WorldWideScience

Sample records for opportunistic spectrum sharing

  1. Distributed opportunistic spectrum sharing in cognitive radio networks

    KAUST Repository

    Hawa, Mohammed

    2016-05-19

    In cases where the licensed radio spectrum is underutilized, cognitive radio technology enables cognitive devices to sense and then dynamically access this scarce resource making the most out of it. In this work, we introduce a simple and intuitive, yet powerful and efficient, technique that allows opportunistic channel access in cognitive radio systems in a completely distributed fashion. Our proposed method achieves very high values of spectrum utilization and throughput. It also minimizes interference between cognitive base stations and the primary users licensed to use the spectrum. The algorithm responds quickly and efficiently to variations in the network parameters and also achieves a high degree of fairness between cognitive base stations. © 2016 John Wiley & Sons, Ltd.

  2. Full-Duplex opportunistic relay selection in future spectrum-sharing networks

    KAUST Repository

    Khafagy, Mohammad Galal; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2015-01-01

    We propose and analyze the performance of full-duplex relay selection in primary/secondary spectrum-sharing networks. Contrary to half-duplex relaying, full-duplex relaying (FDR) enables simultaneous listening/forwarding at the secondary relay, thereby allowing for a higher spectral efficiency. However, since the source and relay simultaneously transmit in FDR, their superimposed signal at the primary receiver should now satisfy the existing interference constraint which can considerably limit the secondary network throughput. In this regard, relay selection can offer an adequate solution to boost the secondary throughput while satisfying the imposed interference limit. We first analyze the performance of opportunistic relay selection among a cluster of full-duplex decode-and-forward relays with self-interference by deriving the exact cumulative distribution function of its end-to-end signal-to-noise ratio. Second, we evaluate the end-to-end performance of relay selection with interference constraints due to the presence of a primary receiver. Finally, the presented exact theoretical findings are verified by numerical simulations.

  3. Full-Duplex opportunistic relay selection in future spectrum-sharing networks

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-06-01

    We propose and analyze the performance of full-duplex relay selection in primary/secondary spectrum-sharing networks. Contrary to half-duplex relaying, full-duplex relaying (FDR) enables simultaneous listening/forwarding at the secondary relay, thereby allowing for a higher spectral efficiency. However, since the source and relay simultaneously transmit in FDR, their superimposed signal at the primary receiver should now satisfy the existing interference constraint which can considerably limit the secondary network throughput. In this regard, relay selection can offer an adequate solution to boost the secondary throughput while satisfying the imposed interference limit. We first analyze the performance of opportunistic relay selection among a cluster of full-duplex decode-and-forward relays with self-interference by deriving the exact cumulative distribution function of its end-to-end signal-to-noise ratio. Second, we evaluate the end-to-end performance of relay selection with interference constraints due to the presence of a primary receiver. Finally, the presented exact theoretical findings are verified by numerical simulations.

  4. Opportunistic spectrum utilization in vehicular communication networks

    CERN Document Server

    Cheng, Nan

    2016-01-01

    This brief examines current research on improving Vehicular Networks (VANETs), examining spectrum scarcity due to the dramatic growth of mobile data traffic and the limited bandwidth of dedicated vehicular communication bands and the use of opportunistic spectrum bands to mitigate congestion. It reviews existing literature on the use of opportunistic spectrum bands for VANETs, including licensed and unlicensed spectrum bands and a variety of related technologies, such as cognitive radio, WiFi and device-to-device communications. Focused on analyzing spectrum characteristics, designing efficient spectrum exploitation schemes, and evaluating the date delivery performance when utilizing different opportunistic spectrum bands, the results presented in this brief provide valuable insights on improving the design and deployment of future VANETs.

  5. Joint opportunistic beam and spectrum selection schemes for spectrum sharing systems with limited feedback

    KAUST Repository

    Sayed, Mostafa M.; Abdallah, Mohamed M.; Qaraqe, Khalid A.; Tourki, Kamel; Alouini, Mohamed-Slim

    2014-01-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing an unlicensed secondary user (SU) to share the spectrum with a licensed primary user (PU) under acceptable interference levels to the primary

  6. Joint opportunistic beam and spectrum selection schemes for spectrum sharing systems with limited feedback

    KAUST Repository

    Sayed, Mostafa M.

    2014-11-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing an unlicensed secondary user (SU) to share the spectrum with a licensed primary user (PU) under acceptable interference levels to the primary receiver (PU-Rx). In this paper, we consider a secondary link composed of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx). The secondary link is allowed to share the spectrum with a primary network composed of multiple PUs communicating over distinct frequency spectra with a primary base station. We develop a transmission scheme where the SU-Tx initially broadcasts a set of random beams over all the available primary spectra for which the PU-Rx sends back the index of the spectrum with the minimum interference level, as well as information that describes the interference value, for each beam. Based on the feedback information on the PU-Rx, the SU-Tx adapts the transmitted beams and then resends the new beams over the best primary spectrum for each beam to the SU-Rx. The SU-Rx selects the beam that maximizes the received signal-to-interference-plus-noise ratio (SINR) to be used in transmission over the next frame. We consider three cases for the level of feedback information describing the interference level. In the first case, the interference level is described by both its magnitude and phase; in the second case, only the magnitude is considered; and in the third case, we focus on a q-bit description of its magnitude. In the latter case, we propose a technique to find the optimal quantizer thresholds in a mean-square-error sense. We also develop a statistical analysis for the SINR statistics and the capacity and bit error rate of the secondary link and present numerical results that study the impact of the different system parameters.

  7. Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks

    Directory of Open Access Journals (Sweden)

    Sumit J. Darak

    2016-09-01

    Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.

  8. Optimal Caching in Multicast 5G Networks with Opportunistic Spectrum Access

    KAUST Repository

    Emara, Mostafa

    2018-01-15

    Cache-enabled small base station (SBS) densification is foreseen as a key component of 5G cellular networks. This architecture enables storing popular files at the network edge (i.e., SBS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. This paper develops a mathematical framework, based on stochastic geometry, to characterize the hit probability of a cache-enabled multicast 5G network with SBS multi-channel capabilities and opportunistic spectrum access. To this end, we first derive the hit probability by characterizing opportunistic spectrum access success probabilities, service distance distributions, and coverage probabilities. The optimal caching distribution to maximize the hit probability is then computed. The performance and trade-offs of the derived optimal caching distributions are then assessed and compared with two widely employed caching distribution schemes, namely uniform and Zipf caching, through numerical results and extensive simulations. It is shown that the Zipf caching almost optimal only in scenarios with large number of available channels and large cache sizes.

  9. Distributed opportunistic spectrum sharing in cognitive radio networks

    KAUST Repository

    Hawa, Mohammed; Alammouri, Ahmad; Alhiary, Ala; Alhamad, Nidal

    2016-01-01

    In cases where the licensed radio spectrum is underutilized, cognitive radio technology enables cognitive devices to sense and then dynamically access this scarce resource making the most out of it. In this work, we introduce a simple and intuitive

  10. Optimal Pricing of Spectrum Resources in Wireless Opportunistic Access

    Directory of Open Access Journals (Sweden)

    Hanna Bogucka

    2012-01-01

    Full Text Available We consider opportunistic access to spectrum resources in cognitive wireless networks. The users equipment, or the network nodes in general are able to sense the spectrum and adopt a subset of available resources (the spectrum and the power individually and independently in a distributed manner, that is, based on their local channel quality information and not knowing the Channel State Information (CSI of the other nodes' links in the considered network area. In such a network scenery, the competition of nodes for available resources is observed, which can be modeled as a game. To obtain spectrally efficient and fair spectrum allocation in this competitive environment with the nodes having no information on the other players, taxation of resources is applied to coerce desired behavior of the competitors. In the paper, we present mathematical formulation of the problem of finding the optimal taxation rate (common for all nodes and propose a reduced-complexity algorithm for this optimization. Simulation results for these derived optimal values in various scenarios are also provided.

  11. Opportunistic tri-band carrier aggregation in licensed spectrum for multi-operator 5G hetnet

    Science.gov (United States)

    Maksymuk, Taras; Kyryk, Maryan; Klymash, Mykhailo; Jo, Minho; Romaniuk, Ryszard; Kotyra, Andrzej; Zhanpeisova, Aizhan; Kozbekova, Ainur

    2017-08-01

    Increasing capacity of mobile networks is a real challenge due to rapid increasing of traffic demands and spectrum scarcity. Carrier aggregation technology is aimed to increase the user data rate by combining the throughput of few spectrum bands, even if they are not physically collocated. Utilization of unlicensed Wi-Fi 5 GHz band for mobile transmission opens new perspectives for carrier aggregation due to vast amount of spectrum range, which can be available for aggregation to supplement data rates for end users. There are many solutions proposed to enable mobile data transmission in unlicensed band without disturbing interference for the existing Wi-Fi users. The paper presents a new approach for opportunistic carrier aggregation in licensed and unlicensed band for multi-operator 5G network. It allows multiple network operators to utilize unlicensed spectrum opportunistically if it is not currently used by Wi-Fi or other mobile network operators. Performance of the proposed approach has been simulated in case of two competing operators. Simulation results reveal that applying the proposed method ensures achieving satisfactory performance of carrier aggregation for the case of two network operators.

  12. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  13. 5G Spectrum Sharing

    OpenAIRE

    Nekovee, Maziar; Rudd, Richard

    2017-01-01

    In this paper an overview is given of the current status of 5G industry standards, spectrum allocation and use cases, followed by initial investigations of new opportunities for spectrum sharing in 5G using cognitive radio techniques, considering both licensed and unlicensed scenarios. A particular attention is given to sharing millimeter-wave frequencies, which are of prominent importance for 5G.

  14. Cooperative AF Relaying in Spectrum-Sharing Systems: Outage Probability Analysis under Co-Channel Interferences and Relay Selection

    KAUST Repository

    Xia, Minghua

    2012-11-01

    For cooperative amplify-and-forward (AF) relaying in spectrum-sharing wireless systems, secondary users share spectrum resources originally licensed to primary users to communicate with each other and, thus, the transmit power of secondary transmitters is strictly limited by the tolerable interference powers at primary receivers. Furthermore, the received signals at a relay and at a secondary receiver are inevitably interfered by the signals from primary transmitters. These co-channel interferences (CCIs) from concurrent primary transmission can significantly degrade the performance of secondary transmission. This paper studies the effect of CCIs on outage probability of the secondary link in a spectrum-sharing environment. In particular, in order to compensate the performance loss due to CCIs, the transmit powers of a secondary transmitter and its relaying node are respectively optimized with respect to both the tolerable interference powers at the primary receivers and the CCIs from the primary transmitters. Moreover, when multiple relays are available, the technique of opportunistic relay selection is exploited to further improve system performance with low implementation complexity. By analyzing lower and upper bounds on the outage probability of the secondary system, this study reveals that it is the tolerable interference powers at primary receivers that dominate the system performance, rather than the CCIs from primary transmitters. System designers will benefit from this result in planning and designing next-generation broadband spectrum-sharing systems.

  15. Analysis Framework for Opportunistic Spectrum OFDMA and its Application to the IEEE 802.22 Standard

    OpenAIRE

    Park, Jihoon; Pawełczak, Przemysław; Grønsund, Pål; Čabrić, Danijela

    2010-01-01

    We present an analytical model that enables throughput evaluation of Opportunistic Spectrum Orthogonal Frequency Division Multiple Access (OS-OFDMA) networks. The core feature of the model, based on a discrete time Markov chain, is the consideration of different channel and subchannel allocation strategies under different Primary and Secondary user types, traffic and priority levels. The analytical model also assesses the impact of different spectrum sensing strategies on the throughput of OS...

  16. Cooperative AF Relaying in Spectrum-Sharing Systems: Performance Analysis under Average Interference Power Constraints and Nakagami-m Fading

    KAUST Repository

    Xia, Minghua

    2012-06-01

    Since the electromagnetic spectrum resource becomes more and more scarce, improving spectral efficiency is extremely important for the sustainable development of wireless communication systems and services. Integrating cooperative relaying techniques into spectrum-sharing cognitive radio systems sheds new light on higher spectral efficiency. In this paper, we analyze the end-to-end performance of cooperative amplify-and-forward (AF) relaying in spectrum-sharing systems. In order to achieve the optimal end-to-end performance, the transmit powers of the secondary source and the relays are optimized with respect to average interference power constraints at primary users and Nakagami-$m$ fading parameters of interference channels (for mathematical tractability, the desired channels from secondary source to relay and from relay to secondary destination are assumed to be subject to Rayleigh fading). Also, both partial and opportunistic relay-selection strategies are exploited to further enhance system performance. Based on the exact distribution functions of the end-to-end signal-to-noise ratio (SNR) obtained herein, the outage probability, average symbol error probability, diversity order, and ergodic capacity of the system under study are analytically investigated. Our results show that system performance is dominated by the resource constraints and it improves slowly with increasing average SNR. Furthermore, larger Nakagami-m fading parameter on interference channels deteriorates system performance slightly. On the other hand, when interference power constraints are stringent, opportunistic relay selection can be exploited to improve system performance significantly. All analytical results are corroborated by simulation results and they are shown to be efficient tools for exact evaluation of system performance.

  17. Market-driven spectrum sharing in cognitive radio

    CERN Document Server

    Yi, Changyan

    2016-01-01

    This brief focuses on the current research on mechanism design for dynamic spectrum sharing in cognitive radio (CR) networks. Along with a review of CR architectures and characteristics, this brief presents the motivations, significances and unique challenges of implementing algorithmic mechanism design for encouraging both primary spectrum owners and secondary spectrum users to participate in dynamic spectrum sharing. The brief then focuses on recent advances in mechanism design in CR networks. With an emphasis on dealing with the uncertain spectrum availabilities, mechanisms based on spectrum recall, two-stage spectrum sharing and online spectrum allocation are introduced with the support of theoretic analyses and numerical illustrations. The brief concludes with a discussion of potential research directions and interests, which will motivate further studies on mechanism design for wireless communications. This brief is concise and approachable for researchers, professionals and advanced-level students in w...

  18. Optimality of Multichannel Myopic Sensing in the Presence of Sensing Error for Opportunistic Spectrum Access

    Directory of Open Access Journals (Sweden)

    Xiaofeng Jiang

    2013-01-01

    Full Text Available The optimization problem for the performance of opportunistic spectrum access is considered in this study. A user, with the limited sensing capacity, has opportunistic access to a communication system with multiple channels. The user can only choose several channels to sense and decides whether to access these channels based on the sensing information in each time slot. Meanwhile, the presence of sensing error is considered. A reward is obtained when the user accesses a channel. The objective is to maximize the expected (discounted or average reward accrued over an infinite horizon. This problem can be formulated as a partially observable Markov decision process. This study shows the optimality of the simple and robust myopic policy which focuses on maximizing the immediate reward. The results show that the myopic policy is optimal in the case of practical interest.

  19. 77 FR 18793 - Spectrum Sharing Innovation Test-Bed Pilot Program

    Science.gov (United States)

    2012-03-28

    .... 120322212-2212-01] Spectrum Sharing Innovation Test-Bed Pilot Program AGENCY: National Telecommunications... Innovation Test-Bed pilot program to assess whether devices employing Dynamic Spectrum Access techniques can... Spectrum Sharing Innovation Test-Bed (Test-Bed) pilot program to examine the feasibility of increased...

  20. Joint switched multi-spectrum and transmit antenna diversity for spectrum sharing systems

    KAUST Repository

    Sayed, Mostafa M.

    2013-10-01

    In spectrum sharing systems, a secondary user (SU) is allowed to share the spectrum with a primary (licensed) network under the condition that the interference observed at the receivers of the primary users (PU-Rxs) is below a predetermined level. In this paper, we consider a secondary network comprised of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx) sharing the same spectrum with multiple primary users (PUs), each with a distinct spectrum. We develop transmit antenna diversity schemes at the SU-Tx that exploit the multi-spectrum diversity provided by the existence of multiple PUs so as to optimize the signal-to-noise ratio (SNR) at the SU-Rx. In particular, assuming bounded transmit power at the SU-Tx, we develop switched selection schemes that select the primary spectrum and the SU-Tx transmit antenna that maintain the SNR at the SU-Rx above a specific threshold. Assuming Rayleigh fading channels and binary phase-shift keying (BPSK) transmission, we derive the average bit-error-rate (BER) and average feedback load expressions for the proposed schemes. For the sake of comparison, we also derive a BER expression for the optimal selection scheme that selects the best antenna/spectrum pair that maximizes the SNR at the SU-Rx, in exchange of high feedback load and switching complexity. Finally, we show that our analytical results are in perfect agreement with the simulation results. © 2013 IEEE.

  1. Resource Distribution Approaches in Spectrum Sharing Systems

    Directory of Open Access Journals (Sweden)

    Friedrich K. Jondral

    2008-05-01

    Full Text Available It is increasingly difficult to satisfy growing demands for spectrum with the conventional policy of fixed spectrum allocation. To overcome this problem, flexible/dynamic spectrum sharing methods that can significantly improve spectrum utilization of the spectrum have gained increasing interest recently. This paper presents two dynamic spectrum sharing approaches, a centralized and a decentralized one. The centralized approach is based on hierarchical trading. Each level of hierarchy is composed of “markets” that are associated with a certain spatial area and trading occurrence frequency, whereas area size and trading occurrence frequency depend on the hierarchy level. The decentralized approach is based on game-theory. There, it is assumed that the operators are averse to unequal payoffs and act unselfishly, enabling a stable and sustainable community. Numerical results show that, in the observed scenario, both proposals outperform the reference case of fixed resource allocation significantly in terms of utilized bandwidth. Whereas, negotiation costs for spectrum brokerage appear in the centralized approach, nonnegligible amounts of spectrum are lost in the decentralized approach due to collisions. Thus, a hybrid of centralized and decentralized approach that exploits the benefits of both is also considered.

  2. The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

    Directory of Open Access Journals (Sweden)

    Y. B. Li

    2012-09-01

    Full Text Available The competitive price game model is used to analyze the spectrum sharing problem in the cognitive radio networks, and the spectrum sharing problem with the constraints of available spectrum resource from primary users is further discussed in this paper. The Rockafeller multiplier method is applied to deal with the constraints of available licensed spectrum resource, and the improved profits function is achieved, which can be used to measure the impact of shared spectrum price strategies on the system profit. However, in the competitive spectrum sharing problem of practical cognitive radio network, primary users have to determine price of the shared spectrum without the acknowledgement of the other primary user’s price strategies. Thus a fast gradient iterative calculation method of equilibrium price is proposed, only with acknowledgement of the price strategies of shared spectrum during last cycle. Through the adaptive iteration at the direction with largest gradient of improved profit function, the equilibrium price strategies can be achieved rapidly. It can also avoid the predefinition of adjustment factor according to the parameters of communication system in conventional linear iteration method. Simulation results show that the proposed competitive price spectrum sharing model can be applied in the cognitive radio networks with constraints of available licensed spectrum, and it has better convergence performance.

  3. Achievable capacity of a spectrum sharing system over hyper fading channels

    KAUST Repository

    Ekin, Sabit; Yilmaz, Ferkan; Ç elebi, Hasari Burak; Qaraqe, Khalid A.; Alouini, Mohamed-Slim; Serpedin, Erchin

    2009-01-01

    Cognitive radio with spectrum sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, achievable capacity gain of spectrum sharing systems over dynamic fading

  4. Outage and ser performance of an opportunistic multi-user underlay cognitive network

    KAUST Repository

    Khan, Fahd Ahmed

    2012-10-01

    Consider a multi-user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network and a single secondary user is selected for transmission. The channel is assumed to have independent but not identical Nakagami-m fading. Closed form expressions for the outage performance and the symbol-error-rate performance of the opportunistic multi-user secondary network are derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each secondary user. © 2012 IEEE.

  5. Joint switched multi-spectrum and transmit antenna diversity for spectrum sharing systems

    KAUST Repository

    Sayed, Mostafa M.; Abdallah, Mohamed M.; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2013-01-01

    . In this paper, we consider a secondary network comprised of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx) sharing the same spectrum with multiple primary users (PUs), each with a distinct spectrum

  6. Achievable capacity of a spectrum sharing system over hyper fading channels

    KAUST Repository

    Ekin, Sabit

    2009-11-01

    Cognitive radio with spectrum sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, achievable capacity gain of spectrum sharing systems over dynamic fading environments is studied. For the analysis, a theoretical fading model called hyper fading model that is suitable to the dynamic nature of cognitive radio channel is proposed. Closed-form expression of probability density function (PDF) and cumulative density function (CDF) of the signal-to-noise ratio (SNR) for secondary users in spectrum sharing systems are derived. In addition, the capacity gains achievable with spectrum sharing systems in high and low power regions are obtained. Numerical simulations are performed to study the effects of different fading figures, average powers, interference temperature, and number of secondary users on the achievable capacity.

  7. Capacity limits of spectrum-sharing systems over hyper-fading channels

    KAUST Repository

    Ekin, Sabit

    2011-01-20

    Cognitive radio (CR) with spectrum-sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, the achievable capacity gain of spectrum-sharing systems over dynamic fading environments is studied. To perform a general analysis, a theoretical fading model called hyper-fading model that is suitable to the dynamic nature of CR channel is proposed. Closed-form expressions of probability density function (PDF) and cumulative density function (CDF) of the signal-to-noise ratio (SNR) for secondary users (SUs) in spectrum-sharing systems are derived. In addition, the capacity gains achievable with spectrum-sharing systems in high and low power regions are obtained. The effects of different fading figures, average fading powers, interference temperatures, peak powers of secondary transmitters, and numbers of SUs on the achievable capacity are investigated. The analytical and simulation results show that the fading figure of the channel between SUs and primary base-station (PBS), which describes the diversity of the channel, does not contribute significantly to the system performance gain. © 2011 John Wiley & Sons, Ltd.

  8. Capacity limits of spectrum-sharing systems over hyper-fading channels

    KAUST Repository

    Ekin, Sabit; Yilmaz, Ferkan; Ç elebi, Hasari Burak; Qaraqe, Khalid A.; Alouini, Mohamed-Slim; Serpedin, Erchin

    2011-01-01

    Cognitive radio (CR) with spectrum-sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, the achievable capacity gain of spectrum-sharing systems over dynamic fading environments is studied. To perform a general analysis, a theoretical fading model called hyper-fading model that is suitable to the dynamic nature of CR channel is proposed. Closed-form expressions of probability density function (PDF) and cumulative density function (CDF) of the signal-to-noise ratio (SNR) for secondary users (SUs) in spectrum-sharing systems are derived. In addition, the capacity gains achievable with spectrum-sharing systems in high and low power regions are obtained. The effects of different fading figures, average fading powers, interference temperatures, peak powers of secondary transmitters, and numbers of SUs on the achievable capacity are investigated. The analytical and simulation results show that the fading figure of the channel between SUs and primary base-station (PBS), which describes the diversity of the channel, does not contribute significantly to the system performance gain. © 2011 John Wiley & Sons, Ltd.

  9. Performance analysis of adaptive modulation for cognitive radios with opportunistic access

    KAUST Repository

    Chen, Yunfei

    2011-06-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing and primary user traffic for Nakagami-m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical results show that spectrum sensing and primary user traffic cause considerable degradation to the bit error rate performance of adaptive modulation in a cognitive radio system with opportunistic access to the licensed channel. They also show that primary user traffic does not affect the link spectral efficiency performance of adaptive modulation, while the spectrum sensing degrades the link spectral efficiency performance. © 2011 IEEE.

  10. Multi-spectrum and transmit-antenna switched diversity schemes for spectrum sharing systems: A performance analysis

    KAUST Repository

    Sayed, Mostafa

    2012-12-01

    In spectrum sharing systems, a secondary user (SU) is allowed to share the spectrum with a primary licensed user under the condition that the interference at the the primary user receiver (PU-Rx) is below a predetermined threshold. Joint primary spectrum and transmit antenna selection diversity schemes can be utilized as an efficient way to meet the quality of service (QoS) demands of the SUs while satisfying the interference constraint. In this paper, we consider a secondary link comprised of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx) sharing the same spectrum with a number of primary users (PUs) operating at distinct spectra. We present a performance analysis for two primary spectrum and transmit antenna switched selection schemes with different amount of feedback requirements. In particular, assuming Rayleigh fading and BPSK transmission, we derive approximate BER expressions for the presented schemes. For the sake of comparison, we also derive a closed-form BER expression for the optimal selection scheme that selects the best pair in terms of the SU-Rx signal-to-noise ratio (SNR) which has the disadvantage of high feedback requirements. Finally, our results are verified with numerical simulations. © 2012 IEEE.

  11. Quantum game application to spectrum scarcity problems

    Science.gov (United States)

    Zabaleta, O. G.; Barrangú, J. P.; Arizmendi, C. M.

    2017-01-01

    Recent spectrum-sharing research has produced a strategy to address spectrum scarcity problems. This novel idea, named cognitive radio, considers that secondary users can opportunistically exploit spectrum holes left temporarily unused by primary users. This presents a competitive scenario among cognitive users, making it suitable for game theory treatment. In this work, we show that the spectrum-sharing benefits of cognitive radio can be increased by designing a medium access control based on quantum game theory. In this context, we propose a model to manage spectrum fairly and effectively, based on a multiple-users multiple-choice quantum minority game. By taking advantage of quantum entanglement and quantum interference, it is possible to reduce the probability of collision problems commonly associated with classic algorithms. Collision avoidance is an essential property for classic and quantum communications systems. In our model, two different scenarios are considered, to meet the requirements of different user strategies. The first considers sensor networks where the rational use of energy is a cornerstone; the second focuses on installations where the quality of service of the entire network is a priority.

  12. MOSDEN: A Scalable Mobile Collaborative Platform for Opportunistic Sensing Applications

    Directory of Open Access Journals (Sweden)

    Prem Prakash Jayaraman

    2014-05-01

    Full Text Available Mobile smartphones along with embedded sensors have become an efficient enabler for various mobile applications including opportunistic sensing. The hi-tech advances in smartphones are opening up a world of possibilities. This paper proposes a mobile collaborative platform called MOSDEN that enables and supports opportunistic sensing at run time. MOSDEN captures and shares sensor data acrossmultiple apps, smartphones and users. MOSDEN supports the emerging trend of separating sensors from application-specific processing, storing and sharing. MOSDEN promotes reuse and re-purposing of sensor data hence reducing the efforts in developing novel opportunistic sensing applications. MOSDEN has been implemented on Android-based smartphones and tablets. Experimental evaluations validate the scalability and energy efficiency of MOSDEN and its suitability towards real world applications. The results of evaluation and lessons learned are presented and discussed in this paper.

  13. Resource allocation in shared spectrum access communications for operators with diverse service requirements

    Science.gov (United States)

    Kibria, Mirza Golam; Villardi, Gabriel Porto; Ishizu, Kentaro; Kojima, Fumihide; Yano, Hiroyuki

    2016-12-01

    In this paper, we study inter-operator spectrum sharing and intra-operator resource allocation in shared spectrum access communication systems and propose efficient dynamic solutions to address both inter-operator and intra-operator resource allocation optimization problems. For inter-operator spectrum sharing, we present two competent approaches, namely the subcarrier gain-based sharing and fragmentation-based sharing, which carry out fair and flexible allocation of the available shareable spectrum among the operators subject to certain well-defined sharing rules, traffic demands, and channel propagation characteristics. The subcarrier gain-based spectrum sharing scheme has been found to be more efficient in terms of achieved throughput. However, the fragmentation-based sharing is more attractive in terms of computational complexity. For intra-operator resource allocation, we consider resource allocation problem with users' dissimilar service requirements, where the operator supports users with delay constraint and non-delay constraint service requirements, simultaneously. This optimization problem is a mixed-integer non-linear programming problem and non-convex, which is computationally very expensive, and the complexity grows exponentially with the number of integer variables. We propose less-complex and efficient suboptimal solution based on formulating exact linearization, linear approximation, and convexification techniques for the non-linear and/or non-convex objective functions and constraints. Extensive simulation performance analysis has been carried out that validates the efficiency of the proposed solution.

  14. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-18

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  15. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine; Alouini, Mohamed-Slim; Radaydeh, Redha M.; Yang, Hong-Chuan

    2012-01-01

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  16. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed

    2012-10-19

    Spectrum sharing systems have been recently introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a predetermined/acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a primary link composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes select a beam, among a set of power-optimized random beams, that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the SINR statistics as well as the capacity and bit error rate (BER) of the secondary link.

  17. Cross-Layer Design in Dynamic Spectrum Sharing Systems

    Directory of Open Access Journals (Sweden)

    Shadmand A

    2010-01-01

    Full Text Available We consider a dynamic spectrum sharing system consisting of a primary user, whose licensed spectrum is allowed to be accessed by a secondary user as long as it does not violate the prescribed interference limit inflicted on the primary user. Assuming the Nakagami- block-fading environment, we aim at maximizing the performance of secondary user's link in terms of average spectral efficiency (ASE and error performance under the specified packet error rate (PER and average interference limit constraints. To this end, we employ a cross-layer design policy which combines adaptive power and coded discrete M-QAM modulation scheme at the physical layer with a truncated automatic repeat request (ARQ protocol at the data link layer, and simultaneously satisfies the aforementioned constraints. Numerical results affirm that the secondary link of spectrum sharing system combining ARQ with adaptive modulation and coding (AMC achieves significant gain in ASE depending on the maximum number of retransmissions initiated by the ARQ protocol. The results further indicate that the ARQ protocol essentially improves the packet loss rate performance of the secondary link.

  18. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  19. PERFORMANCE OF OPPORTUNISTIC SPECTRUM ACCESS WITH SENSING ERROR IN COGNITIVE RADIO AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    N. ARMI

    2012-04-01

    Full Text Available Sensing in opportunistic spectrum access (OSA has a responsibility to detect the available channel by performing binary hypothesis as busy or idle states. If channel is busy, secondary user (SU cannot access and refrain from data transmission. SU is allowed to access when primary user (PU does not use it (idle states. However, channel is sensed on imperfect communication link. Fading, noise and any obstacles existed can cause sensing errors in PU signal detection. False alarm detects idle states as a busy channel while miss-identification detects busy states as an idle channel. False detection makes SU refrain from transmission and reduces number of bits transmitted. On the other hand, miss-identification causes SU collide to PU transmission. This paper study the performance of OSA based on the greedy approach with sensing errors by the restriction of maximum collision probability allowed (collision threshold by PU network. The throughput of SU and spectrum capacity metric is used to evaluate OSA performance and make comparisons to those ones without sensing error as function of number of slot based on the greedy approach. The relations between throughput and signal to noise ratio (SNR with different collision probability as well as false detection with different SNR are presented. According to the obtained results show that CR users can gain the reward from the previous slot for both of with and without sensing errors. It is indicated by the throughput improvement as slot number increases. However, sensing on imperfect channel with sensing errors can degrade the throughput performance. Subsequently, the throughput of SU and spectrum capacity improves by increasing maximum collision probability allowed by PU network as well. Due to frequent collision with PU, the throughput of SU and spectrum capacity decreases at certain value of collision threshold. Computer simulation is used to evaluate and validate these works.

  20. Opportunistic spectrum access in cognitive radio based on channel switching

    KAUST Repository

    Gaaloul, Fakhreddine; Yang, Hongchuan; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    This paper investigates the performance of a cognitive radio transceiver that can monitor multiple channels and opportunistically use any one of them should it be available. In our work, we propose and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. Two switching strategies, namely the switch and examine and the switch and stay strategies, are proposed. For these proposed access schemes, we investigate their performance by deriving the analytical expression of the novel metric of the average access duration and the average waiting time and based on these two metrics a time average SU throughput formula is proposed to predict the performance of the secondary cognitive system. © 2012 ICST.

  1. 76 FR 81991 - National Spectrum Sharing Research Experimentation, Validation, Verification, Demonstration and...

    Science.gov (United States)

    2011-12-29

    ... NATIONAL SCIENCE FOUNDATION National Spectrum Sharing Research Experimentation, Validation... requirements of national level spectrum research, development, demonstration, and field trial facilities... to determine the optimal way to manage and use the radio spectrum. During Workshop I held at Boulder...

  2. Performance analysis of distributed beamforming in a spectrum sharing system

    KAUST Repository

    Yang, Liang; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2012-01-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with the licensed primary users under an interference temperature constraint. We assume that DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit-error rate performance. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an outage probability analysis for a random vector quantization (RVQ) design algorithm. Numerical results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  3. Performance analysis of distributed beamforming in a spectrum sharing system

    KAUST Repository

    Yang, Liang

    2012-09-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with the licensed primary users under an interference temperature constraint. We assume that DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit-error rate performance. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an outage probability analysis for a random vector quantization (RVQ) design algorithm. Numerical results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  4. Switch and examine transmit diversity for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2011-01-01

    In this paper, we develop a switch and examine transmit diversity algorithm for spectrum sharing cognitive networks. We consider a cognitive network composed of a primary link that employs constant rate and constant power transmission scheme

  5. A Novel Two-Stage Dynamic Spectrum Sharing Scheme in Cognitive Radio Networks

    Institute of Scientific and Technical Information of China (English)

    Guodong Zhang; Wei Heng; Tian Liang; Chao Meng; Jinming Hu

    2016-01-01

    In order to enhance the efficiency of spectrum utilization and reduce communication overhead in spectrum sharing process,we propose a two-stage dynamic spectrum sharing scheme in which cooperative and noncooperative modes are analyzed in both stages.In particular,the existence and the uniqueness of Nash Equilibrium (NE) strategies for noncooperative mode are proved.In addition,a distributed iterative algorithm is proposed to obtain the optimal solutions of the scheme.Simulation studies are carried out to show the performance comparison between two modes as well as the system revenue improvement of the proposed scheme compared with a conventional scheme without a virtual price control factor.

  6. Capacity analysis of spectrum sharing spatial multiplexing MIMO systems

    KAUST Repository

    Yang, Liang; Qaraqe, Khalid A.; Serpedin, Erchin; Alouini, Mohamed-Slim

    2014-01-01

    This paper considers a spectrum sharing (SS) multiple-input multiple-output (MIMO) system operating in a Rayleigh fading environment. First the capacity of a single-user SS spatial multiplexing system is investigated in two scenarios that assume

  7. Energy efficient cross layer design for spectrum sharing systems

    KAUST Repository

    Alabbasi, AbdulRahman; Shihada, Basem

    2016-01-01

    We propose a cross layer design that optimizes the energy efficiency of spectrum sharing systems. The energy per good bit (EPG) is considered as an energy efficiency metric. We optimize the secondary user's transmission power and media access frame

  8. Interference-aware random beam selection for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed M.

    2012-09-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this paper, we develop interference-aware random beam selection schemes that provide enhanced throughput for the secondary link under the condition that the interference observed at the primary link is within a predetermined acceptable value. For a secondary transmitter equipped with multiple antennas, our schemes select a random beam, among a set of power- optimized orthogonal random beams, that maximizes the capacity of the secondary link while satisfying the interference constraint at the primary receiver for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the signal-to-noise and interference ratio (SINR) statistics as well as the capacity of the secondary link. Finally, we present numerical results that study the effect of system parameters including number of beams and the maximum transmission power on the capacity of the secondary link attained using the proposed schemes. © 2012 IEEE.

  9. Performance analysis of adaptive modulation for cognitive radios with opportunistic access

    KAUST Repository

    Chen, Yunfei; Alouini, Mohamed-Slim; Tang, Liang

    2011-01-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing and primary user traffic for Nakagami-m fading channels. Both the adaptive continuous rate scheme

  10. Analysis of technology and business antecedents for spectrum sharing in mobile broadband networks

    OpenAIRE

    Yrjölä, S. (Seppo)

    2017-01-01

    Abstract Sharing is emerging as one of the megatrends influencing future business opportunities, and wireless communications is no exception to this development. Future mobile broadband networks will operate on different types of spectrum bands including shared spectrum, which calls for changes in the operation and management of the networks. The creation and capture of value by the different players in the mobile broadband ecosystem is expected to change due to regulation, technology, an...

  11. On multiuser switched diversity transmission for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users share the spectrum with primary users. In particular, we devise two schemes for selecting the user among those that satisfy the interference constraints and achieve an acceptable signal-to-noise ratio (SNR) level. The first scheme selects the user with the maximum SNR at the receiver, whereas in the second scheme the users are scanned in a sequential manner until an acceptable user is found. In addition, we consider two power adaptive settings. In the on/off power adaptive setting, the users transmit based on whether the interference constraint is met or not while in the full power adaptive setting, the users vary their transmission power to satisfy the interference constraint. Finally, we present numerical results of our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load of both schemes. © 2012 ICST.

  12. On the performance of spectrum sharing systems with multiple antennas

    KAUST Repository

    Yang, Liang; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2012-01-01

    In this paper, we study the capacity of spectrum sharing (SS) multiple-input multiple-output (MIMO) systems over Rayleigh fading channels. More specifically, we present closed-form capacity formulas for such systems with and without optimal power

  13. Spectrum Of Opportunistic Infections In Aids Cases In A Tertiary Care Hospital In Nepal

    Directory of Open Access Journals (Sweden)

    Hari Shanker Joshi

    2006-12-01

    Full Text Available A retrospective study was carried out, 404 clinically suspected cases attending AIDS clinic at Manipal Teaching Hospital, Pokhara, Nepal to assess an occurance of opportunistic infections in AIDS cases. Study reveals that Tuberculosis (60%, Cryptospridiosis (13.33% and candidasis (11.11% are the predominant opportunistic infection in HIV/AIDS patients in the Pokharo village. Next common pathogen was found an ubiquitous yeast. Candida obtained from skin, oral cavity, oesophagus, sputum and stool. The least common documented documented infection was pneumocystis carini pneumonia (2.22%.

  14. Cooperative AF Relaying in Spectrum-Sharing Systems: Outage Probability Analysis under Co-Channel Interferences and Relay Selection

    KAUST Repository

    Xia, Minghua; Aissa, Sonia

    2012-01-01

    For cooperative amplify-and-forward (AF) relaying in spectrum-sharing wireless systems, secondary users share spectrum resources originally licensed to primary users to communicate with each other and, thus, the transmit power of secondary

  15. Performance of an opportunistic multi-user cognitive network with multiple primary users

    KAUST Repository

    Khan, Fahd Ahmed

    2014-04-01

    Consider a multi-user underlay cognitive network where multiple cognitive users, having limited peak transmit power, concurrently share the spectrum with a primary network with multiple users. The channel between the secondary network is assumed to have independent but not identical Nakagami-m fading. The interference channel between the secondary users and the primary users is assumed to have Rayleigh fading. The uplink scenario is considered where a single secondary user is selected for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the momentgenerating function, outage performance and the symbol-error-rate performance are derived. The outage performance is also studied in the asymptotic regimes and the generalized diversity gain of this scheduling scheme is derived. Numerical results corroborate the derived analytical results.

  16. Outage Analysis of Spectrum-Sharing over M-Block Fading with Sensing Information

    KAUST Repository

    Alabbasi, Abdulrahman

    2016-07-13

    Future wireless technologies, such as, 5G, are expected to support real-time applications with high data throughput, e.g., holographic meetings. From a bandwidth perspective, cognitive radio is a promising technology to enhance the system’s throughput via sharing the licensed spectrum. From a delay perspective, it is well known that increasing the number of decoding blocks will improve the system robustness against errors, while increasing the delay. Therefore, optimally allocating the resources to determine the tradeoff of tuning the length of decoding blocks while sharing the spectrum is a critical challenge for future wireless systems. In this work, we minimize the targeted outage probability over the block-fading channels while utilizing the spectrum-sharing concept. The secondary user’s outage region and the corresponding optimal power are derived, over twoblocks and M-blocks fading channels. We propose two suboptimal power strategies and derive the associated asymptotic lower and upper bounds on the outage probability with tractable expressions. These bounds allow us to derive the exact diversity order of the secondary user’s outage probability. To further enhance the system’s performance, we also investigate the impact of including the sensing information on the outage problem. The outage problem is then solved via proposing an alternating optimization algorithm, which utilizes the verified strict quasiconvex structure of the problem. Selected numerical results are presented to characterize the system’s behavior and show the improvements of several sharing concepts.

  17. Performance analysis of distributed beamforming in a spectrum sharing system

    KAUST Repository

    Yang, Liang

    2013-05-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with some licensed primary users under an interference temperature constraint. We assume that the DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit error rate performance metrics. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an analysis for a random vector quantization design algorithm. Specifically, the approximate statistics functions of the squared inner product between the optimal and quantized vectors are derived. With these statistics, we analyze the outage performance. Furthermore, the effects of channel estimation error and number of primary users on the system performance are investigated. Finally, optimal power adaptation and cochannel interference are considered and analyzed. Numerical and simulation results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  18. Spectrums of opportunistic infections and malignancies in HIV-infected patients in tertiary care hospital, China.

    Directory of Open Access Journals (Sweden)

    Jiang Xiao

    Full Text Available BACKGROUND: HIV-related opportunistic infections (OIs and malignancies continued to cause morbidity and mortality in Chinese HIV-infected individuals. The objective for this study is to elucidate the prevalence and spectrums of OIs and malignancies in HIV-infected patients in the Beijing Ditan Hospital. METHODS: The evaluation of the prevalence and spectrums of OIs and malignancies was conducted by using the clinical data of 834 HIV-infected patients admitted in the Beijing Ditan hospital from January 1, 2009, to November 30, 2012. RESULTS: The prevalence and spectrums of OIs and malignancies varied contingent on geographic region, transmission routes, and CD4 levels. We found that tuberculosis was most common OI and prevalence was 32.5%, followed by candidiasis(29.3%, Pneumocystis pneumonia(PCP(22.4%, cytomegalovirus(CMV infection(21.7%, other fungal infections(16.2%, mycobacterium avium complex(MAC(11.3%, cryptococcosis(8.0%, progressive multifocal leukoencephalopathy(PML(4.4%, Cerebral Toxoplasmosis(3.5% and Penicillium marneffei infection(1.4%; while Lymphoma(2.9%, Kaposi's sarcoma(0.8% and cervix carcinoma(0.3% were emerged as common AIDS-defining malignancies. Pulmonary OI infections were the most prevalent morbidity and mortality in patients in the AIDS stage including pulmonary tuberculosis (26.6% and PCP (22.4%. CMV infection(21.7% was most common viral infection; Fungal OIs were one of most prevalent morbidity in patients in the AIDS stage, including oral candidiasis (29.3%, other fungal infection (16.2%, Cryptococcosis (8.0% and Penicillium marneffei infection (1.4%. We found the low prevalence of AIDS-defining illnesses in central neural system in this study, including progressive multifocal leukoencephalopathy (4.4%, cerebral toxoplasmosis (3.5%, tuberculosis meningitis (3.2%, cryptococcal meningitis (2.4% and CMV encephalitis (1.1%. In-hospital mortality rate was 4.3 per 100 person-years due to severe OIs, malignancies, and medical

  19. Lung Infections in Systemic Rheumatic Disease: Focus on Opportunistic Infections.

    Science.gov (United States)

    Di Franco, Manuela; Lucchino, Bruno; Spaziante, Martina; Iannuccelli, Cristina; Valesini, Guido; Iaiani, Giancarlo

    2017-01-29

    Systemic rheumatic diseases have significant morbidity and mortality, due in large part to concurrent infections. The lung has been reported among the most frequent sites of infection in patients with rheumatic disease, who are susceptible to developing pneumonia sustained both by common pathogens and by opportunistic microorganisms. Patients with rheumatic disease show a peculiar vulnerability to infectious complications. This is due in part to intrinsic disease-related immune dysregulation and in part to the immunosuppressive treatments. Several therapeutic agents have been associated to a wide spectrum of infections, complicating the management of rheumatic diseases. This review discusses the most frequent pulmonary infections encountered in rheumatic diseases, focusing on opportunistic agents, consequent diagnostic challenges and appropriate therapeutic strategies.

  20. Cocoon: A lightweight opportunistic networking middleware for community-oriented smart mobile applications

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    Modern society is surrounded by an ample spectrum of smart mobile devices. This ubiquity forms a high potential for community-oriented opportunistic ad hoc networking applications. Nevertheless, today’s smart mobile devices such as smartphones, tablets, and wristbands are still onerous to

  1. Exploring the Cognitive Foundations of the Shared Attention Mechanism: Evidence for a Relationship Between Self-Categorization and Shared Attention Across the Autism Spectrum.

    Science.gov (United States)

    Skorich, Daniel P; Gash, Tahlia B; Stalker, Katie L; Zheng, Lidan; Haslam, S Alexander

    2017-05-01

    The social difficulties of autism spectrum disorder (ASD) are typically explained as a disruption in the Shared Attention Mechanism (SAM) sub-component of the theory of mind (ToM) system. In the current paper, we explore the hypothesis that SAM's capacity to construct the self-other-object relations necessary for shared-attention arises from a self-categorization process, which is weaker among those with more autistic-like traits. We present participants with self-categorization and shared-attention tasks, and measure their autism-spectrum quotient (AQ). Results reveal a negative relationship between AQ and shared-attention, via self-categorization, suggesting a role for self-categorization in the disruption in SAM seen in ASD. Implications for intervention, and for a ToM model in which weak central coherence plays a role are discussed.

  2. A Multi-Antenna Framework for Spectrum Reuse Based on Primary-Secondary Cooperation

    KAUST Repository

    Bakr, Omar; Johnson, Mark; Wild, Ben; Ramchandran, Kannan

    2008-01-01

    This paper proposes a new framework for spectrum reuse. Existing architectures have centered on secondary users (cognitive radios) that can reliably sense primary users and opportunistically transmit, without directly interacting with the primary system. We present a paradigm in which the primary and secondary systems cooperate, to minimize interference to primary users and provide predictable access for secondary users. Because this architecture gives the primary system full control over spectrum sharing, it could be more favorable in the current economic and political environment. We illustrate a concrete instance of our framework by showing how secondary radios can reuse the entire uplink channel of a cellular network, with only modest changes to the primary infrastructure. ©2008 IEEE.

  3. A Multi-Antenna Framework for Spectrum Reuse Based on Primary-Secondary Cooperation

    KAUST Repository

    Bakr, Omar

    2008-10-01

    This paper proposes a new framework for spectrum reuse. Existing architectures have centered on secondary users (cognitive radios) that can reliably sense primary users and opportunistically transmit, without directly interacting with the primary system. We present a paradigm in which the primary and secondary systems cooperate, to minimize interference to primary users and provide predictable access for secondary users. Because this architecture gives the primary system full control over spectrum sharing, it could be more favorable in the current economic and political environment. We illustrate a concrete instance of our framework by showing how secondary radios can reuse the entire uplink channel of a cellular network, with only modest changes to the primary infrastructure. ©2008 IEEE.

  4. Partial QoS-Aware Opportunistic Relay Selection Over Two-Hop Channels: End-to-End Performance Under Spectrum-Sharing Requirements

    KAUST Repository

    Yuli Yang,

    2014-10-01

    In this paper, we propose a partial quality-of-service (QoS)-oriented relay selection scheme with a decode-and-forward (DF) relaying protocol, to reduce the feedback amount required for relay selection. In the proposed scheme, the activated relay is the one with the maximum signal-to-noise power ratio (SNR) in the second hop among those whose packet loss rates (PLRs) in the first hop achieve a predetermined QoS level. For the purpose of evaluating the performance of the proposed scheme, we exploit it with transmission constraints imposed on the transmit power budget and interference to other users. By analyzing the statistics of received SNRs in the first and second hops, we obtain the end-to-end PLR of this scheme in closed form under the considered scenario. Moreover, to compare the proposed scheme with popular relay selection schemes, we also derive the closed-form PLR expressions for partial relay selection (PRS) and opportunistic relay selection (ORS) criteria in the same scenario under study. Illustrative numerical results demonstrate the accuracy of our derivations and substantiate that the proposed relay selection scheme is a promising alternative with respect to the tradeoff between performance and complexity.

  5. Joint random beam and spectrum selection for spectrum sharing systems with partial channel state information

    KAUST Repository

    Abdallah, Mohamed M.

    2013-11-01

    In this work, we develop joint interference-aware random beam and spectrum selection scheme that provide enhanced performance for the secondary network under the condition that the interference observed at the primary receiver is below a predetermined acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a set of primary links composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes jointly select a beam, among a set of power-optimized random beams, as well as the primary spectrum that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint. In particular, we consider the case where the interference level is described by a q-bit description of its magnitude, whereby we propose a technique to find the optimal quantizer thresholds in a mean square error (MSE) sense. © 2013 IEEE.

  6. Joint random beam and spectrum selection for spectrum sharing systems with partial channel state information

    KAUST Repository

    Abdallah, Mohamed M.; Sayed, Mostafa M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2013-01-01

    In this work, we develop joint interference-aware random beam and spectrum selection scheme that provide enhanced performance for the secondary network under the condition that the interference observed at the primary receiver is below a predetermined acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a set of primary links composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes jointly select a beam, among a set of power-optimized random beams, as well as the primary spectrum that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint. In particular, we consider the case where the interference level is described by a q-bit description of its magnitude, whereby we propose a technique to find the optimal quantizer thresholds in a mean square error (MSE) sense. © 2013 IEEE.

  7. End-to-end performance of cooperative relaying in spectrum-sharing systems with quality of service requirements

    KAUST Repository

    Asghari, Vahid Reza

    2011-07-01

    We propose adopting a cooperative relaying technique in spectrum-sharing cognitive radio (CR) systems to more effectively and efficiently utilize available transmission resources, such as power, rate, and bandwidth, while adhering to the quality of service (QoS) requirements of the licensed (primary) users of the shared spectrum band. In particular, we first consider that the cognitive (secondary) user\\'s communication is assisted by an intermediate relay that implements the decode-and-forward (DF) technique onto the secondary user\\'s relayed signal to help with communication between the corresponding source and the destination nodes. In this context, we obtain first-order statistics pertaining to the first- and second-hop transmission channels, and then, we investigate the end-to-end performance of the proposed spectrum-sharing cooperative relaying system under resource constraints defined to assure that the primary QoS is unaffected. Specifically, we investigate the overall average bit error rate (BER), ergodic capacity, and outage probability of the secondary\\'s communication subject to appropriate constraints on the interference power at the primary receivers. We then consider a general scenario where a cluster of relays is available between the secondary source and destination nodes. In this case, making use of the partial relay selection method, we generalize our results for the single-relay scheme and obtain the end-to-end performance of the cooperative spectrum-sharing system with a cluster of L available relays. Finally, we examine our theoretical results through simulations and comparisons, illustrating the overall performance of the proposed spectrum-sharing cooperative system and quantify its advantages for different operating scenarios and conditions. © 2011 IEEE.

  8. CBRS Spectrum Sharing between LTE-U and WiFi: A Multiarmed Bandit Approach

    Directory of Open Access Journals (Sweden)

    Imtiaz Parvez

    2016-01-01

    Full Text Available The surge of mobile devices such as smartphone and tablets requires additional capacity. To achieve ubiquitous and high data rate Internet connectivity, effective spectrum sharing and utilization of the wireless spectrum carry critical importance. In this paper, we consider the use of unlicensed LTE (LTE-U technology in the 3.5 GHz Citizens Broadband Radio Service (CBRS band and develop a multiarmed bandit (MAB based spectrum sharing technique for a smooth coexistence with WiFi. In particular, we consider LTE-U to operate as a General Authorized Access (GAA user; hereby MAB is used to adaptively optimize the transmission duty cycle of LTE-U transmissions. Additionally, we incorporate downlink power control which yields a high energy efficiency and interference suppression. Simulation results demonstrate a significant improvement in the aggregate capacity (approximately 33% and cell-edge throughput of coexisting LTE-U and WiFi networks for different base station densities and user densities.

  9. Coalition Formation and Spectrum Sharing of Cooperative Spectrum Sensing Participants.

    Science.gov (United States)

    Zhensheng Jiang; Wei Yuan; Leung, Henry; Xinge You; Qi Zheng

    2017-05-01

    In cognitive radio networks, self-interested secondary users (SUs) desire to maximize their own throughput. They compete with each other for transmit time once the absence of primary users (PUs) is detected. To satisfy the requirement of PU protection, on the other hand, they have to form some coalitions and cooperate to conduct spectrum sensing. Such dilemma of SUs between competition and cooperation motivates us to study two interesting issues: 1) how to appropriately form some coalitions for cooperative spectrum sensing (CSS) and 2) how to share transmit time among SUs. We jointly consider these two issues, and propose a noncooperative game model with 2-D strategies. The first dimension determines coalition formation, and the second indicates transmit time allocation. Considering the complexity of solving this game, we decompose the game into two more tractable ones: one deals with the formation of CSS coalitions, and the other focuses on the allocation of transmit time. We characterize the Nash equilibria (NEs) of both games, and show that the combination of these two NEs corresponds to the NE of the original game. We also develop a distributed algorithm to achieve a desirable NE of the original game. When this NE is achieved, the SUs obtain a Dhp-stable coalition structure and a fair transmit time allocation. Numerical results verify our analyses, and demonstrate the effectiveness of our algorithm.

