reproduction techniques (p = ns). 20.5% (14/68) of multiple pregnancies had one or more fatal events: 10/40 (25%) by assisted reproduction techniques vs. 4/28 (14%) of spontaneous multiple pregnancies (p = 0.22). 21/134 (16%) of the products conceived by assisted reproduction techniques and 6/88 (7%) of spontaneous (p assisted reproduction and 21% of the cases had one or more fatal events (11% more in pregnancies achieved by assisted reproduction techniques). 12% of the products of multiple pregnancies died (9% more in those obtained by a technique of assisted reproduction).

  14. Understanding and improving access to prompt and effective malaria treatment and care in rural Tanzania: the ACCESS Programme

    Directory of Open Access Journals (Sweden)

    Alba Sandra

    2007-06-01

    Full Text Available Abstract Background Prompt access to effective treatment is central in the fight against malaria. However, a variety of interlinked factors at household and health system level influence access to timely and appropriate treatment and care. Furthermore, access may be influenced by global and national health policies. As a consequence, many malaria episodes in highly endemic countries are not treated appropriately. Project The ACCESS Programme aims at understanding and improving access to prompt and effective malaria treatment and care in a rural Tanzanian setting. The programme's strategy is based on a set of integrated interventions, including social marketing for improved care seeking at community level as well as strengthening of quality of care at health facilities. This is complemented by a project that aims to improve the performance of drug stores. The interventions are accompanied by a comprehensive set of monitoring and evaluation activities measuring the programme's performance and (health impact. Baseline data demonstrated heterogeneity in the availability of malaria treatment, unavailability of medicines and treatment providers in certain areas as well as quality problems with regard to drugs and services. Conclusion The ACCESS Programme is a combination of multiple complementary interventions with a strong evaluation component. With this approach, ACCESS aims to contribute to the development of a more comprehensive access framework and to inform and support public health professionals and policy-makers in the delivery of improved health services.

  15. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  16. ACM-based automatic liver segmentation from 3-D CT images by combining multiple atlases and improved mean-shift techniques.

    Science.gov (United States)

    Ji, Hongwei; He, Jiangping; Yang, Xin; Deklerck, Rudi; Cornelis, Jan

    2013-05-01

    In this paper, we present an autocontext model(ACM)-based automatic liver segmentation algorithm, which combines ACM, multiatlases, and mean-shift techniques to segment liver from 3-D CT images. Our algorithm is a learning-based method and can be divided into two stages. At the first stage, i.e., the training stage, ACM is performed to learn a sequence of classifiers in each atlas space (based on each atlas and other aligned atlases). With the use of multiple atlases, multiple sequences of ACM-based classifiers are obtained. At the second stage, i.e., the segmentation stage, the test image will be segmented in each atlas space by applying each sequence of ACM-based classifiers. The final segmentation result will be obtained by fusing segmentation results from all atlas spaces via a multiclassifier fusion technique. Specially, in order to speed up segmentation, given a test image, we first use an improved mean-shift algorithm to perform over-segmentation and then implement the region-based image labeling instead of the original inefficient pixel-based image labeling. The proposed method is evaluated on the datasets of MICCAI 2007 liver segmentation challenge. The experimental results show that the average volume overlap error and the average surface distance achieved by our method are 8.3% and 1.5 m, respectively, which are comparable to the results reported in the existing state-of-the-art work on liver segmentation.

  17. Use of modified lip repositioning technique associated with esthetic crown lengthening for treatment of excessive gingival display: A case report of multiple etiologies

    Science.gov (United States)

    Mantovani, Matheus Bortoluzzi; Souza, Eduardo Clemente; Marson, Fabiano Carlos; Corrêa, Giovani Oliveira; Progiante, Patrícia Saram; Silva, Cléverson Oliveira

    2016-01-01

    Excessive gingival display during smile can result in compromised esthetics. This study aims to report a case of excessive gingival display with multiple etiologies treated by means of modified lip repositioning technique associated with esthetic crown lengthening. A 23-year-old female patient, with 5-mm gingival display during smile caused by altered passive eruption and hypermobility of the upper lip, underwent the modified lip repositioning technique associated with gingivectomy followed by flap elevation and ostectomy/osteoplasty. Seven months after the second procedure, the patient had her esthetic complaint solved appearing stable in the observation period. The modified lip repositioning technique is an effective procedure employed to reduce gingival display and when associated with esthetic clinical crown lengthening, can appropriately treat cases of gummy smile. PMID:27041845

  18. A comparison of multiple regression and neural network techniques for mapping in situ pCO2 data

    International Nuclear Information System (INIS)

    Lefevre, Nathalie; Watson, Andrew J.; Watson, Adam R.

    2005-01-01

    Using about 138,000 measurements of surface pCO 2 in the Atlantic subpolar gyre (50-70 deg N, 60-10 deg W) during 1995-1997, we compare two methods of interpolation in space and time: a monthly distribution of surface pCO 2 constructed using multiple linear regressions on position and temperature, and a self-organizing neural network approach. Both methods confirm characteristics of the region found in previous work, i.e. the subpolar gyre is a sink for atmospheric CO 2 throughout the year, and exhibits a strong seasonal variability with the highest undersaturations occurring in spring and summer due to biological activity. As an annual average the surface pCO 2 is higher than estimates based on available syntheses of surface pCO 2 . This supports earlier suggestions that the sink of CO 2 in the Atlantic subpolar gyre has decreased over the last decade instead of increasing as previously assumed. The neural network is able to capture a more complex distribution than can be well represented by linear regressions, but both techniques agree relatively well on the average values of pCO 2 and derived fluxes. However, when both techniques are used with a subset of the data, the neural network predicts the remaining data to a much better accuracy than the regressions, with a residual standard deviation ranging from 3 to 11 μatm. The subpolar gyre is a net sink of CO 2 of 0.13 Gt-C/yr using the multiple linear regressions and 0.15 Gt-C/yr using the neural network, on average between 1995 and 1997. Both calculations were made with the NCEP monthly wind speeds converted to 10 m height and averaged between 1995 and 1997, and using the gas exchange coefficient of Wanninkhof

  19. Access to electronic information resources by students of federal ...

    African Journals Online (AJOL)

    The paper discusses access to electronic information resources by students of Federal Colleges of Education in Eha-Amufu and Umunze. Descriptive survey design was used to investigate sample of 526 students. Sampling technique used was a Multi sampling technique. Data for the study were generated using ...

  20. Efficient accesses of data structures using processing near memory

    Science.gov (United States)

    Jayasena, Nuwan S.; Zhang, Dong Ping; Diez, Paula Aguilera

    2018-05-22

    Systems, apparatuses, and methods for implementing efficient queues and other data structures. A queue may be shared among multiple processors and/or threads without using explicit software atomic instructions to coordinate access to the queue. System software may allocate an atomic queue and corresponding queue metadata in system memory and return, to the requesting thread, a handle referencing the queue metadata. Any number of threads may utilize the handle for accessing the atomic queue. The logic for ensuring the atomicity of accesses to the atomic queue may reside in a management unit in the memory controller coupled to the memory where the atomic queue is allocated.

