WorldWideScience

Sample records for network abstraction layer

  1. Adaptive Multiclient Network-on-Chip Memory Core: Hardware Architecture, Software Abstraction Layer, and Application Exploration

    Directory of Open Access Journals (Sweden)

    Diana Göhringer

    2012-01-01

    Full Text Available This paper presents the hardware architecture and the software abstraction layer of an adaptive multiclient Network-on-Chip (NoC memory core. The memory core supports the flexibility of a heterogeneous FPGA-based runtime adaptive multiprocessor system called RAMPSoC. The processing elements, also called clients, can access the memory core via the Network-on-Chip (NoC. The memory core supports a dynamic mapping of an address space for the different clients as well as different data transfer modes, such as variable burst sizes. Therefore, two main limitations of FPGA-based multiprocessor systems, the restricted on-chip memory resources and that usually only one physical channel to an off-chip memory exists, are leveraged. Furthermore, a software abstraction layer is introduced, which hides the complexity of the memory core architecture and which provides an easy to use interface for the application programmer. Finally, the advantages of the novel memory core in terms of performance, flexibility, and user friendliness are shown using a real-world image processing application.

  2. Bottom-Up Abstract Modelling of Optical Networks-on-Chip: From Physical to Architectural Layer

    Directory of Open Access Journals (Sweden)

    Alberto Parini

    2012-01-01

    Full Text Available This work presents a bottom-up abstraction procedure based on the design-flow FDTD + SystemC suitable for the modelling of optical Networks-on-Chip. In this procedure, a complex network is decomposed into elementary switching elements whose input-output behavior is described by means of scattering parameters models. The parameters of each elementary block are then determined through 2D-FDTD simulation, and the resulting analytical models are exported within functional blocks in SystemC environment. The inherent modularity and scalability of the S-matrix formalism are preserved inside SystemC, thus allowing the incremental composition and successive characterization of complex topologies typically out of reach for full-vectorial electromagnetic simulators. The consistency of the outlined approach is verified, in the first instance, by performing a SystemC analysis of a four-input, four-output ports switch and making a comparison with the results of 2D-FDTD simulations of the same device. Finally, a further complex network encompassing 160 microrings is investigated, the losses over each routing path are calculated, and the minimum amount of power needed to guarantee an assigned BER is determined. This work is a basic step in the direction of an automatic technology-aware network-level simulation framework capable of assembling complex optical switching fabrics, while at the same time assessing the practical feasibility and effectiveness at the physical/technological level.

  3. Operating System Abstraction Layer (OSAL)

    Science.gov (United States)

    Yanchik, Nicholas J.

    2007-01-01

    This viewgraph presentation reviews the concept of the Operating System Abstraction Layer (OSAL) and its benefits. The OSAL is A small layer of software that allows programs to run on many different operating systems and hardware platforms It runs independent of the underlying OS & hardware and it is self-contained. The benefits of OSAL are that it removes dependencies from any one operating system, promotes portable, reusable flight software. It allows for Core Flight software (FSW) to be built for multiple processors and operating systems. The presentation discusses the functionality, the various OSAL releases, and describes the specifications.

  4. Analysis of complex networks using aggressive abstraction.

    Energy Technology Data Exchange (ETDEWEB)

    Colbaugh, Richard; Glass, Kristin.; Willard, Gerald

    2008-10-01

    This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.

  5. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause...

  6. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  7. Layer Communities in Multiplex Networks

    Science.gov (United States)

    Kao, Ta-Chu; Porter, Mason A.

    2017-08-01

    Multiplex networks are a type of multilayer network in which entities are connected to each other via multiple types of connections. We propose a method, based on computing pairwise similarities between layers and then doing community detection, for grouping structurally similar layers in multiplex networks. We illustrate our approach using both synthetic and empirical networks, and we are able to find meaningful groups of layers in both cases. For example, we find that airlines that are based in similar geographic locations tend to be grouped together in a multiplex airline network and that related research areas in physics tend to be grouped together in a multiplex collaboration network.

  8. Resource Allocation and Cross Layer Control in Wireless Networks

    National Research Council Canada - National Science Library

    Georgiadis, L; Neely, M; Tassiulas, L

    2006-01-01

    .... In this paper we will present abstract models that capture the cross layer interaction from the physical to transport layer in wireless network architectures including cellular, ad-hoc and sensor...

  9. Abstraction Layer For Development And Deployment Of Cloud Services

    Directory of Open Access Journals (Sweden)

    Binh Minh Nguyen

    2012-01-01

    Full Text Available In this paper, we will present an abstraction layer for cloud computing, which intends to simplify the manipulation with virtual machines in clouds for easy and controlled development and deployment of cloud services. It also ensures interoperability between different cloud infrastructures and allows developers to create cloud appliances easily via inheritance mechanisms.

  10. A hierarchical SVG image abstraction layer for medical imaging

    Science.gov (United States)

    Kim, Edward; Huang, Xiaolei; Tan, Gang; Long, L. Rodney; Antani, Sameer

    2010-03-01

    As medical imaging rapidly expands, there is an increasing need to structure and organize image data for efficient analysis, storage and retrieval. In response, a large fraction of research in the areas of content-based image retrieval (CBIR) and picture archiving and communication systems (PACS) has focused on structuring information to bridge the "semantic gap", a disparity between machine and human image understanding. An additional consideration in medical images is the organization and integration of clinical diagnostic information. As a step towards bridging the semantic gap, we design and implement a hierarchical image abstraction layer using an XML based language, Scalable Vector Graphics (SVG). Our method encodes features from the raw image and clinical information into an extensible "layer" that can be stored in a SVG document and efficiently searched. Any feature extracted from the raw image including, color, texture, orientation, size, neighbor information, etc., can be combined in our abstraction with high level descriptions or classifications. And our representation can natively characterize an image in a hierarchical tree structure to support multiple levels of segmentation. Furthermore, being a world wide web consortium (W3C) standard, SVG is able to be displayed by most web browsers, interacted with by ECMAScript (standardized scripting language, e.g. JavaScript, JScript), and indexed and retrieved by XML databases and XQuery. Using these open source technologies enables straightforward integration into existing systems. From our results, we show that the flexibility and extensibility of our abstraction facilitates effective storage and retrieval of medical images.

  11. Analysis of Layered Social Networks

    Science.gov (United States)

    2006-09-01

    xiii List of Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv I. Introduction ...Islamiya JP Joint Publication JTC Joint Targeting Cycle KPP Key Player Problem MCDM Multi-Criteria Decision Making MP Mathematical Programming MST...ANALYSIS OF LAYERED SOCIAL NETWORKS I. Introduction “To know them means to eliminate them” - Colonel Mathieu in the movie, Battle of Algiers

  12. Cross-layer design in optical networks

    CERN Document Server

    Brandt-Pearce, Maïté; Demeester, Piet; Saradhi, Chava

    2013-01-01

    Optical networks have become an integral part of the communications infrastructure needed to support society’s demand for high-speed connectivity.  Cross-Layer Design in Optical Networks addresses topics in optical network design and analysis with a focus on physical-layer impairment awareness and network layer service requirements, essential for the implementation and management of robust scalable networks.  The cross-layer treatment includes bottom-up impacts of the physical and lambda layers, such as dispersion, noise, nonlinearity, crosstalk, dense wavelength packing, and wavelength line rates, as well as top-down approaches to handle physical-layer impairments and service requirements.

  13. Neural Network-Based Abstract Generation for Opinions and Arguments

    OpenAIRE

    Wang, Lu; Ling, Wang

    2016-01-01

    We study the problem of generating abstractive summaries for opinionated text. We propose an attention-based neural network model that is able to absorb information from multiple text units to construct informative, concise, and fluent summaries. An importance-based sampling method is designed to allow the encoder to integrate information from an important subset of input. Automatic evaluation indicates that our system outperforms state-of-the-art abstractive and extractive summarization syst...

  14. Hardware Abstraction and Protocol Optimization for Coded Sensor Networks

    DEFF Research Database (Denmark)

    Nistor, Maricica; Lucani Rötter, Daniel Enrique; Barros, joao

    2014-01-01

    The design of the communication protocols in wireless sensor networks (WSNs) often neglects several key characteristics of the sensor's hardware, while assuming that the number of transmitted bits is the dominating factor behind the system's energy consumption. A closer look at the hardware...... specifications of common sensors reveals, however, that other equally important culprits exist, such as the reception and processing energy. Hence, there is a need for a more complete hardware abstraction of a sensor node to reduce effectively the total energy consumption of the network by designing energy......-efficient protocols that use such an abstraction, as well as mechanisms to optimize a communication protocol in terms of energy consumption. The problem is modeled for different feedback-based techniques, where sensors are connected to a base station, either directly or through relays. We show that for four example...

  15. Broadcast Abstraction in a Stochastic Calculus for Mobile Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2012-01-01

    topology constraint. We allow continuous time stochastic behavior of processes running at network nodes, e.g. in order to be able to model randomized protocols. The introduction of group broadcast and an operator to help avoid flooding allows us to define a novel notion of broadcast abstraction. Finally......, we define a weak bisimulation congruence and apply our theory on an example of a leader election protocol....

  16. ABSTRACT

    African Journals Online (AJOL)

    Peters

    ABSTRACT. Many natural gums are employed as suspending agents in the formulation of pharmaceutical suspensions. The search to develop locally available natural gum from apparently a waste product as an alternative suspending agent stimulated the interest in this present study. Cola acuminata gum (CAG) extracted ...

  17. Abstract ~. ,

    African Journals Online (AJOL)

    Abstract ~. ,. A study was conducted to evaluate the extent of water adulteration of milk produced and marketed in. Morogoro municipality in Tanzania. 'A total of 90 milk samples were collec,ted from institutional, private and smallholder fdrms alid milk vendors, The-samples were analysed for lactometer reading.

  18. Abstract

    African Journals Online (AJOL)

    `123456789jkl''''#

    46. An Empirical Survey of Technology Application in Teaching Geography in Nigerian. Secondary Schools. 1Sofowora O. A. and 2Egbedokun A. Abstract. The main ... through stratified sampling techniques based on school types, location, Local Education Area and gender. .... children learn in two-ways, orally and visually.

  19. Abstract

    African Journals Online (AJOL)

    Francis

    Abstract. Aqueous, methanol and chloroform extracts from the leaves of Ficus religiosa, Thespesia populnea and Hibiscus tiliaceus were completely screened for antibacterial and antifungal activity. The chloroform extract of F. religiosa possessed a broad spectrum of antibacterial activity with a zone of inhibition of 10 to 21 ...

  20. Inter-layer synchronization in multiplex networks of identical layers

    Energy Technology Data Exchange (ETDEWEB)

    Sevilla-Escoboza, R. [Centro Universitario de los Lagos, Universidad de Guadalajara, Jalisco 47460 (Mexico); Sendiña-Nadal, I.; Leyva, I.; Buldú, J. M. [Complex Systems Group & GISC, Universidad Rey Juan Carlos, 28933 Móstoles, Madrid (Spain); Center for Biomedical Technology, Universidad Politécnica de Madrid, 28223 Pozuelo de Alarcón, Madrid (Spain); Gutiérrez, R. [School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD (United Kingdom); Boccaletti, S. [CNR-Institute of Complex Systems, Via Madonna del Piano, 10, 50019 Sesto Fiorentino, Florence (Italy); The Italian Embassy in Israel, 25 Hamered st., 68125 Tel Aviv (Israel)

    2016-06-15

    Inter-layer synchronization is a distinctive process of multiplex networks whereby each node in a given layer evolves synchronously with all its replicas in other layers, irrespective of whether or not it is synchronized with the other units of the same layer. We analytically derive the necessary conditions for the existence and stability of such a state, and verify numerically the analytical predictions in several cases where such a state emerges. We further inspect its robustness against a progressive de-multiplexing of the network, and provide experimental evidence by means of multiplexes of nonlinear electronic circuits affected by intrinsic noise and parameter mismatch.

  1. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  2. Modular representation of layered neural networks.

    Science.gov (United States)

    Watanabe, Chihiro; Hiramatsu, Kaoru; Kashino, Kunio

    2018-01-01

    Layered neural networks have greatly improved the performance of various applications including image processing, speech recognition, natural language processing, and bioinformatics. However, it is still difficult to discover or interpret knowledge from the inference provided by a layered neural network, since its internal representation has many nonlinear and complex parameters embedded in hierarchical layers. Therefore, it becomes important to establish a new methodology by which layered neural networks can be understood. In this paper, we propose a new method for extracting a global and simplified structure from a layered neural network. Based on network analysis, the proposed method detects communities or clusters of units with similar connection patterns. We show its effectiveness by applying it to three use cases. (1) Network decomposition: it can decompose a trained neural network into multiple small independent networks thus dividing the problem and reducing the computation time. (2) Training assessment: the appropriateness of a trained result with a given hyperparameter or randomly chosen initial parameters can be evaluated by using a modularity index. And (3) data analysis: in practical data it reveals the community structure in the input, hidden, and output layers, which serves as a clue for discovering knowledge from a trained neural network. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  4. Software-defined network abstractions and configuration interfaces for building programmable quantum networks

    Energy Technology Data Exchange (ETDEWEB)

    Dasari, Venkat [U.S. Army Research Laboratory, Aberdeen Proving Ground, MD; Sadlier, Ronald J [ORNL; Geerhart, Mr. Billy [U.S. Army Research Laboratory, Aberdeen Proving Ground, MD; Snow, Nikolai [U.S. Army Research Laboratory, Aberdeen Proving Ground, MD; Williams, Brian P [ORNL; Humble, Travis S [ORNL

    2017-01-01

    Well-defined and stable quantum networks are essential to realize functional quantum applications. Quantum networks are complex and must use both quantum and classical channels to support quantum applications like QKD, teleportation, and superdense coding. In particular, the no-cloning theorem prevents the reliable copying of quantum signals such that the quantum and classical channels must be highly coordinated using robust and extensible methods. We develop new network abstractions and interfaces for building programmable quantum networks. Our approach leverages new OpenFlow data structures and table type patterns to build programmable quantum networks and to support quantum applications.

  5. Routing in double layered satellite network

    Science.gov (United States)

    Fan, Xiaofeng; Fei, Gao

    2009-07-01

    With the fast development of aviation technology and network, satellite communication systems are not limited to a signal satellite any more, they are now oriented to network. Double LEO/MEO network can separate network manage from traffic in physical layer in order to manage total network and operate central routing. At last, aiming at the problem of the frequency link switch, we give a new routing protocol (OSPF_SAT) based on OSPF routing protocol. The optimized strategy routing algorithm and is applied to the model, with the result of getting less link switch ratio.

  6. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  7. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  8. UniversAAL - Execution environment installation packages and hardware abstraction layer (D2.1-B)

    OpenAIRE

    Furfari, Francesco; Girolami, Michele; Owda, Zaher; Tazari, Saied

    2011-01-01

    This document corresponds to deliverable D2.1 of type "Prototype". It provides a report about software development within Task 2.1 "Create the universAAL Execution Environment and Hardware Abstraction Layer". The requirements and the scope of D2.1 are equivalent to those defined among the following three expert groups: Middleware, Local Device Discovery and Integration (LDDI), and Security. Each one of these Expert Groups provides the specification of the software under development in compari...

  9. Optimization Models for Flexible and Adaptive SDN Network Virtualization Layers

    OpenAIRE

    Zerwas, Johannes; Blenk, Andreas; Kellerer, Wolfgang

    2016-01-01

    Network hypervisors provide the network virtualization layer for Software Defined Networking (SDN). They enable virtual network (VN) tenants to bring their SDN controllers to program their logical networks individually according to their demands. In order to make use of the high flexibility of virtual SDN networks and to provide high performance, the deployment of the virtualization layer needs to adapt to changing VN demands. This paper initializes the study of the optimization of dynamic SD...

  10. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Halkes, G.P.; Langendoen, K.G.

    2010-01-01

    The evaluation ofMAC protocols forWireless Sensor Networks (WSNs) is often performed through simulation. These simulations necessarily abstract away from reality inmany ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover,

  11. Design considerations for energy efficient, resilient, multi-layer networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Hansen, Line Pyndt; Ruepp, Sarah Renée

    2016-01-01

    This work investigates different network design considerations with respect to energy-efficiency, under green-field resilient multi-layer network deployment. The problem of energy efficient, reliable multi-layer network design is known to result in different trade-offs between key performance...... in multi-layer networks and performance measures such as network resource utilization, availability, agility to traffic fluctuations and energy consumption. A green-field network deployment scenario is considered, where different resiliency methods, design methodologies and grooming strategies are applied...

  12. Visual analysis of large heterogeneous social networks by semantic and structural abstraction.

    Science.gov (United States)

    Shen, Zeqian; Ma, Kwan-Liu; Eliassi-Rad, Tina

    2006-01-01

    Social network analysis is an active area of study beyond sociology. It uncovers the invisible relationships between actors in a network and provides understanding of social processes and behaviors. It has become an important technique in a variety of application areas such as the Web, organizational studies, and homeland security. This paper presents a visual analytics tool, OntoVis, for understanding large, heterogeneous social networks, in which nodes and links could represent different concepts and relations, respectively. These concepts and relations are related through an ontology (also known as a schema). OntoVis is named such because it uses information in the ontology associated with a social network to semantically prune a large, heterogeneous network. In addition to semantic abstraction, OntoVis also allows users to do structural abstraction and importance filtering to make large networks manageable and to facilitate analytic reasoning. All these unique capabilities of OntoVis are illustrated with several case studies.

  13. Investigating physics learning with layered student interaction networks

    DEFF Research Database (Denmark)

    Bruun, Jesper; Traxler, Adrienne

    Centrality in student interaction networks (SINs) can be linked to variables like grades [1], persistence [2], and participation [3]. Recent efforts in the field of network science have been done to investigate layered - or multiplex - networks as mathematical objects [4]. These networks can...

  14. On-line backpropagation in two-layered neural networks

    NARCIS (Netherlands)

    Riegler, Peter; Biehl, Michael

    1995-01-01

    We present an exact analysis of learning a rule by on-line gradient descent in a two-layered neural network with adjustable hidden-to-output weights (backpropagation of error). Results are compared with the training of networks having the same architecture but fixed weights in the second layer.

  15. Clustering network layers with the strata multilayer stochastic block model.

    Science.gov (United States)

    Stanley, Natalie; Shai, Saray; Taylor, Dane; Mucha, Peter J

    2016-01-01

    Multilayer networks are a useful data structure for simultaneously capturing multiple types of relationships between a set of nodes. In such networks, each relational definition gives rise to a layer. While each layer provides its own set of information, community structure across layers can be collectively utilized to discover and quantify underlying relational patterns between nodes. To concisely extract information from a multilayer network, we propose to identify and combine sets of layers with meaningful similarities in community structure. In this paper, we describe the "strata multilayer stochastic block model" (sMLSBM), a probabilistic model for multilayer community structure. The central extension of the model is that there exist groups of layers, called "strata", which are defined such that all layers in a given stratum have community structure described by a common stochastic block model (SBM). That is, layers in a stratum exhibit similar node-to-community assignments and SBM probability parameters. Fitting the sMLSBM to a multilayer network provides a joint clustering that yields node-to-community and layer-to-stratum assignments, which cooperatively aid one another during inference. We describe an algorithm for separating layers into their appropriate strata and an inference technique for estimating the SBM parameters for each stratum. We demonstrate our method using synthetic networks and a multilayer network inferred from data collected in the Human Microbiome Project.

  16. Deep Learning and Developmental Learning: Emergence of Fine-to-Coarse Conceptual Categories at Layers of Deep Belief Network.

    Science.gov (United States)

    Sadeghi, Zahra

    2016-09-01

    In this paper, I investigate conceptual categories derived from developmental processing in a deep neural network. The similarity matrices of deep representation at each layer of neural network are computed and compared with their raw representation. While the clusters generated by raw representation stand at the basic level of abstraction, conceptual categories obtained from deep representation shows a bottom-up transition procedure. Results demonstrate a developmental course of learning from specific to general level of abstraction through learned layers of representations in a deep belief network. © The Author(s) 2016.

  17. Learning Processes of Layered Neural Networks

    OpenAIRE

    Fujiki, Sumiyoshi; FUJIKI, Nahomi, M.

    1995-01-01

    A positive reinforcement type learning algorithm is formulated for a stochastic feed-forward neural network, and a learning equation similar to that of the Boltzmann machine algorithm is obtained. By applying a mean field approximation to the same stochastic feed-forward neural network, a deterministic analog feed-forward network is obtained and the back-propagation learning rule is re-derived.

  18. Network Slicing in Industry 4.0 Applications: Abstraction Methods and End-to-End Analysis

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Popovski, Petar; Kalør, Anders Ellersgaard

    2018-01-01

    Industry 4.0 refers to the fourth industrial revolution, and introduces modern communication and computation technologies such as 5G, cloud computing and Internet of Things to industrial manufacturing systems. As a result, many devices, machines and applications will rely on connectivity, while...... having different requirements from the network, ranging from high reliability and low latency to high data rates. Furthermore, these industrial networks will be highly heterogeneous as they will feature a number of diverse communication technologies. In this article, we propose network slicing...... as a mechanism to handle the diverse set of requirements to the network. We present methods for slicing deterministic and packet-switched industrial communication protocols at an abstraction level which is decoupled from the specific implementation of the underlying technologies, and hence simplifies the slicing...

  19. Vulnerability of multi-layer networks under malware spreading

    CERN Document Server

    Vida, Rafael; Cuenda, Sara

    2013-01-01

    Computer viruses are evolving by developing spreading mechanisms based on the use of multiple vectors of propagation. The use of the social network as an extra vector of attack to penetrate the security measures in IP networks is improving the effectiveness of the malware, and have therefore been used by the most aggressive viruses, like Conficker and Stuxnet. In this work we use multi-layer networks to model the propagation of these kind of viruses. In particular, we study the propagation of a SIS model on a multi-layer network where the state of each node is layer-independent and the dynamics in each network follows either a contact process or a reactive process, with different propagation rates. We show that the interplay between the layers leads to a non-trivial dynamics, with an epidemic onset that may trigger before it triggers in each isolated network. We apply this study to the case of a real two-layer network: a Spanish scientific community of Statistical Physics, formed by a social network of scient...

  20. Community detection, link prediction, and layer interdependence in multilayer networks

    Science.gov (United States)

    De Bacco, Caterina; Power, Eleanor A.; Larremore, Daniel B.; Moore, Cristopher

    2017-04-01

    Complex systems are often characterized by distinct types of interactions between the same entities. These can be described as a multilayer network where each layer represents one type of interaction. These layers may be interdependent in complicated ways, revealing different kinds of structure in the network. In this work we present a generative model, and an efficient expectation-maximization algorithm, which allows us to perform inference tasks such as community detection and link prediction in this setting. Our model assumes overlapping communities that are common between the layers, while allowing these communities to affect each layer in a different way, including arbitrary mixtures of assortative, disassortative, or directed structure. It also gives us a mathematically principled way to define the interdependence between layers, by measuring how much information about one layer helps us predict links in another layer. In particular, this allows us to bundle layers together to compress redundant information and identify small groups of layers which suffice to predict the remaining layers accurately. We illustrate these findings by analyzing synthetic data and two real multilayer networks, one representing social support relationships among villagers in South India and the other representing shared genetic substring material between genes of the malaria parasite.

  1. An automatic method to generate domain-specific investigator networks using PubMed abstracts

    Directory of Open Access Journals (Sweden)

    Gwinn Marta

    2007-06-01

    Full Text Available Abstract Background Collaboration among investigators has become critical to scientific research. This includes ad hoc collaboration established through personal contacts as well as formal consortia established by funding agencies. Continued growth in online resources for scientific research and communication has promoted the development of highly networked research communities. Extending these networks globally requires identifying additional investigators in a given domain, profiling their research interests, and collecting current contact information. We present a novel strategy for building investigator networks dynamically and producing detailed investigator profiles using data available in PubMed abstracts. Results We developed a novel strategy to obtain detailed investigator information by automatically parsing the affiliation string in PubMed records. We illustrated the results by using a published literature database in human genome epidemiology (HuGE Pub Lit as a test case. Our parsing strategy extracted country information from 92.1% of the affiliation strings in a random sample of PubMed records and in 97.0% of HuGE records, with accuracies of 94.0% and 91.0%, respectively. Institution information was parsed from 91.3% of the general PubMed records (accuracy 86.8% and from 94.2% of HuGE PubMed records (accuracy 87.0. We demonstrated the application of our approach to dynamic creation of investigator networks by creating a prototype information system containing a large database of PubMed abstracts relevant to human genome epidemiology (HuGE Pub Lit, indexed using PubMed medical subject headings converted to Unified Medical Language System concepts. Our method was able to identify 70–90% of the investigators/collaborators in three different human genetics fields; it also successfully identified 9 of 10 genetics investigators within the PREBIC network, an existing preterm birth research network. Conclusion We successfully created a

  2. The ventral-hypothalamic input route: a common neural network for abstract cognition and sexuality.

    Science.gov (United States)

    Motofei, Ion G; Rowland, David L

    2014-02-01

    Classically, external receptors of the body transmit information from the environment to the cerebral cortex via the thalamus. This review explains and argues that only concrete external information is transmitted from peripheral receptors to the cortex via a thalamic route, while abstract and sexual external information are actually transmitted from peripheral receptors to the cortex through a cognitive hypothalamic route. Sexual function typically implies participation of two distinct partners, ensuring reproduction in many species including humans. Human sexual response involves participation of multiple (environmental, biological, psychological) kinds of stimuli and processing, so the understanding of sexual control and response supposes integration between the classical physiological mechanisms with the more complex processes of our 'mind'. Cognition and sexuality are two relational functions, which are dependent on concrete (colours, sounds, etc.) and/or abstract (gestures, facial expression, how you move, the way you say something seemingly trivial, etc.) environmental cues. Abstract cues are encoded independent of the specific object features of the stimuli, suggesting that such cues should be transmitted and interpreted within the brain through a system different than the classical thalamo-cortical network that operates on concrete (material) information. Indeed, data show that the cerebral cortex is capable of interpreting two distinct (concrete and abstract) formats of information via distinct and non-compatible brain areas. We expand upon this abstract-concrete dichotomy of the brain, positing that the two distinct cortical networks should be uploaded with distinct information from the environment via two distinct informational input routes. These two routes would be represented by the two distinct routes of the ascending reticular activating system (ARAS), namely the classical/dorsal thalamic input route for concrete information and the ventral

  3. Inter-layer synchronization in non-identical multi-layer networks

    Science.gov (United States)

    Leyva, I.; Sevilla-Escoboza, R.; Sendiña-Nadal, I.; Gutiérrez, R.; Buldú, J. M.; Boccaletti, S.

    2017-04-01

    Inter-layer synchronization is a dynamical process occurring in multi-layer networks composed of identical nodes. This process emerges when all layers are synchronized, while nodes in each layer do not necessarily evolve in unison. So far, the study of such inter-layer synchronization has been restricted to the case in which all layers have an identical connectivity structure. When layers are not identical, the inter-layer synchronous state is no longer a stable solution of the system. Nevertheless, when layers differ in just a few links, an approximate treatment is still feasible, and allows one to gather information on whether and how the system may wander around an inter-layer synchronous configuration. We report the details of an approximate analytical treatment for a two-layer multiplex, which results in the introduction of an extra inertial term accounting for structural differences. Numerical validation of the predictions highlights the usefulness of our approach, especially for small or moderate topological differences in the intra-layer coupling. Moreover, we identify a non-trivial relationship connecting the betweenness centrality of the missing links and the intra-layer coupling strength. Finally, by the use of multiplexed layers of electronic circuits, we study the inter-layer synchronization as a function of the removed links.

  4. Abstracts for the symposium on the Application of neural networks to the earth sciences

    Science.gov (United States)

    Singer, Donald A.

    2002-01-01

    Artificial neural networks are a group of mathematical methods that attempt to mimic some of the processes in the human mind. Although the foundations for these ideas were laid as early as 1943 (McCulloch and Pitts, 1943), it wasn't until 1986 (Rumelhart and McClelland, 1986; Masters, 1995) that applications to practical problems became possible. It is the acknowledged superiority of the human mind at recognizing patterns that the artificial neural networks are trying to imitate with their interconnected neurons. Interconnections used in the methods that have been developed allow robust learning. Capabilities of neural networks fall into three kinds of applications: (1) function fitting or prediction, (2) noise reduction or pattern recognition, and (3) classification or placing into types. Because of these capabilities and the powerful abilities of artificial neural networks, there have been increasing applications of these methods in the earth sciences. The abstracts in this document represent excellent samples of the range of applications. Talks associated with the abstracts were presented at the Symposium on the Application of Neural Networks to the Earth Sciences: Seventh International Symposium on Mineral Exploration (ISME–02), held August 20–21, 2002, at NASA Moffett Field, Mountain View, California. This symposium was sponsored by the Mining and Materials Processing Institute of Japan (MMIJ), the U.S. Geological Survey, the Circum-Pacific Council, and NASA. The ISME symposia have been held every two years in order to bring together scientists actively working on diverse quantitative methods applied to the earth sciences. Although the title, International Symposium on Mineral Exploration, suggests exclusive focus on mineral exploration, interests and presentations have always been wide-ranging—abstracts presented here are no exception.

  5. The Crucial Role of Amateur-Professional Networks in the Golden Age of Large Surveys (Abstract)

    Science.gov (United States)

    Rodriguez, J. E.

    2017-06-01

    (Abstract only) With ongoing projects such as HATNet, SuperWASP, KELT, MEarth, and the CoRoT and Kepler/K2 mission, we are in a golden era of large photometric surveys. In addition, LSST and TESS will be coming online in the next three to five years. The combination of all these projects will increased the number of photometrically monitored stars by orders of magnitude. It is expected that these surveys will enhance our knowledge of circumstellar architecture and the early stages of stellar and planetary formation, while providing a better understanding of exoplanet demographics. However, the success of these surveys will be dependent on simultaneous and continued follow up by large networks. With federal scientific funding reduced over the past few years, the availability of astronomical observations has been directly affected. Fortunately, ground based amateur-professional networks like the AAVSO and the KELT Follow-up Network (KELT-FUN) are already providing access to an international, independent resource for professional grade astronomical observations. These networks have both multi-band photometric and spectroscopic capabilities. I provide an overview of the ongoing and future surveys, highlight past and current contributions by amateur-professional networks to scientific discovery, and discuss the role of these networks in upcoming projects.

  6. Pareto distance for multi-layer network analysis

    DEFF Research Database (Denmark)

    Magnani, Matteo; Rossi, Luca

    2013-01-01

    new research problems related to the extension of traditional single-layer network measures. In this paper we take a step forward over existing approaches by defining a new concept of geodesic distance that includes heterogeneous networks and connections with very limited assumptions regarding...... the strength of the connections. This is achieved by exploiting the concept of Pareto efficiency to define a simple and at the same time powerful measure that we call Pareto distance, of which geodesic distance is a particular case when a single layer (or network) is analyzed. The limited assumptions...

  7. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  8. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...... networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services....... A prototype of the Collaboration Layer has been developed to run in a simulated environment and tested in an evaluation scenario. In the scenario five robots solve the tasks of vacuum cleaning and entrance guarding, which involves the ability to discover potential co-workers, form groups, shift from one group...

  9. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network

    Science.gov (United States)

    Lee, Kyu-Min; Goh, K.-I.

    2016-05-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems.

  10. Temporal abstraction and temporal Bayesian networks in clinical domains: a survey.

    Science.gov (United States)

    Orphanou, Kalia; Stassopoulou, Athena; Keravnou, Elpida

    2014-03-01

    Temporal abstraction (TA) of clinical data aims to abstract and interpret clinical data into meaningful higher-level interval concepts. Abstracted concepts are used for diagnostic, prediction and therapy planning purposes. On the other hand, temporal Bayesian networks (TBNs) are temporal extensions of the known probabilistic graphical models, Bayesian networks. TBNs can represent temporal relationships between events and their state changes, or the evolution of a process, through time. This paper offers a survey on techniques/methods from these two areas that were used independently in many clinical domains (e.g. diabetes, hepatitis, cancer) for various clinical tasks (e.g. diagnosis, prognosis). A main objective of this survey, in addition to presenting the key aspects of TA and TBNs, is to point out important benefits from a potential integration of TA and TBNs in medical domains and tasks. The motivation for integrating these two areas is their complementary function: TA provides clinicians with high level views of data while TBNs serve as a knowledge representation and reasoning tool under uncertainty, which is inherent in all clinical tasks. Key publications from these two areas of relevance to clinical systems, mainly circumscribed to the latest two decades, are reviewed and classified. TA techniques are compared on the basis of: (a) knowledge acquisition and representation for deriving TA concepts and (b) methodology for deriving basic and complex temporal abstractions. TBNs are compared on the basis of: (a) representation of time, (b) knowledge representation and acquisition, (c) inference methods and the computational demands of the network, and (d) their applications in medicine. The survey performs an extensive comparative analysis to illustrate the separate merits and limitations of various TA and TBN techniques used in clinical systems with the purpose of anticipating potential gains through an integration of the two techniques, thus leading to a

  11. Synthesis, Interdiction, and Protection of Layered Networks

    Science.gov (United States)

    2009-09-01

    and explore social networks. [124] In addition, the field of operations research has incorporated many of these techniques and developed the foundation...to be discussed in Section 2.3.7.3. Because different aspects of this foundation are explored , various subsets are dis- cussed including multiojective...National Strategy to Secure Cyberspace which was reviewed in Section 2.2.8.2. Infrastructures are geographically interdependent if they are in close spacial

  12. Using co-occurrence network structure to extract synonymous gene and protein names from MEDLINE abstracts

    Directory of Open Access Journals (Sweden)

    Spackman K

    2005-04-01

    Full Text Available Abstract Background Text-mining can assist biomedical researchers in reducing information overload by extracting useful knowledge from large collections of text. We developed a novel text-mining method based on analyzing the network structure created by symbol co-occurrences as a way to extend the capabilities of knowledge extraction. The method was applied to the task of automatic gene and protein name synonym extraction. Results Performance was measured on a test set consisting of about 50,000 abstracts from one year of MEDLINE. Synonyms retrieved from curated genomics databases were used as a gold standard. The system obtained a maximum F-score of 22.21% (23.18% precision and 21.36% recall, with high efficiency in the use of seed pairs. Conclusion The method performs comparably with other studied methods, does not rely on sophisticated named-entity recognition, and requires little initial seed knowledge.

  13. Core networks for visual-concrete and abstract thought content: a brain electric microstate analysis.

    Science.gov (United States)

    Lehmann, Dietrich; Pascual-Marqui, Roberto D; Strik, Werner K; Koenig, Thomas

    2010-01-01

    Commonality of activation of spontaneously forming and stimulus-induced mental representations is an often made but rarely tested assumption in neuroscience. In a conjunction analysis of two earlier studies, brain electric activity during visual-concrete and abstract thoughts was studied. The conditions were: in study 1, spontaneous stimulus-independent thinking (post-hoc, visual imagery or abstract thought were identified); in study 2, reading of single nouns ranking high or low on a visual imagery scale. In both studies, subjects' tasks were similar: when prompted, they had to recall the last thought (study 1) or the last word (study 2). In both studies, subjects had no instruction to classify or to visually imagine their thoughts, and accordingly were not aware of the studies' aim. Brain electric data were analyzed into functional topographic brain images (using LORETA) of the last microstate before the prompt (study 1) and of the word-type discriminating event-related microstate after word onset (study 2). Conjunction analysis across the two studies yielded commonality of activation of core networks for abstract thought content in left anterior superior regions, and for visual-concrete thought content in right temporal-posterior inferior regions. The results suggest that two different core networks are automatedly activated when abstract or visual-concrete information, respectively, enters working memory, without a subject task or instruction about the two classes of information, and regardless of internal or external origin, and of input modality. These core machineries of working memory thus are invariant to source or modality of input when treating the two types of information.

  14. Quantum photonic network and physical layer security.

    Science.gov (United States)

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-08-06

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel.This article is part of the themed issue 'Quantum technology for the 21st century'. © 2017 The Author(s).

  15. Quantum photonic network and physical layer security

    Science.gov (United States)

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-06-01

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel. This article is part of the themed issue 'Quantum technology for the 21st century'.

  16. Learning of N-layers neural network

    Directory of Open Access Journals (Sweden)

    Vladimír Konečný

    2005-01-01

    Full Text Available In the last decade we can observe increasing number of applications based on the Artificial Intelligence that are designed to solve problems from different areas of human activity. The reason why there is so much interest in these technologies is that the classical way of solutions does not exist or these technologies are not suitable because of their robustness. They are often used in applications like Business Intelligence that enable to obtain useful information for high-quality decision-making and to increase competitive advantage.One of the most widespread tools for the Artificial Intelligence are the artificial neural networks. Their high advantage is relative simplicity and the possibility of self-learning based on set of pattern situations.For the learning phase is the most commonly used algorithm back-propagation error (BPE. The base of BPE is the method minima of error function representing the sum of squared errors on outputs of neural net, for all patterns of the learning set. However, while performing BPE and in the first usage, we can find out that it is necessary to complete the handling of the learning factor by suitable method. The stability of the learning process and the rate of convergence depend on the selected method. In the article there are derived two functions: one function for the learning process management by the relative great error function value and the second function when the value of error function approximates to global minimum.The aim of the article is to introduce the BPE algorithm in compact matrix form for multilayer neural networks, the derivation of the learning factor handling method and the presentation of the results.

  17. Node and layer eigenvector centralities for multiplex networks

    OpenAIRE

    Tudisco, Francesco; Arrigo, Francesca; Gautier, Antoine

    2017-01-01

    Eigenvector-based centrality measures are among the most popular centrality measures in network science. The underlying idea is intuitive and the mathematical description is extremely simple in the framework of standard, mono-layer networks. Moreover, several efficient computational tools are available for their computation. Moving up in dimensionality, several efforts have been made in the past to describe an eigenvector-based centrality measure that generalizes Bonacich index to the case of...

  18. Artificial neural networks for defining the water quality determinants of groundwater abstraction in coastal aquifer

    Science.gov (United States)

    Lallahem, S.; Hani, A.

    2017-02-01

    Water sustainability in the lower Seybouse River basin, eastern Algeria, must take into account the importance of water quantity and quality integration. So, there is a need for a better knowledge and understanding of the water quality determinants of groundwater abstraction to meet the municipal and agricultural uses. In this paper, the artificial neural network (ANN) models were used to model and predict the relationship between groundwater abstraction and water quality determinants in the lower Seybouse River basin. The study area chosen is the lower Seybouse River basin and real data were collected from forty five wells for reference year 2006. Results indicate that the feed-forward multilayer perceptron models with back-propagation are useful tools to define and prioritize the important water quality parameters of groundwater abstraction and use. The model evaluation shows that the correlation coefficients are more than 95% for training, verification and testing data. The model aims to link the water quantity and quality with the objective to strengthen the Integrated Water Resources Management approach. It assists water planners and managers to better assess the water quality parameters and progress towards the provision of appropriate quantities of water of suitable quality.

  19. A primer on physical-layer network coding

    CERN Document Server

    Liew, Soung Chang; Zhang, Shengli

    2015-01-01

    The concept of physical-layer network coding (PNC) was proposed in 2006 for application in wireless networks. Since then it has developed into a subfield of communications and networking with a wide following. This book is a primer on PNC. It is the outcome of a set of lecture notes for a course for beginning graduate students at The Chinese University of Hong Kong. The target audience is expected to have some prior background knowledge in communication theory and wireless communications, but not working knowledge at the research level. Indeed, a goal of this book/course is to allow the reader

  20. Nonlinear response to picosecond pulse excitations in metal backed magnetic layers (abstract)

    Science.gov (United States)

    How, H.; Vittoria, C.; Trott, K.

    1993-05-01

    For years there has been great interest in the radar survivability communities concerning the response of materials to narrow picosecond pulse excitation. In this report, we have calculated the nonlinear response of magnetodielectric thin layers to picosecond excitation utilizing direct time-domain integration. This is in contrast to our previous frequency-domain calculations,1 where the nonlinear properties of the material were dealt with only in an approximate manner. Using time domain calculations, relaxations, hysteresis, and magnetization phenomena associated with the response are, therefore, investigated in depth. The purpose of this calculation was to provide an analytical method by which physical properties of materials can be identified under picosecond pulse excitation as well as to explore special cases of excitations in which picosecond pulses are efficiently absorbed. The calculations indicate that by examining the reflected wave form of the incident rectangular picosecond pulse the amount of magnetic hysteresis and saturation of the material may be estimated. It is shown that magnetic hysteresis will affect the shape of the trailing edge of the reflected signal, whereas the magnetic saturation effect can be identified from the slope of the reflected pulse step. Examples of designing effective picosecond pulse screening structures have also been illustrated. The difference in between the time domain and frequency domain calculations are, therefore, discussed and compared.

  1. PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2017-01-01

    Full Text Available We identify two vulnerabilities for existing highspeed network-layer anonymity protocols, such as LAP and Dovetail. First, the header formats of LAP and Dovetail leak path information, reducing the anonymity-set size when an adversary launches topological attacks. Second, ASes can launch session hijacking attacks to deanonymize destinations. HORNET addresses these problems but incurs additional bandwidth overhead and latency.

  2. Random Access with Physical-layer Network Coding

    NARCIS (Netherlands)

    Goseling, J.; Gastpar, M.C.; Weber, J.H.

    2013-01-01

    Leveraging recent progress in compute-and-forward we propose an approach to random access that is based on physical-layer network coding: When packets collide, it is possible to recover a linear combination of the packets at the receiver. Over many rounds of transmission, the receiver can thus

  3. Global multi-layer network of human mobility.

    Science.gov (United States)

    Belyi, Alexander; Bojic, Iva; Sobolevsky, Stanislav; Sitko, Izabela; Hawelka, Bartosz; Rudikova, Lada; Kurbatski, Alexander; Ratti, Carlo

    2017-07-03

    Recent availability of geo-localized data capturing individual human activity together with the statistical data on international migration opened up unprecedented opportunities for a study on global mobility. In this paper, we consider it from the perspective of a multi-layer complex network, built using a combination of three datasets: Twitter, Flickr and official migration data. Those datasets provide different, but equally important insights on the global mobility - while the first two highlight short-term visits of people from one country to another, the last one - migration - shows the long-term mobility perspective, when people relocate for good. The main purpose of the paper is to emphasize importance of this multi-layer approach capturing both aspects of human mobility at the same time. On the one hand, we show that although the general properties of different layers of the global mobility network are similar, there are important quantitative differences among them. On the other hand, we demonstrate that consideration of mobility from a multi-layer perspective can reveal important global spatial patterns in a way more consistent with those observed in other available relevant sources of international connections, in comparison to the spatial structure inferred from each network layer taken separately.

  4. Competitive dynamics of lexical innovations in multi-layer networks

    Science.gov (United States)

    Javarone, Marco Alberto

    2014-04-01

    We study the introduction of lexical innovations into a community of language users. Lexical innovations, i.e. new term added to people's vocabulary, plays an important role in the process of language evolution. Nowadays, information is spread through a variety of networks, including, among others, online and offline social networks and the World Wide Web. The entire system, comprising networks of different nature, can be represented as a multi-layer network. In this context, lexical innovations diffusion occurs in a peculiar fashion. In particular, a lexical innovation can undergo three different processes: its original meaning is accepted; its meaning can be changed or misunderstood (e.g. when not properly explained), hence more than one meaning can emerge in the population. Lastly, in the case of a loan word, it can be translated into the population language (i.e. defining a new lexical innovation or using a synonym) or into a dialect spoken by part of the population. Therefore, lexical innovations cannot be considered simply as information. We develop a model for analyzing this scenario using a multi-layer network comprising a social network and a media network. The latter represents the set of all information systems of a society, e.g. television, the World Wide Web and radio. Furthermore, we identify temporal directed edges between the nodes of these two networks. In particular, at each time-step, nodes of the media network can be connected to randomly chosen nodes of the social network and vice versa. In doing so, information spreads through the whole system and people can share a lexical innovation with their neighbors or, in the event they work as reporters, by using media nodes. Lastly, we use the concept of "linguistic sign" to model lexical innovations, showing its fundamental role in the study of these dynamics. Many numerical simulations have been performed to analyze the proposed model and its outcomes.

  5. TCP flow control using link layer information in mobile networks

    Science.gov (United States)

    Koga, Hiroyuki; Kawahara, Kenji; Oie, Yuji

    2002-07-01

    Mobile Networks have been expanding and IMT-2000 further increases their available bandwidth over wireless links. However, TCP, which is a reliable end-to-end transport protocol, is tuned to perform well in wired networks where bit error rates are very low and packet loss occurs mostly because of congestion. Although a TCP sender can execute flow control to utilize as much available bandwidth as possible in wired networks, it cannot work well in wireless networks characterized by high bit error rates. In the next generation mobile systems, sophisticated error recovery technologies of FEC and ARQ are indeed employed over wireless links, i.e., over Layer 2, to avoid performance degradation of upper layers. However, multiple retransmissions by Layer 2 ARQ can adversely increase transmission delay of TCP segments, which will further make TCP unnecessarily increase RTO (Retransmission TimeOut). Furthermore, a link bandwidth assigned to TCP flows can change in response to changing air conditions to use wireless links efficiently. TCP thus has to adapt its transmission rate according to the changing available bandwidth. The major goal of this study is to develop a receiver-based effective TCP flow control without any modification on TCP senders, which are probably connected with wired networks. For this end, we propose a TCP flow control employing some Layer 2 information on a wireless link at the mobile station. Our performance evaluation of the proposed TCP shows that the receiver-based TCP flow control can moderate the performance degradation very well even if FER on Layer 2 is high.

  6. Event-driven approach of layered multicast to network adaptation in RED-based IP networks

    Science.gov (United States)

    Nahm, Kitae; Li, Qing; Kuo, C.-C. J.

    2003-11-01

    In this work, we investigate the congestion control problem for layered video multicast in IP networks of active queue management (AQM) using a simple random early detection (RED) queue model. AQM support from networks improves the visual quality of video streaming but makes network adaptation more di+/-cult for existing layered video multicast proticols that use the event-driven timer-based approach. We perform a simplified analysis on the response of the RED algorithm to burst traffic. The analysis shows that the primary problem lies in the weak correlation between the network feedback and the actual network congestion status when the RED queue is driven by burst traffic. Finally, a design guideline of the layered multicast protocol is proposed to overcome this problem.

  7. Content-rich biological network constructed by mining PubMed abstracts

    Directory of Open Access Journals (Sweden)

    Sharp Burt M

    2004-10-01

    Full Text Available Abstract Background The integration of the rapidly expanding corpus of information about the genome, transcriptome, and proteome, engendered by powerful technological advances, such as microarrays, and the availability of genomic sequence from multiple species, challenges the grasp and comprehension of the scientific community. Despite the existence of text-mining methods that identify biological relationships based on the textual co-occurrence of gene/protein terms or similarities in abstract texts, knowledge of the underlying molecular connections on a large scale, which is prerequisite to understanding novel biological processes, lags far behind the accumulation of data. While computationally efficient, the co-occurrence-based approaches fail to characterize (e.g., inhibition or stimulation, directionality biological interactions. Programs with natural language processing (NLP capability have been created to address these limitations, however, they are in general not readily accessible to the public. Results We present a NLP-based text-mining approach, Chilibot, which constructs content-rich relationship networks among biological concepts, genes, proteins, or drugs. Amongst its features, suggestions for new hypotheses can be generated. Lastly, we provide evidence that the connectivity of molecular networks extracted from the biological literature follows the power-law distribution, indicating scale-free topologies consistent with the results of previous experimental analyses. Conclusions Chilibot distills scientific relationships from knowledge available throughout a wide range of biological domains and presents these in a content-rich graphical format, thus integrating general biomedical knowledge with the specialized knowledge and interests of the user. Chilibot http://www.chilibot.net can be accessed free of charge to academic users.

