WorldWideScience

Sample records for opportunistic spectrum sharing

  1. Distributed opportunistic spectrum sharing in cognitive radio networks

    Hawa, Mohammed

    2016-05-19

    In cases where the licensed radio spectrum is underutilized, cognitive radio technology enables cognitive devices to sense and then dynamically access this scarce resource making the most out of it. In this work, we introduce a simple and intuitive, yet powerful and efficient, technique that allows opportunistic channel access in cognitive radio systems in a completely distributed fashion. Our proposed method achieves very high values of spectrum utilization and throughput. It also minimizes interference between cognitive base stations and the primary users licensed to use the spectrum. The algorithm responds quickly and efficiently to variations in the network parameters and also achieves a high degree of fairness between cognitive base stations. © 2016 John Wiley & Sons, Ltd.

  2. Distributed opportunistic spectrum sharing in cognitive radio networks

    Hawa, Mohammed; Alammouri, Ahmad; Alhiary, Ala; Alhamad, Nidal

    2016-01-01

    In cases where the licensed radio spectrum is underutilized, cognitive radio technology enables cognitive devices to sense and then dynamically access this scarce resource making the most out of it. In this work, we introduce a simple and intuitive

  3. Joint opportunistic beam and spectrum selection schemes for spectrum sharing systems with limited feedback

    Sayed, Mostafa M.; Abdallah, Mohamed M.; Qaraqe, Khalid A.; Tourki, Kamel; Alouini, Mohamed-Slim

    2014-01-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing an unlicensed secondary user (SU) to share the spectrum with a licensed primary user (PU) under acceptable interference levels to the primary

  4. Joint opportunistic beam and spectrum selection schemes for spectrum sharing systems with limited feedback

    Sayed, Mostafa M.

    2014-11-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing an unlicensed secondary user (SU) to share the spectrum with a licensed primary user (PU) under acceptable interference levels to the primary receiver (PU-Rx). In this paper, we consider a secondary link composed of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx). The secondary link is allowed to share the spectrum with a primary network composed of multiple PUs communicating over distinct frequency spectra with a primary base station. We develop a transmission scheme where the SU-Tx initially broadcasts a set of random beams over all the available primary spectra for which the PU-Rx sends back the index of the spectrum with the minimum interference level, as well as information that describes the interference value, for each beam. Based on the feedback information on the PU-Rx, the SU-Tx adapts the transmitted beams and then resends the new beams over the best primary spectrum for each beam to the SU-Rx. The SU-Rx selects the beam that maximizes the received signal-to-interference-plus-noise ratio (SINR) to be used in transmission over the next frame. We consider three cases for the level of feedback information describing the interference level. In the first case, the interference level is described by both its magnitude and phase; in the second case, only the magnitude is considered; and in the third case, we focus on a q-bit description of its magnitude. In the latter case, we propose a technique to find the optimal quantizer thresholds in a mean-square-error sense. We also develop a statistical analysis for the SINR statistics and the capacity and bit error rate of the secondary link and present numerical results that study the impact of the different system parameters.

  5. Full-Duplex opportunistic relay selection in future spectrum-sharing networks

    Khafagy, Mohammad Galal; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2015-01-01

    We propose and analyze the performance of full-duplex relay selection in primary/secondary spectrum-sharing networks. Contrary to half-duplex relaying, full-duplex relaying (FDR) enables simultaneous listening/forwarding at the secondary relay, thereby allowing for a higher spectral efficiency. However, since the source and relay simultaneously transmit in FDR, their superimposed signal at the primary receiver should now satisfy the existing interference constraint which can considerably limit the secondary network throughput. In this regard, relay selection can offer an adequate solution to boost the secondary throughput while satisfying the imposed interference limit. We first analyze the performance of opportunistic relay selection among a cluster of full-duplex decode-and-forward relays with self-interference by deriving the exact cumulative distribution function of its end-to-end signal-to-noise ratio. Second, we evaluate the end-to-end performance of relay selection with interference constraints due to the presence of a primary receiver. Finally, the presented exact theoretical findings are verified by numerical simulations.