  10. Simultaneous wireless information and power transfer for spectrum sharing in cognitive radio communication systems

    KAUST Repository

    Benkhelifa, Fatma

    2016-07-26

    In this paper, we consider the simultaneous wireless information and power transfer for the spectrum sharing (SS) in cognitive radio (CR) systems with a multi-antenna energy harvesting (EH) primary receiver (PR). The PR uses the antenna switching (AS) technique that assigns a subset of the PR\\'s antennas to harvest the energy from the radio frequency (RF) signals sent by the secondary transmitter (ST), and assigns the rest of the PR\\'s antennas to decode the information data. In this context, the primary network allows the secondary network to use the spectrum as long as the interference induced by the secondary transmitter (ST)\\'s signals is beneficial for the energy harvesting process at the PR side. The objective of this work is to show that the spectrum sharing is beneficial for both the SR and PR sides and leads to a win-win situation. To illustrate the incentive of the spectrum sharing cognitive system, we evaluate the mutual outage probability (MOP) introduced in [1] which declares an outage event if the PR or the secondary receiver (SR) is in an outage. Through the simulation results, we show that the performance of our system in terms of the MOP is always better than the performance of the system in the absence of ST and improves as the ST-PR interference increases. © 2016 IEEE.

  11. Analytical evaluation of adaptive-modulation-based opportunistic cognitive radio in nakagami-m fading channels

    KAUST Repository

    Chen, Yunfei; Alouini, Mohamed-Slim; Tang, Liang; Khan, Fahdahmed

    2012-01-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing, primary user (PU) traffic, and time delay for Nakagami- m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical examples are presented to quantify the effects of spectrum sensing, PU traffic, and time delay for different system parameters. © 1967-2012 IEEE.

  12. Analytical evaluation of adaptive-modulation-based opportunistic cognitive radio in nakagami-m fading channels

    KAUST Repository

    Chen, Yunfei

    2012-09-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing, primary user (PU) traffic, and time delay for Nakagami- m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical examples are presented to quantify the effects of spectrum sensing, PU traffic, and time delay for different system parameters. © 1967-2012 IEEE.

  13. Multihop Wireless Networks Opportunistic Routing

    CERN Document Server

    Zeng, Kai; Li, Ming

    2011-01-01

    This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol desig

  14. Two-way cooperative AF relaying in spectrum-sharing systems: Enhancing cell-edge performance

    KAUST Repository

    Xia, Minghua; Aï ssa, Sonia

    2012-01-01

    signal-to-noise ratio (SNR). These important findings provide fresh perspectives for system designers to improve spectral efficiency of secondary users in next-generation broadband spectrum-sharing wireless systems. © 2012 IEEE.

  15. Delay performance of a broadcast spectrum sharing network in Nakagami-m fading

    KAUST Repository

    Khan, Fahd Ahmed; Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2014-01-01

    In this paper, we analyze the delay performance of a point-to-multipoint secondary network (P2M-SN), which is concurrently sharing the spectrum with a point-to-multipoint primary network (P2M-PN). The channel is assumed to be independent

  16. Epidemiology and Ecology of Opportunistic Premise Plumbing Pathogens: Legionella pneumophila, Mycobacterium avium, and Pseudomonas aeruginosa

    Science.gov (United States)

    BACKGROUND: Legionella pneumophila, Mycobacterium avium, and Pseudomonas aeruginosa are opportunistic premise plumbing pathogens (OPPPs) that persist and grow in household plumbing, habitats they share with humans. Infections caused by these OPPPs involve individuals with preexis...

  17. Interference-Aware Spectrum Sharing Techniques for Next Generation Wireless Networks

    KAUST Repository

    Qaraqe, Marwa Khalid

    2011-11-20

    Background: Reliable high-speed data communication that supports multimedia application for both indoor and outdoor mobile users is a fundamental requirement for next generation wireless networks and requires a dense deployment of physically coexisting network architectures. Due to the limited spectrum availability, a novel interference-aware spectrum-sharing concept is introduced where networks that suffer from congested spectrums (secondary-networks) are allowed to share the spectrum with other networks with available spectrum (primary-networks) under the condition that limited interference occurs to primary networks. Objective: Multiple-antenna and adaptive rate can be utilized as a power-efficient technique for improving the data rate of the secondary link while satisfying the interference constraint of the primary link by allowing the secondary user to adapt its transmitting antenna, power, and rate according to the channel state information. Methods: Two adaptive schemes are proposed using multiple-antenna transmit diversity and adaptive modulation in order to increase the spectral-efficiency of the secondary link while maintaining minimum interference with the primary. Both the switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan-and-wait combining antenna technique (SWC) where there is a secondary transmission only when a branch with an acceptable performance is found; else the data is buffered. Results: In both these schemes the constellation size and selected transmit branch are determined to minimized the average number of switches and achieve the highest spectral efficiency given a minimum bit-error-rate (BER), fading conditions, and peak interference constraint. For delayed sensitive applications, two schemes using power control are used: SES-PC and BES-PC. In these schemes the secondary transmitter sends data using a nominal power level, which is optimized to minimize the average delay. Several numerical examples show

  18. Exploring the Cognitive Foundations of the Shared Attention Mechanism: Evidence for a Relationship between Self-Categorization and Shared Attention across the Autism Spectrum

    Science.gov (United States)

    Skorich, Daniel P.; Gash, Tahlia B.; Stalker, Katie L.; Zheng, Lidan; Haslam, S. Alexander

    2017-01-01

    The social difficulties of autism spectrum disorder (ASD) are typically explained as a disruption in the Shared Attention Mechanism (SAM) sub-component of the theory of mind (ToM) system. In the current paper, we explore the hypothesis that SAM's capacity to construct the self-other-object relations necessary for shared-attention arises from a…

  19. Spectrum of Opportunistic Fungal Infections in HIV/AIDS Patients in Tertiary Care Hospital in India

    Directory of Open Access Journals (Sweden)

    Ravinder Kaur

    2016-01-01

    Full Text Available HIV related opportunistic fungal infections (OFIs continue to cause morbidity and mortality in HIV infected patients. The objective for this prospective study is to elucidate the prevalence and spectrum of common OFIs in HIV/AIDS patients in north India. Relevant clinical samples were collected from symptomatic HIV positive patients (n=280 of all age groups and both sexes and subjected to direct microscopy and fungal culture. Identification as well as speciation of the fungal isolates was done as per the standard recommended methods. CD4+T cell counts were determined by flow cytometry using Fluorescent Activated Cell Sorter Count system. 215 fungal isolates were isolated with the isolation rate of 41.1%. Candida species (86.5% were the commonest followed by Aspergillus (6.5%, Cryptococcus (3.3%, Penicillium (1.9%, and Alternaria and Rhodotorula spp. (0.9% each. Among Candida species, Candida albicans (75.8% was the most prevalent species followed by C. tropicalis (9.7%, C. krusei (6.4%, C. glabrata (4.3%, C. parapsilosis (2.7%, and C. kefyr (1.1%. Study demonstrates that the oropharyngeal candidiasis is the commonest among different OFIs and would help to increase the awareness of clinicians in diagnosis and early treatment of these infections helping in the proper management of the patients especially in resource limited countries like ours.

  20. TVWS devices spectrum mask test and analysis

    CSIR Research Space (South Africa)

    Lamola, MM

    2016-09-01

    Full Text Available Dynamic Spectrum Access (DSA) plays a vital role in opportunistic access to spectrum. A key component of DSA is preventing interference to the incumbent (primary) user from the secondary user. We present the results of an experiment to analyze...

  1. Evaluation of Opportunistic Routing Algorithms on Opportunistic Mobile Sensor Networks with Infrastructure Assistance

    NARCIS (Netherlands)

    Le Viet Duc, L Duc; Scholten, Johan; Havinga, Paul J.M.

    2012-01-01

    Recently the increasing number of sensors integrated in smartphones, especially the iPhone and Android phones, has motivated the development of routing algorithms for Opportunistic Mobile Sensor Networks (OppMSNs). Although there are many existing opportunistic routing algorithms, researchers still

  2. Facilitating Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organizational settings, the paper explores how knowledge exchange can be conceptualized as going on in four...... distinct situations of exchange denominated organizational exchange yielding extrinsic rewards, organizational exchange yielding intrinsic rewards, financial exchange, and social exchange. The paper argues that each situation of exchange has distinct assumptions about individual behaviour...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  3. Two-way cooperative AF relaying in spectrum-sharing systems: Enhancing cell-edge performance

    KAUST Repository

    Xia, Minghua

    2012-09-01

    In this contribution, two-way cooperative amplify-and-forward (AF) relaying technique is integrated into spectrumsharing wireless systems to improve spectral efficiency of secondary users (SUs). In order to share the available spectrum resources originally dedicated to primary users (PUs), the transmit power of a SU is optimized with respect to the average tolerable interference power at primary receivers. By analyzing outage probability and achievable data rate at the base station and at a cell-edge SU, our results reveal that the uplink performance is dominated by the average tolerable interference power at primary receivers, while the downlink always behaves like conventional one-way AF relaying and its performance is dominated by the average signal-to-noise ratio (SNR). These important findings provide fresh perspectives for system designers to improve spectral efficiency of secondary users in next-generation broadband spectrum-sharing wireless systems. © 2012 IEEE.

  4. UAS CNPC Satellite Link Performance - Sharing Spectrum with Terrestrial Systems

    Science.gov (United States)

    Kerczewski, Robert J.; Wilson, Jeffrey D.; Bishop, William D.

    2016-01-01

    In order to provide for the safe integration of unmanned aircraft systems into the National Airspace System, the control and non-payload communications (CNPC) link connecting the ground-based pilot with the unmanned aircraft must be highly reliable. A specific requirement is that it must operate using aviation safety radiofrequency spectrum. The 2012 World Radiocommunication Conference (WRC-12) provided a potentially suitable allocation for radio line-of-sight (LOS), terrestrial based CNPC link at 5030-5091 MHz. For a beyond radio line-of-sight (BLOS), satellite-based CNPC link, aviation safety spectrum allocations are currently inadequate. Therefore, the 2015 WRC will consider the use of Fixed Satellite Service (FSS) bands to provide BLOS CNPC under Agenda Item 1.5. This agenda item requires studies to be conducted to allow for the consideration of how unmanned aircraft can employ FSS for BLOS CNPC while maintaining existing systems. Since there are terrestrial Fixed Service systems also using the same frequency bands under consideration in Agenda Item 1.5 one of the studies required considered spectrum sharing between earth stations on-board unmanned aircraft and Fixed Service station receivers. Studies carried out by NASA have concluded that such sharing is possible under parameters previously established by the International Telecommunications Union. As the preparation for WRC-15 has progressed, additional study parameters Agenda Item 1.5 have been proposed, and some studies using these parameters have been added. This paper examines the study results for the original parameters as well as results considering some of the more recently proposed parameters to provide insight into the complicated process of resolving WRC-15 Agenda Item 1.5 and achieving a solution for BLOS CNPC for unmanned aircraft.

  5. SpecNet: Spectrum Sensing Sans Frontieres

    OpenAIRE

    Iyer, Anand Padmanabha; Chintalapudi, Krishna; Navda, Vishnu; Ramjee, Ramachandran; Padmanabhan, Venkata N; Murthy, Chandra R

    2011-01-01

    While the under-utilization of licensed spectrum based on measurement studies conducted in a few developed countries has spurred lots of interest in opportunistic spectrum access, there exists no infrastructure today for measuring real-time spectrum occupancy across vast geographical regions. In this paper, we present the design and implementation of SpecNet, a first-of-its-kind platform that allows spectrum analyzers around the world to be networked and efficiently used in a coordinated manner...

  6. Underlay Spectrum Sharing Techniques with In-Band Full-Duplex Systems using Improper Gaussian Signaling

    KAUST Repository

    Gaafar, Mohamed; Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim

    2016-01-01

    Sharing the spectrum with in-band full-duplex (FD) primary users (PUs) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-interference introduced at the primary network may dramatically impede

  7. Shared familial transmission of autism spectrum and attention-deficit/hyperactivity disorders.

    Science.gov (United States)

    Musser, Erica D; Hawkey, Elizabeth; Kachan-Liu, Svetlana S; Lees, Paul; Roullet, Jean-Baptiste; Goddard, Katrina; Steiner, Robert D; Nigg, Joel T

    2014-07-01

    To determine whether familial transmission is shared between autism spectrum disorders and attention-deficit/hyperactivity disorder, we assessed the prevalence, rates of comorbidity, and familial transmission of both disorders in a large population-based sample of children during a recent 7 year period. Study participants included all children born to parents with the Kaiser Permanente Northwest (KPNW) Health Plan between 1 January 1998 and 31 December 2004 (n = 35,073). Children and mothers with physician-identified autism spectrum disorders (ASD) and/or attention-deficit/hyperactivity disorder (ADHD) were identified via electronic medical records maintained for all KPNW members. Among children aged 6-12 years, prevalence was 2.0% for ADHD and 0.8% for ASD; within those groups, 0.2% of the full sample (19% of the ASD sample and 9.6% of the ADHD sample) had co-occurring ASD and ADHD, when all children were included. When mothers had a diagnosis of ADHD, first born offspring were at 6-fold risk of ADHD alone (OR = 5.02, p disorders shares familial transmission with ADHD. ADHD and ASD have a partially overlapping diathesis. © 2014 The Authors. Journal of Child Psychology and Psychiatry. © 2014 Association for Child and Adolescent Mental Health.

  8. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2016-01-01

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered

  9. Spectrum Sharing Based on a Bertrand Game in Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Biqing Zeng

    2017-01-01

    Full Text Available In the study of power control and allocation based on pricing, the utility of secondary users is usually studied from the perspective of the signal to noise ratio. The study of secondary user utility from the perspective of communication demand can not only promote the secondary users to meet the maximum communication needs, but also to maximize the utilization of spectrum resources, however, research in this area is lacking, so from the viewpoint of meeting the demand of network communication, this paper designs a two stage model to solve spectrum leasing and allocation problem in cognitive radio sensor networks (CRSNs. In the first stage, the secondary base station collects the secondary network communication requirements, and rents spectrum resources from several primary base stations using the Bertrand game to model the transaction behavior of the primary base station and secondary base station. The second stage, the subcarriers and power allocation problem of secondary base stations is defined as a nonlinear programming problem to be solved based on Nash bargaining. The simulation results show that the proposed model can satisfy the communication requirements of each user in a fair and efficient way compared to other spectrum sharing schemes.

  10. End-to-end performance of cooperative relaying in spectrum-sharing systems with quality of service requirements

    KAUST Repository

    Asghari, Vahid Reza; Aissa, Sonia

    2011-01-01

    We propose adopting a cooperative relaying technique in spectrum-sharing cognitive radio (CR) systems to more effectively and efficiently utilize available transmission resources, such as power, rate, and bandwidth, while adhering to the quality

  11. Energy efficient cross layer design for spectrum sharing systems

    KAUST Repository

    Alabbasi, Abdulrahman

    2016-10-06

    We propose a cross layer design that optimizes the energy efficiency of spectrum sharing systems. The energy per good bit (EPG) is considered as an energy efficiency metric. We optimize the secondary user\\'s transmission power and media access frame length to minimize the EPG metric. We protect the primary user transmission via an outage probability constraint. The non-convex targeted problem is optimized by utilizing the generalized convexity theory and verifying the strictly pseudo-convex structure of the problem. Analytical results of the optimal power and frame length are derived. We also used these results in proposing an algorithm, which guarantees the existence of a global optimal solution. Selected numerical results show the improvement of the proposed system compared to other systems. © 2016 IEEE.

  12. Spectrum sharing in cognitive radio networks medium access control protocol based approach

    CERN Document Server

    Pandit, Shweta

    2017-01-01

    This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.

  13. A Unified Framework for the Ergodic Capacity of Spectrum Sharing Cognitive Radio Systems

    KAUST Repository

    Sboui, Lokman

    2012-12-29

    We consider a spectrum sharing communication scenario in which a primary and a secondary users are communicating, simultaneously, with their respective destinations using the same frequency carrier. Both optimal power profile and ergodic capacity are derived for fading channels, under an average transmit power and an instantaneous interference outage constraints. Unlike previous studies, we assume that the secondary user has a noisy version of the cross link and the secondary link Channel State Information (CSI). After deriving the capacity in this case, we provide an ergodic capacity generalization, through a unified expression, that encompasses several previously studied spectrum sharing settings. In addition, we provide an asymptotic capacity analysis at high and low signal-to-noise ratio (SNR). Numerical results, applied for independent Rayleigh fading channels, show that at low SNR regime, only the secondary channel estimation matters with no effect of the cross link on the capacity; whereas at high SNR regime, the capacity is rather driven by the cross link CSI. Furthermore, a practical on-off power allocation scheme is proposed and is shown, through numerical results, to achieve the full capacity at high and low SNR regimes and suboptimal rates in the medium SNR regime.

  14. Sharing the Licensed Spectrum of Full-Duplex Systems using Improper Gaussian Signaling

    KAUST Repository

    Gaafar, Mohamed; Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim

    2016-01-01

    Sharing the spectrum with in-band full-duplex (FD) primary users (PU) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-inteference introducsed at the primary network may dramatically impede the secondary user (SU) opportunity to access the spectrum. In this work, we attempt to tackle this problem through the use of so called improper Gaussian signaling (IGS). Such a signaling technique has demonstrated its superiority in improving the overall performance in interference limited networks. Particularly, we assume a system with a SU pair working in half-duplex mode that uses IGS while the FD PU pair implements the regular proper Gaussiam signaling techniques. Frist, we derive a closed form expression for the SU outage probability while maintaining the required PU quality-of-service based on the average channel state information. Finally, we provide some numerical results that validate the tightness of the PU outage probability bound and demonstrate the advantage of employing IGS to the SU in order to access the spectrum of the FD PU.

  15. Sharing the Licensed Spectrum of Full-Duplex Systems using Improper Gaussian Signaling

    KAUST Repository

    Gaafar, Mohamed

    2016-01-06

    Sharing the spectrum with in-band full-duplex (FD) primary users (PU) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-inteference introducsed at the primary network may dramatically impede the secondary user (SU) opportunity to access the spectrum. In this work, we attempt to tackle this problem through the use of so called improper Gaussian signaling (IGS). Such a signaling technique has demonstrated its superiority in improving the overall performance in interference limited networks. Particularly, we assume a system with a SU pair working in half-duplex mode that uses IGS while the FD PU pair implements the regular proper Gaussiam signaling techniques. Frist, we derive a closed form expression for the SU outage probability while maintaining the required PU quality-of-service based on the average channel state information. Finally, we provide some numerical results that validate the tightness of the PU outage probability bound and demonstrate the advantage of employing IGS to the SU in order to access the spectrum of the FD PU.

  16. On the performance of spectrum sharing systems with two-way relaying and multiuser diversity

    KAUST Repository

    Yang, Liang

    2012-08-01

    In this letter, we consider a spectrum sharing network with two-way relaying and multi-user diversity. More specifically, one secondary transmitter with the best channel quality is selected and splits its partial power to relay its received signals to the primary users by using the amplify-and-forward relaying protocol. We derive a tight approximation for the resulting outage probability. Based on this formula, the performance of the spectral sharing region and the cell coverage are analyzed. Numerical results are given to verify our analysis and are discussed to illustrate the advantages of our newly proposed scheme. © 1997-2012 IEEE.

  17. Stimulating Creativity Through Opportunistic Software Development

    NARCIS (Netherlands)

    Z. Obrenovic; D. Gasevic; A. P. W. Eliëns (Anton)

    2008-01-01

    htmlabstractUsing opportunistic software development principles in computer engineering education encourages students to be creative and to develop solutions that cross the boundaries of diverse technologies. A framework for opportunistic software development education helps to create a space in

  18. Stimulating creativity through opportunistic software development

    NARCIS (Netherlands)

    Obrenovic, Z.; Gasevic, D.; Eliëns, A.

    2008-01-01

    Using opportunistic software development principles in computer engineering education encourages students to be creative and to develop solutions that cross the boundaries of diverse technologies. A framework for opportunistic software development education helps to create a space in which students

  19. Sum-rate analysis of spectrum sharing spatial multiplexing MIMO systems with zero-forcing and multiuser diversity

    KAUST Repository

    Yang, Liang; Qaraqe, Khalid A.; Serpedin, Erchin; Alouini, Mohamed-Slim

    2013-01-01

    This paper considers a multiuser spectrum sharing (SS) multiple-input multiple-output (MIMO) system with zero-forcing (ZF) operating in a Rayleigh fading environment. We provide an asymptotic sum-rate analysis to investigate the effects of different

  20. Opportunistic Sensing in Wireless Sensor Networks

    NARCIS (Netherlands)

    Scholten, Johan; Bakker, Pascal

    Opportunistic sensing systems consist of changing constellations of wireless sensor nodes that, for a limited amount of time, work together to achieve a common goal. Such constellations are self-organizing and come into being spontaneously. This paper presents an opportunistic sensing system to

  1. Opportunistic resource usage in CMS

    International Nuclear Information System (INIS)

    Kreuzer, Peter; Hufnagel, Dirk; Dykstra, D; Gutsche, O; Tadel, M; Sfiligoi, I; Letts, J; Wuerthwein, F; McCrea, A; Bockelman, B; Fajardo, E; Linares, L; Wagner, R; Konstantinov, P; Blumenfeld, B; Bradley, D

    2014-01-01

    CMS is using a tiered setup of dedicated computing resources provided by sites distributed over the world and organized in WLCG. These sites pledge resources to CMS and are preparing them especially for CMS to run the experiment's applications. But there are more resources available opportunistically both on the GRID and in local university and research clusters which can be used for CMS applications. We will present CMS' strategy to use opportunistic resources and prepare them dynamically to run CMS applications. CMS is able to run its applications on resources that can be reached through the GRID, through EC2 compliant cloud interfaces. Even resources that can be used through ssh login nodes can be harnessed. All of these usage modes are integrated transparently into the GlideIn WMS submission infrastructure, which is the basis of CMS' opportunistic resource usage strategy. Technologies like Parrot to mount the software distribution via CVMFS and xrootd for access to data and simulation samples via the WAN are used and will be described. We will summarize the experience with opportunistic resource usage and give an outlook for the restart of LHC data taking in 2015.

  2. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2012-12-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  3. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa; Abdallah, Mohamed M.; Serpedin, Erchin; Alouini, Mohamed-Slim; Alnuweiri, Hussein M.

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  4. Low-Feedback Opportunistic Scheduling Schemes for Wireless Networks with Heterogenous Users

    KAUST Repository

    Rashid, Faraan

    2012-07-01

    Efficient implementation of resource sharing strategies in a multi-user wireless environment can improve the performance of a network significantly. In this thesis we study various scheduling strategies for wireless networks and handle the problem of opportunistically scheduling transmissions using channel aware schemes. First we propose a scheme that can handle users with asymmetric channel conditions and is opportunistic in the sense that it exploits the multi-user diversity of the network. The scheme requires the users to have a priori knowledge of their channel distributions. The associated overhead is limited meaning it offers reduced feedback load, that does not scale with the increasing number of users. The main technique used to shrink the feedback load is the contention based distributed implementation of a splitting algorithm that does not require explicit feedback to the scheduler from every user. The users find the best among themselves, in a distributed manner, while requiring just a ternary broadcast feedback from the scheduler at the end of each mini-slot. In addition, it can also handle fairness constraints in time and throughput to various degrees. Next we propose another opportunistic scheduler that offers most of the benefits of the previously proposed scheme but is more practical because it can also handle heterogenous users whose channel distributions are unknown. This new scheme actually reduces the complexity and is also more robust for changing traffic patterns. Finally we extend both these schemes to the scenario where there are fixed thresholds, this enables us to handle opportunistic scheduling in practical systems that can only transmit over finite number of discrete rates with the additional benefit that full feedback session, even from the selected user, is never required.

  5. Sharing the Licensed Spectrum of Full-Duplex Systems Using Improper Gaussian Signaling

    KAUST Repository

    Gaafar, Mohamed

    2015-12-01

    Sharing the spectrum with in-band full-duplex (FD) primary users (PU) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-interference introduced at the primary network may dramatically impede the secondary user (SU) opportunity to access the spectrum. In this work, we attempt to tackle this problem through the use of the so-called improper Gaussian signaling. Such a signaling technique has demonstrated its superiority in improving the overall performance in interference limited networks. Particularly, we assume a system with a SU pair working in half-duplex mode that uses improper Gaussian signaling while the FD PU pair implements the regular proper Gaussian signaling techniques. First, we derive a closed form expression for the SU outage probability and an upper bound for the PU outage probability. Then, we optimize the SU signal parameters to minimize its outage probability while maintaining the required PU quality-of-service based on the average channel state information. Finally, we provide some numerical results that validate the tightness of the PU outage probability bound and demonstrate the advantage of employing the improper Gaussian signaling to the SU in order to access the spectrum of the FD PU.

  6. Location-based resource allocation for OFDMA cognitive radio systems

    KAUST Repository

    Nam, Haewoon; Ben Ghorbel, Mahdi; Alouini, Mohamed-Slim

    2010-01-01

    In cognitive radio systems, in order for the secondary users to opportunistically share the spectrum without interfering the primary users, an accurate spectrum measurement and a precise estimation of the interference at the primary users

  7. New resource allocation scheme for cognitive relay networks with opportunistic access

    KAUST Repository

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  8. Spectrum sharing opportunities of full-duplex systems using improper Gaussian signaling

    KAUST Repository

    Gaafar, Mohamed

    2015-08-01

    Sharing the licensed spectrum of full-duplex (FD) primary users (PU) brings strict limitations on the underlay cognitive radio operation. Particularly, the self interference may overwhelm the PU receiver and limit the opportunity of secondary users (SU) to access the spectrum. Improper Gaussian signaling (IGS) has demonstrated its superiority in improving the performance of interference channel systems. Throughout this paper, we assume a FD PU pair that uses proper Gaussian signaling (PGS), and a half-duplex SU pair that uses IGS. The objective is to maximize the SU instantaneous achievable rate while meeting the PU quality-of-service. To this end, we propose a simplified algorithm that optimizes the SU signal parameters, i.e, the transmit power and the circularity coefficient, which is a measure of the degree of impropriety of the SU signal, to achieve the design objective. Numerical results show the merits of adopting IGS compared with PGS for the SU especially with the existence of week PU direct channels and/or strong SU interference channels.

  9. Distance-Based Opportunistic Mobile Data Offloading.

    Science.gov (United States)

    Lu, Xiaofeng; Lio, Pietro; Hui, Pan

    2016-06-15

    Cellular network data traffic can be offload onto opportunistic networks. This paper proposes a Distance-based Opportunistic Publish/Subscribe (DOPS) content dissemination model, which is composed of three layers: application layer, decision-making layer and network layer. When a user wants new content, he/she subscribes on a subscribing server. Users having the contents decide whether to deliver the contents to the subscriber based on the distance information. If in the meantime a content owner has traveled further in the immediate past time than the distance between the owner and the subscriber, the content owner will send the content to the subscriber through opportunistic routing. Simulations provide an evaluation of the data traffic offloading efficiency of DOPS.

  10. Spectrum Utilisation and Management in Cognitive Radio Networks

    DEFF Research Database (Denmark)

    Patil, Kishor P.

    have confirmed this by showing that the considerable amount of radio spectrum is underutilized. Dynamic Spectrum Access (DSA) and the spectrum refarming are the two viable solutions for the problem of spectrum scarcity. In DSA, unlicensed user opportunistically uses the vacant licensed spectrum...... of licensed spectrum provides efficient use of spectrum. Spectrum refarming means the recovery of spectrum from its existing users for the purpose of re-assignment, either for new uses, or for the introduction of new spectrally efficient technologies. Spectrum refarming is a spectrum management tool that can......In recent years, the demand for radio spectrum for wireless communication is growing due to increase in number of users and popularity of data and multimedia services. This has been observed in the recent auctions completed word wide for the vestige of radio spectrum. The radio spectrum has been...

  11. Opportunistic Data Collection in Sparse Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Franceschinis Mirko

    2011-01-01

    Full Text Available Opportunistic wireless sensor networks (WSNs have recently been proposed as solutions for many remote monitoring problems. Many such problems, including environmental monitoring, involve large deployment scenarios with lower-than-average node density, as well as a long time scale and limited budgets. Traditional approaches designed for conventional situations, and thus not optimized for these scenarios, entail unnecessary complexity and larger costs. This paper discusses the issues related with the design and test of opportunistic architectures, and presents one possible solution—CHARON (Convergent Hybrid-replication Approach to Routing in Opportunistic Networks. Both algorithm-specific and comparative simulation results are presented, as well as real-world tests using a reference implementation. A comprehensive experimental setup was also used to seek a full characterization of the devised opportunistic approach including the derivation of a simple analytical model that is able to accurately predict the opportunistic message delivery performance in the used test bed.

  12. Distance-Based Opportunistic Mobile Data Offloading

    Directory of Open Access Journals (Sweden)

    Xiaofeng Lu

    2016-06-01

    Full Text Available Cellular network data traffic can be offload onto opportunistic networks. This paper proposes a Distance-based Opportunistic Publish/Subscribe (DOPS content dissemination model, which is composed of three layers: application layer, decision-making layer and network layer. When a user wants new content, he/she subscribes on a subscribing server. Users having the contents decide whether to deliver the contents to the subscriber based on the distance information. If in the meantime a content owner has traveled further in the immediate past time than the distance between the owner and the subscriber, the content owner will send the content to the subscriber through opportunistic routing. Simulations provide an evaluation of the data traffic offloading efficiency of DOPS.

  13. Opportunistic quantum network coding based on quantum teleportation

    Science.gov (United States)

    Shang, Tao; Du, Gang; Liu, Jian-wei

    2016-04-01

    It seems impossible to endow opportunistic characteristic to quantum network on the basis that quantum channel cannot be overheard without disturbance. In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation. Concretely, it utilizes quantum channel for secure transmission of quantum states and can detect eavesdroppers by means of quantum channel verification. What is more, it utilizes classical channel for both opportunistic listening to neighbor states and opportunistic coding by broadcasting measurement outcome. Analysis results show that our scheme can reduce the times of transmissions over classical channels for relay nodes and can effectively defend against classical passive attack and quantum active attack.

  14. Specialized Fungal Parasites and Opportunistic Fungi in Gardens of Attine Ants

    Directory of Open Access Journals (Sweden)

    Fernando C. Pagnocca

    2012-01-01

    Full Text Available Ants in the tribe Attini (Hymenoptera: Formicidae comprise about 230 described species that share the same characteristic: all coevolved in an ancient mutualism with basidiomycetous fungi cultivated for food. In this paper we focused on fungi other than the mutualistic cultivar and their roles in the attine ant symbiosis. Specialized fungal parasites in the genus Escovopsis negatively impact the fungus gardens. Many fungal parasites may have small impacts on the ants' fungal colony when the colony is balanced, but then may opportunistically shift to having large impacts if the ants' colony becomes unbalanced.

  15. Radar spectrum opportunities for cognitive communications transmission

    OpenAIRE

    Wang, L; McGeehan, JP; Williams, C; Doufexi, A

    2008-01-01

    In relation to opportunistic access to radar spectrum, the impact of the radar on a communication system is investigated in this paper. This paper illustrates that by exploring the spatial and temporal opportunities in the radar spectrum and therefore improving the tolerance level to radar interference, a substantial increase on the throughput of a communication system is possible. Results are presented regarding the impact of swept radars on a WiMAX system. The results show the impact of SIR...

  16. Opportunistic infection of HIV/AIDS patients in West Papua

    Science.gov (United States)

    Witaningrum, A. M.; Khairunisa, S. Q.; Yunifiar, M. Q.; Bramanthi, R.; Rachman, B. E.; Nasronudin

    2018-03-01

    Human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS) had a major impact on health problemin Indonesia. HIV type 1 (HIV-1) epidemic is currently infected with HIV viruses developing rapidly in Indonesia.Papua provinces have the highest prevalence rate of human immunodeficiency virus type 1 (HIV-1) infection in Indonesia; however, data on opportunistic infection of HIV-1 are limited. The study using medical records as a research sample was conducted among HIV patients from January 2013 - December 2014 in Sele be Solu hospital among 49 patients. Opportunistic infections commonly occur in HIV-infected patients. The aim of the study was to know theprevalence of opportunistic infection among HIV positive patients in West Papua. Forty-nine HIV-1 patients were collected in Sele be Solu Hospital, West Papua.Opportunistic infection was identified such as tuberculosis, tuberculosis Pulmo, tuberculosis and candidiasis, candidiasis and diarrhea. The clinical sign appeared in HIV infected patients such as itchy, cough and loss weight. The prevalence of opportunistic infection indicated the necessity of monitoring the opportunistic infection of HIV/AIDS patients in Indonesia.

  17. Iterative group splitting algorithm for opportunistic scheduling systems

    KAUST Repository

    Nam, Haewoon; Alouini, Mohamed-Slim

    2014-01-01

    An efficient feedback algorithm for opportunistic scheduling systems based on iterative group splitting is proposed in this paper. Similar to the opportunistic splitting algorithm, the proposed algorithm adjusts (or lowers) the feedback threshold

  18. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon; Alouini, Mohamed-Slim

    2011-01-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers

  19. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar; Alouini, Mohamed-Slim; Chen, Yunfei; Radaydeh, Redha M.

    2012-01-01

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  20. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar

    2012-09-16

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  1. Performance analysis of an opportunistic multi-user cognitive network with multiple primary users

    KAUST Repository

    Khan, Fahd Ahmed

    2014-03-01

    Consider a multi-user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network with multiple users. The channel between the secondary network is assumed to have independent but not identical Nakagami-m fading. The interference channel between the secondary users (SUs) and the primary users is assumed to have Rayleigh fading. A power allocation based on the instantaneous channel state information is derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each SU. The uplink scenario is considered where a single SU is selected for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the moment-generating function, outage performance, symbol error rate performance, and the ergodic capacity are derived. Numerical results corroborate the derived analytical results. The performance is also studied in the asymptotic regimes, and the generalized diversity gain of this scheduling scheme is derived. It is shown that when the interference channel is deeply faded and the peak transmit power constraint is relaxed, the scheduling scheme achieves full diversity and that increasing the number of primary users does not impact the diversity order. © 2014 John Wiley & Sons, Ltd.

  2. Error-rate performance analysis of opportunistic regenerative relaying

    KAUST Repository

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2011-01-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path can

  3. Performance analysis of opportunistic nonregenerative relaying

    KAUST Repository

    Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.; Yang, Hongchuan

    2013-01-01

    Opportunistic relaying in cooperative communication depends on careful relay selection. However, the traditional centralized method used for opportunistic amplify-and-forward protocols requires precise measurements of channel state information at the destination. In this paper, we adopt the max-min criterion as a relay selection framework for opportunistic amplify-and-forward cooperative communications, which was exhaustively used for the decode-and-forward protocol, and offer an accurate performance analysis based on exact statistics of the local signal-to-noise ratios of the best relay. Furthermore, we evaluate the asymptotical performance and deduce the diversity order of our proposed scheme. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over Rayleigh fading channels, and we compare the max-min relay selection with their centralized channel state information-based and partial relay selection counterparts.

  4. Auction based spectrum management of cognitive radio networks

    DEFF Research Database (Denmark)

    Chang, H. B.; Chen, K.-C.; Prasad, Ramjee

    2009-01-01

    (PS-MSs), and we therefore construct a cognitive radio network (CRN) consisting of a PRN with multiple CR-MSs. We propose a spectrum management policy framework such that CR-MSs can compete in utilization of the PRN spectrum bands available to opportunistic transmission of CR-MSs by Vickrey auction...... to the PRN, the overall spectrum utilization, the profit of the service provider, the spectrum access opportunity of the CR-MSs are increased to achieve cowin situation for every party in cognitive radio networks.......Cognitive radio (CR) technology is considered as an effective solution to enhance overall spectrum efficiency, especially primary radio network (PRN) typically having relatively low spectrum utilization. However, to realize CR concept, it is essential to provide enough incentives to PRN and extra...

  5. Indigenous opportunistic bacteria inhabit mammalian gut-associated lymphoid tissues and share a mucosal antibody-mediated symbiosis.

    Science.gov (United States)

    Obata, Takashi; Goto, Yoshiyuki; Kunisawa, Jun; Sato, Shintaro; Sakamoto, Mitsuo; Setoyama, Hiromi; Matsuki, Takahiro; Nonaka, Kazuhiko; Shibata, Naoko; Gohda, Masashi; Kagiyama, Yuki; Nochi, Tomonori; Yuki, Yoshikazu; Fukuyama, Yoshiko; Mukai, Akira; Shinzaki, Shinichiro; Fujihashi, Kohtaro; Sasakawa, Chihiro; Iijima, Hideki; Goto, Masatoshi; Umesaki, Yoshinori; Benno, Yoshimi; Kiyono, Hiroshi

    2010-04-20

    The indigenous bacteria create natural cohabitation niches together with mucosal Abs in the gastrointestinal (GI) tract. Here we report that opportunistic bacteria, largely Alcaligenes species, specifically inhabit host Peyer's patches (PPs) and isolated lymphoid follicles, with the associated preferential induction of antigen-specific mucosal IgA Abs in the GI tract. Alcaligenes were identified as the dominant bacteria on the interior of PPs from naïve, specific-pathogen-free but not from germ-free mice. Oral transfer of intratissue uncultured Alcaligenes into germ-free mice resulted in the presence of Alcaligenes inside the PPs of recipients. This result was further supported by the induction of antigen-specific Ab-producing cells in the mucosal (e.g., PPs) but not systemic compartment (e.g., spleen). The preferential presence of Alcaligenes inside PPs and the associated induction of intestinal secretory IgA Abs were also observed in both monkeys and humans. Localized mucosal Ab-mediated symbiotic immune responses were supported by Alcaligenes-stimulated CD11c(+) dendritic cells (DCs) producing the Ab-enhancing cytokines TGF-beta, B-cell-activating factor belonging to the TNF family, and IL-6 in PPs. These CD11c(+) DCs did not migrate beyond the draining mesenteric lymph nodes. In the absence of antigen-specific mucosal Abs, the presence of Alcaligenes in PPs was greatly diminished. Thus, indigenous opportunistic bacteria uniquely inhabit PPs, leading to PP-DCs-initiated, local antigen-specific Ab production; this may involve the creation of an optimal symbiotic environment on the interior of the PPs.

  6. Effects of a Social Skills Intervention on Children with Autism Spectrum Disorder and Peers with Shared Deficits

    Science.gov (United States)

    Radley, Keith C.; O'Handley, Roderick D.; Battaglia, Allison A.; Lum, John D. K.; Dadakhodjaeva, Komila; Ford, William B.; McHugh, Melissa B.

    2017-01-01

    The current study evaluated the effects of the "Superheroes Social Skills" program (Jenson et al. 2011) in promoting accurate demonstration of target social skills in training and generalization conditions in young children with autism spectrum disorder (ASD) and peers with shared social deficits. Three preschool-age children with ASD…

  7. Opportunistic Music

    OpenAIRE

    Hachet , Martin; Kian , Arash; Berthaut , Florent; Franco , Jean-Sébastien; Desainte-Catherine , Myriam

    2009-01-01

    International audience; While mixed reality has inspired the development of many new musical instruments, few approaches explore the potential of mobile setups. We present a new musical interaction concept, called "opportunistic music". It allows musicians to recreate a hardware musical controller using any objects of their immediate environment. This approach benefits from the physical properties of real objects for controlling music. Our prototype is based on a stereo-vision tracking system...

  8. Economic transactions, opportunistic behavior and protective mechanisms

    DEFF Research Database (Denmark)

    Koch, Carsten Allan

    Whenever actors participate in transactions they expose themselves to risks of various kinds. Some of these risks are attributable to events outside the control of the participants and are unavoidable. Others originate in, or are aggrevated by, opportunistic actions undertaken by contract partners...... and other co-operators. This paper is concerned with the latter type of risk and the protection against it. Six protective mechanisms, which may serve as safeguards against opportunistic behavior, are presented and discussed. Special attention is paid to reputation effects. It is noted that such effects may...... account for the lack of opportunistic behavior with which networks are often credited. No protective mechanism is, however, effective under all circumstances....

  9. Opportunistic transmitter selection for selfless overlay cognitive radios

    KAUST Repository

    Shaqfeh, Mohammad

    2013-11-01

    We propose an opportunistic strategy to grant channel access to the primary and secondary transmitters in causal selfless overlay cognitive radios over block-fading channels. The secondary transmitter helps the primary transmitter by relaying the primary messages opportunistically, aided by a buffer to store the primary messages temporarily. The optimal channel-aware transmitter- selection strategy is the solution of the maximization of the average secondary rate under the average primary rate requirement and the buffer stability constraints. Numerical results demonstrate the gains of the proposed opportunistic selection strategy. © 2013 IEEE.

  10. A road map for wireless mesh routing with DSA

    CSIR Research Space (South Africa)

    Maliwatu, R

    2016-09-01

    Full Text Available of TV spectrum: The controversy at the Federal Communications Commission, IEEE Communications Magazine, 43(5):24–25, 2005. [2] Marja Matinmikko, Miia Mustonen, Dennis Roberson, et al. Overview and comparison of recent spectrum sharing approaches... in regulation and research: From opportunistic unlicensed access towards licensed shared access, In 2014 IEEE International Symposium on Dynamic Spectrum Access Networks, DYSPAN 2014, pages 92–102, McLean, VA, 2014. [3] M. Nekovee. Current Trends in Regulation...

  11. Shared heritability of attention-deficit/hyperactivity disorder and autism spectrum disorder.

    Science.gov (United States)

    Rommelse, Nanda N J; Franke, Barbara; Geurts, Hilde M; Hartman, Catharina A; Buitelaar, Jan K

    2010-03-01

    Attention-deficit/hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are both highly heritable neurodevelopmental disorders. Evidence indicates both disorders co-occur with a high frequency, in 20-50% of children with ADHD meeting criteria for ASD and in 30-80% of ASD children meeting criteria for ADHD. This review will provide an overview on all available studies [family based, twin, candidate gene, linkage, and genome wide association (GWA) studies] shedding light on the role of shared genetic underpinnings of ADHD and ASD. It is concluded that family and twin studies do provide support for the hypothesis that ADHD and ASD originate from partly similar familial/genetic factors. Only a few candidate gene studies, linkage studies and GWA studies have specifically addressed this co-occurrence, pinpointing to some promising pleiotropic genes, loci and single nucleotide polymorphisms (SNPs), but the research field is in urgent need for better designed and powered studies to tackle this complex issue. We propose that future studies examining shared familial etiological factors for ADHD and ASD use a family-based design in which the same phenotypic (ADHD and ASD), candidate endophenotypic, and environmental measurements are obtained from all family members. Multivariate multi-level models are probably best suited for the statistical analysis.

  12. Switch and examine transmit diversity for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed M.

    2011-06-01

    In this paper, we develop a switch and examine transmit diversity algorithm for spectrum sharing cognitive networks. We consider a cognitive network composed of a primary link that employs constant rate and constant power transmission scheme with automatic-and-repeat request (ARQ) protocol, while the secondary link is composed of a fixed power multiple-antenna secondary transmitter and a single antenna receiver. Our objective is to develop a low complex transmit diversity algorithm at the secondary transmitter that maximizes the performance of the secondary link in terms of the effective throughput while maintaining a predetermined maximum loss in the packet rate of the primary link. In achieving this objective, we develop an algorithm that selects the best antenna, which maintains the quality of the secondary link in terms of signal-to-noise ratio above a specific threshold, based on overhearing the acknowledgment (ACK) and negative acknowledgment (NACK) feedback messages transmitted over the primary link. We also develop closed form expressions for the bit error rates and the effective throughput of the secondary link. © 2011 IEEE.

  13. Underlay Spectrum Sharing Techniques with In-Band Full-Duplex Systems using Improper Gaussian Signaling

    KAUST Repository

    Gaafar, Mohamed

    2016-10-26

    Sharing the spectrum with in-band full-duplex (FD) primary users (PUs) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-interference introduced at the primary network may dramatically impede the secondary user (SU) opportunity to access the spectrum. To tackle this problem, we use the so-called improper Gaussian signaling. Particularly, we assume the downlink transmission of a SU that uses improper Gaussian signaling while the FD PU pair implements the regular proper Gaussian signaling. First, we derive a closed form expression and an upper bound for the SU and PUs outage probabilities, respectively. Second, we optimize the SU signal parameters to minimize its outage probability while maintaining the required PUs quality-of-service based on the average channel state information (CSI). Moreover, we provide the conditions to reap merits from employing improper Gaussian signaling at the SU. Third, we design the SU signal parameters based on perfect knowledge of its direct link instantaneous CSI and investigate all benefits that can be achieved at both the SU and PUs. Finally, we provide some numerical results that demonstrate the advantages of using improper Gaussian signaling to access the spectrum of the FD PUs.

  14. Adaptive multi-channel downlink assignment for overloaded spectrum-shared multi-antenna overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud

    2012-10-19

    Overlaid cellular technology has been considered as a promising candidate to enhance the capacity and extend the coverage of cellular networks, particularly indoors. The deployment of small cells (e.g. femtocells and/or picocells) in an overlaid setup is expected to reduce the operational power and to function satisfactorily with the existing cellular architecture. Among the possible deployments of small-cell access points is to manage many of them to serve specific spatial locations, while reusing the available spectrum universally. This contribution considers the aforementioned scenario with the objective to serve as many active users as possible when the available downlink spectrum is overloaded. The case study is motivated by the importance of realizing universal resource sharing in overlaid networks, while reducing the load of distributing available resources, satisfying downlink multi-channel assignment, controlling the aggregate level of interference, and maintaining desired design/operation requirements. These objectives need to be achieved in distributed manner in each spatial space with as low processing load as possible when the feedback links are capacity-limited, multiple small-cell access points can be shared, and data exchange between access points can not be coordinated. This contribution is summarized as follows. An adaptive downlink multi-channel assignment scheme when multiple co-channel and shared small-cell access points are allocated to serve active users is proposed. It is assumed that the deployed access points employ isotropic antenna arrays of arbitrary sizes, operate using the open-access strategy, and transmit on shared physical channels simultaneously. Moreover, each active user can be served by a single transmit channel per each access point at a time, and can sense the concurrent interference level associated with each transmit antenna channel non-coherently. The proposed scheme aims to identify a suitable subset of transmit channels

  15. New results on performance analysis of opportunistic regenerative relaying

    KAUST Repository

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2013-01-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may

  16. Accurate performance analysis of opportunistic decode-and-forward relaying

    KAUST Repository

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2011-01-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may

  17. On the performance of spectrum sharing systems with multiple antennas

    KAUST Repository

    Yang, Liang

    2012-01-01

    In this paper, we study the capacity of spectrum sharing (SS) multiple-input multiple-output (MIMO) systems over Rayleigh fading channels. More specifically, we present closed-form capacity formulas for such systems with and without optimal power and rate adaptation. A lower bound on the capacity is also derived to characterize the scaling law of the capacity. Results show that increasing the number of antennas has a negative effect on the system capacity in the low signal-to-noise (SNR) regime and the scaling law at high SNR is similar to the conventional MIMO systems. In addition, a lower bound on the capacity of the SS keyhole MIMO channels is analyzed. We also present a capacity analysis of SS MIMO maximal ratio combining (MRC) systems and the results show that the capacity of such systems always decreases with the increase of the number of antennas. Numerical results are finally given to illustrate our analysis. © 2012 ICST.

  18. Using Aromatherapy Massage to Increase Shared Attention Behaviours in Children with Autistic Spectrum Disorders and Severe Learning Difficulties

    Science.gov (United States)

    Solomons, Steve

    2005-01-01

    Children with autistic spectrum disorders (ASD) characteristically display a lack of shared attention behaviours and the lack of these behaviours impacts on their ability to develop social interactions and relationships with others. Steve Solomons, assistant headteacher at Rectory Paddock School and Research Unit in the London Borough of Bromley,…

  19. On the coexistence of primary and secondary users in spectrum-sharing broadcast channels

    KAUST Repository

    Yang, Yuli

    2013-06-01

    In this paper, we consider a broadcast channel in spectrum-sharing networks, where the base station schedules licensed primary users (PUs) and cognitive secondary users (SUs) simultaneously. Based on such a framework, we present a transmission strategy in the light of dirty paper coding. In order to promise the PUs\\' quality of service (QoS) in the broadcasting, the base station chooses codewords for the users by taking into account that the codewords pertaining to SUs can be pre-subtracted from those pertaining to PUs as if there were no interference from the secondary\\'s data to the primary\\'s data. For the purpose of performance evaluation, by taking capacity behavior and bit error rate (BER) as metrics, we study the achievable data rate regions for both types of users with the introduced design, and analyze the BER performance in corresponding systems implemented with hierarchical modulation. Numerical results substantiate that with flexible management of the spectrum resources, our proposed scheme provides more communication opportunities for SUs while maintaining PUs\\' QoS at an acceptable level. © 2013 IEEE.

  20. Iterative group splitting algorithm for opportunistic scheduling systems

    KAUST Repository

    Nam, Haewoon

    2014-05-01

    An efficient feedback algorithm for opportunistic scheduling systems based on iterative group splitting is proposed in this paper. Similar to the opportunistic splitting algorithm, the proposed algorithm adjusts (or lowers) the feedback threshold during a guard period if no user sends a feedback. However, when a feedback collision occurs at any point of time, the proposed algorithm no longer updates the threshold but narrows down the user search space by dividing the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a feedback, it is shown that the proposed algorithm significantly alleviates the signaling overhead for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots than the opportunistic splitting algorithm to make a user selection with a given level of scheduling outage probability or provides a higher ergodic capacity given a certain number of mini-slots. © 2013 IEEE.

  1. Performance analysis of switch-based multiuser scheduling schemes with adaptive modulation in spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2014-04-01

    This paper focuses on the development of multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, two scheduling schemes are proposed for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme focuses on optimizing the average spectral efficiency by selecting the user that reports the best channel quality. In order to alleviate the relatively high feedback required by the first scheme, a second scheme based on the concept of switched diversity is proposed, where the base station (BS) scans the secondary users in a sequential manner until a user whose channel quality is above an acceptable predetermined threshold is found. We develop expressions for the statistics of the signal-to-interference and noise ratio as well as the average spectral efficiency, average feedback load, and the delay at the secondary BS. We then present numerical results for the effect of the number of users and the interference constraint on the optimal switching threshold and the system performance and show that our analysis results are in perfect agreement with the numerical results. © 2014 John Wiley & Sons, Ltd.

  2. Position statement on opportunistic genomic screening from the Association of Genetic Nurses and Counsellors (UK and Ireland).

    Science.gov (United States)

    Middleton, Anna; Patch, Chris; Wiggins, Jennifer; Barnes, Kathy; Crawford, Gill; Benjamin, Caroline; Bruce, Anita

    2014-08-01

    The American College of Medical Genetics and Genomics released recommendations for reporting incidental findings (IFs) in clinical exome and genome sequencing. These suggest 'opportunistic genomic screening' should be available to both adults and children each time a sequence is done and would be undertaken without seeking preferences from the patient first. Should opportunistic genomic screening be implemented in the United Kingdom, the Association of Genetic Nurses and Counsellors (AGNC), which represents British and Irish genetic counsellors and nurses, feels strongly that the following must be considered (see article for complete list): (1) Following appropriate genetic counselling, patients should be allowed to consent to or opt out of opportunistic genomic screening. (2) If true IFs are discovered the AGNC are guided by the report from the Joint Committee on Medical Genetics about the sharing of genetic testing results. (3) Children should not be routinely tested for adult-onset conditions. (4) The formation of a list of variants should involve a representative from the AGNC as well as a patient support group. (5) The variants should be for serious or life-threatening conditions for which there are treatments or preventative strategies available. (6) There needs to be robust evidence that the benefits of opportunistic screening outweigh the potential harms. (7) The clinical validity and utility of variants should be known. (8) There must be a quality assurance framework that operates to International standards for laboratory testing. (9) Psychosocial research is urgently needed in this area to understand the impact on patients.

  3. Adapted Shared Storybook Reading: A Study of Its Application for Children with Autism Spectrum Disorders in Home Settings

    Science.gov (United States)

    Golloher, Andrea N.

    2018-01-01

    This study investigated the use of an adapted shared reading protocol with three children with autism spectrum disorders (ASD) in home settings. Using a multiple baseline across participants design, this investigation replicated and extended a previous investigation by Browder et al. to children with ASD and home settings. In addition, this study…

  4. On the Capacity of Hybrid Wireless Networks with Opportunistic Routing

    Directory of Open Access Journals (Sweden)

    Le Tan

    2010-01-01

    Full Text Available This paper studies the capacity of hybrid wireless networks with opportunistic routing (OR. We first extend the opportunistic routing algorithm to exploit high-speed data transmissions in infrastructure network through base stations. We then develop linear programming models to calculate the end-to-end throughput bounds from multiple source nodes to single as well as multiple destination nodes. The developed models are applied to study several hybrid wireless network examples. Through case studies, we investigate several factors that have significant impacts on the hybrid wireless network capacity under opportunistic routing, such as node transmission range, density and distribution pattern of base stations (BTs, and number of wireless channels on wireless nodes and base stations. Our numerical results demonstrate that opportunistic routing could achieve much higher throughput on both ad hoc and hybrid networks than traditional unicast routing (UR. Moreover, opportunistic routing can efficiently utilize base stations and achieve significantly higher throughput gains in hybrid wireless networks than in pure ad hoc networks especially with multiple-channel base stations.