  1. Retrograde Tibiopedal Access as a Bail-Out Procedure for Endovascular Intervention Complications

    Directory of Open Access Journals (Sweden)

    Ahmed Amro

    2016-01-01

    Full Text Available Introduction. Retrograde pedal access has been well described in the literature as a secondary approach for limb salvage in critical limb ischemia (CLI patients. In this manuscript we are presenting a case where retrograde tibiopedal access has been used as a bail-out procedure for the management of superficial femoral artery (SFA intervention complications. Procedure/Technique. After development of a perforation while trying to cross the totally occluded mid SFA using the conventional CFA access, we were able to cross the mid SFA lesion after accessing the posterior tibial artery in a retrograde fashion and delivered a self-expanding stent which created a flap that sealed the perforation without the need for covered stent. Conclusion. Retrograde tibiopedal access is a safe and effective approach for delivery of stents from the distal approach and so can be used as a bail-out technique for SFA perforation.

  2. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    Science.gov (United States)

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  3. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  4. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Science.gov (United States)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  5. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. MULTIPLE OBJECTS

    Directory of Open Access Journals (Sweden)

    A. A. Bosov

    2015-04-01

    Full Text Available Purpose. The development of complicated techniques of production and management processes, information systems, computer science, applied objects of systems theory and others requires improvement of mathematical methods, new approaches for researches of application systems. And the variety and diversity of subject systems makes necessary the development of a model that generalizes the classical sets and their development – sets of sets. Multiple objects unlike sets are constructed by multiple structures and represented by the structure and content. The aim of the work is the analysis of multiple structures, generating multiple objects, the further development of operations on these objects in application systems. Methodology. To achieve the objectives of the researches, the structure of multiple objects represents as constructive trio, consisting of media, signatures and axiomatic. Multiple object is determined by the structure and content, as well as represented by hybrid superposition, composed of sets, multi-sets, ordered sets (lists and heterogeneous sets (sequences, corteges. Findings. In this paper we study the properties and characteristics of the components of hybrid multiple objects of complex systems, proposed assessments of their complexity, shown the rules of internal and external operations on objects of implementation. We introduce the relation of arbitrary order over multiple objects, we define the description of functions and display on objects of multiple structures. Originality.In this paper we consider the development of multiple structures, generating multiple objects.Practical value. The transition from the abstract to the subject of multiple structures requires the transformation of the system and multiple objects. Transformation involves three successive stages: specification (binding to the domain, interpretation (multiple sites and particularization (goals. The proposed describe systems approach based on hybrid sets

  7. Enhanced multimedia content access and exploitation using semantic speech retrieval

    NARCIS (Netherlands)

    Ordelman, Roeland J.F.; de Jong, Franciska M.G.; Larson, Martha

    Techniques for automatic annotation of spoken content making use of speech recognition technology have long been characterized as holding unrealized promise to provide access to archives inundated with undisclosed multimedia material. This paper provides an overview of techniques and trends in

  8. Diffusion accessibility as a method for visualizing macromolecular surface geometry.

    Science.gov (United States)

    Tsai, Yingssu; Holton, Thomas; Yeates, Todd O

    2015-10-01

    Important three-dimensional spatial features such as depth and surface concavity can be difficult to convey clearly in the context of two-dimensional images. In the area of macromolecular visualization, the computer graphics technique of ray-tracing can be helpful, but further techniques for emphasizing surface concavity can give clearer perceptions of depth. The notion of diffusion accessibility is well-suited for emphasizing such features of macromolecular surfaces, but a method for calculating diffusion accessibility has not been made widely available. Here we make available a web-based platform that performs the necessary calculation by solving the Laplace equation for steady state diffusion, and produces scripts for visualization that emphasize surface depth by coloring according to diffusion accessibility. The URL is http://services.mbi.ucla.edu/DiffAcc/. © 2015 The Protein Society.

  9. Teenagers’ access to contraception in Mexico City

    Directory of Open Access Journals (Sweden)

    Sofía Gómez-Inclán

    2017-05-01

    Full Text Available Objective. To study and understand the phenomenon of access to contraceptive methods in Mexican teenages, through the use of the Levesque model, which allows for the observation of both the system and the system and the user´s participation in the access process. Materials and methods. A qualitative study was conducted with focus groups technique in a middle and high school of Mexico City. Results. The perception of ability to access to health care is limited, teenagers do not know the mechanisms of care or supply of contraceptive methods. Prejudices of service providers provoke a negative reaction. The family is a source of information for adolescents to make decisions. Conclusions. The model allowed the assessment of access to contraceptive methods in teenagers. It were identified dif­ferent aspects that act as barriers to access and may inform health care providers about this population in their sexual and reproductive health.

  10. OFDM Towards Fixed and Mobile Broadband Wireless Access

    DEFF Research Database (Denmark)

    Shanker Jha, Uma; Prasad, Ramjee

    ) and orthogonal frequency division multiple access (OFDMA) schemes. Essential features of IEEE 802.16d (fixed) and 802.16e (mobile) and the role of the WiMAX Forum in defining interoperability and certification criteria. Important requirements, trade-offs, and other critical design considerations. Key issues...

  11. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger

  12. Neutron/gamma dose separation by the multiple-ion-chamber technique

    International Nuclear Information System (INIS)

    Goetsch, S.J.

    1983-01-01

    Many mixed n/γ dosimetry systems rely on two dosimeters, one composed of a tissue-equivalent material and the other made from a non-hydrogenous material. The paired chamber technique works well in fields of neutron radiation nearly identical in spectral composition to that in which the dosimeters were calibrated. However, this technique is drastically compromised in phantom due to the degradation of the neutron spectrum. The three-dosimeter technique allows for the fall-off in neutron sensitivity of the two non-hydrogenous dosimeters. Precise and physically meaningful results were obtained with this technique with a D-T source in air and in phantom and with simultaneous D-T neutron and 60 Co gamma ray irradiation in air. The MORSE-CG coupled n/γ three-dimensional Monte Carlo code was employed to calculate neutron and gamma doses in a water phantom. Gamma doses calculated in phantom with this code were generally lower than corresponding ion chamber measurements. This can be explained by the departure of irradiation conditions from ideal narrow-beam geometry. 97 references

  13. Analysis of the Decoupled Access for Downlink and Uplink in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Smiljkovikj, K.; Popovski, Petar; Gavrilovska, L.

    2015-01-01

    Wireless cellular networks evolve towards a heterogeneous infrastructure, featuring multiple types of Base Stations (BSs), such as Femto BSs (FBSs) and Macro BSs (MBSs). A wireless device observes multiple points (BSs) through which it can access the infrastructure and it may choose to receive th...

  14. Study on uranium-water multiplicative means of the (RESUCO-Subcritical experimental reactor of uranium with oxygen) subcritical assembly by pulsed neutron technique

    International Nuclear Information System (INIS)

    Jesus Barbosa, S. de.

    1987-01-01

    The effective multiplication factor and the nuclear parameters associated with the variation of (RESUCO- Subcritical Experimental Reactor of Uranium with Oxygen) Subcritical Assembly Configuration, using pulsed neutron technique are analysed. BF3 detectors were used to detect the variation of thermal neutrons in the system, positioned parallelly to fuel elements, and a proton recoil detector was used for monitoring the neutron generation. (M.C.K.) [pt

  15. [Online enrichment ability of restricted-access column coupled with high performance liquid chromatography by column switching technique for benazepril hydrochloride].