  8. Interdependent multi-layer networks: modeling and survivability analysis with applications to space-based networks.

    Science.gov (United States)

    Castet, Jean-Francois; Saleh, Joseph H

    2013-01-01

    This article develops a novel approach and algorithmic tools for the modeling and survivability analysis of networks with heterogeneous nodes, and examines their application to space-based networks. Space-based networks (SBNs) allow the sharing of spacecraft on-orbit resources, such as data storage, processing, and downlink. Each spacecraft in the network can have different subsystem composition and functionality, thus resulting in node heterogeneity. Most traditional survivability analyses of networks assume node homogeneity and as a result, are not suited for the analysis of SBNs. This work proposes that heterogeneous networks can be modeled as interdependent multi-layer networks, which enables their survivability analysis. The multi-layer aspect captures the breakdown of the network according to common functionalities across the different nodes, and it allows the emergence of homogeneous sub-networks, while the interdependency aspect constrains the network to capture the physical characteristics of each node. Definitions of primitives of failure propagation are devised. Formal characterization of interdependent multi-layer networks, as well as algorithmic tools for the analysis of failure propagation across the network are developed and illustrated with space applications. The SBN applications considered consist of several networked spacecraft that can tap into each other's Command and Data Handling subsystem, in case of failure of its own, including the Telemetry, Tracking and Command, the Control Processor, and the Data Handling sub-subsystems. Various design insights are derived and discussed, and the capability to perform trade-space analysis with the proposed approach for various network characteristics is indicated. The select results here shown quantify the incremental survivability gains (with respect to a particular class of threats) of the SBN over the traditional monolith spacecraft. Failure of the connectivity between nodes is also examined, and the

  9. Interdependent multi-layer networks: modeling and survivability analysis with applications to space-based networks.

    Directory of Open Access Journals (Sweden)

    Jean-Francois Castet

    Full Text Available This article develops a novel approach and algorithmic tools for the modeling and survivability analysis of networks with heterogeneous nodes, and examines their application to space-based networks. Space-based networks (SBNs allow the sharing of spacecraft on-orbit resources, such as data storage, processing, and downlink. Each spacecraft in the network can have different subsystem composition and functionality, thus resulting in node heterogeneity. Most traditional survivability analyses of networks assume node homogeneity and as a result, are not suited for the analysis of SBNs. This work proposes that heterogeneous networks can be modeled as interdependent multi-layer networks, which enables their survivability analysis. The multi-layer aspect captures the breakdown of the network according to common functionalities across the different nodes, and it allows the emergence of homogeneous sub-networks, while the interdependency aspect constrains the network to capture the physical characteristics of each node. Definitions of primitives of failure propagation are devised. Formal characterization of interdependent multi-layer networks, as well as algorithmic tools for the analysis of failure propagation across the network are developed and illustrated with space applications. The SBN applications considered consist of several networked spacecraft that can tap into each other's Command and Data Handling subsystem, in case of failure of its own, including the Telemetry, Tracking and Command, the Control Processor, and the Data Handling sub-subsystems. Various design insights are derived and discussed, and the capability to perform trade-space analysis with the proposed approach for various network characteristics is indicated. The select results here shown quantify the incremental survivability gains (with respect to a particular class of threats of the SBN over the traditional monolith spacecraft. Failure of the connectivity between nodes is also

  10. Layered vanadyl (IV) nitroprusside: Magnetic interaction through a network of hydrogen bonds

    Energy Technology Data Exchange (ETDEWEB)

    Gil, D.M. [Instituto de Química Física, Facultad de Bioquímica, Química y Farmacia, Universidad Nacional de Tucumán, San Lorenzo 456, T4000CAN San Miguel de Tucumán (Argentina); Osiry, H. [Centro de Investigación en Ciencia Aplicada y Tecnología Avanzada, Unidad Legaria, Instituto Politécnico Nacional, México (Mexico); Pomiro, F.; Varetti, E.L. [CEQUINOR (CONICET-UNLP), Facultad de Ciencias Exactas, Universidad Nacional de La Plata, 47 and 115, 1900, La Plata (Argentina); Carbonio, R.E. [INFIQC – CONICET, Departamento de Físico Química, Facultad de Ciencias Químicas, Universidad Nacional de Córdoba, Haya de la Torre esq, Medina Allende, Ciudad Universitaria, X5000HUA Córdoba (Argentina); Alejandro, R.R. [Centro de Investigación en Ciencia Aplicada y Tecnología Avanzada, Unidad Legaria, Instituto Politécnico Nacional, México (Mexico); Ben Altabef, A. [INQUINOA-UNT-CONICET, Instituto de Química Física, Facultad de Bioquímica, Química y Farmacia, Universidad Nacional de Tucumán, San Lorenzo 456, T4000CAN San Miguel de Tucumán (Argentina); and others

    2016-07-15

    The hydrogen bond and π-π stacking are two non-covalent interactions able to support cooperative magnetic ordering between paramagnetic centers. This contribution reports the crystal structure and related magnetic properties for VO[Fe(CN){sub 5}NO]·2H{sub 2}O, which has a layered structure. This solid crystallizes with an orthorhombic unit cell, in the Pna2{sub 1} space group, with cell parameters a=14.1804(2), b=10.4935(1), c=7.1722(8) Å and four molecules per unit cell (Z=4). Its crystal structure was solved and refined from powder X-ray diffraction data. Neighboring layers remain linked through a network of hydrogen bonds involving a water molecule coordinated to the axial position for the V atom and the unbridged axial NO and CN ligands. An uncoordinated water molecule is found forming a triple bridge between these last two ligands and the coordinated water molecule. The magnetic measurements, recorded down to 2 K, shows a ferromagnetic interaction between V atoms located at neighboring layers, with a Curie-Weiss constant of 3.14 K. Such ferromagnetic behavior was interpreted as resulting from a superexchange interaction through the network of strong OH····O{sub H2O}, OH····N{sub CN}, and OH····O{sub NO} hydrogen bonds that connects neighboring layers. The interaction within the layer must be of antiferromagnetic nature and it was detected close to 2 K. - Graphical abstract: Coordination environment for the metals in vanadyl (II) nitroprusside dihydrate. Display Omitted - Highlights: • Crystal structure of vanadyl nitroprusside dehydrate. • Network of hydrogen bonds. • Magnetic interactions through a network of hydrogen bonds. • Layered transition metal nitroprussides.

  11. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  12. HORNET: High-speed Onion Routing at the Network Layer

    OpenAIRE

    Chen, Chen; Asoni, Daniele Enrico; Barrera, David; Danezis, George; Perrig, Adrian

    2015-01-01

    We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range of applications. Our system uses only symmetric cryptography for data forwarding yet requires no per-flow state on intermediate nodes. This design enables HORNET nodes to process anonymous traffic at over 93 Gb/s. HORNET can also scale as requ...

  13. Energy management and multi-layer control of networked microgrids

    Science.gov (United States)

    Zamora, Ramon

    Networked microgrids is a group of neighboring microgrids that has ability to interchange power when required in order to increase reliability and resiliency. Networked microgrid can operate in different possible configurations including: islanded microgrid, a grid-connected microgrid without a tie-line converter, a grid-connected microgrid with a tie-line converter, and networked microgrids. These possible configurations and specific characteristics of renewable energy offer challenges in designing control and management algorithms for voltage, frequency and power in all possible operating scenarios. In this work, control algorithm is designed based on large-signal model that enables microgrid to operate in wide range of operating points. A combination between PI controller and feed-forward measured system responses will compensate for the changes in operating points. The control architecture developed in this work has multi-layers and the outer layer is slower than the inner layer in time response. The main responsibility of the designed controls are to regulate voltage magnitude and frequency, as well as output power of the DG(s). These local controls also integrate with a microgrid level energy management system or microgrid central controller (MGCC) for power and energy balance for. the entire microgrid in islanded, grid-connected, or networked microgid mode. The MGCC is responsible to coordinate the lower level controls to have reliable and resilient operation. In case of communication network failure, the decentralized energy management will operate locally and will activate droop control. Simulation results indicate the superiority of designed control algorithms compared to existing ones.

  14. A hardware abstraction layer for the MicroTCA-based Global Trigger for the CMS experiment at CERN

    CERN Document Server

    Rabady, Dinyar Sebastian

    The Large Hadron Collider (LHC) based at CERN near Geneva collides proton bunches at a rate of 40 MHz. Each collision produces approximately 1 MB of data in the Compact Muon Solenoid (CMS) detector. In order to reduce this event rate to a more manageable amount, a complex filter system was developed. The first stage of this filter is the so-called Level-1 trigger. This system reduces the incoming event rate to 100 kHz which can then be analyzed and filtered further in a massive computing farm. The LHC is scheduled to be upgraded to provide collisions with even more particles involved thus making an upgrade of the Level-1 trigger necessary. This thesis is concerned with the upgrade plans of the GlobalTrigger (GT) project and ultimately lead to the development ofa hardware abstraction layer (HAL) which can provide remote register-level access via Ethernet as well as abstract items to represent the information stored in the registers. Finally a study of the Global Muon Trigger (GMT) efficiency is presented.

  15. Cross-layer restoration with software defined networking based on IP over optical transport networks

    Science.gov (United States)

    Yang, Hui; Cheng, Lei; Deng, Junni; Zhao, Yongli; Zhang, Jie; Lee, Young

    2015-10-01

    The IP over optical transport network is a very promising networking architecture applied to the interconnection of geographically distributed data centers due to the performance guarantee of low delay, huge bandwidth and high reliability at a low cost. It can enable efficient resource utilization and support heterogeneous bandwidth demands in highly-available, cost-effective and energy-effective manner. In case of cross-layer link failure, to ensure a high-level quality of service (QoS) for user request after the failure becomes a research focus. In this paper, we propose a novel cross-layer restoration scheme for data center services with software defined networking based on IP over optical network. The cross-layer restoration scheme can enable joint optimization of IP network and optical network resources, and enhance the data center service restoration responsiveness to the dynamic end-to-end service demands. We quantitatively evaluate the feasibility and performances through the simulation under heavy traffic load scenario in terms of path blocking probability and path restoration latency. Numeric results show that the cross-layer restoration scheme improves the recovery success rate and minimizes the overall recovery time.

  16. The Application of Abstract Algebra and Computers to the Solution of Path Problems in Oriented Networks

    Directory of Open Access Journals (Sweden)

    M.A. Murray–Lasso.

    2010-01-01

    Full Text Available The connection matrix of oriented graphs and a generalization introduced by Gondran and Minoux to solve a great variety of path problems, including various optimization problems (maximize or minimize lengths, minimum capacity, probability, etc., ennumeration of paths, path counting, and connection. To achieve this the matrix components are treated as elements of an algebraic structure called semiring or diod (an extension of a monoid. The possibilities of using MATLAB for handling the matrices are explored and listings of educational programs (not for production runs are provided. The purpose is to rescue a topic which has not become very popular due, in the authors opinion, to the fact that the originators Gondran and Minoux (Ref. 3 have treated the topic in a very abstract manner, oriented to mathematicians and difficult to grasp by engineers. In this article the topics are treated informally and illustrative examples are given (something that Ref. 3 does not provide in great detail as well as listings in the MATLAB language. The topic is ammenable to extensions and it is possible to design educational computerized projects for learning important network topics with very wide applications.

  17. Collaborative Multi-Layer Network Coding in Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2015-05-01

    In this paper, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other\\'s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network\\'s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network\\'s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. © 2015 IEEE.

  18. Preference vs. Authority: A Comparison of Student Searching in a Subject-Specific Indexing and Abstracting Database and a Customized Discovery Layer

    Science.gov (United States)

    Dahlen, Sarah P. C.; Hanson, Kathlene

    2017-01-01

    Discovery layers provide a simplified interface for searching library resources. Libraries with limited finances make decisions about retaining indexing and abstracting databases when similar information is available in discovery layers. These decisions should be informed by student success at finding quality information as well as satisfaction…

  19. Collaborative multi-layer network coding for cellular cognitive radio networks

    KAUST Repository

    Sorour, Sameh

    2013-06-01

    In this paper, we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in underlay cellular cognitive radio networks. This scheme allows the collocated primary and cognitive radio base-stations to collaborate with each other, in order to minimize their own and each other\\'s packet recovery overheads, and thus improve their throughput, without any coordination between them. This non-coordinated collaboration is done using a novel multi-layer instantly decodable network coding scheme, which guarantees that each network\\'s help to the other network does not result in any degradation in its own performance. It also does not cause any violation to the primary networks interference thresholds in the same and adjacent cells. Yet, our proposed scheme both guarantees the reduction of the recovery overhead in collocated primary and cognitive radio networks, and allows early recovery of their packets compared to non-collaborative schemes. Simulation results show that a recovery overhead reduction of 15% and 40% can be achieved by our proposed scheme in the primary and cognitive radio networks, respectively, compared to the corresponding non-collaborative scheme. © 2013 IEEE.

  20. A declarative approach to multi-layer path finding based on semantic network descriptions

    NARCIS (Netherlands)

    Xu, L.; Dijkstra, F.; Marchal, D.; Taal, A.; Grosso, P.; de Laat, C.

    2009-01-01

    With the increasing demand for dynamic network connections between multiple research networks, a number of issues on multi-layer hybrid networks need to be addressed, such as network representation, path finding, and path provisioning. This paper focuses on solving the multi-layer path finding

  1. Multi-Layer and Recursive Neural Networks for Metagenomic Classification.

    Science.gov (United States)

    Ditzler, Gregory; Polikar, Robi; Rosen, Gail

    2015-09-01

    Recent advances in machine learning, specifically in deep learning with neural networks, has made a profound impact on fields such as natural language processing, image classification, and language modeling; however, feasibility and potential benefits of the approaches to metagenomic data analysis has been largely under-explored. Deep learning exploits many layers of learning nonlinear feature representations, typically in an unsupervised fashion, and recent results have shown outstanding generalization performance on previously unseen data. Furthermore, some deep learning methods can also represent the structure in a data set. Consequently, deep learning and neural networks may prove to be an appropriate approach for metagenomic data. To determine whether such approaches are indeed appropriate for metagenomics, we experiment with two deep learning methods: i) a deep belief network, and ii) a recursive neural network, the latter of which provides a tree representing the structure of the data. We compare these approaches to the standard multi-layer perceptron, which has been well-established in the machine learning community as a powerful prediction algorithm, though its presence is largely missing in metagenomics literature. We find that traditional neural networks can be quite powerful classifiers on metagenomic data compared to baseline methods, such as random forests. On the other hand, while the deep learning approaches did not result in improvements to the classification accuracy, they do provide the ability to learn hierarchical representations of a data set that standard classification methods do not allow. Our goal in this effort is not to determine the best algorithm in terms accuracy-as that depends on the specific application-but rather to highlight the benefits and drawbacks of each of the approach we discuss and provide insight on how they can be improved for predictive metagenomic analysis.

  2. Physical layer metrics for vertical handover toward OFDM-based networks

    Directory of Open Access Journals (Sweden)

    Oularbi Mohamed

    2011-01-01

    Full Text Available Abstract The emerging trend to provide users with ubiquitous seamless wireless access leads to the development of multi-mode terminals able to smartly switch between heterogeneous wireless networks. This switching process known as vertical handover requires the terminal to first measure various network metrics relevant to decide whether to trigger a vertical handover (VHO or not. This paper focuses on current and next-generation networks that rely on an OFDM physical layer with either a CSMA/CA or an OFDMA multiple-access technique. Synthesis of several signal feature estimators is presented in a unified way in order to propose a set of complementary metrics (SNR, channel occupancy rate, collision rate relevant as inputs of vertical handover decision algorithms. All the proposed estimators are "non-data aided" and only rely on a physical layer processing so that they do not require multi-mode terminals to be first connected to the handover candidate networks. Results based on a detailed performance study are presented to demonstrate the efficiency of the proposed algorithms. In addition, some experimental results have been performed on a RF platform to validate one of the proposed approaches on real signals.

  3. Physical Layer Design in Wireless Sensor Networks for Fading Mitigation

    Directory of Open Access Journals (Sweden)

    Nuo Chen

    2013-09-01

    Full Text Available This paper presents the theoretical analysis, simulation results and suggests design in digital technology of a physical layer for wireless sensor networks. The proposed design is able to mitigate fading inside communication channel. To mitigate fading the chip interleaving technique is proposed. For the proposed theoretical model of physical layer, a rigorous mathematical analysis is conducted, where all signals are presented and processed in discrete time domain form which is suitable for further direct processing necessary for devices design in digital technology. Three different channels are used to investigate characteristics of the physical layer: additive white Gaussian noise channel (AWGN, AWG noise and flat fading channel and AWG noise and flat fading channel with interleaver and deinterleaver blocks in the receiver and transmitter respectively. Firstly, the mathematical model of communication system representing physical layer is developed based on the discrete time domain signal representation and processing. In the existing theory, these signals and their processing are represented in continuous time form, which is not suitable for direct implementation in digital technology. Secondly, the expressions for the probability of chip, symbol and bit error are derived. Thirdly, the communication system simulators are developed in MATLAB. The simulation results confirmed theoretical findings.

  4. Cellulose fibre networks reinforced with carboxymethyl cellulose/chitosan complex layer-by-layer.

    Science.gov (United States)

    Wu, Tongfei; Farnood, Ramin

    2014-12-19

    An eco-friendly and full-polysaccharide polyelectrolyte complex system was developed to enhance the wet and dry tensile strength of cellulose fibre networks. Cellulose fibres were treated by carboxymethyl cellulose (CMC) in pulp suspension. Paper sheets made from CMC-treated fibres were further modified via the layer-by-layer (LbL) deposition of CMC/chitosan (CS) complex. The effect of number of CMC/CS layers on the strength properties of cellulose fibre networks (both under wet and dry conditions) was studied and sample structure was investigated by scanning electron microscopy (SEM). Water vapour transmission rate (WVTR) of CMC/CS-treated samples was also examined. The observed changes in the strength properties of treated samples were explained based on the competition between the rate of diffusion of CS to the fibre-fibre bond areas and the rate of disassociation of fibre-fibre interactions during the LbL deposition process. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Collaborative Multi-Layer Network Coding For Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2014-05-01

    In this thesis, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other’s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network’s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network’s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. Furthermore, with the use of fractional cooperation, the average recovery overhead is further reduced by around 5% for the primary network and around 10% for the secondary network when a high fractional cooperation probability is used.

  6. A Novel Cross-Layer Routing Protocol Based on Network Coding for Underwater Sensor Networks.

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Bu, Renfei; Zhang, Eryang

    2017-08-08

    Underwater wireless sensor networks (UWSNs) have attracted increasing attention in recent years because of their numerous applications in ocean monitoring, resource discovery and tactical surveillance. However, the design of reliable and efficient transmission and routing protocols is a challenge due to the low acoustic propagation speed and complex channel environment in UWSNs. In this paper, we propose a novel cross-layer routing protocol based on network coding (NCRP) for UWSNs, which utilizes network coding and cross-layer design to greedily forward data packets to sink nodes efficiently. The proposed NCRP takes full advantages of multicast transmission and decode packets jointly with encoded packets received from multiple potential nodes in the entire network. The transmission power is optimized in our design to extend the life cycle of the network. Moreover, we design a real-time routing maintenance protocol to update the route when detecting inefficient relay nodes. Substantial simulations in underwater environment by Network Simulator 3 (NS-3) show that NCRP significantly improves the network performance in terms of energy consumption, end-to-end delay and packet delivery ratio compared with other routing protocols for UWSNs.

  7. A social network approach to understanding science communication among fire professionals (Abstract)

    Science.gov (United States)

    Vita Wright; Andrea Thode; Anne Mottek-Lucas; Jacklynn Fallon; Megan Matonis

    2012-01-01

    Studies of science communication and use in the fire management community suggest manager's access research via informal information networks and that these networks vary by both agency and position. We used a phone survey followed by traditional statistical analyses to understand the informal social networks of fire professionals in two western regions of the...

  8. Thinking Big or Small: Does Mental Abstraction Affect Social Network Organization?

    Science.gov (United States)

    Bacev-Giles, Chantal; Peetz, Johanna

    2016-01-01

    Four studies examined how mental abstraction affects how people perceive their relationships with other people, specifically, how these relationships may be categorized in social groups. We expected that individuals induced to think abstractly would report fewer more global social groups, compared to those induced to think concretely, who would report more specific groups. However, induced abstract mindset did not affect how people structured their social groups (Study 2–4), despite evidence that the mindset manipulation changed the level of abstraction in their thoughts (Study 3) and evidence that it changed how people structured groups for a control condition (household objects, Study 4). Together, these studies suggest that while the way people organize their relationships into groups is malleable; cognitive abstraction does not seem to affect how people categorize their relationships into social groups. PMID:26808086

  9. Thinking Big or Small: Does Mental Abstraction Affect Social Network Organization?

    Directory of Open Access Journals (Sweden)

    Chantal Bacev-Giles

    Full Text Available Four studies examined how mental abstraction affects how people perceive their relationships with other people, specifically, how these relationships may be categorized in social groups. We expected that individuals induced to think abstractly would report fewer more global social groups, compared to those induced to think concretely, who would report more specific groups. However, induced abstract mindset did not affect how people structured their social groups (Study 2-4, despite evidence that the mindset manipulation changed the level of abstraction in their thoughts (Study 3 and evidence that it changed how people structured groups for a control condition (household objects, Study 4. Together, these studies suggest that while the way people organize their relationships into groups is malleable; cognitive abstraction does not seem to affect how people categorize their relationships into social groups.

  10. Semantic and layered protein function prediction from PPI networks.

    Science.gov (United States)

    Zhu, Wei; Hou, Jingyu; Chen, Yi-Ping Phoebe

    2010-11-21

    The past few years have seen a rapid development in novel high-throughput technologies that have created large-scale data on protein-protein interactions (PPI) across human and most model species. This data is commonly represented as networks, with nodes representing proteins and edges representing the PPIs. A fundamental challenge to bioinformatics is how to interpret this wealth of data to elucidate the interaction of patterns and the biological characteristics of the proteins. One significant purpose of this interpretation is to predict unknown protein functions. Although many approaches have been proposed in recent years, the challenge still remains how to reasonably and precisely measure the functional similarities between proteins to improve the prediction effectiveness. We used a Semantic and Layered Protein Function Prediction (SLPFP) framework to more effectively predict unknown protein functions at different functional levels. The framework relies on a new protein similarity measurement and a clustering-based protein function prediction algorithm. The new protein similarity measurement incorporates the topological structure of the PPI network, as well as the protein's semantic information in terms of known protein functions at different functional layers. Experiments on real PPI datasets were conducted to evaluate the effectiveness of the proposed framework in predicting unknown protein functions. The proposed framework has a higher prediction accuracy compared with other similar approaches. The prediction results are stable even for a large number of proteins. Furthermore, the framework is able to predict unknown functions at different functional layers within the Munich Information Center for Protein Sequence (MIPS) hierarchical functional scheme. The experimental results demonstrated that the new protein similarity measurement reflects more reasonably and precisely relationships between proteins. Copyright © 2010 Elsevier Ltd. All rights reserved.

  11. CROSS LAYERED HYBRID TRANSPORT LAYER PROTOCOL APPROACH TO ENHANCE NETWORK UTILISATION FOR VIDEO TRAFFIC

    Directory of Open Access Journals (Sweden)

    Matilda.S

    2010-03-01

    Full Text Available Video data transfer is the major traffic in today’s Internet. With the emerging need for anytime anywhere communication, applications transmitting video is gaining momentum. Real Time Protocol is the primary standard for transfer of video data, as; it requires timely delivery and can tolerate loss of packets. Streaming is the method used for delivering video content from the source server to the user. But this has many drawbacks: a It sends only the amount of data equivalent to the streaming encoded rate to the client irrespective of the available bandwidth in the path. Hence the links are underutilized; b It utilizes the link for the entire period of transfer and hence the link is not available to service other new clients. Thus as the number of clients increases, the network performance decreases. In this work, the advantages and disadvantages of the combination of different protocols in the application layer and transport layer are analyzed. The significant characteristics of each of these protocols are utilized and a combination of protocols for improving the network performance is arrived at, while retaining the QoS of video transmission.

  12. Process identification through modular neural networks and rule extraction (extended abstract)

    NARCIS (Netherlands)

    van der Zwaag, B.J.; Slump, Cornelis H.; Spaanenburg, L.; Blockeel, Hendrik; Denecker, Marc

    2002-01-01

    Monolithic neural networks may be trained from measured data to establish knowledge about the process. Unfortunately, this knowledge is not guaranteed to be found and – if at all – hard to extract. Modular neural networks are better suited for this purpose. Domain-ordered by topology, rule

  13. Hypothetical Pattern Recognition Design Using Multi-Layer Perceptorn Neural Network For Supervised Learning

    Directory of Open Access Journals (Sweden)

    Md. Abdullah-al-mamun

    2015-08-01

    Full Text Available Abstract Humans are capable to identifying diverse shape in the different pattern in the real world as effortless fashion due to their intelligence is grow since born with facing several learning process. Same way we can prepared an machine using human like brain called Artificial Neural Network that can be recognize different pattern from the real world object. Although the various techniques is exists to implementation the pattern recognition but recently the artificial neural network approaches have been giving the significant attention. Because the approached of artificial neural network is like a human brain that is learn from different observation and give a decision the previously learning rule. Over the 50 years research now a days pattern recognition for machine learning using artificial neural network got a significant achievement. For this reason many real world problem can be solve by modeling the pattern recognition process. The objective of this paper is to present the theoretical concept for pattern recognition design using Multi-Layer Perceptorn neural networkin the algorithm of artificial Intelligence as the best possible way of utilizing available resources to make a decision that can be a human like performance.

  14. A cross-layer communication framework for wireless networked control systems

    NARCIS (Netherlands)

    Israr, N.; Scanlon, W.G.; Irwin, G.W.

    2009-01-01

    This paper presents a robust, dynamic cross-layer wireless communication architecture for wireless networked control systems. Each layer in the proposed protocol architecture contributes to the overall goal of reliable, energy efficient communication. The protocol stack also features a

  15. Macroeconomic potentials of intelligent networks in Germany. Abstract; Gesamtwirtschaftliche Potenziale intelligenter Netze in Deutschland. Kurzfassung

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Within the contribution under consideration the Fraunhofer Institute for Systems and Innovation Research ISI (Karlsruhe, Federal Republic of Germany) determines the total economic effects of intelligent networks for the German economy. For the first time, the contributions of the different areas (energy, health, traffic, education, administration) are shown detailed. On the whole, it arises a societal total benefit of intelligent networks of 55.7 billion Euro per year.

  16. Extraverts Have Larger Social Network Layers But Do Not Feel Emotionally Closer to Individuals at Any Layer

    NARCIS (Netherlands)

    Pollet, Thomas V.; Roberts, Sam G. B.; Dunbar, Robin I. M.

    2011-01-01

    Previous studies showed that extraversion influences social network size. However, it is unclear how extraversion affects the size of different layers of the network, and how extraversion relates to the emotional intensity of social relationships. We examined the relationships between extraversion,

  17. Self-Organized Information Processing in Neuronal Networks: Replacing Layers in Deep Networks by Dynamics

    Science.gov (United States)

    Kirst, Christoph

    It is astonishing how the sub-parts of a brain co-act to produce coherent behavior. What are mechanism that coordinate information processing and communication and how can those be changed flexibly in order to cope with variable contexts? Here we show that when information is encoded in the deviations around a collective dynamical reference state of a recurrent network the propagation of these fluctuations is strongly dependent on precisely this underlying reference. Information here 'surfs' on top of the collective dynamics and switching between states enables fast and flexible rerouting of information. This in turn affects local processing and consequently changes in the global reference dynamics that re-regulate the distribution of information. This provides a generic mechanism for self-organized information processing as we demonstrate with an oscillatory Hopfield network that performs contextual pattern recognition. Deep neural networks have proven to be very successful recently. Here we show that generating information channels via collective reference dynamics can effectively compress a deep multi-layer architecture into a single layer making this mechanism a promising candidate for the organization of information processing in biological neuronal networks.

  18. A multi-layered network of the (Colombian) sovereign securities market

    NARCIS (Netherlands)

    Renneboog, Luc; Leon Rincon, Carlos; Pérez, Jhonatan; Alexandrova-Kabadjova, Bilana; Diehl, Martin; Heuver, Richard; Martinez-Jaramillo, Serafín

    2015-01-01

    We study the network of Colombian sovereign securities settlements. With data from the settlement market infrastructure we study financial institutions’ transactions from three different trading and registering individual networks that we combine into a multi-layer network. Examining this network of

  19. Demo Abstract: Service Oriented Wireless Sensor Networks - A Cluster-based Approach

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.

    In this paper we demonstrate a service-oriented solution for heterogeneous WSNs. The main operations are service discovery and service usage. Our solution is integrated with mobile platforms (smartphones and PDAs), that act as gateways to the GSM network and the Internet.

  20. Poster Abstract : Fault Detection in Wireless Sensor Networks: A Hybrid Approach

    NARCIS (Netherlands)

    Warriach, Ehsan; Nguyen, Tuan Anh; Aiello, Marco; Tel, Kenji

    2012-01-01

    Wireless Sensor Network (WSN) deployment experiences show that data collected is prone to be imprecise and faulty due to internal and external influences, such as battery drain, environmental interference, sensor aging. An early detection of such faults is necessary for the effective operation of

  1. Mesoscopic structures reveal the network between the layers of multiplex data sets

    Science.gov (United States)

    Iacovacci, Jacopo; Wu, Zhihao; Bianconi, Ginestra

    2015-10-01

    Multiplex networks describe a large variety of complex systems, whose elements (nodes) can be connected by different types of interactions forming different layers (networks) of the multiplex. Multiplex networks include social networks, transportation networks, or biological networks in the cell or in the brain. Extracting relevant information from these networks is of crucial importance for solving challenging inference problems and for characterizing the multiplex networks microscopic and mesoscopic structure. Here we propose an information theory method to extract the network between the layers of multiplex data sets, forming a "network of networks." We build an indicator function, based on the entropy of network ensembles, to characterize the mesoscopic similarities between the layers of a multiplex network, and we use clustering techniques to characterize the communities present in this network of networks. We apply the proposed method to study the Multiplex Collaboration Network formed by scientists collaborating on different subjects and publishing in the American Physical Society journals. The analysis of this data set reveals the interplay between the collaboration networks and the organization of knowledge in physics.

  2. Path finding using the multi-layer network description language

    NARCIS (Netherlands)

    Dijkstra, F.; van der Ham, J.; Grosso, P.; de Laat, C.

    2008-01-01

    Research networks are providing their users with dedicated network connections. Users want these connects to go through different domains, so the research networks are challenged to find valid network connections through multiple domains. The challenge arises if the different network domains use

  3. Modular Semantic Tagging of Medline Abstracts and its Use in Inferring Regulatory Networks

    Energy Technology Data Exchange (ETDEWEB)

    Verhagen, Marc; Pustejovsky, James; Taylor, Ronald C.; Sanfilippo, Antonio P.

    2011-09-19

    We describe MedstractPlus, a resource for mining relations from the Medline bibliographic database that is currently under construction. It was built on the remains of Medstract, a previously created resource that included a biorelation server and an acronym database. MedstractPlus uses simple and scalable natural language processing modules to structure text, is designed with reusability and extendibility in mind, and adheres to the philosophy of the Linguistic Annotation Framework. We show how MedstractPlus has been used to provide seeds for a novel approach to inferring transcriptional regulatory networks from gene expression data.

  4. Pore Network Modeling of Multiphase Transport in Polymer Electrolyte Membrane Fuel Cell Gas Diffusion Layers

    Science.gov (United States)

    Fazeli, Mohammadreza

    In this thesis, pore network modeling was used to study how the microstructure of the polymer electrolyte membrane (PEM) fuel cell gas diffusion layer (GDL) influences multiphase transport within the composite layer. An equivalent pore network of a GDL was used to study the effects of GDL/catalyst layer condensation points and contact quality on the spatial distribution of liquid water in the GDL. Next, pore networks extracted from synchrotron-based micro-computed tomography images of compressed GDLs were employed to simulate liquid water transport in GDL materials over a range of compression pressures, and favorable GDL compression values for preferred liquid water distributions were found for two commercially available GDL materials. Finally, a technique was developed for calculating the oxygen diffusivity in carbon paper substrates with a microporous layer (MPL) coating through pore network modeling. A hybrid network was incorporated into the pore network model, and effective diffusivity predictions of MPL coated GDL materials were obtained.

  5. Can we neglect the multi-layer structure of functional networks?

    Science.gov (United States)

    Zanin, Massimiliano

    2015-07-01

    Functional networks, i.e. networks representing dynamic relationships between the components of a complex system, have been instrumental for our understanding of, among others, the human brain. Due to limited data availability, the multi-layer nature of numerous functional networks has hitherto been neglected, and nodes are endowed with a single type of links even when multiple relationships coexist at different physical levels. A relevant problem is the assessment of the benefits yielded by studying a multi-layer functional network, against the simplicity guaranteed by the reconstruction and use of the corresponding single layer projection. Here, I tackle this issue by using as a test case, the functional network representing the dynamics of delay propagation through European airports. Neglecting the multi-layer structure of a functional network has dramatic consequences on our understanding of the underlying system, a fact to be taken into account when a projection is the only available information.

  6. UniversAAL - universAAL execution environment, installation packages, hardware abstraction layer, generic platform services / AAL platform services and ontology artefacts

    OpenAIRE

    Girolami, Michele; Furfari, Francesco; Stockl?w, Carsten; Owda, Zaher

    2012-01-01

    This document corresponds to deliverable D2.1 of type "Prototype". It provides a report about software development within Task 2.1 "Create the universAAL Execution Environment and Hardware Abstraction Layer" and Task 2.2 "Implement universAAL Generic Platform Services, AAL Platform services and ontologies support". The requirements and the scope of D2.1 are equivalent to those defined among the following three expert groups: Middleware, Local Device Discovery and Integration (LDDI), and Secur...

  7. Towards Automatic Extraction of Social Networks of Organizations in PubMed Abstracts

    CERN Document Server

    Jonnalagadda, Siddhartha; Gonzalez, Graciela

    2010-01-01

    Social Network Analysis (SNA) of organizations can attract great interest from government agencies and scientists for its ability to boost translational research and accelerate the process of converting research to care. For SNA of a particular disease area, we need to identify the key research groups in that area by mining the affiliation information from PubMed. This not only involves recognizing the organization names in the affiliation string, but also resolving ambiguities to identify the article with a unique organization. We present here a process of normalization that involves clustering based on local sequence alignment metrics and local learning based on finding connected components. We demonstrate the application of the method by analyzing organizations involved in angiogenensis treatment, and demonstrating the utility of the results for researchers in the pharmaceutical and biotechnology industries or national funding agencies.

  8. Cross-Dependency Inference in Multi-Layered Networks: A Collaborative Filtering Perspective.

    Science.gov (United States)

    Chen, Chen; Tong, Hanghang; Xie, Lei; Ying, Lei; He, Qing

    2017-08-01

    The increasingly connected world has catalyzed the fusion of networks from different domains, which facilitates the emergence of a new network model-multi-layered networks. Examples of such kind of network systems include critical infrastructure networks, biological systems, organization-level collaborations, cross-platform e-commerce, and so forth. One crucial structure that distances multi-layered network from other network models is its cross-layer dependency, which describes the associations between the nodes from different layers. Needless to say, the cross-layer dependency in the network plays an essential role in many data mining applications like system robustness analysis and complex network control. However, it remains a daunting task to know the exact dependency relationships due to noise, limited accessibility, and so forth. In this article, we tackle the cross-layer dependency inference problem by modeling it as a collective collaborative filtering problem. Based on this idea, we propose an effective algorithm Fascinate that can reveal unobserved dependencies with linear complexity. Moreover, we derive Fascinate-ZERO, an online variant of Fascinate that can respond to a newly added node timely by checking its neighborhood dependencies. We perform extensive evaluations on real datasets to substantiate the superiority of our proposed approaches.

  9. Abstract Computation in Schizophrenia Detection through Artificial Neural Network Based Systems

    Directory of Open Access Journals (Sweden)

    L. Cardoso

    2015-01-01

    Full Text Available Schizophrenia stands for a long-lasting state of mental uncertainty that may bring to an end the relation among behavior, thought, and emotion; that is, it may lead to unreliable perception, not suitable actions and feelings, and a sense of mental fragmentation. Indeed, its diagnosis is done over a large period of time; continuos signs of the disturbance persist for at least 6 (six months. Once detected, the psychiatrist diagnosis is made through the clinical interview and a series of psychic tests, addressed mainly to avoid the diagnosis of other mental states or diseases. Undeniably, the main problem with identifying schizophrenia is the difficulty to distinguish its symptoms from those associated to different untidiness or roles. Therefore, this work will focus on the development of a diagnostic support system, in terms of its knowledge representation and reasoning procedures, based on a blended of Logic Programming and Artificial Neural Networks approaches to computing, taking advantage of a novel approach to knowledge representation and reasoning, which aims to solve the problems associated in the handling (i.e., to stand for and reason of defective information.

  10. Combining multi-layered bitmap files using network specific hardware

    Science.gov (United States)

    DuBois, David H [Los Alamos, NM; DuBois, Andrew J [Santa Fe, NM; Davenport, Carolyn Connor [Los Alamos, NM

    2012-02-28

    Images and video can be produced by compositing or alpha blending a group of image layers or video layers. Increasing resolution or the number of layers results in increased computational demands. As such, the available computational resources limit the images and videos that can be produced. A computational architecture in which the image layers are packetized and streamed through processors can be easily scaled so to handle many image layers and high resolutions. The image layers are packetized to produce packet streams. The packets in the streams are received, placed in queues, and processed. For alpha blending, ingress queues receive the packetized image layers which are then z sorted and sent to egress queues. The egress queue packets are alpha blended to produce an output image or video.

  11. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  12. Circumpolar Active Layer Monitoring (CALM) Program Network, Version 1

    Data.gov (United States)

    National Aeronautics and Space Administration — The CALM network includes 168 active sites in both hemispheres with 15 participating countries. This network represents the only coordinated and standardized program...

  13. Synchronization and Inter-Layer Interactions of Noise-Driven Neural Networks.

    Science.gov (United States)

    Yuniati, Anis; Mai, Te-Lun; Chen, Chi-Ming

    2017-01-01

    In this study, we used the Hodgkin-Huxley (HH) model of neurons to investigate the phase diagram of a developing single-layer neural network and that of a network consisting of two weakly coupled neural layers. These networks are noise driven and learn through the spike-timing-dependent plasticity (STDP) or the inverse STDP rules. We described how these networks transited from a non-synchronous background activity state (BAS) to a synchronous firing state (SFS) by varying the network connectivity and the learning efficacy. In particular, we studied the interaction between a SFS layer and a BAS layer, and investigated how synchronous firing dynamics was induced in the BAS layer. We further investigated the effect of the inter-layer interaction on a BAS to SFS repair mechanism by considering three types of neuron positioning (random, grid, and lognormal distributions) and two types of inter-layer connections (random and preferential connections). Among these scenarios, we concluded that the repair mechanism has the largest effect for a network with the lognormal neuron positioning and the preferential inter-layer connections.

  14. A path finding implementation for multi-layer network

    NARCIS (Netherlands)

    Dijkstra, F.; Ham, J.J. van der; Grosso, P.; Laat, C. de

    2009-01-01

    The goal of the OptIPuter project is to tightly couple research applications with dynamically allocated paths. Since OptIPuter is a multi-disciplinary project, the paths through the network often span multiple network domains, and the applications are challenged to find valid network connections

  15. A path finding implementation for multi-layer networks

    NARCIS (Netherlands)

    Dijkstra, F.; van der Ham, J.; Grosso, P.; de Laat, C.

    2009-01-01

    The goal of the OptIPuter project is to tightly couple research applications with dynamically allocated paths. Since OptIPuter is a multi-disciplinary project, the paths through the network often span multiple network domains, and the applications are challenged to find valid network connections

  16. Ambient Intelligence Context-Based Cross-Layer Design in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yang Liu

    2014-10-01

    Full Text Available By exchanging information directly between non-adjacent protocol layers, cross-layer (CL interaction can significantly improve and optimize network performances such as energy efficiency and delay. This is particularly important for wireless sensor networks (WSNs where sensor devices are energy-constrained and deployed for real-time monitoring applications. Existing CL schemes mainly exploit information exchange between physical, medium access control (MAC, and routing layers, with only a handful involving application layer. For the first time, we proposed a framework for CL optimization based on user context of ambient intelligence (AmI application and an ontology-based context modeling and reasoning mechanism. We applied the proposed framework to jointly optimize MAC and network (NET layer protocols for WSNs. Extensive evaluations show that the resulting optimization through context awareness and CL interaction for both MAC and NET layer protocols can yield substantial improvements in terms of throughput, packet delivery, delay, and energy performances.

  17. Ambient intelligence context-based cross-layer design in wireless sensor networks.

    Science.gov (United States)

    Liu, Yang; Seet, Boon-Chong; Al-Anbuky, Adnan

    2014-10-14

    By exchanging information directly between non-adjacent protocol layers, cross-layer (CL) interaction can significantly improve and optimize network performances such as energy efficiency and delay. This is particularly important for wireless sensor networks (WSNs) where sensor devices are energy-constrained and deployed for real-time monitoring applications. Existing CL schemes mainly exploit information exchange between physical, medium access control (MAC), and routing layers, with only a handful involving application layer. For the first time, we proposed a framework for CL optimization based on user context of ambient intelligence (AmI) application and an ontology-based context modeling and reasoning mechanism. We applied the proposed framework to jointly optimize MAC and network (NET) layer protocols for WSNs. Extensive evaluations show that the resulting optimization through context awareness and CL interaction for both MAC and NET layer protocols can yield substantial improvements in terms of throughput, packet delivery, delay, and energy performances.

  18. Caries induced cytokine network in the odontoblast layer of human teeth

    Directory of Open Access Journals (Sweden)

    Horst Jeremy A

    2011-01-01

    Full Text Available Abstract Background Immunologic responses of the tooth to caries begin with odontoblasts recognizing carious bacteria. Inflammatory propagation eventually leads to tooth pulp necrosis and danger to health. The present study aims to determine cytokine gene expression profiles generated within human teeth in response to dental caries in vivo and to build a mechanistic model of these responses and the downstream signaling network. Results We demonstrate profound differential up-regulation of inflammatory genes in the odontoblast layer (ODL in human teeth with caries in vivo, while the pulp remains largely unchanged. Interleukins, chemokines, and all tested receptors thereof were differentially up-regulated in ODL of carious teeth, well over one hundred-fold for 35 of 84 genes. By interrogating reconstructed protein interaction networks corresponding to the differentially up-regulated genes, we develop the hypothesis that pro-inflammatory cytokines highly expressed in ODL of carious teeth, IL-1β, IL-1α, and TNF-α, carry the converged inflammatory signal. We show that IL1β amplifies antimicrobial peptide production in odontoblasts in vitro 100-fold more than lipopolysaccharide, in a manner matching subsequent in vivo measurements. Conclusions Our data suggest that ODL amplifies bacterial signals dramatically by self-feedback cytokine-chemokine signal-receptor cycling, and signal convergence through IL1R1 and possibly others, to increase defensive capacity including antimicrobial peptide production to protect the tooth and contain the battle against carious bacteria within the dentin.

  19. The six dimensions of personality (HEXACO) and their associations with network layer size and emotional closeness to network members

    NARCIS (Netherlands)

    Molho, Catherine; Lis, Sam G.B.; de Vries, Reinout Everhard; Pollet, Thomas V.

    2016-01-01

    Previous work has examined how specific personality dimensions are associated with social network characteristics. However, it is unclear how the full range of personality traits relates to the quantity and quality of relationships at different network layers. This study (N = 525) investigates how

  20. Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Tom [USC; Ghani, Nasir [UNM; Boyd, Eric [UCAID

    2010-08-31

    At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including OSCARS layer2 and InterDomain Adaptation, Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, Control plane software release, Scheduling, AAA, security architecture, Network Virtualization architecture, Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

  1. Super-Resolution Community Detection for Layer-Aggregated Multilayer Networks

    Directory of Open Access Journals (Sweden)

    Dane Taylor

    2017-09-01

    Full Text Available Applied network science often involves preprocessing network data before applying a network-analysis method, and there is typically a theoretical disconnect between these steps. For example, it is common to aggregate time-varying network data into windows prior to analysis, and the trade-offs of this preprocessing are not well understood. Focusing on the problem of detecting small communities in multilayer networks, we study the effects of layer aggregation by developing random-matrix theory for modularity matrices associated with layer-aggregated networks with N nodes and L layers, which are drawn from an ensemble of Erdős–Rényi networks with communities planted in subsets of layers. We study phase transitions in which eigenvectors localize onto communities (allowing their detection and which occur for a given community provided its size surpasses a detectability limit K^{*}. When layers are aggregated via a summation, we obtain K^{*}∝O(sqrt[NL]/T, where T is the number of layers across which the community persists. Interestingly, if T is allowed to vary with L, then summation-based layer aggregation enhances small-community detection even if the community persists across a vanishing fraction of layers, provided that T/L decays more slowly than O(L^{-1/2}. Moreover, we find that thresholding the summation can, in some cases, cause K^{*} to decay exponentially, decreasing by orders of magnitude in a phenomenon we call super-resolution community detection. In other words, layer aggregation with thresholding is a nonlinear data filter enabling detection of communities that are otherwise too small to detect. Importantly, different thresholds generally enhance the detectability of communities having different properties, illustrating that community detection can be obscured if one analyzes network data using a single threshold.

  2. Resource Allocation and Cross Layer Control in Wireless Networks

    Science.gov (United States)

    2006-08-25

    Modiano , and J. Tsitsiklis, �Optimal energy allocation and admis- sion control for communication satellites,�IEEE Transactions on Networking, vol. 11...E. Modiano , �Improving delay in ad-hoc mobile networks via redundant packet transfers,�in Proceedings of Conference on Information Sciences and...M. J. Neely, E. Modiano , and C.-P. Li, �Fairness and optimal stochastic con- trol for heterogeneous networks,�in Proceedings of IEEE INFOCOM, Miami

  3. Detection and Prevention of MAC Layer Misbehavior for ad hoc Networks

    National Research Council Canada - National Science Library

    Cardenas, Alvaro A; Radosavac, Svetlana; Baras, John S

    2004-01-01

    ...) attacks targeting the MAC layer. In this study we assess the performance of the CSMA/CA scheme and investigate its efficiency with regard to security and information assurance in mobile ad hoc wireless networks...

  4. Well-ordered ZnO nanotube arrays and networks grown by atomic layer deposition

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Yijun [Electronic Materials Research Laboratory, Key Laboratory of the Ministry of Education & International Center for Dielectric Research, Xi’an Jiaotong University, Xi’an 710049 (China); Liu, Ming, E-mail: mingliu@mail.xjtu.edu.cn [Electronic Materials Research Laboratory, Key Laboratory of the Ministry of Education & International Center for Dielectric Research, Xi’an Jiaotong University, Xi’an 710049 (China); Ren, Wei, E-mail: wren@mail.xjtu.edu.cn [Electronic Materials Research Laboratory, Key Laboratory of the Ministry of Education & International Center for Dielectric Research, Xi’an Jiaotong University, Xi’an 710049 (China); Ye, Zuo-Guang, E-mail: zye@sfu.ca [Electronic Materials Research Laboratory, Key Laboratory of the Ministry of Education & International Center for Dielectric Research, Xi’an Jiaotong University, Xi’an 710049 (China); Department of Chemistry and 4D LABS, Simon Fraser University, Burnaby, British Columbia V5A 1S6 (Canada)

    2015-06-15

    Highlights: • ZnO nanotube networks and well-ordered ZnO nanotube arrays are fabricated by ALD. • The wall thickness of the ZnO nanotubes can be well-controlled at the angstrom level. • The fishing net-like networks of ZnO nanotubes with an ultra thin wall thickness are fabricated. • The ZnO nanotube arrays have an aspect ratio as high as 1000:1. - Abstract: Semiconductor ZnO, possessing a large exciton binding energy and wide band gap, has received a great deal of attention because it shows great potential for applications in optoelectronics. Precisely controlling the growth of three-dimensional ZnO nanotube structures with a uniform morphology constitutes an important step forward toward integrating ZnO nanostructures into microelectronic devices. Atomic layer deposition (ALD) technique, featured with self-limiting surface reactions, is an ideal approach to the fabrication of ZnO nanostructures, because it allows for accurate control of the thickness at atomic level and conformal coverage in complex 3D structures. In this work, well-ordered ZnO nanotube arrays and networks are prepared by ALD. The morphology, crystallinity and wall thickness of these nanotube structures are examined for different growth conditions. The microstructure of the ZnO nanotubes is investigated by transmission electron microscopy and X-ray diffraction. The high aspect ratio of ZnO nanotubes provides a large specific area which could enhance the kinetics of chemical reactions taking place between the ZnO and its surroundings, making the potential devices more efficient and compact.

  5. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    Directory of Open Access Journals (Sweden)

    Salvador Climent

    2014-01-01

    Full Text Available This survey aims to provide a comprehensive overview of the current researchon underwater wireless sensor networks, focusing on the lower layers of the communicationstack, and envisions future trends and challenges. It analyzes the current state-of-the-art onthe physical, medium access control and routing layers. It summarizes their security threadsand surveys the currently proposed studies. Current envisioned niches for further advances inunderwater networks research range from efficient, low-power algorithms and

  6. Frequency Assignment for Joint Aerial Layer Network High-Capacity Backbone

    Science.gov (United States)

    2017-08-11

    is the resource management problems involving multiple antennas per aerial platform, limited available bandwidth and geometric blockage involving the...ARL-TR-8093•AUG 2017 US Army Research Laboratory Frequency Assignment for Joint Aerial Layer Network High -Capacity Backbone by Peng Wang and Brian...2017 US Army Research Laboratory Frequency Assignment for Joint Aerial Layer Network High -Capacity Backbone by Peng Wang and Brian Henz Computational

  7. Reference Architecture for Multi-Layer Software Defined Optical Data Center Networks

    Directory of Open Access Journals (Sweden)

    Casimer DeCusatis

    2015-09-01

    Full Text Available As cloud computing data centers grow larger and networking devices proliferate; many complex issues arise in the network management architecture. We propose a framework for multi-layer; multi-vendor optical network management using open standards-based software defined networking (SDN. Experimental results are demonstrated in a test bed consisting of three data centers interconnected by a 125 km metropolitan area network; running OpenStack with KVM and VMW are components. Use cases include inter-data center connectivity via a packet-optical metropolitan area network; intra-data center connectivity using an optical mesh network; and SDN coordination of networking equipment within and between multiple data centers. We create and demonstrate original software to implement virtual network slicing and affinity policy-as-a-service offerings. Enhancements to synchronous storage backup; cloud exchanges; and Fibre Channel over Ethernet topologies are also discussed.