  5. Location-Aided Reliable Routing for Opportunistic Networks

    Institute of Scientific and Technical Information of China (English)

    Yong Yang; Zhi Ren; Jibi Li

    2012-01-01

    In our study, we investigate the problem of location-based routing in opportunistic networks. Due to the uncertainty of end-to-end paths between sources and destinations, the classical location-based ad hoc routing protocols cannot adapt to the environment of opportunistic networks, which leads to the decrease of the delivery rate of data. To address it, we propose in this paper a novel location-aided routing protocol which is suitable for opportunistic networks. In our protocol, a node can send location information on demand by using prediction mechanism, and when sending a data packet, the node chooses multiple neighbors which are closer to the destination as next hops. If the candidate neighbors do not exist, the node carries the data till it meets a proper neighbor or the destination. Theoretical analysis and simulation results show that our proposed protocol outperforms DREAM (Distance Routing Effect Protocol Mobility) and one of its improved versions, BFDREAM (Boundary Forwarding DREAM), in terms of the delivery rate and overhead.

  6. A Comparative Study of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks

    OpenAIRE

    R. Poonkuzhali; M. Y. Sanavullah; M. R. Gurupriya

    2014-01-01

    Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In Delay tolerant network or Disruption tolerant network opportunistic forwarding technique is widely used. The key idea of opportunistic routing is selecting forwarding nodes to forward data packets and coordination among these nodes to avoid duplicate transmissions. This paper gives the analysis of pros and cons of various opportunistic ...

  7. Coopetitive Business Models in Future Mobile Broadband with Licensed Shared Access (LSA)

    OpenAIRE

    P. Ahokangas; M. Matinmikko; I. Atkova; L.F. Minervini; S. Yrjölä; M. Mustonen

    2016-01-01

    Spectrum scarcity forces mobile network operators (MNOs) providing mobile broadband services to develop new business models that address spectrum sharing. It engages MNOs into coopetitive relationship with incumbents. Licensed Shared Access (LSA) concept complements traditional licensing and helps MNOs to access new spectrum bands on a shared basis. This paper discusses spectrum sharing with LSA from business perspective. It describes how coopetition and business model are linked conceptually...

  8. Opportunistic infection manifestation of HIV-AIDS patients in Airlangga university hospital Surabaya

    Science.gov (United States)

    Asmarawati, T. P.; Putranti, A.; Rachman, B. E.; Hadi, U.; Nasronudin

    2018-03-01

    Opportunistic infections are common in HIV-infected patients especially those who progress to acquired immunodeficiency syndrome. There are many factors involved in the prevalence of opportunistic infections. We investigated the patterns of opportunistic infection in HIV-infected patients admitted to Airlangga University Hospital Surabaya. This study was an observational study, conducted in adults patients with HIV infection from January 2016 to September 2017. Data collected from the medical records of the patients. The number of samples in this study was 58. The mean age was 42.9 years, mostly male. Most patients admitted were in clinical stadium III or IV. Heterosexual transmission is a common risk factor in patients. The most prevalent opportunistic infections found in patients were oral candidiasis (58.6%), followed by pulmonary tuberculosis (41.4%) and pneumonia/PCP (41.4%). Other infections found were toxoplasmosis, chronic diarrhea, cytomegalovirus, meningitis TB, hepatitis C, amoebiasis, and cerebritis. Opportunistic infections occurred more often in age≥40 years and increased as clinical stadium get worse. From the results, we conclude that oral candidiasis and pulmonary tuberculosis were the most common opportunistic infections found in Airlangga University Hospital. The pattern of opportunistic infections in this study could help the hospital to set priorities related to the management of patients.

  9. [New approaches to oral cavity opportunistic microbiota study].

    Science.gov (United States)

    Tets, G V; Vikina, D S; Vecherkovskaia, M F; Domorad, A A; Kharlamova, V V; Tets, V V

    2013-01-01

    Identification of some bacteria of the oral microbiota in humans including opportunistic pathogens capable of causing infections of various locations is a challenging problem for dentistry. Lack of knowledge on oral microbiota is the result of the absence of appropriate culture technique for isolation of pure cultures of those bacteria. The paper presents the study on mixed oral microbial biofilms with isolation and identification of insufficiently explored or still unknown aerobic opportunistic bacteria.

  10. Lower Bound of Energy-Latency Tradeoff of Opportunistic Routing in Multihop Networks

    Directory of Open Access Journals (Sweden)

    Gorce Jean-Marie

    2011-01-01

    Full Text Available Opportunistic networking aims at exploiting sporadic radio links to improve the connectivity of multihop networks and to foster data transmissions. The broadcast nature of wireless channels is an important feature that can be exploited to improve transmissions by using several potential receivers. Opportunistic relaying is thus the first brick for opportunistic networking. However, the advantage of opportunistic relaying may be degraded due to energy increase related to having multiple active receivers. This paper proposes a thorough analysis of opportunistic relaying efficiency under different realistic radio channel conditions. The study is intended to find the best tradeoff between two objectives: energy and latency minimizations, with a hard reliability constraint. We derive an optimal bound, namely, the Pareto front of the related optimization problem, which offers a good insight into the benefits of opportunistic routings compared with classical multihop routing schemes. Meanwhile, the lower bound provides a framework to optimize the parameters at the physical layer, MAC layer, and routing layer from the viewpoint of cross layer during the design or planning phase of a network.

  11. Outage Performance in Cognitive Radio Systems with Opportunistic Interference Cancelation

    DEFF Research Database (Denmark)

    Di Taranto, Rocco; Popovski, Petar

    2011-01-01

    , respectively. The secondary receiver applies Opportunistic Interference Cancelation (OIC) and Suboptimal Opportunistic Interference Cancelation (S-OIC) thus decoding the primary signal when such an opportunity is created by the rate selected at the primary transmitter and the power received from the primary...

  12. Game Theory in Wireless Ad-Hoc Opportunistic Radios

    OpenAIRE

    Mumtaz, Shahid; Gameiro, Atilio

    2010-01-01

    Emerging research in game theory based power control applied to ad hoc opportunist networks shows much promise to help understand the complex interactions between OR nodes in this highly dynamic and distributed environment. Also, the employment of game theory in modeling dynamic situations for opportunist ad hoc networks where OR nodes have incomplete information has led to the application of largely unexplored games such as games of imperfect monitoring. Ad hoc security using game theory is ...

  13. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  14. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    Simeone O

    2007-01-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  15. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    O. Simeone

    2007-03-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  16. Energy Efficient Four Level Cooperative Opportunistic Communication for Wireless Personal Area Networks (WPAN)

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Inamdar, Sandeep; Prasad, Neeli R.

    2013-01-01

    For wireless sensor networks (WSN),energy is a scarce resource. Due to limited battery resources, the energy consumption is the critical issue for the transmission as well as reception of the signals in the wireless communication. WSNs are infrastructure-less shared network demanding more energy...... consumption due to collaborative transmissions. This paper proposes a new cooperative opportunistic four level model for IEEE 802.15.4 Wireless Personal Area Network (WPAN).The average per node energy consumption is observed merely about 0.17mJ for the cooperative wireless communication which proves...... the proposed mechanism to be energy efficient. This paper further proposes four levels of cooperative data transmission from source to destination to improve network coverage with energy efficiency....

  17. Planning for Bike Share Connectivity to Rail Transit

    Science.gov (United States)

    Griffin, Greg Phillip; Sener, Ipek Nese

    2016-01-01

    Bike sharing can play a role in providing access to transit stations and then to final destinations, but early implementation of these systems in North America has been opportunistic rather than strategic. This study evaluates local intermodal plan goals using trip data and associated infrastructure such as transit stops and bike share station locations in Austin, Texas, and Chicago, Illinois. Bike sharing use data from both cities suggest a weak relationship with existing rail stations that could be strengthened through collaborative, intermodal planning. The study suggests a planning framework and example language that could be tailored to help address the linkage between bike sharing and transit. Rather than an exhaustive study of the practice, this study provides evidence from these two cities that identify opportunities to improve intermodal planning. Cities that are planning or expanding a bike sharing system should consider carefully how to leverage this mode with existing modes of transport. Regardless of a city’s status in implementing a bike sharing system, planners can leverage information on existing transport systems for planning at regional and local levels. PMID:27872554

  18. Dynamic Spectrum Sharing among Femtocells

    DEFF Research Database (Denmark)

    Da Costa, Gustavo Wagner Oliveira

    2012-01-01

    deployment of femtocells in an uncoordinated way will create difficult interference scenarios. For these reasons, this PhD thesis investigates how each femtocell can autonomously select portions of the spectrum in order to achieve more spectral efficiency and fairness. The solutions also strive...... for scalability to a large number of cells, stability and limited complexity. The work represents an evolution towards future cognitive femtocells. The issue of inter-cell interference among femtocells is thoroughly analyzed with game theory, graph theory and system-level simulations. These analyses show...

  19. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon

    2011-08-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.

  20. Toward distributed relay selection for opportunistic amplify-and-forward transmission

    KAUST Repository

    Tourki, Kamel

    2011-05-01

    Opportunistic relaying in cooperative communication depends on careful relay selection. However the traditional centralized method used for opportunistic Amplify-and-Forward (OAF) protocols requires precise measurements of channel state information (CSI) at the destination (CSI-OAF). In this paper, we propose a distributed relay selection framework for opportunistic AF (D-OAF) cooperative communications and offer an accurate performance analysis based on exact statistics of the local signalto- noise ratios of the best relay. Furthermore, we validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures, and we compare our new results with their CSI-based counterparts. © 2011 IEEE.

  1. Sum-rate analysis of spectrum sharing spatial multiplexing MIMO systems with zero-forcing and multiuser diversity

    KAUST Repository

    Yang, Liang

    2013-06-01

    This paper considers a multiuser spectrum sharing (SS) multiple-input multiple-output (MIMO) system with zero-forcing (ZF) operating in a Rayleigh fading environment. We provide an asymptotic sum-rate analysis to investigate the effects of different parameters on the multiuser diversity gain. For a ZF SS spatial multiplexing system with scheduling, the asymptotic sum-rate scales like Nt log2(Q(Nt Np√K - 1)/N t), where Np denotes the number of antennas of primary receiver, Q is the interference temperature, and K represents the number of secondary transmitters. © 2013 IEEE.

  2. Capacity analysis of spectrum sharing spatial multiplexing MIMO systems

    KAUST Repository

    Yang, Liang

    2014-12-01

    This paper considers a spectrum sharing (SS) multiple-input multiple-output (MIMO) system operating in a Rayleigh fading environment. First the capacity of a single-user SS spatial multiplexing system is investigated in two scenarios that assume different receivers. To explicitly show the capacity scaling law of SS MIMO systems, some approximate capacity expressions for the two scenarios are derived. Next, we extend our analysis to a multiple user system with zero-forcing receivers (ZF) under spatially-independent scheduling and analyze the sum-rate. Furthermore, we provide an asymptotic sum-rate analysis to investigate the effects of different parameters on the multiuser diversity gain. Our results show that the secondary system with a smaller number of transmit antennas Nt and a larger number of receive antennas Nr can achieve higher capacity at lower interference temperature Q, but at high Q the capacity follows the scaling law of the conventional MIMO systems. However, for a ZF SS spatial multiplexing system, the secondary system with small Nt and large Nr can achieve the highest capacity throughout the entire region of Q. For a ZF SS spatial multiplexing system with scheduling, the asymptotic sum-rate scales like Ntlog2(Q(KNtNp-1)/Nt), where Np denotes the number of antennas of the primary receiver and K represents the number of secondary transmitters.

  3. Sum Utilization of Spectrum with Spectrum Handoff and Imperfect Sensing in Interweave Multi-Channel Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Waqas Khalid

    2018-05-01

    Full Text Available Fifth-generation (5G heterogeneous network deployment poses new challenges for 5G-based cognitive radio networks (5G-CRNs as the primary user (PU is required to be more active because of the small cells, random user arrival, and spectrum handoff. Interweave CRNs (I-CRNs improve spectrum utilization by allowing opportunistic spectrum access (OSA for secondary users (SUs. The sum utilization of spectrum, i.e., joint utilization of spectrum by the SU and PU, depends on the spatial and temporal variations of PU activities, sensing outcomes, transmitting conditions, and spectrum handoff. In this study, we formulate and analyze the sum utilization of spectrum with different sets of channels under different PU and SU co-existing network topologies. We consider realistic multi-channel scenarios for the SU, with each channel licensed to a PU. The SU, aided by spectrum handoff, is authorized to utilize the channels on the basis of sensing outcomes and PU interruptions. The numerical evaluation of the proposed work is presented under different network and sensing parameters. Moreover, the sum utilization gain is investigated to analyze the sensitivities of different sensing parameters. It is demonstrated that different sets of channels, PU activities, and sensing outcomes have a significant impact on the sum utilization of spectrum associated with a specific network topology.

  4. Genome-Wide Screen for Saccharomyces cerevisiae Genes Contributing to Opportunistic Pathogenicity in an Invertebrate Model Host

    Directory of Open Access Journals (Sweden)

    Sujal S. Phadke

    2018-01-01

    Full Text Available Environmental opportunistic pathogens can exploit vulnerable hosts through expression of traits selected for in their natural environments. Pathogenicity is itself a complicated trait underpinned by multiple complex traits, such as thermotolerance, morphology, and stress response. The baker’s yeast, Saccharomyces cerevisiae, is a species with broad environmental tolerance that has been increasingly reported as an opportunistic pathogen of humans. Here we leveraged the genetic resources available in yeast and a model insect species, the greater waxmoth Galleria mellonella, to provide a genome-wide analysis of pathogenicity factors. Using serial passaging experiments of genetically marked wild-type strains, a hybrid strain was identified as the most fit genotype across all replicates. To dissect the genetic basis for pathogenicity in the hybrid isolate, bulk segregant analysis was performed which revealed eight quantitative trait loci significantly differing between the two bulks with alleles from both parents contributing to pathogenicity. A second passaging experiment with a library of deletion mutants for most yeast genes identified a large number of mutations whose relative fitness differed in vivo vs. in vitro, including mutations in genes controlling cell wall integrity, mitochondrial function, and tyrosine metabolism. Yeast is presumably subjected to a massive assault by the innate insect immune system that leads to melanization of the host and to a large bottleneck in yeast population size. Our data support that resistance to the innate immune response of the insect is key to survival in the host and identifies shared genetic mechanisms between S. cerevisiae and other opportunistic fungal pathogens.

  5. Special issue Oceans and Humans Health: the ecology of marine opportunists.

    Science.gov (United States)

    Burge, Colleen A; Kim, Catherine J S; Lyles, Jillian M; Harvell, C Drew

    2013-05-01

    Opportunistic marine pathogens, like opportunistic terrestrial pathogens, are ubiquitous in the environment (waters, sediments, and organisms) and only cause disease in immune-compromised or stressed hosts. In this review, we discuss four host-pathogen interactions within the marine environment that are typically considered opportunistic: sea fan coral-fungus, eelgrass-Labyrinthula zosterae, sea fan-Labyrinthulomycetes, and hard clam-Quahog Parasite Unknown with particular focus on disease ecology, parasite pathology, host response, and known associated environmental conditions. Disease is a natural part of all ecosystems; however, in some cases, a shift in the balance between the host, pathogen, and the environment may lead to epizootics in natural or cultured populations. In marine systems, host-microbe interactions are less understood than their terrestrial counterparts. The biological and physical changes to the world's oceans, coupled with other anthropogenic influences, will likely lead to more opportunistic diseases in the marine environment.

  6. Scaling up ATLAS Event Service to production levels on opportunistic computing platforms

    CERN Document Server

    Benjamin, Douglas; The ATLAS collaboration; Ernst, Michael; Guan, Wen; Hover, John; Lesny, David; Maeno, Tadashi; Nilsson, Paul; Tsulaia, Vakhtang; van Gemmeren, Peter; Vaniachine, Alexandre; Wang, Fuquan; Wenaus, Torre

    2016-01-01

    Continued growth in public cloud and HPC resources is on track to overcome the dedicated resources available for ATLAS on the WLCG. Example of such platforms are Amazon AWS EC2 Spot Instances, Edison Cray XC30 supercomputer, backfill at the Tier-2 and Tier-3 sites, opportunistic resources at the Open Science Grid, and ATLAS High Level Trigger farm between the data taking periods. Because of opportunistic resources specifics such as preemptive job scheduling and data I/O, their efficient usage requires workflow innovations provided by the ATLAS Event Service. Thanks to the finer granularity of the Event Service data processing workflow, the opportunistic resources are used more efficiently. We report on our progress in scaling opportunistic resource usage to double-digit levels in ATLAS production.

  7. Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks.

    Science.gov (United States)

    Zeng, Feng; Zhao, Nan; Li, Wenjia

    2017-05-12

    In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by the strong share ability of "circles of friends" in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that social relationships among nodes consist of explicit and implicit parts. The explicit part comes from direct contact among nodes, and the implicit part can be measured through the "circles of friends". We present the definitions of explicit and implicit social relationships between two nodes, adaptive weights of explicit and implicit parts are given according to the contact feature of nodes, and the distributed mechanism is designed to construct the "circles of friends" of nodes, which is used for the calculation of the implicit part of social relationship between nodes. Based on effective measurement of social relationships, we propose a social-based clustering and routing scheme, in which each node selects the nodes with close social relationships to form a local cluster, and the self-control method is used to keep all cluster members always having close relationships with each other. A cluster-based message forwarding mechanism is designed for opportunistic routing, in which each node only forwards the copy of the message to nodes with the destination node as a member of the local cluster. Simulation results show that the proposed social-based clustering and routing outperforms the other classic routing algorithms.

  8. Retinitis due to opportunistic infections in Iranian HIV infected patients.

    Directory of Open Access Journals (Sweden)

    Ali Abdollahi

    2013-10-01

    Full Text Available We tried to evaluate prevalence and characteristics of Iranian HIV infected patients with retinitis due to opportunistic infections. In this cross sectional study, we evaluated 106 HIV infected patients via indirect ophthalmoscopy and slit lamp examination by 90 lens to find retinitis cases. General information and results of ophthalmologic examination were analyzed. Prevalence of retinitis due to opportunistic infections was 6.6%: cytomegalovirus (CMV retinitis 1.88%, toxoplasmosis retinochoroiditis 1.88% and tuberculosis chorioretinitis 2.83%. CD4 count was higher than 50 cell/µlit in both cases with CMV retinitis. Along with increasing survival in the HIV infected patients, the prevalence of complications such as ocular manifestation due to opportunistic infections are increasing and must be more considered.

  9. Achievable Rate of Spectrum Sharing Cognitive Radio Multiple-Antenna Channels

    KAUST Repository

    Sboui, Lokman

    2015-04-28

    We investigate the spectral efficiency gain of an uplink Cognitive Radio (CR) Multi-Input-Multi-Output system in which the Secondary User (SU) is allowed to share the spectrum with the Primary User (PU) using a specific precoding scheme to communicate with a common receiver. The proposed scheme exploits, at the same time, the free eigenmodes of the primary channel after a space alignment procedure and the interference threshold tolerated by the PU. At the common receiver, we adopt a Successive Interference Cancellation (SIC) technique to eliminate the effect of the detected primary signal transmitted through the exploited eigenmodes. Furthermore, we analyze the SIC operation inaccuracy as well as the CSI estimation imperfection on the PU and SU throughputs. Numerical results show that our proposed scheme enhances considerably the cognitive achievable rate. For instance, in case of a perfect detection of the PU signal, the CR rate remains non-zero for high Signal to Noise Ratio which is usually impossible when we only employ a space alignment technique. We show that a modified water-filling power allocation policy at the PU can increase the secondary rate with a marginal degradation of the primary rate. Finally, we investigate the behavior of the PU and SU rates through the study of the rate achievable region.

  10. Scaling up ATLAS Event Service to production levels on opportunistic computing platforms

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00066086; The ATLAS collaboration; Caballero, Jose; Ernst, Michael; Guan, Wen; Hover, John; Lesny, David; Maeno, Tadashi; Nilsson, Paul; Tsulaia, Vakhtang; van Gemmeren, Peter; Vaniachine, Alexandre; Wang, Fuquan; Wenaus, Torre

    2016-01-01

    Continued growth in public cloud and HPC resources is on track to exceed the dedicated resources available for ATLAS on the WLCG. Examples of such platforms are Amazon AWS EC2 Spot Instances, Edison Cray XC30 supercomputer, backfill at Tier 2 and Tier 3 sites, opportunistic resources at the Open Science Grid (OSG), and ATLAS High Level Trigger farm between the data taking periods. Because of specific aspects of opportunistic resources such as preemptive job scheduling and data I/O, their efficient usage requires workflow innovations provided by the ATLAS Event Service. Thanks to the finer granularity of the Event Service data processing workflow, the opportunistic resources are used more efficiently. We report on our progress in scaling opportunistic resource usage to double-digit levels in ATLAS production.

  11. Government Spending Cycles: Ideological or Opportunistic?

    NARCIS (Netherlands)

    H.P. van Dalen (Hendrik); O.H. Swank (Otto)

    1996-01-01

    textabstractands. The time series analysis, covering the period 1953–1993, allows for different types of government spending. In general, spending is inspired by ideological and opportunistic motives: all government expenditure categories show an upward drift during election times and the partisan

  12. Who needs the assumption of opportunistic behavior? Transaction cost economics does not!

    DEFF Research Database (Denmark)

    Koch, Carsten Allan

    2000-01-01

    The assumption of opportunistic behavior, familiar from transaction cost economics, has been and remains highly controversial. But opportunistic behavior, albeit undoubtedly an extremely important form of motivation, is not a necessary condition for the contractual problems studied by transaction...

  13. Autism Spectrum Disorder (ASD)

    Science.gov (United States)

    ... Español (Spanish) Recommend on Facebook Tweet Share Compartir Autism spectrum disorder (ASD) is a developmental disability that can cause ... work. Autism: What's New MMWR article: Prevalence of Autism Spectrum Disorder Data Community Report Press release: Autism Prevalence Slightly ...

  14. Secondary access based on sensing and primary ARQ feedback in spectrum sharing systems

    KAUST Repository

    Hamza, Doha R.

    2012-04-01

    In the context of primary/secondary spectrum sharing, we propose a randomized secondary access strategy with access probabilities that are a function of both the primary automatic repeat request (ARQ) feedback and the spectrum sensing outcome. The primary terminal operates in a time slotted fashion and is active only when it has a packet to send. The primary receiver can send a positive acknowledgment (ACK) when the received packet is decoded correctly. Lack of ARQ feedback is interpreted as erroneous reception or inactivity. We call this the explicit ACK scheme. The primary receiver may also send a negative acknowledgment (NACK) when the packet is received in error. Lack of ARQ feedback is interpreted as an ACK or no-transmission. This is called the explicit NACK scheme. Under both schemes, when the primary feedback is interpreted as a NACK, the secondary user assumes that there will be retransmission in the next slot and accesses the channel with a certain probability. When the primary feedback is interpreted as an ACK, the secondary user accesses the channel with either one of two probabilities based on the sensing outcome. Under these settings, we find the three optimal access probabilities via maximizing the secondary throughput given a constraint on the primary throughput. We compare the performance of the explicit ACK and explicit NACK schemes and contrast them with schemes based on either sensing or primary ARQ feedback only. © 2012 IEEE.

  15. To share or not to share? Business aspects of network sharing for Mobile Network Operators

    NARCIS (Netherlands)

    Berkers, F.T.H.M.; Hendrix, G.; Chatzicharistou, I.; Haas, T. de; Hamera, D.

    2010-01-01

    Radio spectrum and network infrastructure are two essential resources for mobile service delivery, which are both costly and increasingly scarce. In this paper we consider drivers and barriers of network sharing, which is seen as a potential solution for scarcity in these resources. We considered a

  16. Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network

  17. A graph model for opportunistic network coding

    KAUST Repository

    Sorour, Sameh; Aboutoraby, Neda; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    © 2015 IEEE. Recent advancements in graph-based analysis and solutions of instantly decodable network coding (IDNC) trigger the interest to extend them to more complicated opportunistic network coding (ONC) scenarios, with limited increase

  18. Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks †

    Science.gov (United States)

    Zeng, Feng; Zhao, Nan; Li, Wenjia

    2017-01-01

    In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by the strong share ability of “circles of friends” in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that social relationships among nodes consist of explicit and implicit parts. The explicit part comes from direct contact among nodes, and the implicit part can be measured through the “circles of friends”. We present the definitions of explicit and implicit social relationships between two nodes, adaptive weights of explicit and implicit parts are given according to the contact feature of nodes, and the distributed mechanism is designed to construct the “circles of friends” of nodes, which is used for the calculation of the implicit part of social relationship between nodes. Based on effective measurement of social relationships, we propose a social-based clustering and routing scheme, in which each node selects the nodes with close social relationships to form a local cluster, and the self-control method is used to keep all cluster members always having close relationships with each other. A cluster-based message forwarding mechanism is designed for opportunistic routing, in which each node only forwards the copy of the message to nodes with the destination node as a member of the local cluster. Simulation results show that the proposed social-based clustering and routing outperforms the other classic routing algorithms. PMID:28498309

  19. Spectrum database as a service (SDaaS) for broadband innovation and efficient spectrum utilization

    CSIR Research Space (South Africa)

    Mfupe, L

    2013-10-01

    Full Text Available Broadband innovations for future wireless networks involves rapid sharing of radio frequency (RF) spectrum resources by means of dynamic spectrum access techniques (DSA) to satisfy immediate portfolio of heterogeneous demands of wireless IP services...

  20. Exploiting opportunistic resources for ATLAS with ARC CE and the Event Service

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00226583; The ATLAS collaboration; Filipčič, Andrej; Guan, Wen; Tsulaia, Vakhtang; Walker, Rodney; Wenaus, Torre

    2017-01-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from the resources that comprise the Grid computing of most experiments, therefore exploiting these resources requires a change in strategy for the experiment. The resources may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The ARC CE with its non-intrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the Event Service primarily to address the issue of jobs that can be terminated at any point when opportunistic resources are needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in...

  1. Exploiting Opportunistic Resources for ATLAS with ARC CE and the Event Service

    CERN Document Server

    Cameron, David; The ATLAS collaboration

    2016-01-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from the resources that comprise the Grid computing of most experiments, therefore exploiting these resources requires a change in strategy for the experiment. The resources may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The ARC CE with its non-intrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the Event Service primarily to address the issue of jobs that can be terminated at any point when opportunistic resources are needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in...

  2. Exploring Engagement in Shared Reading Activities Between Children with Autism Spectrum Disorder and Their Caregivers.

    Science.gov (United States)

    Fleury, Veronica P; Hugh, Maria L

    2018-06-05

    Reading aloud to children is a valued practice to promote emergent literacy and language skills that form the foundation for future reading success. We conducted a descriptive study of shared book reading practices between caregivers and their children with autism spectrum disorder (n = 17) and caregivers and their typically developing children (n = 20) to identify factors that can promote or inhibit children's engagement in reading. Caregivers and their children read nine books (familiar, non-fiction, fiction). Children with ASD demonstrated lower levels of passive engagement (looking at the book) and higher levels of non-engaged behavior compared to typically developing children. Caregiver reading quality and book type contributed to joint engagement during reading. Implications of these findings for intervention development are discussed.

  3. Additive opportunistic capture explains group hunting benefits in African wild dogs.

    Science.gov (United States)

    Hubel, Tatjana Y; Myatt, Julia P; Jordan, Neil R; Dewhirst, Oliver P; McNutt, J Weldon; Wilson, Alan M

    2016-03-29

    African wild dogs (Lycaon pictus) are described as highly collaborative endurance pursuit hunters based on observations derived primarily from the grass plains of East Africa. However, the remaining population of this endangered species mainly occupies mixed woodland savannah where hunting strategies appear to differ from those previously described. We used high-resolution GPS and inertial technology to record fine-scale movement of all members of a single pack of six adult African wild dogs in northern Botswana. The dogs used multiple short-distance hunting attempts with a low individual kill rate (15.5%), but high group feeding rate due to the sharing of prey. Use of high-level cooperative chase strategies (coordination and collaboration) was not recorded. In the mixed woodland habitats typical of their current range, simultaneous, opportunistic, short-distance chasing by dogs pursuing multiple prey (rather than long collaborative pursuits of single prey by multiple individuals) could be the key to their relative success in these habitats.

  4. Capacity of spectrum sharing Cognitive Radio systems over Nakagami fading channels at low SNR

    KAUST Repository

    Sboui, Lokman

    2013-06-01

    In this paper, we study the ergodic capacity of Cognitive Radio (CR) spectrum sharing systems at low power regime. We focus on Nakagami fading channels. We formally define the low power regime and present closed form expressions of the capacity in the low power regime under various types of interference and/or power constraints, depending on the available channel state information (CSI) of the cross link (CL) between the secondary user transmitter and the primary user receiver. We explicitly characterize two regimes where either the interference constraint or the power constraint dictates the optimal power profile. Our framework also highlights the effects of different fading parameters on the secondary link ergodic capacity. Interestingly, we show that the low power regime analysis provides a specific insight on the capacity behavior of CR that has not been reported by previous studies. © 2013 IEEE.

  5. Opportunistic Error Correction for WLAN Applications

    NARCIS (Netherlands)

    Shao, X.; Schiphorst, Roelof; Slump, Cornelis H.

    2008-01-01

    The current error correction layer of IEEE 802.11a WLAN is designed for worst case scenarios, which often do not apply. In this paper, we propose a new opportunistic error correction layer based on Fountain codes and a resolution adaptive ADC. The key part in the new proposed system is that only

  6. Features of the broader autism phenotype in people with epilepsy support shared mechanisms between epilepsy and autism spectrum disorder.

    Science.gov (United States)

    Richard, Annie E; Scheffer, Ingrid E; Wilson, Sarah J

    2017-04-01

    Richard, A.E., I.E. Scheffer and S.J. Wilson. Features of the broader autism phenotype in people with epilepsy support shared mechanisms between epilepsy and autism spectrum disorder. NEUROSCI BIOBEHAV REV 21(1) XXX-XXX, 2016. To inform on mechanisms underlying the comorbidity of epilepsy and autism spectrum disorder (ASD), we conducted meta-analyses to test whether impaired facial emotion recognition (FER) and theory of mind (ToM), key phenotypic traits of ASD, are more common in people with epilepsy (PWE) than controls. We contrasted these findings with those of relatives of individuals with ASD (ASD-relatives) compared to controls. Furthermore, we examined the relationship of demographic (age, IQ, sex) and epilepsy-related factors (epilepsy onset age, duration, seizure laterality and origin) to FER and ToM. Thirty-one eligible studies of PWE (including 1449 individuals: 77% with temporal lobe epilepsy), and 22 of ASD-relatives (N=1295) were identified by a systematic database search. Analyses revealed reduced FER and ToM in PWE compared to controls (p<0.001), but only reduced ToM in ASD-relatives (p<0.001). ToM was poorer in PWE than ASD-relatives. Only weak associations were found between FER and ToM and epilepsy-related factors. These findings suggest shared mechanisms between epilepsy and ASD, independent of intellectual disability. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Opportunistic pathology-based screening for diabetes

    Science.gov (United States)

    Simpson, Aaron J; Krowka, Renata; Kerrigan, Jennifer L; Southcott, Emma K; Wilson, J Dennis; Potter, Julia M; Nolan, Christopher J; Hickman, Peter E

    2013-01-01

    Objective To determine the potential of opportunistic glycated haemoglobin (HbA1c) testing of pathology samples to detect previously unknown diabetes. Design Pathology samples from participants collected for other reasons and suitable for HbA1c testing were utilised for opportunistic diabetes screening. HbA1c was measured with a Biorad Variant II turbo analyser and HbA1c levels of ≥6.5% (48 mmol/mol) were considered diagnostic for diabetes. Confirmation of previously unknown diabetes status was obtained by a review of hospital medical records and phone calls to general practitioners. Setting Hospital pathology laboratory receiving samples from hospital-based and community-based (CB) settings. Participants Participants were identified based on the blood sample collection location in the CB, emergency department (ED) and inpatient (IP) groups. Exclusions pretesting were made based on the electronic patient history of: age <18 years, previous diabetes diagnosis, query for diabetes status in the past 12 months, evidence of pregnancy and sample collected postsurgery or transfusion. Only one sample per individual participant was tested. Results Of the 22 396 blood samples collected, 4505 (1142 CB, 1113 ED, 2250 IP) were tested of which 327 (7.3%) had HbA1c levels ≥6.5% (48 mmol/mol). Of these 120 (2.7%) were determined to have previously unknown diabetes (11 (1%) CB, 21 (1.9%) ED, 88 (3.9%) IP). The prevalence of previously unknown diabetes was substantially higher (5.4%) in hospital-based (ED and IP) participants aged over 54 years. Conclusions Opportunistic testing of referred pathology samples can be an effective method of screening for diabetes, especially in hospital-based and older persons. PMID:24065696

  8. PERFORMANCE OPTIMIZATION OF COGNITIVE RADIO WITH WIDEBAND SPECTRUM SENSING

    Directory of Open Access Journals (Sweden)

    E. Saraniya

    2014-09-01

    Full Text Available Cognitive radio (CR technology allows the unlicensed user to access the licensed spectrum bands. Spectrum sensing is an essential function in cognitive radio to detect the spectrum holes and opportunistically use the underutilized frequency bands without causing interference to primary user (PU. In this paper we are maximizing the throughput capacity of cognitive radio user and hence the performance of spectrum sensing and protection to licensed user improves over a wideband spectrum sensing band. The simulation of cognitive radio is done by analyzing the performance of energy detector spectrum sensing technique to detect primary user and to formulate the optimization using multiband joint detection method (MJD to achieve suitable trade- off between secondary user access and primary user network. The main aim of this paper is to maximize the probability of detection and to decrease the probabilities of miss detection and false alarm. To maximize the throughput it requires minimizing the throughput loss caused by miss detection and the significant reduction in probability of false alarm helps in achieving the spectral efficiency from the secondary user’s perspective. The simulation results show that the performance increases with the MJD method.

  9. Joint opportunistic scheduling and network coding for bidirectional relay channel

    KAUST Repository

    Shaqfeh, Mohammad

    2013-07-01

    In this paper, we consider a two-way communication system in which two users communicate with each other through an intermediate relay over block-fading channels. We investigate the optimal opportunistic scheduling scheme in order to maximize the long-term average transmission rate in the system assuming symmetric information flow between the two users. Based on the channel state information, the scheduler decides that either one of the users transmits to the relay, or the relay transmits to a single user or broadcasts to both users a combined version of the two users\\' transmitted information by using linear network coding. We obtain the optimal scheduling scheme by using the Lagrangian dual problem. Furthermore, in order to characterize the gains of network coding and opportunistic scheduling, we compare the achievable rate of the system versus suboptimal schemes in which the gains of network coding and opportunistic scheduling are partially exploited. © 2013 IEEE.

  10. Opportunistic beam training with hybrid analog/digital codebooks for mmWave systems

    KAUST Repository

    Eltayeb, Mohammed E.

    2016-02-25

    © 2015 IEEE. Millimeter wave (mmWave) communication is one solution to provide more spectrum than available at lower carrier frequencies. To provide sufficient link budget, mmWave systems will use beamforming with large antenna arrays at both the transmitter and receiver. Training these large arrays using conventional approaches taken at lower carrier frequencies, however, results in high overhead. In this paper, we propose a beam training algorithm that efficiently designs the beamforming vectors with low training overhead. Exploiting mmWave channel reciprocity, the proposed algorithm relaxes the need for an explicit feedback channel, and opportunistically terminates the training process when a desired quality of service is achieved. To construct the training beamforming vectors, a new multi-resolution codebook is developed for hybrid analog/digital architectures. Simulation results show that the proposed algorithm achieves a comparable rate to that obtained by exhaustive search solutions while requiring lower training overhead when compared to prior work.

  11. Opportunistic beam training with hybrid analog/digital codebooks for mmWave systems

    KAUST Repository

    Eltayeb, Mohammed E.; Alkhateeb, Ahmed; Heath, Robert W.; Al-Naffouri, Tareq Y.

    2016-01-01

    © 2015 IEEE. Millimeter wave (mmWave) communication is one solution to provide more spectrum than available at lower carrier frequencies. To provide sufficient link budget, mmWave systems will use beamforming with large antenna arrays at both the transmitter and receiver. Training these large arrays using conventional approaches taken at lower carrier frequencies, however, results in high overhead. In this paper, we propose a beam training algorithm that efficiently designs the beamforming vectors with low training overhead. Exploiting mmWave channel reciprocity, the proposed algorithm relaxes the need for an explicit feedback channel, and opportunistically terminates the training process when a desired quality of service is achieved. To construct the training beamforming vectors, a new multi-resolution codebook is developed for hybrid analog/digital architectures. Simulation results show that the proposed algorithm achieves a comparable rate to that obtained by exhaustive search solutions while requiring lower training overhead when compared to prior work.

  12. Recognizing and Conducting Opportunistic Experiments in Education: A Guide for Policymakers and Researchers. REL 2014-037

    Science.gov (United States)

    Resch, Alexandra; Berk, Jillian; Akers, Lauren

    2014-01-01

    An opportunistic experiment is a type of randomized controlled trial that studies the effects of a planned intervention or policy change with minimal added disruption and cost. This guide defines opportunistic experiments and provides examples, discusses issues to consider when identifying potential opportunistic experiments, and outlines the…

  13. Annotation and Anonymity: Playful Photo-Sharing by Visiting Groups of Teenagers

    OpenAIRE

    Rowland, Duncan; Appiah-Kubi, Kwamena; Shipp, Victoria; Mortier, Richard Michael; Benford, Steve

    2015-01-01

    This paper investigates the playful photo taking behaviour of teenagers during group visits to two touristic public events (an airshow and a guided tour of a museum). These studies provide the feedback for the iterative development of a smartphone based anonymous image annotation and sharing application. The resulting implications for the design of such photo systems are examined, specifically the appropriateness of opportunistic upload for social media. Playfulness in photography has many im...

  14. Cooperative HARQ with Poisson Interference and Opportunistic Routing

    KAUST Repository

    Kaveh, Mostafa; Rajana, Aomgh

    2014-01-01

    This presentation considers reliable transmission of data from a source to a destination, aided cooperatively by wireless relays selected opportunistically and utilizing hybrid forward error correction/detection, and automatic repeat request (Hybrid

  15. Research of opportunistic behavior in the market of non-standard products

    Directory of Open Access Journals (Sweden)

    Natalya Sergeyevna Grigoryeva

    2015-03-01

    Full Text Available Objective to study the characteristic features of opportunistic behavior in the markets of complex products not subject to standardization by the example of rendering services during constructionandassembling operations. Methods analysis synthesis collection and description of empirical data. Results a significant amount of theoretical material has been analyzed budgets of constructionandassembling operations have been analyzed normative documents have been studied. A poll of quantity surveyors supervisors of constructionandassembling operations consumers of services and works have been carried out. The differences were revealed in the kinds of opportunistic behavior in the nonstandard products markets compared to the standard products markets the results of those surveys were presented in the earlier works by the author. Scientific novelty it has been shown that in case of individual elaboration of each project due to the uniqueness of the result of economic activity as a single complex the opportunistic behavior has such prerequisites as high costs for measurements and control of the quantity and quality of the rendered services and used materials lack of professional competencies of the consumers in the sphere of activity of the producer. Practical value the key provisions and conclusions of the article can be used in the scientific and educational activity when viewing the issues of opportunistic revelations between economic subjects. nbsp

  16. On the capacity of multiple cognitive links through common relay under spectrum-sharing constraints

    KAUST Repository

    Yang, Yuli

    2011-06-01

    In this paper, we consider an underlay cognitive relaying network consisting of multiple secondary users and introduce a cooperative transmission protocol using a common relay to help with the communications between all secondary source-destination pairs for higher throughput and lower realization complexity. A whole relay-assisted transmission procedure is composed of multiple access phase and broadcast phase, where the relay is equipped with multiple antennas, and the secondary sources and destinations are single-antenna nodes. Considering the spectrum-sharing constraints on the secondary sources and the relay, we analyze the capacity behaviors of the underlay cognitive relaying network under study. The corresponding numerical results provide a convenient tool for the presented network design and substantiate a distinguishing feature of introduced design in that multiple secondary users\\' communications do not rely on multiple relays, hence allowing for a more efficient use of the radio resources. © 2011 IEEE.

  17. Migration and opportunistic feeding increase PCB accumulation in Arctic seabirds.

    Science.gov (United States)

    Baert, J M; Janssen, C R; Borgå, K; De Laender, F

    2013-10-15

    It is widely accepted that body concentrations of persistent organic pollutants (POPs) tend to increase with trophic level (TL). Yet, little attention has been paid to the causes in the underlying differences in POP body concentrations between species occupying similar TLs. In this paper we use two modeling approaches to quantify the importance of migration and opportunistic feeding, relative to that of trophic level, in explaining interspecific differences in polychlorinated biphenyl (PCB) body concentrations between 6 Arctic seabird species breeding in the Barents Sea: Little Auk (Alle alle), Black Guillemot (Cepphus grylle), Brünnich's Guillemot (Uria lomvia), Common Eider (Somateria mollissima), Black-legged Kittiwake (Rissa tridactyla), and Glaucous Gull (Larus hyperboreus). As a first approach, we use additive models to analyze two independent data sets (n = 470 and n = 726). We demonstrate that migration, opportunistic feeding, and TL significantly (p < 0.001) increase PCB body concentrations by a factor 3.61-4.10, 2.66-20.95, and 2.38-2.41, respectively. Our second approach, using a mechanistic bioaccumulation model, confirmed these positive effects on the body burdens but suggested lower effects of migration, opportunistic feeding, and TL (1.55, 2.39, and 2.38) than did our statistical analysis. These two independent approaches demonstrate that the effects of migration and opportunistic feeding on seabird body burdens can be similar to that of an increase of one TL and should therefore be accounted for in future analyses.

  18. Effect of threshold quantization in opportunistic splitting algorithm

    KAUST Repository

    Nam, Haewoon; Alouini, Mohamed-Slim

    2011-01-01

    This paper discusses algorithms to find the optimal threshold and also investigates the impact of threshold quantization on the scheduling outage performance of the opportunistic splitting scheduling algorithm. Since this algorithm aims at finding

  19. Opportunistic transmitter selection for selfless overlay cognitive radios

    KAUST Repository

    Shaqfeh, Mohammad; Zafar, Ammar; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2013-01-01

    We propose an opportunistic strategy to grant channel access to the primary and secondary transmitters in causal selfless overlay cognitive radios over block-fading channels. The secondary transmitter helps the primary transmitter by relaying

  20. Joint Network Coding and Opportunistic Scheduling for the Bidirectional Relay Channel

    KAUST Repository

    Shaqfeh, Mohammad

    2013-05-27

    In this paper, we consider a two-way communication system in which two users communicate with each other through an intermediate relay over block-fading channels. We investigate the optimal opportunistic scheduling scheme in order to maximize the long-term average transmission rate in the system assuming symmetric information flow between the two users. Based on the channel state information, the scheduler decides that either one of the users transmits to the relay, or the relay transmits to a single user or broadcasts to both users a combined version of the two users’ transmitted information by using linear network coding. We obtain the optimal scheduling scheme by using the Lagrangian dual problem. Furthermore, in order to characterize the gains of network coding and opportunistic scheduling, we compare the achievable rate of the system versus suboptimal schemes in which the gains of network coding and opportunistic scheduling are partially exploited.

  1. Joint Network Coding and Opportunistic Scheduling for the Bidirectional Relay Channel

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein; Alouini, Mohamed-Slim; Zafar, Ammar

    2013-01-01

    In this paper, we consider a two-way communication system in which two users communicate with each other through an intermediate relay over block-fading channels. We investigate the optimal opportunistic scheduling scheme in order to maximize the long-term average transmission rate in the system assuming symmetric information flow between the two users. Based on the channel state information, the scheduler decides that either one of the users transmits to the relay, or the relay transmits to a single user or broadcasts to both users a combined version of the two users’ transmitted information by using linear network coding. We obtain the optimal scheduling scheme by using the Lagrangian dual problem. Furthermore, in order to characterize the gains of network coding and opportunistic scheduling, we compare the achievable rate of the system versus suboptimal schemes in which the gains of network coding and opportunistic scheduling are partially exploited.

  2. Alternative Opportunistic Alert Diffusion to Support Infrastructure Failure during Disasters

    Directory of Open Access Journals (Sweden)

    Farouk Mezghani

    2017-10-01

    Full Text Available Opportunistic communications present a promising solution for disaster network recovery in emergency situations such as hurricanes, earthquakes, and floods, where infrastructure might be destroyed. Some recent works in the literature have proposed opportunistic-based disaster recovery solutions, but they have omitted the consideration of mobile devices that come with different network technologies and various initial energy levels. This work presents COPE, an energy-aware Cooperative OPportunistic alErt diffusion scheme for trapped survivors to use during disaster scenarios to report their position and ease their rescue operation. It aims to maintain mobile devices functional for as long as possible for maximum network coverage until reaching proximate rescuers. COPE deals with mobile devices that come with an assortment of networks and aims to perform systematic network interface selection. Furthermore, it considers mobile devices with various energy levels and allows low-energy nodes to hold their charge for longer time with the support of high-energy nodes. A proof-of-concept implementation has been performed to study the doability and efficiency of COPE, and to highlight the lessons learned.

  3. Opportunistic or event-driven maintenance at the Stanford Linear Accelerator Center

    International Nuclear Information System (INIS)

    Allen, C.W.; Anderson, S.; Erickson, R.; Linebarger, W.; Sheppard, J.C.; Stanek, M.

    1997-03-01

    The Stanford Linear Accelerator Center (SLAC) uses a maintenance management philosophy that is best described as opportunistic or event-driven. Opportunistic maintenance can be defined as a systematic method of collecting, investigating, pre-planning, and publishing a set of proposed maintenance tasks and acting on them when there is an unscheduled failure or repair ''opportunity''. Opportunistic maintenance can be thought of as a modification of the run-to-fail maintenance management philosophy. This maintenance plan was adopted and developed to improve the overall availability of SLAC's linear accelerator, beam delivery systems, and associated controls, power systems, and utilities. In the late 1980's, as the technical complexity of the accelerator facility increased, variations on a conventional maintenance plan were used with mixed results. These variations typically included some type of regular periodic interruption to operations. The periodic shutdowns and unscheduled failures were additive and resulted in unsatisfactory availability. Maintenance issues are evaluated in a daily meeting that includes the accelerator managers, maintenance supervisors and managers, safety office personnel, program managers, and accelerator operators. Lists of pending maintenance tasks are made available to the general SLAC population by a World Wide Web site on a local internet. A conventional information system which pre-dates the WWW site is still being used to provide paper copies to groups that are not yet integrated into the WWW system. The local internet provides real time maintenance information, allowing people throughout the facility to track progress on tasks with essentially real-time status updates. With the introduction of opportunistic maintenance, the accelerator's availability has been measurably better. This paper will discuss processes, rolls and responsibilities of key maintenance groups, and management tools developed to support opportunistic maintenance

  4. Genetics Home Reference: autism spectrum disorder

    Science.gov (United States)

    ... Share: Email Facebook Twitter Home Health Conditions ASD Autism spectrum disorder Printable PDF Open All Close All Enable Javascript to view the expand/collapse boxes. Description Autism spectrum disorder ( ASD ) is a condition that appears very early ...

  5. Exploiting opportunistic resources for ATLAS with ARC CE and the Event Service

    Science.gov (United States)

    Cameron, D.; Filipčič, A.; Guan, W.; Tsulaia, V.; Walker, R.; Wenaus, T.; ATLAS Collaboration

    2017-10-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from those that comprise the Grid computing of most experiments, therefore exploiting them requires a change in strategy for the experiment. They may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The Advanced Resource Connector Computing Element (ARC CE) with its nonintrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the ATLAS Event Service (AES) primarily to address the issue of jobs that can be terminated at any point when opportunistic computing capacity is needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in a restrictive environment. In addition to the technical details, results from deployment of this solution in the SuperMUC HPC centre in Munich are shown.

  6. Keeping pace with criminals: An extended study of designing patrol allocation against adaptive opportunistic criminals

    OpenAIRE

    Zhang, Chao; Gholami, Shahrzad; Kar, Debarun; Sinha, Arunesh; Jain, Manish; Goyal, Ripple; Tambe, Milind

    2016-01-01

    Game theoretic approaches have recently been used to model the deterrence effect of patrol officers’ assignments on opportunistic crimes in urban areas. One major challenge in this domain is modeling the behavior of opportunistic criminals. Compared to strategic attackers (such as terrorists) who execute a well-laid out plan, opportunistic criminals are less strategic in planning attacks and more flexible in executing well-laid plans based on their knowledge of patrol officers’ assignments. I...

  7. Threshold Based Opportunistic Scheduling of Secondary Users in Underlay Cognitive Radio Networks

    KAUST Repository

    Song, Yao

    2011-12-01

    In underlay cognitive radio networks, secondary users can share the spectrum with primary users as long as the interference caused by the secondary users to primary users is below a certain predetermined threshold. It is reasonable to assume that there is always a large pool of secondary users trying to access the channel, which can be occupied by only one secondary user at a given time. As a result, a multi-user scheduling problem arises among the secondary users. In this thesis, by manipulating basic schemes based on selective multi-user diversity, normalized thresholding, transmission power control, and opportunistic round robin, we propose and analyze eight scheduling schemes of secondary users in an underlay cognitive radio set-up. The system performance of these schemes is quantified by using various performance metrics such as the average system capacity, normalized average feedback load, scheduling outage probability, and system fairness of access. In our proposed schemes, the best user out of all the secondary users in the system is picked to transmit at each given time slot in order to maximize the average system capacity. Two thresholds are used in the two rounds of the selection process to determine the best user. The first threshold is raised by the power constraint from the primary user. The second threshold, which can be adjusted by us, is introduced to reduce the feedback load. The overall system performance is therefore dependent on the choice of these two thresholds and the number of users in the system given the channel conditions for all the users. In this thesis, by deriving analytical formulas and presenting numerical examples, we try to provide insights of the relationship between the performance metrics and the involved parameters including two selection thresholds and the number of active users in the system, in an effort to maximize the average system capacity as well as satisfy the requirements of scheduling outage probability and

  8. Autism Spectrum Disorder (ASD): Related Topics

    Science.gov (United States)

    ... Facebook Tweet Share Compartir Q: Do vaccines cause autism spectrum disorder (ASD)? A: Many studies that have looked at whether there is a relationship between vaccines and autism spectrum disorder (ASD). To date, the studies continue to show ...

  9. Path Diversity Improved Opportunistic Routing for Underwater Sensor Networks.

    Science.gov (United States)

    Bai, Weigang; Wang, Haiyan; He, Ke; Zhao, Ruiqin

    2018-04-23

    The packets carried along a pre-defined route in underwater sensor networks are very vulnerble. Node mobility or intermittent channel availability easily leads to unreachable routing. Opportunistic routing has been proven to be a promising paradigm to design routing protocols for underwater sensor networks. It takes advantage of the broadcast nature of the wireless medium to combat packet losses and selects potential paths on the fly. Finding an appropriate forwarding candidate set is a key issue in opportunistic routing. Many existing solutions ignore the impact of candidates location distribution on packet forwarding. In this paper, a path diversity improved candidate selection strategy is applied in opportunistic routing to improve packet forwarding efficiency. It not only maximizes the packet forwarding advancements but also takes the candidate’s location distribution into account. Based on this strategy, we propose two effective routing protocols: position improved candidates selection (PICS) and position random candidates selection (PRCS). PICS employs two-hop neighbor information to make routing decisions. PRCS only uses one-hop neighbor information. Simulation results show that both PICS and PRCS can significantly improve network performance when compared with the previous solutions, in terms of packet delivery ratio, average energy consumption and end-to-end delay.