    Science.gov (United States)

    Zhang, Xiaohui; Wang, Rong; Xie, Hua; Yin, Qiang; Li, Xiaoyun; Jia, Zhengping; Wu, Xiaoyu; Zhang, Juanhong; Li, Wenbin

    2013-05-01

    The online enrichment ability of the restricted-access media (RAM) column coupled with high performance liquid chromatography by column switching technique for benazepril hydrochloride in plasma was studied. The RAM-HPLC system consisted of an RAM column as enrichment column and a C18 column as analytical column coupled via the column switching technique. The effects of the injection volume on the peak area and the systematic pressure were studied. When the injection volume was less than 100 microL, the peak area increased with the increase of the injection volume. However, when the injection volume was more than 80 microL, the pressure of whole system increased obviously. In order to protect the whole system, 80 microL was chosen as the maximum injection volume. The peak areas of ordinary injection and the large volume injection showed a good linear relationship. The enrichment ability of RAM-HPLC system was satisfactory. The system was successfully used for the separation and detection of the trace benazepril hydrochloride in rat plasma after its administration. The sensitivity of HPLC can be improved by RAM pre-enrichment. It is a simple and economic measurement method.

  16. Optical Non-Orthogonal Multiple Access for Visible Light Communication

    OpenAIRE

    Marshoud, Hanaa; Muhaidat, Sami; Sofotasios, Paschalis C.; Hussain, Sajjad; Imran, Muhammad Ali; Sharif, Bayan S.

    2017-01-01

    The proliferation of mobile Internet and connected devices, offering a variety of services at different levels of performance, represents a major challenge for the fifth generation wireless networks and beyond. This requires a paradigm shift towards the development of key enabling techniques for the next generation wireless networks. In this respect, visible light communication (VLC) has recently emerged as a new communication paradigm that is capable of providing ubiquitous connectivity by c...

  17. Theoretical analysis and simulation of a code division multiple access system (cdma for secure signal transmission in wideband channels

    Directory of Open Access Journals (Sweden)

    Stevan M. Berber

    2014-06-01

    Code Division Multiple Access (CDMA technique which allows communications of multiple users in the same communication system. This is achieved in such a way that each user is assigned a unique code sequence, which is used at the receiver side to discover the information dedicated to that user. These systems belong to the group of communication systems for direct sequence spread spectrum systems. Traditionally, CDMA systems use binary orthogonal spreading codes. In this paper, a mathematical model and simulation of a CDMA system based on the application of non-binary, precisely speaking, chaotic spreading sequences. In their nature, these sequences belong to random sequences with infinite periodicity, and due to that they are appropriate for applications in the systems that provide enhanced security against interception and secrecy in signal transmission. Numerous papers are dedicated to the development of CDMA systems in flat fading channels. This paper presents the results of these systems analysis for the case when frequency selective fading is present in the channel. In addition, the paper investigates a possibility of using interleaving techniques to mitigate fading in a wideband channel with the frequency selective fading. Basic structure of a CDMA communication system and its operation In this paper, a CDMA system block schematic is ppresented and the function of all blocks is explained. Notation  to be used in the paper is introduced. Chaotic sequences are defined and explained in accordance with the method of their generation. A wideband channel with frequency selective fading is defined by its impulse response function. Theoretical analysis of a CDMA system with flat fading in a narrowband channel A narrowband channel and flat fading are defined. A mathematical analysis of the system is conducted by presenting the signal expressions at vital points in the transmitter and receiver. The expression of the signal at the output of the sequence correlator is

  18. Evaluation of ultrasound-guided vascular access in dogs.

    Science.gov (United States)

    Chamberlin, Scott C; Sullivan, Lauren A; Morley, Paul S; Boscan, Pedro

    2013-01-01

    To describe the technique and determine the feasibility, success rate, perceived difficulty, and time to vascular access using ultrasound guidance for jugular vein catheterization in a cardiac arrest dog model. Prospective descriptive study. University teaching hospital. Nine Walker hounds. A total of 27 jugular catheterizations were performed postcardiac arrest using ultrasound guidance. Catheterizations were recorded based on the order in which they were performed and presence/absence of a hematoma around the vein. Time (minutes) until successful vascular access and perceived difficulty in achieving vascular access (scale of 1 = easy to 10 = difficult) were recorded for each catheterization. Mean time to vascular access was 1.9 minutes (95% confidence interval, 1.1-3.4 min) for catheterizations without hematoma, versus 4.3 minutes (1.8-10.1 min) for catheterizations with hematoma (P = 0.1). Median perceived difficulty was 2 of 10 (range 1-7) for catheterizations without hematoma, versus 2 of 10 (range 1-8) for catheterizations with hematoma (P = 0.3). A learning curve was evaluated by comparing mean time to vascular access and perceived difficulty in initial versus subsequent catheterizations. Mean time to vascular access was 2.5 minutes (1.0-6.4 min) in the initial 13 catheterizations versus 3.3 minutes (1.5-7.5 min) in the subsequent 14 catheterizations (P = 0.6). Median perceived difficulty in the first 13 catheterizations (3, range 1-8) was significantly greater (P = 0.049) than median perceived difficulty in the subsequent 14 catheterizations (2, range 1-6). Ultrasound-guided jugular catheterization is associated with a learning curve but is successful in obtaining rapid vascular access in dogs. Further prospective studies are warranted to confirm the utility of this technique in a clinical setting. © Veterinary Emergency and Critical Care Society 2013.

  19. 3-D thermal weight function method and multiple virtual crack extension technique for thermal shock problems

    International Nuclear Information System (INIS)

    Lu Yanlin; Zhou Xiao; Qu Jiadi; Dou Yikang; He Yinbiao

    2005-01-01

    An efficient scheme, 3-D thermal weight function (TWF) method, and a novel numerical technique, multiple virtual crack extension (MVCE) technique, were developed for determination of histories of transient stress intensity factor (SIF) distributions along 3-D crack fronts of a body subjected to thermal shock. The TWF is a universal function, which is dependent only on the crack configuration and body geometry. TWF is independent of time during thermal shock, so the whole history of transient SIF distributions along crack fronts can be directly calculated through integration of the products of TWF and transient temperatures and temperature gradients. The repeated determinations of the distributions of stresses (or displacements) fields for individual time instants are thus avoided in the TWF method. An expression of the basic equation for the 3-D universal weight function method for Mode I in an isotropic elastic body is derived. This equation can also be derived from Bueckner-Rice's 3-D WF formulations in the framework of transformation strain. It can be understood from this equation that the so-called thermal WF is in fact coincident with the mechanical WF except for some constants of elasticity. The details and formulations of the MVCE technique are given for elliptical cracks. The MVCE technique possesses several advantages. The specially selected linearly independent VCE modes can directly be used as shape functions for the interpolation of unknown SIFs. As a result, the coefficient matrix of the final system of equations in the MVCE method is a triple-diagonal matrix and the values of the coefficients on the main diagonal are large. The system of equations has good numerical properties. The number of linearly independent VCE modes that can be introduced in a problem is unlimited. Complex situations in which the SIFs vary dramatically along crack fronts can be numerically well simulated by the MVCE technique. An integrated system of programs for solving the

  20. Heuristic query optimization for query multiple table and multiple clausa on mobile finance application

    Science.gov (United States)

    Indrayana, I. N. E.; P, N. M. Wirasyanti D.; Sudiartha, I. KG

    2018-01-01

    Mobile application allow many users to access data from the application without being limited to space, space and time. Over time the data population of this application will increase. Data access time will cause problems if the data record has reached tens of thousands to millions of records.The objective of this research is to maintain the performance of data execution for large data records. One effort to maintain data access time performance is to apply query optimization method. The optimization used in this research is query heuristic optimization method. The built application is a mobile-based financial application using MySQL database with stored procedure therein. This application is used by more than one business entity in one database, thus enabling rapid data growth. In this stored procedure there is an optimized query using heuristic method. Query optimization is performed on a “Select” query that involves more than one table with multiple clausa. Evaluation is done by calculating the average access time using optimized and unoptimized queries. Access time calculation is also performed on the increase of population data in the database. The evaluation results shown the time of data execution with query heuristic optimization relatively faster than data execution time without using query optimization.