  6. Full-Duplex opportunistic relay selection in future spectrum-sharing networks

    Khafagy, Mohammad Galal

    2015-06-01

    We propose and analyze the performance of full-duplex relay selection in primary/secondary spectrum-sharing networks. Contrary to half-duplex relaying, full-duplex relaying (FDR) enables simultaneous listening/forwarding at the secondary relay, thereby allowing for a higher spectral efficiency. However, since the source and relay simultaneously transmit in FDR, their superimposed signal at the primary receiver should now satisfy the existing interference constraint which can considerably limit the secondary network throughput. In this regard, relay selection can offer an adequate solution to boost the secondary throughput while satisfying the imposed interference limit. We first analyze the performance of opportunistic relay selection among a cluster of full-duplex decode-and-forward relays with self-interference by deriving the exact cumulative distribution function of its end-to-end signal-to-noise ratio. Second, we evaluate the end-to-end performance of relay selection with interference constraints due to the presence of a primary receiver. Finally, the presented exact theoretical findings are verified by numerical simulations.

  7. Opportunistic spectrum utilization in vehicular communication networks

    Cheng, Nan

    2016-01-01

    This brief examines current research on improving Vehicular Networks (VANETs), examining spectrum scarcity due to the dramatic growth of mobile data traffic and the limited bandwidth of dedicated vehicular communication bands and the use of opportunistic spectrum bands to mitigate congestion. It reviews existing literature on the use of opportunistic spectrum bands for VANETs, including licensed and unlicensed spectrum bands and a variety of related technologies, such as cognitive radio, WiFi and device-to-device communications. Focused on analyzing spectrum characteristics, designing efficient spectrum exploitation schemes, and evaluating the date delivery performance when utilizing different opportunistic spectrum bands, the results presented in this brief provide valuable insights on improving the design and deployment of future VANETs.

  8. 5G Spectrum Sharing

    Nekovee, Maziar; Rudd, Richard

    2017-01-01

    In this paper an overview is given of the current status of 5G industry standards, spectrum allocation and use cases, followed by initial investigations of new opportunities for spectrum sharing in 5G using cognitive radio techniques, considering both licensed and unlicensed scenarios. A particular attention is given to sharing millimeter-wave frequencies, which are of prominent importance for 5G.

  9. Partial QoS-Aware Opportunistic Relay Selection Over Two-Hop Channels: End-to-End Performance Under Spectrum-Sharing Requirements

    Yuli Yang,

    2014-10-01

    In this paper, we propose a partial quality-of-service (QoS)-oriented relay selection scheme with a decode-and-forward (DF) relaying protocol, to reduce the feedback amount required for relay selection. In the proposed scheme, the activated relay is the one with the maximum signal-to-noise power ratio (SNR) in the second hop among those whose packet loss rates (PLRs) in the first hop achieve a predetermined QoS level. For the purpose of evaluating the performance of the proposed scheme, we exploit it with transmission constraints imposed on the transmit power budget and interference to other users. By analyzing the statistics of received SNRs in the first and second hops, we obtain the end-to-end PLR of this scheme in closed form under the considered scenario. Moreover, to compare the proposed scheme with popular relay selection schemes, we also derive the closed-form PLR expressions for partial relay selection (PRS) and opportunistic relay selection (ORS) criteria in the same scenario under study. Illustrative numerical results demonstrate the accuracy of our derivations and substantiate that the proposed relay selection scheme is a promising alternative with respect to the tradeoff between performance and complexity.

  10. Hopping control channel MAC protocol for opportunistic spectrum access networks

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  11. Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks

    Sumit J. Darak

    2016-09-01

    Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.