  10. Path Diversity Improved Opportunistic Routing for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weigang Bai

    2018-04-01

    Full Text Available The packets carried along a pre-defined route in underwater sensor networks are very vulnerble. Node mobility or intermittent channel availability easily leads to unreachable routing. Opportunistic routing has been proven to be a promising paradigm to design routing protocols for underwater sensor networks. It takes advantage of the broadcast nature of the wireless medium to combat packet losses and selects potential paths on the fly. Finding an appropriate forwarding candidate set is a key issue in opportunistic routing. Many existing solutions ignore the impact of candidates location distribution on packet forwarding. In this paper, a path diversity improved candidate selection strategy is applied in opportunistic routing to improve packet forwarding efficiency. It not only maximizes the packet forwarding advancements but also takes the candidate’s location distribution into account. Based on this strategy, we propose two effective routing protocols: position improved candidates selection (PICS and position random candidates selection (PRCS. PICS employs two-hop neighbor information to make routing decisions. PRCS only uses one-hop neighbor information. Simulation results show that both PICS and PRCS can significantly improve network performance when compared with the previous solutions, in terms of packet delivery ratio, average energy consumption and end-to-end delay.

  11. Error-rate performance analysis of opportunistic regenerative relaying

    KAUST Repository

    Tourki, Kamel

    2011-09-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path can be considered unusable, and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We first derive the exact statistics of each hop, in terms of probability density function (PDF). Then, the PDFs are used to determine accurate closed form expressions for end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation where the detector may use maximum ration combining (MRC) or selection combining (SC). Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over linear network (LN) architecture and considering Rayleigh fading channels. © 2011 IEEE.

  12. Spectrum pooling in MnWave Networks

    DEFF Research Database (Denmark)

    Boccardi, Federico; Shokri-Ghadikolaei, Hossein; Fodor, Gabor

    2016-01-01

    Motivated by the specific characteristics of mmWave technologies, we discuss the possibility of an authorization regime that allows spectrum sharing between multiple operators, also referred to as spectrum pooling. In particular, considering user rate as the performance measure, we assess...

  13. A P2P Query Algorithm for Opportunistic Networks Utilizing betweenness Centrality Forwarding

    Directory of Open Access Journals (Sweden)

    Jianwei Niu

    2013-01-01

    Full Text Available With the proliferation of high-end mobile devices that feature wireless interfaces, many promising applications are enabled in opportunistic networks. In contrary to traditional networks, opportunistic networks utilize the mobility of nodes to relay messages in a store-carry-forward paradigm. Thus, the relay process in opportunistic networks faces several practical challenges in terms of delay and delivery rate. In this paper, we propose a novel P2P Query algorithm, namely Betweenness Centrality Forwarding (PQBCF, for opportunistic networking. PQBCF adopts a forwarding metric called Betweenness Centrality (BC, which is borrowed from social network, to quantify the active degree of nodes in the networks. In PQBCF, nodes with a higher BC are preferable to serve as relays, leading to higher query success rate and lower query delay. A comparison with the state-of-the-art algorithms reveals that PQBCF can provide better performance on both the query success Ratio and query delay, and approaches the performance of Epidemic Routing (ER with much less resource consumption.

  14. Diagnostic mode and tumor stage of breast cancers in the setting of opportunistic screening

    International Nuclear Information System (INIS)

    Graf, O.; Hopf, G.; Obermayer, M.; Fruehwald, F.; Scheurecker, A.; Kramer, J.

    2006-01-01

    Purpose: To analyze data at the time of diagnosis of breast cancer in three radiology practices in Austria in the setting of opportunistic screening. Materials and methods: In 529 women (ages 31 - 89, mean age 61.1) with breast cancer, the mode of diagnosis (detected clinically or by opportunistic screening), the local tumor stages, and intervals between screening examinations were assessed. Results: In 33.6% (178 of 529) of the cases, the breast cancer was detected clinically, and in 66.4% (351 of 529) of the cases, the cancer was detected by opportunistic screening. Cancers in prognostically favorable stages (in situ carcinomas, pT1 a, pT1 b, pT1c) were detected by opportunistic screening in 79.9% of the cases. The clinically detected cancers were in locally advanced stages (pT2, pT3) in 58.4% of the cases. In the majority of clinically detected cases (75%), the women had never had a mammogram before or had not had a recent one. In 13% of the cases detected by opportunistic screening, diagnosis was made during the first exam, in 40% of the cases, the period since the last mammogram was less than 24 months, and in 47% of the cases, this period was greater than 24 months. Conclusion: In our patients the majority of breast cancers were detected in early stages by opportunistic screening. The use of an organized system with exams at regular intervals may further reduce the number of advanced cancers. (orig.)

  15. Pattern of gastrointestinal opportunistic infections among HIV ...

    African Journals Online (AJOL)

    Twenty-two per cent (22%) of these had mixed parasitosis of cryptosporidium and hookworm. There was no significant association of CD4 cells count with intestinal parasitosis. x2 = 5.286 and p=0.259. However marital status was significantly associated with gastrointestinal opportunistic parasitosis with x2 of 12.693, ...

  16. Resource sharing in wireless networks: The SAPHYRE approach

    NARCIS (Netherlands)

    Jorswieck, E.A.; Badia, L.; Fahldieck, T.; Gesbert, D.; Gustafsson, S.; Haardt, M.; Ho, K.-M.; Karipidis, E.; Kortke, A.; Larsson, E.G.; Mark, H.; Nawrocki, M.; Piesiewicz, R.; Römer, F.; Schubert, M.; Sykora, J.; Trommelen, P.H.; Ende, B.D. van; Zorzi, M.

    2010-01-01

    Physical resource sharing between wireless operators and service providers is necessary in order to support efficient, competitive, and innovative wireless communication markets. By sharing resources, such as spectrum or infrastructure, which are usually exclusively allocated interference is created

  17. Pathogenic and opportunistic microorganisms in caves

    Directory of Open Access Journals (Sweden)

    Sanchez-Moral Sergio

    2010-01-01

    Full Text Available With today’s leisure tourism, the frequency of visits to many caves makes it necessary to know about possible potentially pathogenic microorganisms in caves, determine their reservoirs, and inform the public about the consequences of such visits. Our data reveal that caves could be a potential danger to visitors because of the presence of opportunistic microorganisms, whose existence and possible development in humans is currently unknown.

  18. Accurate performance analysis of opportunistic decode-and-forward relaying

    KAUST Repository

    Tourki, Kamel

    2011-07-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may be considered unusable, and the destination may use a selection combining technique. We first derive the exact statistics of each hop, in terms of probability density function (PDF). Then, the PDFs are used to determine accurate closed form expressions for end-to-end outage probability for a transmission rate R. Furthermore, we evaluate the asymptotical performance analysis and the diversity order is deduced. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2011 IEEE.

  19. Chest x-ray findings of opportunistic infections

    International Nuclear Information System (INIS)

    Lee, Yul; Jeon, Suk Chul; Lim, Jeong Ki; Park, Jae Hyung; Kim, Chu Wan

    1983-01-01

    The chest x-ray findings of 20 cases of pulmonary opportunistic infection were analyzed according to causative agents. The results were as follows: 1. Final diagnoses of 20 cases of opportunistic infections were tuberculosis in 6 cases, pneumocystis carinii pneumonia in 5 cases, bacterial infection in 7 cases, and fungal infection in 2 cases. 2. The underlying diseases were leukemia in 6 cases, kidney transplantation in 6 cases, lymphoma in 3 cases, nephrotic syndrome in 1 case, nasopharyngeal cancer in 1 case, multiple myeloma in 1 case, agranulocytosis in 1 case, and hypogammaglobulinemia in 1 case. 3. In tuberculosis, all the 6 cases showed severe manifestations such as military tuberculosis, tuberculous pneumonia, moderately advanced tuberculosis and tuberculous pericarditis. 4. In pneumocystis carinii pneumonia, the most frequent findings were bilateral alveolar densities and peripheral field of the lung was saved in most cases. 5. In 2 cases of fungal infections bilateral multiple cavity nodules were noted. 6. In cases of bacterial infection there was more cases of gram negative infection than gram positive and 2 cases of pseudomonas revealed bilateral multiple cavitary nodules

  20. Adaptive rate transmission for spectrum sharing system with quantized channel state information

    KAUST Repository

    Abdallah, Mohamed M.

    2011-03-01

    The capacity of a secondary link in spectrum sharing systems has been recently investigated in fading environments. In particular, the secondary transmitter is allowed to adapt its power and rate to maximize its capacity subject to the constraint of maximum interference level allowed at the primary receiver. In most of the literature, it was assumed that estimates of the channel state information (CSI) of the secondary link and the interference level are made available at the secondary transmitter via an infinite-resolution feedback links between the secondary/primary receivers and the secondary transmitter. However, the assumption of having infinite resolution feedback links is not always practical as it requires an excessive amount of bandwidth. In this paper we develop a framework for optimizing the performance of the secondary link in terms of the average spectral efficiency assuming quantized CSI available at the secondary transmitter. We develop a computationally efficient algorithm for optimally quantizing the CSI and finding the optimal power and rate employed at the cognitive transmitter for each quantized CSI level so as to maximize the average spectral efficiency. Our results give the number of bits required to represent the CSI sufficient to achieve almost the maximum average spectral efficiency attained using full knowledge of the CSI for Rayleigh fading channels. © 2011 IEEE.

  1. Adaptive transmission schemes for MISO spectrum sharing systems: Tradeoffs and performance analysis

    KAUST Repository

    Bouida, Zied

    2014-10-01

    In this paper, we propose a number of adaptive transmission techniques in order to improve the performance of the secondary link in a spectrum sharing system. We first introduce the concept of minimum-selection maximum ratio transmission (MS-MRT) as an adaptive variation of the existing MRT (MRT) technique. While in MRT all available antennas are used for transmission, MS-MRT uses the minimum subset of antennas verifying both the interference constraint (IC) to the primary user and the bit error rate (BER) requirements. Similar to MRT, MS-MRT assumes that perfect channel state information (CSI) is available at the secondary transmitter (ST), which makes this scheme challenging from a practical point of view. To overcome this challenge, we propose another transmission technique based on orthogonal space-time block codes with transmit antenna selection (TAS). This technique uses the full-rate full-diversity Alamouti scheme in order to maximize the secondary\\'s transmission rate. The performance of these techniques is analyzed in terms of the average spectral efficiency (ASE), average number of transmit antennas, average delay, average BER, and outage performance. In order to give the motivation behind these analytical results, the tradeoffs offered by the proposed schemes are summarized and then demonstrated through several numerical examples.

  2. Adaptive rate transmission for spectrum sharing system with quantized channel state information

    KAUST Repository

    Abdallah, Mohamed M.; Salem, Ahmed H.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2011-01-01

    The capacity of a secondary link in spectrum sharing systems has been recently investigated in fading environments. In particular, the secondary transmitter is allowed to adapt its power and rate to maximize its capacity subject to the constraint of maximum interference level allowed at the primary receiver. In most of the literature, it was assumed that estimates of the channel state information (CSI) of the secondary link and the interference level are made available at the secondary transmitter via an infinite-resolution feedback links between the secondary/primary receivers and the secondary transmitter. However, the assumption of having infinite resolution feedback links is not always practical as it requires an excessive amount of bandwidth. In this paper we develop a framework for optimizing the performance of the secondary link in terms of the average spectral efficiency assuming quantized CSI available at the secondary transmitter. We develop a computationally efficient algorithm for optimally quantizing the CSI and finding the optimal power and rate employed at the cognitive transmitter for each quantized CSI level so as to maximize the average spectral efficiency. Our results give the number of bits required to represent the CSI sufficient to achieve almost the maximum average spectral efficiency attained using full knowledge of the CSI for Rayleigh fading channels. © 2011 IEEE.

  3. Fluconazole resistant opportunistic oro-pharyngeal candida and non ...

    African Journals Online (AJOL)

    Background: Oro-Pharyngeal Candidiasis (OPC) continues to be considered the most common opportunistic fungal disease in HIV/AIDS patients globally. Azole antifungal agent has become important in the treatment of mucosal candidiasis in HIV patients. Presently, antifungal drug resistance is fast becoming a major ...

  4. Optimal Cross-Layer Design for Energy Efficient D2D Sharing Systems

    KAUST Repository

    Alabbasi, Abdulrahman

    2016-11-23

    In this paper, we propose a cross-layer design, which optimizes the energy efficiency of a potential future 5G spectrum-sharing environment, in two sharing scenarios. In the first scenario, underlying sharing is considered. We propose and minimize a modified energy per good bit (MEPG) metric, with respect to the spectrum sharing user’s transmission power and media access frame length. The cellular users, legacy users, are protected by an outage probability constraint. To optimize the non-convex targeted problem, we utilize the generalized convexity theory and verify the problem’s strictly pseudoconvex structure. We also derive analytical expressions of the optimal resources. In the second scenario, we minimize a generalized MEPG function while considering a probabilistic activity of cellular users and its impact on the MEPG performance of the spectrum sharing users. Finally, we derive the associated optimal resource allocation of this problem. Selected numerical results show the improvement of the proposed system compared with other systems.

  5. Trust in social computing. The case of peer-to-peer file sharing networks

    Directory of Open Access Journals (Sweden)

    Heng Xu

    2011-09-01

    Full Text Available Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P file sharing. Given the greater risk of opportunistic behavior by malicious or criminal communities in P2P networks, it is crucial to understand the factors that affect individual’s use of P2P file sharing software. In this paper, we develop and empirically test a research model that includes trust beliefs and perceived risks as two major antecedent beliefs to the usage intention. Six trust antecedents are assessed including knowledge-based trust, cognitive trust, and both organizational and peer-network factors of institutional trust. Our preliminary results show general support for the model and offer some important implications for software vendors in P2P sharing industry and regulatory bodies.

  6. Relationship between lactobacilli and opportunistic bacterial pathogens associated with vaginitis.

    Science.gov (United States)

    Razzak, Mohammad Sabri A; Al-Charrakh, Alaa H; Al-Greitty, Bara Hamid

    2011-04-01

    Vaginitis, is an infectious inflammation of the vaginal mucosa, which sometimes involves the vulva. The balance of the vaginal flora is maintained by the Lactobacilli and its protective and probiotic role in treating and preventing vaginal infection by producing antagonizing compounds which are regarded as safe for humans. The aim of this study was to evaluate the protective role of Lactobacilli against common bacterial opportunistic pathogens in vaginitis and study the effects of some antibiotics on Lactobacilli isolates. In this study (110) vaginal swabs were obtained from women suffering from vaginitis who admitted to Babylon Hospital of Maternity and Paediatrics in Babylon province, Iraq. The study involved the role of intrauterine device among married women with vaginitis and also involved isolation of opportunistic bacterial isolates among pregnant and non pregnant women. This study also involved studying probiotic role of Lactobacilli by production of some defense factors like hydrogen peroxide, bacteriocin, and lactic acid. Results revealed that a total of 130 bacterial isolates were obtained. Intrauterine device was a predisposing factor for vaginitis. The most common opportunistic bacterial isolates were Staphylococcus aureus, Escherichia coli, Streptococcus agalactiae, and Klebsiella pneumoniae. All Lactobacilli were hydrogen peroxide producers while some isolates were bacteriocin producers that inhibited some of opportunistic pathogens (S. aureus, E. coli). Lactobacilli were sensitive to erythromycin while 93.3% of them were resistant to ciprofloxacin and (40%, 53.3%) of them were resistant to amoxicillin and gentamycin respectively. Results revealed that there was an inverse relationship between Lactobacilli presence and organisms causing vaginitis. This may be attributed to the production of defense factors by Lactobacilli. The types of antibiotics used to treat vaginitis must be very selective in order not to kill the beneficial bacteria

  7. Loss of competition in the outside host environment generates outbreaks of environmental opportunist pathogens.

    Directory of Open Access Journals (Sweden)

    Jani Anttila

    Full Text Available Environmentally transmitted pathogens face ecological interactions (e.g., competition, predation, parasitism in the outside-host environment and host immune system during infection. Despite the ubiquitousness of environmental opportunist pathogens, traditional epidemiology focuses on obligatory pathogens incapable of environmental growth. Here we ask how competitive interactions in the outside-host environment affect the dynamics of an opportunist pathogen. We present a model coupling the classical SI and Lotka-Volterra competition models. In this model we compare a linear infectivity response and a sigmoidal infectivity response. An important assumption is that pathogen virulence is traded off with competitive ability in the environment. Removing this trade-off easily results in host extinction. The sigmoidal response is associated with catastrophic appearances of disease outbreaks when outside-host species richness, or overall competition pressure, decreases. This indicates that alleviating outside-host competition with antibacterial substances that also target the competitors can have unexpected outcomes by providing benefits for opportunist pathogens. These findings may help in developing alternative ways of controlling environmental opportunist pathogens.

  8. Plancton: an opportunistic distributed computing project based on Docker containers

    Science.gov (United States)

    Concas, Matteo; Berzano, Dario; Bagnasco, Stefano; Lusso, Stefano; Masera, Massimo; Puccio, Maximiliano; Vallero, Sara

    2017-10-01

    The computing power of most modern commodity computers is far from being fully exploited by standard usage patterns. In this work we describe the development and setup of a virtual computing cluster based on Docker containers used as worker nodes. The facility is based on Plancton: a lightweight fire-and-forget background service. Plancton spawns and controls a local pool of Docker containers on a host with free resources, by constantly monitoring its CPU utilisation. It is designed to release the resources allocated opportunistically, whenever another demanding task is run by the host user, according to configurable policies. This is attained by killing a number of running containers. One of the advantages of a thin virtualization layer such as Linux containers is that they can be started almost instantly upon request. We will show how fast the start-up and disposal of containers eventually enables us to implement an opportunistic cluster based on Plancton daemons without a central control node, where the spawned Docker containers behave as job pilots. Finally, we will show how Plancton was configured to run up to 10 000 concurrent opportunistic jobs on the ALICE High-Level Trigger facility, by giving a considerable advantage in terms of management compared to virtual machines.

  9. Optimising social information by game theory and ant colony method to enhance routing protocol in opportunistic networks

    Directory of Open Access Journals (Sweden)

    Chander Prabha

    2016-09-01

    Full Text Available The data loss and disconnection of nodes are frequent in the opportunistic networks. The social information plays an important role in reducing the data loss because it depends on the connectivity of nodes. The appropriate selection of next hop based on social information is critical for improving the performance of routing in opportunistic networks. The frequent disconnection problem is overcome by optimising the social information with Ant Colony Optimization method which depends on the topology of opportunistic network. The proposed protocol is examined thoroughly via analysis and simulation in order to assess their performance in comparison with other social based routing protocols in opportunistic network under various parameters settings.

  10. New results on performance analysis of opportunistic regenerative relaying

    KAUST Repository

    Tourki, Kamel

    2013-12-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may be unusable, and takes into account the effect of the possible erroneously detected and transmitted data at the selected relay. We first derive the signal-to-noise (SNR) statistics for each hop, which are used to determine accurate closed form expressions for end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and end-to-end outage probability for a transmission rate R over Rayleigh fading channels. Furthermore, we evaluate the asymptotical performance and deduce the diversity order. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over linear network architecture. © 2013 Elsevier B.V.

  11. Computed tomography in opportunistic lung infections

    International Nuclear Information System (INIS)

    Hartelius, H.

    1988-01-01

    Chest radiography in two teenage boys, one with Wiscott-Aldrich's syndrome and one with acute lymphatic leucemia in remission showed increased interstitial pattern. In both computed tomography (CT) of the lungs showed heavy interstitial pneumonia, rather different in appearance but in both cases equal to the CT findings in opportunistic lung infections known from immunoincompetent patients with for instance pneumocystis carinii and/or cytomegalo virus infections. In both patients the CT findings led to lung biopsy establishing the etiologic agent. (orig.)

  12. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate...

  13. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  14. Opportunistic Carrier Sensing for Energy-Efficient Information Retrieval in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhao Qing

    2005-01-01

    Full Text Available We consider distributed information retrieval for sensor networks with cluster heads or mobile access points. The performance metric used in the design is energy efficiency defined as the ratio of the average number of bits reliably retrieved by the access point to the total amount of energy consumed. A distributed opportunistic transmission protocol is proposed using a combination of carrier sensing and backoff strategy that incorporates channel state information (CSI of individual sensors. By selecting a set of sensors with the best channel states to transmit, the proposed protocol achieves the upper bound on energy efficiency when the signal propagation delay is negligible. For networks with substantial propagation delays, a backoff function optimized for energy efficiency is proposed. The design of this backoff function utilizes properties of extreme statistics and is shown to have mild performance loss in practical scenarios. We also demonstrate that opportunistic strategies that use CSI may not be optimal when channel acquisition at individual sensors consumes substantial energy. We show further that there is an optimal sensor density for which the opportunistic information retrieval is the most energy efficient. This observation leads to the design of the optimal sensor duty cycle.

  15. Regression in autistic spectrum disorders.

    Science.gov (United States)

    Stefanatos, Gerry A

    2008-12-01

    A significant proportion of children diagnosed with Autistic Spectrum Disorder experience a developmental regression characterized by a loss of previously-acquired skills. This may involve a loss of speech or social responsitivity, but often entails both. This paper critically reviews the phenomena of regression in autistic spectrum disorders, highlighting the characteristics of regression, age of onset, temporal course, and long-term outcome. Important considerations for diagnosis are discussed and multiple etiological factors currently hypothesized to underlie the phenomenon are reviewed. It is argued that regressive autistic spectrum disorders can be conceptualized on a spectrum with other regressive disorders that may share common pathophysiological features. The implications of this viewpoint are discussed.

  16. Node-Dependence-Based Dynamic Incentive Algorithm in Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Ruiyun Yu

    2014-01-01

    Full Text Available Opportunistic networks lack end-to-end paths between source nodes and destination nodes, so the communications are mainly carried out by the “store-carry-forward” strategy. Selfish behaviors of rejecting packet relay requests will severely worsen the network performance. Incentive is an efficient way to reduce selfish behaviors and hence improves the reliability and robustness of the networks. In this paper, we propose the node-dependence-based dynamic gaming incentive (NDI algorithm, which exploits the dynamic repeated gaming to motivate nodes relaying packets for other nodes. The NDI algorithm presents a mechanism of tolerating selfish behaviors of nodes. Reward and punishment methods are also designed based on the node dependence degree. Simulation results show that the NDI algorithm is effective in increasing the delivery ratio and decreasing average latency when there are a lot of selfish nodes in the opportunistic networks.

  17. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-03-01

    Full Text Available In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast, second technique is the improved Hydrocast (improved-Hydrocast, and third one is the cooperative improved Hydrocast (Co-improved Hydrocast. In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR of the received signal is not within the predefined threshold then the maximal ratio combining (MRC is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  18. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Javaid, Nadeem; Muhammad; Sher, Arshad; Abdul, Wadood; Niaz, Iftikhar Azim; Almogren, Ahmad; Alamri, Atif

    2017-03-19

    In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs) are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast), second technique is the improved Hydrocast (improved-Hydrocast), and third one is the cooperative improved Hydrocast (Co-improved Hydrocast). In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR) of the received signal is not within the predefined threshold then the maximal ratio combining (MRC) is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  19. AFSC/NMML: Cook Inlet Beluga Opportunistic Sightings, 1975 to 2015

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — As a part of National Marine Fisheries Service (NMFS) management of the endangered Cook Inlet beluga whale population, a database of opportunistic beluga whale...

  20. Towards Opportunistic Data Dissemination in Mobile Phone Sensor Networks

    NARCIS (Netherlands)

    Le Viet Duc, L Duc; Scholten, Johan; Havinga, Paul J.M.

    Recently, there has been a growing interest within the research community in developing opportunistic routing protocols. Many schemes have been proposed; however, they differ greatly in assumptions and in type of network for which they are evaluated. As a result, researchers have an ambiguous

  1. 47 CFR 90.1407 - Spectrum use in the network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Spectrum use in the network. 90.1407 Section 90... network. (a) Spectrum use. The Shared Wireless Broadband Network will operate using spectrum associated... from the primary public safety operations in the 763-768 MHz and 793-798 MHz bands. The network...

  2. A non-digging zoobenthivorous fish attracts two opportunistic predatory fish associates

    Directory of Open Access Journals (Sweden)

    Cristina Sazima

    Full Text Available Following behaviour among reef fishes involves mostly a digging nuclear species while foraging, which attracts opportunistic followers preying on the exposed organisms. The flying gurnard Dactylopterus volitans preys on benthic animals, mostly crustaceans and small fishes, scratching and probing the bottom with the inner rays of its pectoral fins. We recorded the flying gurnard being followed by two opportunistic predators, the yellow jack Caranx bartholomaei and the coney Cephalopholis fulva at Fernando de Noronha, off northeast Brazil. Albeit not actually digging the substrate, the flying gurnard acts as a nuclear species by exploring algae tufts and by its wandering near the boulders and ledges, disturbing and flushing out hidden animals which thus become available to predation.

  3. Electromagnetic spectrum survey of the environment in a locality in Kuala Lumpur, Malaysia

    International Nuclear Information System (INIS)

    Abood, Wafa Ali; Din, Norashidah Md; Ismail, Aiman; Mohamad, Hafizal

    2013-01-01

    The electromagnetic spectrum in the environment is becoming a scarce resource with the emergence of a high number of wireless communications services Cognitive radio (CR) is viewed as a possible solution to the spectrum bottleneck which work in a premise that at an any given time and spatial region there are frequency bands that has no signal occupancy. The CR technique utilizes a temporarily unoccupied licensed band by allowing secondary users to exploit opportunistically the underutilized spectrum licensed to primary users without any harmful interference. Before investigating the technical and political implications of CR, it is necessary to know to what extent the licensed bands are temporally unoccupied. In this paper a spectrum occupancy measurements is conducted to study the utilization of RF spectrum in an environment. The measurements are performed on UHF TV, GSM900 and GSM1800 frequency bands in an urban area in Kuala Lumpur, Malaysia. The evaluation made is based on the power detection principle. From the measurements, the spectrum holes are identified. The obtained results show that the spectral usage is 7.37% for UHF TV band, 12.8% for GSM900 and 5.3% for GSM1800 band leading to the conclusion that a significant amount of spectrum is available for deployment of cognitive radio.

  4. Electromagnetic spectrum survey of the environment in a locality in Kuala Lumpur, Malaysia

    Science.gov (United States)

    Abood, Wafa Ali; Din, Norashidah Md; Ismail, Aiman; Mohamad, Hafizal

    2013-06-01

    The electromagnetic spectrum in the environment is becoming a scarce resource with the emergence of a high number of wireless communications services Cognitive radio (CR) is viewed as a possible solution to the spectrum bottleneck which work in a premise that at an any given time and spatial region there are frequency bands that has no signal occupancy. The CR technique utilizes a temporarily unoccupied licensed band by allowing secondary users to exploit opportunistically the underutilized spectrum licensed to primary users without any harmful interference. Before investigating the technical and political implications of CR, it is necessary to know to what extent the licensed bands are temporally unoccupied. In this paper a spectrum occupancy measurements is conducted to study the utilization of RF spectrum in an environment. The measurements are performed on UHF TV, GSM900 and GSM1800 frequency bands in an urban area in Kuala Lumpur, Malaysia. The evaluation made is based on the power detection principle. From the measurements, the spectrum holes are identified. The obtained results show that the spectral usage is 7.37% for UHF TV band, 12.8% for GSM900 and 5.3% for GSM1800 band leading to the conclusion that a significant amount of spectrum is available for deployment of cognitive radio.

  5. Guidelines for the naming of genes, gene products, and mutants in the opportunistic protists.

    Science.gov (United States)

    Limper, Andrew H; Weiss, Louis M

    2011-01-01

    The opportunistic protists encompass a wide diversity of organisms including Pneumocystis, Toxoplasma, cryptosporidia, microsporidia, and related genera. Recent advances in the molecular biology and cellular biochemistry of these organisms have led to the identification of an ever growing numbers of key genes and their cognate proteins. Until now, these molecules have not been designated using any consistent nomenclature system, leading to considerable confusion. The participants of the 11th International Workshop on Opportunistic Protists met on August 3, 2010 to reach consensus of a nomenclature system for genes, gene products, and mutants in the opportunistic protists. The following summary reports the consensus agreement to move toward a unified nomenclature system for these organisms. The system is adapted from that used for Saccharomyces cerevisiae. © 2011 The Author(s). Journal of Eukaryotic Microbiology © 2011 International Society of Protistologists.

  6. The 13th International Workshops on Opportunistic Protists (IWOP13).

    Science.gov (United States)

    Calderon, Enrique J; Cushion, Melanie T; Xiao, Lihua; Lorenzo-Morales, Jacob; Matos, Olga; Kaneshiro, Edna S; Weiss, Louis M

    2015-01-01

    The 13th International Workshops on Opportunistic Protists (IWOP-13) was held November 13-15, 2014 in Seville, Spain. The objectives of the IWOP meetings are to: (1) serve as a forum for exchange of new information among active researchers concerning the basic biology, molecular genetics, immunology, biochemistry, pathogenesis, drug development, therapy, and epidemiology of these immunodeficiency-associated pathogenic eukaryotic microorganisms that are seen in patients with AIDS and; (2) to foster the entry of new and young investigators into these underserved research areas. The IWOP meeting focuses on opportunistic protists; e.g. the free-living amoebae, Pneumocystis, Cryptosporidium, Toxoplasma, the Microsporidia, and kinetoplastid flagellates. This conference represents the major conference which brings together research groups working on these opportunistic pathogens. Progress has been achieved on understanding the biology of these pathogenic organisms, their involvement in disease causation in both immune deficient and immune competent hosts and is providing important insights into these emerging and reemerging pathogens. A continuing concern of the participants is the ongoing loss of scientific expertise and diversity in this research community. This decline is due to the small size of these research communities and an ongoing lack of understanding by the broader scientific community of the challenges and limitations faced by researchers working on these organisms, which makes these research communities very sensitive to declines in research funding. © 2015 The Author(s) Journal of Eukaryotic Microbiology © 2015 International Society of Protistologists.

  7. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  8. Candida glabrata: an emerging oral opportunistic pathogen.

    Science.gov (United States)

    Li, L; Redding, S; Dongari-Bagtzoglou, A

    2007-03-01

    Following the widespread use of immunosuppressive therapy and broad-spectrum antimycotic prophylaxis, C. glabrata has emerged as an important opportunistic pathogen in the oral mucosa. In the past, studies on the virulence factors and host-pathogen interactions of this organism were scarce, but continued to rise in recent years. Denture-wearing, immunosuppression, antibiotic therapy, and aging are risk factors for oral colonization or infection with C. glabrata. Compared with C. albicans, C. glabrata exhibits lower oral keratinocyte-adherence capacity, but higher denture-surface-adherence ability. The role of extracellular hydrolase production in the virulence of this organism does not appear to be as important as it is in C. albicans pathogenesis. Although traditionally thought of as a non-transforming yeast organism, both phenotypic switching and pseudohyphal formation have recently been identified in C. glabrata, but their role in pathogenesis is not known. With the exception of granulocyte monocyte colony-stimulating factor, C. glabrata triggers a lower proinflammatory cytokine response in oral epithelial cells than does C. albicans, in a strain-dependent manner. C. glabrata is less susceptible to killing by human beta-defensins than is C. albicans and exhibits various degrees of resistance to the antifungal activity of salivary histatins and mucins. In addition, C. glabrata possesses both innate and acquired resistance against antifungal drugs, due to its ability to modify ergosterol biosynthesis, mitochondrial function, or antifungal efflux. This resistance allows for its relative overgrowth over other susceptible species and may contribute to the recent emergence of C. glabrata infections in chronically immunocompromised populations. Further investigations on the virulence and host-pathogen interactions of C. glabrata are needed to better define the pathogenesis of oral C. glabrata infection in susceptible hosts.

  9. Cooperative HARQ with Poisson Interference and Opportunistic Routing

    KAUST Repository

    Kaveh, Mostafa

    2014-01-06

    This presentation considers reliable transmission of data from a source to a destination, aided cooperatively by wireless relays selected opportunistically and utilizing hybrid forward error correction/detection, and automatic repeat request (Hybrid ARQ, or HARQ). Specifically, we present a performance analysis of the cooperative HARQ protocol in a wireless adhoc multihop network employing spatial ALOHA. We model the nodes in such a network by a homogeneous 2-D Poisson point process. We study the tradeoff between the per-hop rate, spatial density and range of transmissions inherent in the network by optimizing the transport capacity with respect to the network design parameters, HARQ coding rate and medium access probability. We obtain an approximate analytic expression for the expected progress of opportunistic routing and optimize the capacity approximation by convex optimization. By way of numerical results, we show that the network design parameters obtained by optimizing the analytic approximation of transport capacity closely follows that of Monte Carlo based exact transport capacity optimization. As a result of the analysis, we argue that the optimal HARQ coding rate and medium access probability are independent of the node density in the network.

  10. Antimicrobial therapy for the treatment of opportunistic infections in HIV/AIDS patients: a critical appraisal

    Directory of Open Access Journals (Sweden)

    Seddon J

    2011-04-01

    Full Text Available Jo Seddon1, Sanjay Bhagani21Department of Infectious Diseases, Imperial College Healthcare NHS Trust, London, UK; 2Department of Infection and Immunity, Royal Free Hospital NHS Trust, London, UKAbstract: The widespread use of antiretroviral therapy (ART has entirely changed the management of human immunodeficiency virus (HIV infection and dramatically reduced the rates of opportunistic infections (OI. However, OI continue to cause significant morbidity and mortality in both developed countries, where presentation with advanced HIV infection is common, and also in developing countries where ART is less widely available. Evidence to direct OI guidelines is partly limited by the fact that many large-scale studies date from the pre-ART era and more recent studies are sometimes poorly powered due to the falling rates of OI. Treatment of OI is now known to be as much about antimicrobials as about immune reconstitution with ART, and recent studies help guide the timing of initiation of ART in different infections. OI have also become complicated by the immune reconstitution inflammatory syndrome phenomenon which may occur once successful immune recovery begins. Trimethoprim-sulfamethoxazole has long been one of the most important antibiotics in the treatment and prevention of OI and remains paramount. It has a broad spectrum of activity against Pneumocystis jiroveci, toxoplasmosis, and bacterial infections and has an important role to play in preventing life-threatening OI. New advances in treating OI are coming from a variety of quarters: in cytomegalovirus eye disease, the use of oral rather than intravenous drugs is changing the face of therapy; in cryptococcal meningitis, improved drug formulations and combination therapy is improving clearance rates and reducing drug toxicities; and in gut disease, the possibility of rapid immune restitution with ART is replacing the need for antimicrobials against cryptosporidia and microsporidia.Keywords: HIV

  11. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  12. Public policy and regulatory implications for the implementation of Opportunistic Cloud Computing Services for Enterprises

    DEFF Research Database (Denmark)

    Kuada, Eric; Olesen, Henning; Henten, Anders

    2012-01-01

    Opportunistic Cloud Computing Services (OCCS) is a social network approach to the provisioning and management of cloud computing services for enterprises. This paper discusses how public policy and regulations will impact on OCCS implementation. We rely on documented publicly available government...... and corporate policies on the adoption of cloud computing services and deduce the impact of these policies on their adoption of opportunistic cloud computing services. We conclude that there are regulatory challenges on data protection that raises issues for cloud computing adoption in general; and the lack...... of a single globally accepted data protection standard poses some challenges for very successful implementation of OCCS for companies. However, the direction of current public and corporate policies on cloud computing make a good case for them to try out opportunistic cloud computing services....

  13. Application of a Channel Estimation Algorithm to Spectrum Sensing in a Cognitive Radio Context

    Directory of Open Access Journals (Sweden)

    Vincent Savaux

    2014-01-01

    Full Text Available This paper deals with spectrum sensing in an orthogonal frequency division multiplexing (OFDM context, allowing an opportunistic user to detect a vacant spectrum resource in a licensed band. The proposed method is based on an iterative algorithm used for the joint estimation of noise variance and frequency selective channel. It can be seen as a second-order detector, since it is performed by means of the minimum mean square error criterion. The main advantage of the proposed algorithm is its capability to perform spectrum sensing, noise variance estimation, and channel estimation in the presence of a signal. Furthermore, the sensing duration is limited to only one OFDM symbol. We theoretically show the convergence of the algorithm, and we derive its analytical detection and false alarm probabilities. Furthermore, we show that the detector is very efficient, even for low SNR values, and is robust against a channel uncertainty.

  14. AIRBORNE HYPERSPECTRAL IDENTIFICATION OF INVASIVE AND OPPORTUNISTIC WETLANDS PLANT SPECIES

    Science.gov (United States)

    Coastal wetlands are among the most fragmented and disturbed ecosystems and the Great Lakes are no exception. One possible result is the observed increase in the presence and dominance of invasive and other opportunistic plant species, such as the common reed (Phragmites australi...

  15. HIV-associated opportunistic fungal infections: a guide to using the ...

    African Journals Online (AJOL)

    This review aims to provide a guide for clinicians to using the clinical microbiology laboratory for management of common HIV-associated opportunistic fungal infections, e.g. mucosal candidiasis, cryptococcosis, Pneumocystis jirovecii pneumonia (PCP), histoplasmosis, etc. Laboratory tests provide valuable guidance at ...

  16. Benefits and performance of ATLAS approaches to utilizing opportunistic resources

    CERN Document Server

    Filip\\v{c}i\\v{c}, Andrej; The ATLAS collaboration

    2016-01-01

    ATLAS has been extensively exploring possibilities of using computing resources extending beyond conventional grid sites in the WLCG fabric to deliver as many computing cycles as possible and thereby enhance the significance of the Monte-Carlo samples to deliver better physics results. The difficulties of using such opportunistic resources come from architectural differences such as unavailability of grid services, the absence of network connectivity on worker nodes or inability to use standard authorization protocols. Nevertheless, ATLAS has been extremely successful in running production payloads on a variety of sites, thanks largely to the job execution workflow design in which the job assignment, input data provisioning and execution steps are clearly separated and can be offloaded to custom services. To transparently include the opportunistic sites in the ATLAS central production system, several models with supporting services have been developed to mimic the functionality of a full WLCG site. Some are e...

  17. Cook Inlet Beluga Opportunistic Sightings, 1975 to 2015 (NCEI Accession 0142326)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — As a part of National Marine Fisheries Service (NMFS) management of the endangered Cook Inlet beluga whale population, a database of opportunistic beluga whale...

  18. Analysis of the association opportunistic infections with c-reactive protein focus toxoplasma, cytomegalovirus, rubella,and hepatitis in human immunodeficiency virus

    Science.gov (United States)

    Khadijah, K. H.; Ferica, K.; Katu, S.; Halim, R.; Mubin, A. H.

    2018-03-01

    Opportunistic infections occur more often severe in people with HIV. C-reactive protein is known to have a prognostic value in HIV and those with HIV-related opportunistic infections. High level of CRP will increase therisk of infection toxoplasma, CMV, rubella,and hepatitis in HIV.Analyzing association of opportunistic infections toxoplasma, CMV, rubella,and hepatitis with the level of CRP in HIV, a cross-sectional analytic study wasduring January-July 2017 on both outpatientand inpatient HIV subjects at Wahidin Sudirohusodo Hospital, Makassar. Each HIV patient is categorized into agroup of opportunistic infections: toxoplasma, CMV, rubella, hepatitis. CRP levels will be assessed in each group, defined by normal values 0.05).

  19. Proactive Spectrum Sharing for SWIPT in MIMO Cognitive Radio Systems Using Antenna Switching Technique

    KAUST Repository

    Benkhelifa, Fatma

    2017-04-24

    In this paper, we consider the simultaneous wireless information and power transfer (SWIPT) for the spectrum sharing (SS) in a multiple-input multiple-output (MIMO) cognitive radio (CR) network. The secondary transmitter (ST) selects only one antenna which maximizes the received signal-to-noise ratio (SNR) at the secondary receiver (SR) and minimizes the interference induced at the primary receiver (PR). Moreover, PR is an energy harvesting (EH) node using the antenna switching (AS) which assigns a subset of its antennas to harvest the energy and assigns the rest to decode its information data. The objective of this work is to show that the SS is advantageous for both SR and PR sides and leads to a win-win situation. To illustrate the incentive of the SS in CR network, we evaluate the energy and data performance metrics in terms of the average harvested energy, the power outage, and the mutual outage probability (MOP) which declares a data outage event if the PR or SR is in an outage. We present some special cases and asymptotic results of the derived analytic results. Through the simulation results, we show the impact of various simulation parameters and the benefits due to the presence of ST.

  20. Social-aware data dissemination in opportunistic mobile social networks

    Science.gov (United States)

    Yang, Yibo; Zhao, Honglin; Ma, Jinlong; Han, Xiaowei

    Opportunistic Mobile Social Networks (OMSNs), formed by mobile users with social relationships and characteristics, enhance spontaneous communication among users that opportunistically encounter each other. Such networks can be exploited to improve the performance of data forwarding. Discovering optimal relay nodes is one of the important issues for efficient data propagation in OMSNs. Although traditional centrality definitions to identify the nodes features in network, they cannot identify effectively the influential nodes for data dissemination in OMSNs. Existing protocols take advantage of spatial contact frequency and social characteristics to enhance transmission performance. However, existing protocols have not fully exploited the benefits of the relations and the effects between geographical information, social features and user interests. In this paper, we first evaluate these three characteristics of users and design a routing protocol called Geo-Social-Interest (GSI) protocol to select optimal relay nodes. We compare the performance of GSI using real INFOCOM06 data sets. The experiment results demonstrate that GSI overperforms the other protocols with highest data delivery ratio and low communication overhead.

  1. Plumbing of hospital premises is a reservoir for opportunistically pathogenic microorganisms: a review.

    Science.gov (United States)

    Williams, Margaret M; Armbruster, Catherine R; Arduino, Matthew J

    2013-01-01

    Several bacterial species that are natural inhabitants of potable water distribution system biofilms are opportunistic pathogens important to sensitive patients in healthcare facilities. Waterborne healthcare-associated infections (HAI) may occur during the many uses of potable water in the healthcare environment. Prevention of infection is made more challenging by lack of data on infection rate and gaps in understanding of the ecology, virulence, and infectious dose of these opportunistic pathogens. Some healthcare facilities have been successful in reducing infections by following current water safety guidelines. This review describes several infections, and remediation steps that have been implemented to reduce waterborne HAIs.

  2. Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication

    OpenAIRE

    Schurgot, Mary R.; Comaniciu, Cristina; Jaffrès-Runser, Katia

    2011-01-01

    This article examines the evolution of routing protocols for intermittently connected ad hoc networks and discusses the trend toward social-based routing protocols. A survey of current routing solutions is presented, where routing protocols for opportunistic networks are classified based on the network graph employed. The need to capture performance tradeoffs from a multi-objective perspective is highlighted.

  3. Leveraging the checkpoint-restart technique for optimizing CPU efficiency of ATLAS production applications on opportunistic platforms

    CERN Document Server

    Cameron, David; The ATLAS collaboration

    2017-01-01

    Data processing applications of the ATLAS experiment, such as event simulation and reconstruction, spend considerable amount of time in the initialization phase. This phase includes loading a large number of shared libraries, reading detector geometry and condition data from external databases, building a transient representation of the detector geometry and initializing various algorithms and services. In some cases the initialization step can take as long as 10-15 minutes. Such slow initialization, being inherently serial, has a significant negative impact on overall CPU efficiency of the production job, especially when the job is executed on opportunistic, often short-lived, resources such as commercial clouds or volunteer computing. In order to improve this situation, we can take advantage of the fact that ATLAS runs large numbers of production jobs with similar configuration parameters (e.g. jobs within the same production task). This allows us to checkpoint one job at the end of its configuration step a...

  4. Achievable rate of spectrum sharing cognitive radio systems over fading channels at low-power regime

    KAUST Repository

    Sboui, Lokman

    2014-11-01

    We study the achievable rate of cognitive radio (CR) spectrum sharing systems at the low-power regime for general fading channels and then for Nakagami fading. We formally define the low-power regime and present the corresponding closed-form expressions of the achievable rate lower bound under various types of interference and/or power constraints, depending on the available channel state information of the cross link (CL) between the secondary-user transmitter and the primary-user receiver. We explicitly characterize two regimes where either the interference constraint or the power constraint dictates the optimal power profile. Our framework also highlights the effects of different fading parameters on the secondary link (SL) ergodic achievable rate. We also study more realistic scenarios when there is either 1-bit quantized channel feedback from the CL alone or 2-bit feedback from both the CL and the SL and propose simple power control schemes and show that these schemes achieve the previously achieved rate at the low-power regime. Interestingly, we show that the low-power regime analysis provides a specific insight into the maximum achievable rate behavior of CR that has not been reported by previous studies.

  5. Delay analysis of a point-to-multipoint spectrum sharing network with CSI based power allocation

    KAUST Repository

    Khan, Fahd Ahmed

    2012-10-01

    In this paper, we analyse the delay performance of a point-to-multipoint cognitive radio network which is sharing the spectrum with a point-to-multipoint primary network. The channel is assumed to be independent but not identically distributed and has Nakagami-m fading. A constraint on the peak transmit power of the secondary user transmitter (SU-Tx) is also considered in addition to the peak interference power constraint. Based on the constraints, a power allocation scheme which requires knowledge of the instantaneous channel state information (CSI) of the interference links is derived. The SU-Tx is assumed to be equipped with a buffer and is modelled using the M/G/1 queueing model. Closed form expressions for the probability distribution function (PDF) and cumulative distribution function (CDF) of the packet transmission time is derived. Using the PDF, the expressions for the moments of transmission time are obtained. In addition, using the moments, the expressions for the performance measures such as the total average waiting time of packets and the average number of packets waiting in the buffer of the SU-Tx are also obtained. Numerical simulations corroborate the theoretical results. © 2012 IEEE.

  6. Location Prediction-Based Data Dissemination Using Swarm Intelligence in Opportunistic Cognitive Networks

    Directory of Open Access Journals (Sweden)

    Jie Li

    2014-01-01

    Full Text Available Swarm intelligence is widely used in the application of communication networks. In this paper we adopt a biologically inspired strategy to investigate the data dissemination problem in the opportunistic cognitive networks (OCNs. We model the system as a centralized and distributed hybrid system including a location prediction server and a pervasive environment deploying the large-scale human-centric devices. To exploit such environment, data gathering and dissemination are fundamentally based on the contact opportunities. To tackle the lack of contemporaneous end-to-end connectivity in opportunistic networks, we apply ant colony optimization as a cognitive heuristic technology to formulate a self-adaptive dissemination-based routing scheme in opportunistic cognitive networks. This routing strategy has attempted to find the most appropriate nodes conveying messages to the destination node based on the location prediction information and intimacy between nodes, which uses the online unsupervised learning on geographical locations and the biologically inspired algorithm on the relationship of nodes to estimate the delivery probability. Extensive simulation is carried out on the real-world traces to evaluate the accuracy of the location prediction and the proposed scheme in terms of transmission cost, delivery ratio, average hops, and delivery latency, which achieves better routing performances compared to the typical routing schemes in OCNs.

  7. Do managers act opportunistically towards the end of their career?

    NARCIS (Netherlands)

    Kabir, Rezaul; Li, Hao; Veld-Merkoulova, Yulia

    2018-01-01

    As managers approach retirement, their career horizons become shorter and they might start to behave opportunistically by taking a more risk-averse and short-term orientation. Long-term risky investments, such as research and development, can suffer the most from this problem as their payoff comes

  8. 'Bounce' and Shergotty Share Common Ground

    Science.gov (United States)

    2004-01-01

    This illustration compares the spectrum of 'Bounce,' a rock at Meridiani Planum, to that of a martian meteorite found on Earth called Shergotty. Bounce's spectrum, and thus mineral composition, is unique to the rocks studied so far at Merdiani Planum and Gusev Crater, the landings sites of the Mars Exploration Rovers Opportunity and Spirit. However, the results here indicate that Bounce is not a one-of-a-kind rock, but shares origins with Shergotty. Shergotty landed in India in 1865. Bounce's spectra were taken on sol 67 by Opportunity's Moessbauer spectrometer.

  9. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications

    Directory of Open Access Journals (Sweden)

    Jorge Herrera-Tapia

    2016-09-01

    Full Text Available Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE simulator and using real human mobility traces.

  10. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications.

    Science.gov (United States)

    Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos

    2016-09-18

    Regular citizens equipped with smart devices are being increasingly used as "sensors" by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces.

  11. Sinabro: A Smartphone-Integrated Opportunistic Electrocardiogram Monitoring System

    OpenAIRE

    Sungjun Kwon; Dongseok Lee; Jeehoon Kim; Youngki Lee; Seungwoo Kang; Sangwon Seo; Kwangsuk Park

    2016-01-01

    In our preliminary study, we proposed a smartphone-integrated, unobtrusive electrocardiogram (ECG) monitoring system, Sinabro, which monitors a user?s ECG opportunistically during daily smartphone use without explicit user intervention. The proposed system also monitors ECG-derived features, such as heart rate (HR) and heart rate variability (HRV), to support the pervasive healthcare apps for smartphones based on the user?s high-level contexts, such as stress and affective state levels. In th...

  12. Opportunistic maintenance considering non-homogenous opportunity arrivals and stochastic opportunity durations

    International Nuclear Information System (INIS)

    Truong Ba, H.; Cholette, M.E.; Borghesani, P.; Zhou, Y.; Ma, L.

    2017-01-01

    Many systems and manufacturing processes undergo intermittent operation due to external factors (e.g. weather, low market prices), offering opportunities to conduct maintenance with reduced production losses. Making use of appropriate opportunities can thus lead to significant reduction in the total cost of maintenance and improvement in productivity. In this paper, an opportunistic maintenance (OM) model is developed considering two critical properties of real world opportunities: (i) non-homogeneous opportunity arrivals and (ii) stochastic opportunity duration. The model enables exploiting downtime cost savings from “partial” opportunities (stops shorter than the required maintenance time) thus extending the potential benefit of OM. The criteria for accepting maintenance opportunities are found by minimizing the single-cycle total cost. A closed form expression of the single-cycle total cost is derived for a given PM/OM policy and then a Genetic Algorithm is used to solve the optimization problem. Numerical results are presented to assess the benefit of opportunistic maintenance and the marginal benefit of considering partial opportunities. Results indicate that significant savings can be achieved by considering OM. Moreover, it is shown that the novel consideration of partial opportunities significantly increase the benefit of OM. - Highlights: • Opportunistic and time-based preventive maintenance jointly optimized. • Non-homogeneous opportunity arrivals and stochastic durations considered. • “Partial” opportunities considered for the first time. • Opportunity duration thresholds used as a decision criterion. • Numerical study conducted to evaluate benefit of optimized policy.

  13. Opportunistic error correction for mimo-ofdm: from theory to practice

    NARCIS (Netherlands)

    Shao, X.; Slump, Cornelis H.

    Opportunistic error correction based on fountain codes is especially designed for the MIMOOFDM system. The key point of this new method is the tradeoff between the code rate of error correcting codes and the number of sub-carriers in the channel vector to be discarded. By transmitting one

  14. Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Tong Wang

    2017-01-01

    Full Text Available In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G mobile communication networks, among which device-to-device (D2D communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.

  15. Trust Management System for Opportunistic Cloud Services

    DEFF Research Database (Denmark)

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  16. The 12th International Workshops on Opportunistic Protists (IWOP-12).

    Science.gov (United States)

    Weiss, Louis M; Cushion, Melanie T; Didier, Elizabeth; Xiao, Lihua; Marciano-Cabral, Francine; Sinai, Anthony P; Matos, Olga; Calderon, Enrique J; Kaneshiro, Edna S

    2013-01-01

    The 12th International Workshops on Opportunistic Protists (IWOP-12) was held in August 2012 in Tarrytown, New York. The objectives of the IWOP meetings are to: (1) serve as a forum for exchange of new information among active researchers concerning the basic biology, molecular genetics, immunology, biochemistry, pathogenesis, drug development, therapy, and epidemiology of these immunodeficiency-associated pathogenic eukaryotic microorganisms that are seen in patients with AIDS and (2) foster the entry of new and young investigators into these underserved research areas. The IWOP meeting focuses on opportunistic protists, e.g. the free-living amoebae, Pneumocystis, Cryptosporidium, Toxoplasma, the Microsporidia, and kinetoplastid flagellates. This conference represents the major conference that brings together research groups working on these opportunistic pathogens. Slow but steady progress is being achieved on understanding the biology of these pathogenic organisms, their involvement in disease causation in both immune-deficient and immune-competent hosts, and is providing critical insights into these emerging and reemerging pathogens. This IWOP meeting demonstrated the importance of newly developed genomic level information for many of these pathogens and how analysis of such large data sets is providing key insights into the basic biology of these organisms. A great concern is the loss of scientific expertise and diversity in the research community due to the ongoing decline in research funding. This loss of researchers is due to the small size of many of these research communities and a lack of appreciation by the larger scientific community concerning the state of art and challenges faced by researchers working on these organisms. © 2013 The Author(s) Journal of Eukaryotic Microbiology © 2013 International Society of Protistologists.