  1. AN AUTOMATIC AND METHODOLOGICAL APPROACH FOR ACCESSIBLE WEB APPLICATIONS

    Directory of Open Access Journals (Sweden)

    Lourdes Moreno

    2007-06-01

    Full Text Available Semantic Web approaches try to get the interoperability and communication among technologies and organizations. Nevertheless, sometimes it is forgotten that the Web must be useful for every user, consequently it is necessary to include tools and techniques doing Semantic Web be accessible. Accessibility and usability are two usually joined concepts widely used in web application development, however their meaning are different. Usability means the way to make easy the use but accessibility is referred to the access possibility. For the first one, there are many well proved approaches in real cases. However, accessibility field requires a deeper research that will make feasible the access to disable people and also the access to novel non-disable people due to the cost to automate and maintain accessible applications. In this paper, we propose one architecture to achieve the accessibility in web-environments dealing with the WAI accessibility standard and the Universal Design paradigm. This architecture tries to control the accessibility in web applications development life-cycle following a methodology starting from a semantic conceptual model and leans on description languages and controlled vocabularies.

  2. A Review of the State-of-the-Art on Combining Multiple NDT Techniques in Terms of Precise Fault Detection

    Directory of Open Access Journals (Sweden)

    Ashish Khaira

    2017-06-01

    Full Text Available The present industrial scenario demands optimum quality, feasible processing time and enhanced machine availability to cope-up with continuously increasing customer expectations. To achieve this target, it is mandatory to ensure the optimum performance and higher availability of machinery. Therefore, the present work begins with, review of the research work of different researchers, which includes the applied combinations from year 2000-2016 proceed with discussion on the parameters being checked before making combination of NDT and finally, covers the maintenance performance parameters for quantifying improvement in performance after combining NDT. The result indicates that very few researches uses combination of NDT’s, in areas like aeronautical, compressors etc., and most of the works done in composites to be tested without using any decision making technique.  The researchers and practitioners can use the outcome of this work as a guideline for combining multiple NDT technique to achieve precise fault prediction and forecasting of upcoming failures.

  3. Dynamic Cognitive Self-Organized TDMA for Medium Access Control in Real-Time Vehicle to Vehicle Communications

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2013-01-01

    Full Text Available The emergence of intelligent transport systems has brought out a new set of requirements on wireless communication. To cope with these requirements, several proposals are currently under discussion. In this highly mobile environment, the design of a prompt, efficient, flexible, and reliable medium access control, able to cover the specific constraints of the named real-time communications applications, is still unsolved. This paper presents the original proposal integrating Non-Cooperative Cognitive Time Division Multiple Access (NCC-TDMA based on Cognitive Radio (CR techniques to obtain a mechanism which complies with the requirements of real-time communications. Though the proposed MAC uses a slotted channel, it can be adapted to operate on the physical layer of different standards. The authors’ analysis considers the IEEE WAVE and 802.11p as the standards of reference. The mechanism also offers other advantages, such as avoiding signalling and the adaptation capacity to channel conditions and interferences. The solution is applied to the problem of units merging a convoy. Comparison results between NCC-TDMA and Slotted-Aloha are included.

  4. Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution.

    Science.gov (United States)

    Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian

    2013-01-28

    We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile.

  5. BATHYTHERMOGRAPH (XBT) from multiple German platforms: 19730101 to 19831231 (NODC Accession 8400184)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Ocean Station Data and Bathythermograph (XBT) data were collected from Helgoland Biological Stations using multiple German ships (ANTON DOHRN, GAUSS, FRIEDRICH...

  6. An Innovative Technique to Assess Spontaneous Baroreflex Sensitivity with Short Data Segments: Multiple Trigonometric Regressive Spectral Analysis.

    Science.gov (United States)

    Li, Kai; Rüdiger, Heinz; Haase, Rocco; Ziemssen, Tjalf

    2018-01-01

    Objective: As the multiple trigonometric regressive spectral (MTRS) analysis is extraordinary in its ability to analyze short local data segments down to 12 s, we wanted to evaluate the impact of the data segment settings by applying the technique of MTRS analysis for baroreflex sensitivity (BRS) estimation using a standardized data pool. Methods: Spectral and baroreflex analyses were performed on the EuroBaVar dataset (42 recordings, including lying and standing positions). For this analysis, the technique of MTRS was used. We used different global and local data segment lengths, and chose the global data segments from different positions. Three global data segments of 1 and 2 min and three local data segments of 12, 20, and 30 s were used in MTRS analysis for BRS. Results: All the BRS-values calculated on the three global data segments were highly correlated, both in the supine and standing positions; the different global data segments provided similar BRS estimations. When using different local data segments, all the BRS-values were also highly correlated. However, in the supine position, using short local data segments of 12 s overestimated BRS compared with those using 20 and 30 s. In the standing position, the BRS estimations using different local data segments were comparable. There was no proportional bias for the comparisons between different BRS estimations. Conclusion: We demonstrate that BRS estimation by the MTRS technique is stable when using different global data segments, and MTRS is extraordinary in its ability to evaluate BRS in even short local data segments (20 and 30 s). Because of the non-stationary character of most biosignals, the MTRS technique would be preferable for BRS analysis especially in conditions when only short stationary data segments are available or when dynamic changes of BRS should be monitored.

  7. Evaluation of the feasibility for detecting hidden corrosion damage in multi-layer gusset plates using multiple inspection techniques

    International Nuclear Information System (INIS)

    Cobb, Adam C.; Duffer, Charles E.; Light, Glenn M.