  8. Building disease-specific drug-protein connectivity maps from molecular interaction networks and PubMed abstracts.

    Directory of Open Access Journals (Sweden)

    Jiao Li

    2009-07-01

    Full Text Available The recently proposed concept of molecular connectivity maps enables researchers to integrate experimental measurements of genes, proteins, metabolites, and drug compounds under similar biological conditions. The study of these maps provides opportunities for future toxicogenomics and drug discovery applications. We developed a computational framework to build disease-specific drug-protein connectivity maps. We integrated gene/protein and drug connectivity information based on protein interaction networks and literature mining, without requiring gene expression profile information derived from drug perturbation experiments on disease samples. We described the development and application of this computational framework using Alzheimer's Disease (AD as a primary example in three steps. First, molecular interaction networks were incorporated to reduce bias and improve relevance of AD seed proteins. Second, PubMed abstracts were used to retrieve enriched drug terms that are indirectly associated with AD through molecular mechanistic studies. Third and lastly, a comprehensive AD connectivity map was created by relating enriched drugs and related proteins in literature. We showed that this molecular connectivity map development approach outperformed both curated drug target databases and conventional information retrieval systems. Our initial explorations of the AD connectivity map yielded a new hypothesis that diltiazem and quinidine may be investigated as candidate drugs for AD treatment. Molecular connectivity maps derived computationally can help study molecular signature differences between different classes of drugs in specific disease contexts. To achieve overall good data coverage and quality, a series of statistical methods have been developed to overcome high levels of data noise in biological networks and literature mining results. Further development of computational molecular connectivity maps to cover major disease areas will likely set

  9. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Science.gov (United States)

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  10. Process optimization of gravure printed light-emitting polymer layers by a neural network approach

    NARCIS (Netherlands)

    Michels, J.J.; Winter, S.H.P.M. de; Symonds, L.H.G.

    2009-01-01

    We demonstrate that artificial neural network modeling is a viable tool to predict the processing dependence of gravure printed light-emitting polymer layers for flexible OLED lighting applications. The (local) thickness of gravure printed light-emitting polymer (LEP) layers was analyzed using

  11. Multi-layer service function chaining scheduling based on auxiliary graph in IP over optical network

    Science.gov (United States)

    Li, Yixuan; Li, Hui; Liu, Yuze; Ji, Yuefeng

    2017-10-01

    Software Defined Optical Network (SDON) can be considered as extension of Software Defined Network (SDN) in optical networks. SDON offers a unified control plane and makes optical network an intelligent transport network with dynamic flexibility and service adaptability. For this reason, a comprehensive optical transmission service, able to achieve service differentiation all the way down to the optical transport layer, can be provided to service function chaining (SFC). IP over optical network, as a promising networking architecture to interconnect data centers, is the most widely used scenarios of SFC. In this paper, we offer a flexible and dynamic resource allocation method for diverse SFC service requests in the IP over optical network. To do so, we firstly propose the concept of optical service function (OSF) and a multi-layer SFC model. OSF represents the comprehensive optical transmission service (e.g., multicast, low latency, quality of service, etc.), which can be achieved in multi-layer SFC model. OSF can also be considered as a special SF. Secondly, we design a resource allocation algorithm, which we call OSF-oriented optical service scheduling algorithm. It is able to address multi-layer SFC optical service scheduling and provide comprehensive optical transmission service, while meeting multiple optical transmission requirements (e.g., bandwidth, latency, availability). Moreover, the algorithm exploits the concept of Auxiliary Graph. Finally, we compare our algorithm with the Baseline algorithm in simulation. And simulation results show that our algorithm achieves superior performance than Baseline algorithm in low traffic load condition.

  12. A new one-layer neural network for linear and quadratic programming.

    Science.gov (United States)

    Gao, Xingbao; Liao, Li-Zhi

    2010-06-01

    In this paper, we present a new neural network for solving linear and quadratic programming problems in real time by introducing some new vectors. The proposed neural network is stable in the sense of Lyapunov and can converge to an exact optimal solution of the original problem when the objective function is convex on the set defined by equality constraints. Compared with existing one-layer neural networks for quadratic programming problems, the proposed neural network has the least neurons and requires weak stability conditions. The validity and transient behavior of the proposed neural network are demonstrated by some simulation results.

  13. A One-Layer Recurrent Neural Network for Constrained Complex-Variable Convex Optimization.

    Science.gov (United States)

    Qin, Sitian; Feng, Jiqiang; Song, Jiahui; Wen, Xingnan; Xu, Chen

    2016-12-22

    In this paper, based on CR calculus and penalty method, a one-layer recurrent neural network is proposed for solving constrained complex-variable convex optimization. It is proved that for any initial point from a given domain, the state of the proposed neural network reaches the feasible region in finite time and converges to an optimal solution of the constrained complex-variable convex optimization finally. In contrast to existing neural networks for complex-variable convex optimization, the proposed neural network has a lower model complexity and better convergence. Some numerical examples and application are presented to substantiate the effectiveness of the proposed neural network.

  14. Performance Evaluation of Survivability Strategies for Elastic Optical Networks under Physical Layer Impairments

    Directory of Open Access Journals (Sweden)

    Jurandir Lacerda Jr

    2017-08-01

    Full Text Available This paper carried out a performance evaluation study that compares two survivability strategies (DPP and SM-RSA for elastic optical networks with and without physical layer impairments. The evaluated scenarios include three representative topologies for elastic optical network, NSFNET, EON and USA. It also analyzes the increase of blocking probability when the survivability strategies are evaluated under the realistic scenario that assumes physical layer impairments. For all studied topologies under physical layer impairments, the survivability strategies achieved blocking probability above 80%.

  15. A Microfluidic Pore Network Approach to Investigate Water Transport in Fuel Cell Porous Transport Layers

    OpenAIRE

    Bazylak, A.; Berejnov, V.; Markicevic, B.; Sinton, D.; Djilali, N.

    2008-01-01

    Pore network modelling has traditionally been used to study displacement processes in idealized porous media related to geological flows, with applications ranging from groundwater hydrology to enhanced oil recovery. Very recently, pore network modelling has been applied to model the gas diffusion layer (GDL) of a polymer electrolyte membrane (PEM) fuel cell. Discrete pore network models have the potential to elucidate transport phenomena in the GDL with high computational efficiency, in cont...

  16. Solving Nonlinearly Separable Classifications in a Single-Layer Neural Network.

    Science.gov (United States)

    Conaway, Nolan; Kurtz, Kenneth J

    2017-03-01

    Since the work of Minsky and Papert ( 1969 ), it has been understood that single-layer neural networks cannot solve nonlinearly separable classifications (i.e., XOR). We describe and test a novel divergent autoassociative architecture capable of solving nonlinearly separable classifications with a single layer of weights. The proposed network consists of class-specific linear autoassociators. The power of the model comes from treating classification problems as within-class feature prediction rather than directly optimizing a discriminant function. We show unprecedented learning capabilities for a simple, single-layer network (i.e., solving XOR) and demonstrate that the famous limitation in acquiring nonlinearly separable problems is not just about the need for a hidden layer; it is about the choice between directly predicting classes or learning to classify indirectly by predicting features.

  17. Inferring the mesoscale structure of layered, edge-valued, and time-varying networks

    Science.gov (United States)

    Peixoto, Tiago P.

    2015-10-01

    Many network systems are composed of interdependent but distinct types of interactions, which cannot be fully understood in isolation. These different types of interactions are often represented as layers, attributes on the edges, or as a time dependence of the network structure. Although they are crucial for a more comprehensive scientific understanding, these representations offer substantial challenges. Namely, it is an open problem how to precisely characterize the large or mesoscale structure of network systems in relation to these additional aspects. Furthermore, the direct incorporation of these features invariably increases the effective dimension of the network description, and hence aggravates the problem of overfitting, i.e., the use of overly complex characterizations that mistake purely random fluctuations for actual structure. In this work, we propose a robust and principled method to tackle these problems, by constructing generative models of modular network structure, incorporating layered, attributed and time-varying properties, as well as a nonparametric Bayesian methodology to infer the parameters from data and select the most appropriate model according to statistical evidence. We show that the method is capable of revealing hidden structure in layered, edge-valued, and time-varying networks, and that the most appropriate level of granularity with respect to the additional dimensions can be reliably identified. We illustrate our approach on a variety of empirical systems, including a social network of physicians, the voting correlations of deputies in the Brazilian national congress, the global airport network, and a proximity network of high-school students.

  18. Cross Layer QoS Provisioning in Home Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Brewka, Lukasz Jerzy; Ruepp, Sarah Renée

    2011-01-01

    Access (TDMA). By adopting OW MAC to the widely supported Universal Plug and Play – Quality of Service (UPnP-QoS) Architecture in the simulated home domain, algorithms for cross layer mapping QoS requirements are proposed. Compared to utilizing WLAN MAC, our scheme is able to provide guaranteed Qo...

  19. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  20. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  1. Link-Layer and Network-Layer Performance of an Undersea Acoustic Network at Fleet Battle Experiment-India

    National Research Council Canada - National Science Library

    Hartfield, Grant

    2003-01-01

    .... Many factors constrain or impair undersea acoustic communications. Analysis of a sample portion of the data reveals insights about the overall throughput, latency, and reliability of the Seaweb network...

  2. Design and Study of Cognitive Network Physical Layer Simulation Platform

    Directory of Open Access Journals (Sweden)

    Yongli An

    2014-01-01

    Full Text Available Cognitive radio technology has received wide attention for its ability to sense and use idle frequency. IEEE 802.22 WRAN, the first to follow the standard in cognitive radio technology, is featured by spectrum sensing and wireless data transmission. As far as wireless transmission is concerned, the availability and implementation of a mature and robust physical layer algorithm are essential to high performance. For the physical layer of WRAN using OFDMA technology, this paper proposes a synchronization algorithm and at the same time provides a public platform for the improvement and verification of that new algorithm. The simulation results show that the performance of the platform is highly close to the theoretical value.

  3. Inferring the mesoscale structure of layered, edge-valued and time-varying networks

    CERN Document Server

    Peixoto, Tiago P

    2015-01-01

    Many network systems are composed of interdependent but distinct types of interactions, which cannot be fully understood in isolation. These different types of interactions are often represented as layers, attributes on the edges or as a time-dependence of the network structure. Although they are crucial for a more comprehensive scientific understanding, these representations offer substantial challenges. Namely, it is an open problem how to precisely characterize the large or mesoscale structure of network systems in relation to these additional aspects. Furthermore, the direct incorporation of these features invariably increases the effective dimension of the network description, and hence aggravates the problem of overfitting, i.e. the use of overly-complex characterizations that mistake purely random fluctuations for actual structure. In this work, we propose a robust and principled method to tackle these problems, by constructing generative models of modular network structure, incorporating layered, attr...

  4. Single-hidden-layer feed-forward quantum neural network based on Grover learning.

    Science.gov (United States)

    Liu, Cheng-Yi; Chen, Chein; Chang, Ching-Ter; Shih, Lun-Min

    2013-09-01

    In this paper, a novel single-hidden-layer feed-forward quantum neural network model is proposed based on some concepts and principles in the quantum theory. By combining the quantum mechanism with the feed-forward neural network, we defined quantum hidden neurons and connected quantum weights, and used them as the fundamental information processing unit in a single-hidden-layer feed-forward neural network. The quantum neurons make a wide range of nonlinear functions serve as the activation functions in the hidden layer of the network, and the Grover searching algorithm outstands the optimal parameter setting iteratively and thus makes very efficient neural network learning possible. The quantum neuron and weights, along with a Grover searching algorithm based learning, result in a novel and efficient neural network characteristic of reduced network, high efficient training and prospect application in future. Some simulations are taken to investigate the performance of the proposed quantum network and the result show that it can achieve accurate learning. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Pore-Network Modeling of Water and Vapor Transport in the Micro Porous Layer and Gas Diffusion Layer of a Polymer Electrolyte Fuel Cell

    NARCIS (Netherlands)

    Qin, C.; Hassanizadeh, S.M.; van Oosterhout, L.M.

    2016-01-01

    In the cathode side of a polymer electrolyte fuel cell (PEFC), a micro porous layer (MPL) added between the catalyst layer (CL) and the gas diffusion layer (GDL) plays an important role in water management. In this work, by using both quasi-static and dynamic pore-network models, water and vapor

  6. Effectiveness evaluation of double-layered satellite network with laser and microwave hybrid links based on fuzzy analytic hierarchy process

    Science.gov (United States)

    Zhang, Wei; Rao, Qiaomeng

    2018-01-01

    In order to solve the problem of high speed, large capacity and limited spectrum resources of satellite communication network, a double-layered satellite network with global seamless coverage based on laser and microwave hybrid links is proposed in this paper. By analyzing the characteristics of the double-layered satellite network with laser and microwave hybrid links, an effectiveness evaluation index system for the network is established. And then, the fuzzy analytic hierarchy process, which combines the analytic hierarchy process and the fuzzy comprehensive evaluation theory, is used to evaluate the effectiveness of the double-layered satellite network with laser and microwave hybrid links. Furthermore, the evaluation result of the proposed hybrid link network is obtained by simulation. The effectiveness evaluation process of the proposed double-layered satellite network with laser and microwave hybrid links can help to optimize the design of hybrid link double-layered satellite network and improve the operating efficiency of the satellite system.

  7. Dynamic Wireless Network Based on Open Physical Layer

    Science.gov (United States)

    2011-02-18

    based on the notion of processing soft information is the basic building block for a large number of multi-terminal communication problems , such as...formulations of communication problems are only suitable for point-to-point communications, and in order to address dynamic network problems, new...formulations are needed. We believe that a geometric view is the key of solving the new dynamic communication problems . However, it is important that such new

  8. On the Degrees of Freedom for Multi-Hop Wireless Networks under Layered TDD Constraint

    Directory of Open Access Journals (Sweden)

    Feng Liu

    2014-05-01

    Full Text Available Degrees of freedom (DoF of a network build a new scaling law characterizing the scalability of capacity at high signal-to-noise region. In this paper, we extend our recent work from cascaded network to the general K-hop layered network. The main framework is based on the assumption of layered TDD, where all nodes at each layer work with the same on/off status. By this approach we decompose the DoF analysis into two steps: 1 apply the result of cascaded networks; 2 analyze / design the transmission of each hop. The upper and lower bounds on DoF are deduced. By viewing the network as cascaded X channels, we find an inner bound of the DoF region, applicable to many message topologies. The detail of message splitting is demonstrated. Finally ultimate analysis shows if the number of antennas/nodes at each relay layer goes to infinity, the lower bound reaches the upper bound. As a by-product, when K > 2 the network can alleviate the effect of TDD with the increase of relay antennas/nodes.

  9. A Framework for Supporting Survivability, Network Planning and Cross-Layer Optimization in Future Multi-Domain Terabit Networks

    Energy Technology Data Exchange (ETDEWEB)

    Baldin, Ilya [Renaissance Computing Inst. (RENCI), Chapel Hill, NC (United States); Huang, Shu [Renaissance Computing Inst. (RENCI), Chapel Hill, NC (United States); Gopidi, Rajesh [Univ. of North Carolina, Chapel Hill, NC (United States)

    2015-01-28

    This final project report describes the accomplishments, products and publications from the award. It includes the overview of the project goals to devise a framework for managing resources in multi-domain, multi-layer networks, as well the details of the mathematical problem formulation and the description of the prototype built to prove the concept.

  10. Information Extraction from Large-Multi-Layer Social Networks

    Science.gov (United States)

    2015-08-06

    fi(C1) ≤ fi(C2) for every objective function fi and there exists some j such that fj(C1) < fj(C2). The first Pareto front is the set of weakly non...of Pareto optimality, community detection in this multi-layer setting is formulated as a multiple criterion optimization problem. We propose an...algorithm for finding an approximate Pareto frontier containing a family of solutions. The power of this approach is demonstrated on a Twitter dataset

  11. Channel estimation for physical layer network coding systems

    CERN Document Server

    Gao, Feifei; Wang, Gongpu

    2014-01-01

    This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectures, this brief examines new challenges brought by the special structure of bi-directional two-hop transmissions that are different from the traditional point-to-point systems and unidirectional relay systems. The authors discuss the channel estimation strategies over typical fading scenarios, including frequency flat fading, frequency selective fading and time selective fading, as well as future research directions. Chapters explore the performa

  12. Double-layer video transmission over decode-and-forward wireless relay networks using hierarchical modulation.

    Science.gov (United States)

    Nguyen, Tu V; Cosman, Pamela C; Milstein, Laurence B

    2014-04-01

    We consider a wireless relay network with a single source, a single destination, and a multiple relay. The relays are half-duplex and use the decode-and-forward protocol. The transmit source is a layered video bitstream, which can be partitioned into two layers, a base layer (BL) and an enhancement layer (EL), where the BL is more important than the EL in terms of the source distortion. The source broadcasts both layers to the relays and the destination using hierarchical 16-QAM. Each relay detects and transmits successfully decoded layers to the destination using either hierarchical 16-QAM or QPSK. The destination can thus receive multiple signals, each of which can include either only the BL or both the BL and the EL. We derive the optimal linear combining method at the destination, where the uncoded bit error rate is minimized. We also present a suboptimal combining method with a closed-form solution, which performs very close to the optimal. We use the proposed double-layer transmission scheme with our combining methods for transmitting layered video bitstreams. Numerical results show that the double-layer scheme can gain 2-2.5 dB in channel signal-to-noise ratio or 5-7 dB in video peak signal-to-noise ratio, compared with the classical single-layer scheme using conventional modulation.

  13. Explicit Rate Adjustment (ERA: Responsiveness, Network Utilization Efficiency and Fairness for Layered Multicast

    Directory of Open Access Journals (Sweden)

    Somnuk PUANGPRONPITAG

    2005-08-01

    Full Text Available To provide layered multicast with responsiveness, efficiency in network utilization, scalability and fairness (including inter-protocol fairness, intra-protocol fairness, intra-session fairness and TCP-friendliness for layered multicast, we propose in this paper a new multicast congestion control, called Explicit Rate Adjustment (ERA. Our protocol uses an algorithm relying on TCP throughput equation and Packet-bunch Probe techniques to detect optimal bandwidth utilization; then adjusts the reception rate accordingly. We have built ERA into a network simulator (ns2 and demonstrate via simulations that the goals are reached.

  14. Using Single Layer Networks for Discrete, Sequential Data An Example from Natural Language Processing

    CERN Document Server

    Lyon, C; Lyon, Caroline; Frank, Ray

    1997-01-01

    A natural language parser which has been successfully implemented is described. This is a hybrid system, in which neural networks operate within a rule based framework. It can be accessed via telnet for users to try on their own text. (For details, contact the author.) Tested on technical manuals, the parser finds the subject and head of the subject in over 90% of declarative sentences. The neural processing components belong to the class of Generalized Single Layer Networks (GSLN). In general, supervised, feed-forward networks need more than one layer to process data. However, in some cases data can be pre-processed with a non-linear transformation, and then presented in a linearly separable form for subsequent processing by a single layer net. Such networks offer advantages of functional transparency and operational speed. For our parser, the initial stage of processing maps linguistic data onto a higher order representation, which can then be analysed by a single layer network. This transformation is suppo...

  15. Multi-layer network utilizing rewarded spike time dependent plasticity to learn a foraging task

    Science.gov (United States)

    2017-01-01

    Neural networks with a single plastic layer employing reward modulated spike time dependent plasticity (STDP) are capable of learning simple foraging tasks. Here we demonstrate advanced pattern discrimination and continuous learning in a network of spiking neurons with multiple plastic layers. The network utilized both reward modulated and non-reward modulated STDP and implemented multiple mechanisms for homeostatic regulation of synaptic efficacy, including heterosynaptic plasticity, gain control, output balancing, activity normalization of rewarded STDP and hard limits on synaptic strength. We found that addition of a hidden layer of neurons employing non-rewarded STDP created neurons that responded to the specific combinations of inputs and thus performed basic classification of the input patterns. When combined with a following layer of neurons implementing rewarded STDP, the network was able to learn, despite the absence of labeled training data, discrimination between rewarding patterns and the patterns designated as punishing. Synaptic noise allowed for trial-and-error learning that helped to identify the goal-oriented strategies which were effective in task solving. The study predicts a critical set of properties of the spiking neuronal network with STDP that was sufficient to solve a complex foraging task involving pattern classification and decision making. PMID:28961245

  16. Dynamic Subchannel Assignment-Based Cross-Layer MAC and Network Protocol for Multihop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Khanh Nguyen Quang

    2013-01-01

    Full Text Available The paper presents a dynamic subchannel assignment algorithm based on orthogonal frequency division multiple access technology operating in the time division duplexing and a new cross-layer design based on a proposed routing protocol jointed with the MAC protocol. The proposed dynamic sub-channel assignment algorithm provides a new interference avoidance mechanism which solves several drawbacks of existing radio resource allocation techniques in wireless networks using OFDMA/TDD, such as the hidden node and exposed node problems, mobility, and cochannels interference in frequency (CCI. Besides, in wireless networks, when a route is established, the radio resource allocation problems may decrease the end to end performance proportionally with the length of each route. The contention at MAC layer may cause the routing protocol at network layer to respond by finding new routes and routing table updates. The proposed routing protocol is jointed with the MAC protocol based on dynamic sub-channel assignment to ensure that the quality of service in multihop ad hoc networks is significantly improved.

  17. The Balanced Cross-Layer Design Routing Algorithm in Wireless Sensor Networks Using Fuzzy Logic

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Díaz, Vicente Hernández

    2015-01-01

    Recently, the cross-layer design for the wireless sensor network communication protocol has become more and more important and popular. Considering the disadvantages of the traditional cross-layer routing algorithms, in this paper we propose a new fuzzy logic-based routing algorithm, named the Balanced Cross-layer Fuzzy Logic (BCFL) routing algorithm. In BCFL, we use the cross-layer parameters’ dispersion as the fuzzy logic inference system inputs. Moreover, we give each cross-layer parameter a dynamic weight according the value of the dispersion. For getting a balanced solution, the parameter whose dispersion is large will have small weight, and vice versa. In order to compare it with the traditional cross-layer routing algorithms, BCFL is evaluated through extensive simulations. The simulation results show that the new routing algorithm can handle the multiple constraints without increasing the complexity of the algorithm and can achieve the most balanced performance on selecting the next hop relay node. Moreover, the Balanced Cross-layer Fuzzy Logic routing algorithm can adapt to the dynamic changing of the network conditions and topology effectively. PMID:26266412

  18. The Balanced Cross-Layer Design Routing Algorithm in Wireless Sensor Networks Using Fuzzy Logic.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Hernández Díaz, Vicente

    2015-08-10

    Recently, the cross-layer design for the wireless sensor network communication protocol has become more and more important and popular. Considering the disadvantages of the traditional cross-layer routing algorithms, in this paper we propose a new fuzzy logic-based routing algorithm, named the Balanced Cross-layer Fuzzy Logic (BCFL) routing algorithm. In BCFL, we use the cross-layer parameters' dispersion as the fuzzy logic inference system inputs. Moreover, we give each cross-layer parameter a dynamic weight according the value of the dispersion. For getting a balanced solution, the parameter whose dispersion is large will have small weight, and vice versa. In order to compare it with the traditional cross-layer routing algorithms, BCFL is evaluated through extensive simulations. The simulation results show that the new routing algorithm can handle the multiple constraints without increasing the complexity of the algorithm and can achieve the most balanced performance on selecting the next hop relay node. Moreover, the Balanced Cross-layer Fuzzy Logic routing algorithm can adapt to the dynamic changing of the network conditions and topology effectively.

  19. Multi-layer architecture for realization of network virtualization using MPLS technology

    Directory of Open Access Journals (Sweden)

    Ghasem Ahmadeyan Mazhin

    2017-03-01

    Full Text Available Network virtualization (NV increases Internet flexibility by separating policies from mechanisms. This makes developing new applications, managing the Internet, and supporting different applications much easier. In this study, we introduce a multi-layer architecture which combines multi-level multiprotocol label switching (MPLS technology with NV. The proposed architecture combines the high speed advantage of MPLS with the high flexibility of NV. We use MPLS in MPLS technique and encapsulate each MPLS packet within another when it encounters a new virtual network. Our architecture has the potential to improve Internet flexibility and pave the way for deployment and commercialization of NV in next generation networks.

  20. Learning behavior and temporary minima of two-layer neural networks

    NARCIS (Netherlands)

    Annema, Anne J.; Hoen, Klaas; Hoen, Klaas; Wallinga, Hans

    1994-01-01

    This paper presents a mathematical analysis of the occurrence of temporary minima during training of a single-output, two-layer neural network, with learning according to the back-propagation algorithm. A new vector decomposition method is introduced, which simplifies the mathematical analysis of

  1. Multi-Layer Mobility Load Balancing in a Heterogeneous LTE Network

    DEFF Research Database (Denmark)

    Fotiadis, Panagiotis; Polignano, Michele; Laselva, Daniela

    2012-01-01

    This paper analyzes the behavior of a distributed Mobility Load Balancing (MLB) scheme in a multi-layer 3GPP (3rd Generation Partnership Project) Long Term Evolution (LTE) deployment with different User Equipment (UE) densities in certain network areas covered with pico cells. Target of the study...

  2. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    NARCIS (Netherlands)

    Climent, S.; Sanchez, A.; Capella, J.V.; Meratnia, Nirvana; Serrano, J.J.

    2014-01-01

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control

  3. A Survey on Multimedia-Based Cross-Layer Optimization in Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Guedes, Luiz Affonso

    2011-01-01

    Visual sensor networks (VSNs) comprised of battery-operated electronic devices endowed with low-resolution cameras have expanded the applicability of a series of monitoring applications. Those types of sensors are interconnected by ad hoc error-prone wireless links, imposing stringent restrictions on available bandwidth, end-to-end delay and packet error rates. In such context, multimedia coding is required for data compression and error-resilience, also ensuring energy preservation over the path(s) toward the sink and improving the end-to-end perceptual quality of the received media. Cross-layer optimization may enhance the expected efficiency of VSNs applications, disrupting the conventional information flow of the protocol layers. When the inner characteristics of the multimedia coding techniques are exploited by cross-layer protocols and architectures, higher efficiency may be obtained in visual sensor networks. This paper surveys recent research on multimedia-based cross-layer optimization, presenting the proposed strategies and mechanisms for transmission rate adjustment, congestion control, multipath selection, energy preservation and error recovery. We note that many multimedia-based cross-layer optimization solutions have been proposed in recent years, each one bringing a wealth of contributions to visual sensor networks. PMID:22163908

  4. A One-Layer Recurrent Neural Network for Real-Time Portfolio Optimization With Probability Criterion.

    Science.gov (United States)

    Liu, Qingshan; Dang, Chuangyin; Huang, Tingwen

    2013-02-01

    This paper presents a decision-making model described by a recurrent neural network for dynamic portfolio optimization. The portfolio-optimization problem is first converted into a constrained fractional programming problem. Since the objective function in the programming problem is not convex, the traditional optimization techniques are no longer applicable for solving this problem. Fortunately, the objective function in the fractional programming is pseudoconvex on the feasible region. It leads to a one-layer recurrent neural network modeled by means of a discontinuous dynamic system. To ensure the optimal solutions for portfolio optimization, the convergence of the proposed neural network is analyzed and proved. In fact, the neural network guarantees to get the optimal solutions for portfolio-investment advice if some mild conditions are satisfied. A numerical example with simulation results substantiates the effectiveness and illustrates the characteristics of the proposed neural network.

  5. Constraints of nonresponding flows based on cross layers in the networks

    Science.gov (United States)

    Zhou, Zhi-Chao; Xiao, Yang; Wang, Dong

    2016-02-01

    In the active queue management (AQM) scheme, core routers cannot manage and constrain user datagram protocol (UDP) data flows by the sliding window control mechanism in the transport layer due to the nonresponsive nature of such traffic flows. However, the UDP traffics occupy a large part of the network service nowadays which brings a great challenge to the stability of the more and more complex networks. To solve the uncontrollable problem, this paper proposes a cross layers random early detection (CLRED) scheme, which can control the nonresponding UDP-like flows rate effectively when congestion occurs in the access point (AP). The CLRED makes use of the MAC frame acknowledgement (ACK) transmitting congestion information to the sources nodes and utilizes the back-off windows of the MAC layer throttling data rate. Consequently, the UDP-like flows data rate can be restrained timely by the sources nodes in order to alleviate congestion in the complex networks. The proposed CLRED can constrain the nonresponsive flows availably and make the communication expedite, so that the network can sustain stable. The simulation results of network simulator-2 (NS2) verify the proposed CLRED scheme.

  6. Recently learned foreign abstract and concrete nouns are represented in distinct cortical networks similar to the native language.

    Science.gov (United States)

    Mayer, Katja M; Macedonia, Manuela; von Kriegstein, Katharina

    2017-09-01

    In the native language, abstract and concrete nouns are represented in distinct areas of the cerebral cortex. Currently, it is unknown whether this is also the case for abstract and concrete nouns of a foreign language. Here, we taught adult native speakers of German 45 abstract and 45 concrete nouns of a foreign language. After learning the nouns for 5 days, participants performed a vocabulary translation task during functional magnetic resonance imaging. Translating abstract nouns in contrast to concrete nouns elicited responses in regions that are also responsive to abstract nouns in the native language: the left inferior frontal gyrus and the left middle and superior temporal gyri. Concrete nouns elicited larger responses in the angular gyri bilaterally and the left parahippocampal gyrus than abstract nouns. The cluster in the left angular gyrus showed psychophysiological interaction (PPI) with the left lingual gyrus. The left parahippocampal gyrus showed PPI with the posterior cingulate cortex. Similar regions have been previously found for concrete nouns in the native language. The results reveal similarities in the cortical representation of foreign language nouns with the representation of native language nouns that already occur after 5 days of vocabulary learning. Furthermore, we showed that verbal and enriched learning methods were equally suitable to teach foreign abstract and concrete nouns. Hum Brain Mapp 38:4398-4412, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  7. Ensemble learning in fixed expansion layer networks for mitigating catastrophic forgetting.

    Science.gov (United States)

    Coop, Robert; Mishtal, Aaron; Arel, Itamar

    2013-10-01

    Catastrophic forgetting is a well-studied attribute of most parameterized supervised learning systems. A variation of this phenomenon, in the context of feedforward neural networks, arises when nonstationary inputs lead to loss of previously learned mappings. The majority of the schemes proposed in the literature for mitigating catastrophic forgetting were not data driven and did not scale well. We introduce the fixed expansion layer (FEL) feedforward neural network, which embeds a sparsely encoding hidden layer to help mitigate forgetting of prior learned representations. In addition, we investigate a novel framework for training ensembles of FEL networks, based on exploiting an information-theoretic measure of diversity between FEL learners, to further control undesired plasticity. The proposed methodology is demonstrated on a basic classification task, clearly emphasizing its advantages over existing techniques. The architecture proposed can be enhanced to address a range of computational intelligence tasks, such as regression problems and system control.

  8. Cross-Layer Active Predictive Congestion Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yinfeng Wu

    2009-10-01

    Full Text Available In wireless sensor networks (WSNs, there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node‟s neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  9. Cross-Layer Techniques for Adaptive Video Streaming over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yufeng Shan

    2005-02-01

    Full Text Available Real-time streaming media over wireless networks is a challenging proposition due to the characteristics of video data and wireless channels. In this paper, we propose a set of cross-layer techniques for adaptive real-time video streaming over wireless networks. The adaptation is done with respect to both channel and data. The proposed novel packetization scheme constructs the application layer packet in such a way that it is decomposed exactly into an integer number of equal-sized radio link protocol (RLP packets. FEC codes are applied within an application packet at the RLP packet level rather than across different application packets and thus reduce delay at the receiver. A priority-based ARQ, together with a scheduling algorithm, is applied at the application layer to retransmit only the corrupted RLP packets within an application layer packet. Our approach combines the flexibility and programmability of application layer adaptations, with low delay and bandwidth efficiency of link layer techniques. Socket-level simulations are presented to verify the effectiveness of our approach.

  10. Cross-Layer Techniques for Adaptive Video Streaming over Wireless Networks

    Science.gov (United States)

    Shan, Yufeng

    2005-12-01

    Real-time streaming media over wireless networks is a challenging proposition due to the characteristics of video data and wireless channels. In this paper, we propose a set of cross-layer techniques for adaptive real-time video streaming over wireless networks. The adaptation is done with respect to both channel and data. The proposed novel packetization scheme constructs the application layer packet in such a way that it is decomposed exactly into an integer number of equal-sized radio link protocol (RLP) packets. FEC codes are applied within an application packet at the RLP packet level rather than across different application packets and thus reduce delay at the receiver. A priority-based ARQ, together with a scheduling algorithm, is applied at the application layer to retransmit only the corrupted RLP packets within an application layer packet. Our approach combines the flexibility and programmability of application layer adaptations, with low delay and bandwidth efficiency of link layer techniques. Socket-level simulations are presented to verify the effectiveness of our approach.

  11. A Cross-Layer Routing Design for Multi-Interface Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Tzu-Chieh Tsai

    2009-01-01

    Full Text Available In recent years, Wireless Mesh Networks (WMNs technologies have received significant attentions. WMNs not only accede to the advantages of ad hoc networks but also provide hierarchical multi-interface architecture. Transmission power control and routing path selections are critical issues in the past researches of multihop networks. Variable transmission power levels lead to different network connectivity and interference. Further, routing path selections among different radio interfaces will also produce different intra-/interflow interference. These features tightly affect the network performance. Most of the related works on the routing protocol design do not consider transmission power control and multi-interface environment simultaneously. In this paper, we proposed a cross-layer routing protocol called M2iRi2 which coordinates transmission power control and intra-/interflow interference considerations as routing metrics. Each radio interface calculates the potential tolerable-added transmission interference in the physical layer. When the route discovery starts, the M2iRi2 will adopt the appropriate power level to evaluate each interface quality along paths. The simulation results demonstrate that our design can enhance both network throughput and end-to-end delay.

  12. Analysis of physical layer performance of hybrid optical-wireless access network

    Science.gov (United States)

    Shaddad, R. Q.; Mohammad, A. B.; Al-hetar, A. M.

    2011-09-01

    The hybrid optical-wireless access network (HOWAN) is a favorable architecture for next generation access network. It is an optimal combination of an optical backhaul and a wireless front-end for an efficient access network. In this paper, the HOWAN architecture is designed based on a wavelengths division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) at the optical backhaul and a wireless fidelity (WiFi) technology at the wireless front-end. The HOWAN is proposed that can provide blanket coverage of broadband and flexible connection for end-users. Most of the existing works, based on performance evaluation are concerned on network layer aspects. This paper reports physical layer performance in terms of the bit error rate (BER), eye diagram, and signal-to-noise ratio (SNR) of the communication system. It accommodates 8 wavelength channels with 32 optical network unit/wireless access points (ONU/APs). It is demonstrated that downstream and upstream of 2 Gb/s can be achieved by optical backhaul for each wavelength channel along optical fiber length of 20 km and a data rate of 54 Mb/s per ONU/AP along a 50 m outdoor wireless link.

  13. Dynamics of comb-of-comb-network polymers in random layered flows.

    Science.gov (United States)

    Katyal, Divya; Kant, Rama

    2016-12-01

    We analyze the dynamics of comb-of-comb-network polymers in the presence of external random flows. The dynamics of such structures is evaluated through relevant physical quantities, viz., average square displacement (ASD) and the velocity autocorrelation function (VACF). We focus on comparing the dynamics of the comb-of-comb network with the linear polymer. The present work displays an anomalous diffusive behavior of this flexible network in the random layered flows. The effect of the polymer topology on the dynamics is analyzed by varying the number of generations and branch lengths in these networks. In addition, we investigate the influence of external flow on the dynamics by varying flow parameters, like the flow exponent α and flow strength W_{α}. Our analysis highlights two anomalous power-law regimes, viz., subdiffusive (intermediate-time polymer stretching and flow-induced diffusion) and superdiffusive (long-time flow-induced diffusion). The anomalous long-time dynamics is governed by the temporal exponent ν of ASD, viz., ν=2-α/2. Compared to a linear polymer, the comb-of-comb network shows a shorter crossover time (from the subdiffusive to superdiffusive regime) but a reduced magnitude of ASD. Our theory displays an anomalous VACF in the random layered flows that scales as t^{-α/2}. We show that the network with greater total mass moves faster.

  14. ML-IKE: a multi-layer IKE protocol for TCP performance enhancement in wireless networks

    Science.gov (United States)

    Zhang, Ya-Hang; Cheng, Bo-Wen; Qing, Si-Han; Zou, Guang-Nan; Wen, Wei-Ping

    2009-12-01

    To solve the conflict between TCP accelerating technology based on PEP middle node and IPSec protocol used in the Satellite Network, NASA and the Hughes Research Laboratory (HRL) each independently proposed a solution named Multilayer IPsec protocol which can integrate IPSec with TCP PEPs. The problem is: Traditional IKE protocol can't work with Multilayer IPSec protocol. In this study, the traditional IKE main mode and quick mode are enhanced for layered IPSec protocol, and an improved layered key distribution protocol: ML-IKE is proposed. This key distribution protocol is used for key exchange between peers and middle node, so that different nodes have different security associations (SA), and different security associations correspond to different IP packet fields, so different SA nodes have different authorization to different IP packet fields. ML-IKE protocol is suitable for layered IPSec, thus layered IPSec can be used for automatic key distribution and update.

  15. A two-layer recurrent neural network for nonsmooth convex optimization problems.

    Science.gov (United States)

    Qin, Sitian; Xue, Xiaoping

    2015-06-01

    In this paper, a two-layer recurrent neural network is proposed to solve the nonsmooth convex optimization problem subject to convex inequality and linear equality constraints. Compared with existing neural network models, the proposed neural network has a low model complexity and avoids penalty parameters. It is proved that from any initial point, the state of the proposed neural network reaches the equality feasible region in finite time and stays there thereafter. Moreover, the state is unique if the initial point lies in the equality feasible region. The equilibrium point set of the proposed neural network is proved to be equivalent to the Karush-Kuhn-Tucker optimality set of the original optimization problem. It is further proved that the equilibrium point of the proposed neural network is stable in the sense of Lyapunov. Moreover, from any initial point, the state is proved to be convergent to an equilibrium point of the proposed neural network. Finally, as applications, the proposed neural network is used to solve nonlinear convex programming with linear constraints and L1 -norm minimization problems.

  16. A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Chon Kim

    2011-05-01

    Full Text Available Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  17. Layer-specific chromatin accessibility landscapes reveal regulatory networks in adult mouse visual cortex

    Science.gov (United States)

    Gray, Lucas T; Yao, Zizhen; Nguyen, Thuc Nghi; Kim, Tae Kyung; Zeng, Hongkui; Tasic, Bosiljka

    2017-01-01

    Mammalian cortex is a laminar structure, with each layer composed of a characteristic set of cell types with different morphological, electrophysiological, and connectional properties. Here, we define chromatin accessibility landscapes of major, layer-specific excitatory classes of neurons, and compare them to each other and to inhibitory cortical neurons using the Assay for Transposase-Accessible Chromatin with high-throughput sequencing (ATAC-seq). We identify a large number of layer-specific accessible sites, and significant association with genes that are expressed in specific cortical layers. Integration of these data with layer-specific transcriptomic profiles and transcription factor binding motifs enabled us to construct a regulatory network revealing potential key layer-specific regulators, including Cux1/2, Foxp2, Nfia, Pou3f2, and Rorb. This dataset is a valuable resource for identifying candidate layer-specific cis-regulatory elements in adult mouse cortex. DOI: http://dx.doi.org/10.7554/eLife.21883.001 PMID:28112643

  18. Thickness gauging of thin layers by laser ultrasonics and neural network

    Energy Technology Data Exchange (ETDEWEB)

    Lefevre, F; Jenot, F; Ouaftouh, M; Duquennoy, M; Ourak, M, E-mail: Fabien.lefevre@univ-valenciennes.fr [Institut d' Electronique de Microelectronique et de Nanotechnologie Departement Opto-Acousto-Electronique (UMR CNRS 8520), Universite de Valenciennes, Le Mont Houy, 59313 Valenciennes Cedex 09 (France)

    2011-01-01

    Non destructive testing has been performed on a thin indium layer deposited on a two inches silicon wafer. Guided waves were generated and studied using a laser ultrasonic setup, and a two-dimensional Fourier transform technique was employed to obtain the dispersion curves. The inverse problem, in other words the determination of the layer thickness and the elastic constants of the substrate, has been solved by means of a feedforward neural network. These parameters were then evaluated simultaneously, the dispersion curves being entirely fitted. The experimental results show a good agreement with the theoretical model. This inversion method was found to be prompt and easy to automate.

  19. Two-layer wireless distributed sensor/control network based on RF

    Science.gov (United States)

    Feng, Li; Lin, Yuchi; Zhou, Jingjing; Dong, Guimei; Xia, Guisuo

    2006-11-01

    A project of embedded Wireless Distributed Sensor/Control Network (WDSCN) based on RF is presented after analyzing the disadvantages of traditional measure and control system. Because of high-cost and complexity, such wireless techniques as Bluetooth and WiFi can't meet the needs of WDSCN. The two-layer WDSCN is designed based on RF technique, which operates in the ISM free frequency channel with low power and high transmission speed. Also the network is low cost, portable and moveable, integrated with the technologies of computer network, sensor, microprocessor and wireless communications. The two-layer network topology is selected in the system; a simple but efficient self-organization net protocol is designed to fit the periodic data collection, event-driven and store-and-forward. Furthermore, adaptive frequency hopping technique is adopted for anti-jamming apparently. The problems about power reduction and synchronization of data in wireless system are solved efficiently. Based on the discussion above, a measure and control network is set up to control such typical instruments and sensors as temperature sensor and signal converter, collect data, and monitor environmental parameters around. This system works well in different rooms. Experiment results show that the system provides an efficient solution to WDSCN through wireless links, with high efficiency, low power, high stability, flexibility and wide working range.

  20. A High-Efficiency Uneven Cluster Deployment Algorithm Based on Network Layered for Event Coverage in UWSNs

    Directory of Open Access Journals (Sweden)

    Shanen Yu

    2016-12-01

    Full Text Available Most existing deployment algorithms for event coverage in underwater wireless sensor networks (UWSNs usually do not consider that network communication has non-uniform characteristics on three-dimensional underwater environments. Such deployment algorithms ignore that the nodes are distributed at different depths and have different probabilities for data acquisition, thereby leading to imbalances in the overall network energy consumption, decreasing the network performance, and resulting in poor and unreliable late network operation. Therefore, in this study, we proposed an uneven cluster deployment algorithm based network layered for event coverage. First, according to the energy consumption requirement of the communication load at different depths of the underwater network, we obtained the expected value of deployment nodes and the distribution density of each layer network after theoretical analysis and deduction. Afterward, the network is divided into multilayers based on uneven clusters, and the heterogeneous communication radius of nodes can improve the network connectivity rate. The recovery strategy is used to balance the energy consumption of nodes in the cluster and can efficiently reconstruct the network topology, which ensures that the network has a high network coverage and connectivity rate in a long period of data acquisition. Simulation results show that the proposed algorithm improves network reliability and prolongs network lifetime by significantly reducing the blind movement of overall network nodes while maintaining a high network coverage and connectivity rate.

  1. A One-Layer Recurrent Neural Network for Pseudoconvex Optimization Problems With Equality and Inequality Constraints.

    Science.gov (United States)

    Qin, Sitian; Yang, Xiudong; Xue, Xiaoping; Song, Jiahui

    2017-10-01

    Pseudoconvex optimization problem, as an important nonconvex optimization problem, plays an important role in scientific and engineering applications. In this paper, a recurrent one-layer neural network is proposed for solving the pseudoconvex optimization problem with equality and inequality constraints. It is proved that from any initial state, the state of the proposed neural network reaches the feasible region in finite time and stays there thereafter. It is also proved that the state of the proposed neural network is convergent to an optimal solution of the related problem. Compared with the related existing recurrent neural networks for the pseudoconvex optimization problems, the proposed neural network in this paper does not need the penalty parameters and has a better convergence. Meanwhile, the proposed neural network is used to solve three nonsmooth optimization problems, and we make some detailed comparisons with the known related conclusions. In the end, some numerical examples are provided to illustrate the effectiveness of the performance of the proposed neural network.

  2. Energy Efficient, Cross-Layer Enabled, Dynamic Aggregation Networks for Next Generation Internet

    Science.gov (United States)

    Wang, Michael S.

    Today, the Internet traffic is growing at a near exponential rate, driven predominately by data center-based applications and Internet-of-Things services. This fast-paced growth in Internet traffic calls into question the ability of the existing optical network infrastructure to support this continued growth. The overall optical networking equipment efficiency has not been able to keep up with the traffic growth, creating a energy gap that makes energy and cost expenditures scale linearly with the traffic growth. The implication of this energy gap is that it is infeasible to continue using existing networking equipment to meet the growing bandwidth demand. A redesign of the optical networking platform is needed. The focus of this dissertation is on the design and implementation of energy efficient, cross-layer enabled, dynamic optical networking platforms, which is a promising approach to address the exponentially growing Internet bandwidth demand. Chapter 1 explains the motivation for this work by detailing the huge Internet traffic growth and the unsustainable energy growth of today's networking equipment. Chapter 2 describes the challenges and objectives of enabling agile, dynamic optical networking platforms and the vision of the Center for Integrated Access Networks (CIAN) to realize these objectives; the research objectives of this dissertation and the large body of related work in this field is also summarized. Chapter 3 details the design and implementation of dynamic networking platforms that support wavelength switching granularity. The main contribution of this work involves the experimental validation of deep cross-layer communication across the optical performance monitoring (OPM), data, and control planes. The first experiment shows QoS-aware video streaming over a metro-scale test-bed through optical power monitoring of the transmission wavelength and cross-layer feedback control of the power level. The second experiment extends the performance

  3. Advanced Measurements of the Aggregation Capability of the MPT Network Layer Multipath Communication Library

    Directory of Open Access Journals (Sweden)

    Gábor Lencse

    2015-05-01

    Full Text Available The MPT network layer multipath communicationlibrary is a novel solution for several problems including IPv6transition, reliable data transmission using TCP, real-time transmissionusing UDP and also wireless network layer routingproblems. MPT can provide an IPv4 or an IPv6 tunnel overone or more IPv4 or IPv6 communication channels. MPT canalso aggregate the capacity of multiple physical channels. In thispaper, the channel aggregation capability of the MPT libraryis measured up to twelve 100Mbps speed channels. Differentscenarios are used: both IPv4 and IPv6 are used as the underlyingand also as the encapsulated protocols and also both UDP andTCP are used as transport protocols. In addition, measurementsare taken with both 32-bit and 64-bit version of the MPT library.In all cases, the number of the physical channels is increased from1 to 12 and the aggregated throughput is measured.

  4. Modeling Liner Shipping Service Selection and Container Flows using a Multi-layer Network

    DEFF Research Database (Denmark)

    Karsten, Christian Vad; Balakrishnan, Anant

    We introduce a new formulation for the tactical planning problem facing container shipping companies of selecting the best subset of sailing routes from a given pool of candidate routes so as to maximize profit. Since most containers are sent directly or transshipped at most twice in current liner...... shipping networks, we impose limits on the number of transshipments for each container (which most previous models do not incorporate). Our multi-layer multi-commodity model associates one commodity with each container origin port, and decides the route for each commodity on a logical network layer whose...... arcs represent segments (pairs of ports between which a container can use a single service). This approach, combined with commodity flow variables that are indexed by segment sequence permits us to incorporate the transshipment limits while also tracking the commodity’s outflow from the system...