  17. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  18. Autism Spectrum Disorders and Schizophrenia Spectrum Disorders: Excitation/Inhibition Imbalance and Developmental Trajectories

    Directory of Open Access Journals (Sweden)

    Roberto Canitano

    2017-05-01

    Full Text Available Autism spectrum disorders (ASD and schizophrenia spectrum disorders (SSD share clinical and genetic components that have long been recognized. The two disorders co-occur more frequently than would be predicted by their respective prevalence, suggesting that a complex, multifactor association is involved. However, DSM-5 maintains the distinction between ASD, with core social and communication impairments, and SSD, including schizophrenia (SCZ, with hallucinations, delusions, and thought disorder as essential features. ASD and SSD have common biological underpinnings that may emerge early in development and unfold over time. One of the hypotheses supporting the similarities in the social and cognitive disturbances of ASD and SSD relates to abnormalities in the ratio of excitatory to inhibitory cortical activity (E/I imbalance. E/I imbalance in neurodevelopmental disorders could be the consequence of abnormalities in genes coding for glutamatergic and GABAergic receptors or synaptic proteins followed by system derangements. SSD and ASD have been characterized as polygenic disorders in which to the onset and progression of disease is triggered by interactions among multiple genes. Mammalian target of rapamycin signaling is under intense investigation as a convergent altered pathway in the two spectrum disorders. Current understanding of shared and divergent patterns between ASD and SSD from molecular to clinical aspects is still incomplete and may be implemented by the research domain criteria approach.

  19. Performance of systematic and non-systematic ('opportunistic') screening mammography: a comparative study from Denmark

    DEFF Research Database (Denmark)

    Bihrmann, Kristine; Jensen, Allan; Olsen, Anne Helene

    2008-01-01

    screening were calculated. RESULTS: Defining BI-RADS(trade mark) 4-5 as a positive screening outcome, the overall sensitivity of opportunistic screening was 33.6% and the specificity was 99.1%. Using BI-RADS(trade mark) 3-5 as positive, the sensitivity was 37.4% and the specificity was 97.9%. Organized...... screening (which was not categorized according to BI-RADS(trade mark)) had an overall sensitivity of 67.2% and a specificity of 98.4%. CONCLUSION: Our study showed a considerably higher sensitivity in organized screening than in opportunistic screening, while the specificity was fairly similar in the two...

  20. Priority and Negotiation Based Dynamic Spectrum Allocation Scheme for Multiple Radio Access Network Operators

    Science.gov (United States)

    Kim, Hoon; Hyon, Taein; Lee, Yeonwoo

    Most of previous works have presented the dynamic spectrum allocation (DSA) gain achieved by utilizing the time or regional variations in traffic demand between multi-network operators (NOs). In this paper, we introduce the functionalities required for the entities related with the spectrum sharing and allocation and propose a spectrum allocation algorithm while considering the long-term priority between NOs, the priority between multiple class services, and the urgent bandwidth request. To take into account the priorities among the NOs and the priorities of multiple class services, a spectrum sharing metric (SSM) is proposed, while a negotiation procedure is proposed to treat the urgent bandwidth request.

  1. 47 CFR 27.1307 - Spectrum use in the network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Spectrum use in the network. 27.1307 Section 27... network. (a) Spectrum use. The shared wireless broadband network developed by the 700 MHz Public/Private... from the primary public safety operations in the 763-768 MHz and 793-798 MHz bands. The network...

  2. Towards dynamic spectrum access and 5G, via television white spaces

    CSIR Research Space (South Africa)

    Lysko, Albert A

    2017-05-01

    Full Text Available allocations towards sharing the spectrum between different technologies in a dynamic fashion. The key focus will be on the developments in television white space and geolocation spectrum database methods and technologies, with mention of parallels to LTE....

  3. Dynamic Downlink Spectrum Access for D2D-Enabled Heterogeneous Networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh; Al-Qahtani, Fawaz S.; Celik, Abdulkadir; Alouini, Mohamed-Slim

    2018-01-01

    This paper proposes new approaches for underlay device- to-device (D2D) communication in spectrum-shared het- erogeneous cellular networks. It considers devices that share downlink resources and have an enabled D2D feature to improve coverage

  4. Delay performance of a broadcast spectrum sharing network in Nakagami-m fading

    KAUST Repository

    Khan, Fahd Ahmed

    2014-03-01

    In this paper, we analyze the delay performance of a point-to-multipoint secondary network (P2M-SN), which is concurrently sharing the spectrum with a point-to-multipoint primary network (P2M-PN). The channel is assumed to be independent but not identically distributed (i.n.i.d.) and has Nakagami-m fading. A constraint on the peak transmit power of the secondary-user transmitter (SU-Tx) is considered, in addition to the peak interference power constraint. The SU-Tx is assumed to be equipped with a buffer and is modeled using the M/G/1 queueing model. The performance of this system is analyzed for two scenarios: 1) P2M-SN does not experience interference from the primary network (denoted by P2M-SN-NI), and 2) P2M-SN does experience interference from the primary network (denoted by P2M-SN-WI). The performance of both P2M-SN-NI and P2M-SN-WI is analyzed in terms of the packet transmission time, and the closed-form cumulative density function (cdf) of the packet transmission time is derived for both scenarios. Furthermore, by utilizing the concept of timeout, an exact closed-form expression for the outage probability of the P2M-SN-NI is obtained. In addition, an accurate approximation for the outage probability of the P2M-SN-WI is also derived. Furthermore, for the P2M-SN-NI, the analytic expressions for the total average waiting time (TAW-time) of packets and the average number of packets waiting in the buffer of the SU-Tx are also derived. Numerical simulations are also performed to validate the derived analytical results. © 1967-2012 IEEE.

  5. Friend-to-friend short message service with opportunistic Wi-Fi beacons

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This study introduces Oppline, an ad hoc opportunistic short message service that can be collaboratively used by everyone who has a smart mobile device. The data exchange method of Oppline is built on top of the universal Wi-Fi standard, thus expedites platform-independent integration of related

  6. Shared protection based virtual network mapping in space division multiplexing optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie

    2018-05-01

    Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.

  7. Performance of an opportunistic multi-user cognitive network with multiple primary users

    KAUST Repository

    Khan, Fahd Ahmed; Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2014-01-01

    for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the momentgenerating function

  8. Prevalence of opportunistic intestinal parasitic infection among HIV infected patients who are taking antiretroviral treatment at Jimma Health Center, Jimma, Ethiopia.

    Science.gov (United States)

    Zeynudin, A; Hemalatha, K; Kannan, S

    2013-02-01

    One of the major health problems among HIV sero-positive patients are superimposed infections due to the deficient immunity. Furthermore, intestinal parasitic (IP) infections, which are also one of the basic health problems in tropical regions, are common in these patients. Infection by opportunistic pathogens, including various forms of intestinal parasites has been the hall mark of HIV since the beginning of the epidemic. To study the prevalence of opportunistic intestinal parasitic infection among HIV patients who are taking antiretroviral treatment (ART) in Jimma, Ethiopia. Patient samples were diagnosed by examination of single stool specimen which was examined as fresh wet mounts, formal-ether concentration technique and modified Ziehl-Neelsen staining technique. Data was obtained from 91 study subjects selected by convenience sampling method. The overall prevalence of intestinal parasitic infections was found to be 39.56%. Eight types of intestinal parasites was identified, the most dominant being, Ascaris lumbricoides, 21.67%, Entamoeba histolytica, 15% and Cryptosporidium parvum 13.33%. The prevalence of opportunistic parasite was 15.38%, the prevalence of non-opportunistic parasite was 20.87% and the prevalence of both opportunistic and non opportunistic was 3.29%. The study indicated that intestinal parasites were still a problem in the study area. Data also showed that among the predisposing factors, habit of hand washing before meal, usage of latrine and duration after treatment was statistically associated with intestinal parasitic infections.

  9. An Overlapping Communities Detection Algorithm via Maxing Modularity in Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Gao Zhi-Peng

    2016-01-01

    Full Text Available Community detection in opportunistic networks has been a significant and hot issue, which is used to understand characteristics of networks through analyzing structure of it. Community is used to represent a group of nodes in a network where nodes inside the community have more internal connections than external connections. However, most of the existing community detection algorithms focus on binary networks or disjoint community detection. In this paper, we propose a novel algorithm via maxing modularity of communities (MMCto find overlapping community structure in opportunistic networks. It utilizes contact history of nodes to calculate the relation intensity between nodes. It finds nodes with high relation intensity as the initial community and extend the community with nodes of higher belong degree. The algorithm achieves a rapid and efficient overlapping community detection method by maxing the modularity of community continuously. The experiments prove that MMC is effective for uncovering overlapping communities and it achieves better performance than COPRA and Conductance.

  10. Node Load Balance Multi-flow Opportunistic Routing in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2014-04-01

    Full Text Available Opportunistic routing (OR has been proposed to improve the performance of wireless networks by exploiting the multi-user diversity and broadcast nature of the wireless medium. It involves multiple candidate forwarders to relay packets every hop. The existing OR doesn’t take account of the traffic load and load balance, therefore some nodes may be overloaded while the others may not, leading to network performance decline. In this paper, we focus on opportunities routing selection with node load balance which is described as a convex optimization problem. To solve the problem, by combining primal-dual and sub-gradient methods, a fully distributed Node load balance Multi-flow Opportunistic Routing algorithm (NMOR is proposed. With node load balance constraint, NMOR allocates the flow rate iteratively and the rate allocation decides the candidate forwarder selection of opportunities routing. The simulation results show that NMOR algorithm improves 100 %, 62 % of the aggregative throughput than ETX and EAX, respectively.

  11. Microbiological characterization of aquatic microbiomes targeting taxonomical marker genes and antibiotic resistance genes of opportunistic bacteria.

    Science.gov (United States)

    Alexander, Johannes; Bollmann, Anna; Seitz, Wolfram; Schwartz, Thomas

    2015-04-15

    The dissemination of medically relevant antibiotic resistance genes (ARGs) (blaVIM-1, vanA, ampC, ermB, and mecA) and opportunistic bacteria (Enterococcus faecium/faecalis, Pseudomonas aeruginosa, Enterobacteriaceae, Staphylococcus aureus, and CNS) was determined in different anthropogenically influenced aquatic habitats in a selected region of Germany. Over a period of two years, four differently sized wastewater treatment plants (WWTPs) with and without clinical influence, three surface waters, four rain overflow basins, and three groundwater sites were analyzed by quantitative Polymerase Chain Reaction (qPCR). Results were calculated in cell equivalents per 100 ng of total DNA extracted from water samples and per 100 mL sample volume, which seems to underestimate the abundance of antibiotic resistance and opportunistic bacteria. High abundances of opportunistic bacteria and ARG were quantified in clinical wastewaters and influents of the adjacent WWTP. The removal capacities of WWTP were up to 99% for some, but not all investigated bacteria. The abundances of most ARG targets were found to be increased in the bacterial population after conventional wastewater treatment. As a consequence, downstream surface water and also some groundwater compartments displayed high abundances of all four ARGs. It became obvious that the dynamics of the ARG differed from the fate of the opportunistic bacteria. This underlines the necessity of an advanced microbial characterization of anthropogenically influenced environments. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. Position statement on opportunistic genomic screening from the Association of Genetic Nurses and Counsellors (UK and Ireland)

    OpenAIRE

    Middleton, Anna; Patch, Chris; Wiggins, Jennifer; Barnes, Kathy; Crawford, Gill; Benjamin, Caroline; Bruce, Anita

    2014-01-01

    The American College of Medical Genetics and Genomics released recommendations for reporting incidental findings (IFs) in clinical exome and genome sequencing. These suggest ‘opportunistic genomic screening' should be available to both adults and children each time a sequence is done and would be undertaken without seeking preferences from the patient first. Should opportunistic genomic screening be implemented in the United Kingdom, the Association of Genetic Nurses and Counsellors (AGNC), w...

  13. An Ad-Hoc Opportunistic Dissemination Protocol for Smartphone-based Participatory Traffic Monitoring

    NARCIS (Netherlands)

    Türkes, Okan; Seraj, Fatjon; Scholten, Johan; Meratnia, Nirvana; Havinga, Paul J.M.

    2015-01-01

    This study introduces an ad-hoc opportunistic data dissemination protocol, called VADISS, that facilitates participatory traffic monitoring applications with smartphones. As a ubiquitous alternative to existing vehicular networking methods, VADISS uses the default WiFi interfaces universally adopted

  14. Opportunistic esophagitis in AIDS: Radiographic diagnosis

    International Nuclear Information System (INIS)

    Levine, M.S.; Woldenberg, R.; Herlinger, H.; Laufer, I.

    1987-01-01

    Between 1983 and 1986, 35 of 90 patients with acquired immunodeficiency syndrome (AIDS) had double-contrast esophagograms to rule out opportunistic esophagitis. The radiographs were reviewed without knowledge of the clinical or endoscopic findings. Candida esophagitis was diagnosed radiographically in 17 patients who had varying degrees of plaque formation and viral esophagitis in three who had discrete ulcers without plaques. All three patients with viral esophagitis (herpes in 2 and cytomegalo virus in one) and 15 of 17 with Candida esophagitis had endoscopic and/or clinical corroboration of the radiographic diagnosis. Thus, the authors' experience suggests that fungal and viral esophagitis can often be differentiated on double-contrast esophagography, so that appropriate antifungal or antiviral therapy can be instituted without need for endoscopic intervention

  15. On the secondary users opportunistic scheduling with reduced feedback

    KAUST Repository

    Song, Yao

    2012-03-01

    In underlay cognitive radio systems, secondary users (SUs) can share the spectrum with primary users (PUs) as long as the interference caused by SUs to PUs is below a certain threshold. When multiple SUs want to access the channel, multiuser diversity scheme can be applied to maximize the utilization rate of the channel. In this paper, the performance of selective multi user diversity scheme in underlay cognitive radio system is analyzed. We first start with the case in which all SUs have the same average signal-to-noise ratio (SNR). We then treat the more realistic case involving SUs with different average SNRs. Both power control and no power control scenarios are considered for the SUs. Furthermore, we take scheduling fairness into considerations and study a normalized SNR selection scheme in the case that SUs have different average SNRs. © 2012 IEEE.

  16. Spectrum access and management for cognitive radio networks

    CERN Document Server

    2017-01-01

    This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

  17. The Long-Term Effectiveness and Cost Effectiveness of Organized versus Opportunistic Screening for Breast Cancer in Austria.

    Science.gov (United States)

    Schiller-Fruehwirth, Irmgard; Jahn, Beate; Einzinger, Patrick; Zauner, Günther; Urach, Christoph; Siebert, Uwe

    2017-09-01

    In 2014, Austrian health authorities implemented an organized breast cancer screening program. Until then, there has been a long-standing tradition of opportunistic screening. To evaluate the cost-effectiveness of organized screening compared with opportunistic screening, as well as to identify factors influencing the clinical and economic outcomes. We developed and validated an individual-level state-transition model and assessed the health outcomes and costs of organized and opportunistic screening for 40-year-old asymptomatic women. The base-case analysis compared a scenario involving organized biennial screening with a scenario reflecting opportunistic screening practice for an average-risk woman aged 45 to 69 years. We applied an annual discount rate of 3% and estimated the incremental cost-effectiveness ratio in terms of the cost (2012 euros) per life-year gained (LYG) from a health care perspective. Deterministic and probabilistic sensitivity analyses were performed to assess uncertainty. Compared with opportunistic screening, an organized program yielded on average additional 0.0118 undiscounted life-years (i.e., 4.3 days) and cost savings of €41 per woman. In the base-case analysis, the incremental cost-effectiveness ratio of organized screening was approximately €20,000 per LYG compared with no screening. Assuming a willingness-to-pay threshold of €50,000 per LYG, there was a 70% probability that organized screening would be considered cost-effective. The attendance rate, but not the test accuracy of mammography, was an influential factor for the cost-effectiveness. The decision to adopt organized screening is likely an efficient use of limited health care resources in Austria. Copyright © 2017 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  18. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    Science.gov (United States)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  19. Genomics of adaptation during experimental evolution of the opportunistic pathogen Pseudomonas aeruginosa.

    Directory of Open Access Journals (Sweden)

    Alex Wong

    2012-09-01

    Full Text Available Adaptation is likely to be an important determinant of the success of many pathogens, for example when colonizing a new host species, when challenged by antibiotic treatment, or in governing the establishment and progress of long-term chronic infection. Yet, the genomic basis of adaptation is poorly understood in general, and for pathogens in particular. We investigated the genetics of adaptation to cystic fibrosis-like culture conditions in the presence and absence of fluoroquinolone antibiotics using the opportunistic pathogen Pseudomonas aeruginosa. Whole-genome sequencing of experimentally evolved isolates revealed parallel evolution at a handful of known antibiotic resistance genes. While the level of antibiotic resistance was largely determined by these known resistance genes, the costs of resistance were instead attributable to a number of mutations that were specific to individual experimental isolates. Notably, stereotypical quinolone resistance mutations in DNA gyrase often co-occurred with other mutations that, together, conferred high levels of resistance but no consistent cost of resistance. This result may explain why these mutations are so prevalent in clinical quinolone-resistant isolates. In addition, genes involved in cyclic-di-GMP signalling were repeatedly mutated in populations evolved in viscous culture media, suggesting a shared mechanism of adaptation to this CF-like growth environment. Experimental evolutionary approaches to understanding pathogen adaptation should provide an important complement to studies of the evolution of clinical isolates.

  20. Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals

    Directory of Open Access Journals (Sweden)

    Chao Zhang

    2016-06-01

    Full Text Available Game theoretic approaches have recently been used to model the deterrence effect of patrol officers’ assignments on opportunistic crimes in urban areas. One major challenge in this domain is modeling the behavior of opportunistic criminals. Compared to strategic attackers (such as terrorists who execute a well-laid out plan, opportunistic criminals are less strategic in planning attacks and more flexible in executing well-laid plans based on their knowledge of patrol officers’ assignments. In this paper, we aim to design an optimal police patrolling strategy against opportunistic criminals in urban areas. Our approach is comprised by two major parts: learning a model of the opportunistic criminal (and how he or she responds to patrols and then planning optimal patrols against this learned model. The planning part, by using information about how criminals responds to patrols, takes into account the strategic game interaction between the police and criminals. In more detail, first, we propose two categories of models for modeling opportunistic crimes. The first category of models learns the relationship between defender strategy and crime distribution as a Markov chain. The second category of models represents the interaction of criminals and patrol officers as a Dynamic Bayesian Network (DBN with the number of criminals as the unobserved hidden states. To this end, we: (i apply standard algorithms, such as Expectation Maximization (EM, to learn the parameters of the DBN; (ii modify the DBN representation that allows for a compact representation of the model, resulting in better learning accuracy and the increased speed of learning of the EM algorithm when used for the modified DBN. These modifications exploit the structure of the problem and use independence assumptions to factorize the large joint probability distributions. Next, we propose an iterative learning and planning mechanism that periodically updates the adversary model. We

  1. Shared heritability of attention-deficit/hyperactivity disorder and autism spectrum disorder

    NARCIS (Netherlands)

    Rommelse, N.N.J.; Franke, B.; Geurts, H.M.; Hartman, C.A.; Buitelaar, J.K.

    2010-01-01

    Attention-deficit/hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are both highly heritable neurodevelopmental disorders. Evidence indicates both disorders co-occur with a high frequency, in 20-50% of children with ADHD meeting criteria for ASD and in 30-80% of ASD children meeting

  2. Shared heritability of attention-deficit/hyperactivity disorder and autism spectrum disorder.

    NARCIS (Netherlands)

    Rommelse, N.N.J.; Franke, B.; Geurts, H.M.; Hartman, C.A.; Buitelaar, J.K.

    2010-01-01

    Attention-deficit/hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are both highly heritable neurodevelopmental disorders. Evidence indicates both disorders co-occur with a high frequency, in 20-50% of children with ADHD meeting criteria for ASD and in 30-80% of ASD children meeting

  3. Shared heritability of attention-deficit/hyperactivity disorder and autism spectrum disorder

    NARCIS (Netherlands)

    Rommelse, Nanda N. J.; Franke, Barbara; Geurts, Hilde M.; Hartman, Catharina A.; Buitelaar, Jan K.

    Attention-deficit/hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are both highly heritable neurodevelopmental disorders. Evidence indicates both disorders co-occur with a high frequency, in 20-50% of children with ADHD meeting criteria for ASD and in 30-80% of ASD children meeting

  4. Opportunistic Adaptive Transmission for Network Coding Using Nonbinary LDPC Codes

    Directory of Open Access Journals (Sweden)

    Cocco Giuseppe

    2010-01-01

    Full Text Available Network coding allows to exploit spatial diversity naturally present in mobile wireless networks and can be seen as an example of cooperative communication at the link layer and above. Such promising technique needs to rely on a suitable physical layer in order to achieve its best performance. In this paper, we present an opportunistic packet scheduling method based on physical layer considerations. We extend channel adaptation proposed for the broadcast phase of asymmetric two-way bidirectional relaying to a generic number of sinks and apply it to a network context. The method consists of adapting the information rate for each receiving node according to its channel status and independently of the other nodes. In this way, a higher network throughput can be achieved at the expense of a slightly higher complexity at the transmitter. This configuration allows to perform rate adaptation while fully preserving the benefits of channel and network coding. We carry out an information theoretical analysis of such approach and of that typically used in network coding. Numerical results based on nonbinary LDPC codes confirm the effectiveness of our approach with respect to previously proposed opportunistic scheduling techniques.

  5. [Experimental interaction of halophilic prokaryotes and opportunistic bacteria in brine].

    Science.gov (United States)

    Selivanova, E A; Nemtseva, N V

    2013-01-01

    Study the effect of extremely halophilic archaea and moderately halophilic bacteria on preservation of opportunistic bacteria in brine. 17 strains of moderately halophilic bacteria and 2 strains of extremely halophilic archaea were isolated from continental hypersaline lake Razval of Sol-Iletsk area of Orenburg Region. Identification of pure cultures of prokaryotes was carried out taking into account their phenotype properties and based on determination of 16S RNA gene sequence. The effect of halophilic prokaryote on elimination of Escherichia coli from brine was evaluated during co-cultivation. Antagonistic activity of cell extracts of the studied microorganisms was evaluated by photometric method. A more prolonged preservation of an E. coli strain in brine in the presence of live cells of extremely halophilic archaea Halorubrum tebenquichense and moderately halophilic bacteria Marinococcus halophilus was established. Extracts of cells of extremely halophilic archaea and moderately halophilic bacteria on the contrary displayed antagonistic activity. The protective effect of live cells of halophilic prokaryotes and antagonistic activity of their cell extracts change the period of conservation of opportunistic bacteria in brine that regulates inter-microbial interactions and changes the period of self-purification that reflects the sanitary condition of a hypersaline water body.

  6. Executive summary: Prevention and treatment of opportunistic infections and other coinfections in HIV-infected patients: May 2015.

    Science.gov (United States)

    Iribarren, José Antonio; Rubio, Rafael; Aguirrebengoa, Koldo; Arribas, Jose Ramón; Baraia-Etxaburu, Josu; Gutiérrez, Félix; Lopez Bernaldo de Quirós, Juan Carlos; Losa, Juan Emilio; Miró, José Ma; Moreno, Santiago; Pérez Molina, José; Podzamczer, Daniel; Pulido, Federico; Riera, Melchor; Rivero, Antonio; Sanz Moreno, José; Amador, Concha; Antela, Antonio; Arazo, Piedad; Arrizabalaga, Julio; Bachiller, Pablo; Barros, Carlos; Berenguer, Juan; Caylá, Joan; Domingo, Pere; Estrada, Vicente; Knobel, Hernando; Locutura, Jaime; López Aldeguer, José; Llibre, Josep Ma; Lozano, Fernando; Mallolas, Josep; Malmierca, Eduardo; Miralles, Celia; Miralles, Pilar; Muñoz, Agustín; Ocampo, Agustín; Olalla, Julián; Pérez, Inés; Pérez Elías, Ma Jesús; Pérez Arellano, José Luis; Portilla, Joaquín; Ribera, Esteban; Rodríguez, Francisco; Santín, Miguel; Sanz Sanz, Jesús; Téllez, Ma Jesús; Torralba, Miguel; Valencia, Eulalia; Von Wichmann, Miguel Angel

    2016-10-01

    Opportunistic infections continue to be a cause of morbidity and mortality in HIV-infected patients. They often arise because of severe immunosuppression resulting from poor adherence to antiretroviral therapy, failure of antiretroviral therapy, or unawareness of HIV infection by patients whose first clinical manifestation of AIDS is an opportunistic infection. The present article is an executive summary of the document that updates the previous recommendations on the prevention and treatment of opportunistic infections in HIV-infected patients, namely, infections by parasites, fungi, viruses, mycobacteria, and bacteria, as well as imported infections. The article also addresses immune reconstitution inflammatory syndrome. This document is intended for all professionals who work in clinical practice in the field of HIV infection. Copyright © 2016 Elsevier España, S.L.U. and Sociedad Española de Enfermedades Infecciosas y Microbiología Clínica. All rights reserved.

  7. Opportunistic breast cancer early detection in Tyrol, Austria 1996-2004

    International Nuclear Information System (INIS)

    Frede, Thomas E.

    2005-01-01

    Purpose: Evaluate the need for a mammography-screening program for Tyrol, as recently proposed in an OeBIG feasibility study commissioned by the Austrian Ministry for Health and Women, in view of the already existing organized opportunistic screening. Materials and methods: This author has examined the state of breast cancer early detection and diagnosis in Tyrol. A comprehensive review of all available data and results based on 3340 primary biopsy recommendations between 1996 and 2004 at our breast centre was performed. Results: Early detection has been improved by organizing the existing opportunistic screening through a true team approach, incorporating not only the clinic's specialties, but also the private radiologists and referring physicians. In 2004, our centre made the definitive diagnosis in 230 (67.6%) of the about 340 primary breast cancer cases occurring yearly in Tyrol with 62.2% being discovered by routine examination and 74.3% stemming from second opinion examinations. About 92.4% of our primary biopsies are performed minimally invasive with an overall 42.9% (1375 of 3205 cases) malignancy rate. Pathological TNM-staging was obtained in over 95% of women under 70 years of age. On average 55.3% (62.0% in 2004) of all discovered cancers were TNM-stage 1 or better lesions (76.2% in our routine patients). With an overall participation of about 75% of our target group (women over 34 years), it is women under the age of 50 years, who most consistently follow our recommendations, resulting in an above average rate of 58.5% TNM-stage 1 and better lesions for all discovered breast cancers (routine and symptomatic) in this group. Conclusions: Opportunistic screening with a true team approach, combined with minimally invasive diagnosis and a strive for excellence have resulted in improved diagnosis, ever expanding patient and referring physician acceptance and an increase of positive prognostic factors, which eclipses the results of any published international

  8. Statistical Delay QoS Provisioning for Energy-Efficient Spectrum-Sharing Based Wireless Ad Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yichen Wang

    2016-01-01

    Full Text Available In this paper, we develop the statistical delay quality-of-service (QoS provisioning framework for the energy-efficient spectrum-sharing based wireless ad hoc sensor network (WAHSN, which is characterized by the delay-bound violation probability. Based on the established delay QoS provisioning framework, we formulate the nonconvex optimization problem which aims at maximizing the average energy efficiency of the sensor node in the WAHSN while meeting PU’s statistical delay QoS requirement as well as satisfying sensor node’s average transmission rate, average transmitting power, and peak transmitting power constraints. By employing the theories of fractional programming, convex hull, and probabilistic transmission, we convert the original fractional-structured nonconvex problem to the additively structured parametric convex problem and obtain the optimal power allocation strategy under the given parameter via Lagrangian method. Finally, we derive the optimal average energy efficiency and corresponding optimal power allocation scheme by employing the Dinkelbach method. Simulation results show that our derived optimal power allocation strategy can be dynamically adjusted based on PU’s delay QoS requirement as well as the channel conditions. The impact of PU’s delay QoS requirement on sensor node’s energy efficiency is also illustrated.

  9. Achievable rate of cognitive radio spectrum sharing MIMO channel with space alignment and interference temperature precoding

    KAUST Repository

    Sboui, Lokman

    2013-06-01

    In this paper, we investigate the spectral efficiency gain of an uplink Cognitive Radio (CR) Multi-Input MultiOutput (MIMO) system in which the Secondary/unlicensed User (SU) is allowed to share the spectrum with the Primary/licensed User (PU) using a specific precoding scheme to communicate with a common receiver. The proposed scheme exploits at the same time the free eigenmodes of the primary channel after a space alignment procedure and the interference threshold tolerated by the PU. In our work, we study the maximum achievable rate of the CR node after deriving an optimal power allocation with respect to an outage interference and an average power constraints. We, then, study a protection protocol that considers a fixed interference threshold. Applied to Rayleigh fading channels, we show, through numerical results, that our proposed scheme enhances considerably the cognitive achievable rate. For instance, in case of a perfect detection of the PU signal, after applying Successive Interference Cancellation (SIC), the CR rate remains non-zero for high Signal to Noise Ratio (SNR) which is usually impossible when we only use space alignment technique. In addition, we show that the rate gain is proportional to the allowed interference threshold by providing a fixed rate even in the high SNR range. © 2013 IEEE.

  10. Opportunistic Screening for Exposure to Bullying in the Pediatric Emergency Department.

    Science.gov (United States)

    Seltzer, Marlene; Menoch, Margaret; Chen, Charity

    2017-01-01

    To assess opportunistic screening for exposure to bullying in the pediatric emergency department (ED), an anonymous survey inquiring about exposure to physical, verbal, social, and cyber bullying behaviors was given to ED patients 5 to 18 years old. The survey asked about being the recipient, perpetrator, and/or witness of bullying; the frequency of exposure; liking school; missing school; and presenting complaint. Either the child or parent could complete the survey. A total of 909 surveys were analyzed. Exposure was 78.7%. A greater proportion of females reported being victims and witnesses. Youth who reported being both victims and witnesses represented the largest group, with witness-only the second largest. Parents reported less cyber-bullying and witness status to all types of bullying. For children who did not like school, there was a significant difference in exposure versus nonexposure. There was no association with presenting complaint. Opportunistic screening for bullying exposure in pediatric ED patients warrants consideration as it may increase detection of preclinical status and clinical sequelae.

  11. Opportunistic Energy-Aware Amplify-and-Forward Cooperative Systems with Imperfect CSI

    KAUST Repository

    Amin, Osama

    2015-07-29

    Recently, much attention has been paid to the green design of wireless communication systems using energy efficiency (EE) metrics that should capture all energy consumption sources to deliver the required data. In this paper, we design an energyefficient relay assisted communication system based on estimated channel state information (CSI). It employs amplify-andforward relaying and switches between different communication schemes, which are known as direct-transmission, two-hop and cooperative-transmission schemes, using the estimated CSI in order to maximize the EE. Two estimation strategies are assumed, namely disintegrated channel estimation and cascaded channel estimation. To formulate an accurate EE metric for the proposed opportunistic amplify-and-forward system, the channel estimation cost is reflected on the EE metric by including its impact in the signal-to-noise ratio term and in the energy consumption during the channels estimation phase. Based on the formulated EE metric, we propose an adaptive power allocation algorithm to maximize the EE of the proposed opportunistic amplify-andforward system with channel estimation. Furthermore, we study the impact of the estimation parameters on the proposed system via simulation examples.

  12. Opportunistic relaying in multipath and slow fading channel: Relay selection and optimal relay selection period

    KAUST Repository

    Sungjoon Park,

    2011-11-01

    In this paper we present opportunistic relay communication strategies of decode and forward relaying. The channel that we are considering includes pathloss, shadowing, and fast fading effects. We find a simple outage probability formula for opportunistic relaying in the channel, and validate the results by comparing it with the exact outage probability. Also, we suggest a new relay selection algorithm that incorporates shadowing. We consider a protocol of broadcasting the channel gain of the previously selected relay. This saves resources in slow fading channel by reducing collisions in relay selection. We further investigate the optimal relay selection period to maximize the throughput while avoiding selection overhead. © 2011 IEEE.

  13. Phylogenetic Analysis and Antimicrobial Profiles of Cultured Emerging Opportunistic Pathogens (Phyla Actinobacteria and Proteobacteria) Identified in Hot Springs.

    Science.gov (United States)

    Jardine, Jocelyn Leonie; Abia, Akebe Luther King; Mavumengwana, Vuyo; Ubomba-Jaswa, Eunice

    2017-09-15

    Hot spring water may harbour emerging waterborne opportunistic pathogens that can cause infections in humans. We have investigated the diversity and antimicrobial resistance of culturable emerging and opportunistic bacterial pathogens, in water and sediment of hot springs located in Limpopo, South Africa. Aerobic bacteria were cultured and identified using 16S ribosomal DNA (rDNA) gene sequencing. The presence of Legionella spp. was investigated using real-time polymerase chain reaction. Isolates were tested for resistance to ten antibiotics representing six different classes: β-lactam (carbenicillin), aminoglycosides (gentamycin, kanamycin, streptomycin), tetracycline, amphenicols (chloramphenicol, ceftriaxone), sulphonamides (co-trimoxazole) and quinolones (nalidixic acid, norfloxacin). Gram-positive Kocuria sp. and Arthrobacter sp. and gram-negative Cupriavidus sp., Ralstonia sp., Cronobacter sp., Tepidimonas sp., Hafnia sp. and Sphingomonas sp. were isolated, all recognised as emerging food-borne pathogens. Legionella spp. was not detected throughout the study. Isolates of Kocuria , Arthrobacter and Hafnia and an unknown species of the class Gammaproteobacteria were resistant to two antibiotics in different combinations of carbenicillin, ceftriaxone, nalidixic acid and chloramphenicol. Cronobacter sp. was sensitive to all ten antibiotics. This study suggests that hot springs are potential reservoirs for emerging opportunistic pathogens, including multiple antibiotic resistant strains, and highlights the presence of unknown populations of emerging and potential waterborne opportunistic pathogens in the environment.

  14. Interactions between the tropical sea anemone Aiptasia pallida and Serratia marcescens, an opportunistic pathogen of corals.

    Science.gov (United States)

    Krediet, Cory J; Meyer, Julie L; Gimbrone, Nicholas; Yanong, Roy; Berzins, Ilze; Alagely, Ali; Castro, Herman; Ritchie, Kim B; Paul, Valerie J; Teplitski, Max

    2014-06-01

    Coral reefs are under increasing stress caused by global and local environmental changes, which are thought to increase the susceptibility of corals to opportunistic pathogens. In the absence of an easily culturable model animal, the understanding of the mechanisms of disease progression in corals remains fairly limited. In the present study, we tested the susceptibility of the tropical sea anemone Aiptasia pallida to an opportunistic coral pathogen (Serratia marcescens). A. pallida was susceptible to S. marcescens PDL100 and responded to this opportunistic coral pathogen with darkening of the tissues and retraction of tentacles, followed by complete disintegration of polyp tissues. Histological observations revealed loss of zooxanthellae and structural changes in eosinophilic granular cells in response to pathogen infection. A screen of S. marcescens mutants identified a motility and tetrathionate reductase mutants as defective in virulence in the A. pallida infection model. In co-infections with the wild-type strain, the tetrathionate reductase mutant was less fit within the surface mucopolysaccharide layer of the host coral Acropora palmata. © 2014 Society for Applied Microbiology and John Wiley & Sons Ltd.

  15. Asymmetric competition prevents the outbreak of an opportunistic species after coral reef degradation.

    Science.gov (United States)

    González-Rivero, Manuel; Bozec, Yves-Marie; Chollett, Iliana; Ferrari, Renata; Schönberg, Christine H L; Mumby, Peter J

    2016-05-01

    Disturbance releases space and allows the growth of opportunistic species, excluded by the old stands, with a potential to alter community dynamics. In coral reefs, abundances of fast-growing, and disturbance-tolerant sponges are expected to increase and dominate as space becomes available following acute coral mortality events. Yet, an increase in abundance of these opportunistic species has been reported in only a few studies, suggesting certain mechanisms may be acting to regulate sponge populations. To gain insights into mechanisms of population control, we simulated the dynamics of the common reef-excavating sponge Cliona tenuis in the Caribbean using an individual-based model. An orthogonal hypothesis testing approach was used, where four candidate mechanisms-algal competition, stock-recruitment limitation, whole and partial mortality-were incorporated sequentially into the model and the results were tested against independent field observations taken over a decade in Belize, Central America. We found that releasing space after coral mortality can promote C. tenuis outbreaks, but such outbreaks can be curtailed by macroalgal competition. The asymmetrical competitive superiority of macroalgae, given by their capacity to pre-empt space and outcompete with the sponge in a size-dependant fashion, supports their capacity to steal the opportunity from other opportunists. While multiple system stages can be expected in coral reefs following intense perturbation macroalgae may prevent the growth of other space-occupiers, such as bioeroding sponges, under low grazing pressure.

  16. EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Halikul Lenando

    2018-01-01

    Full Text Available In opportunistic networks, the nature of intermittent and disruptive connections degrades the efficiency of routing. Epidemic routing protocol is used as a benchmark for most of routing protocols in opportunistic mobile social networks (OMSNs due to its high message delivery and latency. However, Epidemic incurs high cost in terms of overhead and hop count. In this paper, we propose a hybrid routing protocol called EpSoc which utilizes the Epidemic routing forwarding strategy and exploits an important social feature, that is, degree centrality. Two techniques are used in EpSoc. Messages’ TTL is adjusted based on the degree centrality of nodes, and the message blocking mechanism is used to control replication. Simulation results show that EpSoc increases the delivery ratio and decreases the overhead ratio, the average latency, and the hop counts as compared to Epidemic and Bubble Rap.

  17. Buffer Management and Hybrid Probability Choice Routing for Packet Delivery in Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Daru Pan

    2012-01-01

    Full Text Available Due to the features of long connection delays, frequent network partitions, and topology unsteadiness, the design of opportunistic networks faces the challenge of how to effectively deliver data based only on occasional encountering of nodes, where the conventional routing schemes do not work properly. This paper proposes a hybrid probability choice routing protocol with buffer management for opportunistic networks. A delivery probability function is set up based on continuous encounter duration time, which is used for selecting a better node to relay packets. By combining the buffer management utility and the delivery probability, a total utility is used to decide whether the packet should be kept in the buffer or be directly transmitted to the encountering node. Simulation results show that the proposed routing outperforms the existing one in terms of the delivery rate and the average delay.

  18. The Opportunistic House for Tehran: A Design Prototype

    Directory of Open Access Journals (Sweden)

    Sara Khorshidifard

    2015-12-01

    Full Text Available This article is an advocacy research for Tehran, promoting an implication of architectural design as a tool for citizen empowerment and positive environmental change. In the article, I am offering a fresh look at Tehran’s housing problems by speculating an “opportunistic house” typology as a residential style that would serve much more than just shelter. I am making a case for a new house prototype that applies socially-equitable solutions in design. My study finds applications and significance beyond plain housing design and, mainly, onto the design of ad hoc urban public realm spaces. This is in accord with my overarching mission of supporting new way of thinking about, and ultimately offering, welcoming, safe, and energized places for Tehran’s citizens. These will additionally have important implications for inhospitable public spaces worldwide. This research is grounded in my prior, multidisciplinary doctoral studies. The article itself is an initial step in my ongoing research design, of helping to build and revitalize a wide range of urban communities by nurturing their relationship to their built and natural environments. The article is a discussion around the following questions. How can housing design inventions empower citizens? In what manner can design offer progressive living place options whose services go beyond shelter needs? Particularly, in what ways can domestic spaces be designed to also embody other-than-living capacities, for example, for new kinds of public spaces? And eventually, what could a prototype of the opportunistic house look like in the context of a city like Tehran? The article is structured to first present a brief survey of how Tehran house forms and functions have developed historically, with more emphasis on their current state. It will then offer examples of opportunistic uses of domestic spaces in Tehran. This notion is communicated through narrative analysis and photographic vignettes from a few

  19. Performance analysis of an opportunistic multi-user cognitive network with multiple primary users

    KAUST Repository

    Khan, Fahd Ahmed; Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2014-01-01

    constraint is imposed on the secondary network in addition to the limited peak transmit power of each SU. The uplink scenario is considered where a single SU is selected for transmission. This opportunistic selection depends on the transmission channel power

  20. REMOTE DETENTION OF INVASIVE AND OPPORTUNISTIC PLANT SPECIES IN GREAT LAKES COASTAL WETLANDS

    Science.gov (United States)

    Invasive and opportunistic plant species have been associated with wetland disturbance. Increases in the abundance of plant species such as common reed (Phragmites australis) in coastal Great Lakes wetlands are hypothesized to occur with shifts toward drier hydrologic regimes, fr...

  1. Outbreak of extended-spectrum β-lactamase-producing Escherichia coli transmitted through breast milk sharing in a neonatal intensive care unit.

    Science.gov (United States)

    Nakamura, K; Kaneko, M; Abe, Y; Yamamoto, N; Mori, H; Yoshida, A; Ohashi, K; Miura, S; Yang, T T; Momoi, N; Kanemitsu, K

    2016-01-01

    Routine surveillance in a neonatal intensive care unit (NICU) showed an increased detection of extended-spectrum β-lactamase (ESBL)-producing Escherichia coli (ESBL-E. coli) in August 2012, following nearly a year without detection. To describe the investigation and interventions by a hospital infection control team of an outbreak of ESBL-E. coli in a NICU. Six neonates with positive cultures of ESBL-E. coli (five with respiratory colonization, one with a urinary tract infection), control infants who were negative for ESBL-E. coli during the study period, and mothers who donated their breast milk were included. A case-control study was performed to identify possible risk factors for positive ESBL-E. coli cultures and molecular typing of isolated strains by pulsed-field gel electrophoresis. The odds ratio for ESBL-E. coli infection after receiving shared unpasteurized breast milk during the study period was 49.17 (95% confidence interval: 6.02-354.68; P milk of a particular donor. After ceasing the breast milk sharing, the outbreak was successfully terminated. This outbreak indicates that contamination of milk packs can result in transmission of a drug-resistant pathogen to newborn infants. Providers of human breast milk need to be aware of the necessity for low-temperature pasteurization and bacterial cultures, which should be conducted before and after freezing, before prescribing to infants. Copyright © 2015 The Healthcare Infection Society. Published by Elsevier Ltd. All rights reserved.

  2. The Opportunistic Pathogen Serratia marcescens Utilizes Type VI Secretion To Target Bacterial Competitors ▿†

    Science.gov (United States)

    Murdoch, Sarah L.; Trunk, Katharina; English, Grant; Fritsch, Maximilian J.; Pourkarimi, Ehsan; Coulthurst, Sarah J.

    2011-01-01

    The type VI secretion system (T6SS) is the most recently described and least understood of the protein secretion systems of Gram-negative bacteria. It is widely distributed and has been implicated in the virulence of various pathogens, but its mechanism and exact mode of action remain to be defined. Additionally there have been several very recent reports that some T6SSs can target bacteria rather than eukaryotic cells. Serratia marcescens is an opportunistic enteric pathogen, a class of bacteria responsible for a significant proportion of hospital-acquired infections. We describe the identification of a functional T6SS in S. marcescens strain Db10, the first report of type VI secretion by an opportunist enteric bacterium. The T6SS of S. marcescens Db10 is active, with secretion of Hcp to the culture medium readily detected, and is expressed constitutively under normal growth conditions from a large transcriptional unit. Expression of the T6SS genes did not appear to be dependent on the integrity of the T6SS. The S. marcescens Db10 T6SS is not required for virulence in three nonmammalian virulence models. It does, however, exhibit dramatic antibacterial killing activity against several other bacterial species and is required for S. marcescens to persist in a mixed culture with another opportunist pathogen, Enterobacter cloacae. Importantly, this antibacterial killing activity is highly strain specific, with the S. marcescens Db10 T6SS being highly effective against another strain of S. marcescens with a very similar and active T6SS. We conclude that type VI secretion plays a crucial role in the competitiveness, and thus indirectly the virulence, of S. marcescens and other opportunistic bacterial pathogens. PMID:21890705

  3. Opportunistic Infections and Complications in Human Immunodeficiency Virus-1-Infected Children: Correlation with immune status

    Directory of Open Access Journals (Sweden)

    Jaivinder Yadav

    2014-10-01

    Full Text Available Objectives: The aim of this study was to ascertain the correlation between various opportunistic infections and complications in human immunodeficiency virus (HIV-1-infected children and the immune status of these patients, evaluated by absolute cluster of differentiation 4 (CD4 count and CD4 percentage. Methods: This study was conducted from January 2009 to June 2010 at the Antiretroviral Treatment Centre of the Pt. B.D. Sharma Post Graduate Institute of Medical Sciences, a tertiary care hospital in Rohtak, Haryana, in northern India. A total of 20 HIV-1-infected children aged 4–57 months were studied. Demographic and baseline investigations were performed prior to the start of highly active antiretroviral therapy (HAART. A fixed-dose combination of HAART was given based on the patient’s weight. Baseline investigations were repeated after six months of HAART. Results: There was a significant increase in the patients’ haemoglobin, weight, height and CD4 count after six months of HAART. Significant improvements (P <0.05 were also noted in the patients’ immune status, graded according to the World Health Organization. Conclusion: This study observed that the severity and frequency of opportunistic complications in paediatric patients with HIV-1 increased with a fall in the CD4 count. The treatment of opportunistic infections, along with antiretroviral therapy, may lead to both clinical and immunological recovery as well as a decreased incidence of future opportunistic infections. The CD4 count may give treating physicians an initial idea about the immune status of each child and could also be used as a biological marker of HAART efficacy. Patient compliance must be ensured during HAART as this is a key factor in improving outcomes.

  4. Opportunistic Beacon Networks

    NARCIS (Netherlands)

    Türkes, Okan

    2016-01-01

    Modern society is surrounded by an ample spectrum of personal mobile devices with short-range wireless communication support. This ubiquity creates an immense potential of new concepts for people-centric ad hoc networks that can be applied to every personal and social dimension of life. The last

  5. A fully distributed method for dynamic spectrum sharing in femtocells

    DEFF Research Database (Denmark)

    Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio; Kovacs, Istvan

    2012-01-01

    such characteristics are combined the traditional network planning and optimization of cellular networks fails to be cost effective. Therefore, a greater deal of automation is needed in femtocells. In particular, this paper proposes a novel method for autonomous selection of spectrum/ channels in femtocells....... This method effectively mitigates cotier interference with no signaling at all across different femtocells. Still, the method has a remarkable simple implementation. The efficiency of the proposed method was evaluated by system level simulations. The results show large throughput gains for the cells...

  6. Medium usage model for the design of dynamic spectrum management in ISM bands

    NARCIS (Netherlands)

    Witvliet, B.A.; Bentum, M.J.; Schiphorst, R.; Slump, C.H.

    2012-01-01

    This paper presents a new approach for dynamic spectrum management for heterogeneous wireless devices. Local congestion degrades the reliability of wireless applications in the License Exempt bands. This leads to the research questions: (1) how to realize equal spectrum sharing between dissimilar

  7. [Antimicrobial Activity of Substances Produced by Trichoderma citrinoviride Strain VKPM F-1228: Optimization of Cultivation and Assessment of Spectrum of Individual Peptaibols].

    Science.gov (United States)

    Sadykova, V S; Kurakov, A V; Korshun, V A; Rogozhin, E A; Gromovykh, T I; Kuvarina, A E; Baranova, A A

    2015-01-01

    The Trichoderma citrinoviride VKPM F-1228 strain produces a complex of peptide-based antibiotics with antibacterial and antimycotic action. Synthesis of peptaibols is closely related to the conidiogenesis in the culture. The optimal procedure of the strain cultivation for production of peptaibols is stationary growing for 14 days at a temperature of 28 degrees C and pH 7.5 followed by formation of a dense mycelium film on the modified Saburo medium containing 30 gr/l of glucose and 12.5 gr/l of peptone. Eight individual peptaibols were extracted. The spectrum of their activity was estimated with the use of opportunistic bacteria and micromycetes as well as pathogenic clinical aspergilli. Compounds 9, 13, 14, 15 and 16 were shown active against opportunistic fungi and bacteria including methicillin resistant S. aureus, whereas compounds 9, 13 and 14 in addition showed antimycotic activity against clinical aspergilli.

  8. Nocardia – Opportunistic chest infection in elderly: A case report

    OpenAIRE

    Sanyal, Kaushik; Sabanathan, Kanagasabesan

    2008-01-01

    In this rare case a non-immunocompromised patient with old Tuberculosis on low dose of steroids presents with opportunistic infection of a weakly aerobic gram positive acid fast, filamentous bacteria called Nocardia. An 80 year old non-smoking white female presented with cough, shortness of breath and purulent sputum. Initial antibiotics given were not helpful. Later microbial diagnosis was Nocardia in sputum sample which was uncommon in a non-immunocompromised. She responded to co-trimoxazol...

  9. Relationship between lactobacilli and opportunistic bacterial pathogens associated with vaginitis

    OpenAIRE

    Razzak, Mohammad Sabri A.; Al-Charrakh, Alaa H.; AL-Greitty, Bara Hamid

    2011-01-01

    Background: Vaginitis, is an infectious inflammation of the vaginal mucosa, which sometimes involves the vulva. The balance of the vaginal flora is maintained by the Lactobacilli and its protective and probiotic role in treating and preventing vaginal infection by producing antagonizing compounds which are regarded as safe for humans. Aim: The aim of this study was to evaluate the protective role of Lactobacilli against common bacterial opportunistic pathogens in vaginitis and study the effec...

  10. Opportunistic mammography screening provides effective detection rates in a limited resource healthcare system.

    Science.gov (United States)

    Teh, Yew-Ching; Tan, Gie-Hooi; Taib, Nur Aishah; Rahmat, Kartini; Westerhout, Caroline Judy; Fadzli, Farhana; See, Mee-Hoong; Jamaris, Suniza; Yip, Cheng-Har

    2015-05-15

    Breast cancer is the leading cause of cancer deaths in women world-wide. In low and middle income countries, where there are no population-based mammographic screening programmes, late presentation is common, and because of inadequate access to optimal treatment, survival rates are poor. Mammographic screening is well-studied in high-income countries in western populations, and because it has been shown to reduce breast cancer mortality, it has become part of the healthcare systems in such countries. However the performance of mammographic screening in a developing country is largely unknown. This study aims to evaluate the performance of mammographic screening in Malaysia, a middle income country, and to compare the stage and surgical treatment of screen-detected and symptomatic breast cancer. A retrospective review of 2510 mammograms performed from Jan to Dec 2010 in a tertiary medical centre is carried out. The three groups identified are the routine (opportunistic) screening group, the targeted (high risk) screening group and the diagnostic group. The performance indicators of each group is calculated, and stage at presentation and treatment between the screening and diagnostic group is analyzed. The cancer detection rate in the opportunistic screening group, targeted screening group, and the symptomatic group is 0.5 %, 1.25 % and 26 % respectively. The proportion of ductal carcinoma in situ is 23.1 % in the two screening groups compared to only 2.5 % in the diagnostic group. Among the opportunistic screening group, the cancer detection rate was 0.2 % in women below 50 years old compared to 0.65 % in women 50 years and above. The performance indicators are within international standards. Early-staged breast cancer (Stage 0-2) were 84.6 % in the screening groups compared to 61.1 % in the diagnostic group. From the results, in a setting with resource constraints, targeted screening of high risk individuals will give a higher yield, and if more resources are

  11. Radio resource allocation and dynamic spectrum access

    CERN Document Server

    Benmammar , Badr

    2013-01-01

    We are currently witnessing an increase in telecommunications norms and standards given the recent advances in this field. The increasing number of normalized standards paves the way for an increase in the range of services available for each consumer. Moreover, the majority of available radio frequencies have already been allocated. This explains the emergence of cognitive radio (CR) - the sharing of the spectrum between a primary user and a secondary user.In this book, we will present the state of the art of the different techniques for spectrum access using cooperation and competit

  12. Towards New Antifolates Targeting Eukaryotic Opportunistic Infections

    Energy Technology Data Exchange (ETDEWEB)

    Liu, J.; Bolstad, D; Bolstad, E; Wright, D; Anderson, A

    2009-01-01

    Trimethoprim, an antifolate commonly prescribed in combination with sulfamethoxazole, potently inhibits several prokaryotic species of dihydrofolate reductase (DHFR). However, several eukaryotic pathogenic organisms are resistant to trimethoprim, preventing its effective use as a therapeutic for those infections. We have been building a program to reengineer trimethoprim to more potently and selectively inhibit eukaryotic species of DHFR as a viable strategy for new drug discovery targeting several opportunistic pathogens. We have developed a series of compounds that exhibit potent and selective inhibition of DHFR from the parasitic protozoa Cryptosporidium and Toxoplasma as well as the fungus Candida glabrata. A comparison of the structures of DHFR from the fungal species Candida glabrata and Pneumocystis suggests that the compounds may also potently inhibit Pneumocystis DHFR.

  13. Alleviate Cellular Congestion Through Opportunistic Trough Filling

    Directory of Open Access Journals (Sweden)

    Yichuan Wang

    2014-04-01

    Full Text Available The demand for cellular data service has been skyrocketing since the debut of data-intensive smart phones and touchpads. However, not all data are created equal. Many popular applications on mobile devices, such as email synchronization and social network updates, are delay tolerant. In addition, cellular load varies significantly in both large and small time scales. To alleviate network congestion and improve network performance, we present a set of opportunistic trough filling schemes that leverage the time-variation of network congestion and delay-tolerance of certain traffic in this paper. We consider average delay, deadline, and clearance time as the performance metrics. Simulation results show promising performance improvement over the standard schemes. The work shed lights on addressing the pressing issue of cellular overload.