  12. Optimal Pricing of Spectrum Resources in Wireless Opportunistic Access

    Hanna Bogucka

    2012-01-01

    Full Text Available We consider opportunistic access to spectrum resources in cognitive wireless networks. The users equipment, or the network nodes in general are able to sense the spectrum and adopt a subset of available resources (the spectrum and the power individually and independently in a distributed manner, that is, based on their local channel quality information and not knowing the Channel State Information (CSI of the other nodes' links in the considered network area. In such a network scenery, the competition of nodes for available resources is observed, which can be modeled as a game. To obtain spectrally efficient and fair spectrum allocation in this competitive environment with the nodes having no information on the other players, taxation of resources is applied to coerce desired behavior of the competitors. In the paper, we present mathematical formulation of the problem of finding the optimal taxation rate (common for all nodes and propose a reduced-complexity algorithm for this optimization. Simulation results for these derived optimal values in various scenarios are also provided.

  13. Opportunistic spectrum access in cognitive radio based on channel switching

    Gaaloul, Fakhreddine; Yang, Hongchuan; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    This paper investigates the performance of a cognitive radio transceiver that can monitor multiple channels and opportunistically use any one of them should it be available. In our work, we propose and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. Two switching strategies, namely the switch and examine and the switch and stay strategies, are proposed. For these proposed access schemes, we investigate their performance by deriving the analytical expression of the novel metric of the average access duration and the average waiting time and based on these two metrics a time average SU throughput formula is proposed to predict the performance of the secondary cognitive system. © 2012 ICST.

  14. Analysis Framework for Opportunistic Spectrum OFDMA and its Application to the IEEE 802.22 Standard

    Park, Jihoon; Pawełczak, Przemysław; Grønsund, Pål; Čabrić, Danijela

    2010-01-01

    We present an analytical model that enables throughput evaluation of Opportunistic Spectrum Orthogonal Frequency Division Multiple Access (OS-OFDMA) networks. The core feature of the model, based on a discrete time Markov chain, is the consideration of different channel and subchannel allocation strategies under different Primary and Secondary user types, traffic and priority levels. The analytical model also assesses the impact of different spectrum sensing strategies on the throughput of OS...

  15. Optimality of Multichannel Myopic Sensing in the Presence of Sensing Error for Opportunistic Spectrum Access

    Xiaofeng Jiang

    2013-01-01

    Full Text Available The optimization problem for the performance of opportunistic spectrum access is considered in this study. A user, with the limited sensing capacity, has opportunistic access to a communication system with multiple channels. The user can only choose several channels to sense and decides whether to access these channels based on the sensing information in each time slot. Meanwhile, the presence of sensing error is considered. A reward is obtained when the user accesses a channel. The objective is to maximize the expected (discounted or average reward accrued over an infinite horizon. This problem can be formulated as a partially observable Markov decision process. This study shows the optimality of the simple and robust myopic policy which focuses on maximizing the immediate reward. The results show that the myopic policy is optimal in the case of practical interest.

  16. Dynamic Spectrum Sharing among Femtocells

    Da Costa, Gustavo Wagner Oliveira

    2012-01-01

    deployment of femtocells in an uncoordinated way will create difficult interference scenarios. For these reasons, this PhD thesis investigates how each femtocell can autonomously select portions of the spectrum in order to achieve more spectral efficiency and fairness. The solutions also strive...... for scalability to a large number of cells, stability and limited complexity. The work represents an evolution towards future cognitive femtocells. The issue of inter-cell interference among femtocells is thoroughly analyzed with game theory, graph theory and system-level simulations. These analyses show...

  17. Opportunistic tri-band carrier aggregation in licensed spectrum for multi-operator 5G hetnet

    Maksymuk, Taras; Kyryk, Maryan; Klymash, Mykhailo; Jo, Minho; Romaniuk, Ryszard; Kotyra, Andrzej; Zhanpeisova, Aizhan; Kozbekova, Ainur

    2017-08-01

    Increasing capacity of mobile networks is a real challenge due to rapid increasing of traffic demands and spectrum scarcity. Carrier aggregation technology is aimed to increase the user data rate by combining the throughput of few spectrum bands, even if they are not physically collocated. Utilization of unlicensed Wi-Fi 5 GHz band for mobile transmission opens new perspectives for carrier aggregation due to vast amount of spectrum range, which can be available for aggregation to supplement data rates for end users. There are many solutions proposed to enable mobile data transmission in unlicensed band without disturbing interference for the existing Wi-Fi users. The paper presents a new approach for opportunistic carrier aggregation in licensed and unlicensed band for multi-operator 5G network. It allows multiple network operators to utilize unlicensed spectrum opportunistically if it is not currently used by Wi-Fi or other mobile network operators. Performance of the proposed approach has been simulated in case of two competing operators. Simulation results reveal that applying the proposed method ensures achieving satisfactory performance of carrier aggregation for the case of two network operators.