    2014-01-01

    Gusset plates are used to connect the members in truss bridges and they are usually inspected using calipers or conventional thickness measurement ultrasonic testing (UT) devices. The damage mechanism of particular concern in gusset plates is corrosion and the regions most susceptible to corrosion damage are on the gusset interior surface where it intersects the chord, diagonal, and vertical members from water collecting at the interfaces. For heavily loaded gusset plates, one or more shingle plates are used to reinforce the gusset plate, creating a multi-layer structure. While the areas with corrosion damage remain near the members on the gusset plate, the shingle plates cover the gusset plate and greatly limit the surface access to the gusset plate, making UT thickness measurement impractical. Because of the critical nature of the gussets, a viable inspection strategy for multi-layer gusset assemblies must be developed. The premise of this research and development effort was to develop viable, field-deployable inspection approaches for this problem area. This paper presents three separate inspection approaches: two ultrasonic-based techniques and one radiographic approach. Each of these techniques was evaluated on a mock-up specimen provided by the Federal Highway Administration (FHWA) that is representative of gusseted connection from a truss bridge

  8. Evaluation of the feasibility for detecting hidden corrosion damage in multi-layer gusset plates using multiple inspection techniques

    Energy Technology Data Exchange (ETDEWEB)

    Cobb, Adam C.; Duffer, Charles E.; Light, Glenn M. [Southwest Research Institute, 6220 Culebra Road, San Antonio, TX 78238-5166 (United States)

    2014-02-18

    Gusset plates are used to connect the members in truss bridges and they are usually inspected using calipers or conventional thickness measurement ultrasonic testing (UT) devices. The damage mechanism of particular concern in gusset plates is corrosion and the regions most susceptible to corrosion damage are on the gusset interior surface where it intersects the chord, diagonal, and vertical members from water collecting at the interfaces. For heavily loaded gusset plates, one or more shingle plates are used to reinforce the gusset plate, creating a multi-layer structure. While the areas with corrosion damage remain near the members on the gusset plate, the shingle plates cover the gusset plate and greatly limit the surface access to the gusset plate, making UT thickness measurement impractical. Because of the critical nature of the gussets, a viable inspection strategy for multi-layer gusset assemblies must be developed. The premise of this research and development effort was to develop viable, field-deployable inspection approaches for this problem area. This paper presents three separate inspection approaches: two ultrasonic-based techniques and one radiographic approach. Each of these techniques was evaluated on a mock-up specimen provided by the Federal Highway Administration (FHWA) that is representative of gusseted connection from a truss bridge.

  9. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  10. Techniques for Wireless Applications

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-05-01

    Switching techniques have been first proposed as a spacial diversity techniques. These techniques have been shown to reduce considerably the processing load while letting multi-antenna systems achieve a specific target performance. In this thesis, we take a different look at the switching schemes by implementing them for different other wireless applications. More specifically, this thesis consists of three main parts, where the first part considers a multiuser environment and an adaptive scheduling algorithm based on the switching with post-selection scheme for statistically independent but non-identically distributed channel conditions. The performance of this switched based scheduler is investigated and a multitude of performance metrics are presented. In a second part, we propose and analyze the performance of three switched-based algorithms for interference reduction in the downlink of over-loaded femtocells. For instance, performance metrics are derived in closed-form and these metrics are used to compare these three proposed schemes. Finally in a third part, a switch based opportunistic channel access scheme is proposed for a cognitive radio system and its performance is analyzed in terms of two new proposed metrics namely the average cognitive radio access and the waiting time duration.

  11. EFFECT OF YAM STORAGE TECHNIQUES USAGE ON FARM ...

    African Journals Online (AJOL)

    IBUKUN

    1Department of Agricultural Economics and Farm Management, Faculty of ... significant effect on the usage of yam storage techniques, while access to credit ..... study area at subsidized rates so as to encourage them to use such techniques.

  12. CO2 angiography of vascular access in hemodialysis: a preliminary report

    International Nuclear Information System (INIS)

    Li Huimin; Xiao Xiangsheng; Yan Bing; Dong Sheng; Li Wentao; Dong Yonghua; Ye Chaoyang; Rong Shu

    2005-01-01

    Objective: To explore the technique and value of CO 2 angiography in surveillance of vascular access in hemodialysis. Methods: CO 2 angiography was undertaken in 10 chronic renal failure (CRF) patients with native arteriovenous fistulas for hemodialysis. The injection sites were the vein dorsale manus (n=7) and the fistula (n=3). The whole draining veins were obtained using a Toshiba DSA unit, when 40-60 ml gas were injected by hands every time. The compression on elbow and image stacking technique were used. Results: All patients had a safe examination, and the vessels on the CO 2 venogram were tubular or bubble-flow. A significant draining vein was revealed in 4 cases (3 of them injection from fistula). The elbow compression had the effect on venogram in 2 cases. All of the draining veins above the elbow were clearly visualized, and the stacking technique imp roved the display of veins. Conclusion: Internal fistula CO 2 angiography is safe, cheap, and efficacy for dialysis access surveillance. The draining veins of vascular access in CRF patients have their own characteristics, and can be best revealed by direct internal fistula CO 2 venography. CO 2 angiogram of the vascular access can be improved with various kinds of skills. (authors)

  13. Neutron multiplicity of fission fragments

    Energy Technology Data Exchange (ETDEWEB)

    Abdelrahman, Y S [Physics department, mu` rah university Al-Karak, (Jordan)

    1995-10-01

    The total average neutron multiplicity of the fission fragments produced by the spontaneous fission of {sup 248} Cm has been measured. This measurement has been done by using a new experimental technique. This technique mainly depends on {gamma}-{gamma} coincidence using a very high resolution high purity germanium (HPGe) detector. 2 figs.

  14. Electrospray Ionization Mass Spectrometry: A Technique to Access the Information beyond the Molecular Weight of the Analyte

    Science.gov (United States)

    Banerjee, Shibdas; Mazumdar, Shyamalava

    2012-01-01

    The Electrospray Ionization (ESI) is a soft ionization technique extensively used for production of gas phase ions (without fragmentation) of thermally labile large supramolecules. In the present review we have described the development of Electrospray Ionization mass spectrometry (ESI-MS) during the last 25 years in the study of various properties of different types of biological molecules. There have been extensive studies on the mechanism of formation of charged gaseous species by the ESI. Several groups have investigated the origin and implications of the multiple charge states of proteins observed in the ESI-mass spectra of the proteins. The charged analytes produced by ESI can be fragmented by activating them in the gas-phase, and thus tandem mass spectrometry has been developed, which provides very important insights on the structural properties of the molecule. The review will highlight recent developments and emerging directions in this fascinating area of research. PMID:22611397

  15. Electrospray ionization mass spectrometry: a technique to access the information beyond the molecular weight of the analyte.

    Science.gov (United States)

    Banerjee, Shibdas; Mazumdar, Shyamalava

    2012-01-01

    The Electrospray Ionization (ESI) is a soft ionization technique extensively used for production of gas phase ions (without fragmentation) of thermally labile large supramolecules. In the present review we have described the development of Electrospray Ionization mass spectrometry (ESI-MS) during the last 25 years in the study of various properties of different types of biological molecules. There have been extensive studies on the mechanism of formation of charged gaseous species by the ESI. Several groups have investigated the origin and implications of the multiple charge states of proteins observed in the ESI-mass spectra of the proteins. The charged analytes produced by ESI can be fragmented by activating them in the gas-phase, and thus tandem mass spectrometry has been developed, which provides very important insights on the structural properties of the molecule. The review will highlight recent developments and emerging directions in this fascinating area of research.