  14. Occurrence of Opportunistic Pathogens Legionella pneumophila and non-tuberculous mycobacteria in hospital plumbing systems

    Science.gov (United States)

    Occurrence of Opportunistic Pathogens Legionella pneumophila and non-tuberculous mycobacteria in hospital plumbing systems Jill Hoelle, Michael Coughlin, Elizabeth Sotkiewicz, Jingrang Lu, Stacy Pfaller, Mark Rodgers, and Hodon Ryu U.S. Environmental Protection Agency, Cincinnati...

  15. [Acceptability and feasibility among primary care doctors of the opportunistic search for HIV in Health Care centers in Spain].

    Science.gov (United States)

    Puentes Torres, Rafael Carlos; Aguado Taberné, Cristina; Pérula de Torres, Luis Ángel; Espejo Espejo, José; Castro Fernández, Cristina; Fransi Galiana, Luis

    2017-12-01

    To evaluate the acceptability and feasibility of the opportunistic search of HIV according to primary care doctors' experience. To set up the profile of the physician involved in this study. Observational, transversal study. Primary Care Centers of the National Health System. General practitioners and residents who participated in VIH-AP study to measure the acceptability of HIV opportunistic search by patients. Self-filling survey to collect data on age, sex, teaching skills, amount of years dedicated to research, time working with the same quota of patients, acceptability and feasibility of opportunistic HIV search. A total of 197 physicians with a mean age of 45.2±9.7 (SD) years. 18.8% were under 36years old, 70.1% were women and 62.4% had teaching skills. 55.8% worked in towns with a population over 100,000 inhabitants and the mean of years working with the same quota of patients was 6.4±6.6. 91.9% (95%CI: 88.1-98.7) of them considered the opportunistic search of HIV acceptable and 89.3% (95%CI: 85.0-93.6), feasible to perform. The multivariate analysis showed positive relation between the acceptability/feasibility and teaching skills (OR: 2.74; 95%CI: 1.16-6.49). The acceptance of the screening by patients was 93.1% and this was positively related to how long the doctor had worked with the same quota, teaching skills and the amount of years dedicated to research. HIV opportunistic search is an acceptable and feasible method for primary care professionals. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  16. Barriers and facilitators to opportunistic chronic kidney disease screening by general practice nurses.

    Science.gov (United States)

    Sinclair, Peter M; Day, Jenny; Levett-Jones, Tracy; Kable, Ashley

    2017-10-01

    Opportunistic screening in general practice (GP) is a cost-effective and viable approach to the early identification of chronic kidney disease (CKD). This study sought to identify the barriers and facilitators to CKD screening practices of GP nurses working in a regional area of New South Wales, Australia. An eight-item elicitation questionnaire informed by the Theory of Planned Behaviour was administered to a convenience sample of 26 GP nurses. Participants identified that the advantages of CKD screening were its early detection and treatment, the reduction of disease burden, and the opportunity to increase awareness and provide disease prevention education. These positive attitudinal beliefs were offset by negative beliefs about the impost of opportunistic screening on nursing time, particularly when there were other competing clinical priorities. Participants reported that practice doctors were wary of the financial costs associated with additional non-claimable services and believed that unfunded services, regardless of patient benefit, were difficult to justify in a private business environment. Screening was enabled in GP settings with existing screening protocols or initiatives, and when patients presented with known risk factors. Barriers to screening were more frequently described and illustrated a strong focus on financial aspects of GP. Without reimbursement through the Medicare Benefits Scheme, screening was not considered an economical use of nursing time. Other competing and billable clinical services took precedence. The findings of this study can be used to inform the development and evaluation of interventions that target opportunistic CKD screening in the GP setting. © 2016 Asian Pacific Society of Nephrology.

  17. When push comes to shove: Compensating and opportunistic strategies in a collective-risk household energy dilemma

    Directory of Open Access Journals (Sweden)

    Anya eSkatova

    2016-03-01

    Full Text Available To solve problems like climate change, every little push counts. Community energy schemes are a popular policy targeted to reduce a country’s carbon emissions but the effect they have on energy use depends on whether people can work together as a community. We often find ourselves caught in a dilemma: if others are not doing their bit, why should I? In our experiment participants (N = 118 were matched in groups of 10 to play in a collective-risk game framed as a community energy purchase scheme. They made only one decision about energy use for their virtual household a day, whilst a full round of the game lasted one week in real time. All decisions were entered via personal phone or a home computer. If in the end of the week the group exceeded a pre-paid threshold of energy use, all group members would share a fine. Each day participants received feedback about decisions of their group partners, and in some groups the feedback was manipulated as high (unfair condition or low (fair condition use. High average group use created individual risk for participants to be penalized in the end of the week, even if they did not use much themselves. We found that under the risk of having to pay a fine, participants stayed significantly below the fair-share threshold regardless of unfair behaviour of others. On the contrary, they significantly decreased their consumption towards the end of the game. Seeing that others are doing their bit – using a fair-share – encouraged people to take advantage of the situation: those who played against fair confederates did not follow the normative behaviour but conversely, increased their consumption over the course of the game. These opportunistic strategies were demonstrated by impulsive participants who were also low in punishment sensitivity. We discuss the findings in the light of policy research as well as literature on cooperation and prosocial behaviour.

  18. When Push Comes to Shove: Compensating and Opportunistic Strategies in a Collective-Risk Household Energy Dilemma

    Energy Technology Data Exchange (ETDEWEB)

    Skatova, Anya, E-mail: anya.skatova@gmail.com [Horizon Digital Economy Research, University of Nottingham, Nottingham (United Kingdom); Warwick Business School, University of Warwick, Coventry (United Kingdom); Bedwell, Benjamin [Horizon Digital Economy Research, University of Nottingham, Nottingham (United Kingdom); Kuper-Smith, Benjamin [Horizon Digital Economy Research, University of Nottingham, Nottingham (United Kingdom); Institute of Neurology, University College London, London (United Kingdom)

    2016-03-14

    To solve problems such as climate change, every little push counts. Community energy schemes are a popular policy targeted to reduce a country’s carbon emissions but the effect they have on energy use depends on whether people can work together as a community. We often find ourselves caught in a dilemma: if others are not doing their bit, why should I? In our experiment, participants (N = 118) were matched in groups of 10 to play in a collective-risk game framed as a community energy purchase scheme. They made only one decision about energy use for their virtual household a day, while a full round of the game lasted 1 week in real time. All decisions were entered via personal phone or a home computer. If in the end of the week the group exceeded a pre-paid threshold of energy use all group members would share a fine. Each day participants received feedback about decisions of their group partners, and in some groups the feedback was manipulated as high (unfair condition) or low (fair condition) use. High average group use created individual risk for participants to be penalized in the end of the week, even if they did not use much themselves. We found that under the risk of having to pay a fine, participants stayed significantly below the fair-share threshold regardless of unfair behavior of others. On the contrary, they significantly decreased their consumption toward the end of the game. Seeing that others are doing their bit – using a fair-share – encouraged people to take advantage of the situation: those who played against fair confederates did not follow the normative behavior but conversely, increased their consumption over the course of the game. These opportunistic strategies were demonstrated by impulsive participants who were also low in punishment sensitivity. We discuss the findings in the light of policy research as well as literature on cooperation and prosocial behavior.

  19. When Push Comes to Shove: Compensating and Opportunistic Strategies in a Collective-Risk Household Energy Dilemma

    International Nuclear Information System (INIS)

    Skatova, Anya; Bedwell, Benjamin; Kuper-Smith, Benjamin

    2016-01-01

    To solve problems such as climate change, every little push counts. Community energy schemes are a popular policy targeted to reduce a country’s carbon emissions but the effect they have on energy use depends on whether people can work together as a community. We often find ourselves caught in a dilemma: if others are not doing their bit, why should I? In our experiment, participants (N = 118) were matched in groups of 10 to play in a collective-risk game framed as a community energy purchase scheme. They made only one decision about energy use for their virtual household a day, while a full round of the game lasted 1 week in real time. All decisions were entered via personal phone or a home computer. If in the end of the week the group exceeded a pre-paid threshold of energy use all group members would share a fine. Each day participants received feedback about decisions of their group partners, and in some groups the feedback was manipulated as high (unfair condition) or low (fair condition) use. High average group use created individual risk for participants to be penalized in the end of the week, even if they did not use much themselves. We found that under the risk of having to pay a fine, participants stayed significantly below the fair-share threshold regardless of unfair behavior of others. On the contrary, they significantly decreased their consumption toward the end of the game. Seeing that others are doing their bit – using a fair-share – encouraged people to take advantage of the situation: those who played against fair confederates did not follow the normative behavior but conversely, increased their consumption over the course of the game. These opportunistic strategies were demonstrated by impulsive participants who were also low in punishment sensitivity. We discuss the findings in the light of policy research as well as literature on cooperation and prosocial behavior.

  20. Evaluation of two novel barcodes for species recognition of opportunistic pathogens in Fusarium.

    NARCIS (Netherlands)

    de Hoog, S.; van Diepeningen, A.D.

    2015-01-01

    The genus Fusarium includes more than 200 species of which 73 have been isolated from human infections. Fusarium species are opportunistic human pathogens with variable aetiology. Species determination is best made with the combined phylogeny of protein-coding genes such as elongation factor (TEF1),

  1. Higher-Order Cyclostationarity Detection for Spectrum Sensing

    Directory of Open Access Journals (Sweden)

    Julien Renard

    2010-01-01

    Full Text Available Recent years have shown a growing interest in the concept of Cognitive Radios (CRs, able to access portions of the electromagnetic spectrum in an opportunistic operating way. Such systems require efficient detectors able to work in low Signal-to-Noise Ratio (SNR environments, with little or no information about the signals they are trying to detect. Energy detectors are widely used to perform such blind detection tasks, but quickly reach the so-called SNR wall below which detection becomes impossible Tandra (2005. Cyclostationarity detectors are an interesting alternative to energy detectors, as they exploit hidden periodicities present in man-made signals, but absent in noise. Such detectors use quadratic transformations of the signals to extract the hidden sine-waves. While most of the literature focuses on the second-order transformations of the signals, we investigate the potential of higher-order transformations of the signals. Using the theory of Higher-Order Cyclostationarity (HOCS, we derive a fourth-order detector that performs similarly to the second-order ones to detect linearly modulated signals, at SNR around 0 dB, which may be used if the signals of interest do not exhibit second-order cyclostationarity. More generally this paper reviews the relevant aspects of the cyclostationary and HOCS theory, and shows their potential for spectrum sensing.

  2. Regrowth of potential opportunistic pathogens and algae in reclaimed-water distribution systems.

    Science.gov (United States)

    Jjemba, Patrick K; Weinrich, Lauren A; Cheng, Wei; Giraldo, Eugenio; Lechevallier, Mark W

    2010-07-01

    A study of the quality of reclaimed water in treated effluent, after storage, and at three points in the distribution system of four plants in California, Florida, Massachusetts, and New York was conducted for 1 year. The plants had different treatment processes (conventional versus membrane bioreactor), production capacities, and methods for storage of the water, and the intended end uses of the water were different. The analysis focused on the occurrence of indicator bacteria (heterotrophic bacteria, coliforms, Escherichia coli, and enterococci) and opportunistic pathogens (Aeromonas spp., enteropathogenic E. coli O157:H7, Legionella spp., Mycobacterium spp., and Pseudomonas spp.), as well as algae. Using immunological methods, E. coli O157:H7 was detected in the effluent of only one system, but it was not detected at the sampling points, suggesting that its survival in the system was poor. Although all of the treatment systems effectively reduced the levels of bacteria in the effluent, bacteria regrew in the reservoir and distribution systems because of the loss of residual disinfectant and high assimilable organic carbon levels. In the systems with open reservoirs, algal growth reduced the water quality by increasing the turbidity and accumulating at the end of the distribution system. Opportunistic pathogens, notably Aeromonas, Legionella, Mycobacterium, and Pseudomonas, occurred more frequently than indicator bacteria (enterococci, coliforms, and E. coli). The Mycobacterium spp. were very diverse and occurred most frequently in membrane bioreactor systems, and Mycobacterium cookii was identified more often than the other species. The public health risk associated with these opportunistic pathogens in reclaimed water is unknown. Collectively, our results show the need to develop best management practices for reclaimed water to control bacterial regrowth and degradation of water before it is utilized at the point of use.

  3. Heavy Metal Distribution in Opportunistic Beach Nourishment: A Case Study in Greece

    Directory of Open Access Journals (Sweden)

    Spyros Foteinis

    2013-01-01

    Full Text Available The existence and distribution of persistent pollutants, such as heavy metals, in coastal sediment used for opportunistic beach nourishment, is a problem that has not received much attention. Here, we assessed the coastal sediments in one restoration project for the occurrence and distribution of heavy metals, by utilizing an Energy Dispersive X-Ray Fluorescence (EDXRF system. Heavy metal point sources included (i the effluents of small industries (tanneries, (ii wastewater treatment plant effluents, and (iii paint and oil scraps from substandard ship maintenance activities that take place on ports breakwaters. A few neighboring beaches were found to have similar heavy metal concentrations, with mean values of Cu, Zn, and Pb ranging from 80 to 130, 15 to 25, and 25 to 40 mg/kg, respectively. Existing legislation regarding dredging activities in Greece appears insufficient for sustainable and environmentally friendly nourishment. We conclude that before opportunistic beach restoration projects materialize with material borrowed from ports and harbors the quality of the dredged material needs to be assessed.

  4. Autism Spectrum Symptoms in a Tourette's Disorder Sample

    NARCIS (Netherlands)

    Darrow, Sabrina M.; Grados, Marco; Sandor, Paul; Hirschtritt, Matthew E.; Illmann, Cornelia; Osiecki, Lisa; Dion, Yves; King, Robert; Pauls, David; Budman, Cathy L.; Cath, Danielle C.; Greenberg, Erica; Lyon, Gholson J.; McMahon, William M.; Lee, Paul C.; Delucchi, Kevin L.; Scharf, Jeremiah M.; Mathews, Carol A.

    Objective: Tourette's disorder (TD) and autism spectrum disorder (ASD) share clinical features and possibly an overlapping etiology. The aims of this study were to examine ASD symptom rates in participants with TD, and to characterize the relationships between ASD symptom patterns and TD,

  5. Autism Spectrum Symptoms in a Tourette's Disorder Sample

    NARCIS (Netherlands)

    Darrow, Sabrina M; Grados, Marco A; Sandor, Paul; Hirschtritt, Matthew E; Illmann, Cornelia; Osiecki, Lisa; Dion, Yves; King, Robert A; Pauls, David L; Budman, Cathy L; Cath, Danielle C.; Greenberg, Erica; Lyon, Gholson J; McMahon, William M; Lee, Paul C; Delucchi, Kevin L; Scharf, Jeremiah M; Mathews, Carol A

    2017-01-01

    Objective Tourette's disorder (TD) and autism spectrum disorder (ASD) share clinical features and possibly an overlapping etiology. The aims of this study were to examine ASD symptom rates in participants with TD, and to characterize the relationships between ASD symptom patterns and TD,

  6. An Opportunistic Routing Mechanism Combined with Long-Term and Short-Term Metrics for WMN

    Directory of Open Access Journals (Sweden)

    Weifeng Sun

    2014-01-01

    Full Text Available WMN (wireless mesh network is a useful wireless multihop network with tremendous research value. The routing strategy decides the performance of network and the quality of transmission. A good routing algorithm will use the whole bandwidth of network and assure the quality of service of traffic. Since the routing metric ETX (expected transmission count does not assure good quality of wireless links, to improve the routing performance, an opportunistic routing mechanism combined with long-term and short-term metrics for WMN based on OLSR (optimized link state routing and ETX is proposed in this paper. This mechanism always chooses the highest throughput links to improve the performance of routing over WMN and then reduces the energy consumption of mesh routers. The simulations and analyses show that the opportunistic routing mechanism is better than the mechanism with the metric of ETX.

  7. An opportunistic routing mechanism combined with long-term and short-term metrics for WMN.

    Science.gov (United States)

    Sun, Weifeng; Wang, Haotian; Piao, Xianglan; Qiu, Tie

    2014-01-01

    WMN (wireless mesh network) is a useful wireless multihop network with tremendous research value. The routing strategy decides the performance of network and the quality of transmission. A good routing algorithm will use the whole bandwidth of network and assure the quality of service of traffic. Since the routing metric ETX (expected transmission count) does not assure good quality of wireless links, to improve the routing performance, an opportunistic routing mechanism combined with long-term and short-term metrics for WMN based on OLSR (optimized link state routing) and ETX is proposed in this paper. This mechanism always chooses the highest throughput links to improve the performance of routing over WMN and then reduces the energy consumption of mesh routers. The simulations and analyses show that the opportunistic routing mechanism is better than the mechanism with the metric of ETX.

  8. A Novel Cooperative Opportunistic Routing Scheme for Underwater Sensor Networks.

    Science.gov (United States)

    Ghoreyshi, Seyed Mohammad; Shahrabi, Alireza; Boutaleb, Tuleen

    2016-02-26

    Increasing attention has recently been devoted to underwater sensor networks (UWSNs) because of their capabilities in the ocean monitoring and resource discovery. UWSNs are faced with different challenges, the most notable of which is perhaps how to efficiently deliver packets taking into account all of the constraints of the available acoustic communication channel. The opportunistic routing provides a reliable solution with the aid of intermediate nodes' collaboration to relay a packet toward the destination. In this paper, we propose a new routing protocol, called opportunistic void avoidance routing (OVAR), to address the void problem and also the energy-reliability trade-off in the forwarding set selection. OVAR takes advantage of distributed beaconing, constructs the adjacency graph at each hop and selects a forwarding set that holds the best trade-off between reliability and energy efficiency. The unique features of OVAR in selecting the candidate nodes in the vicinity of each other leads to the resolution of the hidden node problem. OVAR is also able to select the forwarding set in any direction from the sender, which increases its flexibility to bypass any kind of void area with the minimum deviation from the optimal path. The results of our extensive simulation study show that OVAR outperforms other protocols in terms of the packet delivery ratio, energy consumption, end-to-end delay, hop count and traversed distance.

  9. Contributing opportunistic resources to the grid with HTCondor-CE-Bosco

    Science.gov (United States)

    Weitzel, Derek; Bockelman, Brian

    2017-10-01

    The HTCondor-CE [1] is the primary Compute Element (CE) software for the Open Science Grid. While it offers many advantages for large sites, for smaller, WLCG Tier-3 sites or opportunistic clusters, it can be a difficult task to install, configure, and maintain the HTCondor-CE. Installing a CE typically involves understanding several pieces of software, installing hundreds of packages on a dedicated node, updating several configuration files, and implementing grid authentication mechanisms. On the other hand, accessing remote clusters from personal computers has been dramatically improved with Bosco: site admins only need to setup SSH public key authentication and appropriate accounts on a login host. In this paper, we take a new approach with the HTCondor-CE-Bosco, a CE which combines the flexibility and reliability of the HTCondor-CE with the easy-to-install Bosco. The administrators of the opportunistic resource are not required to install any software: only SSH access and a user account are required from the host site. The OSG can then run the grid-specific portions from a central location. This provides a new, more centralized, model for running grid services, which complements the traditional distributed model. We will show the architecture of a HTCondor-CE-Bosco enabled site, as well as feedback from multiple sites that have deployed it.

  10. The 14th International Workshops on Opportunistic Protists (IWOP 14).

    Science.gov (United States)

    Cushion, Melanie T; Limper, Andrew H; Porollo, Aleksey; Saper, Vivian E; Sinai, Anthony P; Weiss, Louis M

    2018-05-03

    The 14th International Workshops on Opportunistic Protists (IWOP-14) was held August 10-12, 2017 in Cincinnati, OH, USA. The IWOP meetings focus on opportunistic protists (OIs); for example, free-living amoebae, Pneumocystis spp., Cryptosporidium spp., Toxoplasma, the Microsporidia, and kinetoplastid flagellates. The highlights of Pneumocystis spp. research included the reports of primary homothallism for mating; a potential requirement for sexual replication in its life cycle; a new antigen on the surface of small asci; roles for CLRs, Dectin-1, and Mincle in host responses; and identification of MSG families and mechanisms used for surface variation. Studies of Cryptosporidia spp. included comparative genomics, a new cryopreservation method; the role of mucin in attachment and invasion, and epidemiological surveys illustrating species diversity in animals. One of the five identified proteins in the polar tube of Microsporidia, PTP4, was shown to play a role in host infection. Zebrafish were used as a low cost vertebrate animal model for an evaluation of potential anti-toxoplasma drugs. Folk medicine compounds with anti-toxoplasma activity were presented, and reports on the chronic toxoplasma infection provided evidence for increased tractability for the study of this difficult life cycle stage. Escape from the parasitophorus vacuole and cell cycle regulation were the topics of the study in the acute phase. © 2018 International Society of Protistologists.

  11. Achieving Efficient Spectrum Usage in Passive and Active Sensing

    Science.gov (United States)

    Wang, Huaiyi

    Increasing demand for supporting more wireless services with higher performance and reliability within the frequency bands that are most conducive to operating cost-effective cellular and mobile broadband is aggravating current electromagnetic spectrum congestion. This situation motivates technology and management innovation to increase the efficiency of spectral use. If primary-secondary spectrum sharing can be shown possible without compromising (or while even improving) performance in an existing application, opportunities for efficiency may be realizable by making the freed spectrum available for commercial use. While both active and passive sensing systems are vitally important for many public good applications, opportunities for increasing the efficiency of spectrum use can be shown to exist for both systems. This dissertation explores methods and technologies for remote sensing systems that enhance spectral efficiency and enable dynamic spectrum access both within and outside traditionally allocated bands.

  12. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks

    Science.gov (United States)

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent’s limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent’s cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent’s view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  13. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks.

    Directory of Open Access Journals (Sweden)

    Ming Liu

    Full Text Available Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent's limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent's cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent's view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved.

  14. Electron-Nuclear Energy Sharing in Above-Threshold Multiphoton Dissociative Ionization of H2

    DEFF Research Database (Denmark)

    Wu, J.; Kunitski, M.; Pitzer, M.

    2013-01-01

    We report experimental observation of the energy sharing between electron and nuclei in above-threshold multiphoton dissociative ionization of H2 by strong laser fields. The absorbed photon energy is shared between the ejected electron and nuclei in a correlated fashion, resulting in multiple...... diagonal lines in their joint energy spectrum governed by the energy conservation of all fragment particles....

  15. Coherence and other autistic spectrum traits and eating disorders: building from mechanism to treatment. The Birgit Olsson lecture.

    Science.gov (United States)

    Treasure, Janet

    2013-02-01

    To revisit Gillberg's hypothesis proposed in 1992, which was that anorexia nervosa should be considered within the spectrum of autistic disorders. A search was made of the literature relating to the behavioural traits, and cognitive, emotional and neuroanatomical intermediate phenotypes that are shared between autistic spectrum disorders (ASD) and anorexia nervosa. People with eating disorders in the acute phase (less so after recovery) share some behavioural traits (social impairment and restricted and repetitive behaviours) and intermediate phenotypes (weak central coherence, and impaired set shifting and theory of mind) with people in the autistic spectrum. Behavioural and intermediate neuropsychological traits are shared between eating disorders and ASD. In part, these are familial but also they are accentuated by the illness state and may be secondary to starvation. These traits have implications for prognosis and treatment.

  16. Decision Analysis of Dynamic Spectrum Access Rules

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  17. Opportunistic relaying in multipath and slow fading channel: Relay selection and optimal relay selection period

    KAUST Repository

    Sungjoon Park,; Stark, Wayne E.

    2011-01-01

    In this paper we present opportunistic relay communication strategies of decode and forward relaying. The channel that we are considering includes pathloss, shadowing, and fast fading effects. We find a simple outage probability formula

  18. Isolation of Cryptococcus neoformans and other opportunistic fungi from pigeon droppings.

    Science.gov (United States)

    Soltani, Maryam; Bayat, Mansour; Hashemi, Seyed J; Zia, Mohammadali; Pestechian, Nader

    2013-01-01

    Invasive fungal infections cause considerable morbidity and mortality in immunocompromised hosts. Pigeon droppings could especially be a potential carrier in the spread of pathogenic yeasts and mold fungi into the environment. The objective of this study was to isolation of Cryptococcus neoformans and other opportunistic fungi from pigeon droppings. One hundred twenty samples of pigeon droppings were suspended 1:10 in saline solution and then cultured. Identification of C. neoformans was performed on bird seed agar, presence of a capsule on India ink preparation, urease production on urea agar medium and RapID yeast plus system. The identification of candida species was based on micro-morphological analysis on corn meal-Tween 80 agar, RapID yeast plus system and growth in CHROMagar candida. The identification of other fungi was based on macromorphologic, microscopic, biochemical and physiological characteristics. The highest frequency of yeasts and mold fungi were observed in Candida albicans 6.6% and Penicillium spp. 25%. The frequency rate of C. neoformans isolation was 2.5%. Several types of fungi are present in pigeon droppings that can spread in environment and transmit to children and elderly as well as immunocompromised patients who are at increased risk of contracting opportunistic diseases.

  19. Isolation of Cryptococcus neoformans and other opportunistic fungi from pigeon droppings

    Directory of Open Access Journals (Sweden)

    Maryam Soltani

    2013-01-01

    Full Text Available Background: Invasive fungal infections cause considerable morbidity and mortality in immunocompromised hosts. Pigeon droppings could especially be a potential carrier in the spread of pathogenic yeasts and mold fungi into the environment. The objective of this study was to isolation of Cryptococcus neoformans and other opportunistic fungi from pigeon droppings. Materials and Methods: One hundred twenty samples of pigeon droppings were suspended 1:10 in saline solution and then cultured. Identification of C. neoformans was performed on bird seed agar, presence of a capsule on India ink preparation, urease production on urea agar medium and RapID yeast plus system. The identification of candida species was based on micro-morphological analysis on corn meal-Tween 80 agar, RapID yeast plus system and growth in CHROMagar candida. The identification of other fungi was based on macromorphologic, microscopic, biochemical and physiological characteristics. Results: The highest frequency of yeasts and mold fungi were observed in Candida albicans 6.6% and Penicillium spp. 25%. The frequency rate of C. neoformans isolation was 2.5%. Conclusion: Several types of fungi are present in pigeon droppings that can spread in environment and transmit to children and elderly as well as immunocompromised patients who are at increased risk of contracting opportunistic diseases.

  20. SURVEY OF HOUSE RAT INTESTINAL PARASITES FROM SURABAYA DISTRICT, EAST JAVA, INDONESIA THAT CAN CAUSE OPPORTUNISTIC INFECTIONS IN HUMANS.

    Science.gov (United States)

    Prasetyo, R H

    2016-03-01

    The purpose of this study was to investigate the prevalence of house rat zoonotic intestinal parasites from Surabaya District, East Java, Indonesia that have the potential to cause opportunistic infection in humans. House rat fecal samples were collected from an area of Surabaya District with a dense rat population during May 2015. Intestinal parasites were detected microscopically using direct smear of feces stained with Lugol's iodine and modified Ziehl-Neelsen stains. The fecal samples were also cultured for Strongyloides stercoralis. Ninety-eight house rat fecal samples were examined. The potential opportunistic infection parasite densities found in those samples were Strongyloides stercoralis in 53%, Hymenolepis nana in 42%, Cryptosporidium spp in 33%, and Blastocystis spp in 6%. This is the first report of this kind in Surabaya District. Measures need to be taken to control the house rat population in the study area to reduce the risk of the public health problem. Keywords: zoonotic intestinal parasites, opportunistic infection, house rat, densely populated area, Indonesia

  1. Improving Network Performance with Affinity based Mobility Model in Opportunistic Network

    OpenAIRE

    Suvadip Batabyal; Parama Bhaumik

    2012-01-01

    Opportunistic network is a type of Delay Tolerant Network which is characterized by intermittent connectivity amongst the nodes and communication largely depends upon the mobility of the participating nodes. The network being highly dynamic, traditional MANET protocols cannot be applied and the nodes must adhere to store-carry-forward mechanism. Nodes do not have the information about the network topology, number of participating nodes and the location of the destination node. Hence, message ...

  2. Opportunistic Beamforming with Wireless Powered 1-bit Feedback Through Rectenna Array

    OpenAIRE

    Krikidis, Ioannis

    2015-01-01

    This letter deals with the opportunistic beamforming (OBF) scheme for multi-antenna downlink with spatial randomness. In contrast to conventional OBF, the terminals return only 1-bit feedback, which is powered by wireless power transfer through a rectenna array. We study two fundamental topologies for the combination of the rectenna elements; the direct-current combiner and the radio-frequency combiner. The beam outage probability is derived in closed form for both combination schemes, by usi...

  3. DIRECTIONAL OPPORTUNISTIC MECHANISM IN CLUSTER MESSAGE CRITICALITY LEVEL BASED ZIGBEE ROUTING

    OpenAIRE

    B.Rajeshkanna *1, Dr.M.Anitha 2

    2018-01-01

    The cluster message criticality level based zigbee routing(CMCLZOR) has been proposed for routing the cluster messages in wireless smart energy home area networks. It employs zigbee opportunistic shortcut tree routing(ZOSTR) and AODV individually for routing normal messages and highly critical messages respectively. ZOSTR allows the receiving nodes to compete for forwarding a packet with the priority of left-over hops rather than stating single next hop node like unicast protocols. Since it h...

  4. Reduced feedback opportunistic and layered random beamforming for MIMO-OFDMA systems

    OpenAIRE

    Han, C; Nicolaou, M; Doufexi, A; Armour, SMD

    2007-01-01

    This paper considers a number of techniques employed in opportunistic and layered random beamforming OFDMA schemes that aim to reduce the feedback required to perform scheduling whilst also minimising the throughput degradations resulting from this reduced throughput (due to the lack of full CSI at the Base Station (BS). Frequency response correlation among subcarriers can be exploited to group adjacent subcarriers into clusters which can then be treated as a single unit for feedback purposes...

  5. Enabling opportunistic resources for CMS Computing Operations

    Energy Technology Data Exchange (ETDEWEB)

    Hufnagel, Dick [Fermilab

    2015-11-19

    With the increased pressure on computing brought by the higher energy and luminosity from the LHC in Run 2, CMS Computing Operations expects to require the ability to utilize “opportunistic” resources — resources not owned by, or a priori configured for CMS — to meet peak demands. In addition to our dedicated resources we look to add computing resources from non CMS grids, cloud resources, and national supercomputing centers. CMS uses the HTCondor/glideinWMS job submission infrastructure for all its batch processing, so such resources will need to be transparently integrated into its glideinWMS pool. Bosco and parrot wrappers are used to enable access and bring the CMS environment into these non CMS resources. Here we describe our strategy to supplement our native capabilities with opportunistic resources and our experience so far using them.

  6. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  7. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir; Alouini, Mohamed-Slim; Bhargava, Vijay K.

    2010-01-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second

  8. The presence of opportunistic pathogens, Legionella spp., L. pneumophila and Mycobacterium avium complex, in South Australian reuse water distribution pipelines.

    Science.gov (United States)

    Whiley, H; Keegan, A; Fallowfield, H; Bentham, R

    2015-06-01

    Water reuse has become increasingly important for sustainable water management. Currently, its application is primarily constrained by the potential health risks. Presently there is limited knowledge regarding the presence and fate of opportunistic pathogens along reuse water distribution pipelines. In this study opportunistic human pathogens Legionella spp., L. pneumophila and Mycobacterium avium complex were detected using real-time polymerase chain reaction along two South Australian reuse water distribution pipelines at maximum concentrations of 10⁵, 10³ and 10⁵ copies/mL, respectively. During the summer period of sampling the concentration of all three organisms significantly increased (P < 0.05) along the pipeline, suggesting multiplication and hence viability. No seasonality in the decrease in chlorine residual along the pipelines was observed. This suggests that the combination of reduced chlorine residual and increased water temperature promoted the presence of these opportunistic pathogens.

  9. Opportunistic Nonorthogonal Packet Scheduling in Fixed Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Ahmed Mohamed H

    2006-01-01

    Full Text Available In order to mitigate high cochannel interference resulting from dense channel reuse, the interference management issues are often considered as essential part of scheduling schemes in fixed broadband wireless access (FBWA networks. To that end, a series of literature has been published recently, in which a group of base stations forms an interferer group (downlink transmissions from each base station become dominant interference for the users in other in-group base stations, and the scheduling scheme deployed in the group allows only one base station to transmit at a time. As a result of time orthogonality in transmissions, the dominant cochannel interferers are prevented, and hence the packet error rate can be improved. However, prohibiting concurrent transmissions in these orthogonal schemes introduces throughput penalty as well as higher end-to-end packet delay which might not be desirable for real-time services. In this paper, we utilize opportunistic nonorthogonality among the in-group transmissions whenever possible and propose a novel transmission scheduling scheme for FBWA networks. The proposed scheme, in contrast to the proactive interference avoidance techniques, strives for the improvements in delay and throughput efficiency. To facilitate opportunistic nonorthogonal transmissions in the interferer group, estimation of signal-to-interference-plus-noise ratio (SINR is required at the scheduler. We have observed from simulations that the proposed scheme outperforms the reference orthogonal scheme in terms of spectral efficiency, mean packet delay, and packet dropping rate.

  10. Regrowth of Potential Opportunistic Pathogens and Algae in Reclaimed-Water Distribution Systems ▿

    Science.gov (United States)

    Jjemba, Patrick K.; Weinrich, Lauren A.; Cheng, Wei; Giraldo, Eugenio; LeChevallier, Mark W.

    2010-01-01

    A study of the quality of reclaimed water in treated effluent, after storage, and at three points in the distribution system of four plants in California, Florida, Massachusetts, and New York was conducted for 1 year. The plants had different treatment processes (conventional versus membrane bioreactor), production capacities, and methods for storage of the water, and the intended end uses of the water were different. The analysis focused on the occurrence of indicator bacteria (heterotrophic bacteria, coliforms, Escherichia coli, and enterococci) and opportunistic pathogens (Aeromonas spp., enteropathogenic E. coli O157:H7, Legionella spp., Mycobacterium spp., and Pseudomonas spp.), as well as algae. Using immunological methods, E. coli O157:H7 was detected in the effluent of only one system, but it was not detected at the sampling points, suggesting that its survival in the system was poor. Although all of the treatment systems effectively reduced the levels of bacteria in the effluent, bacteria regrew in the reservoir and distribution systems because of the loss of residual disinfectant and high assimilable organic carbon levels. In the systems with open reservoirs, algal growth reduced the water quality by increasing the turbidity and accumulating at the end of the distribution system. Opportunistic pathogens, notably Aeromonas, Legionella, Mycobacterium, and Pseudomonas, occurred more frequently than indicator bacteria (enterococci, coliforms, and E. coli). The Mycobacterium spp. were very diverse and occurred most frequently in membrane bioreactor systems, and Mycobacterium cookii was identified more often than the other species. The public health risk associated with these opportunistic pathogens in reclaimed water is unknown. Collectively, our results show the need to develop best management practices for reclaimed water to control bacterial regrowth and degradation of water before it is utilized at the point of use. PMID:20453149

  11. A Twin Study of Heritable and Shared Environmental Contributions to Autism

    Science.gov (United States)

    Frazier, Thomas W.; Thompson, Lee; Youngstrom, Eric A.; Law, Paul; Hardan, Antonio Y.; Eng, Charis; Morris, Nathan

    2014-01-01

    The present study examined genetic and shared environment contributions to quantitatively-measured autism symptoms and categorically-defined autism spectrum disorders (ASD). Participants included 568 twins from the Interactive Autism Network. Autism symptoms were obtained using the Social Communication Questionnaire and Social Responsiveness…

  12. PlayNCool: Opportunistic Network Coding for Local Optimization of Routing in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk

    2013-01-01

    This paper introduces PlayNCool, an opportunistic protocol with local optimization based on network coding to increase the throughput of a wireless mesh network (WMN). PlayNCool aims to enhance current routing protocols by (i) allowing random linear network coding transmissions end-to-end, (ii) r...

  13. Exact outage analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2010-01-01

    In this paper, we investigate a dual-hop decode-andforward opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we derive exact closed-form expression for the outage probability based on the exact statistics of each hop. Furthermore, we perform asymptotic analysis and we deduce the diversity order of the scheme. We validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2010 IEEE.

  14. Exact outage analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel

    2010-11-01

    In this paper, we investigate a dual-hop decode-andforward opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we derive exact closed-form expression for the outage probability based on the exact statistics of each hop. Furthermore, we perform asymptotic analysis and we deduce the diversity order of the scheme. We validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2010 IEEE.

  15. Draft genome sequences of two opportunistic pathogenic strains of Staphylococcus cohnii isolated from human patients.

    Science.gov (United States)

    Mendoza-Olazarán, Soraya; Garcia-Mazcorro, José F; Morfín-Otero, Rayo; Villarreal-Treviño, Licet; Camacho-Ortiz, Adrián; Rodríguez-Noriega, Eduardo; Bocanegra-Ibarias, Paola; Maldonado-Garza, Héctor J; Dowd, Scot E; Garza-González, Elvira

    2017-01-01

    Herein, we report the draft-genome sequences and annotation of two opportunistic pathogenic strains of Staphylococcus cohnii isolated from humans. One strain (SC-57) was isolated from blood from a male patient in May 2006 and the other (SC-532) from a catheter from a male patient in June 2006. Similar to other genomes of Staphylococcus species, most genes (42%) of both strains are involved in metabolism of amino acids and derivatives, carbohydrates and proteins. Eighty (4%) genes are involved in virulence, disease, and defense and both species show phenotypic low biofilm production and evidence of increased antibiotic resistance associated to biofilm production. From both isolates, a new Staphylococcal Cassette Chromosome mec was detected: mec class A, ccr type 1. This is the first report of whole genome sequences of opportunistic S. cohnii isolated from human patients.

  16. Opportunistic and other intestinal parasites among HIV/AIDS patients attending Gambi higher clinic in Bahir Dar city, North West Ethiopia.

    Science.gov (United States)

    Alemu, Abebe; Shiferaw, Yitayal; Getnet, Gebeyaw; Yalew, Aregaw; Addis, Zelalem

    2011-08-01

    To determine the magnitude of opportunistic and non-opportunistic intestinal parasitic infections among HIV/AIDS patients in Bahir Dar. Cross-sectional study was conducted among HIV/AIDS patients attending Gambi higher clinic from April1-May 30, 2009. Convenient sampling technique was employed to identify the study subjects and hence a total of 248 subjects were included. A pre-tested structured questionnaire was used to collect socio-demographic data of patients. Stool samples were examined by direct saline, iodine wet mount, formol-ether sedimentation concentration and modified Ziehl-Neelsen staining technique. Out of 248 enrolled in the study, 171(69.0%) (90 males and 81 females) were infected with one or more intestinal parasites. The highest rate of intestinal parasites were observed among HIV/AIDS patients (80.3%, 151/188), and the infection rate of HIV negative individuals was 33.3% (20/60). Cryptosporidum parvum (43.6%), Isospora belli (15.5%) and Blastocystis hominis (10.5%) were opportunistic parasites that were found only in HIV/AIDS patients. Opportunistic parasite infections are common health problem among HIV/AIDS patients in the study area. Therefore, early detection and treatment of these parasites are important to improve the quality of life of HIV/AIDS patients. Copyright © 2011 Hainan Medical College. Published by Elsevier B.V. All rights reserved.

  17. Outage analysis of opportunistic decode-and-forward relaying

    KAUST Repository

    Tourki, Kamel

    2010-09-01

    In this paper, we investigate a dual-hop opportunistic decode-and-forward relaying scheme where the source may or not be able to communicate directly with the destination. We first derive statistics based on exact probability density function (PDF) of each hop. Then, the PDFs are used to determine closed-form outage probability expression for a transmission rate R. Furthermore, we evaluate the asymptotic outage performance and the diversity order is deduced. Unlike existing works where the analysis focused on high signal-to-noise ratio (SNR) regime, such results are important to enable the designers to take decisions regarding practical systems that operate at low SNR regime. We show that performance simulation results coincide with our analytical results under practical assumption of unbalanced hops. © 2010 IEEE.

  18. Spectrum monitoring procedures and techniques

    Science.gov (United States)

    1990-07-01

    The first step towards operating an emitter on a test range is to contact the local frequency manager to establish a schedule. Since restricted radio frequency bands and operations are different at each test range location, most testing is accomplished by sharing the spectrum available with all range users. The telemetry bands in particular require spectrum activity scheduling. The objective is to resolve scheduling conflicts prior to operations. When two programs or projects request to use the same spectrum, their activity can be separated by quard bands, discrete frequencies, time, or operating locations (terrain masking). Priorities assigned to each program usually dictate which program will be scheduled first; however, use of priorities to schedule activities should be avoided and only considered as a last resort. When a scheduling conflict cannot be resolved using these techniques, it is brought to the attention of the responsible program managers. When scheduling activities involve other federal or nonfederal agencies, it is in the best interest of program managers to be as flexible as possible.

  19. Optimal Cross-Layer Design for Energy Efficient D2D Sharing Systems

    KAUST Repository

    Alabbasi, AbdulRahman; Shihada, Basem

    2016-01-01

    modified energy per good bit (MEPG) metric, with respect to the spectrum sharing user’s transmission power and media access frame length. The cellular users, legacy users, are protected by an outage probability constraint. To optimize the non

  20. Assisted Reproductive Technology Has No Association with Autism Spectrum Disorders: The Taiwan Birth Cohort Study

    Science.gov (United States)

    Lung, For-Wey; Chiang, Tung-Liang; Lin, Shio-Jean; Lee, Meng-Chih; Shu, Bih-Ching

    2018-01-01

    The use of assisted reproduction technology has increased over the last two decades. Autism spectrum disorders and assisted reproduction technology share many risk factors. However, previous studies on the association between autism spectrum disorders and assisted reproduction technology have shown inconsistent results. The purpose of this study…

  1. Scalable Spectrum Sharing Mechanism for Local Area Networks Deployment

    DEFF Research Database (Denmark)

    Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio; Kovacs, Istvan Zsolt

    2010-01-01

    in high mobility conditions. These goals can be only achieved through the use highly Optimized Local Area (OLA) access networks, operating at low range and low power transmissions. The efficient sharing of radio resources among OLAs will be very difficult to achieve with a traditional network planning......The availability on the market of powerful and lightweight mobile devices has led to a fast diffusion of mobile services for end users and the trend is shifting from voice based services to multimedia contents distribution. The current access networks are, however, able to support relatively low...... data rates and with limited Quality of Service (QoS). In order to extend the access to high data rate services to wireless users, the International Telecommunication Union (ITU) established new requirements for future wireless communication technologies of up to 1Gbps in low mobility and up to 100Mbps...

  2. Adaptive Opportunistic Cooperative Control Mechanism Based on Combination Forecasting and Multilevel Sensing Technology of Sensors for Mobile Internet of Things

    Directory of Open Access Journals (Sweden)

    Yong Jin

    2014-01-01

    Full Text Available In mobile Internet of Things, there are many challenges, including sensing technology of sensors, how and when to join cooperative transmission, and how to select the cooperative sensors. To address these problems, we studied the combination forecasting based on the multilevel sensing technology of sensors, building upon which we proposed the adaptive opportunistic cooperative control mechanism based on the threshold values such as activity probability, distance, transmitting power, and number of relay sensors, in consideration of signal to noise ratio and outage probability. More importantly, the relay sensors would do self-test real time in order to judge whether to join the cooperative transmission, for maintaining the optimal cooperative transmission state with high performance. The mathematical analyses results show that the proposed adaptive opportunistic cooperative control approach could perform better in terms of throughput ratio, packet error rate and delay, and energy efficiency, compared with the direct transmission and opportunistic cooperative approaches.

  3. Does obsessive-compulsive personality disorder belong within the obsessive-compulsive spectrum?

    Science.gov (United States)

    Fineberg, Naomi A; Sharma, Punita; Sivakumaran, Thanusha; Sahakian, Barbara; Chamberlain, Sam R; Chamberlain, Sam

    2007-06-01

    It has been proposed that certain Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition Axis I disorders share overlapping clinical features, genetic contributions, and treatment response and fall within an "obsessive-compulsive" spectrum. Obsessive-compulsive personality disorder (OCPD) resembles obsessive-compulsive disorder (OCD) and other spectrum disorders in terms of phenomenology, comorbidity, neurocognition, and treatment response. This article critically examines the nosological profile of OCPD with special reference to OCD and related disorders. By viewing OCPD as a candidate member of the obsessive-compulsive spectrum, we gain a fresh approach to understanding its neurobiology, etiology, and potential treatments.

  4. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  5. Opportunistic Beamforming with Wireless Powered 1-bit Feedback Through Rectenna Array

    Science.gov (United States)

    Krikidis, Ioannis

    2015-11-01

    This letter deals with the opportunistic beamforming (OBF) scheme for multi-antenna downlink with spatial randomness. In contrast to conventional OBF, the terminals return only 1-bit feedback, which is powered by wireless power transfer through a rectenna array. We study two fundamental topologies for the combination of the rectenna elements; the direct-current combiner and the radio-frequency combiner. The beam outage probability is derived in closed form for both combination schemes, by using high order statistics and stochastic geometry.

  6. 76 FR 32993 - Toward Innovative Spectrum-Sharing Technologies: A Technical Workshop on Coordinating Federal...

    Science.gov (United States)

    2011-06-07

    .../WSRD/ . Background: The dramatic rise of radio frequency-based applications has sparked a new sense of urgency among federal users, commercial service providers, equipment developers, and spectrum management...

  7. Partial QoS-Aware Opportunistic Relay Selection Over Two-Hop Channels: End-to-End Performance Under Spectrum-Sharing Requirements

    KAUST Repository

    Yuli Yang,; Hao Ma,; Aissa, Sonia

    2014-01-01

    it with transmission constraints imposed on the transmit power budget and interference to other users. By analyzing the statistics of received SNRs in the first and second hops, we obtain the end-to-end PLR of this scheme in closed form under the considered scenario

  8. Identifying Unique Versus Shared Pre- and Perinatal Risk Factors for ASD and ADHD Using a Simplex-Multiplex Stratification

    NARCIS (Netherlands)

    Oerlemans, Anoek M.; Burmanje, Marlot J.; Franke, Barbara; Buitelaar, Jan K.; Hartman, Catharina A.; Rommelse, Nanda N. J.

    Autism spectrum disorder (ASD) and attention-deficit/hyperactivity disorder (ADHD) frequently co-occur. Besides shared genetic factors, pre- and perinatal risk factors (PPFs) may determine if ASD, ADHD, or the combination of both disorders becomes manifest. This study aimed to test shared and unique

  9. Larval habitat choice in still water and flume flows by the opportunistic bivalve Mulinia lateralis

    Science.gov (United States)

    Grassle, Judith P.; Snelgrove, Paul V. R.; Butman, Cheryl Ann

    Competent pediveligers of the coot clam Mulinia lateralis (Say) clearly preferred an organically-rich mud over abiotic glass beads in 24-h flume experiments, and often demonstrated the same choice in still-water experiments. We hypothesize that peediveligers with characteristic helical swimming paths above the bottom can exercise habitat choice in both still water nad flow, but that the limited swimming ambits of physiologically older periveligers require near-bottom flows to move the larvae between sediment patches so that they can exercise habitat choice. Although M. lateralis larvae are planktotrophic, their ability to delay metamorphosis in the absence of a preferred sediment cue is limited to about five days, a shorter time than the lecithotrophi larvae of the opportunistic polychaete species, Capitella spp. I and II. Field distributions of all three opportunistic species may result, at least in part, from active habitat selection for high-organic sediments by settling larvae.

  10. Spectrum Band Selection in Delay-QoS Constrained Cognitive Radio Networks

    KAUST Repository

    Yang, Yuli; Aï ssa, Sonia; Salama, Khaled N.

    2014-01-01

    links are investigated for both criteria under two spectrum-sharing constraints. To begin by presenting full benefits in these criteria, the constraint imposed on the secondary transmitter (ST) is the average interference limitation to PUs only

  11. Effect of oral hygiene interventions on opportunistic pathogens in patients after stroke.

    Science.gov (United States)

    Lam, Otto L T; McMillan, Anne S; Samaranayake, Lakshman P; Li, Leonard S W; McGrath, Colman

    2013-02-01

    Despite the role of the oral cavity as a reservoir of opportunistic pathogens for infection in patients following stroke, the evaluation of the effects of oral hygiene interventions has been largely neglected. This randomized clinical trial included 102 patients undergoing hospital-based rehabilitation for stroke. Patients were randomized to one of 3 groups: oral hygiene instruction (OHI) only; OHI and 0.2% chlorhexidine mouth rinse twice daily; or OHI, 0.2% chlorhexidine mouth rinse twice daily, and assisted brushing twice weekly. Oral samples were obtained at baseline and after 3 weeks for detection of Staphylococcus aureus, aerobic and facultatively anaerobic gram-negative bacilli, and yeasts. Almost three-quarters (72.8%) of the patients harbored oral anaerobic gram-negative bacilli at baseline, and more than half had detectable S aureus (56.8%) and yeasts (59.3%). Percentage frequencies and viable counts of pathogens remained relatively stable during the course of the clinical trial, and no significant differences were observed among the 3 patient groups. In our study cohort, there was no significant difference in the effectiveness of the 3 different oral hygiene interventions on the prevalence or viable counts of oral opportunistic pathogens. Copyright © 2013 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  12. Mathematical Modeling and Analysis Methodology for Opportunistic Routing in Wireless Multihop Networks

    Directory of Open Access Journals (Sweden)

    Wang Dongyang

    2015-01-01

    Full Text Available Modeling the forwarding feature and analyzing the performance theoretically for opportunistic routing in wireless multihop network are of great challenge. To address this issue, a generalized geometric distribution (GGD is firstly proposed. Based on the GGD, the forwarding probability between any two forwarding candidates could be calculated and it can be proved that the successful delivery rate after several transmissions of forwarding candidates is irrelevant to the priority rule. Then, a discrete-time queuing model is proposed to analyze mean end-to-end delay (MED of a regular opportunistic routing with the knowledge of the forwarding probability. By deriving the steady-state joint generating function of the queue length distribution, MED for directly connected networks and some special cases of nondirectly connected networks could be ultimately determined. Besides, an approximation approach is proposed to assess MED for the general cases in the nondirectly connected networks. By comparing with a large number of simulation results, the rationality of the analysis is validated. Both the analysis and simulation results show that MED varies with the number of forwarding candidates, especially when it comes to connected networks; MED increases more rapidly than that in nondirectly connected networks with the increase of the number of forwarding candidates.

  13. Hiding in Fresh Fruits and Vegetables: Opportunistic Pathogens May Cross Geographical Barriers

    Directory of Open Access Journals (Sweden)

    Zahra S. Al-Kharousi

    2016-01-01

    Full Text Available Different microbial groups of the microbiome of fresh produce can have diverse effects on human health. This study was aimed at identifying some microbial communities of fresh produce by analyzing 105 samples of imported fresh fruits and vegetables originated from different countries in the world including local samples (Oman for aerobic plate count and the counts of Enterobacteriaceae, Enterococcus, and Staphylococcus aureus. The isolated bacteria were identified by molecular (PCR and biochemical methods (VITEK 2. Enterobacteriaceae occurred in 60% of fruits and 91% of vegetables. Enterococcus was isolated from 20% of fruits and 42% of vegetables. E. coli and S. aureus were isolated from 22% and 7% of vegetables, respectively. Ninety-seven bacteria comprising 21 species were similarly identified by VITEK 2 and PCR to species level. E. coli, Klebsiella pneumoniae, Enterococcus casseliflavus, and Enterobacter cloacae were the most abundant species; many are known as opportunistic pathogens which may raise concern to improve the microbial quality of fresh produce. Phylogenetic trees showed no relationship between clustering of the isolates based on the 16S rRNA gene and the original countries of fresh produce. Intercountry passage of opportunistic pathogens in fresh produce cannot be ruled out, which requires better management.

  14. Emerging Problems in Knowledge Sharing and the Three New Ethics of Knowledge Transfer

    Directory of Open Access Journals (Sweden)

    Mikhail Koulikov

    2011-06-01

    Full Text Available Topics related to knowledge management and knowledge sharing have received extensive attention in the recent literature of management and information science. Much of the discussion has focused on how these processes take place - and frequently fail to take place - in formal business, corporate and organizational settings. Knowledge sharing, however, occurs along the entire spectrum of human activity. Often, information and knowledge are shared in ways that appear unregulated and even outright subversive. This paper surveys many of the recent critiques of formal mechanisms of knowledge sharing. It identifies a set of methods, structures and ethics of "informal" and unauthorized transfer of information, and suggests that these can offer valuable lessons for the further development of the study of knowledge sharing methods, practices and behaviors in all types of settings.