  5. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-based Broadband Wireless Networks

    CERN Document Server

    Wang, Xiaowei; Mo, Jianhua; Xu, Youyun

    2011-01-01

    Providing physical-layer security for mobile users in future broadband wireless networks is of both theoretical and practical importance. In this paper, we formulate an analytical framework for resource allocation in a downlink OFDMA-based broadband network with coexistence of secure users (SU) and normal users (NU). The SU's require secure data transmission at the physical layer while the NU's are served with conventional best-effort data traffic. The problem is formulated as joint power and subcarrier allocation with the objective of maximizing average aggregate information rate of all NU's while maintaining an average secrecy rate for each individual SU under a total transmit power constraint for the base station. We solve this problem in an asymptotically optimal manner using dual decomposition. Our analysis shows that an SU becomes a candidate competing for a subcarrier only if its channel gain on this subcarrier is the largest among all and exceeds the second largest by a certain threshold. Furthermore,...

  6. Efficient MAC Protocols for Wireless Sensor Networks Endowed with Directive Antennas: A Cross-Layer Solution

    Directory of Open Access Journals (Sweden)

    Manes Gianfranco

    2007-01-01

    Full Text Available This paper deals with a novel MAC layer protocol, namely, directive synchronous transmission asynchronous reception (D-STAR able to space-time synchronize a wireless sensor network (WSN. To this end, D-STAR integrates directional antennas within the communications framework, while taking into account both sleep/active states, according to a cross-layer design. After characterizing the D-STAR protocol in terms of functional characteristics, the related performance is presented, in terms of network lifetime gain, setup latency, and collision probability. It has shown a remarkable gain in terms of energy consumption reduction with respect to the basic approach endowed with omnidirectional antennas, without increasing the signaling overhead nor affecting the setup latency.

  7. Efficient MAC Protocols for Wireless Sensor Networks Endowed with Directive Antennas: A Cross-Layer Solution

    Directory of Open Access Journals (Sweden)

    Gianfranco Manes

    2007-07-01

    Full Text Available This paper deals with a novel MAC layer protocol, namely, directive synchronous transmission asynchronous reception (D-STAR able to space-time synchronize a wireless sensor network (WSN. To this end, D-STAR integrates directional antennas within the communications framework, while taking into account both sleep/active states, according to a cross-layer design. After characterizing the D-STAR protocol in terms of functional characteristics, the related performance is presented, in terms of network lifetime gain, setup latency, and collision probability. It has shown a remarkable gain in terms of energy consumption reduction with respect to the basic approach endowed with omnidirectional antennas, without increasing the signaling overhead nor affecting the setup latency.

  8. MAC-Layer Active Dropping for Real-Time Video Streaming in 4G Access Networks

    KAUST Repository

    She, James

    2010-12-01

    This paper introduces a MAC-layer active dropping scheme to achieve effective resource utilization, which can satisfy the application-layer delay for real-time video streaming in time division multiple access based 4G broadband wireless access networks. When a video frame is not likely to be reconstructed within the application-layer delay bound at a receiver for the minimum decoding requirement, the MAC-layer protocol data units of such video frame will be proactively dropped before the transmission. An analytical model is developed to evaluate how confident a video frame can be delivered within its application-layer delay bound by jointly considering the effects of time-varying wireless channel, minimum decoding requirement of each video frame, data retransmission, and playback buffer. Extensive simulations with video traces are conducted to prove the effectiveness of the proposed scheme. When compared to conventional cross-layer schemes using prioritized-transmission/retransmission, the proposed scheme is practically implementable for more effective resource utilization, avoiding delay propagation, and achieving better video qualities under certain conditions.

  9. Abstract algebra

    CERN Document Server

    Deskins, W E

    1996-01-01

    This excellent textbook provides undergraduates with an accessible introduction to the basic concepts of abstract algebra and to the analysis of abstract algebraic systems. These systems, which consist of sets of elements, operations, and relations among the elements, and prescriptive axioms, are abstractions and generalizations of various models which evolved from efforts to explain or discuss physical phenomena.In Chapter 1, the author discusses the essential ingredients of a mathematical system, and in the next four chapters covers the basic number systems, decompositions of integers, diop

  10. Application Layer Definition and Analyses of Controller Area Network Bus for Wire Harness Assembly Machine

    OpenAIRE

    Guo, Hui; Jiang, Ying

    2006-01-01

    With the feature of multi-master bus access, nondestructive contention-based arbitration and flexible configuration, Controller Area Network (CAN) bus is applied into the control system of Wire Harness Assembly Machine (WHAM). To accomplish desired goal, the specific features of the CAN bus is analyzed by compared with other field buses and the functional performances in the CAN bus system of WHAM is discussed. Then the application layer planning of CAN bus for dynamic priority is presented. ...

  11. Passing Corrupt Data Across Network Layers: An Overview of Recent Developments and Issues

    Directory of Open Access Journals (Sweden)

    Michael Welzl

    2005-02-01

    Full Text Available Recent Internet developments seem to make a point for passing corrupt data from the link to the network layer and above instead of ensuring data integrity with a checksum and ARQ. We give an overview of these efforts (the UDP Lite and DCCP protocols and explain which circumstances would justify delivery of erroneous data; clearly, the missing piece in the puzzle is efficient and meaningful interlayer communication.

  12. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  13. On the Combination of Multi-Layer Source Coding and Network Coding for Wireless Networks

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Fitzek, Frank; Pedersen, Morten Videbæk

    2013-01-01

    This paper introduces a mutually beneficial interplay between network coding and scalable video source coding in order to propose an energy-efficient video streaming approach accommodating multiple heterogeneous receivers, for which current solutions are either inefficient or insufficient. State...... support of multi-resolution video streaming....

  14. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    Science.gov (United States)

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  15. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  16. Wildland fire science and management in the U.S.: Spanning the boundaries through the regional knowledge exchange network (Abstract)

    Science.gov (United States)

    Susie Kocher; Eric Toman; Sarah Trainor; Vita Wright

    2012-01-01

    In 2009, the federal Joint Fire Science Program (JFSP) initiated a national network of regional fire science consortia to accelerate awareness, understanding and use of wildland fire science. This presentation synthesizes findings from initial needs assessments conducted by consortia in eight regions of the United States. The assessments evaluated how fire science is...

  17. A Bayesian network model for predicting aquatic toxicity mode of action using two dimensional theoretical molecular descriptors-abstract

    Science.gov (United States)

    The mode of toxic action (MoA) has been recognized as a key determinant of chemical toxicity but MoA classification in aquatic toxicology has been limited. We developed a Bayesian network model to classify aquatic toxicity mode of action using a recently published dataset contain...

  18. Cross-layer ultrasound video streaming over mobile WiMAX and HSUPA networks.

    Science.gov (United States)

    Alinejad, Ali; Philip, Nada Y; Istepanian, Robert S H

    2012-01-01

    It is well known that the evolution of 4G-based mobile multimedia network systems will contribute significantly to future mobile healthcare (m-health) applications that require high bandwidth and fast data rates. Central to the success of such emerging applications is the compatibility of broadband networks, such as mobile Worldwide Interoperability For Microwave Access (WiMAX) and High-Speed Uplink Packet Access (HSUPA), and especially their rate adaption issues combined with the acceptable real-time medical quality of service requirements. In this paper, we address the relevant challenges of cross-layer design requirements for real-time rate adaptation of ultrasound video streaming in mobile WiMAX and HSUPA networks. A comparative performance analysis of such approach is validated in two experimental m-health test bed systems for both mobile WiMAX and HSUPA networks. The experimental results have shown an improved performance of mobile WiMAX compared to the HSUPA using the same cross-layer optimization approach.

  19. Dynamic Retransmission Limit Scheme in MAC Layer for Routing in Multihop Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2008-05-01

    Full Text Available We consider a wireless ad hoc network with random access channel. We present a model that takes into account topology, routing, random access in MAC layer, and forwarding probability. In this paper, we focus on drawing benefit from the interaction of the MAC (governed by IEEE 802.11 or slotted Aloha and routing by defining a new cross-layer scheme for routing based on the limit number of retransmission. By adjusting dynamically and judiciously this parameter in a saturated network, we have realized that both stability of forwarding queues and average throughput are significantly improved in linear networks with symmetric traffic: a gain of 100% can be reached. While in asymmetric topology network with asymmetric traffic, we achieve a better average delay (resp., throughput for each connection without changing the average throughput (resp., delay. In addition, we show the efficiency of our new scheme in case of multimedia applications with delay constraint. A detailed performance study is presented using analytical and simulation evaluation.

  20. Fault-tolerant and QoS based Network Layer for Security Management

    Directory of Open Access Journals (Sweden)

    Mohamed Naceur Abdelkrim

    2013-07-01

    Full Text Available Wireless sensor networks have profound effects on many application fields like security management which need an immediate, fast and energy efficient route. In this paper, we define a fault-tolerant and QoS based network layer for security management of chemical products warehouse which can be classified as real-time and mission critical application. This application generate routine data packets and alert packets caused by unusual events which need a high reliability, short end to end delay and low packet loss rate constraints. After each node compute his hop count and build his neighbors table in the initialization phase, packets can be routed to the sink. We use FELGossiping protocol for routine data packets and node-disjoint multipath routing protocol for alert packets. Furthermore, we utilize the information gathering phase of FELGossiping to update the neighbors table and detect the failed nodes, and we adapt the network topology changes by rerun the initialization phase when chemical units were added or removed from the warehouse. Analysis shows that the network layer is energy efficient and can meet the QoS constraints of unusual events packets.

  1. Experimental validation of optical layer performance monitoring using an all-optical network testbed

    Science.gov (United States)

    Vukovic, Alex; Savoie, Michel J.; Hua, Heng

    2004-11-01

    Communication transmission systems continue to evolve towards higher data rates, increased wavelength densities, longer transmission distances and more intelligence. Further development of dense wavelength division multiplexing (DWDM) and all-optical networks (AONs) will demand ever-tighter monitoring to assure a specified quality of service (QoS). Traditional monitoring methods have been proven to be insufficient. Higher degree of self-control, intelligence and optimization for functions within next generation networks require new monitoring schemes to be developed and deployed. Both perspective and challenges of performance monitoring, its techniques, requirements and drivers are discussed. It is pointed out that optical layer monitoring is a key enabler for self-control of next generation optical networks. Aside from its real-time feedback and the safeguarding of neighbouring channels, optical performance monitoring ensures the ability to build and control complex network topologies while maintaining an efficiently high QoS. Within an all-optical network testbed environment, key performance monitoring parameters are identified, assessed through real-time proof-of-concept, and proposed for network applications for the safeguarding of neighbouring channels in WDM systems.

  2. Meta-food-chains as a many-layer epidemic process on networks

    CERN Document Server

    Barter, Edmund

    2015-01-01

    Notable recent works have focused on the multi-layer properties of coevolving diseases. We point out that very similar systems play an important role in population ecology. Specifically we study a meta food-web model that was recently proposed by Pillai et al. This model describes a network of species connected by feeding interactions, which spread over a network of spatial patches. Focusing on the essential case, where the network of feeding interactions is a chain, we develop an analytical approach for the computation of the degree distributions of colonized spatial patches for the different species in the chain. This framework allows us to address ecologically relevant questions. Considering configuration model ensembles of spatial networks, we find that there is an upper bound for the fraction of patches that a given species can occupy, which depends only on the networks mean degree. For a given mean degree there is then an optimal degree distribution that comes closest to the upper bound. Notably scale-f...

  3. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  4. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  5. A novel generic optimization method for irrigation scheduling under multiple objectives and multiple hierarchical layers in a canal network

    Science.gov (United States)

    Delgoda, Dilini; Malano, Hector; Saleem, Syed K.; Halgamuge, Malka N.

    2017-07-01

    This research proposes a novel generic method for irrigation scheduling in a canal network to optimize multiple objectives related to canal scheduling (e.g. maximizing water supply and minimizing imbalance of water distribution) within multiple hierarchical layers (e.g. the layers consisting of the main canal, distributaries) while utilizing traditional canal scheduling methods. It is based on modularizing the optimization process. The method is theoretically capable of optimizing an unlimited number of user-defined objectives within an unlimited number of hierarchical layers and only limited by resource availability (e.g. maximum canal capacity and water limitations) in the network. It allows flexible decision-making through quantification of the mutual effects of optimizing conflicting objectives and is adaptable to available multi-objective evolutionary algorithms. The method's application is demonstrated using a hypothetical canal network example with six objectives and three hierarchical layers, and a real scenario with four objectives and two layers.

  6. Collision avoidance in TV white spaces: a cross-layer design approach for cognitive radio networks

    Science.gov (United States)

    Foukalas, Fotis; Karetsos, George T.

    2015-07-01

    One of the most promising applications of cognitive radio networks (CRNs) is the efficient exploitation of TV white spaces (TVWSs) for enhancing the performance of wireless networks. In this paper, we propose a cross-layer design (CLD) of carrier sense multiple access with collision avoidance (CSMA/CA) mechanism at the medium access control (MAC) layer with spectrum sensing (SpSe) at the physical layer, for identifying the occupancy status of TV bands. The proposed CLD relies on a Markov chain model with a state pair containing both the SpSe and the CSMA/CA from which we derive the collision probability and the achievable throughput. Analytical and simulation results are obtained for different collision avoidance and SpSe implementation scenarios by varying the contention window, back off stage and probability of detection. The obtained results depict the achievable throughput under different collision avoidance and SpSe implementation scenarios indicating thereby the performance of collision avoidance in TVWSs-based CRNs.

  7. A review on transport layer protocol performance for delivering video on an adhoc network

    Science.gov (United States)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  8. Combined bio-inspired/evolutionary computational methods in cross-layer protocol optimization for wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2011-06-01

    Published studies have focused on the application of one bio-inspired or evolutionary computational method to the functions of a single protocol layer in a wireless ad hoc sensor network (WSN). For example, swarm intelligence in the form of ant colony optimization (ACO), has been repeatedly considered for the routing of data/information among nodes, a network-layer function, while genetic algorithms (GAs) have been used to select transmission frequencies and power levels, physical-layer functions. Similarly, artificial immune systems (AISs) as well as trust models of quantized data reputation have been invoked for detection of network intrusions that cause anomalies in data and information; these act on the application and presentation layers. Most recently, a self-organizing scheduling scheme inspired by frog-calling behavior for reliable data transmission in wireless sensor networks, termed anti-phase synchronization, has been applied to realize collision-free transmissions between neighboring nodes, a function of the MAC layer. In a novel departure from previous work, the cross-layer approach to WSN protocol design suggests applying more than one evolutionary computational method to the functions of the appropriate layers to improve the QoS performance of the cross-layer design beyond that of one method applied to a single layer's functions. A baseline WSN protocol design, embedding GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layers, respectively, is constructed. Simulation results demonstrate the synergies among the bioinspired/ evolutionary methods of the proposed baseline design improve the overall QoS performance of networks over that of a single computational method.

  9. A Hybrid Constructive Algorithm for Single-Layer Feedforward Networks Learning.

    Science.gov (United States)

    Wu, Xing; Rózycki, Paweł; Wilamowski, Bogdan M

    2015-08-01

    Single-layer feedforward networks (SLFNs) have been proven to be a universal approximator when all the parameters are allowed to be adjustable. It is widely used in classification and regression problems. The SLFN learning involves two tasks: determining network size and training the parameters. Most current algorithms could not be satisfactory to both sides. Some algorithms focused on construction and only tuned part of the parameters, which may not be able to achieve a compact network. Other gradient-based optimization algorithms focused on parameters tuning while the network size has to be preset by the user. Therefore, trial-and-error approach has to be used to search the optimal network size. Because results of each trial cannot be reused in another trial, it costs much computation. In this paper, a hybrid constructive (HC)algorithm is proposed for SLFN learning, which can train all the parameters and determine the network size simultaneously. At first, by combining Levenberg-Marquardt algorithm and least-square method, a hybrid algorithm is presented for training SLFN with fixed network size. Then,with the hybrid algorithm, an incremental constructive scheme is proposed. A new randomly initialized neuron is added each time when the training entrapped into local minima. Because the training continued on previous results after adding new neurons, the proposed HC algorithm works efficiently. Several practical problems were given for comparison with other popular algorithms. The experimental results demonstrated that the HC algorithm worked more efficiently than those optimization methods with trial and error, and could achieve much more compact SLFN than those construction algorithms.

  10. A Cross-Layer Approach in Sensing and Resource Allocation for Multimedia Transmission over Cognitive UWB Networks

    NARCIS (Netherlands)

    Aripin, N.M.; Rashid, R.A.; Fisal, N.; Lo, A.C.C.; Ariffin, S.H.S.; Yusof, S.K.S.

    2010-01-01

    We propose an MAC centric cross-layer approach to address the problem of multimedia transmission over cognitive Ultra Wideband (C-UWB) networks. Several fundamental design issues, which are related to application (APP), medium access control (MAC), and physical (PHY) layer, are discussed. Although

  11. Coordinated Multi-layer Multi-domain Optical Network (COMMON) for Large-Scale Science Applications (COMMON)

    Energy Technology Data Exchange (ETDEWEB)

    Vokkarane, Vinod [University of Massachusetts

    2013-09-01

    We intend to implement a Coordinated Multi-layer Multi-domain Optical Network (COMMON) Framework for Large-scale Science Applications. In the COMMON project, specific problems to be addressed include 1) anycast/multicast/manycast request provisioning, 2) deployable OSCARS enhancements, 3) multi-layer, multi-domain quality of service (QoS), and 4) multi-layer, multidomain path survivability. In what follows, we outline the progress in the above categories (Year 1, 2, and 3 deliverables).

  12. Hydrogen responses of ultrathin Pd films and nanowire networks with a Ti buffer layer.

    Energy Technology Data Exchange (ETDEWEB)

    Zeng, X. Q.; Wang, Y. L.; Xiao, Z. L.; Latimer, M. L.; Xu, T.; Kwok, W. K. (Materials Science Division); (Northern Illinois Univ.)

    2012-01-01

    We report on hydrogen responses of ultrathin films and nanowire networks of palladium on titanium buffered silicon substrates and filtration membranes, respectively. We found that in both systems signatures such as retarding responses and saturation of the resistance changes at high hydrogen concentrations associated with the transition from Pd/H solid solution to Pd hydride diminish with decreasing the thickness of the palladium layer from 7 to 2 nm. Our results not only reveal a new way to suppress the phase transition in Pd/H system but also provide an alternative approach to achieve fast and sensitive hydrogen sensors with a wide concentration detection range.

  13. Cross-Layer Handover Scheme for Multimedia Communications in Next Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lin Chun-Cheng

    2010-01-01

    Full Text Available In order to achieve seamless handover for real-time applications in the IP Multimedia Subsystem (IMS of next generation network, a multiprotocol combined handover mechanism is proposed in this paper. We combine SIP (Session Initiation Protocol, FMIP (Fast Mobile IPv6 Protocol, and MIH (Media Independent Handover protocols by cross-layer design and optimize those protocols' signaling flows to improve the performance of vertical handover. Theoretical analysis and simulation results illustrate that our proposed mechanism performs better than the original SIP and MIH combined handover mechanism in terms of service interruption time and packet loss.

  14. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  15. Unified Multi-Layer among Software Defined Multi-Domain Optical Networks (Invited

    Directory of Open Access Journals (Sweden)

    Hui Yang

    2015-06-01

    Full Text Available The software defined networking (SDN enabled by OpenFlow protocol has gained popularity which can enable the network to be programmable and accommodate both fixed and flexible bandwidth services. In this paper, we present a unified multi-layer (UML architecture with multiple controllers and a dynamic orchestra plane (DOP for software defined multi-domain optical networks. The proposed architecture can shield the differences among various optical devices from multi-vendors and the details of connecting heterogeneous networks. The cross-domain services with on-demand bandwidth can be deployed via unified interfaces provided by the dynamic orchestra plane. Additionally, the globalization strategy and practical capture of signal processing are presented based on the architecture. The overall feasibility and efficiency of the proposed architecture is experimentally verified on the control plane of our OpenFlow-based testbed. The performance of globalization strategy under heavy traffic load scenario is also quantitatively evaluated based on UML architecture compared with other strategies in terms of blocking probability, average hops, and average resource consumption.

  16. Artificial vision by multi-layered neural networks: neocognitron and its advances.

    Science.gov (United States)

    Fukushima, Kunihiko

    2013-01-01

    The neocognitron is a neural network model proposed by Fukushima (1980). Its architecture was suggested by neurophysiological findings on the visual systems of mammals. It is a hierarchical multi-layered network. It acquires the ability to robustly recognize visual patterns through learning. Although the neocognitron has a long history, modifications of the network to improve its performance are still going on. For example, a recent neocognitron uses a new learning rule, named add-if-silent, which makes the learning process much simpler and more stable. Nevertheless, a high recognition rate can be kept with a smaller scale of the network. Referring to the history of the neocognitron, this paper discusses recent advances in the neocognitron. We also show that various new functions can be realized by, for example, introducing top-down connections to the neocognitron: mechanism of selective attention, recognition and completion of partly occluded patterns, restoring occluded contours, and so on. Copyright © 2012 Elsevier Ltd. All rights reserved.

  17. FreeNA: A Multi-Platform Framework for Inserting Upper-Layer Network Services

    Science.gov (United States)

    Kawashima, Ryota; Ji, Yusheng; Maruyama, Katsumi

    Networking technologies have recently been evolving and network applications are now expected to support flexible composition of upper-layer network services, such as security, QoS, or personal firewall. We propose a multi-platform framework called FreeNA that extends existing applications by incorporating the services based on user definitions. This extension does not require users to modify their systems at all. Therefore, FreeNA is valuable for experimental system usage. We implemented FreeNA on both Linux and Microsoft Windows operating systems, and evaluated their functionality and performance. In this paper, we describe the design and implementation of FreeNA including details on how to insert network services into existing applications and how to create services in a multi-platform environment. We also give an example implementation of a service with SSL, a functionality comparison with relevant systems, and our performance evaluation results. The results show that FreeNA offers finer configurability, composability, and usability than other similar systems. We also show that the throughput degradation of transparent service insertion is 2% at most compared with a method of directly inserting such services into applications.

  18. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  19. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  20. Cross-Layer Throughput Optimization in Cognitive Radio Networks with SINR Constraints

    Directory of Open Access Journals (Sweden)

    Miao Ma

    2010-01-01

    Full Text Available Recently, there have been some research works in the design of cross-layer protocols for cognitive radio (CR networks, where the Protocol Model is used to model the radio interference. In this paper we consider a multihop multi-channel CR network. We use a more realistic Signal-to-Interference-plus-Noise Ratio (SINR model for radio interference and study the following cross-layer throughput optimization problem: (1 Given a set of secondary users with random but fixed location, and a set of traffic flows, what is the max-min achievable throughput? (2 To achieve the optimum, how to choose the set of active links, how to assign the channels to each active link, and how to route the flows? To the end, we present a formal mathematical formulation with the objective of maximizing the minimum end-to-end flow throughput. Since the formulation is in the forms of mixed integer nonlinear programming (MINLP, which is generally a hard problem, we develop a heuristic method by solving a relaxation of the original problem, followed by rounding and simple local optimization. Simulation results show that the heuristic approach performs very well, that is, the solutions obtained by the heuristic are very close to the global optimum obtained via LINGO.

  1. OMNeT++-Based Cross-Layer Simulator for Content Transmission over Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Massin R

    2010-01-01

    Full Text Available Flexbility and deployment simplicity are among the numerous advantages of wireless links when compared to standard wired communications. However, challenges do remain high for wireless communications, in particular due to the wireless medium inherent unreliability, and to the desired flexibility, which entails complex protocol procedures. In that context simulation is an important tool to understand and design the protocols that manage the wireless networks. This paper introduces a new simulation framework based on the OMNeT++ simulator whose goal is to enable the study of data and multimedia content transmission over hybrid wired/wireless ad hoc networks, as well as the design of innovative radio access schemes. To achieve this goal, the complete protocol stack from the application to the physical layer is simulated, and the real bits and bytes of the messages transferred on the radio channel are exchanged. To ensure that this framework is reusable and extensible in future studies and projects, a modular software and protocol architecture has been defined. Although still in progress, our work has already provided some valuable results concerning cross layer HARQ/MAC protocol performance and video transmission over the wireless channel, as illustrated by results examples.

  2. Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    N. Chilamkurti

    2009-01-01

    Full Text Available The Dynamic Source Routing (DSR algorithm computes a new route when packet loss occurs. DSR does not have an in-built mechanism to determine whether the packet loss was the result of congestion or node failure causing DSR to compute a new route. This leads to inefficient energy utilization when DSR is used in wireless sensor networks. In this work, we exploit cross-layer optimization techniques that extend DSR to improve its routing energy efficiency by minimizing the frequency of recomputed routes. Our proposed approach enables DSR to initiate a route discovery only when link failure occurs. We conducted extensive simulations to evaluate the performance of our proposed cross-layer DSR routing protocol. The simulation results obtained with our extended DSR routing protocol show that the frequency with which new routes are recomputed is 50% lower compared with the traditional DSR protocol. This improvement is attributed to the fact that, with our proposed cross-layer DSR, we distinguish between congestion and link failure conditions, and new routes are recalculated only for the latter.

  3. A Novel Approach to ECG Classification Based upon Two-Layered HMMs in Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Liang

    2014-03-01

    Full Text Available This paper presents a novel approach to ECG signal filtering and classification. Unlike the traditional techniques which aim at collecting and processing the ECG signals with the patient being still, lying in bed in hospitals, our proposed algorithm is intentionally designed for monitoring and classifying the patient’s ECG signals in the free-living environment. The patients are equipped with wearable ambulatory devices the whole day, which facilitates the real-time heart attack detection. In ECG preprocessing, an integral-coefficient-band-stop (ICBS filter is applied, which omits time-consuming floating-point computations. In addition, two-layered Hidden Markov Models (HMMs are applied to achieve ECG feature extraction and classification. The periodic ECG waveforms are segmented into ISO intervals, P subwave, QRS complex and T subwave respectively in the first HMM layer where expert-annotation assisted Baum-Welch algorithm is utilized in HMM modeling. Then the corresponding interval features are selected and applied to categorize the ECG into normal type or abnormal type (PVC, APC in the second HMM layer. For verifying the effectiveness of our algorithm on abnormal signal detection, we have developed an ECG body sensor network (BSN platform, whereby real-time ECG signals are collected, transmitted, displayed and the corresponding classification outcomes are deduced and shown on the BSN screen.

  4. Respiratory signal prediction based on adaptive boosting and multi-layer perceptron neural network

    Science.gov (United States)

    Sun, W. Z.; Jiang, M. Y.; Ren, L.; Dang, J.; You, T.; Yin, F.-F.

    2017-09-01

    To improve the prediction accuracy of respiratory signals using adaptive boosting and multi-layer perceptron neural network (ADMLP-NN) for gated treatment of moving target in radiation therapy. The respiratory signals acquired using a real-time position management (RPM) device from 138 previous 4DCT scans were retrospectively used in this study. The ADMLP-NN was composed of several artificial neural networks (ANNs) which were used as weaker predictors to compose a stronger predictor. The respiratory signal was initially smoothed using a Savitzky-Golay finite impulse response smoothing filter (S-G filter). Then, several similar multi-layer perceptron neural networks (MLP-NNs) were configured to estimate future respiratory signal position from its previous positions. Finally, an adaptive boosting (Adaboost) decision algorithm was used to set weights for each MLP-NN based on the sample prediction error of each MLP-NN. Two prediction methods, MLP-NN and ADMLP-NN (MLP-NN plus adaptive boosting), were evaluated by calculating correlation coefficient and root-mean-square-error between true and predicted signals. For predicting 500 ms ahead of prediction, average correlation coefficients were improved from 0.83 (MLP-NN method) to 0.89 (ADMLP-NN method). The average of root-mean-square-error (relative unit) for 500 ms ahead of prediction using ADMLP-NN were reduced by 27.9%, compared to those using MLP-NN. The preliminary results demonstrate that the ADMLP-NN respiratory prediction method is more accurate than the MLP-NN method and can improve the respiration prediction accuracy.

  5. HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks

    CERN Document Server

    El-Badry, Rania; Youssef, Moustafa

    2010-01-01

    In many hybrid wireless sensor networks' applications, sensor nodes are deployed in hostile environments where trusted and un-trusted nodes co-exist. In anchor-based hybrid networks, it becomes important to allow trusted nodes to gain full access to the location information transmitted in beacon frames while, at the same time, prevent un-trusted nodes from using this information. The main challenge is that un-trusted nodes can measure the physical signal transmitted from anchor nodes, even if these nodes encrypt their transmission. Using the measured signal strength, un-trusted nodes can still tri-laterate the location of anchor nodes. In this paper, we propose HyberLoc, an algorithm that provides anchor physical layer location privacy in anchor-based hybrid sensor networks. The idea is for anchor nodes to dynamically change their transmission power following a certain probability distribution, degrading the localization accuracy at un-trusted nodes while maintaining high localization accuracy at trusted node...

  6. 3D Polygon Mesh Compression with Multi Layer Feed Forward Neural Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil Piperakis

    2003-06-01

    Full Text Available In this paper, an experiment is conducted which proves that multi layer feed forward neural networks are capable of compressing 3D polygon meshes. Our compression method not only preserves the initial accuracy of the represented object but also enhances it. The neural network employed includes the vertex coordinates, the connectivity and normal information in one compact form, converting the discrete and surface polygon representation into an analytic, solid colloquial. Furthermore, the 3D object in its compressed neural form can be directly - without decompression - used for rendering. The neural compression - representation is viable to 3D transformations without the need of any anti-aliasing techniques - transformations do not disrupt the accuracy of the geometry. Our method does not su.er any scaling problem and was tested with objects of 300 to 107 polygons - such as the David of Michelangelo - achieving in all cases an order of O(b3 less bits for the representation than any other commonly known compression method. The simplicity of our algorithm and the established mathematical background of neural networks combined with their aptness for hardware implementation can establish this method as a good solution for polygon compression and if further investigated, a novel approach for 3D collision, animation and morphing.

  7. A spiking network model of cerebellar Purkinje cells and molecular layer interneurons exhibiting irregular firing

    Directory of Open Access Journals (Sweden)

    William eLennon

    2014-12-01

    Full Text Available While the anatomy of the cerebellar microcircuit is well studied, how it implements cerebellar function is not understood. A number of models have been proposed to describe this mechanism but few emphasize the role of the vast network Purkinje cells (PKJs form with the molecular layer interneurons (MLIs – the stellate and basket cells. We propose a model of the MLI-PKJ network composed of simple spiking neurons incorporating the major anatomical and physiological features. In computer simulations, the model reproduces the irregular firing patterns observed in PKJs and MLIs in vitro and a shift toward faster, more regular firing patterns when inhibitory synaptic currents are blocked. In the model, the time between PKJ spikes is shown to be proportional to the amount of feedforward inhibition from an MLI on average. The two key elements of the model are: (1 spontaneously active PKJs and MLIs due to an endogenous depolarizing current, and (2 adherence to known anatomical connectivity along a parasagittal strip of cerebellar cortex. We propose this model to extend previous spiking network models of the cerebellum and for further computational investigation into the role of irregular firing and MLIs in cerebellar learning and function.

  8. Equation Chapter 1 Section 1Cross Layer Design for Localization in Large-Scale Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yuanfeng ZHANG

    2014-02-01

    Full Text Available There are many technical challenges for designing large-scale underwater sensor networks, especially the sensor node localization. Although many papers studied for large-scale sensor node localization, previous studies mainly study the location algorithm without the cross layer design for localization. In this paper, by utilizing the network hierarchical structure of underwater sensor networks, we propose a new large-scale underwater acoustic localization scheme based on cross layer design. In this scheme, localization is performed in a hierarchical way, and the whole localization process focused on the physical layer, data link layer and application layer. We increase the pipeline parameters which matched the acoustic channel, added in MAC protocol to increase the authenticity of the large-scale underwater sensor networks, and made analysis of different location algorithm. We conduct extensive simulations, and our results show that MAC layer protocol and the localization algorithm all would affect the result of localization which can balance the trade-off between localization accuracy, localization coverage, and communication cost.

  9. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    Science.gov (United States)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of

  10. Photonic layer security in fiber-optic networks and optical OFDM transmission

    Science.gov (United States)

    Wang, Zhenxing

    Currently the Internet is experiencing an explosive growth in the world. Such growth leads to an increased data transmission rate demand in fiber-optical networks. Optical orthogonal frequency multiplexing (OFDM) is considered as a promising solution to achieve data rate beyond 100Gb/s per wavelength channel. In the meanwhile, because of extensive data transmission and sharing, data security has become an important problem and receives considerable attention in current research literature. This thesis focuses on data security issues at the physical layer of optical networks involving code-division multiple access (CDMA) systems and steganography methods. The thesis also covers several implementation issues in optical OFDM transmission. Optical CDMA is regarded as a good candidate to provide photonic layer security in multi-access channels. In this thesis we provide a systematic analysis of the security performance of incoherent optical CDMA codes. Based on the analysis, we proposed and experimentally demonstrated several methods to improve the security performance of the optical CDMA systems, such as applying all-optical encryption, and code hopping using nonlinear wavelength conversion. Moreover, we demonstrate that the use of wireless CDMA codes in optical systems can enhance the security in one single-user end-to-end optical channel. Optical steganography is another method to provide photonic data security and involves hiding the existence of data transmissions. In the thesis, we demonstrate that an optical steganography channel can exist in phase modulated public channels as well as traditional on-off-keying (OOK) modulated channels, without data synchronization. We also demonstrate an optical steganography system with enhanced security by utilizing temporal phase modulation techniques. Additionally, as one type of an overlay channel, the optical steganography technology can carry the sensor data collected by wireless sensor network on top of public optical

  11. Joint optimization of physical layer parameters and routing in wireless mesh networks

    KAUST Repository

    Tobagi, Fouad A.

    2010-06-01

    Achieving the best performance in a wireless mesh network requires striking the right balance between the performance of links carrying traffic and the extent of spatial reuse of the wireless medium. The performance of a link depends on its transmit power and data rate as well as the level of interference caused by concurrent transmissions in the network; the latter is function of the Energy Detect (ED) threshold that determines when a node may access the medium. Which links in the network carry traffic is determined by the routing function; routing selects paths according to a link metric that reflects the relative performance of links (e.g., the expected transmission time of a packet on the link). In this paper, we seek to maximize end-to-end network throughput by jointly optimizing physical layer parameters and routing. We consider a random topology with a uniform node density. We consider that the signal attenuation between a pair of nodes is determined by a power law path loss model with an exponent equal to 3. Our findings are as follows. Consider first that the same transmit power and same data rate are used on all links. For any transmit power, data rate and ED threshold setting, the highest feasible load is obtained when the level of interference experienced by links used by routing is the highest possible. For a given transmit power and data rate setting, there is an optimum ED threshold that maximizes network performance. At the optimum ED threshold and maximum load, the range of link lengths used by routing is the lowest possible given the topology and routing metric used. With an ED threshold higher than the optimum, the same range of links is used by routing; however, the highest feasible load in this case is lower due to the fact that concurrent transmitters are allowed to be closer. With a lower ED threshold, concurrent transmitters are forced to be farther apart, and thus longer links become more attractive; as a result, the range of link lengths

  12. A Mobile Picture Tagging System Using Tree-Structured Layered Bayesian Networks

    Directory of Open Access Journals (Sweden)

    Young-Seol Lee

    2013-01-01

    Full Text Available Advances in digital media technology have increased in multimedia content. Tagging is one of the most effective methods to manage a great volume of multimedia content. However, manual tagging has limitations such as human fatigue and subjective and ambiguous keywords. In this paper, we present an automatic tagging method to generate semantic annotation on a mobile phone. In order to overcome the constraints of the mobile environment, the method uses two layered Bayesian networks. In contrast to existing techniques, this approach attempts to design probabilistic models with fixed tree structures and intermediate nodes. To evaluate the performance of this method, an experiment is conducted with data collected over a month. The result shows the efficiency and effectiveness of our proposed method. Furthermore, a simple graphic user interface is developed to visualize and evaluate recognized activities and probabilities.

  13. Asymptotic Delay Analysis for Cross-Layer Delay-Based Routing in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Philippe Jacquet

    2007-01-01

    Full Text Available This paper addresses the problem of the evaluation of the delay distribution via analytical means in IEEE 802.11 wireless ad hoc networks. We show that the asymptotic delay distribution can be expressed as a power law. Based on the latter result, we present a cross-layer delay estimation protocol and we derive new delay-distribution-based routing algorithms, which are well adapted to the QoS requirements of real-time multimedia applications. In fact, multimedia services are not sensitive to average delays, but rather to the asymptotic delay distributions. Indeed, video streaming applications drop frames when they are received beyond a delay threshold, determined by the buffer size. Although delay-distribution-based routing is an NP-hard problem, we show that it can be solved in polynomial time when the delay threshold is large, because of the asymptotic power law distribution of the link delays.

  14. Cross-Layer Control with Worst Case Delay Guarantees in Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Shu Fan

    2016-01-01

    Full Text Available The delay guarantee is a challenge to meet different real-time requirements in applications of backpressure-based wireless multihop networks, and therefore, researchers are interested in the possibility of providing bounded end-to-end delay. In this paper, a new cross-layer control algorithm with worst case delay guarantees is proposed. The utility maximization algorithm is developed using a Lyapunov optimization framework. Virtual queues that ensure the worst case delay of nondropped packets are designed. It is proved through rigorous theoretical analyses and verified by simulations that the time average overall utility achieved by the new algorithm can be arbitrarily close to the optimal solution with finite queue backlogs. The simulation results evaluated with Matlab show that the proposed algorithm achieves higher throughput utility with fewer data dropped compared with the existing work.

  15. Pore-Network Modeling of Water and Vapor Transport in the Micro Porous Layer and Gas Diffusion Layer of a Polymer Electrolyte Fuel Cell

    Directory of Open Access Journals (Sweden)

    Chao-Zhong Qin

    2016-05-01

    Full Text Available In the cathode side of a polymer electrolyte fuel cell (PEFC, a micro porous layer (MPL added between the catalyst layer (CL and the gas diffusion layer (GDL plays an important role in water management. In this work, by using both quasi-static and dynamic pore-network models, water and vapor transport in the MPL and GDL has been investigated. We illustrated how the MPL improved water management in the cathode. Furthermore, it was found that dynamic liquid water transport in the GDL was very sensitive to the built-up thermal gradient along the through-plane direction. Thus, we may control water vapor condensation only along GDL-land interfaces by properly adjusting the GDL thermal conductivity. Our numerical results can provide guidelines for optimizing GDL pore structures for good water management.

  16. Cross-Layer Explicit Link Status Notification to Improve TCP Performance in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yun Ji-Hoon

    2009-01-01

    Full Text Available To alleviate the performance degradation of conventional TCP in wireless networks, many schemes have been proposed so far. One category of such schemes is the Explicit Loss Notification (ELN scheme in which TCP senders are notified of wireless losses so as to avoid congestion control against those losses. Thus the key design factor of the ELN scheme is how to detect wireless losses accurately and rapidly. This paper proposes a new ELN scheme, in which wireless losses are detected by monitoring the operation of the wireless link layer. By exploiting such cross-layer design, the proposed scheme can detect wireless losses without additional transmission over the wireless link and thus achieves accurate detection with minimum delay. The proposed scheme additionally sends new information, that is, Explicit Retransmission Start Notification, in order to prevent spurious timeouts of the TCP senders. Furthermore, in order to handle packet reordering and avoid successive shrinking of a congestion window due to multiple packet drops, a new TCP modification is proposed. Through intensive simulations, it is demonstrated that the proposed scheme outperforms the other ELN schemes, and yields the throughput performance of more than 400% of TCP-Reno and 150% of Snoop in the considered environments.

  17. A Cross-Layer Route Discovery Framework for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Wu Jieyi

    2005-01-01

    Full Text Available Most reactive routing protocols in MANETs employ a random delay between rebroadcasting route requests (RREQ in order to avoid "broadcast storms." However this can lead to problems such as "next hop racing" and "rebroadcast redundancy." In addition to this, existing routing protocols for MANETs usually take a single routing strategy for all flows. This may lead to inefficient use of resources. In this paper we propose a cross-layer route discovery framework (CRDF to address these problems by exploiting the cross-layer information. CRDF solves the above problems efficiently and enables a new technique: routing strategy automation (RoSAuto. RoSAuto refers to the technique that each source node automatically decides the routing strategy based on the application requirements and each intermediate node further adapts the routing strategy so that the network resource usage can be optimized. To demonstrate the effectiveness and the efficiency of CRDF, we design and evaluate a macrobian route discovery strategy under CRDF.

  18. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    Science.gov (United States)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  19. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks

    Directory of Open Access Journals (Sweden)

    Kyusung Shim

    2017-02-01

    Full Text Available In this paper, we study the physical layer security (PLS of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC technique and the selection combining (SC technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP, closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks.

  20. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks.

    Science.gov (United States)

    Shim, Kyusung; Do, Nhu Tri; An, Beongku

    2017-02-15

    In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks.

  1. Layered decomposition for the model order reduction of timescale separated biochemical reaction networks.

    Science.gov (United States)

    Prescott, Thomas P; Papachristodoulou, Antonis

    2014-09-07

    Biochemical reaction networks tend to exhibit behaviour on more than one timescale and they are inevitably modelled by stiff systems of ordinary differential equations. Singular perturbation is a well-established method for approximating stiff systems at a given timescale. Standard applications of singular perturbation partition the state variable into fast and slow modules and assume a quasi-steady state behaviour in the fast module. In biochemical reaction networks, many reactants may take part in both fast and slow reactions; it is not necessarily the case that the reactants themselves are fast or slow. Transformations of the state space are often required in order to create fast and slow modules, which thus no longer model the original species concentrations. This paper introduces a layered decomposition, which is a natural choice when reaction speeds are separated in scale. The new framework ensures that model reduction can be carried out without seeking state space transformations, and that the effect of the fast dynamics on the slow timescale can be described directly in terms of the original species. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  3. A Cross-Layer Approach in Sensing and Resource Allocation for Multimedia Transmission over Cognitive UWB Networks

    Directory of Open Access Journals (Sweden)

    Lo ACC

    2010-01-01

    Full Text Available We propose an MAC centric cross-layer approach to address the problem of multimedia transmission over cognitive Ultra Wideband (C-UWB networks. Several fundamental design issues, which are related to application (APP, medium access control (MAC, and physical (PHY layer, are discussed. Although substantial research has been carried out in the PHY layer perspective of cognitive radio system, this paper attempts to extend the existing research paradigm to MAC and APP layers, which can be considered as premature at this time. This paper proposed a cross-layer design that is aware of (a UWB wireless channel conditions, (b time slot allocations at the MAC layer, and (c MPEG-4 video at the APP layer. Two cooperative sensing mechanisms, namely, AND and OR, are analyzed in terms of probability of detection ( , probability of false alarm ( , and the required sensing period. Then, the impact of sensing scheduling to the MPEG-4 video transmission over wireless cognitive UWB networks is observed. In addition, we also proposed the packet reception rate- (PRR- based resource allocation scheme that is aware of the channel condition, target PRR, and queue status.

  4. Adaptive QoS provision for IEEE 802.16e BWA networks based on cross-layer design

    Directory of Open Access Journals (Sweden)

    Kuo GS

    2011-01-01

    Full Text Available Abstract This article proposes an integrated framework for adaptive QoS provision in IEEE 802.16e broadband wireless access networks based on cross-layer design. On one hand, an efficient admission control (AC algorithm is proposed along with a semi-reservation scheme to guarantee the connection-level QoS. First, to guarantee the service continuity for handoff connections and resource efficiency, our semi-reservation scheme considers both users' handoff probability and average resource consumption together, which effectively avoids resource over-reservation and insufficient reservation. For AC, a new/handoff connection is accepted only when the target cell has enough resource to afford both instantaneous and average resource consumption to meet the average source rate request. On the other hand, a joint resource allocation and packet scheduling scheme is designed to provide packet-level QoS guarantee in term of "QoS rate", which can ensure fairness for the services with identical priority level in case of bandwidth shortage. Particularly, an enhanced bandwidth request scheme is designed to reduce unnecessary BR delay and redundant signaling overhead caused by the existing one in IEEE 802.16e, which further improves the packet-level QoS performance and resource efficiency for uplink transmission. Simulation results show that the proposed approach not only balances the tradeoff among connection blocking rate, connection dropping rate, and connection failure rate, but also achieves low mean packet dropping rate (PDR, small deviation of PDR, and low QoS outage rate. Moreover, high resource efficiency is ensured.

  5. Water transport in the gas diffusion layer of a polymer electrolyte fuel cell : Dynamic Pore-Network Modeling

    NARCIS (Netherlands)

    Qin, C.

    2015-01-01

    The pore-scale modeling is a powerful tool for increasing our understanding of water transport in the fibrous gas diffusion layer (GDL) of a polymer electrolyte fuel cell (PEFC). In this work, a new dynamic pore-network model for air-water flow in the GDL is developed. It incorporates water vapor

  6. A one-layer projection neural network for nonsmooth optimization subject to linear equalities and bound constraints.

    Science.gov (United States)

    Liu, Qingshan; Wang, Jun

    2013-05-01

    This paper presents a one-layer projection neural network for solving nonsmooth optimization problems with generalized convex objective functions and subject to linear equalities and bound constraints. The proposed neural network is designed based on two projection operators: linear equality constraints, and bound constraints. The objective function in the optimization problem can be any nonsmooth function which is not restricted to be convex but is required to be convex (pseudoconvex) on a set defined by the constraints. Compared with existing recurrent neural networks for nonsmooth optimization, the proposed model does not have any design parameter, which is more convenient for design and implementation. It is proved that the output variables of the proposed neural network are globally convergent to the optimal solutions provided that the objective function is at least pseudoconvex. Simulation results of numerical examples are discussed to demonstrate the effectiveness and characteristics of the proposed neural network.

  7. Cross-Layer Quality-of-Service Analysis and Call Admission Control in the Uplink of CDMA Cellular Networks

    Directory of Open Access Journals (Sweden)

    Nie Chun

    2006-01-01

    Full Text Available This paper addresses cross-layer quality-of-service (QoS provisioning in the uplink of CDMA cellular mobile networks. Each mobile can take up to four UMTS traffic classes in our model. At the data link layer and the network layer, the QoS performances are defined in terms of signal-to-interference-plus-noise ratio and outage probability, and packet loss rate and delay, respectively. A call admission control scheme which fulfills these QoS metrics is developed to maximize the system capacity. The novelty of this paper is that the effect of the lengthening of the on-periods of non-real-time traffic classes is investigated by using the Go-Back-N automatic retransmission request mechanism with finite buffer size and limited number of retransmissions in the event of transmission errors. Simulation results for a specific example demonstrate the reasonableness of the analytical formulation.

  8. Disentangling the co-structure of multilayer interaction networks: degree distribution and module composition in two-layer bipartite networks.

    Science.gov (United States)

    Astegiano, Julia; Altermatt, Florian; Massol, François

    2017-11-13

    Species establish different interactions (e.g. antagonistic, mutualistic) with multiple species, forming multilayer ecological networks. Disentangling network co-structure in multilayer networks is crucial to predict how biodiversity loss may affect the persistence of multispecies assemblages. Existing methods to analyse multilayer networks often fail to consider network co-structure. We present a new method to evaluate the modular co-structure of multilayer networks through the assessment of species degree co-distribution and network module composition. We focus on modular structure because of its high prevalence among ecological networks. We apply our method to two Lepidoptera-plant networks, one describing caterpillar-plant herbivory interactions and one representing adult Lepidoptera nectaring on flowers, thereby possibly pollinating them. More than 50% of the species established either herbivory or visitation interactions, but not both. These species were over-represented among plants and lepidopterans, and were present in most modules in both networks. Similarity in module composition between networks was high but not different from random expectations. Our method clearly delineates the importance of interpreting multilayer module composition similarity in the light of the constraints imposed by network structure to predict the potential indirect effects of species loss through interconnected modular networks.

  9. Magnitude-recurrence statistics for stratabound fracture networks in layered media

    Science.gov (United States)

    Eaton, David; Davidsen, Joern

    2014-05-01

    Variants of the Gutenberg-Richter (G-R) relation, which express scale-independent behavior of earthquakes over a range of values, are almost universally used to describe magnitude-recurrence statistics for microseismic observations. The b value, which is the slope derived from classic G-R plots, is a particularly important parameter that effectively measures the abundance of large-magnitude events relative to small events. Hydraulic fracture monitoring programs often yield apparent b values of 2.0 or greater. These values are exceptionally high compared to earthquake fault sysems, which typically exhibit b values close to 1.0. In some reports, a sudden reduction in b value during treatment has been attributed to unintended activation of a pre-existing fault. An alternative model is developed here to describe magnitude statistics of microseismic events that occur on steeply dipping to vertical fracture surfaces in horizontally layered media. Termination of fractures at mechanical layer boundaries imposes a size-dependent scaling relationship and results in a stratabound fracture networks, which are well described in a number of field studies. In the case of constant stress drop, microseismic magnitude distributions will mimic bed-thickness distributions under these circumstances. A lognormal distribution of mechanical bed thickness, which provides a good fit for three examples considered here from various parts of North America, leads asymptotically to a Gaussian distribution of microseismic magnitudes that readily explains apparent observed b values of close to 2.0. This model is consistent with a sudden reduction in b value arising from uninended triggering of a pre-existing fault, and also implies that subtle changes in b value during a treatment program may be indicative of spatial variations in reservoir facies.