  18. Resource Distribution Approaches in Spectrum Sharing Systems

    Friedrich K. Jondral

    2008-05-01

    Full Text Available It is increasingly difficult to satisfy growing demands for spectrum with the conventional policy of fixed spectrum allocation. To overcome this problem, flexible/dynamic spectrum sharing methods that can significantly improve spectrum utilization of the spectrum have gained increasing interest recently. This paper presents two dynamic spectrum sharing approaches, a centralized and a decentralized one. The centralized approach is based on hierarchical trading. Each level of hierarchy is composed of “markets” that are associated with a certain spatial area and trading occurrence frequency, whereas area size and trading occurrence frequency depend on the hierarchy level. The decentralized approach is based on game-theory. There, it is assumed that the operators are averse to unequal payoffs and act unselfishly, enabling a stable and sustainable community. Numerical results show that, in the observed scenario, both proposals outperform the reference case of fixed resource allocation significantly in terms of utilized bandwidth. Whereas, negotiation costs for spectrum brokerage appear in the centralized approach, nonnegligible amounts of spectrum are lost in the decentralized approach due to collisions. Thus, a hybrid of centralized and decentralized approach that exploits the benefits of both is also considered.

  19. Optimal Caching in Multicast 5G Networks with Opportunistic Spectrum Access

    Emara, Mostafa

    2018-01-15

    Cache-enabled small base station (SBS) densification is foreseen as a key component of 5G cellular networks. This architecture enables storing popular files at the network edge (i.e., SBS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. This paper develops a mathematical framework, based on stochastic geometry, to characterize the hit probability of a cache-enabled multicast 5G network with SBS multi-channel capabilities and opportunistic spectrum access. To this end, we first derive the hit probability by characterizing opportunistic spectrum access success probabilities, service distance distributions, and coverage probabilities. The optimal caching distribution to maximize the hit probability is then computed. The performance and trade-offs of the derived optimal caching distributions are then assessed and compared with two widely employed caching distribution schemes, namely uniform and Zipf caching, through numerical results and extensive simulations. It is shown that the Zipf caching almost optimal only in scenarios with large number of available channels and large cache sizes.

  20. PERFORMANCE OF OPPORTUNISTIC SPECTRUM ACCESS WITH SENSING ERROR IN COGNITIVE RADIO AD HOC NETWORKS

    N. ARMI

    2012-04-01

    Full Text Available Sensing in opportunistic spectrum access (OSA has a responsibility to detect the available channel by performing binary hypothesis as busy or idle states. If channel is busy, secondary user (SU cannot access and refrain from data transmission. SU is allowed to access when primary user (PU does not use it (idle states. However, channel is sensed on imperfect communication link. Fading, noise and any obstacles existed can cause sensing errors in PU signal detection. False alarm detects idle states as a busy channel while miss-identification detects busy states as an idle channel. False detection makes SU refrain from transmission and reduces number of bits transmitted. On the other hand, miss-identification causes SU collide to PU transmission. This paper study the performance of OSA based on the greedy approach with sensing errors by the restriction of maximum collision probability allowed (collision threshold by PU network. The throughput of SU and spectrum capacity metric is used to evaluate OSA performance and make comparisons to those ones without sensing error as function of number of slot based on the greedy approach. The relations between throughput and signal to noise ratio (SNR with different collision probability as well as false detection with different SNR are presented. According to the obtained results show that CR users can gain the reward from the previous slot for both of with and without sensing errors. It is indicated by the throughput improvement as slot number increases. However, sensing on imperfect channel with sensing errors can degrade the throughput performance. Subsequently, the throughput of SU and spectrum capacity improves by increasing maximum collision probability allowed by PU network as well. Due to frequent collision with PU, the throughput of SU and spectrum capacity decreases at certain value of collision threshold. Computer simulation is used to evaluate and validate these works.