  15. Economic aspects of spectrum management

    Science.gov (United States)

    Stibolt, R. D.

    1979-01-01

    Problems associated with the allocation of the radio frequency spectrum are addressed. It is observed that the current method very likely does not allocate the resource to those most valuing its use. Ecomonic criteria by which the effectiveness of resource allocation schemes can be judged are set forth and some thoughts on traditional objections to implementation of market characteristics into frequency allocation are offered. The problem of dividing orbit and spectrum between two satellite services sharing the same band but having significantly different system characteristics is discussed. The problem is compounded by the likelihood that one service will commence operation much sooner than the other. Some alternative schemes are offered that, within proper international constraints, could achieve a desired flexibility in the division of orbit and frequency between the two services domestically over the next several years.

  16. Two-user opportunistic scheduling using hierarchical modulations in wireless networks with heterogenous average link gains

    KAUST Repository

    Hossain, Md Jahangir; Alouini, Mohamed-Slim; Bhargava, Vijay K.

    2010-01-01

    -user opportunistic scheduling (HTS) scheme based on our earlier proposed TBS scheme. This HTS scheme selects the first user based on the largest absolute CNR value among all the users while the second user is selected based on the ratios of the absolute CNRs

  17. Evidence-based consensus on opportunistic infections in inflammatory bowel disease (republication

    Directory of Open Access Journals (Sweden)

    2018-04-01

    Full Text Available Inflammatory bowel disease (IBD patients are a high-risk population for opportunistic infections. The IBD group of the Chinese Society of Gastroenterology of the Chinese Medical Association organized an expert group to discuss and develop this consensus opinion. This consensus opinion referenced clinical study results from China and other countries to provide guidance for clinical practices. Eight major topics, including cytomegalovirus infection, Epstein-Barr virus infection, viral hepatitis, bacterial infection, Mycobacterium tuberculosis infection, fungal infection, parasitic infection, and vaccines were introduced in this article.

  18. Anthropogenic disturbance can determine the magnitude of opportunistic species responses on marine urban infrastructures.

    Science.gov (United States)

    Airoldi, Laura; Bulleri, Fabio

    2011-01-01

    Coastal landscapes are being transformed as a consequence of the increasing demand for infrastructures to sustain residential, commercial and tourist activities. Thus, intertidal and shallow marine habitats are largely being replaced by a variety of artificial substrata (e.g. breakwaters, seawalls, jetties). Understanding the ecological functioning of these artificial habitats is key to planning their design and management, in order to minimise their impacts and to improve their potential to contribute to marine biodiversity and ecosystem functioning. Nonetheless, little effort has been made to assess the role of human disturbances in shaping the structure of assemblages on marine artificial infrastructures. We tested the hypothesis that some negative impacts associated with the expansion of opportunistic and invasive species on urban infrastructures can be related to the severe human disturbances that are typical of these environments, such as those from maintenance and renovation works. Maintenance caused a marked decrease in the cover of dominant space occupiers, such as mussels and oysters, and a significant enhancement of opportunistic and invasive forms, such as biofilm and macroalgae. These effects were particularly pronounced on sheltered substrata compared to exposed substrata. Experimental application of the disturbance in winter reduced the magnitude of the impacts compared to application in spring or summer. We use these results to identify possible management strategies to inform the improvement of the ecological value of artificial marine infrastructures. We demonstrate that some of the impacts of globally expanding marine urban infrastructures, such as those related to the spread of opportunistic, and invasive species could be mitigated through ecologically-driven planning and management of long-term maintenance of these structures. Impact mitigation is a possible outcome of policies that consider the ecological features of built infrastructures and

  19. Anthropogenic disturbance can determine the magnitude of opportunistic species responses on marine urban infrastructures.

    Directory of Open Access Journals (Sweden)

    Laura Airoldi

    Full Text Available BACKGROUND: Coastal landscapes are being transformed as a consequence of the increasing demand for infrastructures to sustain residential, commercial and tourist activities. Thus, intertidal and shallow marine habitats are largely being replaced by a variety of artificial substrata (e.g. breakwaters, seawalls, jetties. Understanding the ecological functioning of these artificial habitats is key to planning their design and management, in order to minimise their impacts and to improve their potential to contribute to marine biodiversity and ecosystem functioning. Nonetheless, little effort has been made to assess the role of human disturbances in shaping the structure of assemblages on marine artificial infrastructures. We tested the hypothesis that some negative impacts associated with the expansion of opportunistic and invasive species on urban infrastructures can be related to the severe human disturbances that are typical of these environments, such as those from maintenance and renovation works. METHODOLOGY/PRINCIPAL FINDINGS: Maintenance caused a marked decrease in the cover of dominant space occupiers, such as mussels and oysters, and a significant enhancement of opportunistic and invasive forms, such as biofilm and macroalgae. These effects were particularly pronounced on sheltered substrata compared to exposed substrata. Experimental application of the disturbance in winter reduced the magnitude of the impacts compared to application in spring or summer. We use these results to identify possible management strategies to inform the improvement of the ecological value of artificial marine infrastructures. CONCLUSIONS/SIGNIFICANCE: We demonstrate that some of the impacts of globally expanding marine urban infrastructures, such as those related to the spread of opportunistic, and invasive species could be mitigated through ecologically-driven planning and management of long-term maintenance of these structures. Impact mitigation is a

  20. Autism Spectrum Disorders. NICHCY Disability Fact Sheet #1

    Science.gov (United States)

    National Dissemination Center for Children with Disabilities, 2010

    2010-01-01

    Each of the disorders on the autism spectrum is a neurological disorder that affects a child's ability to communicate, understand language, play, and relate to others. They share some or all of the following characteristics, which can vary from mild to severe: (1) Communication problems (for example, with the use or comprehension of language); (2)…

  1. Yield of opportunistic targeted screening for type 2 diabetes in primary care: the diabscreen study.

    NARCIS (Netherlands)

    Klein Woolthuis, E.P.; Grauw, W.J.C. de; Gerwen, W.H.E.M. van; Hoogen, H.J.M. van den; Lisdonk, E.H. van de; Metsemakers, J.F.M.; Weel, C. van

    2009-01-01

    PURPOSE: In screening for type 2 diabetes, guidelines recommend targeting high-risk individuals. Our objectives were to assess the yield of opportunistic targeted screening for type 2 diabetes in primary care and to assess the diagnostic value of various risk factors. METHODS: In 11 family practices

  2. Allelopathic interactions between the opportunistic species Ulva prolifera and the native macroalga Gracilaria lichvoides.

    Directory of Open Access Journals (Sweden)

    Dong Xu

    Full Text Available Allelopathy, one type of direct plant competition, can be a potent mechanism through which plant communities are structured. The aim of this study was to determine whether allelopathic interactions occur between the opportunistic green tide-forming species Ulva prolifera and the native macroalga Gracilaria lichvoides, both of which were collected from the coastline of East China sea. In laboratory experiments, the presence of G. lichvoides at 1.25 g wet weight L(-1 significantly inhibited growth and photosynthesis of U. prolifera at concentrations of 1.25, 2.50, and 3.75 g wet weight L(-1 (p0.05. Culture medium experiments further confirmed that some allelochemicals may be released by both of the tested macroalgae, and these could account for the observed physiological inhibition of growth and photosynthesis. Moreover, the native macroalgae G. lichvoides was a stronger competitor than the opportunistic species U. prolifera. Collectively, the results of the present study represent a significant advance in exploring ecological questions about the effects of green tide blooms on the macroalgal community.

  3. Fast Detection Method in Cooperative Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Zhengyi Li

    2010-01-01

    Full Text Available Cognitive Radio (CR technology improves the utilization of spectrum highly via opportunistic spectrum sharing, which requests fast detection as the spectrum utilization is dynamic. Taking into consideration the characteristic of wireless channels, we propose a fast detection scheme for a cooperative cognitive radio network, which consists of multiple CRs and a central control office. Specifically, each CR makes individual detection decision using the sequential probability ratio test combined with Neyman Pearson detection with respect to a specific observation window length. The proposed method upper bounds the detection delay. In addition, a weighted K out of N fusion rule is also proposed for the central control office to reach fast global decision based on the information collected from CRs, with more weights assigned for CRs with good channel conditions. Simulation results show that the proposed scheme can achieve fast detection while maintaining the detection accuracy.

  4. OPPORTUNISTIC ASPERGILLUS PATHOGENS MEASURED IN HOME AND HOSPITAL TAP WATER BY MOLD SPECIFIC QUANTITATIVE PCR (MSQPCR)

    Science.gov (United States)

    Opportunistic fungal pathogens are a concern because of the increasing number of immunocompromised patients. The goal of this research was to test a simple extraction method and rapid quantitative PCR (QPCR) measurement of the occurrence of potential pathogens, Aspergillus fumiga...

  5. Service time analysis of secondary packet transmission with opportunistic channel access

    KAUST Repository

    Usman, Muneer; Yang, Hongchuan; Alouini, Mohamed-Slim

    2014-01-01

    Cognitive radio transceiver can opportunistically access the underutilized channels of primary systems for new wireless services. The secondary transmission may be interrupted by the primary user's transmission. To facilitate the delay analysis of such secondary packet transmission, we study the resulting extended delivery time for a fixed-size secondary packet that includes both transmission time and waiting time. In particular we derive the exact distribution functions of extended delivery time of secondary transmission for both continuous sensing and periodic sensing cases. Selected numerical results are presented for illustrating the mathematical formulation.

  6. Service time analysis of secondary packet transmission with opportunistic channel access

    KAUST Repository

    Usman, Muneer

    2014-09-01

    Cognitive radio transceiver can opportunistically access the underutilized channels of primary systems for new wireless services. The secondary transmission may be interrupted by the primary user\\'s transmission. To facilitate the delay analysis of such secondary packet transmission, we study the resulting extended delivery time for a fixed-size secondary packet that includes both transmission time and waiting time. In particular we derive the exact distribution functions of extended delivery time of secondary transmission for both continuous sensing and periodic sensing cases. Selected numerical results are presented for illustrating the mathematical formulation.

  7. The GEANT4 simulation study of the characteristic γ-ray spectrum of TNT under soil induced by DT neutron

    International Nuclear Information System (INIS)

    Qin Xue; Han Jifeng; Yang Chaowen

    2014-01-01

    The characteristic γ-ray spectrum of TNT under soil induced by DT neutron is measured based on the PFTNA demining system. GEANT4 Monte Carlo simulation toolkit is used to simulate the whole experimental procedure. The simulative spectrum is compared with the experimental spectrum. The result shows that they are mainly consistent. It is for the first time to analyze the spectrum by Monte Carlo simulation, the share of the background sources such as neutron, gamma are obtained, the contribution that the experimental apparatus such as shielding, detector sleeve, moderator make to the background is analysed. The study found that the effective gamma signal (from soil and TNT) is only 29% of the full-spectrum signal, and the background signal is more than 68% of the full-spectrum signal, which is mainly produced in the shielding and the detector sleeve. The simulation result shows that by gradually improving the shielding and the cadmium of the detector sleeve, the share of the effective gamma signal can increase to 36% and the background signal can fell 7% eventually. (authors)

  8. Spectrum Sensing Experimentation for LTE and WiFi Unlicensed Band Operation

    Directory of Open Access Journals (Sweden)

    N. Milošević

    2016-11-01

    Full Text Available If several different systems operate in the same frequency band, a coordination between them is needed for effective use of the available spectrum. The coordination is especially important if the systems are not designed to operate in such an environment. The very important initial phase of the coordination process is acquiring of the spectrum usage map or spectrum sensing. The paper describes the spectrum sensing experimentation in the unlicensed 5 GHz band during the WiFi or LTE transmission. It describes the experiment workflow and depicts the obtained results. The experiments were performed at NITOS testbed at the University of Thessaly, Greece, and show that it is possible to determine whether WiFi or LTE transmission is sensed. Therefore, based on spectrum sensing it will be possible to coordinate a shared access of WiFi and LTE users in the unlicensed 5 GHz band.

  9. Security-Reliability Trade-Off Analysis for Multiuser SIMO Mixed RF/FSO Relay Networks With Opportunistic User Scheduling

    KAUST Repository

    El-Malek, Ahmed H. Abd; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we study the performance of multiuser single-input multiple-output mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling. The considered system includes multiple users, one amplify

  10. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  11. The Spectrum Analysis Solution (SAS) System: Theoretical Analysis, Hardware Design and Implementation.

    Science.gov (United States)

    Narayanan, Ram M; Pooler, Richard K; Martone, Anthony F; Gallagher, Kyle A; Sherbondy, Kelly D

    2018-02-22

    This paper describes a multichannel super-heterodyne signal analyzer, called the Spectrum Analysis Solution (SAS), which performs multi-purpose spectrum sensing to support spectrally adaptive and cognitive radar applications. The SAS operates from ultrahigh frequency (UHF) to the S-band and features a wideband channel with eight narrowband channels. The wideband channel acts as a monitoring channel that can be used to tune the instantaneous band of the narrowband channels to areas of interest in the spectrum. The data collected from the SAS has been utilized to develop spectrum sensing algorithms for the budding field of spectrum sharing (SS) radar. Bandwidth (BW), average total power, percent occupancy (PO), signal-to-interference-plus-noise ratio (SINR), and power spectral entropy (PSE) have been examined as metrics for the characterization of the spectrum. These metrics are utilized to determine a contiguous optimal sub-band (OSB) for a SS radar transmission in a given spectrum for different modalities. Three OSB algorithms are presented and evaluated: the spectrum sensing multi objective (SS-MO), the spectrum sensing with brute force PSE (SS-BFE), and the spectrum sensing multi-objective with brute force PSE (SS-MO-BFE).

  12. SPRINT-SELF: Social-Based Routing and Selfish Node Detection in Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Radu Ioan Ciobanu

    2015-01-01

    Full Text Available Since mobile devices nowadays have become ubiquitous, several types of networks formed over such devices have been proposed. One such approach is represented by opportunistic networking, which is based on a store-carry-and-forward paradigm, where nodes store data and carry it until they reach a suitable node for forwarding. The problem in such networks is how to decide what the next hop will be, since nodes do not have a global view of the network. We propose using the social network information of a node when performing routing, since a node is more likely to encounter members of its own social community than other nodes. In addition, we approximate a node’s contact as a Poisson distribution and show that we can predict its future behavior based on the contact history. Furthermore, since opportunistic network nodes may be selfish, we improve our solution by adding a selfish node detection and avoidance mechanism, which can help reduce the number of unnecessary messages sent in the network, and thus avoid congestion and decrease battery consumption. We show that our algorithm outperforms existing solutions such as BUBBLE Rap and Epidemic in terms of delivery cost and hit rate, as well as the rate of congestion introduced in the network, by testing in various realistic scenarios.

  13. No evidence that common genetic risk variation is shared between schizophrenia and autism

    NARCIS (Netherlands)

    Vorstman, Jacob A. S.; Anney, Richard J. L.; Derks, Eske M.; Gallagher, Louise; Gill, Michael; de Jonge, Maretha V.; van Engeland, Herman; Kahn, René S.; Ophoff, Roel A.

    2013-01-01

    The similarity between aspects of the clinical presentation of schizophrenia and autism spectrum disorders (ASD) suggests that elements of the biological etiology may also be shared between these two disorders. Recently, an increasing number of rare, mostly structural genetic variants are reported

  14. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    Science.gov (United States)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  15. Location-based resource allocation for OFDMA cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2010-01-01

    In cognitive radio systems, in order for the secondary users to opportunistically share the spectrum without interfering the primary users, an accurate spectrum measurement and a precise estimation of the interference at the primary users are necessary but are challenging tasks. Since it is impractical in cognitive radio systems to assume that the channel state information of the interference link is available at the cognitive transmitter, the interference at the primary users is hard to be estimated accurately. This paper introduces a resource allocation algorithm for OFDMA-based cognitive radio systems, which utilizes location information of the primary and secondary users instead of the channel state information of the interference link. Simulation results show that it is indeed effective to incorporate location information into resource allocation so that a near-optimal capacity is achieved.

  16. Opportunistic testing versus organized prostate-specific antigen screening: outcome after 18 years in the Göteborg randomized population-based prostate cancer screening trial.

    Science.gov (United States)

    Arnsrud Godtman, Rebecka; Holmberg, Erik; Lilja, Hans; Stranne, Johan; Hugosson, Jonas

    2015-09-01

    It has been shown that organized screening decreases prostate cancer (PC) mortality, but the effect of opportunistic screening is largely unknown. To compare the ability to reduce PC mortality and the risk of overdiagnosis between organized and opportunistic screening. The Göteborg screening study invited 10 000 randomly selected men for prostate-specific antigen (PSA) testing every 2 yr since 1995, with a prostate biopsy recommended for men with PSA ≥2.5 ng/ml. The control group of 10 000 men not invited has been exposed to a previously reported increased rate of opportunistic PSA testing. Both groups were followed until December 31, 2012. Observed cumulative PC incidence and mortality rates in both groups were calculated using the actuarial method. Using historical data from 1990-1994 (pre-PSA era), we calculated expected PC incidence and mortality rates in the absence of any PSA testing. The number needed to invite (NNI) and the number needed to diagnose (NND) were calculated by comparing the expected versus observed incidence and mortality rates. At 18 yr, 1396 men were diagnosed with PC and 79 men died of PC in the screening group, compared to 962 and 122, respectively, in the control group. In the screening group, the observed cumulative PC incidence/mortality was 16%/0.98% compared to expected values of 6.8%/1.7%. The corresponding values for the control group were 11%/1.5% and 6.9%/1.7%. Organized screening was associated with an absolute PC-specific mortality reduction of 0.72% (95% confidence interval [CI] 0.50-0.94%) and relative risk reduction of 42% (95% CI 28-54%). There was an absolute reduction in PC deaths of 0.20% (95% CI -0.06% to 0.47%) and a relative risk reduction of 12% (95% CI -5 to 26%) associated with opportunistic PSA testing. NNI and NND were 139 (95% CI 107-200) and 13 for organized biennial screening and 493 (95% CI 213- -1563) and 23 for opportunistic screening. The extent of opportunistic screening could not be measured

  17. Feasibility of opportunistic osteoporosis screening in routine contrast-enhanced multi detector computed tomography (MDCT) using texture analysis.

    Science.gov (United States)

    Mookiah, M R K; Rohrmeier, A; Dieckmeyer, M; Mei, K; Kopp, F K; Noel, P B; Kirschke, J S; Baum, T; Subburaj, K

    2018-04-01

    This study investigated the feasibility of opportunistic osteoporosis screening in routine contrast-enhanced MDCT exams using texture analysis. The results showed an acceptable reproducibility of texture features, and these features could discriminate healthy/osteoporotic fracture cohort with an accuracy of 83%. This aim of this study is to investigate the feasibility of opportunistic osteoporosis screening in routine contrast-enhanced MDCT exams using texture analysis. We performed texture analysis at the spine in routine MDCT exams and investigated the effect of intravenous contrast medium (IVCM) (n = 7), slice thickness (n = 7), the long-term reproducibility (n = 9), and the ability to differentiate healthy/osteoporotic fracture cohort (n = 9 age and gender matched pairs). Eight texture features were extracted using gray level co-occurrence matrix (GLCM). The independent sample t test was used to rank the features of healthy/fracture cohort and classification was performed using support vector machine (SVM). The results revealed significant correlations between texture parameters derived from MDCT scans with and without IVCM (r up to 0.91) slice thickness of 1 mm versus 2 and 3 mm (r up to 0.96) and scan-rescan (r up to 0.59). The performance of the SVM classifier was evaluated using 10-fold cross-validation and revealed an average classification accuracy of 83%. Opportunistic osteoporosis screening at the spine using specific texture parameters (energy, entropy, and homogeneity) and SVM can be performed in routine contrast-enhanced MDCT exams.

  18. Opportunistic Sensor Data Collection with Bluetooth Low Energy.

    Science.gov (United States)

    Aguilar, Sergio; Vidal, Rafael; Gomez, Carles

    2017-01-23

    Bluetooth Low Energy (BLE) has gained very high momentum, as witnessed by its widespread presence in smartphones, wearables and other consumer electronics devices. This fact can be leveraged to carry out opportunistic sensor data collection (OSDC) in scenarios where a sensor node cannot communicate with infrastructure nodes. In such cases, a mobile entity (e.g., a pedestrian or a vehicle) equipped with a BLE-enabled device can collect the data obtained by the sensor node when both are within direct communication range. In this paper, we characterize, both analytically and experimentally, the performance and trade-offs of BLE as a technology for OSDC, for the two main identified approaches, and considering the impact of its most crucial configuration parameters. Results show that a BLE sensor node running on a coin cell battery can achieve a lifetime beyond one year while transferring around 10 Mbit/day, in realistic OSDC scenarios.

  19. Sinabro: A Smartphone-Integrated Opportunistic Electrocardiogram Monitoring System.

    Science.gov (United States)

    Kwon, Sungjun; Lee, Dongseok; Kim, Jeehoon; Lee, Youngki; Kang, Seungwoo; Seo, Sangwon; Park, Kwangsuk

    2016-03-11

    In our preliminary study, we proposed a smartphone-integrated, unobtrusive electrocardiogram (ECG) monitoring system, Sinabro, which monitors a user's ECG opportunistically during daily smartphone use without explicit user intervention. The proposed system also monitors ECG-derived features, such as heart rate (HR) and heart rate variability (HRV), to support the pervasive healthcare apps for smartphones based on the user's high-level contexts, such as stress and affective state levels. In this study, we have extended the Sinabro system by: (1) upgrading the sensor device; (2) improving the feature extraction process; and (3) evaluating extensions of the system. We evaluated these extensions with a good set of algorithm parameters that were suggested based on empirical analyses. The results showed that the system could capture ECG reliably and extract highly accurate ECG-derived features with a reasonable rate of data drop during the user's daily smartphone use.

  20. Sinabro: A Smartphone-Integrated Opportunistic Electrocardiogram Monitoring System

    Directory of Open Access Journals (Sweden)

    Sungjun Kwon

    2016-03-01

    Full Text Available In our preliminary study, we proposed a smartphone-integrated, unobtrusive electrocardiogram (ECG monitoring system, Sinabro, which monitors a user’s ECG opportunistically during daily smartphone use without explicit user intervention. The proposed system also monitors ECG-derived features, such as heart rate (HR and heart rate variability (HRV, to support the pervasive healthcare apps for smartphones based on the user’s high-level contexts, such as stress and affective state levels. In this study, we have extended the Sinabro system by: (1 upgrading the sensor device; (2 improving the feature extraction process; and (3 evaluating extensions of the system. We evaluated these extensions with a good set of algorithm parameters that were suggested based on empirical analyses. The results showed that the system could capture ECG reliably and extract highly accurate ECG-derived features with a reasonable rate of data drop during the user’s daily smartphone use.

  1. Noisy mean field game model for malware propagation in opportunistic networks

    KAUST Repository

    Tembine, Hamidou

    2012-01-01

    In this paper we present analytical mean field techniques that can be used to better understand the behavior of malware propagation in opportunistic large networks. We develop a modeling methodology based on stochastic mean field optimal control that is able to capture many aspects of the problem, especially the impact of the control and heterogeneity of the system on the spreading characteristics of malware. The stochastic large process characterizing the evolution of the total number of infected nodes is examined with a noisy mean field limit and compared to a deterministic one. The stochastic nature of the wireless environment make stochastic approaches more realistic for such types of networks. By introducing control strategies, we show that the fraction of infected nodes can be maintained below some threshold. In contrast to most of the existing results on mean field propagation models which focus on deterministic equations, we show that the mean field limit is stochastic if the second moment of the number of object transitions per time slot is unbounded with the size of the system. This allows us to compare one path of the fraction of infected nodes with the stochastic trajectory of its mean field limit. In order to take into account the heterogeneity of opportunistic networks, the analysis is extended to multiple types of nodes. Our numerical results show that the heterogeneity can help to stabilize the system. We verify the results through simulation showing how to obtain useful approximations in the case of very large systems. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.

  2. Opportunistic and other intestinal parasitic infections in AIDS patients, HIV seropositive healthy carriers and HIV seronegative individuals in southwest Ethiopia.

    Science.gov (United States)

    Mariam, Zelalem T; Abebe, Gemeda; Mulu, Andargachew

    2008-12-01

    Human Immunodeficiency Virus (HIV) infection leads to acquired immunodeficiency syndrome (AIDS) and major causes of morbidity and mortality of such patients are opportunistic infections caused by viral, bacterial, fungal and parasitic pathogens. To determine the magnitude of opportunistic and non-opportunistic intestinal parasitic infections among AIDS patients and HIV positive carrier individuals. Cross-sectional study was conducted among AIDS patients, HIV positive healthy carriers and HIV negative individuals in Jimma University Hospital, Mother Theresa Missionary Charity Centre, Medan Acts Projects and Mekdim HIV positive persons and AIDS orphans' national association from January to May, 2004. Convenient sampling technique was employed to identify the study subjects and hence a total of 160 subjects were included. A pre-tested structured questionnaire was used to collect socio-demographic data of the patients. Stool samples were examined by direct saline, iodine wet mount, formol-ether sedimentation concentration, oocyst concentration and modified Ziehl-Neelsen staining technique. Out of 160 persons enrolled in this study 100 (62.5%) (i.e. 65 male and 35 female) were infected with one or more intestinal parasites. The highest rate 36 (69.2%) of intestinal parasites were observed among HIV/AIDS patients, followed by HIV positive healthy carriers 35 (61.4%) of and HIV negative individuals (29 (56.9%). Isospora belli 2 (3.9%), Cryptosporidum parvum 8 (15.4%), Strongyloides stercoralis 6 (11.5%) and Blastocystis 2 (3.9%) were found only in HIV/AIDS groups I. belli, C. parvum, S. stercoralis and Blastocystis are the major opportunistic intestinal parasites observed in HIV/AIDS patients. Therefore, early detection and treatment of these parasites are important to improve the quality of life of HIV/AIDS patients with diarrhoea.

  3. Strategies for improvement of spectrum capacity for WiMax cellular systems by Cognitive Radio Technology supported by Relay Stations

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to improve the wireless transmission by orthogonal OFDM-based communication and to increase...... the coverage of cellular systems by relay stations will be presented as well.   ...

  4. Opportunistic pathogens and elements of the resistome that are common in bottled mineral water support the need for continuous surveillance.

    Directory of Open Access Journals (Sweden)

    Maria Fernanda Falcone-Dias

    Full Text Available Several differences concerning bacterial species, opportunistic pathogens, elements of the resistome as well as variations concerning the CFU/mL counts were identified in some of the five most marketed bottled mineral water from Araraquara city, São Paulo, Brazil. Two out of five brands tested were confirmed as potential source of opportunistic pathogens, including Mycobacterium gordonae, Ralstonia picketti and Burkholderia cepacia complex (Bcc. A total of one hundred and six isolates were recovered from four of these bottled mineral water brands. Betaproteobacteria was predominant followed by Alphaproteobacteria, Gammaproteobacteria and Firmicutes. Ninety percent of the bacteria isolated demonstrated resistance to seventeen of the nineteen antimicrobials tested. These antimicrobials included eight different classes, including 3rd and 4th generation cephalosporins, carbapenems and fluoroquinolones. Multidrug resistant bacteria were detected for fifty-nine percent of isolates in three water brands at counts up to 103 CFU/ml. Of major concern, the two bottled mineral water harboring opportunistic pathogens were also source of elements of the resistome that could be directly transferred to humans. All these differences found among brands highlight the need for continuous bacteriological surveillance of bottled mineral water.

  5. Opportunistic pathogens and elements of the resistome that are common in bottled mineral water support the need for continuous surveillance.

    Science.gov (United States)

    Falcone-Dias, Maria Fernanda; Centrón, Daniela; Pavan, Fernando; Moura, Adriana Candido da Silva; Naveca, Felipe Gomes; de Souza, Victor Costa; Farache Filho, Adalberto; Leite, Clarice Queico Fujimura

    2015-01-01

    Several differences concerning bacterial species, opportunistic pathogens, elements of the resistome as well as variations concerning the CFU/mL counts were identified in some of the five most marketed bottled mineral water from Araraquara city, São Paulo, Brazil. Two out of five brands tested were confirmed as potential source of opportunistic pathogens, including Mycobacterium gordonae, Ralstonia picketti and Burkholderia cepacia complex (Bcc). A total of one hundred and six isolates were recovered from four of these bottled mineral water brands. Betaproteobacteria was predominant followed by Alphaproteobacteria, Gammaproteobacteria and Firmicutes. Ninety percent of the bacteria isolated demonstrated resistance to seventeen of the nineteen antimicrobials tested. These antimicrobials included eight different classes, including 3rd and 4th generation cephalosporins, carbapenems and fluoroquinolones. Multidrug resistant bacteria were detected for fifty-nine percent of isolates in three water brands at counts up to 103 CFU/ml. Of major concern, the two bottled mineral water harboring opportunistic pathogens were also source of elements of the resistome that could be directly transferred to humans. All these differences found among brands highlight the need for continuous bacteriological surveillance of bottled mineral water.

  6. Development of a simple screening tool for opportunistic COPD case finding in primary care in Latin America: The PUMA study.

    Science.gov (United States)

    López Varela, Maria Victorina; Montes de Oca, Maria; Rey, Alejandra; Casas, Alejandro; Stirbulov, Roberto; Di Boscio, Valentina

    2016-10-01

    Opportunistic chronic obstructive pulmonary disease (COPD) case finding approaches for high-risk individuals with or without symptoms is a feasible option for disease identification. PUMA is an opportunistic case finding study conducted in primary care setting of Argentina, Colombia, Venezuela and Uruguay. The objectives were to measure COPD prevalence in an at-risk population visiting primary care for any reason, to assess the yield of this opportunistic approach and the accuracy of a score developed to detect COPD. Subjects attending routine primary care visits, ≥40 years of age, current or former smokers or exposed to biomass smoke, completed a questionnaire and performed spirometry. COPD was defined as post-bronchodilator (post-BD) forced expiratory volume in 1 s (FEV1 )/forced vital capacity (FVC) 50 years, heavy smokers (>30 pack-years), with dyspnoea, and having prior spirometry. A simple score and a weighted score constructed using the following predictive factors: gender, age, pack-years smoking, dyspnoea, sputum, cough and spirometry, had a mean accuracy for detecting COPD (post-BD FEV1 /FVC tool to select subjects for spirometry in primary care. © 2016 Asian Pacific Society of Respirology.

  7. Multiresistant opportunistic pathogenic bacteria isolated from polluted rivers and first detection of nontuberculous mycobacteria in the Algerian aquatic environment.

    Science.gov (United States)

    Djouadi, Lydia Neïla; Selama, Okba; Abderrahmani, Ahmed; Bouanane-Darenfed, Amel; Abdellaziz, Lamia; Amziane, Meriam; Fardeau, Marie-Laure; Nateche, Farida

    2017-08-01

    Opportunistic infections constitute a major challenge for modern medicine mainly because the involved bacteria are usually multiresistant to antibiotics. Most of these bacteria possess remarkable ability to adapt to various ecosystems, including those exposed to anthropogenic activities. This study isolated and identified 21 multiresistant opportunistic bacteria from two polluted rivers, located in Algiers. Cadmium, lead, and copper concentrations were determined for both water samples to evaluate heavy metal pollution. High prevalence of Enterobacteria and non-fermentative Gram-negative rods was found and a nontuberculous Mycobacterium (NTM) strain was isolated. To the best of our knowledge, this is the first detection of NTM in the Algerian environment. The strains were tested for their resistance against 34 antibiotics and 8 heavy metals. Multiple antibiotics and heavy metals resistance was observed in all isolates. The two most resistant strains, identified as Acinetobacter sp. and Citrobacter freundii, were submitted to plasmid curing to determine if resistance genes were plasmid or chromosome encoded. Citrobacter freundii strain P18 showed a high molecular weight plasmid which seems to code for resistance to zinc, lead, and tetracycline, at the same time. These findings strongly suggest that anthropized environments constitute a reservoir for multiresistant opportunistic bacteria and for circulating resistance genes.

  8. A graph model for opportunistic network coding

    KAUST Repository

    Sorour, Sameh

    2015-08-12

    © 2015 IEEE. Recent advancements in graph-based analysis and solutions of instantly decodable network coding (IDNC) trigger the interest to extend them to more complicated opportunistic network coding (ONC) scenarios, with limited increase in complexity. In this paper, we design a simple IDNC-like graph model for a specific subclass of ONC, by introducing a more generalized definition of its vertices and the notion of vertex aggregation in order to represent the storage of non-instantly-decodable packets in ONC. Based on this representation, we determine the set of pairwise vertex adjacency conditions that can populate this graph with edges so as to guarantee decodability or aggregation for the vertices of each clique in this graph. We then develop the algorithmic procedures that can be applied on the designed graph model to optimize any performance metric for this ONC subclass. A case study on reducing the completion time shows that the proposed framework improves on the performance of IDNC and gets very close to the optimal performance.

  9. Exploiting volatile opportunistic computing resources with Lobster

    Science.gov (United States)

    Woodard, Anna; Wolf, Matthias; Mueller, Charles; Tovar, Ben; Donnelly, Patrick; Hurtado Anampa, Kenyi; Brenner, Paul; Lannon, Kevin; Hildreth, Mike; Thain, Douglas

    2015-12-01

    Analysis of high energy physics experiments using the Compact Muon Solenoid (CMS) at the Large Hadron Collider (LHC) can be limited by availability of computing resources. As a joint effort involving computer scientists and CMS physicists at Notre Dame, we have developed an opportunistic workflow management tool, Lobster, to harvest available cycles from university campus computing pools. Lobster consists of a management server, file server, and worker processes which can be submitted to any available computing resource without requiring root access. Lobster makes use of the Work Queue system to perform task management, while the CMS specific software environment is provided via CVMFS and Parrot. Data is handled via Chirp and Hadoop for local data storage and XrootD for access to the CMS wide-area data federation. An extensive set of monitoring and diagnostic tools have been developed to facilitate system optimisation. We have tested Lobster using the 20 000-core cluster at Notre Dame, achieving approximately 8-10k tasks running simultaneously, sustaining approximately 9 Gbit/s of input data and 340 Mbit/s of output data.

  10. Two-user opportunistic scheduling using hierarchical modulations in wireless networks with heterogenous average link gains

    KAUST Repository

    Hossain, Md Jahangir

    2010-03-01

    Our contribution, in this paper, is two-fold. First, we analyze the performance of a hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) scheme, which was proposed by the authors, in a fading environment where different users have different average link gains. Specifically, we present a new expression for the spectral efficiency (SE) of the users and using this expression, we compare the degrees of fairness (DOF) of the TBS scheme with that of classical single user opportunistic scheduling schemes, namely, absolute carrier-to-noise ratio (CNR) based single-best user scheduling (SBS) and normalized CNR based proportional fair scheduling (PFS) schemes. The second contribution is that we propose a new hybrid two-user opportunistic scheduling (HTS) scheme based on our earlier proposed TBS scheme. This HTS scheme selects the first user based on the largest absolute CNR value among all the users while the second user is selected based on the ratios of the absolute CNRs to the corresponding average CNRs of the remaining users. The total transmission rate i.e., the constellation size is selected according to the absolute CNR of the first best user. The total transmission rate is then allocated among these selected users by joint consideration of their absolute CNRs and allocated number of information bit(s) are transmitted to them using hierarchical modulations. Numerical results are presented for a fading environment where different users experience independent but non-identical (i.n.d.) channel fading. These selected numerical results show that the proposed HTS scheme can considerably increase the system\\'s fairness without any degradation of the link spectral efficiency (LSE) i.e., the multiuser diversity gain compared to the classical SBS scheme. These results also show that the proposed HTS scheme has a lower fairness in comparison to the PFS scheme which suffers from a considerable degradation in LSE. © 2010 IEEE.

  11. Mycological assessment of sediments in Ligurian beaches in the Northwestern Mediterranean: pathogens and opportunistic pathogens.

    Science.gov (United States)

    Salvo, Vanessa-Sarah; Fabiano, Mauro

    2007-05-01

    Sediments of five Ligurian beaches in compliance with European Union bathing water regulations were studied based on the characteristics of the fungal assemblage during the tourism season. Among the 179 taxa of filamentous fungi isolated, 120 were opportunistic pathogens, such as Acremonium sp., and the genus Penicillium was also present as the pathogenic species P. citrinum. Furthermore, 5% of the total filamentous fungi belonged to the dermatophyte genus Microsporum, whose species can cause mycoses. Beach sediments showed elevated densities of opportunistic pathogens, of pathogenic filamentous fungi, and of yeasts during the tourism season. Although monitoring of beach sediments for microbiological contamination is not mandatory, and disease transmission from sediments has not yet been demonstrated, our study suggests that beach sediments may act as a reservoir of potential pathogens, including fungi. In addition, the mycoflora displayed high sensitivity to critical environmental situations in the beaches studied. Therefore, the fungal community can be a useful tool for assessing the quality of sandy beaches in terms of sanitary and environmental quality.

  12. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Directory of Open Access Journals (Sweden)

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  13. Opportunistic splitting for scheduling using a score-based approach

    KAUST Repository

    Rashid, Faraan

    2012-06-01

    We consider the problem of scheduling a user in a multi-user wireless environment in a distributed manner. The opportunistic splitting algorithm is applied to find the best group of users without reporting the channel state information to the centralized scheduler. The users find the best among themselves while requiring just a ternary feedback from the common receiver at the end of each mini-slot. The original splitting algorithm is modified to handle users with asymmetric channel conditions. We use a score-based approach with the splitting algorithm to introduce time and throughput fairness while exploiting the multi-user diversity of the network. Analytical and simulation results are given to show that the modified score-based splitting algorithm works well as a fair scheduling scheme with good spectral efficiency and reduced feedback. © 2012 IEEE.

  14. Accurate outage analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2011-01-01

    In this paper, we investigate a dual-hop decode-and-forward opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. We first derive the exact statistics of received signal-to-noise (SNR) over each hop with co-located relays, in terms of probability density function (PDF). Then, the PDFs are used to determine very accurate closed-form expression for the outage probability for a transmission rate R. Furthermore, we perform asymptotic analysis and we deduce the diversity order of the scheme. We validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2011 IEEE.

  15. Accurate outage analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel

    2011-04-01

    In this paper, we investigate a dual-hop decode-and-forward opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. We first derive the exact statistics of received signal-to-noise (SNR) over each hop with co-located relays, in terms of probability density function (PDF). Then, the PDFs are used to determine very accurate closed-form expression for the outage probability for a transmission rate R. Furthermore, we perform asymptotic analysis and we deduce the diversity order of the scheme. We validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2011 IEEE.

  16. Dynamic Downlink Spectrum Access for D2D-Enabled Heterogeneous Networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2018-01-15

    This paper proposes new approaches for underlay device- to-device (D2D) communication in spectrum-shared het- erogeneous cellular networks. It considers devices that share downlink resources and have an enabled D2D feature to improve coverage. The mode of operation classifies devices according to their experienced base station (BS) coverage, potential to be served by BS, ability of BS to meet their quality of service (QoS), and their downlink resources occupancy. The initiation of D2D cooperation is conditioned on proposed provisional access by an active device, wherein its serving BS attempts to meet its QoS using as low number of spectrum channels as possible, while treating remaining channels for feasible D2D cooperation. Detailed formulations for the mode of operation and a proposed D2D path allocation scheme are presented under perfect and imperfect operation scenarios. The developed results are generally applicable for any performance metric and network model.

  17. Extended-spectrum β-lactamase-producing Escherichia coli isolated from poultry

    DEFF Research Database (Denmark)

    Olsen, Rikke Heidemann; Bisgaard, Magne; Löhren, Ulrich

    2014-01-01

    Extended-spectrum β-lactamase (ESBL)-producing Escherichia coli has been documented in humans as well as in food-producing birds, including chickens, and for unknown reasons the prevalence has increased significantly during the last decade. With E. coli as a major opportunistic pathogen in chickens...... and with a potential for zoonotic transfer to human beings, ESBL-producing E. coli represents a major risk both to poultry production and to human health. This review presents some of the current problems with ESBL-producing E. coli in relation to poultry production, with a focus on chickens. To illustrate issues...... in relation to screening and typing, two case studies are included where one collection of ESBL-producing E. coli isolates was obtained from asymptomatic carrier chickens while the other was obtained from lesions in chickens. Pulsed-field gel electrophoresis and multi-locus sequence typing revealed a highly...

  18. Activation and coagulation biomarkers are independent predictors of the development of opportunistic disease in patients with HIV infection

    DEFF Research Database (Denmark)

    Rodger, Alison J; Fox, Zoe; Lundgren, Jens

    2009-01-01

    BACKGROUND: Activation and coagulation biomarkers were measured within the Strategies for Management of Antiretroviral Therapy (SMART) trial. Their associations with opportunistic disease (OD) in human immunodeficiency virus (HIV)-positive patients were examined. METHODS: Inflammatory (high-sensi...

  19. Trends in overall opportunistic illnesses, Pneumocystis carinii pneumonia, cerebral toxoplasmosis and Mycobacterium avium complex incidence rates over the 30 years of the HIV epidemic: a systematic review

    Directory of Open Access Journals (Sweden)

    Lara Coelho

    2014-03-01

    Conclusions: Opportunistic illnesses remain an important public health problem. To better guide health policies in low/middle-income settings, multicenter cohort studies should be encouraged. Studies from Brazil are urgently needed to assess the current burden of opportunistic illnesses in our population and to support the planning of HIV/AIDS health care services organization.

  20. Impact-parameter-averaged probability of 3dσ - Vacancy sharing in heavy systems

    International Nuclear Information System (INIS)

    Marble, D.K.; McDaniel, F.D.; Zoran, V.; Szilagyi, Z.; Piticu, I.; Fluerasu, D.; Enulescu, A.; Dumitriu, D.; Bucur, B.I.; Ciortea, C.

    1993-01-01

    The probabilities for the 3dσ molecular vacancy sharing in the 0.08 - 1.75 MeV/u F, Co, Ni, Cu + Bi collisions have been estimated by using integral X-ray spectrum measurement. The analytic two-state exponential model of Nikitin has been applied to 3dσ -2p 3/2 vacancy sharing in these collisions systems. This describes satisfactory the velocity dependence at low energies, < 0.5 MeV/u, but around 1 MeV/u the velocity dependence changes its character, indicating departure from the hypotheses of the model. (Author)

  1. Identification of risk loci with shared effects on five major psychiatric disorders

    DEFF Research Database (Denmark)

    Steinhausen, Hans-Christoph E.; Strauss, John; Strohmaier, Jana

    2013-01-01

    Findings from family and twin studies suggest that genetic contributions to psychiatric disorders do not in all cases map to present diagnostic categories. We aimed to identify specific variants underlying genetic effects shared between the five disorders in the Psychiatric Genomics Consortium: a......: autism spectrum disorder, attention deficit-hyperactivity disorder, bipolar disorder, major depressive disorder, and schizophrenia.......Findings from family and twin studies suggest that genetic contributions to psychiatric disorders do not in all cases map to present diagnostic categories. We aimed to identify specific variants underlying genetic effects shared between the five disorders in the Psychiatric Genomics Consortium...

  2. Opportunistic Sensor Data Collection with Bluetooth Low Energy

    Directory of Open Access Journals (Sweden)

    Sergio Aguilar

    2017-01-01

    Full Text Available Bluetooth Low Energy (BLE has gained very high momentum, as witnessed by its widespread presence in smartphones, wearables and other consumer electronics devices. This fact can be leveraged to carry out opportunistic sensor data collection (OSDC in scenarios where a sensor node cannot communicate with infrastructure nodes. In such cases, a mobile entity (e.g., a pedestrian or a vehicle equipped with a BLE-enabled device can collect the data obtained by the sensor node when both are within direct communication range. In this paper, we characterize, both analytically and experimentally, the performance and trade-offs of BLE as a technology for OSDC, for the two main identified approaches, and considering the impact of its most crucial configuration parameters. Results show that a BLE sensor node running on a coin cell battery can achieve a lifetime beyond one year while transferring around 10 Mbit/day, in realistic OSDC scenarios.

  3. Effect of threshold quantization in opportunistic splitting algorithm

    KAUST Repository

    Nam, Haewoon

    2011-12-01

    This paper discusses algorithms to find the optimal threshold and also investigates the impact of threshold quantization on the scheduling outage performance of the opportunistic splitting scheduling algorithm. Since this algorithm aims at finding the user with the highest channel quality within the minimal number of mini-slots by adjusting the threshold every mini-slot, optimizing the threshold is of paramount importance. Hence, in this paper we first discuss how to compute the optimal threshold along with two tight approximations for the optimal threshold. Closed-form expressions are provided for those approximations for simple calculations. Then, we consider linear quantization of the threshold to take the limited number of bits for signaling messages in practical systems into consideration. Due to the limited granularity for the quantized threshold value, an irreducible scheduling outage floor is observed. The numerical results show that the two approximations offer lower scheduling outage probability floors compared to the conventional algorithm when the threshold is quantized. © 2006 IEEE.

  4. Members of native coral microbiota inhibit glycosidases and thwart colonization of coral mucus by an opportunistic pathogen.

    Science.gov (United States)

    Krediet, Cory J; Ritchie, Kim B; Alagely, Ali; Teplitski, Max

    2013-05-01

    The outcome of the interactions between native commensal microorganisms and opportunistic pathogens is crucial to the health of the coral holobiont. During the establishment within the coral surface mucus layer, opportunistic pathogens, including a white pox pathogen Serratia marcescens PDL100, compete with native bacteria for available nutrients. Both commensals and pathogens employ glycosidases and N-acetyl-glucosaminidase to utilize components of coral mucus. This study tested the hypothesis that specific glycosidases were critical for the growth of S. marcescens on mucus and that their inhibition by native coral microbiota reduces fitness of the pathogen. Consistent with this hypothesis, a S. marcescens transposon mutant with reduced glycosidase and N-acetyl-glucosaminidase activities was unable to compete with the wild type on the mucus of the host coral Acropora palmata, although it was at least as competitive as the wild type on a minimal medium with glycerol and casamino acids. Virulence of the mutant was modestly reduced in the Aiptasia model. A survey revealed that ∼8% of culturable coral commensal bacteria have the ability to inhibit glycosidases in the pathogen. A small molecular weight, ethanol-soluble substance(s) produced by the coral commensal Exiguobacterium sp. was capable of the inhibition of the induction of catabolic enzymes in S. marcescens. This inhibition was in part responsible for the 10-100-fold reduction in the ability of the pathogen to grow on coral mucus. These results provide insight into potential mechanisms of commensal interference with early colonization and infection behaviors in opportunistic pathogens and highlight an important function for the native microbiota in coral health.

  5. Scheduling for dual-hop block-fading channels with two source-user pairs sharing one relay

    KAUST Repository

    Zafar, Ammar

    2013-09-01

    In this paper, we maximize the achievable rate region of a dual-hop network with two sources serving two users independently through a single shared relay. We formulate the problem as maximizing the sum of the weighted long term average throughputs of the two users under stability constraints on the long term throughputs of the source-user pairs. In order to solve the problem, we propose a joint user-and-hop scheduling scheme, which schedules the first or second hop opportunistically based on instantaneous channel state information, in order to exploit multiuser diversity and multihop diversity gains. Numerical results show that the proposed joint scheduling scheme enhances the achievable rate region as compared to a scheme that employs multi-user scheduling on the second-hop alone. Copyright © 2013 by the Institute of Electrical and Electronic Engineers, Inc.

  6. Exact performance analysis of decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel

    2010-06-01

    In this paper, we investigate a dual-hop decode-and-forward opportunistic relaying scheme where the source may or may not be able to communicate directly with the destination. In our study, we consider a regenerative relaying scheme in which the decision to cooperate takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive an exact closed-form expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact statistics of each hop. Unlike existing works where the analysis focused on high signal-to-noise ratio (SNR) regime, such results are important to enable the designers to take decisions regarding practical systems that operate at low SNR regime. We show that performance simulation results coincide with our analytical results.

  7. Cognitive radio networks efficient resource allocation in cooperative sensing, cellular communications, high-speed vehicles, and smart grid

    CERN Document Server

    Jiang, Tao; Cao, Yang

    2015-01-01

    PrefaceAcknowledgmentsAbout the AuthorsIntroductionCognitive Radio-Based NetworksOpportunistic Spectrum Access NetworksCognitive Radio Networks with Cooperative SensingCognitive Radio Networks for Cellular CommunicationsCognitive Radio Networks for High-Speed VehiclesCognitive Radio Networks for a Smart GridContent and OrganizationTransmission Slot Allocation in an Opportunistic Spectrum Access NetworkSingle-User Single-Channel System ModelProbabilistic Slot Allocation SchemeOptimal Probabilistic Slot AllocationBaseline PerformanceExponential DistributionHyper-Erlang DistributionPerformance An

  8. Reduction rules-based search algorithm for opportunistic replacement strategy of multiple life-limited parts

    Directory of Open Access Journals (Sweden)

    Xuyun FU

    2018-01-01

    Full Text Available The opportunistic replacement of multiple Life-Limited Parts (LLPs is a problem widely existing in industry. The replacement strategy of LLPs has a great impact on the total maintenance cost to a lot of equipment. This article focuses on finding a quick and effective algorithm for this problem. To improve the algorithm efficiency, six reduction rules are suggested from the perspectives of solution feasibility, determination of the replacement of LLPs, determination of the maintenance occasion and solution optimality. Based on these six reduction rules, a search algorithm is proposed. This search algorithm can identify one or several optimal solutions. A numerical experiment shows that these six reduction rules are effective, and the time consumed by the algorithm is less than 38 s if the total life of equipment is shorter than 55000 and the number of LLPs is less than 11. A specific case shows that the algorithm can obtain optimal solutions which are much better than the result of the traditional method in 10 s, and it can provide support for determining to-be-replaced LLPs when determining the maintenance workscope of an aircraft engine. Therefore, the algorithm is applicable to engineering applications concerning opportunistic replacement of multiple LLPs in aircraft engines.

  9. To share and be shared

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  10. Positive Traits in the Bipolar Spectrum: The Space between Madness and Genius

    Science.gov (United States)

    Greenwood, Tiffany A.

    2017-01-01

    Bipolar disorder is a severe, lifelong mood disorder for which little is currently understood of the genetic mechanisms underlying risk. By examining related dimensional phenotypes, we may further our understanding of the disorder. Creativity has a historical connection with the bipolar spectrum and is particularly enhanced among unaffected first-degree relatives and those with bipolar spectrum traits. This suggests that some aspects of the bipolar spectrum may confer advantages, while more severe expressions of symptoms negatively influence creative accomplishment. Creativity is a complex, multidimensional construct with both cognitive and affective components, many of which appear to reflect a shared genetic vulnerability with bipolar disorder. It is suggested that a subset of bipolar risk variants confer advantages as positive traits according to an inverted-U-shaped curve with clinically unaffected allele carriers benefitting from the positive traits and serving to maintain the risk alleles in the population. The association of risk genes with creativity in healthy individuals (e.g., NRG1), as well as an overall sharing of common genetic variation between bipolar patients and creative individuals, provides support for this model. Current findings are summarized from a multidisciplinary perspective to demonstrate the feasibility of research in this area to reveal the mechanisms underlying illness. PMID:28277566

  11. Spectrum and power allocation in cognitive multi-beam satellite communications with flexible satellite payloads

    Science.gov (United States)

    Liu, Zhihui; Wang, Haitao; Dong, Tao; Yin, Jie; Zhang, Tingting; Guo, Hui; Li, Dequan

    2018-02-01

    In this paper, the cognitive multi-beam satellite system, i.e., two satellite networks coexist through underlay spectrum sharing, is studied, and the power and spectrum allocation method is employed for interference control and throughput maximization. Specifically, the multi-beam satellite with flexible payload reuses the authorized spectrum of the primary satellite, adjusting its transmission band as well as power for each beam to limit its interference on the primary satellite below the prescribed threshold and maximize its own achievable rate. This power and spectrum allocation problem is formulated as a mixed nonconvex programming. For effective solving, we first introduce the concept of signal to leakage plus noise ratio (SLNR) to decouple multiple transmit power variables in the both objective and constraint, and then propose a heuristic algorithm to assign spectrum sub-bands. After that, a stepwise plus slice-wise algorithm is proposed to implement the discrete power allocation. Finally, simulation results show that adopting cognitive technology can improve spectrum efficiency of the satellite communication.

  12. Ethnopharmacological surveys and pharmacological studies of plants used in traditional medicine in the treatment of HIV/AIDS opportunistic diseases in Gabon.