  10. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  11. A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines

    Directory of Open Access Journals (Sweden)

    Jun Yu

    2015-01-01

    Full Text Available Optimization of energy consumption in Wireless Sensor Network (WSN nodes has become a critical link that constrains the engineering application of the smart grid due to the fact that the smart grid is characterized by long-distance transmission in a special environment. The paper proposes a linear hierarchical network topological structure specific to WSN energy conservation in environmental monitoring of the long-distance electric transmission lines in the smart grid. Based on the topological structural characteristics and optimization of network layers, the paper also proposes a Topological Structure be Layered Configurations (TSLC routing algorithm to improve the quality of WSN data transmission performance. Coprocessing of the network layer and the media access control (MAC layer is achieved by using the cross-layer design method, accessing the status for the nodes in the network layer and obtaining the status of the network nodes of the MAC layer. It efficiently saves the energy of the whole network, improves the quality of the network service performance, and prolongs the life cycle of the network.

  12. Well-ordered ZnO nanotube arrays and networks grown by atomic layer deposition

    Science.gov (United States)

    Zhang, Yijun; Liu, Ming; Ren, Wei; Ye, Zuo-Guang

    2015-06-01

    Semiconductor ZnO, possessing a large exciton binding energy and wide band gap, has received a great deal of attention because it shows great potential for applications in optoelectronics. Precisely controlling the growth of three-dimensional ZnO nanotube structures with a uniform morphology constitutes an important step forward toward integrating ZnO nanostructures into microelectronic devices. Atomic layer deposition (ALD) technique, featured with self-limiting surface reactions, is an ideal approach to the fabrication of ZnO nanostructures, because it allows for accurate control of the thickness at atomic level and conformal coverage in complex 3D structures. In this work, well-ordered ZnO nanotube arrays and networks are prepared by ALD. The morphology, crystallinity and wall thickness of these nanotube structures are examined for different growth conditions. The microstructure of the ZnO nanotubes is investigated by transmission electron microscopy and X-ray diffraction. The high aspect ratio of ZnO nanotubes provides a large specific area which could enhance the kinetics of chemical reactions taking place between the ZnO and its surroundings, making the potential devices more efficient and compact.

  13. Learning a three-layer backpropagation network to recognize different Arabic fonts

    Science.gov (United States)

    El-Zoghabi, Adel A.; Ismail, Mohammed A.; Shen, Stewart N. T.; Korany, E. A.

    1993-09-01

    Optical Character Recognition (OCR) has been considered to be a major breakthrough in man- machine communication. The function of OCR is to recognize previously scanned images that may contain typed, printed, and/or handwritten characters and to output the appropriate text document. A preprocessing stage (segmentation) is first performed on the scanned text to isolate lines from documents, words from lines, and finally characters from words. Immediately following the segmentation stage is the recognition stage in which the isolated characters are first processed for feature extraction and then fed to the classification process which tries to recognize the upcoming character based on the extracted features. In this paper, a recognition stage which consists of a three-layer neural network trained by the back- propagation algorithm is considered in the recognition of different Arabic fonts. Our approach is built around three interacting processes, one procedure for feature extraction of the upcoming character element, one declarative for heuristic clustering, and one exemplar to identify the target element based on some previously learned examples.

  14. Estimating Planetary Boundary Layer Heights from NOAA Profiler Network Wind Profiler Data

    Science.gov (United States)

    Molod, Andrea M.; Salmun, H.; Dempsey, M

    2015-01-01

    An algorithm was developed to estimate planetary boundary layer (PBL) heights from hourly archived wind profiler data from the NOAA Profiler Network (NPN) sites located throughout the central United States. Unlike previous studies, the present algorithm has been applied to a long record of publicly available wind profiler signal backscatter data. Under clear conditions, summertime averaged hourly time series of PBL heights compare well with Richardson-number based estimates at the few NPN stations with hourly temperature measurements. Comparisons with clear sky reanalysis based estimates show that the wind profiler PBL heights are lower by approximately 250-500 m. The geographical distribution of daily maximum PBL heights corresponds well with the expected distribution based on patterns of surface temperature and soil moisture. Wind profiler PBL heights were also estimated under mostly cloudy conditions, and are generally higher than both the Richardson number based and reanalysis PBL heights, resulting in a smaller clear-cloudy condition difference. The algorithm presented here was shown to provide a reliable summertime climatology of daytime hourly PBL heights throughout the central United States.

  15. Selective Route Based on SNR with Cross-Layer Scheme in Wireless Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Istikmal

    2017-01-01

    Full Text Available In this study, we developed network and throughput formulation models and proposed new method of the routing protocol algorithm with a cross-layer scheme based on signal-to-noise ratio (SNR. This method is an enhancement of routing protocol ad hoc on-demand distance vector (AODV. This proposed scheme uses selective route based on the SNR threshold in the reverse route mechanism. We developed AODV SNR-selective route (AODV SNR-SR for a mechanism better than AODV SNR, that is, the routing protocol that used average or sum of path SNR, and also better than AODV which is hop-count-based. We also used selective reverse route based on SNR mechanism, replacing the earlier method to avoid routing overhead. The simulation results show that AODV SNR-SR outperforms AODV SNR and AODV in terms of throughput, end-to-end delay, and routing overhead. This proposed method is expected to support Device-to-Device (D2D communications that are concerned with the quality of the channel awareness in the development of the future Fifth Generation (5G.

  16. Self-assembled Ag nanoparticle network passivated by a nano-sized ZnO layer for transparent and flexible film heaters

    Directory of Open Access Journals (Sweden)

    Ki-Won Seo

    2015-12-01

    Full Text Available We investigated a self-assembled Ag nanoparticle network electrode passivated by a nano-sized ZnO layer for use in high-performance transparent and flexible film heaters (TFFHs. The low temperature atomic layer deposition of a nano-sized ZnO layer effectively filled the uncovered area of Ag network and improved the current spreading in the self-assembled Ag network without a change in the sheet resistance and optical transmittance as well as mechanical flexibility. The time-temperature profiles and heat distribution analysis demonstrate that the performance of the TFTH with the ZnO/Ag network is superior to that of a TFFH with Ag nanowire electrodes. In addition, the TFTHs with ZnO/Ag network exhibited better stability than the TFFH with a bare Ag network due to the effective current spreading through the nano-sized ZnO layer.

  17. MESHCHORD: A Location-Aware, Cross-Layer Specialization of Chord for Wireless Mesh Networks

    OpenAIRE

    Burresi, Simone; Canali, Claudia; Renda, Maria Elena; Santi, Paolo

    2007-01-01

    Wireless mesh networks are a promising area for the deployment of new wireless communication and networking technologies. In this paper, we address the problem of enabling effective peer-to-peer resource sharing in this type of networks. Starting from the well-known Chord protocol for resource sharing in wired networks, we propose a specialization (called MESHCHORD) that accounts for peculiar features of wireless mesh networks: namely, the availability of a wireless infrastructure, and the 1-...

  18. An Automated MR Image Segmentation System Using Multi-layer Perceptron Neural Network

    Directory of Open Access Journals (Sweden)

    Amiri S

    2013-12-01

    Full Text Available Background: Brain tissue segmentation for delineation of 3D anatomical structures from magnetic resonance (MR images can be used for neuro-degenerative disorders, characterizing morphological differences between subjects based on volumetric analysis of gray matter (GM, white matter (WM and cerebrospinal fluid (CSF, but only if the obtained segmentation results are correct. Due to image artifacts such as noise, low contrast and intensity non-uniformity, there are some classifcation errors in the results of image segmentation. Objective: An automated algorithm based on multi-layer perceptron neural networks (MLPNN is presented for segmenting MR images. The system is to identify two tissues of WM and GM in human brain 2D structural MR images. A given 2D image is processed to enhance image intensity and to remove extra cerebral tissue. Thereafter, each pixel of the image under study is represented using 13 features (8 statistical and 5 non- statistical features and is classifed using a MLPNN into one of the three classes WM and GM or unknown. Results: The developed MR image segmentation algorithm was evaluated using 20 real images. Training using only one image, the system showed robust performance when tested using the remaining 19 images. The average Jaccard similarity index and Dice similarity metric for the GM and WM tissues were estimated to be 75.7 %, 86.0% for GM, and 67.8% and 80.7%for WM, respectively. Conclusion: The obtained performances are encouraging and show that the presented method may assist with segmentation of 2D MR images especially where categorizing WM and GM is of interest.

  19. CHAL - Control logic / Hardware Abstraction layer

    OpenAIRE

    Zennaro, Marco; Sengupta, Raja

    2007-01-01

    Traffic control systems have reached a high level of sophistication: they are general purpose machines that can, in principle, run any traffic control software. The firmware they are running turns them into special purpose machines able to operate only according to some pre-defined rules. The firmware usually allows limited customizations through parameters, but it does not support the introduction of new control schemes. As a result, implementing a new traffic control scheme requires the re-...

  20. Abstracting GIS Layers from Hyperspectral Imagery

    Science.gov (United States)

    2009-03-01

    the brain is damaged, the “. . . recruitment of cells to different tasks depending on experience is well known” [22]. The self-organizing map (SOM...jump in the red region of the visible spectrum, somewhere between 680 nm and 725 nm. This sharp curve is caused by photosynthetic-active cells in the...network”, “buildings”, “parking areas”, and “fields” final object maps are deleted from the “non-tree vege - tation (NDVI > 0.3)” initial object map. The

  1. A Hardware Abstraction Layer in Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Korsholm, Stephan; Kalibera, Tomas

    2011-01-01

    Embedded systems use specialized hardware devices to interact with their environment, and since they have to be dependable, it is attractive to use a modern, type-safe programming language like Java to develop programs for them. Standard Java, as a platform-independent language, delegates access...... to devices, direct memory access, and interrupt handling to some underlying operating system or kernel, but in the embedded systems domain resources are scarce and a Java Virtual Machine (JVM) without an underlying middleware is an attractive architecture. The contribution of this article is a proposal...... for Java packages with hardware objects and interrupt handlers that interface to such a JVM. We provide implementations of the proposal directly in hardware, as extensions of standard interpreters, and finally with an operating system middleware. The latter solution is mainly seen as a migration path...

  2. A Performance Evaluation of NACK-Oriented Protocols as the Foundation of Reliable Delay- Tolerant Networking Convergence Layers

    Science.gov (United States)

    Iannicca, Dennis; Hylton, Alan; Ishac, Joseph

    2012-01-01

    Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.

  3. On the Transformation Mechanism for Formulating a Multiproduct Two-Layer Supply Chain Network Design Problem as a Network Flow Model

    Directory of Open Access Journals (Sweden)

    Mi Gan

    2014-01-01

    Full Text Available The multiproduct two-layer supply chain is very common in various industries. In this paper, we introduce a possible modeling and algorithms to solve a multiproduct two-layer supply chain network design problem. The decisions involved are the DCs location and capacity design decision and the initial distribution planning decision. First we describe the problem and give a mixed integer programming (MIP model; such problem is NP-hard and it is not easy to reduce the complexity. Inspired by it, we develop a transformation mechanism of relaxing the fixed cost and adding some virtual nodes and arcs to the original network. Thus, a network flow problem (NFP corresponding to the original problem has been formulated. Given that we could solve the NFP as a minimal cost flow problem. The solution procedures and network simplex algorithm (INS are discussed. To verify the effectiveness and efficiency of the model and algorithms, the performance measure experimental has been conducted. The experiments and result showed that comparing with MIP model solved by genetic algorithm (GA and Benders, decomposition algorithm (BD the NFP model and INS are also effective and even more efficient for both small-scale and large-scale problems.

  4. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    Science.gov (United States)

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  5. Internal-state analysis in layered artificial neural network trained to categorize lung sounds

    NARCIS (Netherlands)

    Oud, M

    2002-01-01

    In regular use of artificial neural networks, only input and output states of the network are known to the user. Weight and bias values can be extracted but are difficult to interpret. We analyzed internal states of networks trained to map asthmatic lung sound spectra onto lung function parameters.

  6. Towards Composable Concurrency Abstractions

    Directory of Open Access Journals (Sweden)

    Janwillem Swalens

    2014-06-01

    Full Text Available In the past decades, many different programming models for managing concurrency in applications have been proposed, such as the actor model, Communicating Sequential Processes, and Software Transactional Memory. The ubiquity of multi-core processors has made harnessing concurrency even more important. We observe that modern languages, such as Scala, Clojure, or F#, provide not one, but multiple concurrency models that help developers manage concurrency. Large end-user applications are rarely built using just a single concurrency model. Programmers need to manage a responsive UI, deal with file or network I/O, asynchronous workflows, and shared resources. Different concurrency models facilitate different requirements. This raises the issue of how these concurrency models interact, and whether they are composable. After all, combining different concurrency models may lead to subtle bugs or inconsistencies. In this paper, we perform an in-depth study of the concurrency abstractions provided by the Clojure language. We study all pairwise combinations of the abstractions, noting which ones compose without issues, and which do not. We make an attempt to abstract from the specifics of Clojure, identifying the general properties of concurrency models that facilitate or hinder composition.

  7. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Energy Technology Data Exchange (ETDEWEB)

    Zacharias, Sven; Newe, Thomas, E-mail: Sven.Zacharias@ul.ie [University of Limerick (Ireland)

    2011-08-17

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  8. Bidirectional Long Short-Term Memory Network with a Conditional Random Field Layer for Uyghur Part-Of-Speech Tagging

    Directory of Open Access Journals (Sweden)

    Maihemuti Maimaiti

    2017-11-01

    Full Text Available Uyghur is an agglutinative and a morphologically rich language; natural language processing tasks in Uyghur can be a challenge. Word morphology is important in Uyghur part-of-speech (POS tagging. However, POS tagging performance suffers from error propagation of morphological analyzers. To address this problem, we propose a few models for POS tagging: conditional random fields (CRF, long short-term memory (LSTM, bidirectional LSTM networks (BI-LSTM, LSTM networks with a CRF layer, and BI-LSTM networks with a CRF layer. These models do not depend on stemming and word disambiguation for Uyghur and combine hand-crafted features with neural network models. State-of-the-art performance on Uyghur POS tagging is achieved on test data sets using the proposed approach: 98.41% accuracy on 15 labels and 95.74% accuracy on 64 labels, which are 2.71% and 4% improvements, respectively, over the CRF model results. Using engineered features, our model achieves further improvements of 0.2% (15 labels and 0.48% (64 labels. The results indicate that the proposed method could be an effective approach for POS tagging in other morphologically rich languages.

  9. Cross-layer fault tolerant data aggregation for improved network delay in healthcare management applications.

    Science.gov (United States)

    Yuan, Xiaojing; Liu, Haoying

    2009-01-01

    The escalation of American health care costs compels a new approach to manage chronic diseases. Wireless sensor networks (WSN) have been applied successfully in remote monitoring in military, aerospace, civil structure, and healthcare. However, existing wireless network framework cannot provide required quality of service (QoS) due to communication device failure, message loss caused by link error, collision, and hidden terminal for personalized disease management applications. In this paper, we present scalable network architecture and an operating mechanism that tolerates network structure changes caused by failure, with the application level data aggregation algorithm able to heal from the failure. We provide close form solutions that can achieve optimized network delay. Performance analysis was done to evaluate the significance of different nodes' failure in both homogeneous and heterogeneous sensor network and the effects of sensing and communication speed on failure impact in heterogeneous sensor networks.

  10. Design and Development of Basic Physical Layer WiMAX Network Simulation Models

    Science.gov (United States)

    2009-01-01

    et future quatrieme genenation (4G) de systemes de communications sans fil, Ie groupe Communications Mo- dernes Guerre Electronique (CMGE) de...management message. The MAC layer message also informs the PHY layer on how the DL subframe is to be structured . It specifies the start and end symbols and

  11. Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Lazos, Loukas; Poovendran, Radha

    2004-01-01

    .... They present an analytical formulation of the energy expenditure associated with the communication overhead of key management, and highlight its dependence on network topology and key distribution method...

  12. Prediction of gas hydrate saturation throughout the seismic section in Krishna Godavari basin using multivariate linear regression and multi-layer feed forward neural network approach

    Digital Repository Service at National Institute of Oceanography (India)

    Singh, Y.; Nair, R.R.; Singh, H.; Datta, P.; Jaiswal, P.; Dewangan, P.; Ramprasad, T.

    Stepwise linear regression, multi-layer feed forward neural (MLFN) network method was used to predict the 2D distribution of P-wave velocity, resistivity, porosity, and gas hydrate saturation throughout seismic section NGHP-01 in the Krishna...

  13. Enriching regulatory networks by bootstrap learning using optimised GO-based gene similarity and gene links mined from PubMed abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Ronald C.; Sanfilippo, Antonio P.; McDermott, Jason E.; Baddeley, Robert L.; Riensche, Roderick M.; Jensen, Russell S.; Verhagen, Marc; Pustejovsky, James

    2011-02-18

    Transcriptional regulatory networks are being determined using “reverse engineering” methods that infer connections based on correlations in gene state. Corroboration of such networks through independent means such as evidence from the biomedical literature is desirable. Here, we explore a novel approach, a bootstrapping version of our previous Cross-Ontological Analytic method (XOA) that can be used for semi-automated annotation and verification of inferred regulatory connections, as well as for discovery of additional functional relationships between the genes. First, we use our annotation and network expansion method on a biological network learned entirely from the literature. We show how new relevant links between genes can be iteratively derived using a gene similarity measure based on the Gene Ontology that is optimized on the input network at each iteration. Second, we apply our method to annotation, verification, and expansion of a set of regulatory connections found by the Context Likelihood of Relatedness algorithm.

  14. Comparison of different forms of the Multi-layer Feed-Forward Neural Network method used for river flow forecasting

    Directory of Open Access Journals (Sweden)

    A. Y. Shamseldin

    2002-01-01

    Full Text Available The Multi-Layer Feed-Forward Neural Network (MLFFNN is applied in the context of river flow forecast combination, where a number of rainfall-runoff models are used simultaneously to produce an overall combined river flow forecast. The operation of the MLFFNN depends not only on its neuron configuration but also on the choice of neuron transfer function adopted, which is non-linear for the hidden and output layers. These models, each having a different structure to simulate the perceived mechanisms of the runoff process, utilise the information carrying capacity of the model calibration data in different ways. Hence, in a discharge forecast combination procedure, the discharge forecasts of each model provide a source of information different from that of the other models used in the combination. In the present work, the significance of the choice of the transfer function type in the overall performance of the MLFFNN, when used in the river flow forecast combination context, is investigated critically. Five neuron transfer functions are used in this investigation, namely, the logistic function, the bipolar function, the hyperbolic tangent function, the arctan function and the scaled arctan function. The results indicate that the logistic function yields the best model forecast combination performance. Keywords: River flow forecast combination, multi-layer feed-forward neural network, neuron transfer functions, rainfall-runoff models

  15. Formation and Detection of Clay Network Structure in Poly(propylene) /Layered Silicate Nanocomposites

    NARCIS (Netherlands)

    Abranyi, Agnes; Szazdi, Laszlo; Pukanszky Jr., Bela; Vancso, Gyula J.; Pukanszky, B.; Pukanszky, Bela

    2006-01-01

    The study of the structure and the rheological properties of poly(propylene) (PP)/montmorillonite (MMT)/maleinated PP (MAPP) composites strongly suggests that a silicate network may form under certain conditions. Network formation could not be proven unambiguously with the usual techniques, i.e.,

  16. Unsupervised clustering with spiking neurons by sparse temporal coding and multi-layer RBF networks

    NARCIS (Netherlands)

    S.M. Bohte (Sander); J.A. La Poutré (Han); J.N. Kok (Joost)

    2000-01-01

    textabstractWe demonstrate that spiking neural networks encoding information in spike times are capable of computing and learning clusters from realistic data. We show how a spiking neural network based on spike-time coding and Hebbian learning can successfully perform unsupervised clustering on

  17. Selected Abstracts of the 2nd Congress of joint European Neonatal Societies (jENS 2017; Venice (Italy; October 31-November 4, 2017; Session "Epidemiology and Networks"

    Directory of Open Access Journals (Sweden)

    --- Various Authors

    2017-10-01

    Full Text Available Selected Abstracts of the 2nd Congress of joint European Neonatal Societies (jENS 2017; Venice (Italy; October 31-November 4, 201758th ESPR Annual Meeting, 7th International Congress of UENPS, 3rd International Congress of EFCNIORGANIZING INSTITUTIONSEuropean Society for Paediatric Research (ESPR, European Society for Neonatology (ESN, Union of European Neonatal & Perinatal Societies (UENPS, European Foundation for the Care of Newborn Infants (EFCNIORGANIZING COMMITTEELuc Zimmermann (President of ESPR, Morten Breindahl (President of ESN, Manuel Sánchez Luna (President of UENPS, Silke Mader (Chairwoman of the Executive Board and Co-Founder of EFCNISCIENTIFIC COMMITTEEVirgilio P. Carnielli (Congress President Chair, Pierre Gressens (Past Scientific President, Umberto Simeoni, Manon Benders, Neil Marlow, Ola D. Saugstad, Petra Hüppi, Agnes van den HoogenSession "Epidemiology and Networks"ABS 1. AN EVALUATION OF DOCTORS AND MEDICAL STUDENT’S KNOWLEDGE OF PAEDIATRIC VACCINATIONS IN PAKISTAN • N. NadeemABS 2. AN EVALUATION OF DOCTORS AND MEDICAL STUDENT’S ATTITUDES AND BELIEFS OF PAEDIATRIC VACCINATIONS IN PAKISTAN • N. NadeemABS 3. APPLYING DATA MINING TECHNIQUES TO PREDICT BRONCHOPULMONARY DYSPLASIA IN VERY-LOW-BIRTH-WEIGHT (VLBW INFANTS. A POPULATION-BASED STUDY • Y.J. Lin, C.H. Lin, Y.C. Lin, Y.S. Chang, C.C. Huang, K.I. TsouABS 4. IN UTERO EXPOSURE TO PERFLUOROALKYL AND POLYFLUOROALKYL SUBSTANCES AND ATTENTION AND EXECUTIVE FUNCTION IN THE OFFSPRING • C.C. Bach, Z. Liew, N.B. Matthiesen, T.B. Henriksen, B.H. Bech, E.A. Nohr, E.C. Bonefeld-Jørgensen, J. OlsenABS 5. MORTALITY, MORBIDITY AND SHORT-TERM RETINOPATHY OF PREMATURITY OUTCOMES IN EXTREME PRETERM NEONATES: A 5 YEAR STUDY • H. Jarvis, M. Sdobnikovs, J. William, F. Dean, P. SatodiaABS 6. ASSOCIATION BETWEEN MATERNAL BODY MASS INDEX IN EARLY PREGNANCY AND INCIDENCE OF CEREBRAL PALSY • S. Johansson, E. Villamor, K. Tedroff, M. Peterson, M. Neovius, G. Petersson, S

  18. Diagnosis of Malignancy in Thyroid Tumors by Multi-Layer Perceptron Neural Networks With Different Batch Learning Algorithms.

    Science.gov (United States)

    Pourahmad, Saeedeh; Azad, Mohsen; Paydar, Shahram

    2015-03-30

    To diagnose the malignancy in thyroid tumor, neural network approach is applied and the performances of thirteen batch learning algorithms are investigated on accuracy of the prediction. Therefore, a back propagation feed forward neural networks (BP FNNs) is designed and three different numbers of neuron in hidden layer are compared (5, 10 and 20 neurons). The pathology result after the surgery and clinical findings before surgery of the patients are used as the target outputs and the inputs, respectively. The best algorithm(s) is/are chosen based on mean or maximum accuracy values in the prediction and also area under Receiver Operating Characteristic Curve (ROC curve). The results show superiority of the network with 5 neurons in the hidden layer. In addition, the better performances are occurred for Polak-Ribiere conjugate gradient, BFGS quasi-newton and one step secant algorithms according to their accuracy percentage in prediction (83%) and for Scaled Conjugate Gradient and BFGS quasi-Newton based on their area under the ROC curve (0.905).

  19. Dynamic boundary layer based neural network quasi-sliding mode control for soft touching down on asteroid

    Science.gov (United States)

    Liu, Xiaosong; Shan, Zebiao; Li, Yuanchun

    2017-04-01

    Pinpoint landing is a critical step in some asteroid exploring missions. This paper is concerned with the descent trajectory control for soft touching down on a small irregularly-shaped asteroid. A dynamic boundary layer based neural network quasi-sliding mode control law is proposed to track a desired descending path. The asteroid's gravitational acceleration acting on the spacecraft is described by the polyhedron method. Considering the presence of input constraint and unmodeled acceleration, the dynamic equation of relative motion is presented first. The desired descending path is planned using cubic polynomial method, and a collision detection algorithm is designed. To perform trajectory tracking, a neural network sliding mode control law is given first, where the sliding mode control is used to ensure the convergence of system states. Two radial basis function neural networks (RBFNNs) are respectively used as an approximator for the unmodeled term and a compensator for the difference between the actual control input with magnitude constraint and nominal control. To improve the chattering induced by the traditional sliding mode control and guarantee the reachability of the system, a specific saturation function with dynamic boundary layer is proposed to replace the sign function in the preceding control law. Through the Lyapunov approach, the reachability condition of the control system is given. The improved control law can guarantee the system state move within a gradually shrinking quasi-sliding mode band. Numerical simulation results demonstrate the effectiveness of the proposed control strategy.

  20. Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Summerhill, Richard [Internet2, Washington, DC (United States); Lehman, Tom [Univ. of Southern California, Los Angeles, CA (United States). Information Sciences Inst. (ISI); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States). Dept. of Electrical & Computer Engineering; Boyd, Eric [Univ. Corporation for Advanced Internet Development (UCAID), Washington, DC (United States)

    2009-08-14

    There were four basic task areas identified for the Hybrid-MLN project. They are: Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation; Heterogeneous DataPlane Testing; Simulation; Project Publications, Reports, and Presentations.

  1. Poster abstract: A decentralized routing scheme based on a zero-sum game to optimize energy in solar powered sensor networks

    KAUST Repository

    Dehwah, Ahmad H.

    2014-04-01

    This poster is aimed at solving the problem of maximizing the energy margin of a solar-powered sensor network at a fixed time horizon, to maximize the network performance during an event to monitor. Using a game theoretic approach, the optimal routing maximizing the energy margin of the network at a given time under solar power forcing can be computed in a decentralized way and solved exactly through dynamic programming with a low overall complexity. We also show that this decentralized algorithm is simple enough to be implemented on practical sensor nodes. Such an algorithm would be very useful whenever the energy margin of a solar-powered sensor network has to be maximized at a specific time. © 2014 IEEE.

  2. From Abstract Art to Abstracted Artists

    Directory of Open Access Journals (Sweden)

    Romi Mikulinsky

    2016-11-01

    Full Text Available What lineage connects early abstract films and machine-generated YouTube videos? Hans Richter’s famous piece Rhythmus 21 is considered to be the first abstract film in the experimental tradition. The Webdriver Torso YouTube channel is composed of hundreds of thousands of machine-generated test patterns designed to check frequency signals on YouTube. This article discusses geometric abstraction vis-à-vis new vision, conceptual art and algorithmic art. It argues that the Webdriver Torso is an artistic marvel indicative of a form we call mathematical abstraction, which is art performed by computers and, quite possibly, for computers.

  3. Master stability functions reveal diffusion-driven instabilities in multi-layer networks

    CERN Document Server

    Brechtel, Andreas; Ritterskamp, Daniel; Drossel, Barbara; Gross, Thilo

    2016-01-01

    Many systems in science and technology can be described as multilayer networks, which are known to exhibit phenomena such as catastrophic failure cascades and pattern-forming instabilities. A particular class of multilayer networks describes systems where different interacting copies of a local network exist in different spatial locations, including for instance regulatory and metabolic networks of identical cells and interacting habitats of ecological populations. Here, we show that such systems can be analyzed by a master stability function (MSF) approach, which reveals conditions for diffusion-driven instabilities (DDIs). We demonstrate the methodology on the example of state-of-the-art meta-foodweb models, where it reveals diffusion-driven instabilities that lead to localized dynamics and spatial patterns. This type of approach can be applied to a variety of systems from nature, science and engineering to aid the understanding and design of complex self-organizing systems.

  4. Pengaruh Jumlah Hiden Layer terhadap Performa Neural Network Dengan Dalam Prediksi Website Phishing

    Directory of Open Access Journals (Sweden)

    Allan D Alexander

    2017-05-01

    Full Text Available Berdasarkan laporan dari ID-CERT jumlah insiden phishing dari tahun 2010 sampai dengan tahun 2016 cenderung meningkat, insiden yang tercatat pada tahun 2010 yaitu 1807 insiden dan 5607 pada tahun 2016. Banyak usaha yang dilakukan untuk memprediksi website phishing dengan menngunakan teknik data mining. Neural network sudah menunjukan performanya sebagai penaksir  yang sangat umum, optimasi jumlah neuron yang tersembunyi tanpa menentukan akurasi sebelumnya merupakan tantangan utama bagi penggunaan neural network

  5. Telemetry Standards, RCC Standard 106-17, Chapter 27, RF Network Access Layer

    Science.gov (United States)

    2017-07-01

    GIF RPC, PAP, SSL, SQL TCP, UDP, NETBEUI 3. Network 2. Data Link 1. Physical Structuring and managing a multi-node network, including addressing...h0000) for transmission; ignored on reception. 27.5.5 Frame Check Sequence Field A 32-bit FCS shall be computed over the entire MAC frame...rate, LDPC codeblock size, LDPC preamble, ASM sizes, and the goal rate for mission data from the program . The light-pink boxes represent calculated

  6. Predicting Subsurface Soil Layering and Landslide Risk with Artificial Neural Networks

    DEFF Research Database (Denmark)

    Farrokhzad, Farzad; Barari, Amin; Ibsen, Lars Bo

    2011-01-01

    the investigation of study area. The quality of the modeling is further improved by the application of some controlling techniques involved in ANN. Based on the obtained results and considering that the test data were not presented to the network in the training process, it can be stated that the trained neural...... networks are capable of predicting variations in the soil profile and assessing the landslide hazard with an acceptable level of confidence....

  7. Cross layer optimization for cloud-based radio over optical fiber networks

    Science.gov (United States)

    Shao, Sujie; Guo, Shaoyong; Qiu, Xuesong; Yang, Hui; Meng, Luoming

    2016-07-01

    To adapt the 5G communication, the cloud radio access network is a paradigm introduced by operators which aggregates all base stations computational resources into a cloud BBU pool. The interaction between RRH and BBU or resource schedule among BBUs in cloud have become more frequent and complex with the development of system scale and user requirement. It can promote the networking demand among RRHs and BBUs, and force to form elastic optical fiber switching and networking. In such network, multiple stratum resources of radio, optical and BBU processing unit have interweaved with each other. In this paper, we propose a novel multiple stratum optimization (MSO) architecture for cloud-based radio over optical fiber networks (C-RoFN) with software defined networking. Additionally, a global evaluation strategy (GES) is introduced in the proposed architecture. MSO can enhance the responsiveness to end-to-end user demands and globally optimize radio frequency, optical spectrum and BBU processing resources effectively to maximize radio coverage. The feasibility and efficiency of the proposed architecture with GES strategy are experimentally verified on OpenFlow-enabled testbed in terms of resource occupation and path provisioning latency.

  8. Cross Layer Analysis of P2MP Hybrid FSO/RF Network

    KAUST Repository

    Rakia, Tamer

    2017-02-22

    This paper presents and analyzes a point-tomultipoint (P2MP) network that uses a number of freespace optical (FSO) links for data transmission from the central node to the different remote nodes of the network. A common backup radio frequency (RF) link can be used by the central node for data transmission to any remote node in case any one of the FSO links fails. Each remote node is assigned a transmit buffer at the central node. Considering the transmission link from the central node to a tagged remote node, we study various performance metrics. Specifically,we study the throughput from the central node to the tagged node, the average transmit buffer size, the symbol queuing delay in the transmit buffer, the efficiency of the queuing system, the symbol loss probability, and the RF link utilization. Numerical examples are presented to compare the performance of the proposed P2MP hybrid FSO/RF network with that of a P2MP FSO-only network and show that the P2MP hybrid FSO/RF network achieves considerable performance improvement over the P2MP FSO-only network.

  9. Meta-food-chains as a many-layer epidemic process on networks

    Science.gov (United States)

    Barter, Edmund; Gross, Thilo

    2016-02-01

    Notable recent works have focused on the multilayer properties of coevolving diseases. We point out that very similar systems play an important role in population ecology. Specifically we study a meta-food-web model that was recently proposed by Pillai et al. [Theor. Ecol. 3, 223 (2009), 10.1007/s12080-009-0065-1]. This model describes a network of species connected by feeding interactions, which spread over a network of spatial patches. Focusing on the essential case, where the network of feeding interactions is a chain, we develop an analytical approach for the computation of the degree distributions of colonized spatial patches for the different species in the chain. This framework allows us to address ecologically relevant questions. Considering configuration model ensembles of spatial networks, we find that there is an upper bound for the fraction of patches that a given species can occupy, which depends only on the networks mean degree. For a given mean degree there is then an optimal degree distribution that comes closest to the upper bound. Notably scale-free degree distributions perform worse than more homogeneous degree distributions if the mean degree is sufficiently high. Because species experience the underlying network differently the optimal degree distribution for one particular species is generally not the optimal distribution for the other species in the same food web. These results are of interest for conservation ecology, where, for instance, the task of selecting areas of old-growth forest to preserve in an agricultural landscape, amounts to the design of a patch network.

  10. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  11. Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Law, Y.W.; van Hoesel, L.F.W.; Doumen, J.M.; Hartel, Pieter H.; Havinga, Paul J.M.; Atluri, V.; Samarati, P.; Ning, P.; Du, W.

    2005-01-01

    A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from taking actions based on the content of the

  12. The layered sensing operations center: a modeling and simulation approach to developing complex ISR networks

    Science.gov (United States)

    Curtis, Christopher; Lenzo, Matthew; McClure, Matthew; Preiss, Bruce

    2010-04-01

    In order to anticipate the constantly changing landscape of global warfare, the United States Air Force must acquire new capabilities in the field of Intelligence, Surveillance, and Reconnaissance (ISR). To meet this challenge, the Air Force Research Laboratory (AFRL) is developing a unifying construct of "Layered Sensing" which will provide military decision-makers at all levels with the timely, actionable, and trusted information necessary for complete battlespace awareness. Layered Sensing is characterized by the appropriate combination of sensors and platforms (including those for persistent sensing), infrastructure, and exploitation capabilities to enable this synergistic awareness. To achieve the Layered Sensing vision, AFRL is pursuing a Modeling & Simulation (M&S) strategy through the Layered Sensing Operations Center (LSOC). An experimental ISR system-of-systems test-bed, the LSOC integrates DoD standard simulation tools with commercial, off-the-shelf video game technology for rapid scenario development and visualization. These tools will help facilitate sensor management performance characterization, system development, and operator behavioral analysis. Flexible and cost-effective, the LSOC will implement a non-proprietary, open-architecture framework with well-defined interfaces. This framework will incentivize the transition of current ISR performance models to service-oriented software design for maximum re-use and consistency. This paper will present the LSOC's development and implementation thus far as well as a summary of lessons learned and future plans for the LSOC.

  13. Three-dimensional Organization of Layered Apical Cytoskeletal Networks Associated with Mouse Airway Tissue Development

    Science.gov (United States)

    Tateishi, Kazuhiro; Nishida, Tomoki; Inoue, Kanako; Tsukita, Sachiko

    2017-03-01

    The cytoskeleton is an essential cellular component that enables various sophisticated functions of epithelial cells by forming specialized subcellular compartments. However, the functional and structural roles of cytoskeletons in subcellular compartmentalization are still not fully understood. Here we identified a novel network structure consisting of actin filaments, intermediate filaments, and microtubules directly beneath the apical membrane in mouse airway multiciliated cells and in cultured epithelial cells. Three-dimensional imaging by ultra-high voltage electron microscopy and immunofluorescence revealed that the morphological features of each network depended on the cell type and were spatiotemporally integrated in association with tissue development. Detailed analyses using Odf2 mutant mice, which lack ciliary basal feet and apical microtubules, suggested a novel contribution of the intermediate filaments to coordinated ciliary beating. These findings provide a new perspective for viewing epithelial cell differentiation and tissue morphogenesis through the structure and function of apical cytoskeletal networks.

  14. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  15. Observations of Mixing Layer Heights from the Micropulse Lidar Network and Potential Implications for Regional and Global Models

    Science.gov (United States)

    Lewis, J. R.; Welton, E. J.; Hegarty, J. D.; Henderson, J.; McGrath-Spangler, E. L.; Scarino, A. J.; Berkoff, T.; Ferrare, R. A.; Stewart, S. A.; DeCola, P.

    2016-12-01

    Long-term, continuous measurements of the planetary boundary layer (PBL) height are rare, but necessary to ascertain its seasonal and diurnal changes. Autonomous ground-based lidar measurements from the NASA Micropulse Lidar Network (MPLNET) have the potential to contribute to our current knowledge of the PBL. MPLNET is a global network of micropulse lidars which has operated for over 16 years using a standard instrument and suite of processing algorithms. In this work, we investigate the daytime mixing layer height (MLH) determined from aerosol backscatter profiles using the wavelet covariance transform and a fuzzy-logic scheme. First, we evaluate simulations from the Weather Research and Forecasting (WRF) Model in the Washington D.C. - Baltimore, MD urban corridor during the July 2011 DISCOVER-AQ field campaign. In addition to MPLNET data, this field campaign utilizes data from field-deployed mini-Micropulse lidars, the CALIPSO satellite, and the NASA Langley Airborne High-Spectral Resolution Lidar. Next, we show a multi-year, multi-site comparison of MPLNET retrievals to PBL heights retrieved from the Modern-Era Retrospective analysis for Research and Applications, Version 2 (MERRA-2). We discuss differences between the modeled and observed quantities and the potential for future research.

  16. A review of protocol implementations and energy efficient cross-layer design for wireless body area networks.

    Science.gov (United States)

    Hughes, Laurie; Wang, Xinheng; Chen, Tao

    2012-11-02

    The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN) integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  17. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  18. Cross Layer Adaptation of Check Intervals in Low Power Listening MAC Protocols for Lifetime Improvement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Maria-Cristina Marinescu

    2012-08-01

    Full Text Available Preamble sampling-based MAC protocols designed forWireless Sensor Networks (WSN are aimed at prolonging the lifetime of the nodes by scheduling their times of activity. This scheduling exploits node synchronization to find the right trade-off between energy consumption and delay. In this paper we consider the problem of node synchronization in preamble sampling protocols. We propose Cross Layer Adaptation of Check intervals (CLAC, a novel protocol intended to reduce the energy consumption of the nodes without significantly increasing the delay. Our protocol modifies the scheduling of the nodes based on estimating the delay experienced by a packet that travels along a multi-hop path. CLAC uses routing and MAC layer information to compute a delay that matches the packet arrival time. We have implemented CLAC on top of well-known routing and MAC protocols for WSN, and we have evaluated our implementation using the Avrora simulator. The simulation results confirm that CLAC improves the network lifetime at no additional packet loss and without affecting the end-to-end delay.

  19. Power-Aware Multi-Layer Translucent Network Design: an Integrated OPEX/CAPEX Analysis

    DEFF Research Database (Denmark)

    Saldaña Cercos, Silvia; Resendo, Leandro C.; Ribeiro, Moisés R. N.

    2014-01-01

    We propose a three-phase network design model minimizing CAPEX and OPEX in IP-over-WDM architectures. By forbidding reconfiguration (accounting for 58\\% of the OPEX) we achieve only 4.2\\% increase in power consumption at no CAPEX expenses.......We propose a three-phase network design model minimizing CAPEX and OPEX in IP-over-WDM architectures. By forbidding reconfiguration (accounting for 58\\% of the OPEX) we achieve only 4.2\\% increase in power consumption at no CAPEX expenses....

  20. Appropriateness of Dropout Layers and Allocation of Their 0.5 Rates across Convolutional Neural Networks for CIFAR-10, EEACL26, and NORB Datasets

    Directory of Open Access Journals (Sweden)

    Romanuke Vadim V.

    2017-12-01

    Full Text Available A technique of DropOut for preventing overfitting of convolutional neural networks for image classification is considered in the paper. The goal is to find a rule of rationally allocating DropOut layers of 0.5 rate to maximise performance. To achieve the goal, two common network architectures are used having either 4 or 5 convolutional layers. Benchmarking is fulfilled with CIFAR-10, EEACL26, and NORB datasets. Initially, series of all admissible versions for allocation of DropOut layers are generated. After the performance against the series is evaluated, normalized and averaged, the compromising rule is found. It consists in non-compactly inserting a few DropOut layers before the last convolutional layer. It is likely that the scheme with two or more DropOut layers fits networks of many convolutional layers for image classification problems with a plenty of features. Such a scheme shall also fit simple datasets prone to overfitting. In fact, the rule “prefers” a fewer number of DropOut layers. The exemplary gain of the rule application is roughly between 10 % and 50 %.

  1. PRISMA for Abstracts

    DEFF Research Database (Denmark)

    Beller, Elaine M; Glasziou, Paul P; Altman, Douglas G

    2013-01-01

    Elaine Beller and colleagues from the PRISMA for Abstracts group provide a reporting guidelines for reporting abstracts of systematic reviews in journals and at conferences.......Elaine Beller and colleagues from the PRISMA for Abstracts group provide a reporting guidelines for reporting abstracts of systematic reviews in journals and at conferences....

  2. Secondary link adaptation in cognitive radio networks: End-to-end performance with cross-layer design

    KAUST Repository

    Ma, Hao

    2012-04-01

    Under spectrum-sharing constraints, we consider the secondary link exploiting cross-layer combining of adaptive modulation and coding (AMC) at the physical layer with truncated automatic repeat request (T-ARQ) at the data link layer in cognitive radio networks. Both, basic AMC and aggressive AMC, are adopted to optimize the overall average spectral efficiency, subject to the interference constraints imposed by the primary user of the shared spectrum band and a target packet loss rate. We achieve the optimal boundary points in closed form to choose the AMC transmission modes by taking into account the channel state information from the secondary transmitter to both the primary receiver and the secondary receiver. Moreover, numerical results substantiate that, without any cost in the transmitter/receiver design nor the end-to-end delay, the scheme with aggressive AMC outperforms that with conventional AMC. The main reason is that, with aggressive AMC, different transmission modes utilized in the initial packet transmission and the following retransmissions match the time-varying channel conditions better than the basic pattern. © 2012 IEEE.

  3. Real-Time Transportation Mode Identification Using Artificial Neural Networks Enhanced with Mode Availability Layers: A Case Study in Dubai

    Directory of Open Access Journals (Sweden)

    Young-Ji Byon

    2017-09-01

    Full Text Available Traditionally, departments of transportation (DOTs have dispatched probe vehicles with dedicated vehicles and drivers for monitoring traffic conditions. Emerging assisted GPS (AGPS and accelerometer-equipped smartphones offer new sources of raw data that arise from voluntarily-traveling smartphone users provided that their modes of transportation can correctly be identified. By introducing additional raster map layers that indicate the availability of each mode, it is possible to enhance the accuracy of mode detection results. Even in its simplest form, an artificial neural network (ANN excels at pattern recognition with a relatively short processing timeframe once it is properly trained, which is suitable for real-time mode identification purposes. Dubai is one of the major cities in the Middle East and offers unique environments, such as a high density of extremely high-rise buildings that may introduce multi-path errors with GPS signals. This paper develops real-time mode identification ANNs enhanced with proposed mode availability geographic information system (GIS layers, firstly for a universal mode detection and, secondly for an auto mode detection for the particular intelligent transportation system (ITS application of traffic monitoring, and compares the results with existing approaches. It is found that ANN-based real-time mode identification, enhanced by mode availability GIS layers, significantly outperforms the existing methods.

  4. Cross-Layer Resource Scheduling for Video Traffic in the Downlink of OFDMA-Based Wireless 4G Networks

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available Designing scheduling algorithms at the medium access control (MAC layer relies on a variety of parameters including quality of service (QoS requirements, resource allocation mechanisms, and link qualities from the corresponding layers. In this paper, we present an efficient cross-layer scheduling scheme, namely, Adaptive Token Bank Fair Queuing (ATBFQ algorithm, which is designed for packet scheduling and resource allocation in the downlink of OFDMA-based wireless 4G networks. This algorithm focuses on the mechanisms of efficiency and fairness in multiuser frequency-selective fading environments. We propose an adaptive method for ATBFQ parameter selection which integrates packet scheduling with resource mapping. The performance of the proposed scheme is compared to that of the round-robin (RR and the score-based (SB schedulers. It is observed from simulation results that the proposed scheme with adaptive parameter selection provides enhanced performance in terms of queuing delay, packet dropping rate, and cell-edge user performance, while the total sector throughput remains comparable. We further analyze and compare achieved fairness of the schemes in terms of different fairness indices available in literature.

  5. Cross-layer analyses of QoS parameters in wireless sensor networks

    NARCIS (Netherlands)

    Masoum, Alireza; Meratnia, Nirvana; Dilo, Arta; Taghikhaki, Zahra; Havinga, Paul J.M.

    Providing reliable and timely information is one of the important tasks of wireless sensor networks. To this end, recently quality of service (QoS) satisfying end users and matching WSN constrains, has become an important research topic. However, majority of research in this area has overlooked the

  6. Object recognition using deep convolutional neural networks with complete transfer and partial frozen layers

    NARCIS (Netherlands)

    Kruithof, M.C.; Bouma, H.; Fischer, N.M.; Schutte, K.

    2016-01-01

    Object recognition is important to understand the content of video and allow flexible querying in a large number of cameras, especially for security applications. Recent benchmarks show that deep convolutional neural networks are excellent approaches for object recognition. This paper describes an

  7. Precision requirements for single-layer feed-forward neural networks

    NARCIS (Netherlands)

    Annema, Anne J.; Hoen, K.; Hoen, Klaas; Wallinga, Hans

    1994-01-01

    This paper presents a mathematical analysis of the effect of limited precision analog hardware for weight adaptation to be used in on-chip learning feedforward neural networks. Easy-to-read equations and simple worst-case estimations for the maximum tolerable imprecision are presented. As an

  8. Towards multi-layered intrusion detection in high-speed networks

    NARCIS (Netherlands)

    Golling, Mario; Hofstede, R.J.; Koch, Robert

    Traditional Intrusion Detection approaches rely on the inspection of individual packets, often referred to as Deep Packet Inspection (DPI), where individual packets are scanned for suspicious patterns. However, the rapid increase of link speeds and throughputs - especially in larger networks such as

  9. Beamforming-Based Physical Layer Network Coding for Non-Regenerative Multi-Way Relaying

    Directory of Open Access Journals (Sweden)

    Klein Anja

    2010-01-01

    Full Text Available We propose non-regenerative multi-way relaying where a half-duplex multi-antenna relay station (RS assists multiple single-antenna nodes to communicate with each other. The required number of communication phases is equal to the number of the nodes, N. There are only one multiple-access phase, where the nodes transmit simultaneously to the RS, and broadcast (BC phases. Two transmission methods for the BC phases are proposed, namely, multiplexing transmission and analog network coded transmission. The latter is a cooperation method between the RS and the nodes to manage the interference in the network. Assuming that perfect channel state information is available, the RS performs transceive beamforming to the received signals and transmits simultaneously to all nodes in each BC phase. We address the optimum transceive beamforming maximising the sum rate of non-regenerative multi-way relaying. Due to the nonconvexity of the optimization problem, we propose suboptimum but practical signal processing schemes. For multiplexing transmission, we propose suboptimum schemes based on zero forcing, minimising the mean square error, and maximising the signal to noise ratio. For analog network coded transmission, we propose suboptimum schemes based on matched filtering and semidefinite relaxation of maximising the minimum signal to noise ratio. It is shown that analog network coded transmission outperforms multiplexing transmission.

  10. Signalling and detection of parallel triple layer wireless sensor networks with M-ary orthogonal modulation

    NARCIS (Netherlands)

    Mahboob, M.

    2012-01-01

    Recent advances in the underlying technologies of WSNs (Wireless Sensor Networks) have led to its use in different applications, in fields as diverse as battlefield applications, temperature control and healthcare. Research in the different aspects of WSNs is therefore in full swing, in both

  11. Bottom-up GGM algorithm for constructing multiple layered hierarchical gene regulatory networks

    Science.gov (United States)

    Multilayered hierarchical gene regulatory networks (ML-hGRNs) are very important for understanding genetics regulation of biological pathways. However, there are currently no computational algorithms available for directly building ML-hGRNs that regulate biological pathways. A bottom-up graphic Gaus...