  1. Spectrum of Opportunistic Fungal Infections in HIV/AIDS Patients in Tertiary Care Hospital in India

    Ravinder Kaur

    2016-01-01

    Full Text Available HIV related opportunistic fungal infections (OFIs continue to cause morbidity and mortality in HIV infected patients. The objective for this prospective study is to elucidate the prevalence and spectrum of common OFIs in HIV/AIDS patients in north India. Relevant clinical samples were collected from symptomatic HIV positive patients (n=280 of all age groups and both sexes and subjected to direct microscopy and fungal culture. Identification as well as speciation of the fungal isolates was done as per the standard recommended methods. CD4+T cell counts were determined by flow cytometry using Fluorescent Activated Cell Sorter Count system. 215 fungal isolates were isolated with the isolation rate of 41.1%. Candida species (86.5% were the commonest followed by Aspergillus (6.5%, Cryptococcus (3.3%, Penicillium (1.9%, and Alternaria and Rhodotorula spp. (0.9% each. Among Candida species, Candida albicans (75.8% was the most prevalent species followed by C. tropicalis (9.7%, C. krusei (6.4%, C. glabrata (4.3%, C. parapsilosis (2.7%, and C. kefyr (1.1%. Study demonstrates that the oropharyngeal candidiasis is the commonest among different OFIs and would help to increase the awareness of clinicians in diagnosis and early treatment of these infections helping in the proper management of the patients especially in resource limited countries like ours.

  2. Spectrums of opportunistic infections and malignancies in HIV-infected patients in tertiary care hospital, China.

    Jiang Xiao

    Full Text Available BACKGROUND: HIV-related opportunistic infections (OIs and malignancies continued to cause morbidity and mortality in Chinese HIV-infected individuals. The objective for this study is to elucidate the prevalence and spectrums of OIs and malignancies in HIV-infected patients in the Beijing Ditan Hospital. METHODS: The evaluation of the prevalence and spectrums of OIs and malignancies was conducted by using the clinical data of 834 HIV-infected patients admitted in the Beijing Ditan hospital from January 1, 2009, to November 30, 2012. RESULTS: The prevalence and spectrums of OIs and malignancies varied contingent on geographic region, transmission routes, and CD4 levels. We found that tuberculosis was most common OI and prevalence was 32.5%, followed by candidiasis(29.3%, Pneumocystis pneumonia(PCP(22.4%, cytomegalovirus(CMV infection(21.7%, other fungal infections(16.2%, mycobacterium avium complex(MAC(11.3%, cryptococcosis(8.0%, progressive multifocal leukoencephalopathy(PML(4.4%, Cerebral Toxoplasmosis(3.5% and Penicillium marneffei infection(1.4%; while Lymphoma(2.9%, Kaposi's sarcoma(0.8% and cervix carcinoma(0.3% were emerged as common AIDS-defining malignancies. Pulmonary OI infections were the most prevalent morbidity and mortality in patients in the AIDS stage including pulmonary tuberculosis (26.6% and PCP (22.4%. CMV infection(21.7% was most common viral infection; Fungal OIs were one of most prevalent morbidity in patients in the AIDS stage, including oral candidiasis (29.3%, other fungal infection (16.2%, Cryptococcosis (8.0% and Penicillium marneffei infection (1.4%. We found the low prevalence of AIDS-defining illnesses in central neural system in this study, including progressive multifocal leukoencephalopathy (4.4%, cerebral toxoplasmosis (3.5%, tuberculosis meningitis (3.2%, cryptococcal meningitis (2.4% and CMV encephalitis (1.1%. In-hospital mortality rate was 4.3 per 100 person-years due to severe OIs, malignancies, and medical