    Science.gov (United States)

    Tchouya, Guy Raymond Feuya; Souza, Alain; Tchouankeu, Jean Claude; Yala, Jean-Fabrice; Boukandou, Marlaine; Foundikou, Hibrahim; Obiang, Giresse Delphang Nguema; Boyom, Fabrice Fekam; Mabika, Rolande Mabika; Menkem, Elisabeth Zeuko'o; Ndinteh, Derek Tantoh; Lebibi, Jacques

    2015-03-13

    Ethnopharmacological surveys were conducted in two regions of Gabon. This led to highlighting some of the medicinal plants used by local populations in the management of HIV/AIDS opportunistic diseases. Two regions with the highest occurrence of HIV/AIDS cases were visited and ethnopharmarcological data was gathered. These regions were the Estuaire Province (Libreville and its neighborhood) and the Haut-Ogooué Province (Franceville and its neighborhood). The opportunistic diseases and symptomatic conditions considered during this study were: diarrhea, respiratory tract infections, cough, tuberculosis, abscesses, stomach ache, skin rashes, venereal diseases, typhoid fever, anemia, general tiredness, hepatitis and vomiting. The reported species were evaluated through three parameters: specificity, reliability and frequency. Plant parts of relevant species were harvested and extracted with an aqueous alcohol solution (ethanol/water: 1/1). The extracts obtained were submitted to phytochemical screening and in vitro microbiological assays on some clinical isolates and ATCC strains, involved in HIV/AIDS opportunistic diseases through the Agar well diffusion and Microbroth dilution methods. Among the 52 species identified during this survey, Coelocaryon klainei Pierre ex Heckel (Myristicaceae), Dacryodes klaineana (Pierre) H.J. Lam (Bursecaceae), Phyllanthus diandrus Pax (Euphorbiaceae), Saccoglotys gabonensis (Baill.) Urb. (Humiriaceae) and Tetrorchidium didymostemon (Baill.) Pax & K. Hoffm. (Euphorbiaceae) were submitted to in vitro microbiological assays. Phyllanthus diandrus bark and leaves show best antibacterial activities against Pseudomonas aeruginosa and Klebsiella pneumoniae with MIC value of 0.25 respectively. Phytochemical screening revealed the presence in all the plant parts extracts of potentially bioactive molecules, including polyphenols, especially flavonoids and tannins. It is concluded that some of these plants might be submitted to further scientific

  13. The 14-3-3 homolog, ArtA, regulates development and secondary metabolism in the opportunistic plant pathogen Aspergillus flavus

    Science.gov (United States)

    The opportunistic plant pathogenic fungus Aspergillus flavus produces carcinogenic mycotoxins denominated aflatoxins (AFs). Aflatoxin contamination of agriculturally important crops such as maize, peanut, sorghum and tree nuts is responsible for serious adverse health and economic impacts worldwide....

  14. A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs

    Science.gov (United States)

    Xu, Xin; Yuan, Minjiao; Liu, Xiao; Cai, Zhiping; Wang, Tian

    2018-01-01

    In wireless sensor networks (WSNs), communication links are typically error-prone and unreliable, so providing reliable and timely data routing for loss- and delay-sensitive applications in WSNs it is a challenge issue. Additionally, with specific thresholds in practical applications, the loss and delay sensitivity implies requirements for high reliability and low delay. Opportunistic Routing (OR) has been well studied in WSNs to improve reliability for error-prone and unreliable wireless communication links where the transmission power is assumed to be identical in the whole network. In this paper, a Cross-layer Optimized Opportunistic Routing (COOR) scheme is proposed to improve the communication link reliability and reduce delay for loss-and-delay sensitive WSNs. The main contribution of the COOR scheme is making full use of the remaining energy in networks to increase the transmission power of most nodes, which will provide a higher communication reliability or further transmission distance. Two optimization strategies referred to as COOR(R) and COOR(P) of the COOR scheme are proposed to improve network performance. In the case of increasing the transmission power, the COOR(R) strategy chooses a node that has a higher communication reliability with same distance in comparison to the traditional opportunistic routing when selecting the next hop candidate node. Since the reliability of data transmission is improved, the delay of the data reaching the sink is reduced by shortening the time of communication between candidate nodes. On the other hand, the COOR(P) strategy prefers a node that has the same communication reliability with longer distance. As a result, network performance can be improved for the following reasons: (a) the delay is reduced as fewer hops are needed while the packet reaches the sink in longer transmission distance circumstances; (b) the reliability can be improved since it is the product of the reliability of every hop of the routing path

  15. A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs.

    Science.gov (United States)

    Xu, Xin; Yuan, Minjiao; Liu, Xiao; Liu, Anfeng; Xiong, Neal N; Cai, Zhiping; Wang, Tian

    2018-05-03

    In wireless sensor networks (WSNs), communication links are typically error-prone and unreliable, so providing reliable and timely data routing for loss- and delay-sensitive applications in WSNs it is a challenge issue. Additionally, with specific thresholds in practical applications, the loss and delay sensitivity implies requirements for high reliability and low delay. Opportunistic Routing (OR) has been well studied in WSNs to improve reliability for error-prone and unreliable wireless communication links where the transmission power is assumed to be identical in the whole network. In this paper, a Cross-layer Optimized Opportunistic Routing (COOR) scheme is proposed to improve the communication link reliability and reduce delay for loss-and-delay sensitive WSNs. The main contribution of the COOR scheme is making full use of the remaining energy in networks to increase the transmission power of most nodes, which will provide a higher communication reliability or further transmission distance. Two optimization strategies referred to as COOR(R) and COOR(P) of the COOR scheme are proposed to improve network performance. In the case of increasing the transmission power, the COOR(R) strategy chooses a node that has a higher communication reliability with same distance in comparison to the traditional opportunistic routing when selecting the next hop candidate node. Since the reliability of data transmission is improved, the delay of the data reaching the sink is reduced by shortening the time of communication between candidate nodes. On the other hand, the COOR(P) strategy prefers a node that has the same communication reliability with longer distance. As a result, network performance can be improved for the following reasons: (a) the delay is reduced as fewer hops are needed while the packet reaches the sink in longer transmission distance circumstances; (b) the reliability can be improved since it is the product of the reliability of every hop of the routing path

  16. A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs

    Directory of Open Access Journals (Sweden)

    Xin Xu

    2018-05-01

    Full Text Available In wireless sensor networks (WSNs, communication links are typically error-prone and unreliable, so providing reliable and timely data routing for loss- and delay-sensitive applications in WSNs it is a challenge issue. Additionally, with specific thresholds in practical applications, the loss and delay sensitivity implies requirements for high reliability and low delay. Opportunistic Routing (OR has been well studied in WSNs to improve reliability for error-prone and unreliable wireless communication links where the transmission power is assumed to be identical in the whole network. In this paper, a Cross-layer Optimized Opportunistic Routing (COOR scheme is proposed to improve the communication link reliability and reduce delay for loss-and-delay sensitive WSNs. The main contribution of the COOR scheme is making full use of the remaining energy in networks to increase the transmission power of most nodes, which will provide a higher communication reliability or further transmission distance. Two optimization strategies referred to as COOR(R and COOR(P of the COOR scheme are proposed to improve network performance. In the case of increasing the transmission power, the COOR(R strategy chooses a node that has a higher communication reliability with same distance in comparison to the traditional opportunistic routing when selecting the next hop candidate node. Since the reliability of data transmission is improved, the delay of the data reaching the sink is reduced by shortening the time of communication between candidate nodes. On the other hand, the COOR(P strategy prefers a node that has the same communication reliability with longer distance. As a result, network performance can be improved for the following reasons: (a the delay is reduced as fewer hops are needed while the packet reaches the sink in longer transmission distance circumstances; (b the reliability can be improved since it is the product of the reliability of every hop of the

  17. Large scale fusion of gray matter and resting-state functional MRI reveals common and shared biological markers across the psychosis spectrum in the B-SNIP cohort

    Directory of Open Access Journals (Sweden)

    Zheng eWang

    2015-12-01

    Full Text Available To investigate whether aberrant interactions between brain structure and function present similarly or differently across probands with psychotic illnesses (schizophrenia (SZ, schizoaffective disorder (SAD, and bipolar I disorder with psychosis (BP and whether these deficits are shared with their first-degree non-psychotic relatives. A total of 1199 subjects were assessed, including 220 SZ, 147 SAD, 180 psychotic BP, 150 first-degree relatives of SZ, 126 SAD relatives, 134 BP relatives and 242 healthy controls. All subjects underwent structural MRI (sMRI and resting-state functional MRI (rs-fMRI scanning. Joint independent analysis (jICA was used to fuse sMRI gray matter (GM and rs-fMRI amplitude of low frequency fluctuations (ALFF data to identify the relationship between the two modalities. Joint ICA revealed two significantly fused components. The association between functional brain alteration in a prefrontal-striatal-thalamic-cerebellar network and structural abnormalities in the default mode network (DMN was found to be common across psychotic diagnoses and correlated with cognitive function, social function and Schizo-Bipolar Scale (SBS scores. The fused alteration in the temporal lobe was unique to SZ and SAD. The above effects were not seen in any relative group (including those with cluster-A personality. Using a multivariate fused approach involving two widely used imaging markers we demonstrate both shared and distinct biological traits across the psychosis spectrum. Further, our results suggest that the above traits are psychosis biomarkers rather than endophenotypes.

  18. Effective but costly, evolved mechanisms of defense against a virulent opportunistic pathogen in Drosophila melanogaster.

    OpenAIRE

    Yixin H Ye; Stephen F Chenoweth; Elizabeth A McGraw

    2009-01-01

    Drosophila harbor substantial genetic variation for antibacterial defense, and investment in immunity is thought to involve a costly trade-off with life history traits, including development, life span, and reproduction. To understand the way in which insects invest in fighting bacterial infection, we selected for survival following systemic infection with the opportunistic pathogen Pseudomonas aeruginosa in wild-caught Drosophila melanogaster over 10 generations. We then examined genome-wide...

  19. A Preemptive Link State Spanning Tree Source Routing Scheme for Opportunistic Data Forwarding in MANET

    OpenAIRE

    R. Poonkuzhali; M. Y. Sanavullah; A. Sabari

    2014-01-01

    Opportunistic Data Forwarding (ODF) has drawn much attention in mobile adhoc networking research in recent years. The effectiveness of ODF in MANET depends on a suitable routing protocol which provides a powerful source routing services. PLSR is featured by source routing, loop free and small routing overhead. The update messages in PLSR are integrated into a tree structure and no need to time stamp routing updates which reduces the routing overhead.

  20. CD4 descriptions at various clinical HIV/AIDS stages with tuberculosis and non-tuberculosis opportunistic infections at dr. Zainoel Abidin hospital in Banda Aceh, Indonesia

    Science.gov (United States)

    Shaleh, A. S.; Fahrial; Siregar, M. L.; Jamil, K. F.

    2018-03-01

    Human Immunodeficiency Virus (HIV) / Acquired Immune Deficiency Syndrome (AIDS) is a retrovirus that infects the human immune system. Damaged immunity in HIV/AIDS patients is marked by a decline in CD4 cells. Opportunistic infections appear differently, depending on the levels of immunosuppressive degrees, and the frequency of opportunistic infections in the environment. This study aims to describe the CD4 at various clinical stages of HIV/AIDS with tuberculosis and non-tuberculosis opportunistic infections (OI). Descriptive study with a cross-sectional design. This study is secondary data obtained from the medical records of patients with HIV/AIDS in the period of January 2011 - December 2015 at dr. Zainoel Abidin Hospital in Banda Aceh. The samples that met the inclusion criteria were 135 people with 63 cases were tuberculosis OI, 33 cases were non-tuberculosis and 39 cases were without OI. The study showed CD4 tuberculosis OI and 93.9% for non-tuberculosis OI.

  1. Simulation of emergency response operations for a static chemical spill within a building using an opportunistic resource utilization network

    NARCIS (Netherlands)

    Lilien, L.T.; Elbes, M.W.; Ben Othmane, L.; Salih, R.M.

    2013-01-01

    We investigate supporting emergency response operations with opportunistic resource utilization networks ("oppnets"), based on a network paradigm for inviting and integrating diverse devices and systems available in the environment. We simulate chemical spill on a single floor of a building and

  2. Theoretical analysis of the effect of charge-sharing on the Detective Quantum Efficiency of single-photon counting segmented silicon detectors

    Energy Technology Data Exchange (ETDEWEB)

    Marchal, J [Diamond Light Source Ltd, Harwell Science and Innovation Campus, Didcot, Oxfordshire OX11 0DE (United Kingdom)], E-mail: julien.marchal@diamond.ac.uk

    2010-01-15

    A detector cascaded model is proposed to describe charge-sharing effect in single-photon counting segmented silicon detectors. Linear system theory is applied to this cascaded model in order to derive detector performance parameters such as large-area gain, presampling Modulation Transfer Function (MTF), Noise Power Spectrum (NPS) and Detective Quantum Efficiency (DQE) as a function of energy detection threshold. This theory is used to model one-dimensional detectors (i.e. strip detectors) where X-ray-generated charge can be shared between two sampling elements, but the concepts developed in this article can be generalized to two-dimensional arrays of detecting elements (i.e. pixels detectors). The zero-frequency DQE derived from this model is consistent with expressions reported in the literature using a different method. The ability of this model to simulate the effect of charge sharing on image quality in the spatial frequency domain is demonstrated by applying it to a hypothetical one-dimensional single-photon counting detector illuminated with a typical mammography spectrum.

  3. The Black Yeast Exophiala dermatitidis and Other Selected Opportunistic Human Fungal Pathogens Spread from Dishwashers to Kitchens.

    Directory of Open Access Journals (Sweden)

    Jerneja Zupančič

    Full Text Available We investigated the diversity and distribution of fungi in nine different sites inside 30 residential dishwashers. In total, 503 fungal strains were isolated, which belong to 10 genera and 84 species. Irrespective of the sampled site, 83% of the dishwashers were positive for fungi. The most frequent opportunistic pathogenic species were Exophiala dermatitidis, Candida parapsilosis sensu stricto, Exophiala phaeomuriformis, Fusarium dimerum, and the Saprochaete/Magnusiomyces clade. The black yeast E. dermatitidis was detected in 47% of the dishwashers, primarily at the dishwasher rubber seals, at up to 106 CFU/cm2; the other fungi detected were in the range of 102 to 105 CFU/cm2. The other most heavily contaminated dishwasher sites were side nozzles, doors and drains. Only F. dimerum was isolated from washed dishes, while dishwasher waste water contained E. dermatitidis, Exophiala oligosperma and Sarocladium killiense. Plumbing systems supplying water to household appliances represent the most probable route for contamination of dishwashers, as the fungi that represented the core dishwasher mycobiota were also detected in the tap water. Hot aerosols from dishwashers contained the human opportunistic yeast C. parapsilosis, Rhodotorula mucilaginosa and E. dermatitidis (as well as common air-borne genera such as Aspergillus, Penicillium, Trichoderma and Cladosporium. Comparison of fungal contamination of kitchens without and with dishwashers revealed that virtually all were contaminated with fungi. In both cases, the most contaminated sites were the kitchen drain and the dish drying rack. The most important difference was higher prevalence of black yeasts (E. dermatitidis in particular in kitchens with dishwashers. In kitchens without dishwashers, C. parapsilosis strongly prevailed with negligible occurrence of E. dermatitidis. F. dimerum was isolated only from kitchens with dishwashers, while Saprochaete/Magnusiomyces isolates were only found within

  4. Temperature-dependent inhibition of opportunistic Vibrio pathogens by native coral commensal bacteria.

    Science.gov (United States)

    Frydenborg, Beck R; Krediet, Cory J; Teplitski, Max; Ritchie, Kim B

    2014-02-01

    Bacteria living within the surface mucus layer of corals compete for nutrients and space. A number of stresses affect the outcome of this competition. The interactions between native microorganisms and opportunistic pathogens largely determine the coral holobiont's overall health and fitness. In this study, we tested the hypothesis that commensal bacteria isolated from the mucus layer of a healthy elkhorn coral, Acropora palmata, are capable of inhibition of opportunistic pathogens, Vibrio shiloi AK1 and Vibrio coralliilyticus. These vibrios are known to cause disease in corals and their virulence is temperature dependent. Elevated temperature (30 °C) increased the cell numbers of one commensal and both Vibrio pathogens in monocultures. We further tested the hypothesis that elevated temperature favors pathogenic organisms by simultaneously increasing the fitness of vibrios and decreasing the fitness of commensals by measuring growth of each species within a co-culture over the course of 1 week. In competition experiments between vibrios and commensals, the proportion of Vibrio spp. increased significantly under elevated temperature. We finished by investigating several temperature-dependent mechanisms that could influence co-culture differences via changes in competitive fitness. The ability of Vibrio spp. to utilize glycoproteins found in A. palmata mucus increased or remained stable when exposed to elevated temperature, while commensals' tended to decrease utilization. In both vibrios and commensals, protease activity increased at 30 °C, while chiA expression increased under elevated temperatures for Vibrio spp. These results provide insight into potential mechanisms through which elevated temperature may select for pathogenic bacterial dominance and lead to disease or a decrease in coral fitness.

  5. Insights on the Horizontal Gene Transfer of Carbapenemase Determinants in the Opportunistic Pathogen Acinetobacter baumannii

    Science.gov (United States)

    Da Silva, Gabriela Jorge; Domingues, Sara

    2016-01-01

    Horizontal gene transfer (HGT) is a driving force to the evolution of bacteria. The fast emergence of antimicrobial resistance reflects the ability of genetic adaptation of pathogens. Acinetobacter baumannii has emerged in the last few decades as an important opportunistic nosocomial pathogen, in part due to its high capacity of acquiring resistance to diverse antibiotic families, including to the so-called last line drugs such as carbapenems. The rampant selective pressure and genetic exchange of resistance genes hinder the effective treatment of resistant infections. A. baumannii uses all the resistance mechanisms to survive against carbapenems but production of carbapenemases are the major mechanism, which may act in synergy with others. A. baumannii appears to use all the mechanisms of gene dissemination. Beyond conjugation, the mostly reported recent studies point to natural transformation, transduction and outer membrane vesicles-mediated transfer as mechanisms that may play a role in carbapenemase determinants spread. Understanding the genetic mobilization of carbapenemase genes is paramount in preventing their dissemination. Here we review the carbapenemases found in A. baumannii and present an overview of the current knowledge of contributions of the various HGT mechanisms to the molecular epidemiology of carbapenem resistance in this relevant opportunistic pathogen. PMID:27681923

  6. Updates on Aspergillus, Pneumocystis and other opportunistic pulmonary mycoses.

    Science.gov (United States)

    Curbelo, Jose; Galván, Jose María; Aspa, Javier

    2015-12-01

    Mycoses are serious diseases with potentially fatal outcome. The introduction of immunosuppressive treatments and life support techniques has led to a growing prevalence of different degrees of immunosuppression. Compromised immune response is the primary risk factor for the development of opportunistic mycoses. Early diagnosis and treatment are crucial for improving prognosis. However, isolation in cultures or identification using antigen detection techniques cannot distinguish between colonization and invasive infection, and the clinical status of the patient often prevents biopsy sampling. Clinicians thus find themselves in an uncertain position, requiring them to quickly recognize clinical and radiological signs and interpret microbiological results in context. The aim of this review is to provide a general overview of the profile of patients susceptible to these infections, the role of the immune system and, in more detail, the major diagnostic developments that have gained most acceptance and recognition among the scientific community. Copyright © 2014 SEPAR. Published by Elsevier Espana. All rights reserved.

  7. Value of 67Ga scintigraphy in primary diagnosis and follow-up of opportunistic pneumonias in patients with AIDS

    International Nuclear Information System (INIS)

    Tatsch, K.; Knesewitsch, P.; Kirsch, C.M.; Kueffer, G.; Doerner, G.; Moser, E.; Matuschke, A.; Bogner, J.; Goebel, F.D.

    1988-01-01

    Opportunistic pneumonias are a life-threatening complication in patients with AIDS. Early diagnosis and therapy is necessary to improve prognosis. This study was designed to assess the value of 67 Ga scintigraphy in the primary detection and follow-up of these special pneumonias. 67 Ga scintigraphy was performed in 40 patients: 10 normal controls and 30 HIV-positive patients with AIDS or AIDS-related complex (ARC). 67 Ga scan results were compared with current chest radiographs and the results of pathogen detection. The evaluation of positive scans was based on a quantification of the pulmonary uptake, expressed as a pulmonary/soft-tissue uptake ratio. Only 8/30 patients had a normal scan, 22/30 showed diffuse (13/22) or focal (9/22) increases of pulmonary uptake. In 7/8 patients with normal scans the chest radiograph was negative as well. The one patient with negative scan but positive chest radiograph had pulmonary Kaposi's sarcoma. In 11/22 patients the 67 Ga scan and chest radiograph were positive simultaneously. In the other 11/22 patients with positive scans chest radiographs were initially negative but showed pathology in 5 cases within 1-2 weeks. The reason for positive scans in most cases was an opportunistic lung infection; other forms of pneumonia were only observed in two cases. The defined uptake ratio demonstrated to be a highly sensitive parameter for monitoring pneumonia and the effects of therapy in follow-up studies. In conclusion, quantitative 67 Ga scintigraphy proved to be a reliable and highly sensitive method for primary detection and follow-up of opportunistic pneumonias in patients with AIDS. (orig.) [de

  8. Technology-Based Shared Story Reading for Students with Autism Who Are English-Language Learners

    Science.gov (United States)

    Alison, Caryn; Root, Jenny R.; Browder, Diane M.; Wood, Leah

    2017-01-01

    Demonstrating comprehension of text is a complex skill that is an area of difficulty for many students with autism spectrum disorder (ASD). Shared story reading is an intervention that has a history of effectiveness in teaching literacy skills to students with extensive support needs. This study used a multiple probe across participants design to…

  9. Opportunistic Neurologic Infections in Patients with Acquired Immunodeficiency Syndrome (AIDS).

    Science.gov (United States)

    Albarillo, Fritzie; O'Keefe, Paul

    2016-01-01

    Infections of the central nervous system (CNS) in individuals with human immunodeficiency virus (HIV) remain a substantial cause of morbidity and mortality despite the introduction of highly active antiretroviral therapy (HAART) especially in the resource-limited regions of the world. Diagnosis of these infections may be challenging because findings on cerebrospinal fluid (CSF) analysis and brain imaging are nonspecific. While brain biopsy provides a definitive diagnosis, it is an invasive procedure associated with a relatively low mortality rate, thus less invasive modalities have been studied in recent years. Diagnosis, therefore, can be established based on a combination of a compatible clinical syndrome, radiologic and CSF findings, and understanding of the role of HIV in these infections. The most common CNS opportunistic infections are AIDS-defining conditions; thus, treatment of these infections in combination with HAART has greatly improved survival.

  10. Associations among Vocabulary, Executive Function Skills and Empathy in Individuals with Autism Spectrum Disorder

    Science.gov (United States)

    Cascia, JoAnne; Barr, Jason J.

    2017-01-01

    Background: Individuals with autism spectrum disorder (ASD) have been characterized as having deficits in social communication and empathy which present difficulties in the areas of social reciprocity, sharing of emotions and developing and maintaining relationships. This study explores the associations between vocabulary, executive function…

  11. Symbiotic mutualism with a community of opportunistic ants: protection, competition, and ant occupancy of the myrmecophyte Barteria nigritana (Passifloraceae)

    Science.gov (United States)

    Djiéto-Lordon, Champlain; Dejean, Alain; Gibernau, Marc; Hossaert-McKey, Martine; McKey, Doyle

    2004-10-01

    Barteria nigritana is a myrmecophyte tree of Lower Guinea coastal vegetation. Unlike the more specialised B. fistulosa, which harbours a single host-specific mutualistic ant, B. nigritana is associated with several opportunistic ants. Such symbiotic, yet opportunistic, ant-plant associations have been little studied. On 113 clumps of B. nigritana, we censused ant associates and herbivores and compared herbivory on plants occupied by different ants. In addition to these correlative data, protection conferred by different ant species was compared by herbivore-placement experiments. Identity of ant associate changed predictably over plant ontogeny. Pheidole megacephala was restricted to very small plants; saplings were occupied by either Oecophylla longinoda or Crematogaster sp., and the latter species was the sole occupant of larger trees. Damage by caterpillars of the nymphalid butterfly Acraea zetes accounted for much of the herbivory to leaves. Ant species differed in the protection provided to hosts. While P. megacephala provided no significant protection, plants occupied by O. longinoda and Crematogaster sp. suffered less damage than did unoccupied plants or those occupied by P. megacephala. Furthermore, O. longinoda provided more effective protection than did Crematogaster sp. Herbivore-placement experiments confirmed these results. Workers of O. longinoda killed or removed all larval instars of A. zetes. Crematogaster preyed on only the two first larval instars, and P. megacephala preyed mainly on eggs, only rarely attacking the two first larval instars. Opportunistic ants provided significant protection to this relatively unspecialised myrmecophyte. The usual associate of mature trees was not the species that provided most protection.

  12. Shared Management Information in Buyer/Supplier Relationships: Its Usefulness and its Influence on Continuity Expectations

    Directory of Open Access Journals (Sweden)

    Juan Manuel Ramón Jerónimo

    2007-12-01

    Full Text Available This paper is focused on the effect that the exchange of management information has on client and/or supplier relationships. Moreover, this study extends the concept of the usefulness of management control information to inter-organizational relationships, analysing how the scope of such information affects continuity expectations, and how these in turn influence opportunistic behaviour and the mutual adaptation of production systems. The data was gathered from 104 purchasing and 90 sales managers of equipment manufacturers on the nature of their respective relationships with their suppliers/ clients. The results confirm that the use of broad-scope management control information sharing in buyer-supplier relationships increases continuity expectations and reduces opportunistic behaviour.El objetivo de este trabajo es analizar el efecto que ejerce el intercambio de información de gestión sobre las relaciones con clientes y/o proveedores. Para ello, se extiende el concepto de la utilidad de información de control de gestión a las relaciones ínter-organizativas, analizando cómo su contenido afecta a las expectativas de continuidad y éstas a su vez influyen en el comportamiento oportunista y en la adaptación mutua de sistemas de producción. Los datos analizados se han obtenido de las relaciones entre 104 directores de compras y 90 directores de ventas de empresas industriales con sus proveedores y clientes. Los resultados confirman que utilizar información compartida de control de gestión con un contenido más amplio en las relaciones compredor/proveedor favorece la creación de expectativas de continuidad y reduce comportamientos oportunistas.

  13. Application of diffusion tensor imaging in AIDS patients with brain opportunistic diseases: A comparative study of tuberculosis and toxoplasmosis

    Directory of Open Access Journals (Sweden)

    Xiang-le Chu

    2015-06-01

    Conclusions: Quantitative DTI is valuable for diagnosis and differential diagnosis of patients with AIDS-associated infections, and also could provide references for clinical physicians for proper medications. The quantitative FA value could help better reveal different changes of microstructural integrity between different opportunistic infections.

  14. Big data from small data: data-sharing in the ‘long tail’ of neuroscience

    Science.gov (United States)

    Ferguson, Adam R; Nielson, Jessica L; Cragin, Melissa H; Bandrowski, Anita E; Martone, Maryann E

    2016-01-01

    The launch of the US BRAIN and European Human Brain Projects coincides with growing international efforts toward transparency and increased access to publicly funded research in the neurosciences. The need for data-sharing standards and neuroinformatics infrastructure is more pressing than ever. However, ‘big science’ efforts are not the only drivers of data-sharing needs, as neuroscientists across the full spectrum of research grapple with the overwhelming volume of data being generated daily and a scientific environment that is increasingly focused on collaboration. In this commentary, we consider the issue of sharing of the richly diverse and heterogeneous small data sets produced by individual neuroscientists, so-called long-tail data. We consider the utility of these data, the diversity of repositories and options available for sharing such data, and emerging best practices. We provide use cases in which aggregating and mining diverse long-tail data convert numerous small data sources into big data for improved knowledge about neuroscience-related disorders. PMID:25349910

  15. Power allocation and achievable data rate in spectrum-sharing channels under adaptive primary service outage constraints

    KAUST Repository

    Yang, Yuli; Aï ssa, Sonia

    2012-01-01

    used, provides an interference-tolerable zone. Based on this gap, a secondary user (SU) has an increased opportunity to access the licensed spectrum and to determine the transmit power it should use to keep the PU's quality-of-service (QoS) unaffected

  16. Structural Brain Abnormalities in Adolescents with Autism Spectrum Disorder and Patients with Attention Deficit/Hyperactivity Disorder

    Science.gov (United States)

    Brieber, Sarah; Neufang, Susanne; Bruning, Nicole; Kamp-Becker, Inge; Remschmidt, Helmut; Herpertz-Dahlmann, Beate; Fink, Gereon R.; Konrad, Kerstin

    2007-01-01

    Background: Although autism spectrum disorder (ASD) and attention deficit/hyperactivity disorder (ADHD) are two distinct neurodevelopmental diseases, they share behavioural, neuropsychological and neurobiological characteristics. For the identification of endophenotypes across diagnostic categories, further investigations of phenotypic overlap…

  17. FPGA-based RF spectrum merging and adaptive hopset selection

    Science.gov (United States)

    McLean, R. K.; Flatley, B. N.; Silvius, M. D.; Hopkinson, K. M.

    The radio frequency (RF) spectrum is a limited resource. Spectrum allotment disputes stem from this scarcity as many radio devices are confined to a fixed frequency or frequency sequence. One alternative is to incorporate cognition within a reconfigurable radio platform, therefore enabling the radio to adapt to dynamic RF spectrum environments. In this way, the radio is able to actively sense the RF spectrum, decide, and act accordingly, thereby sharing the spectrum and operating in more flexible manner. In this paper, we present a novel solution for merging many distributed RF spectrum maps into one map and for subsequently creating an adaptive hopset. We also provide an example of our system in operation, the result of which is a pseudorandom adaptive hopset. The paper then presents a novel hardware design for the frequency merger and adaptive hopset selector, both of which are written in VHDL and implemented as a custom IP core on an FPGA-based embedded system using the Xilinx Embedded Development Kit (EDK) software tool. The design of the custom IP core is optimized for area, and it can process a high-volume digital input via a low-latency circuit architecture. The complete embedded system includes the Xilinx PowerPC microprocessor, UART serial connection, and compact flash memory card IP cores, and our custom map merging/hopset selection IP core, all of which are targeted to the Virtex IV FPGA. This system is then incorporated into a cognitive radio prototype on a Rice University Wireless Open Access Research Platform (WARP) reconfigurable radio.

  18. Obsessive-compulsive disorder spectrum as a scientific "metaphor".

    Science.gov (United States)

    Pallanti, Stefano; Hollander, Eric

    2008-09-01

    As a result of clinical, epidemiological, neuroimaging, and therapy studies that took place in the late 1980s, obsessive-compulsive disorder (OCD) has been well-characterized in the field of anxiety disorders. Other disorders attracted attention for their similarities to OCD, and were located in the orbit of the disorder. OCD has become known as the "primary domain" of a scientific "metaphor" comprising the putative cluster of OCD-related disorders (OCRDs). It is a "paradigm" with which to explore basal ganglia dysfunction. The OCRDs share common phenomenology, comorbidities, lifetime course, demographics, possible genetics, and frontostriatal dysfunction (particularly caudate hyperactivity.) The adoption of this metaphor analogy has proven useful. However, 15 years since its emergence, the spectrum of obsessive-compulsive disorders remains controversial. Questions under debate include whether OCD is a unitary or split condition, whether it is an anxiety disorder, and whether there exists only one spectrum or several possible spectrums. Further work is needed to clarify obsessive-compulsive symptoms, subtypes, and endophenotypes. There is need to integrate existing databases, better define associated symptom domains, and create a more comprehensive endophenotyping protocol for OCRDs. There is also a need to integrate biological and psychological perspectives, concepts, and data to drive this evolution. By increasing research in this field, the OCD spectrum may evolve from a fragmented level of conceptualization as a "metaphor" to one that is more comprehensive and structured.

  19. A New Digital Signal Processing Method for Spectrum Interference Monitoring

    Science.gov (United States)

    Angrisani, L.; Capriglione, D.; Ferrigno, L.; Miele, G.

    2011-01-01

    Frequency spectrum is a limited shared resource, nowadays interested by an ever growing number of different applications. Generally, the companies providing such services pay to the governments the right of using a limited portion of the spectrum, consequently they would be assured that the licensed radio spectrum resource is not interested by significant external interferences. At the same time, they have to guarantee that their devices make an efficient use of the spectrum and meet the electromagnetic compatibility regulations. Therefore the competent authorities are called to control the access to the spectrum adopting suitable management and monitoring policies, as well as the manufacturers have to periodically verify the correct working of their apparatuses. Several measurement solutions are present on the market. They generally refer to real-time spectrum analyzers and measurement receivers. Both of them are characterized by good metrological accuracies but show costs, dimensions and weights that make no possible a use "on the field". The paper presents a first step in realizing a digital signal processing based measurement instrument able to suitably accomplish for the above mentioned needs. In particular the attention has been given to the DSP based measurement section of the instrument. To these aims an innovative measurement method for spectrum monitoring and management is proposed in this paper. It performs an efficient sequential analysis based on a sample by sample digital processing. Three main issues are in particular pursued: (i) measurement performance comparable to that exhibited by other methods proposed in literature; (ii) fast measurement time, (iii) easy implementation on cost-effective measurement hardware.

  20. Dynamic fair node spectrum allocation for ad hoc networks using random matrices

    Science.gov (United States)

    Rahmes, Mark; Lemieux, George; Chester, Dave; Sonnenberg, Jerry

    2015-05-01

    Dynamic Spectrum Access (DSA) is widely seen as a solution to the problem of limited spectrum, because of its ability to adapt the operating frequency of a radio. Mobile Ad Hoc Networks (MANETs) can extend high-capacity mobile communications over large areas where fixed and tethered-mobile systems are not available. In one use case with high potential impact, cognitive radio employs spectrum sensing to facilitate the identification of allocated frequencies not currently accessed by their primary users. Primary users own the rights to radiate at a specific frequency and geographic location, while secondary users opportunistically attempt to radiate at a specific frequency when the primary user is not using it. We populate a spatial radio environment map (REM) database with known information that can be leveraged in an ad hoc network to facilitate fair path use of the DSA-discovered links. Utilization of high-resolution geospatial data layers in RF propagation analysis is directly applicable. Random matrix theory (RMT) is useful in simulating network layer usage in nodes by a Wishart adjacency matrix. We use the Dijkstra algorithm for discovering ad hoc network node connection patterns. We present a method for analysts to dynamically allocate node-node path and link resources using fair division. User allocation of limited resources as a function of time must be dynamic and based on system fairness policies. The context of fair means that first available request for an asset is not envied as long as it is not yet allocated or tasked in order to prevent cycling of the system. This solution may also save money by offering a Pareto efficient repeatable process. We use a water fill queue algorithm to include Shapley value marginal contributions for allocation.

  1. ANTIBIOTIC RESISTANCE IN THE OPPORTUNISTIC PATHOGEN STENOTROPHOMONAS MALTOPHILIA

    Directory of Open Access Journals (Sweden)

    María Blanca Sánchez

    2015-06-01

    Full Text Available Stenotrophomonas maltophilia is an environmental bacterium found in the soil, associated with plants and animals, and in aquatic environments. It is also an opportunistic pathogen now causing an increasing number of nosocomial infections. The treatment of S. maltophilia is quite difficult given its intrinsic resistance to a number of antibiotics, and because it is able to acquire new resistances via horizontal gene transfer and mutations. Certainly, strains resistant to quinolones, cotrimoxale and/or cephalosporins - antibiotics commonly used to treat S. maltophilia infections - have emerged. The increasing number of available S. maltophilia genomes has allowed the identification and annotation of a large number of antimicrobial and heavy metal resistance genes. Most encode inactivating enzymes and efflux pumps, but information on their role in intrinsic and acquired resistance is limited. Non-typical antibiotic resistance mechanisms that also form part of the intrinsic resistome have been identified via mutant library screening. These include non-typical antibiotic resistance genes, such as bacterial metabolism genes, and non-inheritable resistant phenotypes, such as biofilm formation and persistence. Their relationships with resistance are complex and require further study.

  2. Norwegian patients and retail chicken meat share cephalosporin-resistant Escherichia coli and IncK/blaCMY-2 resistance plasmids.

    Science.gov (United States)

    Berg, E S; Wester, A L; Ahrenfeldt, J; Mo, S S; Slettemeås, J S; Steinbakk, M; Samuelsen, Ø; Grude, N; Simonsen, G S; Løhr, I H; Jørgensen, S B; Tofteland, S; Lund, O; Dahle, U R; Sunde, M

    2017-06-01

    In 2012 and 2014 the Norwegian monitoring programme for antimicrobial resistance in the veterinary and food production sectors (NORM-VET) showed that 124 of a total of 406 samples (31%) of Norwegian retail chicken meat were contaminated with extended-spectrum cephalosporin-resistant Escherichia coli. The aim of this study was to compare selected cephalosporin-resistant E. coli from humans and poultry to determine their genetic relatedness based on whole genome sequencing (WGS). Escherichia coli representing three prevalent cephalosporin-resistant multi-locus sequence types (STs) isolated from poultry (n=17) were selected from the NORM-VET strain collections. All strains carried an IncK plasmid with a bla CMY-2 gene. Clinical E. coli isolates (n=284) with AmpC-mediated resistance were collected at Norwegian microbiology laboratories from 2010 to 2014. PCR screening showed that 29 of the clinical isolates harboured both IncK and bla CMY-2 . All IncK/bla CMY-2 -positive isolates were analysed with WGS-based bioinformatics tools. Analysis of single nucleotide polymorphisms (SNP) in 2.5 Mbp of shared genome sequences showed close relationship, with fewer than 15 SNP differences between five clinical isolates from urinary tract infections (UTIs) and the ST38 isolates from poultry. Furthermore, all of the 29 clinical isolates harboured IncK/bla CMY-2 plasmid variants highly similar to the IncK/bla CMY-2 plasmid present in the poultry isolates. Our results provide support for the hypothesis that clonal transfer of cephalosporin-resistant E. coli from chicken meat to humans may occur, and may cause difficult-to-treat infections. Furthermore, these E. coli can be a source of AmpC-resistance plasmids for opportunistic pathogens in the human microbiota. Copyright © 2017 European Society of Clinical Microbiology and Infectious Diseases. Published by Elsevier Ltd. All rights reserved.

  3. The role and regulation of catalase in respiratory tract opportunistic bacterial pathogens.

    Science.gov (United States)

    Eason, Mia M; Fan, Xin

    2014-09-01

    Respiratory tract bacterial pathogens are the etiologic agents of a variety of illnesses. The ability of these bacteria to cause disease is imparted through survival within the host and avoidance of pathogen clearance by the immune system. Respiratory tract pathogens are continually bombarded by reactive oxygen species (ROS), which may be produced by competing bacteria, normal metabolic function, or host immunological responses. In order to survive and proliferate, bacteria have adapted defense mechanisms to circumvent the effects of ROS. Bacteria employ the use of anti-oxidant enzymes, catalases and catalase-peroxidases, to relieve the effects of the oxidative stressors to which they are continually exposed. The decomposition of ROS has been shown to provide favorable conditions in which respiratory tract opportunistic bacterial pathogens such as Haemophilus influenzae, Mycobacterium tuberculosis, Legionella pneumophila, and Neisseria meningitidis are able to withstand exposure to highly reactive molecules and yet survive. Bacteria possessing mutations in the catalase gene have a decreased survival rate, yet may be able to compensate for the lack of catalatic activity if peroxidatic activity is present. An incomplete knowledge of the mechanisms by which catalase and catalase-peroxidases are regulated still persists, however, in some bacterial species, a regulatory factor known as OxyR has been shown to either up-regulate or down-regulate catalase gene expression. Yet, more research is still needed to increase the knowledge base in relation to this enzyme class. As with this review, we focus on major respiratory tract opportunistic bacterial pathogens in order to elucidate the function and regulation of catalases. The importance of the research could lead to the development of novel treatments against respiratory bacterial infections. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Spectrum estimation method based on marginal spectrum

    International Nuclear Information System (INIS)

    Cai Jianhua; Hu Weiwen; Wang Xianchun

    2011-01-01

    FFT method can not meet the basic requirements of power spectrum for non-stationary signal and short signal. A new spectrum estimation method based on marginal spectrum from Hilbert-Huang transform (HHT) was proposed. The procession of obtaining marginal spectrum in HHT method was given and the linear property of marginal spectrum was demonstrated. Compared with the FFT method, the physical meaning and the frequency resolution of marginal spectrum were further analyzed. Then the Hilbert spectrum estimation algorithm was discussed in detail, and the simulation results were given at last. The theory and simulation shows that under the condition of short data signal and non-stationary signal, the frequency resolution and estimation precision of HHT method is better than that of FFT method. (authors)

  5. Information Sharing and Knowledge Sharing as Communicative Activities

    Science.gov (United States)

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  6. Opportunistic Pathogens and Microbial Communities and Their Associations with Sediment Physical Parameters in Drinking Water Storage Tank Sediments

    Science.gov (United States)

    Qin, Ke; Struewing, Ian; Domingo, Jorge Santo; Lytle, Darren

    2017-01-01

    The occurrence and densities of opportunistic pathogens (OPs), the microbial community structure, and their associations with sediment elements from eight water storage tanks in Ohio, West Virginia, and Texas were investigated. The elemental composition of sediments was measured through X-ray fluorescence (XRF) spectra. The occurrence and densities of OPs and amoeba hosts (i.e., Legionella spp. and L. pneumophila, Mycobacterium spp., P. aeruginosa, V. vermiformis, Acanthamoeba spp.) were determined using genus- or species-specific qPCR assays. Microbial community analysis was performed using next generation sequencing on the Illumina Miseq platform. Mycobacterium spp. were most frequently detected in the sediments and water samples (88% and 88%), followed by Legionella spp. (50% and 50%), Acanthamoeba spp. (63% and 13%), V. vermiformis (50% and 25%), and P. aeruginosa (0 and 50%) by qPCR method. Comamonadaceae (22.8%), Sphingomonadaceae (10.3%), and Oxalobacteraceae (10.1%) were the most dominant families by sequencing method. Microbial communities in water samples were mostly separated with those in sediment samples, suggesting differences of communities between two matrices even in the same location. There were associations of OPs with microbial communities. Both OPs and microbial community structures were positively associated with some elements (Al and K) in sediments mainly from pipe material corrosions. Opportunistic pathogens presented in both water and sediments, and the latter could act as a reservoir of microbial contamination. There appears to be an association between potential opportunistic pathogens and microbial community structures. These microbial communities may be influenced by constituents within storage tank sediments. The results imply that compositions of microbial community and elements may influence and indicate microbial water quality and pipeline corrosion, and that these constituents may be important for optimal storage tank management

  7. Heterogeneous next-generation wireless network interference model-and its applications

    KAUST Repository

    Mahmood, Nurul Huda; Yilmaz, Ferkan; Alouini, Mohamed-Slim; Ø ien, Geir Egil

    2014-01-01

    Next-generation wireless systems facilitating better utilisation of the scarce radio spectrum have emerged as a response to inefficient and rigid spectrum assignment policies. These are comprised of intelligent radio nodes that opportunistically

  8. On the ergodic capacity of legacy systems in the presence of next generation interference

    KAUST Repository

    Mahmood, Nurul Huda; Yilmaz, Ferkan; Alouini, Mohamed-Slim; Ø ien, Geir Egil

    2011-01-01

    Next generation wireless systems facilitating better utilization of the scarce radio spectrum have emerged as a response to inefficient rigid spectrum assignment policies. These are comprised of intelligent radio nodes that opportunistically operate

  9. Open sharing of genomic data: Who does it and why?

    Directory of Open Access Journals (Sweden)

    Tobias Haeusermann

    Full Text Available We explored the characteristics and motivations of people who, having obtained their genetic or genomic data from Direct-To-Consumer genetic testing (DTC-GT companies, voluntarily decide to share them on the publicly accessible web platform openSNP. The study is the first attempt to describe open data sharing activities undertaken by individuals without institutional oversight. In the paper we provide a detailed overview of the distribution of the demographic characteristics and motivations of people engaged in genetic or genomic open data sharing. The geographical distribution of the respondents showed the USA as dominant. There was no significant gender divide, the age distribution was broad, educational background varied and respondents with and without children were equally represented. Health, even though prominent, was not the respondents' primary or only motivation to be tested. As to their motivations to openly share their data, 86.05% indicated wanting to learn about themselves as relevant, followed by contributing to the advancement of medical research (80.30%, improving the predictability of genetic testing (76.02% and considering it fun to explore genotype and phenotype data (75.51%. Whereas most respondents were well aware of the privacy risks of their involvement in open genetic data sharing and considered the possibility of direct, personal repercussions troubling, they estimated the risk of this happening to be negligible. Our findings highlight the diversity of DTC-GT consumers who decide to openly share their data. Instead of focusing exclusively on health-related aspects of genetic testing and data sharing, our study emphasizes the importance of taking into account benefits and risks that stretch beyond the health spectrum. Our results thus lend further support to the call for a broader and multi-faceted conceptualization of genomic utility.

  10. Lessons learned from studying syndromic autism spectrum disorders.

    Science.gov (United States)

    Sztainberg, Yehezkel; Zoghbi, Huda Y

    2016-10-26

    Syndromic autism spectrum disorders represent a group of childhood neurological conditions, typically associated with chromosomal abnormalities or mutations in a single gene. The discovery of their genetic causes has increased our understanding of the molecular pathways critical for normal cognitive and social development. Human studies have revealed that the brain is particularly sensitive to changes in dosage of various proteins from transcriptional and translational regulators to synaptic proteins. Investigations of these disorders in animals have shed light on previously unknown pathogenic mechanisms leading to the identification of potential targets for therapeutic intervention. The demonstration of reversibility of several phenotypes in adult mice is encouraging, and brings hope that with novel therapies, skills and functionality might improve in affected children and young adults. As new research reveals points of convergence between syndromic and nonsyndromic autism spectrum disorders, we believe there will be opportunities for shared therapeutics for this class of conditions.

  11. Opportunistic Relay Selection with Cooperative Macro Diversity

    Directory of Open Access Journals (Sweden)

    Yu Chia-Hao

    2010-01-01

    Full Text Available We apply a fully opportunistic relay selection scheme to study cooperative diversity in a semianalytical manner. In our framework, idle Mobile Stations (MSs are capable of being used as Relay Stations (RSs and no relaying is required if the direct path is strong. Our relay selection scheme is fully selection based: either the direct path or one of the relaying paths is selected. Macro diversity, which is often ignored in analytical works, is taken into account together with micro diversity by using a complete channel model that includes both shadow fading and fast fading effects. The stochastic geometry of the network is taken into account by having a random number of randomly located MSs. The outage probability analysis of the selection differs from the case where only fast fading is considered. Under our framework, distribution of the received power is formulated using different Channel State Information (CSI assumptions to simulate both optimistic and practical environments. The results show that the relay selection gain can be significant given a suitable amount of candidate RSs. Also, while relay selection according to incomplete CSI is diversity suboptimal compared to relay selection based on full CSI, the loss in average throughput is not too significant. This is a consequence of the dominance of geometry over fast fading.

  12. Shared neuroanatomical substrates of impaired phonological working memory across reading disability and autism

    OpenAIRE

    Lu, Chunming; Qi, Zhenghan; Harris, Adrianne; Weil, Lisa Wisman; Han, Michelle; Halverson, Kelly; Perrachione, Tyler K.; Kjelgaard, Margaret; Wexler, Kenneth; Tager-Flusberg, Helen; Gabrieli, John D. E.

    2016-01-01

    Background Individuals with reading disability and individuals with autism spectrum disorder (ASD) are characterized, respectively, by their difficulties in reading and social communication, but both groups often have impaired phonological working memory (PWM). It is not known whether the impaired PWM reflects distinct or shared neuroanatomical abnormalities in these two diagnostic groups. Methods White-matter structural connectivity via diffusion weighted imaging was examined in 64 children,...

  13. Error-rate performance analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2011-01-01

    In this paper, we investigate an incremental opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider regenerative relaying in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive a closed-form expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact probability density function (PDF) of each hop. Furthermore, we evaluate the asymptotic error performance and the diversity order is deduced. We show that performance simulation results coincide with our analytical results. © 2011 IEEE.

  14. Error-rate performance analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel

    2010-10-01

    In this paper, we investigate an incremental opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider regenerative relaying in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive a closed-form expression for the end-to-end biterror rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact probability density function (PDF) of each hop. Furthermore, we evaluate the asymptotic error performance and the diversity order is deduced. We show that performance simulation results coincide with our analytical results. ©2010 IEEE.

  15. Error-rate performance analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2010-01-01

    In this paper, we investigate an incremental opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider regenerative relaying in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive a closed-form expression for the end-to-end biterror rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact probability density function (PDF) of each hop. Furthermore, we evaluate the asymptotic error performance and the diversity order is deduced. We show that performance simulation results coincide with our analytical results. ©2010 IEEE.

  16. Error-rate performance analysis of incremental decode-and-forward opportunistic relaying

    KAUST Repository

    Tourki, Kamel

    2011-06-01

    In this paper, we investigate an incremental opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider regenerative relaying in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive a closed-form expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact probability density function (PDF) of each hop. Furthermore, we evaluate the asymptotic error performance and the diversity order is deduced. We show that performance simulation results coincide with our analytical results. © 2011 IEEE.

  17. Opportunistic insights into occupational health hazards associated with waterpipe tobacco smoking premises in the United Kingdom.

    Science.gov (United States)

    Al-Bakri, Ali; Jawad, Mohammed; Salameh, Pascale; al'Absi, Mustafa; Kassim, Saba

    2015-01-01

    Smokefree laws aim to protect employees and the public from the dangers of secondhand smoke. Waterpipe premises have significantly increased in number in the last decade, with anecdotal reports of poor compliance with the smokefree law. The literature is bereft of information pertaining to waterpipe premise employees. This study aimed to opportunistically gather knowledge about the occupational health hazards associated with working in waterpipe premises in London, England. Employees from seven convenience-sampled, smokefree-compliant waterpipe premises in London were observed for occupational activities. Opportunistic carbon monoxide (CO) measurements were made among those with whom a rapport had developed. Observations were thematically coded and analysed. Occupational hazards mainly included environmental smoke exposure. Waterpipe-serving employees were required to draw several puffs soon after igniting the coals, thereby providing quality assurance of the product. Median CO levels were 27.5 ppm (range 21-55 ppm) among these employees. Self-reported employee health was poor, with some suggestion that working patterns and smoke exposure was a contributory factor. The smokefree law in England does not appear to protect waterpipe premise employees from high levels of CO. Continued concerns surrounding chronic smoke exposure may contribute to poor self-reported physical and mental wellbeing.

  18. Pediatric Traumatic Brain Injury and Autism: Elucidating Shared Mechanisms

    Directory of Open Access Journals (Sweden)

    Rahul Singh

    2016-01-01

    Full Text Available Pediatric traumatic brain injury (TBI and autism spectrum disorder (ASD are two serious conditions that affect youth. Recent data, both preclinical and clinical, show that pediatric TBI and ASD share not only similar symptoms but also some of the same biologic mechanisms that cause these symptoms. Prominent symptoms for both disorders include gastrointestinal problems, learning difficulties, seizures, and sensory processing disruption. In this review, we highlight some of these shared mechanisms in order to discuss potential treatment options that might be applied for each condition. We discuss potential therapeutic and pharmacologic options as well as potential novel drug targets. Furthermore, we highlight advances in understanding of brain circuitry that is being propelled by improved imaging modalities. Going forward, advanced imaging will help in diagnosis and treatment planning strategies for pediatric patients. Lessons from each field can be applied to design better and more rigorous trials that can be used to improve guidelines for pediatric patients suffering from TBI or ASD.

  19. Draft genome sequences of two opportunistic pathogenic strains of Staphylococcus cohnii isolated from human patients

    OpenAIRE

    Mendoza-Olazar?n, Soraya; Garcia-Mazcorro, Jos? F.; Morf?n-Otero, Rayo; Villarreal-Trevi?o, Licet; Camacho-Ortiz, Adri?n; Rodr?guez-Noriega, Eduardo; Bocanegra-Ibarias, Paola; Maldonado-Garza, H?ctor J.; Dowd, Scot E.; Garza-Gonz?lez, Elvira

    2017-01-01

    Herein, we report the draft-genome sequences and annotation of two opportunistic pathogenic strains of Staphylococcus cohnii isolated from humans. One strain (SC-57) was isolated from blood from a male patient in May 2006 and the other (SC-532) from a catheter from a male patient in June 2006. Similar to other genomes of Staphylococcus species, most genes (42%) of both strains are involved in metabolism of amino acids and derivatives, carbohydrates and proteins. Eighty (4%) genes are involved...

  20. Mobile clouds exploiting distributed resources in wireless, mobile and social networks

    CERN Document Server

    Fitzek, Frank H P

    2013-01-01

    Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, UCLA, USA This book discusses and explores the concept of mobile cloud, creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The b