  12. Multi-layer holographic bifurcative neural network system for real-time adaptive EOS data analysis

    Science.gov (United States)

    Liu, Hua-Kuang; Huang, K. S.; Diep, J.

    1993-01-01

    Optical data processing techniques have the inherent advantage of high data throughout, low weight and low power requirements. These features are particularly desirable for onboard spacecraft in-situ real-time data analysis and data compression applications. the proposed multi-layer optical holographic neural net pattern recognition technique will utilize the nonlinear photorefractive devices for real-time adaptive learning to classify input data content and recognize unexpected features. Information can be stored either in analog or digital form in a nonlinear photofractive device. The recording can be accomplished in time scales ranging from milliseconds to microseconds. When a system consisting of these devices is organized in a multi-layer structure, a feedforward neural net with bifurcating data classification capability is formed. The interdisciplinary research will involve the collaboration with top digital computer architecture experts at the University of Southern California.

  13. Physical layer one-time-pad data encryption through synchronized semiconductor laser networks

    Science.gov (United States)

    Argyris, Apostolos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-02-01

    Semiconductor lasers (SL) have been proven to be a key device in the generation of ultrafast true random bit streams. Their potential to emit chaotic signals under conditions with desirable statistics, establish them as a low cost solution to cover various needs, from large volume key generation to real-time encrypted communications. Usually, only undemanding post-processing is needed to convert the acquired analog timeseries to digital sequences that pass all established tests of randomness. A novel architecture that can generate and exploit these true random sequences is through a fiber network in which the nodes are semiconductor lasers that are coupled and synchronized to central hub laser. In this work we show experimentally that laser nodes in such a star network topology can synchronize with each other through complex broadband signals that are the seed to true random bit sequences (TRBS) generated at several Gb/s. The potential for each node to access real-time generated and synchronized with the rest of the nodes random bit streams, through the fiber optic network, allows to implement an one-time-pad encryption protocol that mixes the synchronized true random bit sequence with real data at Gb/s rates. Forward-error correction methods are used to reduce the errors in the TRBS and the final error rate at the data decoding level. An appropriate selection in the sampling methodology and properties, as well as in the physical properties of the chaotic seed signal through which network locks in synchronization, allows an error free performance.

  14. Multi-layered Security Approaches for a Modular Open Network Architecture-based Satellite

    OpenAIRE

    Shirley, Brandon; Young, Quinn; Wegner, Peter; Christensen, Jacob; Janicik, Jeffrey

    2014-01-01

    A growing trend in satellite development includes shortening the development lifecycle for hardware and software, cost reduction, and promoting reuse for future missions. Department of Defense (DoD) acquisition policies mandate system providers use Open Systems Architecture (OSA) where feasible. Modular Open Network Architecture (MONA) is a subset of OSA and paves the way to achieve cost reduction and reuse during a reduced development lifecycle. MONA approaches provide opportunities to enhan...

  15. Advent of PHY and MAC Layer Operations in Wireless and Local Personal Area Network

    Directory of Open Access Journals (Sweden)

    Shama B N

    2013-12-01

    Full Text Available Carrier sense multiple access with collision avoidance (CSMA-CA algorithm is implemented on AT86RF230 Trans-receiver, which is done in Physical layer. As the number of nodes is increased, power efficiency of CSMA-CA algorithm is decreased. Power efficiency is improved in terms of Throughput and Block acknowledgement. Fragmentation increases the reliability of correct transmission. Both high and low data rate can be supported through multirate design. Data Scrambler and Data Whitener is implemented. Finally the transmitted and received information is analyzed using Analyzer.

  16. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  17. Achievable Rates of Cognitive Radio Networks Using Multi-Layer Coding with Limited CSI

    KAUST Repository

    Sboui, Lokman

    2016-03-01

    In a Cognitive Radio (CR) framework, the channel state information (CSI) feedback to the secondary transmitter (SU Tx) can be limited or unavailable. Thus, the statistical model is adopted in order to determine the system performance using the outage concept. In this paper, we adopt a new approach using multi-layer-coding (MLC) strategy, i.e., broadcast approach, to enhance spectrum sharing over fading channels. First, we consider a scenario where the secondary transmitter has no CSI of both the link between SU Tx and the primary receiver (cross-link) and its own link. We show that using MLC improves the cognitive rate compared to the rate provided by a singlelayer- coding (SLC). In addition, we observe numerically that 2-Layer coding achieves most of the gain for Rayleigh fading. Second, we analyze a scenario where SU Tx is provided by partial CSI about its link through quantized CSI. We compute its achievable rate adopting the MLC and highlight the improvement over SLC. Finally, we study the case in which the cross-link is perfect, i.e., a cooperative primary user setting, and compare the performance with the previous cases. We present asymptotic analysis at high power regime and show that the cooperation enhances considerably the cognitive rate at high values of the secondary power budget.

  18. Body area networks using IEEE 802156 implementing the ultra wide band physical layer

    CERN Document Server

    Hernandez, Marco; Mucchi, Lorenzo

    2014-01-01

    The market of wearable wireless medical sensors is experiencing a rapid growth and the associated telecommunications services for the healthcare sector are forecast to further increase in the next years. Medical body area networks (MBANs) allow the mobility of patients and medical personnel by facilitating the remote monitoring of patients suffering from chronic or risky diseases. Currently, MBANs are being introduced in unlicensed frequency bands, where the risk of mutual interference with other electronic devices radiating in the same band can be high. Thus, coexistence is an issue on which

  19. Introduction to abstract algebra

    CERN Document Server

    Nicholson, W Keith

    2012-01-01

    Praise for the Third Edition ". . . an expository masterpiece of the highest didactic value that has gained additional attractivity through the various improvements . . ."-Zentralblatt MATH The Fourth Edition of Introduction to Abstract Algebra continues to provide an accessible approach to the basic structures of abstract algebra: groups, rings, and fields. The book's unique presentation helps readers advance to abstract theory by presenting concrete examples of induction, number theory, integers modulo n, and permutations before the abstract structures are defined. Readers can immediately be

  20. Prediction Model for Object Oriented Software Development Effort Estimation Using One Hidden Layer Feed Forward Neural Network with Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Chandra Shekhar Yadav

    2014-01-01

    Full Text Available The budget computation for software development is affected by the prediction of software development effort and schedule. Software development effort and schedule can be predicted precisely on the basis of past software project data sets. In this paper, a model for object-oriented software development effort estimation using one hidden layer feed forward neural network (OHFNN has been developed. The model has been further optimized with the help of genetic algorithm by taking weight vector obtained from OHFNN as initial population for the genetic algorithm. Convergence has been obtained by minimizing the sum of squared errors of each input vector and optimal weight vector has been determined to predict the software development effort. The model has been empirically validated on the PROMISE software engineering repository dataset. Performance of the model is more accurate than the well-established constructive cost model (COCOMO.

  1. Brain tumor detection using scalp eeg with modified Wavelet-ICA and multi layer feed forward neural network.

    Science.gov (United States)

    Selvam, V Salai; Shenbagadevi, S

    2011-01-01

    Use of scalp EEG for the diagnosis of various cerebral disorders is progressively increasing. Though the advanced neuroimaging techniques such as MRI and CT-SCAN still stay as principal confirmative methods for detecting and localizing brain tumors, the development of automated systems for the detection of brain tumors using the scalp EEG has started attracting the researchers all over the world notably since 2000. This is because of two important facts: (i) cheapness and easiness of methods of recording and analyzing the scalp EEG and (ii) lower risk and possible early detection. This paper presents a method of detecting the brain tumor using the first, second and third order statistics of the scalp EEG with a Modified Wavelet-Independent Component Analysis (MwICA) technique and a multi-layer feed-forward neural network.

  2. Abstraction of Drift Seepage

    Energy Technology Data Exchange (ETDEWEB)

    J.T. Birkholzer

    2004-11-01

    This model report documents the abstraction of drift seepage, conducted to provide seepage-relevant parameters and their probability distributions for use in Total System Performance Assessment for License Application (TSPA-LA). Drift seepage refers to the flow of liquid water into waste emplacement drifts. Water that seeps into drifts may contact waste packages and potentially mobilize radionuclides, and may result in advective transport of radionuclides through breached waste packages [''Risk Information to Support Prioritization of Performance Assessment Models'' (BSC 2003 [DIRS 168796], Section 3.3.2)]. The unsaturated rock layers overlying and hosting the repository form a natural barrier that reduces the amount of water entering emplacement drifts by natural subsurface processes. For example, drift seepage is limited by the capillary barrier forming at the drift crown, which decreases or even eliminates water flow from the unsaturated fractured rock into the drift. During the first few hundred years after waste emplacement, when above-boiling rock temperatures will develop as a result of heat generated by the decay of the radioactive waste, vaporization of percolation water is an additional factor limiting seepage. Estimating the effectiveness of these natural barrier capabilities and predicting the amount of seepage into drifts is an important aspect of assessing the performance of the repository. The TSPA-LA therefore includes a seepage component that calculates the amount of seepage into drifts [''Total System Performance Assessment (TSPA) Model/Analysis for the License Application'' (BSC 2004 [DIRS 168504], Section 6.3.3.1)]. The TSPA-LA calculation is performed with a probabilistic approach that accounts for the spatial and temporal variability and inherent uncertainty of seepage-relevant properties and processes. Results are used for subsequent TSPA-LA components that may handle, for example, waste package

  3. Traffic Offloading in Unlicensed Spectrum for 5G Cellular Network: A Two-Layer Game Approach

    Directory of Open Access Journals (Sweden)

    Yan Li

    2018-01-01

    Full Text Available Licensed Assisted Access (LAA is considered one of the latest groundbreaking innovations to provide high performance in future 5G. Coexistence schemes such as Listen Before Talk (LBT and Carrier Sensing and Adaptive Transmission (CSAT have been proven to be good methods to share spectrums, and they are WiFi friendly. In this paper, a modified LBT-based CSAT scheme is proposed which can effectively reduce the collision at the moment when Long Term Evolution (LTE starts to transmit data in CSAT mode. To make full use of the valuable spectrum resources, the throughput of both LAA and WiFi systems should be improved. Thus, a two-layer Coalition-Auction Game-based Transaction (CAGT mechanism is proposed in this paper to optimize the performance of the two systems. In the first layer, a coalition among Access Points (APs is built to balance the WiFi stations and maximize the WiFi throughput. The main idea of the devised coalition forming is to merge the light-loaded APs with heavy-loaded APs into a coalition; consequently, the data of the overloaded APs can be offloaded to the light-loaded APs. Next, an auction game between the LAA and WiFi systems is used to gain a win–win strategy, in which, LAA Base Station (BS is the auctioneer and AP coalitions are bidders. Thus, the throughput of both systems are improved. Simulation results demonstrate that the proposed scheme in this paper can improve the performance of both two systems effectively.

  4. Comparison of different forms of the Multi-layer Feed-Forward Neural Network method used for river flow forecasting

    Science.gov (United States)

    Shamseldin, A. Y.; Nasr, A. E.; O'Connor, K. M.

    The Multi-Layer Feed-Forward Neural Network (MLFFNN) is applied in the context of river flow forecast combination, where a number of rainfall-runoff models are used simultaneously to produce an overall combined river flow forecast. The operation of the MLFFNN depends not only on its neuron configuration but also on the choice of neuron transfer function adopted, which is non-linear for the hidden and output layers. These models, each having a different structure to simulate the perceived mechanisms of the runoff process, utilise the information carrying capacity of the model calibration data in different ways. Hence, in a discharge forecast combination procedure, the discharge forecasts of each model provide a source of information different from that of the other models used in the combination. In the present work, the significance of the choice of the transfer function type in the overall performance of the MLFFNN, when used in the river flow forecast combination context, is investigated critically. Five neuron transfer functions are used in this investigation, namely, the logistic function, the bipolar function, the hyperbolic tangent function, the arctan function and the scaled arctan function. The results indicate that the logistic function yields the best model forecast combination performance.

  5. Innovative energy resourceful merged layer technique (MLT of node deployment to enhance the lifetime of wireless sensor networks

    Directory of Open Access Journals (Sweden)

    S.G. Susila

    2015-03-01

    Full Text Available A wireless sensor network (WSN is consisting of anthology of large number of small sensor nodes which are deployed in a defined area to observe the surroundings parameters. Since, energy consumption is significant challenge in WSN. As sensor nodes are equipped with battery which has limited energy. Energy efficient information processing is most importance for many routing protocols were proposed to increase the lifetime of WSN. In order to improve the lifetime of WSN, the proposed MLT routing protocol has implemented where the sensor nodes are randomly deployed in the field. The merged layer node deployment pattern of the sensor nodes system operation maximizes the working time of full coverage in a given WSN. MLT provides energy-balancing while selecting cluster head (CH for each round. The cluster head selection mechanism is essential and has same procedure like Low Energy Adaptive Clustering Hierarchy (LEACH in MLT protocol. The main idea of this paper is combine two layers of sensor nodes which are belonging to the same set but in different group to improve the lifetime of WSN. MATLAB simulations are performed to analyze and compare the performance of MLT with LEACH protocol. The obtained simulation output has enhanced results and superfluous lifetime compared to other protocols.

  6. Performance Analysis of Secondary Link with Cross-Layer Design and Cooperative Relay in Cognitive Radio Networks

    KAUST Repository

    Ma, Hao

    2012-06-01

    In this thesis, we investigate two different system infrastructures in underlay cognitive radio network, in which two popular techniques, cross-layer design and cooperative communication, are considered, respectively. In particular, we introduce the Aggressive Adaptive Modulation and Coding (A-AMC) into the cross-layer design and achieve the optimal boundary points in closed form to choose the AMC and A-AMC transmission modes by taking into account the Channel State Information (CSI) from the secondary transmitter to both the primary receiver and the secondary receiver. What’s more, for the cooperative communication design, we consider three different relay selection schemes: Partial Relay Selection, Opportunistic Relay Selection and Threshold Relay Selection. The Probability Density Functions (PDFs) of the Signal-to- Noise Ratio (SNR) in each hop for different selection schemes are provided, and then the exact closed-form expressions for the end-to-end packet loss rate in the secondary link considering the cooperation of the Decode-and-Forward (DF) relay for different relay selection schemes are derived.

  7. Cross-Layer Design of an Energy-Efficient Cluster Formation Algorithm with Carrier-Sensing Multiple Access for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Buratti Chiara

    2005-01-01

    Full Text Available A new energy-efficient scheme for data transmission in a wireless sensor network (WSN is proposed, having in mind a typical application including a sink, which periodically triggers the WSN, and nodes uniformly distributed over a specified area. Routing, multiple access control (MAC, physical, energy, and propagation aspects are jointly taken into account through simulation; however, the protocol design is based on some analytical considerations reported in the appendix. Information routing is based on a clustered self-organized structure; a carrier-sensing multiple access (CSMA protocol is chosen at MAC layer. Two different scenarios are examined, characterized by different channel fading rates. Four versions of our protocol are presented, suitably oriented to the two different scenarios; two of them implement a cross-layer (CL approach, where MAC parameters influence both the network and physical layers. Performance is measured in terms of network lifetime (related to energy efficiency and packet loss rate (related to network availability. The paper discusses the rationale behind the selection of MAC protocols for WSNs and provides a complete model characterization spanning from the network layer to the propagation channel. The advantages of the CL approach, with respect to an algorithm which belongs to the well-known class of low-energy adaptive clustering hierarchy (LEACH protocols, are shown.

  8. A Heuristic Diagnostic Method for a PV System: Triple-Layered Particle Swarm Optimization–Back-Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Zhenghai Liao

    2017-02-01

    Full Text Available This paper proposes a heuristic triple layered particle swarm optimization–back-propagation (PSO-BP neural network method for improving the convergence and prediction accuracy of the fault diagnosis system of the photovoltaic (PV array. The parameters, open-circuit voltage (Voc, short-circuit current (Isc, maximum power (Pm and voltage at maximum power point (Vm are extracted from the output curve of the PV array as identification parameters for the fault diagnosis system. This study compares performances of two methods, the back-propagation neural network method, which is widely used, and the heuristic method with MATLAB. In the training phase, the back-propagation method takes about 425 steps to convergence, while the heuristic method needs only 312 steps. In the fault diagnosis phase, the prediction accuracy of the heuristic method is 93.33%, while the back-propagation method scores 86.67%. It is concluded that the heuristic method can not only improve the convergence of the simulation but also significantly improve the prediction accuracy of the fault diagnosis system.

  9. Optimal Policy of Cross-Layer Design for Channel Access and Transmission Rate Adaptation in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Jiang Zhu

    2010-01-01

    Full Text Available In this paper, we investigate the cross-layer design of joint channel access and transmission rate adaptation in CR networks with multiple channels for both centralized and decentralized cases. Our target is to maximize the throughput of CR network under transmission power constraint by taking spectrum sensing errors into account. In centralized case, this problem is formulated as a special constrained Markov decision process (CMDP, which can be solved by standard linear programming (LP method. As the complexity of finding the optimal policy by LP increases exponentially with the size of action space and state space, we further apply action set reduction and state aggregation to reduce the complexity without loss of optimality. Meanwhile, for the convenience of implementation, we also consider the pure policy design and analyze the corresponding characteristics. In decentralized case, where only local information is available and there is no coordination among the CR users, we prove the existence of the constrained Nash equilibrium and obtain the optimal decentralized policy. Finally, in the case that the traffic load parameters of the licensed users are unknown for the CR users, we propose two methods to estimate the parameters for two different cases. Numerical results validate the theoretic analysis.

  10. Design of Multi-Layer Optical Fibers with Ring Refractive Index to Reduce Dispersion and Increase Bandwidth in Broadband Optical Networks

    Directory of Open Access Journals (Sweden)

    M. Seifouri

    2012-06-01

    Full Text Available The main goal in this paper is to design single-mode optical fibers for DWDM networks, which are used today in rapid communications. These networks require low dispersion in a wide range of wavelengths. So, in this paper, multi-layer optical fibers with low dispersion value and flat dispersion slope in wavelength range of (1.5-1.6µm are designed, using optimization algorithms.

  11. SU-F-E-09: Respiratory Signal Prediction Based On Multi-Layer Perceptron Neural Network Using Adjustable Training Samples

    Energy Technology Data Exchange (ETDEWEB)

    Sun, W; Jiang, M; Yin, F [Duke University Medical Center, Durham, NC (United States)

    2016-06-15

    Purpose: Dynamic tracking of moving organs, such as lung and liver tumors, under radiation therapy requires prediction of organ motions prior to delivery. The shift of moving organ may change a lot due to huge transform of respiration at different periods. This study aims to reduce the influence of that changes using adjustable training signals and multi-layer perceptron neural network (ASMLP). Methods: Respiratory signals obtained using a Real-time Position Management(RPM) device were used for this study. The ASMLP uses two multi-layer perceptron neural networks(MLPs) to infer respiration position alternately and the training sample will be updated with time. Firstly, a Savitzky-Golay finite impulse response smoothing filter was established to smooth the respiratory signal. Secondly, two same MLPs were developed to estimate respiratory position from its previous positions separately. Weights and thresholds were updated to minimize network errors according to Leverberg-Marquart optimization algorithm through backward propagation method. Finally, MLP 1 was used to predict 120∼150s respiration position using 0∼120s training signals. At the same time, MLP 2 was trained using 30∼150s training signals. Then MLP is used to predict 150∼180s training signals according to 30∼150s training signals. The respiration position is predicted as this way until it was finished. Results: In this experiment, the two methods were used to predict 2.5 minute respiratory signals. For predicting 1s ahead of response time, correlation coefficient was improved from 0.8250(MLP method) to 0.8856(ASMLP method). Besides, a 30% improvement of mean absolute error between MLP(0.1798 on average) and ASMLP(0.1267 on average) was achieved. For predicting 2s ahead of response time, correlation coefficient was improved from 0.61415 to 0.7098.Mean absolute error of MLP method(0.3111 on average) was reduced by 35% using ASMLP method(0.2020 on average). Conclusion: The preliminary results

  12. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  13. Graph Abstraction and Abstract Graph Transformation

    NARCIS (Netherlands)

    Boneva, I.B.; Rensink, Arend; Kurban, M.E.; Bauer, J.

    2007-01-01

    Many important systems like concurrent heap-manipulating programs, communication networks, or distributed algorithms are hard to verify due to their inherent dynamics and unboundedness. Graphs are an intuitive representation of states of these systems, where transitions can be conveniently described

  14. Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Khundrakpam Johnson Singh

    2016-10-01

    Full Text Available Distributed denial-of-service (DDoS attack is one of the major threats to the web server. The rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in current intrusion detection systems or intrusion prevention systems (IDS/IPS, mostly caused by application-layer DDoS attacks. Within this context, the objective of the paper is to detect a DDoS attack using a multilayer perceptron (MLP classification algorithm with genetic algorithm (GA as learning algorithm. In this work, we analyzed the standard EPA-HTTP (environmental protection agency-hypertext transfer protocol dataset and selected the parameters that will be used as input to the classifier model for differentiating the attack from normal profile. The parameters selected are the HTTP GET request count, entropy, and variance for every connection. The proposed model can provide a better accuracy of 98.31%, sensitivity of 0.9962, and specificity of 0.0561 when compared to other traditional classification models.

  15. Multi-Flow Carrier Aggregation in Heterogeneous Networks: Cross-Layer Performance Analysis

    KAUST Repository

    Alorainy, Abdulaziz

    2017-02-09

    Multi-flow carrier aggregation (CA) has recently been considered to meet the increasing demand for high data rates. In this paper, we investigate the cross-layer performance of multi-flow CA for macro user equipments (MUEs) in the expanded range (ER) of small cells. We develop a fork/join (F/J) queuing analytical model that takes into account the time varying channels, the channel scheduling algorithm, partial CQI feedback and the number of component carriers deployed at each tier. Our model also accounts for stochastic packet arrivals and the packet scheduling mechanism. The analytical model developed in this paper can be used to gauge various packet-level performance parameters e.g., packet loss probability (PLP) and queuing delay. For the queuing delay, our model takes out-of-sequence packet delivery into consideration. The developed model can also be used to find the amount of CQI feedback and the packet scheduling of a particular MUE in order to offload as much traffic as possible from the macrocells to the small cells while maintaining the MUE\\'s quality of service (QoS) requirements.

  16. Compilation of Theses Abstracts

    National Research Council Canada - National Science Library

    2005-01-01

    This publication contains unclassified/unrestricted abstracts of classified or restricted theses submitted for the degrees of Doctor of Philosophy, Master of Business Administration, Master of Science...

  17. Application-Level and User-Level QoS Assessment of Audio-Video IP Transmission over Cross-Layer Designed Wireless Ad Hoc Networks

    Science.gov (United States)

    Nunome, Toshiro; Tasaka, Shuji; Nakaoka, Ken

    This paper performs application-level QoS and user-level QoS assessment of audio-video streaming in cross-layer designed wireless ad hoc networks. In order to achieve high QoS at the user-level, we employ link quality-based routing in the network layer and media synchronization control in the application layer. We adopt three link quality-based routing protocols: OLSR-SS (Signal Strength), AODV-SS, and LQHR (Link Quality-Based Hybrid Routing). OLSR-SS is a proactive routing protocol, while AODV-SS is a reactive one. LQHR is a hybrid protocol, which is a combination of proactive and reactive routing protocols. For applicationlevel QoS assessment, we performed computer simulation with ns-2 where an IEEE 802.11b mesh topology network with 24 nodes was assumed. We also assessed user-level QoS by a subjective experiment with 30 assessors. From the assessment results, we find AODV-SS the best for networks with long inter-node distances, while LQHR outperforms AODV-SS for short inter-node distances. In addition, we also examine characteristics of the three schemes with respect to the application-level QoS in random topology networks.

  18. Completeness of Lyapunov Abstraction

    Directory of Open Access Journals (Sweden)

    Rafael Wisniewski

    2013-08-01

    Full Text Available In this work, we continue our study on discrete abstractions of dynamical systems. To this end, we use a family of partitioning functions to generate an abstraction. The intersection of sub-level sets of the partitioning functions defines cells, which are regarded as discrete objects. The union of cells makes up the state space of the dynamical systems. Our construction gives rise to a combinatorial object - a timed automaton. We examine sound and complete abstractions. An abstraction is said to be sound when the flow of the time automata covers the flow lines of the dynamical systems. If the dynamics of the dynamical system and the time automaton are equivalent, the abstraction is complete. The commonly accepted paradigm for partitioning functions is that they ought to be transversal to the studied vector field. We show that there is no complete partitioning with transversal functions, even for particular dynamical systems whose critical sets are isolated critical points. Therefore, we allow the directional derivative along the vector field to be non-positive in this work. This considerably complicates the abstraction technique. For understanding dynamical systems, it is vital to study stable and unstable manifolds and their intersections. These objects appear naturally in this work. Indeed, we show that for an abstraction to be complete, the set of critical points of an abstraction function shall contain either the stable or unstable manifold of the dynamical system.

  19. Automated detection of nerve fiber layer defects on retinal fundus images using fully convolutional network for early diagnosis of glaucoma

    Science.gov (United States)

    Watanabe, Ryusuke; Muramatsu, Chisako; Ishida, Kyoko; Sawada, Akira; Hatanaka, Yuji; Yamamoto, Tetsuya; Fujita, Hiroshi

    2017-03-01

    Early detection of glaucoma is important to slow down progression of the disease and to prevent total vision loss. We have been studying an automated scheme for detection of a retinal nerve fiber layer defect (NFLD), which is one of the earliest signs of glaucoma on retinal fundus images. In our previous study, we proposed a multi-step detection scheme which consists of Gabor filtering, clustering and adaptive thresholding. The problems of the previous method were that the number of false positives (FPs) was still large and that the method included too many rules. In attempt to solve these problems, we investigated the end-to-end learning system without pre-specified features. A deep convolutional neural network (DCNN) with deconvolutional layers was trained to detect NFLD regions. In this preliminary investigation, we investigated effective ways of preparing the input images and compared the detection results. The optimal result was then compared with the result obtained by the previous method. DCNN training was carried out using original images of abnormal cases, original images of both normal and abnormal cases, ellipse-based polar transformed images, and transformed half images. The result showed that use of both normal and abnormal cases increased the sensitivity as well as the number of FPs. Although NFLDs are visualized with the highest contrast in green plane, the use of color images provided higher sensitivity than the use of green image only. The free response receiver operating characteristic curve using the transformed color images, which was the best among seven different sets studied, was comparable to that of the previous method. Use of DCNN has a potential to improve the generalizability of automated detection method of NFLDs and may be useful in assisting glaucoma diagnosis on retinal fundus images.

  20. Service-oriented Software Defined Optical Networks for Cloud Computing

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Ji, Yuefeng

    2017-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.g., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). This paper proposes a new service-oriented software defined optical network architecture, including a resource layer, a service abstract layer, a control layer and an application layer. We then dwell on the corresponding service providing method. Different service ID is used to identify the service a device can offer. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit different services based on the service ID in the service-oriented software defined optical network.

  1. Pore Network Modeling and Synchrotron Imaging of Liquid Water in the Gas Diffusion Layer of Polymer Electrolyte Membrane Fuel Cells

    Science.gov (United States)

    Hinebaugh, James Thomas

    Polymer electrolyte membrane (PEM) fuel cells operate at levels of high humidity, leading to condensation throughout the cell components. The porous gas diffusion layer (GDL) must not become over-saturated with liquid water, due to its responsibility in providing diffusion pathways to and from the embedded catalyst sites. Due to the opaque and microscale nature of the GDL, a current challenge of the fuel cell industry is to identify the characteristics that make the GDL more or less robust against flooding. Modeling the system as a pore network is an attractive investigative strategy; however, for flooding simulations to provide meaningful material comparisons, accurate GDL topology and condensation distributions must be provided. The focus of this research is to provide the foundational tools with which to capture both of these requirements. The method of pore network modeling on topologically representative pore networks is demonstrated to describe flooding phenomena within GDL materials. A stochastic modeling algorithm is then developed to create pore spaces with the relevant features of GDL materials. Then, synchrotron based X-ray visualization experiments are developed and conducted to provide insight into condensation conditions. It was found that through-plane porosity distributions have significant effects on the GDL saturation levels. Some GDL manufacturing processes result in high porosity regions which are predicted to become heavily saturated with water if they are positioned between the condensation sites and the exhaust channels. Additionally, it was found that fiber diameter and the volume fraction of binding material applied to the GDL have significant impacts on the GDL heterogeneity and pore size distribution. Representative stochastic models must accurately describe these three material characteristics. In situ, dynamic liquid water behavior was visualized at the Canadian Light source, Inc. synchrotron using imaging and image processing

  2. Daily global solar radiation modelling using multi-layer perceptron neural networks in semi-arid region

    Directory of Open Access Journals (Sweden)

    Mawloud GUERMOUI

    2016-07-01

    Full Text Available Accurate estimation of Daily Global Solar Radiation (DGSR has been a major goal for solar energy application. However, solar radiation measurements are not a simple task for several reasons. In the cases where data are not available, it is very common the use of computational models to estimate the missing data, which are based mainly of the search for relationships between weather variables, such as temperature, humidity, sunshine duration, etc. In this respect, the present study focuses on the development of artificial neural network (ANN model for estimation of daily global solar radiation on horizontal surface in Ghardaia city (South Algeria. In this analysis back-propagation algorithm is applied. Daily mean air temperature, relative humidity and sunshine duration was used as climatic inputs parameters, while the daily global solar radiation (DGSR was the only output of the ANN. We have evaluated Multi-Layer Perceptron (MLP models to estimate DGSR using three year of measurement (2005-2008. It was found that MLP-model based on sunshine duration and mean air temperature give accurate results in term of Mean Absolute Bias Error, Root Mean Square Error, Relative Square Error and Correlation Coefficient. The obtained values of these indicators are 0.67 MJ/m², 1.28 MJ/m², 6.12%and 98.18%, respectively which shows that MLP is highly qualified for DGSR estimation in semi-arid climates.

  3. Liver Tumor Segmentation from MR Images Using 3D Fast Marching Algorithm and Single Hidden Layer Feedforward Neural Network

    Directory of Open Access Journals (Sweden)

    Trong-Ngoc Le

    2016-01-01

    Full Text Available Objective. Our objective is to develop a computerized scheme for liver tumor segmentation in MR images. Materials and Methods. Our proposed scheme consists of four main stages. Firstly, the region of interest (ROI image which contains the liver tumor region in the T1-weighted MR image series was extracted by using seed points. The noise in this ROI image was reduced and the boundaries were enhanced. A 3D fast marching algorithm was applied to generate the initial labeled regions which are considered as teacher regions. A single hidden layer feedforward neural network (SLFN, which was trained by a noniterative algorithm, was employed to classify the unlabeled voxels. Finally, the postprocessing stage was applied to extract and refine the liver tumor boundaries. The liver tumors determined by our scheme were compared with those manually traced by a radiologist, used as the “ground truth.” Results. The study was evaluated on two datasets of 25 tumors from 16 patients. The proposed scheme obtained the mean volumetric overlap error of 27.43% and the mean percentage volume error of 15.73%. The mean of the average surface distance, the root mean square surface distance, and the maximal surface distance were 0.58 mm, 1.20 mm, and 6.29 mm, respectively.

  4. Eigen-Direction Alignment Based Physical-Layer Network Coding for MIMO Two-Way Relay Channels

    CERN Document Server

    Yang, Tao; Ping, Li; Collings, Iain B; Yuan, Jinhong

    2012-01-01

    In this paper, we propose a novel communication strategy which incorporates physical-layer network coding (PNC) into multiple-input multiple output (MIMO) two-way relay channels (TWRCs). At the heart of the proposed scheme lies a new key technique referred to as eigen-direction alignment (EDA) precoding. The EDA precoding efficiently aligns the two-user's eigen-modes into the same directions. Based on that, we carry out multi-stream PNC over the aligned eigen-modes. We derive an achievable rate of the proposed EDA-PNC scheme, based on nested lattice codes, over a MIMO TWRC. Asymptotic analysis shows that the proposed EDA-PNC scheme approaches the capacity upper bound as the number of user antennas increases towards infinity. For a finite number of user antennas, we formulate the design criterion of the optimal EDA precoder and present solutions. Numerical results show that there is only a marginal gap between the achievable rate of the proposed EDA-PNC scheme and the capacity upper bound of the MIMO TWRC, in ...

  5. LANN-SVD: A Non-Iterative SVD-Based Learning Algorithm for One-Layer Neural Networks.

    Science.gov (United States)

    Fontenla-Romero, Oscar; Perez-Sanchez, Beatriz; Guijarro-Berdinas, Bertha

    2017-09-01

    In the scope of data analytics, the volume of a data set can be defined as a product of instance size and dimensionality of the data. In many real problems, data sets are mainly large only on one of these aspects. Machine learning methods proposed in the literature are able to efficiently learn in only one of these two situations, when the number of variables is much greater than instances or vice versa. However, there is no proposal allowing to efficiently handle either circumstances in a large-scale scenario. In this brief, we present an approach to integrally address both situations, large dimensionality or large instance size, by using a singular value decomposition (SVD) within a learning algorithm for one-layer feedforward neural network. As a result, a noniterative solution is obtained, where the weights can be calculated in a closed-form manner, thereby avoiding low convergence rate and also hyperparameter tuning. The proposed learning method, LANN-SVD in short, presents a good computational efficiency for large-scale data analytic. Comprehensive comparisons were conducted to assess LANN-SVD against other state-of-the-art algorithms. The results of this brief exhibited the superior efficiency of the proposed method in any circumstance.

  6. Mathematical games, abstract games

    CERN Document Server

    Neto, Joao Pedro

    2013-01-01

    User-friendly, visually appealing collection offers both new and classic strategic board games. Includes abstract games for two and three players and mathematical games such as Nim and games on graphs.

  7. The deleuzian abstract machines

    DEFF Research Database (Denmark)

    Werner Petersen, Erik

    2005-01-01

    To most people the concept of abstract machines is connected to the name of Alan Turing and the development of the modern computer. The Turing machine is universal, axiomatic and symbolic (E.g. operating on symbols). Inspired by Foucault, Deleuze and Guattari extended the concept of abstract...... machines to singular, non-axiomatic and diagrammatic machines. That is: Machines which constitute becomings. This presentation gives a survey of the development of the concept of abstract machines in the philosophy of Deleuze and Guatari and the function of these abstract machines in the creation of works...... of art. From Difference and Repetition to Anti-Oedipus, the machines are conceived as binary machines based on the exclusive or inclusive use respectively of the three syntheses: conexa, disjuncta and conjuncta. The machines have a twofold embedment: In the desiring-production and in the social...

  8. Abstracts of contributed papers

    Energy Technology Data Exchange (ETDEWEB)

    1994-08-01

    This volume contains 571 abstracts of contributed papers to be presented during the Twelfth US National Congress of Applied Mechanics. Abstracts are arranged in the order in which they fall in the program -- the main sessions are listed chronologically in the Table of Contents. The Author Index is in alphabetical order and lists each paper number (matching the schedule in the Final Program) with its corresponding page number in the book.

  9. Introduction to abstract algebra

    CERN Document Server

    Smith, Jonathan D H

    2008-01-01

    Taking a slightly different approach from similar texts, Introduction to Abstract Algebra presents abstract algebra as the main tool underlying discrete mathematics and the digital world. It helps students fully understand groups, rings, semigroups, and monoids by rigorously building concepts from first principles. A Quick Introduction to Algebra The first three chapters of the book show how functional composition, cycle notation for permutations, and matrix notation for linear functions provide techniques for practical computation. The author also uses equivalence relations to introduc

  10. Writing good abstracts.

    Science.gov (United States)

    Alexandrov, Andrei V; Hennerici, Michael G

    2007-01-01

    Writing an abstract means to extract and summarize (AB - absolutely, STR - straightforward, ACT - actual data presentation and interpretation). Thousands of abstracts are submitted to stroke conferences each year. The following suggestions may improve the chances of your work being selected for presentation, and to communicate results in the most efficient and unambiguous way. TITLE AND STRUCTURE: Make the title dynamic and informative, rather than descriptive. Structure the abstract following the IMRaD (Introduction, Methods, Results and Discussion) principle for your future original paper where background would become Introduction and conclusions would enter Discussion. Select the appropriate category for submission carefully. This determines which experts grade the abstract and the session where your competitors represent their work. If selected appropriately, your abstract is more likely to be graded by peers with similar interests and familiarity with your work or field. Methods should describe the study design and tools of data acquisition shortly, not data. Provide data that answer the research question. Describe most important data with numbers and statistics. Make your point with data, not speculations and opinions. Abbreviations should be avoided and only be used after they have been spelled out or defined. Common mistakes include failure to state the hypothesis, rationale for the study, sample size and conclusions. Highlight the novelty of your work by carefully chosen straightforward wording. Conclusions have to be based on the present study findings. Make sure your abstract is clear, concise and follows all rules. Show your draft to colleagues for critique, and if you are not a native English speaker show it to a person who can improve/correct your text. Remember that accepted abstracts of completed original research should be followed by published original papers - if this is not intended or fails, it may indicate an impaired ability to succeed in

  11. Classification of Atrial Septal Defect and Ventricular Septal Defect with Documented Hemodynamic Parameters via Cardiac Catheterization by Genetic Algorithms and Multi-Layered Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Mustafa Yıldız

    2012-08-01

    Full Text Available Introduction: We aimed to develop a classification method to discriminate ventricular septal defect and atrial septal defect by using severalhemodynamic parameters.Patients and Methods: Forty three patients (30 atrial septal defect, 13 ventricular septal defect; 26 female, 17 male with documentedhemodynamic parameters via cardiac catheterization are included to study. Such parameters as blood pressure values of different areas,gender, age and Qp/Qs ratios are used for classification. Parameters, we used in classification are determined by divergence analysismethod. Those parameters are; i pulmonary artery diastolic pressure, ii Qp/Qs ratio, iii right atrium pressure, iv age, v pulmonary arterysystolic pressure, vi left ventricular sistolic pressure, vii aorta mean pressure, viii left ventricular diastolic pressure, ix aorta diastolicpressure, x aorta systolic pressure. Those parameters detected from our study population, are uploaded to multi-layered artificial neuralnetwork and the network was trained by genetic algorithm.Results: Trained cluster consists of 14 factors (7 atrial septal defect and 7 ventricular septal defect. Overall success ratio is 79.2%, andwith a proper instruction of artificial neural network this ratio increases up to 89%.Conclusion: Parameters, belonging to artificial neural network, which are needed to be detected by the investigator in classical methods,can easily be detected with the help of genetic algorithms. During the instruction of artificial neural network by genetic algorithms, boththe topology of network and factors of network can be determined. During the test stage, elements, not included in instruction cluster, areassumed as in test cluster, and as a result of this study, we observed that multi-layered artificial neural network can be instructed properly,and neural network is a successful method for aimed classification.

  12. A Cross-Layer Optimization Approach for Energy Efficient Wireless Sensor Networks: Coalition-Aided Data Aggregation, Cooperative Communication, and Energy Balancing

    Directory of Open Access Journals (Sweden)

    Qinghai Gao

    2007-01-01

    Full Text Available We take a cross-layer optimization approach to study energy efficient data transport in coalition-based wireless sensor networks, where neighboring nodes are organized into groups to form coalitions and sensor nodes within one coalition carry out cooperative communications. In particular, we investigate two network models: (1 many-to-one sensor networks where data from one coalition are transmitted to the sink directly, and (2 multihop sensor networks where data are transported by intermediate nodes to reach the sink. For the many-to-one network model, we propose three schemes for data transmission from a coalition to the sink. In scheme 1, one node in the coalition is selected randomly to transmit the data; in scheme 2, the node with the best channel condition in the coalition transmits the data; and in scheme 3, all the nodes in the coalition transmit in a cooperative manner. Next, we investigate energy balancing with cooperative data transport in multihop sensor networks. Built on the above coalition-aided data transmission schemes, the optimal coalition planning is then carried out in multihop networks, in the sense that unequal coalition sizes are applied to minimize the difference of energy consumption among sensor nodes. Numerical analysis reveals that energy efficiency can be improved significantly by the coalition-aided transmission schemes, and that energy balancing across the sensor nodes can be achieved with the proposed coalition structures.

  13. Parameter estimation of an aeroelastic aircraft using neural networks

    Indian Academy of Sciences (India)

    e-mail: scr@iitk.ac.in. Abstract. Application of neural networks to the problem of aerodynamic modelling and parameter estimation for aeroelastic aircraft is addressed. A neural model capable of ... of the network in terms of the number of neurons in the hidden layer, the learning rate, the momentum rate etc. is not an exact ...

  14. Abstract 1. Introduction

    African Journals Online (AJOL)

    Maseh

    School of Information Sciences, Eldoret,. Kenya. Second affiliation: Research collaborator,. InterPARES Africa, coordinated by the. University of South Africa, Pretoria, South. Africa. Email: jmaseh@gmail.com. Abstract. Increasingly, governments all over the world are adopting e-government by deploying Information and.

  15. Humor, Abstraction, and Disbelief

    Science.gov (United States)

    Hoicka, Elena; Jutsum, Sarah; Gattis, Merideth

    2008-01-01

    We investigated humor as a context for learning about abstraction and disbelief. More specifically, we investigated how parents support humor understanding during book sharing with their toddlers. In Study 1, a corpus analysis revealed that in books aimed at 1- to 2-year-olds, humor is found more often than other forms of doing the wrong thing…

  16. Full Abstraction for HOPLA

    DEFF Research Database (Denmark)

    Nygaard, Mikkel; Winskel, Glynn

    2003-01-01

    A fully abstract denotational semantics for the higher-order process language HOPLA is presented. It characterises contextual and logical equivalence, the latter linking up with simulation. The semantics is a clean, domain-theoretic description of processes as downwards-closed sets of computation...

  17. Poster Session- Extended Abstracts

    Science.gov (United States)

    Jack D. Alexander III; Jean Findley; Brenda K. Kury; Jan L. Beyers; Douglas S. Cram; Terrell T. Baker; Jon C. Boren; Carl Edminster; Sue A. Ferguson; Steven McKay; David Nagel; Trent Piepho; Miriam Rorig; Casey Anderson; Jeanne Hoadley; Paulette L. Ford; Mark C. Andersen; Ed L. Fredrickson; Joe Truett; Gary W. Roemer; Brenda K. Kury; Jennifer Vollmer; Christine L. May; Danny C. Lee; James P. Menakis; Robert E. Keane; Zhi-Liang Zhu; Carol Miller; Brett Davis; Katharine Gray; Ken Mix; William P. Kuvlesky Jr.; D. Lynn Drawe; Marcia G. Narog; Roger D. Ottmar; Robert E. Vihnanek; Clinton S. Wright; Timothy E. Paysen; Burton K. Pendleton; Rosemary L. Pendleton; Carleton S. White; John Rogan; Doug Stow; Janet Franklin; Jennifer Miller; Lisa Levien; Chris Fischer; Emma Underwood; Robert Klinger; Peggy Moore; Clinton S. Wright

    2008-01-01

    Titles found within Poster Session-Extended Abstracts include:Assessment of emergency fire rehabilitation of four fires from the 2000 fire season on the Vale, Oregon, BLM district: review of the density sampling materials and methods: p. 329 Growth of regreen, seeded for erosion control, in the...

  18. Abstract Film and Beyond.

    Science.gov (United States)

    Le Grice, Malcolm

    A theoretical and historical account of the main preoccupations of makers of abstract films is presented in this book. The book's scope includes discussion of nonrepresentational forms as well as examination of experiments in the manipulation of time in films. The ten chapters discuss the following topics: art and cinematography, the first…

  19. SPR 2015. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-04-01

    The volume contains the abstracts of the SPR (society for pediatric radiology) 2015 meeting covering the following issues: fetal imaging, muscoskeletal imaging, cardiac imaging, chest imaging, oncologic imaging, tools for process improvement, child abuse, contrast enhanced ultrasound, image gently - update of radiation dose recording/reporting/monitoring - meaningful or useless meaning?, pediatric thoracic imaging, ALARA.

  20. 2002 NASPSA Conference Abstracts.

    Science.gov (United States)

    Journal of Sport & Exercise Psychology, 2002

    2002-01-01

    Contains abstracts from the 2002 conference of the North American Society for the Psychology of Sport and Physical Activity. The publication is divided into three sections: the preconference workshop, "Effective Teaching Methods in the Classroom;" symposia (motor development, motor learning and control, and sport psychology); and free…

  1. Testing abstract behavioral specifications

    NARCIS (Netherlands)

    P.Y.H. Wong; R. Bubel (Richard); F.S. de Boer (Frank); C.P.T. de Gouw (Stijn); M. Gómez-Zamalloa; R Haehnle; K. Meinke; M.A. Sindhu

    2015-01-01

    htmlabstractWe present a range of testing techniques for the Abstract Behavioral Specification (ABS) language and apply them to an industrial case study. ABS is a formal modeling language for highly variable, concurrent, component-based systems. The nature of these systems makes them susceptible to

  2. The Abstraction Engine

    DEFF Research Database (Denmark)

    Fortescue, Michael David

    The main thesis of this book is that abstraction, far from being confined to higher forms of cognition, language and logical reasoning, has actually been a major driving force throughout the evolution of creatures with brains. It is manifest in emotive as well as rational thought. Wending its way...

  3. Seismic Consequence Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    M. Gross

    2004-10-25

    The primary purpose of this model report is to develop abstractions for the response of engineered barrier system (EBS) components to seismic hazards at a geologic repository at Yucca Mountain, Nevada, and to define the methodology for using these abstractions in a seismic scenario class for the Total System Performance Assessment - License Application (TSPA-LA). A secondary purpose of this model report is to provide information for criticality studies related to seismic hazards. The seismic hazards addressed herein are vibratory ground motion, fault displacement, and rockfall due to ground motion. The EBS components are the drip shield, the waste package, and the fuel cladding. The requirements for development of the abstractions and the associated algorithms for the seismic scenario class are defined in ''Technical Work Plan For: Regulatory Integration Modeling of Drift Degradation, Waste Package and Drip Shield Vibratory Motion and Seismic Consequences'' (BSC 2004 [DIRS 171520]). The development of these abstractions will provide a more complete representation of flow into and transport from the EBS under disruptive events. The results from this development will also address portions of integrated subissue ENG2, Mechanical Disruption of Engineered Barriers, including the acceptance criteria for this subissue defined in Section 2.2.1.3.2.3 of the ''Yucca Mountain Review Plan, Final Report'' (NRC 2003 [DIRS 163274]).

  4. Building Safe Concurrency Abstractions

    DEFF Research Database (Denmark)

    Madsen, Ole Lehrmann

    2014-01-01

    as well as programming, and we describe how this has had an impact on the design of the language. Although Beta supports the definition of high-level concurrency abstractions, the use of these rely on the discipline of the programmer as is the case for Java and other mainstream OO languages. We introduce...

  5. High serotonin levels during brain development alter the structural input-output connectivity of neural networks in the rat somatosensory layer IV

    Directory of Open Access Journals (Sweden)

    Stéphanie eMiceli

    2013-06-01

    Full Text Available Homeostatic regulation of serotonin (5-HT concentration is critical for normal topographical organization and development of thalamocortical (TC afferent circuits. Down-regulation of the serotonin transporter (SERT and the consequent impaired reuptake of 5-HT at the synapse, results in a reduced terminal branching of developing TC afferents within the primary somatosensory cortex (S1. Despite the presence of multiple genetic models, the effect of high extracellular 5-HT levels on the structure and function of developing intracortical neural networks is far from being understood. Here, using juvenile SERT knockout (SERT-/- rats we investigated, in vitro, the effect of increased 5-HT levels on the structural organization of (i the thalamocortical projections of the ventroposteromedial thalamic nucleus towards S1, (ii the general barrel-field pattern and (iii the electrophysiological and morphological properties of the excitatory cell population in layer IV of S1 (spiny stellate and pyramidal cells. Our results confirmed previous findings that high levels of 5-HT during development lead to a reduction of the topographical precision of TCA projections towards the barrel cortex. Also, the barrel pattern was altered but not abolished in SERT-/- rats. In layer IV, both excitatory spiny stellate and pyramidal cells showed a significantly reduced intracolumnar organization of their axonal projections. In addition, the layer IV spiny stellate cells gave rise to a prominent projection towards the infragranular layer Vb. Our findings point to a structural and functional reorganization, of TCAs, as well as early stage intracortical microcircuitry, following the disruption of 5-HT reuptake during critical developmental periods. The increased projection pattern of the layer IV neurons suggests that the intracortical network changes are not limited to the main entry layer IV but may also affect the subsequent stages of the canonical circuits of the barrel

  6. Layering in Provenance Systems

    OpenAIRE

    Seltzer, Margo I.; Muniswamy-Reddy, Kiran-Kumar; Braun, Uri Jacob; Holland, David A.; Macko, Peter; Maclean, Diana; Margo, Daniel Wyatt; Smogor, Robin

    2009-01-01

    Digital provenance describes the ancestry or history of a digital object. Most existing provenance systems, however, operate at only one level of abstraction: the sys- tem call layer, a workflow specification, or the high-level constructs of a particular application. The provenance collectable in each of these layers is different, and all of it can be important. Single-layer systems fail to account for the different levels of abstraction at which users need to reason about their data and proc...