  16. Routes to DNA accessibility: alternative pathways for nucleosome unwinding.

    Science.gov (United States)

    Schlingman, Daniel J; Mack, Andrew H; Kamenetska, Masha; Mochrie, Simon G J; Regan, Lynne

    2014-07-15

    The dynamic packaging of DNA into chromatin is a key determinant of eukaryotic gene regulation and epigenetic inheritance. Nucleosomes are the basic unit of chromatin, and therefore the accessible states of the nucleosome must be the starting point for mechanistic models regarding these essential processes. Although the existence of different unwound nucleosome states has been hypothesized, there have been few studies of these states. The consequences of multiple states are far reaching. These states will behave differently in all aspects, including their interactions with chromatin remodelers, histone variant exchange, and kinetic properties. Here, we demonstrate the existence of two distinct states of the unwound nucleosome, which are accessible at physiological forces and ionic strengths. Using optical tweezers, we measure the rates of unwinding and rewinding for these two states and show that the rewinding rates from each state are different. In addition, we show that the probability of unwinding into each state is dependent on the applied force and ionic strength. Our results demonstrate not only that multiple unwound states exist but that their accessibility can be differentially perturbed, suggesting possible roles for these states in gene regulation. For example, different histone variants or modifications may facilitate or suppress access to DNA by promoting unwinding into one state or the other. We anticipate that the two unwound states reported here will be the basis for future models of eukaryotic transcriptional control. Copyright © 2014 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  17. Concentration Polarization to Measure Nano-pore Accessibility

    NARCIS (Netherlands)

    Solsona, Miguel; Eijkel, Jan C.T.; Olthuis, Wouter; Papadimitriou, Vasileios; van den Berg, Albert; Abelmann, Leon; Weckhuysen, Bert M.; Nieuwelink, A. E.

    2017-01-01

    Understanding the deactivation process in porous catalysts is of tremendous economic significance. We demonstrate the feasibility of using the concentration polarization method to obtain the pore accessibility distribution at single particle level for the first time. By using this technique we could

  18. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  19. Phylogenetic diversity of fungal communities in areas accessible and not accessible to tourists in Naracoorte Caves.

    Science.gov (United States)

    Adetutu, Eric M; Thorpe, Krystal; Bourne, Steven; Cao, Xiangsheng; Shahsavari, Esmaeil; Kirby, Greg; Ball, Andrew S

    2011-01-01

    The fungal diversity in areas accessible and not accessible to tourists at UNESCO World Heritage-listed Naracoorte Caves was investigated with culture-dependent and culture-independent techniques for assistance in cave management protocol development. The caves were selected based on tourist numbers and configurations: Stick Tomato (open, high numbers), Alexandra (lockable openings, high numbers) and Strawhaven (control; no access). Culture-based survey revealed Ascomycota dominance irrespective of sampling area with Microascales (Trichurus sp.) being most frequently isolated. Some Hypocreales-like sequences belonging to Fusarium sp., Trichoderma sp. and Neonectria sp. (Stick Tomato) were cultured only from areas not accessible to tourists. These orders also were detected by DGGE assay irrespective of sampling area. The predominance of Ascomycota (especially Microascales) suggested their important ecological roles in these caves. Culture-independent analysis showed higher Shannon fungal diversity values (from ITS-based DGGE profiles) in tourist-accessible areas of these caves than in inaccessible areas with the fungal community banding patterns being substantially different in Stick Tomato Cave. Further investigations are needed to determine the cause of the differences in the fungal communities of Stick Tomato Cave, although cave-related factors such as use, configuration and sediment heterogeneity might have contributed to these differences.

  20. Optimizing multiple-choice tests as tools for learning.

    Science.gov (United States)

    Little, Jeri L; Bjork, Elizabeth Ligon

    2015-01-01

    Answering multiple-choice questions with competitive alternatives can enhance performance on a later test, not only on questions about the information previously tested, but also on questions about related information not previously tested-in particular, on questions about information pertaining to the previously incorrect alternatives. In the present research, we assessed a possible explanation for this pattern: When multiple-choice questions contain competitive incorrect alternatives, test-takers are led to retrieve previously studied information pertaining to all of the alternatives in order to discriminate among them and select an answer, with such processing strengthening later access to information associated with both the correct and incorrect alternatives. Supporting this hypothesis, we found enhanced performance on a later cued-recall test for previously nontested questions when their answers had previously appeared as competitive incorrect alternatives in the initial multiple-choice test, but not when they had previously appeared as noncompetitive alternatives. Importantly, however, competitive alternatives were not more likely than noncompetitive alternatives to be intruded as incorrect responses, indicating that a general increased accessibility for previously presented incorrect alternatives could not be the explanation for these results. The present findings, replicated across two experiments (one in which corrective feedback was provided during the initial multiple-choice testing, and one in which it was not), thus strongly suggest that competitive multiple-choice questions can trigger beneficial retrieval processes for both tested and related information, and the results have implications for the effective use of multiple-choice tests as tools for learning.

  1. Phenotype and seed production among hyacinth bean (Lablab purpureus L. Sweet) accessions rescued using hydroponic techniques

    Science.gov (United States)

    Hyacinth bean, Lablab purpureus L. (Sweet) is a legume used as a vegetable, forage, and in home gardens as an ornamental plant. Many accessions do not flower during their juvenile period in Byron, GA. Other hyacinth bean accessions produce few seed when regenerated in the field. This study was condu...

  2. Integrating geographical information and augmented reality techniques for mobile escape guidelines on nuclear accident sites

    International Nuclear Information System (INIS)

    Tsai, Ming-Kuan; Lee, Yung-Ching; Lu, Chung-Hsin; Chen, Mei-Hsin; Chou, Tien-Yin; Yau, Nie-Jia

    2012-01-01

    During nuclear accidents, when radioactive materials spread into the environment, the people in the affected areas should evacuate immediately. However, few information systems are available regarding escape guidelines for nuclear accidents. Therefore, this study constructs escape guidelines on mobile phones. This application is called Mobile Escape Guidelines (MEG) and adopts two techniques. One technique is the geographical information that offers multiple representations; the other is the augmented reality that provides semi-realistic information services. When this study tested the mobile escape guidelines, the results showed that this application was capable of identifying the correct locations of users, showing the escape routes, filtering geographical layers, and rapidly generating the relief reports. Users could evacuate from nuclear accident sites easily, even without relief personnel, since using slim devices to access the mobile escape guidelines is convenient. Overall, this study is a useful reference for a nuclear accident emergency response.

  3. Faster Double-Size Bipartite Multiplication out of Montgomery Multipliers

    Science.gov (United States)

    Yoshino, Masayuki; Okeya, Katsuyuki; Vuillaume, Camille

    This paper proposes novel algorithms for computing double-size modular multiplications with few modulus-dependent precomputations. Low-end devices such as smartcards are usually equipped with hardware Montgomery multipliers. However, due to progresses of mathematical attacks, security institutions such as NIST have steadily demanded longer bit-lengths for public-key cryptography, making the multipliers quickly obsolete. In an attempt to extend the lifespan of such multipliers, double-size techniques compute modular multiplications with twice the bit-length of the multipliers. Techniques are known for extending the bit-length of classical Euclidean multipliers, of Montgomery multipliers and the combination thereof, namely bipartite multipliers. However, unlike classical and bipartite multiplications, Montgomery multiplications involve modulus-dependent precomputations, which amount to a large part of an RSA encryption or signature verification. The proposed double-size technique simulates double-size multiplications based on single-size Montgomery multipliers, and yet precomputations are essentially free: in an 2048-bit RSA encryption or signature verification with public exponent e=216+1, the proposal with a 1024-bit Montgomery multiplier is at least 1.5 times faster than previous double-size Montgomery multiplications.