  7. Beyond the abstractions?

    DEFF Research Database (Denmark)

    Olesen, Henning Salling

    2006-01-01

    the abstractions by broadening it's scope of interest, by focussing on differences of learners, by age, gender, ethnicity, social experience, and differences in context, by socioeconomic environment, culture etc. Practically, it is argued, this means to embrace the new focus on informal learning and work related......  The anniversary of the International Journal of Lifelong Education takes place in the middle of a conceptual landslide from lifelong education to lifelong learning. Contemporary discourses of lifelong learning etc are however abstractions behind which new functions and agendas for adult education...... are set. The ideological discourse of recent policies seems to neglect the fact that history and resources for lifelong learning are different across Europe, and also neglects the multiplicity of adult learners. Instead of refusing the new agendas, however, adult education research should try to dissolve...

  8. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... these objects represent non-objectual entities in contexts from which they are excluded by type restrictions. Thus these objects are "abstract'' in a functional rather than in an ontological sense: they function as representatives of other entities but they are otherwise quite normal objects. Three examples...... of such a representation are considered: the denotations of that-phrases are objects representing propositions, generic noun phrases denote objects standing for sorts, and infinitivals are viewed as denoting objects representing attributes, i.e., the "ordinary'' meanings of verb phrases....

  9. Research Abstracts of 1979.

    Science.gov (United States)

    1979-12-01

    Rat.0 (Abstract #886). a. LEONE’, S. A., YEAGER, J. S., WOODRUFF, L. L. and CLARK, G. S. - ’An In Vitro Evaluation of the Cytotoxicity of Dental...Evaluation of sixteen dyes, with aqueous and ethanol bases, using white and ultraviolet light has been conducted in vitro and in vivo. Naturally...mandibular incisors in 8 adult Rhesus monkeys. Doubled I/8", medium force orthodontic elastics were placed around the teeth and changed every two weeks for

  10. DEGRO 2017. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2017-06-15

    The volume includes abstracts of the Annual DEGRO Meeting 2017 covering lectures and poster sessions with the following issues: lymphoma, biology, physics, radioimmunotherapy, sarcomas and rare tumors, prostate carcinoma, lung tumors, benign lesions and new media, mamma carcinoma, gastrointestinal tumors, quality of life, care science and quality assurance, high-technology methods and palliative situation, head-and-neck tumors, brain tumors, central nervous system metastases, guidelines, radiation sensitivity, radiotherapy, radioimmunotherapy.

  11. SPR 2014. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-05-15

    The proceedings of the SPR 2014 meeting include abstracts on the following topics: Body imaging techniques: practical advice for clinic work; thoracic imaging: focus on the lungs; gastrointestinal imaging: focus on the pancreas and bowel; genitourinary imaging: focus on gonadal radiology; muscoskeletal imaging; focus on oncology; child abuse and nor child abuse: focus on radiography; impact of NMR and CT imaging on management of CHD; education and communication: art and practice in pediatric radiology.

  12. On interaction between MAC and transport layers for media streaming in 802.11 ad hoc networks

    Science.gov (United States)

    Nahm, Kitae; Helmy, Ahmed; Kuo, C.-C. Jay

    2004-10-01

    We examine the validity of TCP-friendliness and the utility of equation-based congestion control as a mean for the media streaming service in 802.11 multi-hop networks. Our investigation is motivated by the recent findings of the bandwidth-delay product of 802.11 multi-hop networks via intensive computer simulations. We show that TCP behavior in 802.11 multi-hop networks is generally inefficient and unstable because the standard TCP is too aggressive considering the low bandwidth-delay product of 802.11 networks. We introduce the concept of the `fractional window' mechanism (which resembles the stop-and-go protocol) for TCP, and show that the modified TCP is more stable and efficient while outperforming the legacy TCP in 802.11-based ad hoc networks. Finally, we show that many of the typical problems of TCP protocol (performance, network fairness, and TCP-friendliness) in 802.11 networks can be solved simply by increasing the bandwidth-delay product of 802.11 networks without any TCP modification. Based on this observation, we conclude that the assumption of the ideal steady-state TCP behavior is generally invalid in 802.11 multi-hop networking environment, and that congestion control based on TCP-friendly equation can hardly provide TCP-fair throughput and smoothness in 802.11 multi-hop networking environment.

  13. EBS Radionuclide Transport Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    J. Prouty

    2006-07-14

    The purpose of this report is to develop and analyze the engineered barrier system (EBS) radionuclide transport abstraction model, consistent with Level I and Level II model validation, as identified in Technical Work Plan for: Near-Field Environment and Transport: Engineered Barrier System: Radionuclide Transport Abstraction Model Report Integration (BSC 2005 [DIRS 173617]). The EBS radionuclide transport abstraction (or EBS RT Abstraction) is the conceptual model used in the total system performance assessment (TSPA) to determine the rate of radionuclide releases from the EBS to the unsaturated zone (UZ). The EBS RT Abstraction conceptual model consists of two main components: a flow model and a transport model. Both models are developed mathematically from first principles in order to show explicitly what assumptions, simplifications, and approximations are incorporated into the models used in the TSPA. The flow model defines the pathways for water flow in the EBS and specifies how the flow rate is computed in each pathway. Input to this model includes the seepage flux into a drift. The seepage flux is potentially split by the drip shield, with some (or all) of the flux being diverted by the drip shield and some passing through breaches in the drip shield that might result from corrosion or seismic damage. The flux through drip shield breaches is potentially split by the waste package, with some (or all) of the flux being diverted by the waste package and some passing through waste package breaches that might result from corrosion or seismic damage. Neither the drip shield nor the waste package survives an igneous intrusion, so the flux splitting submodel is not used in the igneous scenario class. The flow model is validated in an independent model validation technical review. The drip shield and waste package flux splitting algorithms are developed and validated using experimental data. The transport model considers advective transport and diffusive transport

  14. IPR 2016. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-05-15

    The volume on the meeting of pediatric radiology includes abstract on the following issues: chest, cardiovascular system, neuroradiology, CT radiation DRs (diagnostic reference levels) and dose reporting guidelines, genitourinary imaging, gastrointestinal radiology, oncology an nuclear medicine, whole body imaging, fetal/neonates imaging, child abuse, oncology and hybrid imaging, value added imaging, muscoskeletal imaging, dose and radiation safety, imaging children - immobilization and distraction techniques, information - education - QI and healthcare policy, ALARA, the knowledge skills and competences for a technologist/radiographer in pediatric radiology, full exploitation of new technological features in pediatric CT, image quality issues in pediatrics, abdominal imaging, interventional radiology, MR contrast agents, tumor - mass imaging, cardiothoracic imaging, ultrasonography.

  15. SPR 2017. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2017-05-15

    The conference proceedings SPR 2017 include abstracts on the following issues: gastrointestinal radiography - inflammatory bowel diseases, cardiovascular CTA, general muscoskeletal radiology, muscoskeletal congenital development diseases, general pediatric radiology - chest, muscoskeletal imaging - marrow and infectious disorders, state-of-the-art body MR imaging, practical pediatric sonography, quality and professionalism, CT imaging in congenital heart diseases, radiographic courses, body MT techniques, contrast enhanced ultrasound, machine learning, forensic imaging, the radiation dos conundrum - reconciling imaging, imagining and managing, the practice of radiology, interventional radiology, neuroradiology, PET/MR.

  16. ESPR 2015. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-05-10

    The volume includes the abstracts of the ESPR 2015 covering the following topics: PCG (post graduate courses): Radiography; fluoroscopy and general issue; nuclear medicine, interventional radiology and hybrid imaging, pediatric CT, pediatric ultrasound; MRI in childhood. Scientific sessions and task force sessions: International aspects; neuroradiology, neonatal imaging, engineering techniques to simulate injury in child abuse, CT - dose and quality, challenges in the chest, cardiovascular and chest, muscoskeletal, oncology, pediatric uroradiology and abdominal imaging, fetal and postmortem imaging, education and global challenges, neuroradiology - head and neck, gastrointestinal and genitourinary.

  17. ABSTRACTION OF DRIFT SEEPAGE

    Energy Technology Data Exchange (ETDEWEB)

    Michael L. Wilson

    2001-02-08

    Drift seepage refers to flow of liquid water into repository emplacement drifts, where it can potentially contribute to degradation of the engineered systems and release and transport of radionuclides within the drifts. Because of these important effects, seepage into emplacement drifts is listed as a ''principal factor for the postclosure safety case'' in the screening criteria for grading of data in Attachment 1 of AP-3.15Q, Rev. 2, ''Managing Technical Product Inputs''. Abstraction refers to distillation of the essential components of a process model into a form suitable for use in total-system performance assessment (TSPA). Thus, the purpose of this analysis/model is to put the information generated by the seepage process modeling in a form appropriate for use in the TSPA for the Site Recommendation. This report also supports the Unsaturated-Zone Flow and Transport Process Model Report. The scope of the work is discussed below. This analysis/model is governed by the ''Technical Work Plan for Unsaturated Zone Flow and Transport Process Model Report'' (CRWMS M&O 2000a). Details of this activity are in Addendum A of the technical work plan. The original Work Direction and Planning Document is included as Attachment 7 of Addendum A. Note that the Work Direction and Planning Document contains tasks identified for both Performance Assessment Operations (PAO) and Natural Environment Program Operations (NEPO). Only the PAO tasks are documented here. The planning for the NEPO activities is now in Addendum D of the same technical work plan and the work is documented in a separate report (CRWMS M&O 2000b). The Project has been reorganized since the document was written. The responsible organizations in the new structure are the Performance Assessment Department and the Unsaturated Zone Department, respectively. The work plan for the seepage abstraction calls for determining an appropriate abstraction methodology

  18. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    Robering, Klaus

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... of such a representation are considered: the denotations of that-phrases are objects representing propositions, generic noun phrases denote objects standing for sorts, and infinitivals are viewed as denoting objects representing attributes, i.e., the "ordinary'' meanings of verb phrases....

  19. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... Abstract. The problem of economic insecurity is a global threat to national security. In Nigeria today, we have witness a lot of national security issues that risks the continued existence of the country as one indivisible political entity with many calling for disintegration. Hitherto, many terrorist networks have ...

  20. Carbon Monoxide, A Bibliography With Abstracts.

    Science.gov (United States)

    Cooper, Anna Grossman

    Included is a review of the carbon monoxide related literature published from 1880 to 1966. The 983 references with abstracts are grouped into these broad categories: Analysis, Biological Effects, Blood Chemistry, Control, Criteria and Standards, Instruments and Techniques, Sampling and Network Operations, and Sources. The Biological Effects group…

  1. ZnO/Mg-Al Layered Double Hydroxides as a Photocatalytic Bleaching of Methylene Orange - A Black Box Modeling by Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Seyed Ali Hosseini

    2016-10-01

    Full Text Available The paper reports the development of ZnO-MgAl layered double hydroxides as an adsorbent-photo catalyst to remove the dye pollutants from aqueous solution and the experiments of a photocatalytic study were designed and modeled by response surface methodology (RSM and artificial neural network (ANN. The co-precipitation and urea methods were used to synthesize the ZnO-MgAl layered double hydroxides and FT-IR, XRD and SEM analysis were done for characterization of the catalyst.The performance of the ANN model was determined and showed the efficiency of the model in comparison to the RSM method to predict the percentage of dye removal accurately with a determination coefficient (R2 of 0.968. The optimized conditions were obtained as follows: 600 oC, 120 min, 0.05 g and 20 ppm for the calcination temperature, irradiation time, catalyst amount and dye pollutant concentration, respectively. Copyright © 2016 BCREC GROUP. All rights reserved Received: 22nd January 2016; Revised: 14th March 2016; Accepted:15th March 2016 How to Cite: Hosseini, S.A., Akbari, M. (2016. ZnO/Mg-Al Layered Double Hydroxides as a Photocatalytic Bleaching of Methylene Orange - A Black Box Modeling by Artificial Neural Network. Bulletin of Chemical Reaction Engineering & Catalysis, 11 (3: 299-315 (doi: 10.9767/bcrec.11.3.570.299-315 Permalink/DOI: http://doi.org/10.9767/bcrec.11.3.570.299-315

  2. NetMap - Creating a Map of Application Layer QoS Metrics of Mobile Networks Using Crowd Sourcing

    DEFF Research Database (Denmark)

    Mikkelsen, Lars Møller; Thomsen, Steffen Riber; Pedersen, Michael Sølvkjær

    2014-01-01

    on crowd sourcing, that utilizes end user smart devices in automatically measuring and gathering network performance metrics on mobile networks. Metrics measured include throughput, round trip times, connectivity, and signal strength, and are accompanied by a wide range of context information about...

  3. EBS Radionuclide Transport Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    J.D. Schreiber

    2005-08-25

    The purpose of this report is to develop and analyze the engineered barrier system (EBS) radionuclide transport abstraction model, consistent with Level I and Level II model validation, as identified in ''Technical Work Plan for: Near-Field Environment and Transport: Engineered Barrier System: Radionuclide Transport Abstraction Model Report Integration'' (BSC 2005 [DIRS 173617]). The EBS radionuclide transport abstraction (or EBS RT Abstraction) is the conceptual model used in the total system performance assessment for the license application (TSPA-LA) to determine the rate of radionuclide releases from the EBS to the unsaturated zone (UZ). The EBS RT Abstraction conceptual model consists of two main components: a flow model and a transport model. Both models are developed mathematically from first principles in order to show explicitly what assumptions, simplifications, and approximations are incorporated into the models used in the TSPA-LA. The flow model defines the pathways for water flow in the EBS and specifies how the flow rate is computed in each pathway. Input to this model includes the seepage flux into a drift. The seepage flux is potentially split by the drip shield, with some (or all) of the flux being diverted by the drip shield and some passing through breaches in the drip shield that might result from corrosion or seismic damage. The flux through drip shield breaches is potentially split by the waste package, with some (or all) of the flux being diverted by the waste package and some passing through waste package breaches that might result from corrosion or seismic damage. Neither the drip shield nor the waste package survives an igneous intrusion, so the flux splitting submodel is not used in the igneous scenario class. The flow model is validated in an independent model validation technical review. The drip shield and waste package flux splitting algorithms are developed and validated using experimental data. The transport

  4. Fabrication of PVDF-based blend membrane with a thin hydrophilic deposition layer and a network structure supporting layer via the thermally induced phase separation followed by non-solvent induced phase separation process

    Science.gov (United States)

    Wu, Zhiguo; Cui, Zhenyu; Li, Tianyu; Qin, Shuhao; He, Benqiao; Han, Na; Li, Jianxin

    2017-10-01

    A simple strategy of thermally induced phase separation followed by non-solvent induced phase separation (TIPS-NIPS) is reported to fabricate poly (vinylidene fluoride) (PVDF)-based blend membrane. The dissolved poly (styrene-co-maleic anhydride) (SMA) in diluent prevents the crystallization of PVDF during the cooling process and deposites on the established PVDF matrix in the later extraction. Compared with traditional coating technique, this one-step TIPS-NIPS method can not only fabricate a supporting layer with an interconnected network structure even via solid-liquid phase separation of TIPS, but also form a uniform SMA skin layer approximately as thin as 200 nm via surface deposition of NIPS. Besides the better hydrophilicity, what's interesting is that the BSA rejection ratio increases from 48% to 94% with the increase of SMA, which indicates that the separation performance has improved. This strategy can be conveniently extended to the creation of firmly thin layer, surface functionalization and structure controllability of the membrane.

  5. IEEE conference record -- Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    1994-01-01

    This conference covers the following areas: computational plasma physics; vacuum electronic; basic phenomena in fully ionized plasmas; plasma, electron, and ion sources; environmental/energy issues in plasma science; space plasmas; plasma processing; ball lightning/spherical plasma configurations; plasma processing; fast wave devices; magnetic fusion; basic phenomena in partially ionized plasma; dense plasma focus; plasma diagnostics; basic phenomena in weakly ionized gases; fast opening switches; MHD; fast z-pinches and x-ray lasers; intense ion and electron beams; laser-produced plasmas; microwave plasma interactions; EM and ETH launchers; solid state plasmas and switches; intense beam microwaves; and plasmas for lighting. Separate abstracts were prepared for 416 papers in this conference.

  6. Problems in abstract algebra

    CERN Document Server

    Wadsworth, A R

    2017-01-01

    This is a book of problems in abstract algebra for strong undergraduates or beginning graduate students. It can be used as a supplement to a course or for self-study. The book provides more variety and more challenging problems than are found in most algebra textbooks. It is intended for students wanting to enrich their learning of mathematics by tackling problems that take some thought and effort to solve. The book contains problems on groups (including the Sylow Theorems, solvable groups, presentation of groups by generators and relations, and structure and duality for finite abelian groups); rings (including basic ideal theory and factorization in integral domains and Gauss's Theorem); linear algebra (emphasizing linear transformations, including canonical forms); and fields (including Galois theory). Hints to many problems are also included.

  7. Computational Abstraction Steps

    DEFF Research Database (Denmark)

    Thomsen, Lone Leth; Thomsen, Bent; Nørmark, Kurt

    2010-01-01

    and class instantiations. Our teaching experience shows that many novice programmers find it difficult to write programs with abstractions that materialise to concrete objects later in the development process. The contribution of this paper is the idea of initiating a programming process by creating...... the exploratory phase of a program development process. In some specific niches it is also expected that our approach will benefit professional programmers....... or capturing concrete values, objects, or actions. As the next step, some of these are lifted to a higher level by computational means. In the object-oriented paradigm the target of such steps is classes. We hypothesise that the proposed approach primarily will be beneficial to novice programmers or during...

  8. Chemical stabilization and improved thermal resilience of molecular arrangements: possible formation of a surface network of bonds by multiple pulse atomic layer deposition.

    Science.gov (United States)

    de Pauli, Muriel; Matos, Matheus J S; Siles, Pablo F; Prado, Mariana C; Neves, Bernardo R A; Ferreira, Sukarno O; Mazzoni, Mário S C; Malachias, Angelo

    2014-08-14

    In this work, we make use of an atomic layer deposition (ALD) surface reaction based on trimethyl-aluminum (TMA) and water to modify O-H terminated self-assembled layers of octadecylphosphonic acid (OPA). The structural modifications were investigated by X-ray reflectivity, X-ray diffraction, and atomic force microscopy. We observed a significant improvement in the thermal stability of ALD-modified molecules, with the existence of a supramolecular packing structure up to 500 °C. Following the experimental observations, density functional theory (DFT) calculations indicate the possibility of formation of a covalent network with aluminum atoms connecting OPA molecules at terrace surfaces. Chemical stability is also achieved on top of such a composite surface, inhibiting further ALD oxide deposition. On the other hand, in the terrace edges, where the covalent array is discontinued, the chemical conditions allow for oxide growth. Analysis of the DFT results on band structure and density of states of modified OPA molecules suggests that besides the observed thermal resilience, the dielectric character of OPA layers is preserved. This new ALD-modified OPA composite is potentially suitable for applications such as dielectric layers in organic devices, where better thermal performance is required.

  9. Pore network modeling to explore the effects of compression on multiphase transport in polymer electrolyte membrane fuel cell gas diffusion layers

    Science.gov (United States)

    Fazeli, Mohammadreza; Hinebaugh, James; Fishman, Zachary; Tötzke, Christian; Lehnert, Werner; Manke, Ingo; Bazylak, Aimy

    2016-12-01

    Understanding how compression affects the distribution of liquid water and gaseous oxygen in the polymer electrolyte membrane fuel cell gas diffusion layer (GDL) is vital for informing the design of improved porous materials for effective water management strategies. Pore networks extracted from synchrotron-based micro-computed tomography images of compressed GDLs were employed to simulate liquid water transport in GDL materials over a range of compression pressures. The oxygen transport resistance was predicted for each sample under dry and partially saturated conditions. A favorable GDL compression value for a preferred liquid water distribution and oxygen diffusion was found for Toray TGP-H-090 (10%), yet an optimum compression value was not recognized for SGL Sigracet 25BC. SGL Sigracet 25BC exhibited lower transport resistance values compared to Toray TGP-H-090, and this is attributed to the additional diffusion pathways provided by the microporous layer (MPL), an effect that is particularly significant under partially saturated conditions.

  10. Hemocompatibility of poly(vinylidene fluoride) membrane grafted with network-like and brush-like antifouling layer controlled via plasma-induced surface PEGylation.

    Science.gov (United States)

    Chang, Yung; Shih, Yu-Ju; Ko, Chao-Yin; Jhong, Jheng-Fong; Liu, Ying-Ling; Wei, Ta-Chin

    2011-05-03

    In this work, the hemocompatibility of PEGylated poly(vinylidene fluoride) (PVDF) microporous membranes with varying grafting coverage and structures via plasma-induced surface PEGylation was studied. Network-like and brush-like PEGylated layers on PVDF membrane surfaces were achieved by low-pressure and atmospheric plasma treatment. The chemical composition, physical morphology, grafting structure, surface hydrophilicity, and hydration capability of prepared membranes were determined to illustrate the correlations between grafting qualities and hemocompatibility of PEGylated PVDF membranes in contact with human blood. Plasma protein adsorption onto different PEGylated PVDF membranes from single-protein solutions and the complex medium of 100% human plasma were measured by enzyme-linked immunosorbent assay (ELISA) with monoclonal antibodies. Hemocompatibility of the PEGylated membranes was evaluated by the antifouling property of platelet adhesion observed by scanning electron microscopy (SEM) and the anticoagulant activity of the blood coagulant determined by testing plasma-clotting time. The control of grafting structures of PEGylated layers highly regulates the PVDF membrane to resist the adsorption of plasma proteins, the adhesion of platelets, and the coagulation of human plasma. It was found that PVDF membranes grafted with brush-like PEGylated layers presented higher hydration capability with binding water molecules than with network-like PEGylated layers to improve the hemocompatible character of plasma protein and blood platelet resistance in human blood. This work suggests that the hemocompatible nature of grafted PEGylated polymers by controlling grafting structures gives them great potential in the molecular design of antithrombogenic membranes for use in human blood.

  11. Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach

    CSIR Research Space (South Africa)

    Adedeji, K

    2016-09-01

    Full Text Available Recent advances in technologies has led to the use of wireless communication networks for the transmission of information. However, the broadcast nature of wireless channels has made it vulnerable to attacks. In this paper, we present work...

  12. A Novel Dynamic Physical Layer Impairment-Aware Routing and Wavelength Assignment (PLI-RWA) Algorithm for Mixed Line Rate (MLR) Wavelength Division Multiplexed (WDM) Optical Networks

    Science.gov (United States)

    Iyer, Sridhar

    2016-12-01

    The ever-increasing global Internet traffic will inevitably lead to a serious upgrade of the current optical networks' capacity. The legacy infrastructure can be enhanced not only by increasing the capacity but also by adopting advance modulation formats, having increased spectral efficiency at higher data rate. In a transparent mixed-line-rate (MLR) optical network, different line rates, on different wavelengths, can coexist on the same fiber. Migration to data rates higher than 10 Gbps requires the implementation of phase modulation schemes. However, the co-existing on-off keying (OOK) channels cause critical physical layer impairments (PLIs) to the phase modulated channels, mainly due to cross-phase modulation (XPM), which in turn limits the network's performance. In order to mitigate this effect, a more sophisticated PLI-Routing and Wavelength Assignment (PLI-RWA) scheme needs to be adopted. In this paper, we investigate the critical impairment for each data rate and the way it affects the quality of transmission (QoT). In view of the aforementioned, we present a novel dynamic PLI-RWA algorithm for MLR optical networks. The proposed algorithm is compared through simulations with the shortest path and minimum hop routing schemes. The simulation results show that performance of the proposed algorithm is better than the existing schemes.

  13. MIMO Communication for Cellular Networks

    CERN Document Server

    Huang, Howard; Venkatesan, Sivarama

    2012-01-01

    As the theoretical foundations of multiple-antenna techniques evolve and as these multiple-input multiple-output (MIMO) techniques become essential for providing high data rates in wireless systems, there is a growing need to understand the performance limits of MIMO in practical networks. To address this need, MIMO Communication for Cellular Networks presents a systematic description of MIMO technology classes and a framework for MIMO system design that takes into account the essential physical-layer features of practical cellular networks. In contrast to works that focus on the theoretical performance of abstract MIMO channels, MIMO Communication for Cellular Networks emphasizes the practical performance of realistic MIMO systems. A unified set of system simulation results highlights relative performance gains of different MIMO techniques and provides insights into how best to use multiple antennas in cellular networks under various conditions. MIMO Communication for Cellular Networks describes single-user,...

  14. Exoplanets and Multiverses (Abstract)

    Science.gov (United States)

    Trimble, V.

    2016-12-01

    (Abstract only) To the ancients, the Earth was the Universe, of a size to be crossed by a god in a day, by boat or chariot, and by humans in a lifetime. Thus an exoplanet would have been a multiverse. The ideas gradually separated over centuries, with gradual acceptance of a sun-centered solar system, the stars as suns likely to have their own planets, other galaxies beyond the Milky Way, and so forth. And whenever the community divided between "just one' of anything versus "many," the "manies" have won. Discoveries beginning in 1991 and 1995 have gradually led to a battalion or two of planets orbiting other stars, very few like our own little family, and to moderately serious consideration of even larger numbers of other universes, again very few like our own. I'm betting, however, on habitable (though not necessarily inhabited) exoplanets to be found, and habitable (though again not necessarily inhabited) universes. Only the former will yield pretty pictures.

  15. Judgement of abstract paintings

    Directory of Open Access Journals (Sweden)

    Dakulović Sandra

    2006-01-01

    Full Text Available In two experiments the judgement of twenty one abstract paintings was investigated. In Experiment 1, subjects were asked to make similarity judgements of 210 pairs of paintings on a 7 step bipolar scale (similar-dissimilar. The Multi-dimensional scaling (MDS method was used for data analysis. The distribution of paintings within MDS 2-D space suggested two grouping criteria: colorfullness (e.g. from Klee to Kline and geometrization (e.g. from Vasarely to Kandinsky. In Experiment 2, subjects were asked to judge the same paintings on three factors of the instrument SDF 9 (Marković et al., 2002b: Evaluation, Arousal and Regularity. The purpose of this experiment was to specify the subjective criteria on which the (dissimilarity judgements were based. In the regression analysis the three factors of SDF 9 were defined as predictors, whereas the x and y coordinates of MDS 2-D space were defined as dependent variables. The results have shown that the dimension x was reducible to the Evaluation factor, and dimension y is reducible to the Regularity factor.

  16. Automated Supernova Discovery (Abstract)

    Science.gov (United States)

    Post, R. S.

    2015-12-01

    (Abstract only) We are developing a system of robotic telescopes for automatic recognition of Supernovas as well as other transient events in collaboration with the Puckett Supernova Search Team. At the SAS2014 meeting, the discovery program, SNARE, was first described. Since then, it has been continuously improved to handle searches under a wide variety of atmospheric conditions. Currently, two telescopes are used to build a reference library while searching for PSN with a partial library. Since data is taken every night without clouds, we must deal with varying atmospheric and high background illumination from the moon. Software is configured to identify a PSN, reshoot for verification with options to change the run plan to acquire photometric or spectrographic data. The telescopes are 24-inch CDK24, with Alta U230 cameras, one in CA and one in NM. Images and run plans are sent between sites so the CA telescope can search while photometry is done in NM. Our goal is to find bright PSNs with magnitude 17.5 or less which is the limit of our planned spectroscopy. We present results from our first automated PSN discoveries and plans for PSN data acquisition.

  17. Stellar Presentations (Abstract)

    Science.gov (United States)

    Young, D.

    2015-12-01

    (Abstract only) The AAVSO is in the process of expanding its education, outreach and speakers bureau program. powerpoint presentations prepared for specific target audiences such as AAVSO members, educators, students, the general public, and Science Olympiad teams, coaches, event supervisors, and state directors will be available online for members to use. The presentations range from specific and general content relating to stellar evolution and variable stars to specific activities for a workshop environment. A presentation—even with a general topic—that works for high school students will not work for educators, Science Olympiad teams, or the general public. Each audience is unique and requires a different approach. The current environment necessitates presentations that are captivating for a younger generation that is embedded in a highly visual and sound-bite world of social media, twitter and U-Tube, and mobile devices. For educators, presentations and workshops for themselves and their students must support the Next Generation Science Standards (NGSS), the Common Core Content Standards, and the Science Technology, Engineering and Mathematics (STEM) initiative. Current best practices for developing relevant and engaging powerpoint presentations to deliver information to a variety of targeted audiences will be presented along with several examples.

  18. Multilayered security and privacy protection in Car-to-X networks solutions from application down to physical layer

    CERN Document Server

    Stübing, Hagen

    2013-01-01

    Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby, security and privacy are regarded as an absolute prerequisite for successfully establishing the C2X technology on the market. Towards the paramount objective of covering the entire ITS reference model with security and privacy measures, Hagen Stübing develops dedicated solutions for each layer, respectively. On application layer a security architecture in terms of a Public Key Infras

  19. Elbow joint angle and elbow movement velocity estimation using NARX-multiple layer perceptron neural network model with surface EMG time domain parameters.

    Science.gov (United States)

    Raj, Retheep; Sivanandan, K S

    2017-01-01

    Estimation of elbow dynamics has been the object of numerous investigations. In this work a solution is proposed for estimating elbow movement velocity and elbow joint angle from Surface Electromyography (SEMG) signals. Here the Surface Electromyography signals are acquired from the biceps brachii muscle of human hand. Two time-domain parameters, Integrated EMG (IEMG) and Zero Crossing (ZC), are extracted from the Surface Electromyography signal. The relationship between the time domain parameters, IEMG and ZC with elbow angular displacement and elbow angular velocity during extension and flexion of the elbow are studied. A multiple input-multiple output model is derived for identifying the kinematics of elbow. A Nonlinear Auto Regressive with eXogenous inputs (NARX) structure based multiple layer perceptron neural network (MLPNN) model is proposed for the estimation of elbow joint angle and elbow angular velocity. The proposed NARX MLPNN model is trained using Levenberg-marquardt based algorithm. The proposed model is estimating the elbow joint angle and elbow movement angular velocity with appreciable accuracy. The model is validated using regression coefficient value (R). The average regression coefficient value (R) obtained for elbow angular displacement prediction is 0.9641 and for the elbow anglular velocity prediction is 0.9347. The Nonlinear Auto Regressive with eXogenous inputs (NARX) structure based multiple layer perceptron neural networks (MLPNN) model can be used for the estimation of angular displacement and movement angular velocity of the elbow with good accuracy.

  20. Cross-Layer Measurement on an IEEE 802.11g Wireless Network Supporting MPEG-2 Video Streaming Applications in the Presence of Interference

    Directory of Open Access Journals (Sweden)

    Alessandro Sona

    2010-01-01

    Full Text Available The performance of wireless local area networks supporting video streaming applications, based on MPEG-2 video codec, in the presence of interference is here dealt with. IEEE 802.11g standard wireless networks, that do not support QoS in according with IEEE 802.11e standard, are, in particular, accounted for and Bluetooth signals, additive white Gaussian noise, and competitive data traffic are considered as sources of interference. The goal is twofold: from one side, experimentally assessing and correlating the values that some performance metrics assume at the same time at different layers of an IEEE 802.11g WLAN delivering video streaming in the presence of in-channel interference; from the other side, deducing helpful and practical hints for designers and technicians, in order to efficiently assess and enhance the performance of an IEEE 802.11g WLAN supporting video streaming in some suitable setup conditions and in the presence of interference. To this purpose, an experimental analysis is planned following a cross-layer measurement approach, and a proper testbed within a semianechoic chamber is used. Valuable results are obtained in terms of signal-to-interference ratio, packet loss ratio, jitter, video quality, and interference data rate; helpful hints for designers and technicians are finally gained.

  1. Discrete hexamer water clusters and 2D water layer trapped in three luminescent Ag/tetramethylpyrazine/benzene-dicarboxylate hosts: 1D chain, 2D layer and 3D network

    Science.gov (United States)

    Mei, Hong-Xin; Zhang, Ting; Huang, Hua-Qi; Huang, Rong-Bin; Zheng, Lan-Sun

    2016-03-01

    Three mix-ligand Ag(I) coordination compounds, namely, {[Ag10(tpyz) 5(L1) 5(H2 O)2].(H2 O)4}n (1, tpyz = 2,3,4,5-tetramethylpyrazine, H2 L1 = phthalic acid), [Ag4(tpyz) 2(L2) 2(H2 O)].(H2 O)5}n (2, H2 L2 = isophthalic acid) {[Ag2(tpyz) 2(L3) (H2 O)4].(H2 O)8}n (3, H2 L3 = terephthalic acid), have been synthesized and characterized by elemental analysis, IR, PXRD and X-ray single-crystal diffraction. 1 exhibits a 2D layer which can be simplified as a (4,4) net. 2 is a 3D network which can be simplified as a (3,3)-connected 2-nodal net with a point symbol of {102.12}{102}. 3 consists of linear [Ag(tpyz) (H2 O)2]n chain. Of particular interest, discrete hexamer water clusters were observed in 1 and 2, while a 2D L10(6) water layer exists in 3. The results suggest that the benzene dicarboxylates play pivotal roles in the formation of the different host architectures as well as different water aggregations. Moreover, thermogravimetric analysis (TGA) and emissive behaviors of these compounds were investigated.

  2. Global outlook from the Global Terrestrial Network for Permafrost (GTN-P): Changes in thermal state of permafrost and active layer thickness over the last decade

    Science.gov (United States)

    Streletskiy, D. A.; Biskaborn, B. K.; Romanovsky, V. E.; Smith, S. L.; Shiklomanov, N. I.; Nötzli, J.; Vieira, G.; Schoeneich, P.; Lanckman, J. P. F.; Lantuit, H.

    2016-12-01

    Long-term monitoring permafrost thermal state and active layer thickness (ALT) is critical in providing the baseline for assessment of climate change impacts in polar and high mountain regions, modeling of ecosystem processes and as an input for many engineering applications on permafrost among others. The Global Terrestrial Network for Permafrost (GTN-P) provides systematic long-term measurements of permafrost temperature and ALT, and is part of the Global Terrestrial Observing System (GTOS) of the Global Climate Observing System (GCOS). The GTN-P launched a sophisticated data management system (DMS), which allows automatic data submission, standardization, quality control, and processing. Presently 1250 permafrost boreholes and 250 active layers sites are registered within the DMS (gtnpdatabase.org), but the geographic distribution of sites and length of observations vary considerably among regions. Using DMS capabilities we selected sites with data available during the last International Polar Year (IPY) and in the recent 4 years and estimated changes in thermal state of permafrost and active layer thickness between the two reference periods. The results show that following air temperature trends, permafrost temperature has generally increased across permafrost domain, however, there is considerable spatial variability. The highest increases in permafrost temperature are found in Canadian High Arctic and are pronounced in regions with cold continuous permafrost such as Siberia and North America. In the sub-arctic, where permafrost temperatures are relatively high, the warming trend is less pronounced and permafrost temperature is similar to that of the IPY snapshot. In alpine permafrost areas, however, most measurement sites also show significant warming since 2009. ALT exhibits large interannual variability, but has generally increased in the majority of regions, especially in European Arctic sector where several sites experienced permafrost degradation. In

  3. Single Layer Recurrent Neural Network for detection of swarm-like earthquakes in W-Bohemia/Vogtland - the method

    Czech Academy of Sciences Publication Activity Database

    Doubravová, Jana; Wiszniowski, J.; Horálek, Josef

    2016-01-01

    Roč. 93, August (2016), s. 138-149 ISSN 0098-3004 R&D Projects: GA ČR GAP210/12/2336; GA MŠk LM2010008 Institutional support: RVO:67985530 Keywords : event detection * artificial neural network * West Bohemia/Vogtland Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 2.533, year: 2016

  4. The multi-layer network nature of systemic risk and its implications for the costs of financial crises

    NARCIS (Netherlands)

    Poledna, S.; Molina-Borboa, J.L.; Martínez-Jaramillo, S.; van der Leij, M.; Thurner, S.

    2015-01-01

    The inability to see and quantify systemic financial risk comes at an immense social cost. Systemic risk in the financial system arises to a large extent as a consequence of the interconnectedness of its institutions, which are linked through networks of different types of financial contracts, such

  5. Resilient protein co-expression network in male orbitofrontal cortex layer 2/3 during human aging.

    Science.gov (United States)

    Pabba, Mohan; Scifo, Enzo; Kapadia, Fenika; Nikolova, Yuliya S; Ma, Tianzhou; Mechawar, Naguib; Tseng, George C; Sibille, Etienne

    2017-10-01

    The orbitofrontal cortex (OFC) is vulnerable to normal and pathologic aging. Currently, layer resolution large-scale proteomic studies describing "normal" age-related alterations at OFC are not available. Here, we performed a large-scale exploratory high-throughput mass spectrometry-based protein analysis on OFC layer 2/3 from 15 "young" (15-43 years) and 18 "old" (62-88 years) human male subjects. We detected 4193 proteins and identified 127 differentially expressed (DE) proteins (p-value ≤0.05; effect size >20%), including 65 up- and 62 downregulated proteins (e.g., GFAP, CALB1). Using a previously described categorization of biological aging based on somatic tissues, that is, peripheral "hallmarks of aging," and considering overlap in protein function, we show the highest representation of altered cell-cell communication (54%), deregulated nutrient sensing (39%), and loss of proteostasis (35%) in the set of OFC layer 2/3 DE proteins. DE proteins also showed a significant association with several neurologic disorders; for example, Alzheimer's disease and schizophrenia. Notably, despite age-related changes in individual protein levels, protein co-expression modules were remarkably conserved across age groups, suggesting robust functional homeostasis. Collectively, these results provide biological insight into aging and associated homeostatic mechanisms that maintain normal brain function with advancing age. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-device Communication Underlaying Cellular Networks

    Science.gov (United States)

    Qu, Junyue; Cai, Yueming; Wu, Dan; Chen, Hualiang

    2014-05-01

    The problem of power allocation for device-to-device (D2D) underlay communication to improve physical layer security is addressed. Specifically, to improve the secure communication of the cellular users, we introduce a Stackelberg game for allocating the power of the D2D link under a total power constraint and a rate constraint at the D2D pair. In the introduced Stackelberg game the D2D pair works as a seller and the cellular UEs work as buyers. Firstly, because the interference signals from D2D pair are unknown to both the legitimate receiver and the illegitimate eavesdropper, it is possible that a cellular UE decline to participate in the introduced Stackelberg game. So the condition under which a legitimate user will participate in the introduced Stackelberg game is discussed. Then, based on the Stackelberg game, we propose a semi-distributed power allocation algorithm, which is proved to conclude after finite-time iterations. In the end, some simulations are presented to verify the performance improvement in the physical layer security of cellular UEs using the proposed power allocation algorithm. We can determine that with the proposed algorithm, while the D2D pair's communication demand is met, the physical layer security of cellular UEs can be improved.

  7. Design of modified structure multi-layer perceptron networks based on decision trees for the prediction of flow parameters in 90° open-channel bends

    Directory of Open Access Journals (Sweden)

    Azadeh Gholami

    2016-01-01

    Full Text Available A modified multi-layer perceptron (MLP model based on decision trees (DT-MLP is presented to predict velocity and water free-surface profiles in a 90° open-channel bend. The ability of the new hybrid model to predict the velocity and flow depth in a 90° sharp bend is investigated and compared with the abilities of MLP and multiple-linear regression (MLR models. The MLP and DT-MLP networks are trained and tested using 520 and 506 experimental data measured for velocity and flow depth, respectively, at five different discharge rates of 5, 7.8, 13.6, 19.1 and 25.3 l/s. The MLP and DT-MLP comparison results against MLR reveal that the two artificial neural networks (ANNs are 84% and 16% more accurate than the MLR model in predicting the velocity and flow depth variables, respectively. According to the results, the root mean square error (RMSE value of the DT-MLP model decreases by 9% and 7.5% in predicting velocity and flow depth, respectively, compared with the MLP model. It was found that the hybrid decision-tree-based method can significantly improve MLP neural network performance in forecasting velocity and free-surface profiles in a 90° open-channel bend.

  8. The social brain: scale-invariant layering of Erdős-Rényi networks in small-scale human societies.

    Science.gov (United States)

    Harré, Michael S; Prokopenko, Mikhail

    2016-05-01

    The cognitive ability to form social links that can bind individuals together into large cooperative groups for safety and resource sharing was a key development in human evolutionary and social history. The 'social brain hypothesis' argues that the size of these social groups is based on a neurologically constrained capacity for maintaining long-term stable relationships. No model to date has been able to combine a specific socio-cognitive mechanism with the discrete scale invariance observed in ethnographic studies. We show that these properties result in nested layers of self-organizing Erdős-Rényi networks formed by each individual's ability to maintain only a small number of social links. Each set of links plays a specific role in the formation of different social groups. The scale invariance in our model is distinct from previous 'scale-free networks' studied using much larger social groups; here, the scale invariance is in the relationship between group sizes, rather than in the link degree distribution. We also compare our model with a dominance-based hierarchy and conclude that humans were probably egalitarian in hunter-gatherer-like societies, maintaining an average maximum of four or five social links connecting all members in a largest social network of around 132 people. © 2016 The Author(s).

  9. Processing of abstract rule violations in audition.

    Directory of Open Access Journals (Sweden)

    Erich Schröger

    Full Text Available The ability to encode rules and to detect rule-violating events outside the focus of attention is vital for adaptive behavior. Our brain recordings reveal that violations of abstract auditory rules are processed even when the sounds are unattended. When subjects performed a task related to the sounds but not to the rule, rule violations impaired task performance and activated a network involving supratemporal, parietal and frontal areas although none of the subjects acquired explicit knowledge of the rule or became aware of rule violations. When subjects tried to behaviorally detect rule violations, the brain's automatic violation detection facilitated intentional detection. This shows the brain's capacity for abstraction - an important cognitive function necessary to model the world. Our study provides the first evidence for the task-independence (i.e. automaticity of this ability to encode abstract rules and for its immediate consequences for subsequent mental processes.

  10. Modelling the Flow Stress of Alloy 316L using a Multi-Layered Feed Forward Neural Network with Bayesian Regularization

    Science.gov (United States)

    Abiriand Bhekisipho Twala, Olufunminiyi

    2017-08-01

    In this paper, a multilayer feedforward neural network with Bayesian regularization constitutive model is developed for alloy 316L during high strain rate and high temperature plastic deformation. The input variables are strain rate, temperature and strain while the output value is the flow stress of the material. The results show that the use of Bayesian regularized technique reduces the potential of overfitting and overtraining. The prediction quality of the model is thereby improved. The model predictions are in good agreement with experimental measurements. The measurement data used for the network training and model comparison were taken from relevant literature. The developed model is robust as it can be generalized to deformation conditions slightly below or above the training dataset.

  11. Abstraction of man-made shapes

    KAUST Repository

    Mehra, Ravish

    2009-01-01

    Man-made objects are ubiquitous in the real world and in virtual environments. While such objects can be very detailed, capturing every small feature, they are often identified and characterized by a small set of defining curves. Compact, abstracted shape descriptions based on such curves are often visually more appealing than the original models, which can appear to be visually cluttered. We introduce a novel algorithm for abstracting three-dimensional geometric models using characteristic curves or contours as building blocks for the abstraction. Our method robustly handles models with poor connectivity, including the extreme cases of polygon soups, common in models of man-made objects taken from online repositories. In our algorithm, we use a two-step procedure that first approximates the input model using a manifold, closed envelope surface and then extracts from it a hierarchical abstraction curve network along with suitable normal information. The constructed curve networks form a compact, yet powerful, representation for the input shapes, retaining their key shape characteristics while discarding minor details and irregularities. © 2009 ACM.

  12. Munatsi Shoko Abstract After leaving their home country ...

    African Journals Online (AJOL)

    Munatsi Shoko Abstract After leaving their home country, international migrants are faced with a challenge to seek a new family, friends, support networks, accommodation and employment. Married migrants may be forced to live separately from their spouses.

  13. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  14. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  15. Grounding abstractness: Abstract concepts and the activation of the mouth

    Directory of Open Access Journals (Sweden)

    Anna M Borghi

    2016-10-01

    Full Text Available One key issue for theories of cognition is how abstract concepts, such as freedom, are represented. According to the WAT (Words As social Tools proposal, abstract concepts activate both sensorimotor and linguistic/social information, and their acquisition modality involves the linguistic experience more than the acquisition of concrete concepts. We report an experiment in which participants were presented with abstract and concrete definitions followed by concrete and abstract target-words. When the definition and the word matched, participants were required to press a key, either with the hand or with the mouth. Response times and accuracy were recorded. As predicted, we found that abstract definitions and abstract words yielded slower responses and more errors compared to concrete definitions and concrete words. More crucially, there was an interaction between the target-words and the effector used to respond (hand, mouth. While responses with the mouth were overall slower, the advantage of the hand over the mouth responses was more marked with concrete than with abstract concepts. The results are in keeping with grounded and embodied theories of cognition and support the WAT proposal, according to which abstract concepts evoke linguistic-social information, hence activate the mouth. The mechanisms underlying the mouth activation with abstract concepts (re-enactment of acquisition experience, or re-explanation of the word meaning, possibly through inner talk are discussed. To our knowledge this is the first behavioral study demonstrating with real words that the advantage of the hand over the mouth is more marked with concrete than with abstract concepts, likely because of the activation of linguistic information with abstract concepts.

  16. Grounding Abstractness: Abstract Concepts and the Activation of the Mouth.

    Science.gov (United States)

    Borghi, Anna M; Zarcone, Edoardo

    2016-01-01

    One key issue for theories of cognition is how abstract concepts, such as freedom, are represented. According to the WAT (Words As social Tools) proposal, abstract concepts activate both sensorimotor and linguistic/social information, and their acquisition modality involves the linguistic experience more than the acquisition of concrete concepts. We report an experiment in which participants were presented with abstract and concrete definitions followed by concrete and abstract target-words. When the definition and the word matched, participants were required to press a key, either with the hand or with the mouth. Response times and accuracy were recorded. As predicted, we found that abstract definitions and abstract words yielded slower responses and more errors compared to concrete definitions and concrete words. More crucially, there was an interaction between the target-words and the effector used to respond (hand, mouth). While responses with the mouth were overall slower, the advantage of the hand over the mouth responses was more marked with concrete than with abstract concepts. The results are in keeping with grounded and embodied theories of cognition and support the WAT proposal, according to which abstract concepts evoke linguistic-social information, hence activate the mouth. The mechanisms underlying the mouth activation with abstract concepts (re-enactment of acquisition experience, or re-explanation of the word meaning, possibly through inner talk) are discussed. To our knowledge this is the first behavioral study demonstrating with real words that the advantage of the hand over the mouth is more marked with concrete than with abstract concepts, likely because of the activation of linguistic information with abstract concepts.

  17. Abstract shape analysis of RNA.

    Science.gov (United States)

    Janssen, Stefan; Giegerich, Robert

    2014-01-01

    Abstract shape analysis abstract shape analysis is a method to learn more about the complete Boltzmann ensemble of the secondary structures of a single RNA molecule. Abstract shapes classify competing secondary structures into classes that are defined by their arrangement of helices. It allows us to compute, in addition to the structure of minimal free energy, a set of structures that represents relevant and interesting structural alternatives. Furthermore, it allows to compute probabilities of all structures within a shape class. This allows to ensure that our representative subset covers the complete Boltzmann ensemble, except for a portion of negligible probability. This chapter explains the main functions of abstract shape analysis, as implemented in the tool RNA shapes. RNA shapes It reports on some other types of analysis that are based on the abstract shapes idea and shows how you can solve novel problems by creating your own shape abstractions.

  18. Brine network structural metamorphosis and sea ice bottom layer permeability change induced by sea water penetration under a surface pressure field

    Science.gov (United States)

    Hudier, E. J.

    2013-12-01

    Sea ice presents two roughness scales: one in the millimetre range and the other up to several meters due to ridging. The larger roughness elements are the result of compression and sheer, causing ice blocks to pile up and down at the line of contact between converging ice floes. In terms of boundary limit dynamic, they create obstacles that induce, in their wake, a pressure gradient at the ice water interface. Sea ice is a porous medium and as such, is permeable when subject to pressure gradients. Models have shown that, at spring, when ice permeability increases, sea water can be forced through the ice water interface into the bottom ice layer while brine is pumped out of it under obstacle induced pressure gradients. These results suggest that ice ocean heat budgets have to include a porous flow component and its associated latent heat import/export caused by through volume melting/thawing inside the bottom ice layer subject to sea water infiltration. With the initiation of a melt/thaw dynamic within the porous bottom ice layer, the porous network restructures. Our research show an enlargement of the larger brine channels while smaller ones close due ice growth. Similarly, ice volume of smaller cross size tend to disappear while larger ones evolve slowly. As heat fluxes due to latent heat exchanges become several orders of magnitude larger than any other exterior forcing, such as radiation, heat budgets within ice individual volumes balance fluxes in and out caused by melting/thaw on channel walls. Our simulations were run from an early spring C shape temperature profile to an isothermal state showing that structural change becomes significant only after the temperature profile becomes positive upward.

  19. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks.

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2016-10-17

    In this paper, we consider a transmit power allocation problem for secure transmission in multi-hop decode-and-forward (DF) full-duplex relay (FDR) networks, where multiple FDRs are located at each hop and perform cooperative beamforming to null out the signal at multiple eavesdroppers. For a perfect self-interference cancellation (PSIC) case, where the self-interference signal at each FDR is completely canceled, we derive an optimal power allocation (OPA) strategy using the Karush-Kuhn-Tucker (KKT) conditions to maximize the achievable secrecy rate under an overall transmit power constraint. In the case where residual self-interferences exist owing to imperfect self-interference cancellation (ISIC), we also propose a transmit power allocation scheme using the geometric programming (GP) method. Numerical results are presented to verify the secrecy rate performance of the proposed power allocation schemes.

  20. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks

    Directory of Open Access Journals (Sweden)

    Jong-Ho Lee

    2016-10-01

    Full Text Available In this paper, we consider a transmit power allocation problem for secure transmission in multi-hop decode-and-forward (DF full-duplex relay (FDR networks, where multiple FDRs are located at each hop and perform cooperative beamforming to null out the signal at multiple eavesdroppers. For a perfect self-interference cancellation (PSIC case, where the self-interference signal at each FDR is completely canceled, we derive an optimal power allocation (OPA strategy using the Karush-Kuhn-Tucker (KKT conditions to maximize the achievable secrecy rate under an overall transmit power constraint. In the case where residual self-interferences exist owing to imperfect self-interference cancellation (ISIC, we also propose a transmit power allocation scheme using the geometric programming (GP method. Numerical results are presented to verify the secrecy rate performance of the proposed power allocation schemes.

  1. Estimation of MHD boundary layer slip flow over a permeable stretching cylinder in the presence of chemical reaction through numerical and artificial neural network modeling

    Directory of Open Access Journals (Sweden)

    P. Bala Anki Reddy

    2016-09-01

    Full Text Available In this paper, the prediction of the magnetohydrodynamic boundary layer slip flow over a permeable stretched cylinder with chemical reaction is investigated by using some mathematical techniques, namely Runge–Kutta fourth order method along with shooting technique and artificial neural network (ANN. A numerical method is implemented to approximate the flow of heat and mass transfer characteristics as a function of some input parameters, explicitly the curvature parameter, magnetic parameter, permeability parameter, velocity slip, Grashof number, solutal Grashof number, Prandtl number, temperature exponent, Schmidt number, concentration exponent and chemical reaction parameter. The non-linear partial differential equations of the governing flow are converted into a system of highly non-linear ordinary differential equations by using the suitable similarity transformations, which are then solved numerically by a Runge–Kutta fourth order along with shooting technique and then ANN is applied to them. The Back Propagation Neural Network is applied for forecasting the desired outputs. The reported numerical values and the ANN values are in good agreement than those published works on various special cases. According to the findings of this study, the ANN approach is reliable, effective and easily applicable for simulating heat and mass transfer flow over a stretched cylinder.

  2. Modeling the Liquid Water Transport in the Gas Diffusion Layer for Polymer Electrolyte Membrane Fuel Cells Using a Water Path Network

    Directory of Open Access Journals (Sweden)

    Dietmar Gerteisen

    2013-09-01

    Full Text Available In order to model the liquid water transport in the porous materials used in polymer electrolyte membrane (PEM fuel cells, the pore network models are often applied. The presented model is a novel approach to further develop these models towards a percolation model that is based on the fiber structure rather than the pore structure. The developed algorithm determines the stable liquid water paths in the gas diffusion layer (GDL structure and the transitions from the paths to the subsequent paths. The obtained water path network represents the basis for the calculation of the percolation process with low calculation efforts. A good agreement with experimental capillary pressure-saturation curves and synchrotron liquid water visualization data from other literature sources is found. The oxygen diffusivity for the GDL with liquid water saturation at breakthrough reveals that the porosity is not a crucial factor for the limiting current density. An algorithm for condensation is included into the model, which shows that condensing water is redirecting the water path in the GDL, leading to an improved oxygen diffusion by a decreased breakthrough pressure and changed saturation distribution at breakthrough.

  3. Recognition memory for concrete, regular abstract, and diverse abstract pictures.

    Science.gov (United States)

    Bellhouse-King, Mathew W; Standing, Lionel G

    2007-06-01

    Based on previous research by Goldstein and Chance in which poor recognition memory for abstract visual patterns was reported, this study compared recognition memory for pictures of everyday concrete objects, regular abstract stimuli as employed by Goldstein and Chance, and diverse abstract stimuli. A (3) x 2 design (stimulus type x test order) analysis of variance design was used. The subjects (N = 31) first viewed 30 target stimuli, followed by an immediate recognition test in which for 30 paired target and distractor stimuli shown they indicated which one they had seen previously. Concrete pictures were recognized with near perfect accuracy, and above the level for diverse abstract pictures; these in turn were better identified than regular abstract items, on which performance resembled that found by Goldstein and Chance. It is concluded that stimulus discriminability, rather than representational meaningfulness, may be crucial in picture recognition.

  4. SOVIET ABSTRACTS ON POWDER METALLURGY

    Science.gov (United States)

    CERMETS, * POWDER METALLURGY , ABSTRACTS, CERAMIC MATERIALS, HEAT RESISTANT ALLOYS, INDUSTRIAL PRODUCTION, MECHANICAL PROPERTIES, PIEZOELECTRIC CRYSTALS, POLARIZATION, POROUS METALS, POWDER ALLOYS, POWDER METALS, SINTERING.

  5. Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    West African Journal of Industrial and Academic Research Vol.9 No.1 December 2013 62. After the design, it was coded using Visual basic 6.0, hyper text markup language (HTML) integrating Microsoft Agent and Microsoft Access at the back end .The general interface of the authoring system is as shown in the figure below.

  6. Abstract

    African Journals Online (AJOL)

    circles are further broken down in the zones, for convenience and effective supervision training and visit. The blocks are made up of many communities with the block extension supervisor resident and controlling all field visits in the block. The Extension Agents (EAs) are resident in the circle, and each circle consist of about ...

  7. abstract

    Directory of Open Access Journals (Sweden)

    . user

    2016-02-01

    Full Text Available Introduction: One of the microbiological preparations used for this study was Effective Microorganisms (EM, being a commercial mixture of photosynthesizing bacteria, Actinomycetes, lactic acid bacteria, yeasts and fermenting fungi. The microbiological composition of the EM concentrateincludesStreptomyces albus, Propioni bacterium freudenreichil, Streptococcus lactis, Aspergillus oryzae, Mucor hiemalis, Saccharomycescerevisiae and Candida utilis. Moreover, EM also contains an unspecified amount of Lactobacillus sp. Rhodo pseudomonas sp. and Streptomyces griseus. Effective Microorganisms have a positive effect on the decomposition of organic matter, limiting putrefaction, increasing nitrogen content in the root medium of plants, phosphorus, improving soil fertility and as a result contributing to the growth and development of the root systems of plants. Selection of almond vegetative rootstocks for water stress tolerance is important for almond crop production in arid and semi-arid regions. The study of the eco-morphological characteristics that determine the success of a rootstock in a particular environment is a powerful tool for both agricultural management and breeding purposes. The aim of this work was to select the new rootstocks for water shortage tolerance, impact of water stress as well as Effective Microorganism (EM on morphological characteristics of almond rootstocks. Materials and Methods: In order to select the new rootstocks for water shortage tolerance, impact of water stress as well as EMonmorphologicalcharacteristics of almondrootstocks were studiedin thedepartment ofHorticulture, Ferdowsi University of Mashhad, in 2011-2012. The experiment was carried out with four replications in a completely random blockdesign to study the effects of two concentrations of EM (0 and 1%, three irrigation levels (normal irrigation 100%-control-and irrigation after depletion of 33 and 66% of available water, and four almond rootstocks including GF677 and selected natural hybrid of peach × almond (H1and H2, and almond vegetative rootstock (local control.In this study,EMtreatments for 60 days before stress treatments were applied so that in each irrigation, EM solution to a concentration of one percent was given to half of the experiment pots. Other pots were irrigated equally with normal water. Stress levels were applied from July as follow: full irrigation, watering after unloading 33% and 66% soil moisture availability. In order to evaluate the performance, seedling survival, plant growth, number of leaves, leaf area, root fresh and dry weight and leaves and root length were measured. Results and Discussion: Analysis of variance showed that between rootstock levels across all treatments were significantly differences at 0.01 level of probability. Comparison of means showed that the highest fresh and dry weight and leaf are awere observed forGF677and H1.Rootstockannualgrowth rate was also different. Most of the growth was related to the H1 Rootstocks. Thes urvival ratewas significantly different from the Rootstocks ofGF677,andH1showedthe highestpercentage of survival. The degree of adaptation to drought in varieties of almonds is different. The results showed that changes ingrowthparametersinGF677and H1were observed less often than other rootstocks. Because of strong roots,GF677and H1continue to attract more minerals under stress conditions. Analysis of variance showed that the between irrigation levels for all treatments were significantly different at 0.01 level of probability. Comparison of means showed that among the study traits, the highest amount was obtained from complete irrigation, while irrigationat66 percenthad the least amount. Water stress may directly affect photosyn thesis, through leaf photochemicalprocessorindirectly,byclosing stomata, reducingleaf area and growth. The results showed that the levels of(EM on the leaf surface, leaf number, annual growth, root dry weight and volume were significantly different (p

  8. ABSTRACT

    Directory of Open Access Journals (Sweden)

    Michelle de Stefano Sabino

    2011-12-01

    Full Text Available This paper aims to describe and to analyze the integration observed in the Sintonia project with respect to the comparison of project management processes to the model of the Stage-Gate ®. The literature addresses these issues conceptually, but lack an alignment between them that is evident in practice. As a method was used single case study. The report is as if the Sintonia project, developed by PRODESP - Data Processing Company of São Paulo. The results show the integration of project management processes with the Stage-Gate model developed during the project life cycle. The formalization of the project was defined in stages in which allowed the exploitation of economies of repetition and recombination to the development of new projects. This study contributes to the technical vision in dealing with the integration of project management processes. It was concluded that this system represents an attractive way, in terms of creating economic value and technological innovation for the organization.

  9. Abstract

    African Journals Online (AJOL)

    concern include peer counselling and meetings with local community leaders or local cultural representatives. ... Dr Kyriaki Mystakidou is Associate Professor at the Department of Radiology, Areteion Hospital, University of Athens and in charge of the Pain ... and developing new strategies for treatment and prevention.

  10. ABSTRACT

    African Journals Online (AJOL)

    result of traumatic injury to the thoracic duct, the cisterna chyli, or the retroperitoneal lymphatic vessels. We report a case of a 56 year old female with thoracic spine disc prolapses with cord compression. She had chylous leakage following anterior .... or via nasogastric tube. This induces a change in the colour or the fluid ...

  11. abstract

    African Journals Online (AJOL)

    Deterioration of seed quality after harvest may occur as a result of chemical reactions brought ... It is an evidence of spoilage. ... food reserves. Early August may therefore be the best time to collect seeds for storage. Transportation ' ' '. Care should be taken in transporting seeds from the site of collection, in order to ensure.

  12. Abstract

    African Journals Online (AJOL)

    Getachew

    Keywords: Overbooking, Monte Carlo Simulation, Nelder Mead algorithm, Revenue management, Ethiopian ..... direct search algorithms, namely, the Nelder Mead and Genetic Algorithms were used to solve the .... MatLab codes used to calculate the optimal number of overbooking, expected net revenue, and probability of ...

  13. Abstract

    Indian Academy of Sciences (India)

    18

    -friendly method of preservation and has been extensively studied to extend the shelf-life of food products. For example it has also been used to protect the grain and seeds from insect infestation and microbial contamination during storage ...

  14. ABSTRACT

    African Journals Online (AJOL)

    concluded that financing of these enterprises on gender basis would not significantly improve the contribution of ruminants to farm household net income and loan repayment capacity. It was recommended, among others, that the constraints imposed by factors such as poor marketing and research systems be addressed in ...

  15. Abstracts

    National Research Council Canada - National Science Library

    2016-01-01

    ... نوع المؤسسة التي تدعموها. وتتفاقم عواقب انعدام الاستقرار الاقتصادي المُستمر بحجم الدوران الوظيفي غير الاعتيادي للقيادات المكتبية، ولذلك يتطلب هذا الدوران إمدادات...

  16. ABSTRACT

    African Journals Online (AJOL)

    farmers in Ondo Statel Nigeria and its implication for food security. A .... has fertile soils, a tropical climate, abundant land and rain, and a staple diet based on ... domestic productive labour interface by diverting women's labour to care for .... HIV/AIDS thereby limiting their access to information about the deadly disease.

  17. Abstract

    African Journals Online (AJOL)

    Maureen L Chirwa is a Senior Lecturer, University of Malawi, specialising in health management and health systems. ..... and job satisfaction. The HASI-N was inductively derived and measures the stigma experienced and enacted by nurses (Uys et al., 2009). 3. HASI-P (HIV/AIDS Stigma Instrument – People Living With.

  18. abstract

    African Journals Online (AJOL)

    development in Nigeria. Nevertheless, having attempted yo' conceptualize the ' terms cooperatives and rural development, the paper'reveals that attempts by government to mobilize cooperatives to achieve rural development have not worked out. This, the paper attributed to government involvement in cooperatives, role of ...

  19. Abstract

    DEFF Research Database (Denmark)

    Tafdrup, Oliver

    2013-01-01

    Udgivet som en del af Tidskrifts specialudgivelse om Adorno. http://tidskrift.dk/data/50/Aforismesamling.pdf......Udgivet som en del af Tidskrifts specialudgivelse om Adorno. http://tidskrift.dk/data/50/Aforismesamling.pdf...

  20. abstract

    African Journals Online (AJOL)

    variables associated with technology changes and information needs. it is important to put into perspective the roles of information, communication and institutions activities in removing constraints which impede the acceptance and continued usage of technologies. Part of the solution to the earlier mentioned constraint is ...

  1. ABSTRACT

    African Journals Online (AJOL)

    that trip generation and trip attraction can be significantly season- detenwned. ... recommendations were then made, sequel to highlighting of policy implications of .... It is recommended that bus operator should increase their fleet size yearly to take advantage of the secular rend of growing annual demand for bus travel.

  2. Abstract

    African Journals Online (AJOL)

    From 2008 she has been working as a physician at the Pain Relief and Palliative Care Unit of Areteion Hospital, Department of Athens University Medical. School. .... Organizations of Medical Sciences (CIOMS, 2002): disclosure of all relevant ... to sex, relationship to older persons, and the caregiving arrangement (Shaibu ...

  3. Abstract

    African Journals Online (AJOL)

    Dr Osondu

    2011-10-26

    Oct 26, 2011 ... average travel cost between demand locations and facilities. a) Center problems (minimax problems): ... median problem, minimum travel cost is substituted with distance and waste generation points can then be allocated ... demand distributed in space. Several GIS software packages such as ArcInfo and ...

  4. abstract

    Directory of Open Access Journals (Sweden)

    abstract abstract

    2016-07-01

    Full Text Available Introduction: Strawberry (fragaria×ananassa Duch. fruit characterized by short storage life, often estimated last less than one week even under optimum conditions at 8°C. The loss of fruit quality is often caused by gray mold (Botrytis cinerea that is the most frequent reported postharvest disease in strawberry during storage (6. In recent years, considerable attention has given to elimination of synthetic chemical and fungicides application and development of various alternative strategies for controlling fruit and vegetables diseases (2. One strategy is replacement of natural products with plant origin such as essential oil and methyl salicylate (MeSA. Essential oils are volatile, natural and complex compounds characterized by a strong odor formed by aromatic plants in form of secondary metabolites. In nature, essential similar oils that extract from lavender (Lavandula angustifolia play an important role in protection of the plants against pathogen incidence that can be replaced by synthetic fungicides (1, 4 and 14. MeSA is also a volatile natural compound synthesized from salicylic acid which has an important role in the plant defense-mechanism, as well as plant growth and development (5, 19 and 20. Therefore, the main objective of this research was to study the effects of MeSA and lavender essential oil (LEO on decay control caused by Botrytis cinerea as well as post-harvest quality indices of strawberry fruits during cold storage. Material and Methods: First, antifungal activity was studied by using a contact assay (in vitro, which produces hyphal growth inhibition. Briefly, potato dextrose agar (PDA plates were prepared using 8 cm diameter glass petri dishes and inhibitory percentage was determined. For in-vivo assessment of LEO and MeSA effects on Botrytis-caused fungal disease control, the experiment was conducted as factorial in completely randomized design (CRD with 3 replicates. The treatments were 3 concentration of LEO including 0, 500 and 1000 µl L-1 and 3 level of MeSA including 0, 0.1 and 0.2 mM. After treatment, the fruits were inoculated by Botrytis suspension and transferred to storage and quality parameters were evaluated after 7, 14 and 21 days. At each sampling time, disease incidence, weight loss, titratable acidity, pH, soluble solids content, vitamin C and antioxidant activity were measured. Results and Discussion: The results showed that both LEO and MeSA treatments had significant effects on inhibition of mycelium growth within in-vitro condition (p < 0.05. Inhibition rate of mycelium growth significantly improved by LEO and MeSA concentration increase of, (Table 1. At in-vivo assessment, diseases incidence of treated fruits with 500 µl L-1 LEO and 0.1 mM MeSA were 32% and 64% lower than untreated fruits, respectively (Fig. 1 and 2. During storage period, the percentage of infected fruits increased. In addition, LEO and MeSA treatments affected quality parameters of strawberry fruits including titratable acidity, soluble solids content, vitamin C and antioxidant activity. Treated fruits had a high content of soluble solids, vitamin C and antioxidant activity in comparison to untreated fruits (Table 3 and 4. Probably ascorbic acid decreased through fungal infection duo to cell wall break down during storage. Any factors such as essential oil and salicylate that inhibit fungal growth can help preserving vitamin C in stored products. High level of vitamin C and antioxidant activity was observed in treated fruits with 0.1 mM MeSA and 500 µl L-1 LEO. In controlling weight loss of fruits, 0.2 mM of MeSA and 500 µl L-1 of LEO had significant effects, although MeSA was more effective than LEO treatments, possibly due to elimination of respiration rates and fungi infection (Table 4. Therefore, LEO and MeSA with fungicide effects could be replaced with synthetic fungicides in controlling fungal diseases of strawberry and maintain fruits quality during storage. Conclusion: In conclusion, our results showed that LEO and MeSA treatments could be safe and used to prevent infection of strawberry during storage, although LEO was more effective than MeSA treatments. Concentration of 500 μl L-1 of LEO and 0.1 mM MeSA could control fungal infection of fruits during storage. Also, LEO and MeSA treatments can extend shelf life for over the minimum period required to transit strawberries to foreign markets and without affecting quality, adversely. However, future studies are necessary to fully understand the mechanisms by which LEO and MeSA treatments may act as a fungicide and increase their postharvest life.

  5. Abstracts

    National Research Council Canada - National Science Library

    2012-01-01

    ... المكتبات والمعلومات على المستوى العالمي. يتناول المقال ثلاث فترات: الأولى من عام 1947م إلى عام م1977، عندما عملت الإفلا عن قرب مع قسم المكتبات التابع لليونسكو (الذي...

  6. Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    forms and be delivered on different platform. (computer, mobile phone and printed document). They usually ... (Manipulative and observant). When learning about things in natural contexts, humans interact with ..... should also be geared towards developing authoring systems that will handle Simulation and Virtual Reality:.

  7. Abstracts

    National Research Council Canada - National Science Library

    2014-01-01

    ... الإنترنت كبديل، الذي يُقدم طرق أرخص وأسرع وأسهل كي تقوم المكتبات بالدعاية لأفضل مُقتنياتها، ولكن ما دور هذه المُجلدات وما مدى نجاحها في أن تكون محتوياتها مؤشرًّا...

  8. ABSTRACT

    African Journals Online (AJOL)

    Dr Obe

    The function of the frame system in a structure is to carry loads (dead, imposed and wind) acting on the structure. The frames ... structure's subsequent behaviour on the sub-base (soil) which is elastic in nature (5) has more to be desired: The paper investigates the ..... Building and Architecture Publisher,. Warsaw, 1996 ...

  9. Abstract

    African Journals Online (AJOL)

    The advances in electronic technology have created opportunities for new ... the necessary knowledge (both practical) on people to enable them survive in a ... Implementing this collaborative e-learning environment on a Linux thin-client ...

  10. Abstract

    African Journals Online (AJOL)

    ­E¢b

    (emotional stability and independence). So, the reviewed literature showed both the prevalence and the non-prevalence of gender differences on entrepreneurship. Methodology. Sampling: This study focused on privately owned pharmaceutical retail outlets that are found in Addis Ababa. According to. Ministry of Health ...

  11. ABSTRACT

    African Journals Online (AJOL)

    BSN

    pods and closed. It has been claimed that milk pn .. :.erved for 1-3 days maintains its original texture. taste and odour. Cowpca is an indigenous crop of Africa where it is eaten as processed dry grain. green pods. and tender green leaves. Co" pea grain has high protein content up to 24 percent. It is a seasonal plant with ...

  12. ABSTRACT

    Indian Academy of Sciences (India)

    During the last three decades or so research on rock art in several parts of the world has assumed great proportions. The study has progressed from the stage of discovery of rock shelters, identification of animals depicted in, animal distribution pattern during the periods of depiction and their extensions in the past ...

  13. ABSTRACT

    African Journals Online (AJOL)

    found that employment and education were the major reasons for rural- urban migration. It was also found that the migration affected various agricultural activities seriously. The study found that with the absence of youths in the area, agriculture labour force is continually costly and this has a negative effect on agricultural ...

  14. Abstracts

    National Research Council Canada - National Science Library

    2017-01-01

    ...، ويستكشف مُتطلبات النساء في هذه المناطق من المعلومات المُتعلقة بالصحة الإنجابية، إن أكثر من800 امرأة تموت كل يوم لأسباب مُتعلقة بالحمل، 99% منهم في الدول النامية، كان...

  15. Abstracts

    National Research Council Canada - National Science Library

    2013-01-01

    ...قتطفات وأد وثيقة الحق في المعلومات في بتسوانا:ًّ Emmanuel Kopang Botlhale Kaelo Molefhe العدد 39 (2013) من مجلة الإفلا المُتخصصة، رقم 3، ص.:204–213 تُناقش هذه...

  16. Abstract

    African Journals Online (AJOL)

    Getachew

    revenue management in the airline industry. The first overbooking model proposed by. Beckmann was a single leg single fare-class problem, which is a very simplified form of the actual overbooking problem that airline faces. His model tries to determine the optimal overbooking level by balancing the spoilage cost (lost ...

  17. Abstract

    African Journals Online (AJOL)

    dell

    work substituting the classroom teacher, students will practice for 8 weeks like that of practicum III. 1.6. Practicum V (Research. Project) (Prac 302) [3 cr. hrs]. This is the last phase of the practicum courses. During this course the student teacher finalizes his or her action research that was started during practicum two. Hence.

  18. Abstract

    Directory of Open Access Journals (Sweden)

    Maria Jose Carvalho de Souza Domingues

    2003-01-01

    Full Text Available The practice of teaching, in actuality, shows the necessity of teachers and students coming together to form a behavior that is different from the traditional model of teaching. The unity formed from various types of knowledge and the relation between theory and practice show themselves to be fundamental. Starting in 2002, and in search of this unity, a project that hoped to unify the disciplines taught in the second semester of the course in Administration was implemented. During the semester, a single work sought to relate the theories studied with the reality of an organization. Each professor evaluated the works from the point of view of his discipline, as well as the presentation, in general, of the group. It can be affirmed that seeking to bring together various types of knowledge necessarily passes to a rethinking of the postures of teachers and students.

  19. Abstracts

    OpenAIRE

    2017-01-01

    Antoine Gaudin. “Fantastique” as a principle of composing: a question of narrative poetics The main goal of this paper is to state precisely the notion of “Fantastique” (as to call Horror Movies) in the theorical sphere, in order to build up a definition of the genre within the field of fiction arts. As an aesthetical category, Fantastique mainly consists in narrative poetics. This paper suggests a definition of the genre as a principle of composing. Keywords: horror movie, genre, narration, ...

  20. Abstract

    African Journals Online (AJOL)

    ATTAMAH C. O

    Climate change has been a major natural challenge facing entrepreneurship in agriculture especially livestock production (Anyadike, 2009), mainly arising from its impact on grassland and productivity. Heat stress suffered by animals will reduce the rate of animal feed intake and result in poor growth performance ...

  1. Abstracts

    National Research Council Canada - National Science Library

    2015-01-01

    ... Pearlstein العدد رقم 41،1 من مجلة الإفلا المُتخصصة: 5-12 لقد أعاقت الشبكات التي تُتيح قواعد بيانات النصوص الكاملة، عملية البحث في المكتبات الأكاديمية والمُشتركة، وقد...

  2. Abstracts

    National Research Council Canada - National Science Library

    2013-01-01

    ...–120 يُلقي هذا المقال نظرة شاملة على مشهد تطور المكتبات في سنغافورة. فقد لعبت مكتبة سنغافورة الوطنية وجامعة سنغافورة الوطنية دورًّا هامًّا في تأسيس المكتبات في هذه...

  3. Abstracts

    National Research Council Canada - National Science Library

    2015-01-01

    ... نقدية بأفكار مُستقبلية: Loriene Roy العدد رقم 41،3 من مجلة الإفلا المُتخصصة: تعرض هذه المُراجعة النقدية خبرات حفظ التراث الثقافي الخاص بالشعوب الأصلية في المكتبات...

  4. Abstracts

    National Research Council Canada - National Science Library

    2016-01-01

    ... مجلة الإفلا: المُلخص: تعمل الإدارة الوطنية لدراسة المحيطات والغلاف الجوي (NOAA) والمُنظمة الأوروبية لاستغلال السواتل المُخصصة للأرصاد الجوية (EUMETSAT) في ثلاثة...

  5. Abstract

    Indian Academy of Sciences (India)

    2017-03-10

    Mar 10, 2017 ... Genomic DNA from whole blood was extracted from peripheral blood leukocytes samples taken from patients and controls by standard methods (Gustincich et al. 1991). The rs6457617 and rs13192471 were genotyped with a TaqMan 5' allelic discrimination assay on an Applied Biosystems StepOne™ ...

  6. Abstract

    African Journals Online (AJOL)

    the Hyper Text Markup Language (HTML). This portal enabled the users of the collaborative e-learning environment to have access to the needed tools. 1 6.0 Implementation, Methodology and Updates. After 2X ThinClientOS has booted from the client's hard disk, it obtains the IP address of 2X ThinClientServer from the.

  7. Abstracts

    National Research Council Canada - National Science Library

    2013-01-01

    ... الورقة البحثية كون الحق في المعلومة أحد حقوق الإنسان الأساسية مُتبنية في ذلك منهجًّا قائمًّا على الحقوق. لذا؛ فالحكومات مُلزَمة بإتاحة المعلومات للمواطنين والتوقيع...

  8. Abstract

    African Journals Online (AJOL)

    unique firstlady

    The study hypothesized that the withdrawal of subsidy or increase in the price of Premium motor spirit (P.M.S) ... many substances mainly carbon and hydrogen usually referred to as hydrocarbon. Crude oil often called ... petrol in Nigeria, is used in sparking ignition engines, to dive pleasure cars and transport vehicles.

  9. ABSTRACT

    African Journals Online (AJOL)

    De DARWIN au géographe allemand RATZEL en passant par le zoologiste HEACKEL fondateur de l'Ecologie, il y ... Cette mondialisation qui a débuté au cours des années 80 se distingue par une activité accrue des ... d'origine allemande a même fondé en 1954 la "société par l'étude du système général". Il entendait par ...

  10. ABSTRACT

    African Journals Online (AJOL)

    According to Tindall (1989) the commercial production of vegetables is ... Growing vegetables is an old art in the West African sub region. Joy (1980) .... H. 111 в в. В в в о. 0н m. □^^^^^^^^^. □ щщщв. ^и^ш. □. □. ^^^п. N. (0. «л с га. § 2 £ ф. CL. 4-. (0. Ф га E £ 2. (А je. N га о>. О) со ф о». О. S ф r> со «s ^. E *. □о. O. Ф.

  11. Abstract

    African Journals Online (AJOL)

    UDS-CAPTURED

    difficult financial terrain in rural settings characterized by high covariant risks, missing markets for ... mining sector. This created the need to seek alternatives for the largely rural, non-business public who are also largely rural people, who were unbanked and outside of the commercial/investment banking system.

  12. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.

    2017-04-18

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  13. Abstract models of transfinite reductions

    DEFF Research Database (Denmark)

    Bahr, Patrick

    2010-01-01

    We investigate transfinite reductions in abstract reduction systems. To this end, we study two abstract models for transfinite reductions: a metric model generalising the usual metric approach to infinitary term rewriting and a novel partial order model. For both models we distinguish between a w...

  14. Abstract concepts in grounded cognition

    NARCIS (Netherlands)

    Lakens, D.|info:eu-repo/dai/nl/298811855

    2010-01-01

    When people think about highly abstract concepts, they draw upon concrete experiences to structure their thoughts. For example, black knights in fairytales are evil, and knights in shining armor are good. The sensory experiences black and white are used to represent the abstract concepts of good and

  15. Enhancing Physical Layer Security of Multiuser SIMO Mixed RF/FSO Relay Networks with Multi-Eavesdroppers

    KAUST Repository

    El-Malek, Ahmed H. Abd

    2017-02-09

    In this paper, we investigate the secrecy performance of multiuser (MU) single-input multiple-output (SIMO) mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling and multiple eavesdropping attacks. The considered system includes multiple users, one amplify-and-froward (AF) relay, one destination and multiple eavesdroppers. The users are connected with a multi-antenna relay through RF links and the relay is connected with the destination through an FSO link. Maximal ratio combining (MRC) scheme is used at the relay node to combine the received signals at its different antennas. The RF/FSO channels are assumed to follow Nakagami-m/Gamma-Gamma fading models with considering the effect of pointing errors. In particular, we derive closed- form expressions for the exact and asymptotic outage probabilities. The asymptotic outage results are then used to obtain the optimal RF transmission power based on the dominant link between the RF and FSO links. Then, the considered system secrecy performance is investigated in the presence of multi- eavesdroppers where exact closed-form expression for the intercept probability is derived. Finally, a cooperative jamming model is proposed along with power allocation to enhance the system secrecy performance. Monte-Carlo simulations are provided to validate the achieved exact and asymptotic results.

  16. Physical Layer Security Enhancement in Multiuser Mixed RF#x002F;FSO Relay Networks under RF Interference

    KAUST Repository

    El-Malek, Ahmed H. Abd

    2017-05-12

    In this paper, the impact of radio frequency (RF) co-channel interference (CCI) on the performance of multiuser (MU) mixed RF#x002F;free space optical (FSO) relay network with opportunistic user scheduling is studied. In the considered system, a user is opportunistically selected to communicate with a single destination through an amplify-and- forward (AF) relay in the presence of a single passive eavesdropper. The RF#x002F;FSO channel models are assumed to follow Rayleigh#x002F;Gamma-Gamma fading models, respectively with pointing errors and identical RF CCI signals. Exact closed-form expression for the system outage probability is derived. Then, an asymptotic expression for the outage probability is obtained at the high signal- to-interference-plus-noise ratio (SINR) regime. The asymptotic results are used to formulate a power allocation problem to obtain optimal RF transmission power. Then, the secrecy performance is studied in the presence of CCI at both the authorized relay and eavesdropper by obtaining exact and asymptotic closed-form expressions for the intercept probability. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the work.

  17. Group-Orthogonal Code-Division Multiplex: A Physical-Layer Enhancement for IEEE 802.11n Networks

    Directory of Open Access Journals (Sweden)

    Felip Riera-Palou

    2010-01-01

    Full Text Available The new standard for wireless local area networks (WLANs, named IEEE 802.11n, has been recently released. This new norm builds upon and remains compatible with the previous WLANs standards IEEE 802.11a/g while it is able to achieve transmission rates of up to 600 Mbps. These increased data rates are mainly a consequence of two important new features: (1 multiple antenna technology at transmission and reception, and (2 optional doubling of the system bandwidth thanks to the availability of an additional 20 MHz band. This paper proposes the use of Group-Orthogonal Code Division Multiplex (GO-CDM as a means to improve the performance of the 802.11n standard by further exploiting the inherent frequency diversity. It is explained why GO-CDM synergistically matches with the two aforementioned new features and the performance gains it can offer under different configurations is illustrated. Furthermore, the effects that group-orthogonal has on key implementation issues such as channel estimation, carrier frequency offset, and peak-to-average power ratio (PAPR are also considered.

  18. Aircraft optical cable plant program plan: the approach for the physical layer for fly-by-light control networks

    Science.gov (United States)

    Weaver, Thomas L.; Murdock, John K.

    1995-05-01

    A program was created with joint industry and government funding to apply fiber optic technologies to aircraft. The technology offers many potential benefits. Among them are increased electromagnetic interference immunity and the possibility of reduced weight, increased reliability, and enlarged capability by redesigning architectures to use the large bandwidth of fiber optics. Those benefits will only be realized if fiber optics meets the unique requirements of aircraft networks. Over the past two decades, considerable effort has been expended on applying photonic technologies to aircraft. Great successes have occurred in optoelectronic components development. In the development of these systems to link those components, known as the cable plant, progress has also been made, but only recently has it been organized in a coordinated, systems-oriented fashion. The FLASH program will expand on the nascent cable plant systems efforts by building upon recent work in individual components, and integrating that work into a cohesive aircraft cable plant. Therefore, the FLASH program will develop the low cost, reliable cables, connectors, splices, backplanes, manufacturing and installation methods, test methods, support equipment, and training systems needed to form a true optical cable plant for transport aircraft, tactical aircraft, and helicopters.

  19. Abstract algebra structure and application

    CERN Document Server

    Finston, David R

    2014-01-01

    This text seeks to generate interest in abstract algebra by introducing each new structure and topic via a real-world application. The down-to-earth presentation is accessible to a readership with no prior knowledge of abstract algebra. Students are led to algebraic concepts and questions in a natural way through their everyday experiences. Applications include: Identification numbers and modular arithmetic (linear) error-correcting codes, including cyclic codes ruler and compass constructions cryptography symmetry of patterns in the real plane Abstract Algebra: Structure and Application is suitable as a text for a first course on abstract algebra whose main purpose is to generate interest in the subject, or as a supplementary text for more advanced courses. The material paves the way to subsequent courses that further develop the theory of abstract algebra and will appeal to students of mathematics, mathematics education, computer science, and engineering interested in applications of algebraic concepts.

  20. Technical abstracts: Mechanical engineering, 1990

    Energy Technology Data Exchange (ETDEWEB)

    Broesius, J.Y. (comp.)

    1991-03-01

    This document is a compilation of the published, unclassified abstracts produced by mechanical engineers at Lawrence Livermore National Laboratory (LLNL) during the calendar year 1990. Many abstracts summarize work completed and published in report form. These are UCRL-JC series documents, which include the full text of articles to be published in journals and of papers to be presented at meetings, and UCID reports, which are informal documents. Not all UCIDs contain abstracts: short summaries were generated when abstracts were not included. Technical Abstracts also provides descriptions of those documents assigned to the UCRL-MI (miscellaneous) category. These are generally viewgraphs or photographs presented at meetings. An author index is provided at the back of this volume for cross referencing.

  1. Metaphor: bridging embodiment to abstraction

    Science.gov (United States)

    Jamrozik, Anja; McQuire, Marguerite; Cardillo, Eileen R.; Chatterjee, Anjan

    2016-01-01

    Embodied cognition accounts posit that concepts are grounded in our sensory and motor systems. An important challenge for these accounts is explaining how abstract concepts, which do not directly call upon sensory or motor information, can be informed by experience. We propose that metaphor is one important vehicle guiding the development and use of abstract concepts. Metaphors allow us to draw on concrete, familiar domains to acquire and reason about abstract concepts. Additionally, repeated metaphoric use drawing on particular aspects of concrete experience can result in the development of new abstract representations. These abstractions, which are derived from embodied experience but lack much of the sensorimotor information associated with it, can then be flexibly applied to understand new situations. PMID:27294425

  2. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  3. Real-Time Analysis of Online Product Reviews by Means of Multi-Layer Feed-Forward Neural Networks

    Directory of Open Access Journals (Sweden)

    Reinhold Decker

    2014-11-01

    Full Text Available In the recent past, the quantitative analysis of online product reviews (OPRs has become a popular manifestation of marketing intelligence activities focusing on products that are frequently subject to electronic word-of-mouth (eWOM. Typical elements of OPRs are overall star ratings, product at- tribute scores, recommendations, pros and cons, and free texts. The first three elements are of pa r- ticular interest because they provide an aggregate view of reviewers’ opinions about the products of interest. However, the significance of individual product attributes in the overall evaluation pro c- ess  can  vary  in  the  course  of  time.  Accordingly,  ad  hoc  analyses  of  OPRs  that  have  been downloaded at a certain point in time are of limited value for dynamic eWOM monitoring because of their snapshot character. On the other hand, opinion platforms can increase the meaningfulness of the OPRs posted there and, therewith, the usefulness of the platform as a whole, by directing eWOM activities to those product attributes that really matter at present. This paper therefore in- troduces a neural network-based approach that allows the dynamic tracking of the influence the posted scores of product attributes have on the overall star ratings of the concerning products. By using an elasticity measure, this approach supports the identification of those attributes that tend to lose or gain significance in the product evaluation process over time. The usability of this ap- proach is demonstrated using real OPR data on digital cameras and hotels.

  4. Spiking modular neural networks: A neural network modeling approach for hydrological processes

    National Research Council Canada - National Science Library

    Kamban Parasuraman; Amin Elshorbagy; Sean K. Carey

    2006-01-01

    .... In this study, a novel neural network model called the spiking modular neural networks (SMNNs) is proposed. An SMNN consists of an input layer, a spiking layer, and an associator neural network layer...

  5. Biocards and Level of Abstraction

    DEFF Research Database (Denmark)

    Lenau, Torben Anker; Keshwani, Sonal; Chakrabarti, Amaresh

    2015-01-01

    Biocards are formal descriptions of biological phenomena and their underlying functional principles. They are used in bioinspired design to document search results and to communicate the findings for use in the further design process. The present study explored the effect of abstraction level used...... with concrete descriptions. The novelty of found solutions was evaluated by the students by rating novelty of each solution on a scale from 1 to 5. Mean values for abstract descriptions were 0,3 higher than for concrete descriptions indicating that more innovative solutions were found when students used...... biocards with abstract descriptions compared to concrete descriptions. The difference in mean value is significant with a confidence level better than 1%. It seems likely that more abstract descriptions in biocards helps avoiding design fixation in biomimetic design work....

  6. Spatial language and abstract concepts.

    Science.gov (United States)

    Casasanto, Daniel; Bottini, Roberto

    2014-03-01

    What is the relationship between spatial language and abstract concepts? When people talk about abstract things that they can never see or touch, they often use spatial metaphors (e.g., a long vacation, a high price, a close friendship). According to theories of metaphorical mental representation, linguistic metaphors reflect underlying mental metaphors. Yet, behavioral experiments show that this is only one of the possible relationships between spatial metaphors in language and our spatial conceptualizations of abstract domains. In some cases, linguistic metaphors not only reflect speakers' thoughts, they also change those thoughts, such that people who use different linguistic metaphors rely on correspondingly different mental metaphors. Alternatively, spatial metaphors in language may reflect the way people conceptualize an abstract domain in some circumstances, but not in others. Finally, spatial language may reflect the way an abstract domain is typically conceptualized by some people, but not by others. There is no single relationship between spatial language and abstract concepts. Discovering whether (and under what conditions) a linguistic metaphor corresponds to a mental metaphor can illuminate the ways in which our interactions with the physical and social environment shape our mental lives. WIREs Cogn Sci 2014, 5:139-149. doi: 10.1002/wcs.1271 CONFLICT OF INTEREST: The authors have declared no conflicts of interest for this article. For further resources related to this article, please visit the WIREs website. © 2013 John Wiley & Sons, Ltd.

  7. Abstract Interpretation and Attribute Gramars

    DEFF Research Database (Denmark)

    Rosendahl, Mads

    The objective of this thesis is to explore the connections between abstract interpretation and attribute grammars as frameworks in program analysis. Abstract interpretation is a semantics-based program analysis method. A large class of data flow analysis problems can be expressed as non-standard ...... is presented in the thesis. Methods from abstract interpretation can also be used in correctness proofs of attribute grammars. This proof technique introduces a new class of attribute grammars based on domain theory. This method is illustrated with examples.......The objective of this thesis is to explore the connections between abstract interpretation and attribute grammars as frameworks in program analysis. Abstract interpretation is a semantics-based program analysis method. A large class of data flow analysis problems can be expressed as non......-standard semantics where the ``meaning'' contains information about the runtime behaviour of programs. In an abstract interpretation the analysis is proved correct by relating it to the usual semantics for the language. Attribute grammars provide a method and notation to specify code generation and program analysis...

  8. Layered circle packings

    Directory of Open Access Journals (Sweden)

    David Dennis

    2005-01-01

    Full Text Available Given a bounded sequence of integers {d0,d1,d2,…}, 6≤dn≤M, there is an associated abstract triangulation created by building up layers of vertices so that vertices on the nth layer have degree dn. This triangulation can be realized via a circle packing which fills either the Euclidean or the hyperbolic plane. We give necessary and sufficient conditions to determine the type of the packing given the defining sequence {dn}.

  9. Qualitative and quantitative high performance thin layer chromatography analysis of Calendula officinalis using high resolution plate imaging and artificial neural network data modelling.

    Science.gov (United States)

    Agatonovic-Kustrin, S; Loescher, Christine M

    2013-10-10

    Calendula officinalis, commonly known Marigold, has been traditionally used for its anti-inflammatory effects. The aim of this study was to investigate the capacity of an artificial neural network (ANN) to analyse thin layer chromatography (TLC) chromatograms as fingerprint patterns for quantitative estimation of chlorogenic acid, caffeic acid and rutin in Calendula plant extracts. By applying samples with different weight ratios of marker compounds to the system, a database of chromatograms was constructed. A hundred and one signal intensities in each of the HPTLC chromatograms were correlated to the amounts of applied chlorogenic acid, caffeic acid, and rutin using an ANN. The developed ANN correlation was used to quantify the amounts of 3 marker compounds in calendula plant extracts. The minimum quantifiable level (MQL) of 610, 190 and 940 ng and the limit of detection (LD) of 183, 57 and 282 ng were established for chlorogenic, caffeic acid and rutin, respectively. A novel method for quality control of herbal products, based on HPTLC separation, high resolution digital plate imaging and ANN data analysis has been developed. The proposed method can be adopted for routine evaluation of the phytochemical variability in calendula extracts. Copyright © 2013 Elsevier B.V. All rights reserved.

  10. Mechanical Engineering Department technical abstracts

    Energy Technology Data Exchange (ETDEWEB)

    1984-07-01

    The Mechanical Engineering Department publishes abstracts twice a year to inform readers of the broad range of technical activities in the Department, and to promote an exchange of ideas. Details of the work covered by an abstract may be obtained by contacting the author(s). General information about the current role and activities of each of the Department's seven divisions precedes the technical abstracts. Further information about a division's work may be obtained from the division leader, whose name is given at the end of each divisional summary. The Department's seven divisions are as follows: Nuclear Test Engineering Division, Nuclear Explosives Engineering Division, Weapons Engineering Division, Energy Systems Engineering Division, Engineering Sciences Division, Magnetic Fusion Engineering Division and Materials Fabrication Division.

  11. Modelling Metamorphism by Abstract Interpretation

    Science.gov (United States)

    Dalla Preda, Mila; Giacobazzi, Roberto; Debray, Saumya; Coogan, Kevin; Townsend, Gregg M.

    Metamorphic malware apply semantics-preserving transformations to their own code in order to foil detection systems based on signature matching. In this paper we consider the problem of automatically extract metamorphic signatures from these malware. We introduce a semantics for self-modifying code, later called phase semantics, and prove its correctness by showing that it is an abstract interpretation of the standard trace semantics. Phase semantics precisely models the metamorphic code behavior by providing a set of traces of programs which correspond to the possible evolutions of the metamorphic code during execution. We show that metamorphic signatures can be automatically extracted by abstract interpretation of the phase semantics, and that regular metamorphism can be modelled as finite state automata abstraction of the phase semantics.

  12. Elements of abstract harmonic analysis

    CERN Document Server

    Bachman, George

    2013-01-01

    Elements of Abstract Harmonic Analysis provides an introduction to the fundamental concepts and basic theorems of abstract harmonic analysis. In order to give a reasonably complete and self-contained introduction to the subject, most of the proofs have been presented in great detail thereby making the development understandable to a very wide audience. Exercises have been supplied at the end of each chapter. Some of these are meant to extend the theory slightly while others should serve to test the reader's understanding of the material presented. The first chapter and part of the second give

  13. Abstracts from Rambam Research Day

    Directory of Open Access Journals (Sweden)

    Shraga Blazer

    2015-01-01

    Full Text Available [Extract] This Supplement of Rambam Maimonides Medical Journal presents the abstracts from the Eleventh Rambam Research Day. These abstracts represent the newest basic and clinical research coming out of Rambam Health Care Campus—research that is the oxygen for education and development of today’s generation of physicians. Hence, the research presented on Rambam Research Day is a foundation for future generations to understand patient needs and improve treatment modalities. Bringing research from the bench to the bedside and from the bedside to the community is at the heart of Maimonides’ scholarly and ethical legacy.

  14. Static Analysis Using Abstract Interpretation

    Science.gov (United States)

    Arthaud, Maxime

    2017-01-01

    Short presentation about static analysis and most particularly abstract interpretation. It starts with a brief explanation on why static analysis is used at NASA. Then, it describes the IKOS (Inference Kernel for Open Static Analyzers) tool chain. Results on NASA projects are shown. Several well known algorithms from the static analysis literature are then explained (such as pointer analyses, memory analyses, weak relational abstract domains, function summarization, etc.). It ends with interesting problems we encountered (such as C++ analysis with exception handling, or the detection of integer overflow).

  15. Automated Predicate Abstraction for Real-Time Models

    Directory of Open Access Journals (Sweden)

    Bahareh Badban

    2009-11-01

    Full Text Available We present a technique designed to automatically compute predicate abstractions for dense real-timed models represented as networks of timed automata. We use the CIPM algorithm in our previous work which computes new invariants for timed automata control locations and prunes the model, to compute a predicate abstraction of the model. We do so by taking information regarding control locations and their newly computed invariants into account.

  16. Abstract Résumé

    African Journals Online (AJOL)

    Journal des spects ociaux du VIH/ ID . 17. Article Original. Abstract. Discrimination against persons living with HIV/AIDS in hospital settings has been documented. This study examined the attitude of health care workers (HCWs) to nurses, doctors and patients infected with HIV. A total of 345 respondents selected by ...

  17. Understanding software through linguistic abstraction

    NARCIS (Netherlands)

    Visser, E.

    2013-01-01

    Preprint submitted to "Science of Computer Programming", Elsevier, http://dx.doi.org/10.1016/j.scico.2013.12.001 In this essay, I argue that linguistic abstraction should be used systematically as a tool to capture our emerging understanding of domains of computation. Moreover, to enable that

  18. Handedness Shapes Children's Abstract Concepts

    Science.gov (United States)

    Casasanto, Daniel; Henetz, Tania

    2012-01-01

    Can children's handedness influence how they represent abstract concepts like "kindness" and "intelligence"? Here we show that from an early age, right-handers associate rightward space more strongly with positive ideas and leftward space with negative ideas, but the opposite is true for left-handers. In one experiment, children indicated where on…

  19. Rolloff Roof Observatory Construction (Abstract)

    Science.gov (United States)

    Ulowetz, J. H.

    2015-12-01

    (Abstract only) Lessons learned about building an observatory by someone with limited construction experience, and the advantages of having one for imaging and variable star studies. Sample results shown of composite light curves for cataclysmic variables UX UMa and V1101 Aql with data from my observatory combined with data from others around the world.

  20. Transplantation as an abstract good

    DEFF Research Database (Denmark)

    Hoeyer, Klaus; Jensen, Anja Marie Bornø; Olejaz, Maria

    2015-01-01

    a more general salience in the organ transplant field by way of facilitating a perception of organ transplantation as an abstract moral good rather than a specific good for specific people. Furthermore, we suggest that multiple forms of ignorance sustain each other: a desire for ignorance with respect...