  4. Agglomeration, accessibility and industrial location: evidence from spanish municipalities

    OpenAIRE

    Alañón Pardo, Ángel; Arauzo Carod, Josep María

    2011-01-01

    This paper deals with the location decisions of manufacturing firms in Spain. We analyse how agglomeration economies and transport accessibility influence the location decisions of firms at municipality level and in three industries. The main empirical contributions of this paper are the econometric techniques used (spatial econometric models) and some of the explanatory variables (local gross domestic product, road accessibility, and the characteristics of firms in neighbouring municipalitie...

  5. System Design and Cataloging Meet the User: User Interfaces to Online Public Access Catalogs.

    Science.gov (United States)

    Yee, Martha M.

    1991-01-01

    Discusses features of online public access catalogs: (1) demonstration of relationships between records; (2) provision of entry vocabularies; (3) arrangement of multiple entries on the screen; (4) provision of access points; (5) display of single records; and (6) division of catalogs into separate files or indexes. User studies and other research…

  6. The advantages, and challenges, in using multiple techniques in the estimation of surface water-groundwater fluxes.

    Science.gov (United States)

    Shanafield, M.; Cook, P. G.

    2014-12-01

    When estimating surface water-groundwater fluxes, the use of complimentary techniques helps to fill in uncertainties in any individual method, and to potentially gain a better understanding of spatial and temporal variability in a system. It can also be a way of preventing the loss of data during infrequent and unpredictable flow events. For example, much of arid Australia relies on groundwater, which is recharged by streamflow through ephemeral streams during flood events. Three recent surface water/groundwater investigations from arid Australian systems provide good examples of how using multiple field and analysis techniques can help to more fully characterize surface water-groundwater fluxes, but can also result in conflicting values over varying spatial and temporal scales. In the Pilbara region of Western Australia, combining streambed radon measurements, vertical heat transport modeling, and a tracer test helped constrain very low streambed residence times, which are on the order of minutes. Spatial and temporal variability between the methods yielded hyporheic exchange estimates between 10-4 m2 s-1 and 4.2 x 10-2 m2 s-1. In South Australia, three-dimensional heat transport modeling captured heterogeneity within 20 square meters of streambed, identifying areas of sandy soil (flux rates of up to 3 m d-1) and clay (flux rates too slow to be accurately characterized). Streamflow front modeling showed similar flux rates, but averaged over 100 m long stream segments for a 1.6 km reach. Finally, in central Australia, several methods are used to decipher whether any of the flow down a highly ephemeral river contributes to regional groundwater recharge, showing that evaporation and evapotranspiration likely accounts for all of the infiltration into the perched aquifer. Lessons learned from these examples demonstrate the influences of the spatial and temporal variability between techniques on estimated fluxes.

  7. Decoupling Solar Variability and Instrument Trends Using the Multiple Same-Irradiance-Level (MuSIL) Analysis Technique

    Science.gov (United States)

    Woods, Thomas N.; Eparvier, Francis G.; Harder, Jerald; Snow, Martin

    2018-05-01

    The solar spectral irradiance (SSI) dataset is a key record for studying and understanding the energetics and radiation balance in Earth's environment. Understanding the long-term variations of the SSI over timescales of the 11-year solar activity cycle and longer is critical for many Sun-Earth research topics. Satellite measurements of the SSI have been made since the 1970s, most of them in the ultraviolet, but recently also in the visible and near-infrared. A limiting factor for the accuracy of previous solar variability results is the uncertainties for the instrument degradation corrections, which need fairly large corrections relative to the amount of solar cycle variability at some wavelengths. The primary objective of this investigation has been to separate out solar cycle variability and any residual uncorrected instrumental trends in the SSI measurements from the Solar Radiation and Climate Experiment (SORCE) mission and the Thermosphere, Mesosphere, Ionosphere, Energetic, and Dynamics (TIMED) mission. A new technique called the Multiple Same-Irradiance-Level (MuSIL) analysis has been developed, which examines an SSI time series at different levels of solar activity to provide long-term trends in an SSI record, and the most common result is a downward trend that most likely stems from uncorrected instrument degradation. This technique has been applied to each wavelength in the SSI records from SORCE (2003 - present) and TIMED (2002 - present) to provide new solar cycle variability results between 27 nm and 1600 nm with a resolution of about 1 nm at most wavelengths. This technique, which was validated with the highly accurate total solar irradiance (TSI) record, has an estimated relative uncertainty of about 5% of the measured solar cycle variability. The MuSIL results are further validated with the comparison of the new solar cycle variability results from different solar cycles.

  8. Bus Access Optimisation for FlexRay-based Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru

    2007-01-01

    -real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...

  9. AIDA: Accelerator Integrated Data Access

    International Nuclear Information System (INIS)

    MacKenzie, Ronald R.

    2002-01-01

    All Control Systems that grow to any size have a variety of data that are stored in different formats on different nodes in the network. Examples include sensor value and status, archived sensor data, device oriented support data and relationships, message logs, application and machine configurations etc. Each type of data typically has a different programming interface. Higher-level applications need to access a logically related set of data that is in different data stores and may require different processing. AIDA is envisioned to be a distributed service that allows applications access to this wide variety of Control System data in a consistent way that is language and machine independent. It has the additional goal of providing an object-oriented layer for constructing applications on top of multiple existing conventional systems like EPICS or the SLC Control System. Motivation, design overview and current status will be presented

  10. [Improving global access to new vaccines: intellectual property, technology transfer, and regulatory pathways].

    Science.gov (United States)

    Crager, Sara Eve

    2015-01-01

    The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers.

  11. Improving global access to new vaccines: intellectual property, technology transfer, and regulatory pathways.

    Science.gov (United States)

    Crager, Sara Eve

    2014-11-01

    The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers.

  12. Approach and landing guidance design for reusable launch vehicle using multiple sliding surfaces technique

    Directory of Open Access Journals (Sweden)

    Xiangdong LIU

    2017-08-01

    Full Text Available An autonomous approach and landing (A&L guidance law is presented in this paper for landing an unpowered reusable launch vehicle (RLV at the designated runway touchdown. Considering the full nonlinear point-mass dynamics, a guidance scheme is developed in three-dimensional space. In order to guarantee a successful A&L movement, the multiple sliding surfaces guidance (MSSG technique is applied to derive the closed-loop guidance law, which stems from higher order sliding mode control theory and has advantage in the finite time reaching property. The global stability of the proposed guidance approach is proved by the Lyapunov-based method. The designed guidance law can generate new trajectories on-line without any specific requirement on off-line analysis except for the information on the boundary conditions of the A&L phase and instantaneous states of the RLV. Therefore, the designed guidance law is flexible enough to target different touchdown points on the runway and is capable of dealing with large initial condition errors resulted from the previous flight phase. Finally, simulation results show the effectiveness of the proposed guidance law in different scenarios.

  13. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  14. Conducting a critical interpretive synthesis of the literature on access to healthcare by vulnerable groups

    Directory of Open Access Journals (Sweden)

    Smith Lucy

    2006-07-01

    Full Text Available Abstract Background Conventional systematic review techniques have limitations when the aim of a review is to construct a critical analysis of a complex body of literature. This article offers a reflexive account of an attempt to conduct an interpretive review of the literature on access to healthcare by vulnerable groups in the UK Methods This project involved the development and use of the method of Critical Interpretive Synthesis (CIS. This approach is sensitised to the processes of conventional systematic review methodology and draws on recent advances in methods for interpretive synthesis. Results Many analyses of equity of access have rested on measures of utilisation of health services, but these are problematic both methodologically and conceptually. A more useful means of understanding access is offered by the synthetic construct of candidacy. Candidacy describes how people's eligibility for healthcare is determined between themselves and health services. It is a continually negotiated property of individuals, subject to multiple influences arising both from people and their social contexts and from macro-level influences on allocation of resources and configuration of services. Health services are continually constituting and seeking to define the appropriate objects of medical attention and intervention, while at the same time people are engaged in constituting and defining what they understand to be the appropriate objects of medical attention and intervention. Access represents a dynamic interplay between these simultaneous, iterative and mutually reinforcing processes. By attending to how vulnerabilities arise in relation to candidacy, the phenomenon of access can be better understood, and more appropriate recommendations made for policy, practice and future research. Discussion By innovating with existing methods for interpretive synthesis, it was possible to produce not only new methods for conducting what we have termed critical

  15. Visualizing Matrix Multiplication

    Science.gov (United States)

    Daugulis, Peteris; Sondore, Anita

    2018-01-01

    Efficient visualizations of computational algorithms are important tools for students, educators, and researchers. In this article, we point out an innovative visualization technique for matrix multiplication. This method differs from the standard, formal approach by using block matrices to make computations more visual. We find this method a…

  16. Artificial intelligence applications of fast optical memory access

    Science.gov (United States)

    Henshaw, P. D.; Todtenkopf, A. B.

    The operating principles and performance of rapid laser beam-steering (LBS) techniques are reviewed and illustrated with diagrams; their applicability to fast optical-memory (disk) access is evaluated; and the implications of fast access for the design of expert systems are discussed. LBS methods examined include analog deflection (source motion, wavefront tilt, and phased arrays), digital deflection (polarization modulation, reflectivity modulation, interferometric switching, and waveguide deflection), and photorefractive LBS. The disk-access problem is considered, and typical LBS requirements are listed as 38,000 beam positions, rotational latency 25 ms, one-sector rotation time 1.5 ms, and intersector space 87 microsec. The value of rapid access for increasing the power of expert systems (by permitting better organization of blocks of information) is illustrated by summarizing the learning process of the MVP-FORTH system (Park, 1983).

  17. 2D Presentation Techniques of Mind-maps for Blind Meeting Participants.

    Science.gov (United States)

    Pölzer, Stephan; Miesenberger, Klaus

    2015-01-01

    Mind-maps, used as ideation technique in co-located meetings (e.g. in brainstorming sessions), which meet with increased importance in business and education, show considerably accessibility challenges for blind meeting participants. Besides an overview of general aspects of accessibility issues in co-located meetings, this paper focuses on the design and development of alternative non-visual presentation techniques for mind-maps. The different aspects of serialized presentation techniques (e.g. treeview) for Braille and audio rendering and two dimensional presentation techniques (e.g. tactile two dimensional array matrix and edge-projection method [1]) are discussed based on the user feedback gathered in intermediate tests following a user centered design approach.

  18. Balloon Blocking Technique (BBT) for Superselective Catheterization of Inaccessible Arteries with Conventional and Modified Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Morishita, Hiroyuki, E-mail: hmorif@koto.kpu-m.ac.jp, E-mail: mori-h33@xa2.so-net.ne.jp [Japan Red Cross Kyoto Daiichi Hospital, Department of Diagnostic Radiology (Japan); Takeuchi, Yoshito, E-mail: yotake62@qg8.so-net.ne.jp [Kyoto Prefectural University of Medicine, Department of Radiology, North Medical Center (Japan); Ito, Takaaki, E-mail: takaaki@koto.kpu-m.ac.jp [Japan Red Cross Kyoto Daiichi Hospital, Department of Diagnostic Radiology (Japan); Hayashi, Natsuko, E-mail: hayashin@koto.kpu-m.ac.jp [Kyoto Prefectural University of Medicine, Department of Radiology, Graduate School of Medical Science (Japan); Sato, Osamu, E-mail: osamu-sato@kyoto1-jrc.org [Japan Red Cross Kyoto Daiichi Hospital, Department of Diagnostic Radiology (Japan)

    2016-06-15

    PurposeThe purpose of the study was to retrospectively evaluate the efficacy and safety of the balloon blocking technique (BBT).Materials and MethodsThe BBT was performed in six patients (all males, mean 73.5 years) in whom superselective catheterization for transcatheter arterial embolization by the conventional microcatheter techniques had failed due to anatomical difficulty, including targeted arteries originating steeply or hooked from parent arteries. All BBT procedures were performed using Seldinger’s transfemoral method. Occlusive balloons were deployed and inflated at the distal side of the target artery branching site in the parent artery via transfemoral access. A microcatheter was delivered from a 5-F catheter via another femoral access and was advanced over the microguidewire into the target artery, under balloon blockage of advancement of the microguidewire into non-target branches. After the balloon catheter was deflated and withdrawn, optimal interventions were performed through the microcatheter.ResultsAfter success of accessing the targeted artery by BBT, optimal interventions were accomplished in all patients with no complications other than vasovagal hypotension, which responded to nominal therapy.ConclusionThe BBT may be useful in superselective catheterization of inaccessible arteries due to anatomical difficulties.

  19. System identification via sparse multiple kernel-based regularization using sequential convex optimization techniques

    DEFF Research Database (Denmark)

    Chen, Tianshi; Andersen, Martin Skovgaard; Ljung, Lennart

    2014-01-01

    Model estimation and structure detection with short data records are two issues that receive increasing interests in System Identification. In this paper, a multiple kernel-based regularization method is proposed to handle those issues. Multiple kernels are conic combinations of fixed kernels...

  20. Minimal access surgery of pediatric inguinal hernias: a review.

    Science.gov (United States)

    Saranga Bharathi, Ramanathan; Arora, Manu; Baskaran, Vasudevan

    2008-08-01

    Inguinal hernia is a common problem among children, and herniotomy has been its standard of care. Laparoscopy, which gained a toehold initially in the management of pediatric inguinal hernia (PIH), has managed to steer world opinion against routine contralateral groin exploration by precise detection of contralateral patencies. Besides detection, its ability to repair simultaneously all forms of inguinal hernias (indirect, direct, combined, recurrent, and incarcerated) together with contralateral patencies has cemented its role as a viable alternative to conventional repair. Numerous minimally invasive techniques for addressing PIH have mushroomed in the past two decades. These techniques vary considerably in their approaches to the internal ring (intraperitoneal, extraperitoneal), use of ports (three, two, one), endoscopic instruments (two, one, or none), sutures (absorbable, nonabsorbable), and techniques of knotting (intracorporeal, extracorporeal). In addition to the surgeons' experience and the merits/limitations of individual techniques, it is the nature of the defect that should govern the choice of technique. The emerging techniques show a trend toward increasing use of extracorporeal knotting and diminishing use of working ports and endoscopic instruments. These favor wider adoption of minimal access surgery in addressing PIH by surgeons, irrespective of their laparoscopic skills and experience. Growing experience, wider adoption, decreasing complications, and increasing advantages favor emergence of minimal access surgery as the gold standard for the treatment of PIH in the future. This article comprehensively reviews the laparoscopic techniques of addressing PIH.