  3. Coalition Formation and Spectrum Sharing of Cooperative Spectrum Sensing Participants.

    Zhensheng Jiang; Wei Yuan; Leung, Henry; Xinge You; Qi Zheng

    2017-05-01

    In cognitive radio networks, self-interested secondary users (SUs) desire to maximize their own throughput. They compete with each other for transmit time once the absence of primary users (PUs) is detected. To satisfy the requirement of PU protection, on the other hand, they have to form some coalitions and cooperate to conduct spectrum sensing. Such dilemma of SUs between competition and cooperation motivates us to study two interesting issues: 1) how to appropriately form some coalitions for cooperative spectrum sensing (CSS) and 2) how to share transmit time among SUs. We jointly consider these two issues, and propose a noncooperative game model with 2-D strategies. The first dimension determines coalition formation, and the second indicates transmit time allocation. Considering the complexity of solving this game, we decompose the game into two more tractable ones: one deals with the formation of CSS coalitions, and the other focuses on the allocation of transmit time. We characterize the Nash equilibria (NEs) of both games, and show that the combination of these two NEs corresponds to the NE of the original game. We also develop a distributed algorithm to achieve a desirable NE of the original game. When this NE is achieved, the SUs obtain a Dhp-stable coalition structure and a fair transmit time allocation. Numerical results verify our analyses, and demonstrate the effectiveness of our algorithm.

  4. Spectrum Of Opportunistic Infections In Aids Cases In A Tertiary Care Hospital In Nepal

    Hari Shanker Joshi

    2006-12-01

    Full Text Available A retrospective study was carried out, 404 clinically suspected cases attending AIDS clinic at Manipal Teaching Hospital, Pokhara, Nepal to assess an occurance of opportunistic infections in AIDS cases. Study reveals that Tuberculosis (60%, Cryptospridiosis (13.33% and candidasis (11.11% are the predominant opportunistic infection in HIV/AIDS patients in the Pokharo village. Next common pathogen was found an ubiquitous yeast. Candida obtained from skin, oral cavity, oesophagus, sputum and stool. The least common documented documented infection was pneumocystis carini pneumonia (2.22%.

  5. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    Gaaloul, Fakhreddine

    2012-06-18

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  6. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    Gaaloul, Fakhreddine; Alouini, Mohamed-Slim; Radaydeh, Redha M.; Yang, Hong-Chuan

    2012-01-01

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  7. Market-driven spectrum sharing in cognitive radio

    Yi, Changyan

    2016-01-01

    This brief focuses on the current research on mechanism design for dynamic spectrum sharing in cognitive radio (CR) networks. Along with a review of CR architectures and characteristics, this brief presents the motivations, significances and unique challenges of implementing algorithmic mechanism design for encouraging both primary spectrum owners and secondary spectrum users to participate in dynamic spectrum sharing. The brief then focuses on recent advances in mechanism design in CR networks. With an emphasis on dealing with the uncertain spectrum availabilities, mechanisms based on spectrum recall, two-stage spectrum sharing and online spectrum allocation are introduced with the support of theoretic analyses and numerical illustrations. The brief concludes with a discussion of potential research directions and interests, which will motivate further studies on mechanism design for wireless communications. This brief is concise and approachable for researchers, professionals and advanced-level students in w...

  8. Switch and examine transmit diversity for spectrum sharing systems

    Abdallah, Mohamed M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2011-01-01

    In this paper, we develop a switch and examine transmit diversity algorithm for spectrum sharing cognitive networks. We consider a cognitive network composed of a primary link that employs constant rate and constant power transmission scheme

  9. Energy efficient cross layer design for spectrum sharing systems

    Alabbasi, AbdulRahman; Shihada, Basem

    2016-01-01

    We propose a cross layer design that optimizes the energy efficiency of spectrum sharing systems. The energy per good bit (EPG) is considered as an energy efficiency metric. We optimize the secondary user's transmission power and media access frame

  10. On the performance of spectrum sharing systems with multiple antennas

    Yang, Liang; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2012-01-01

    In this paper, we study the capacity of spectrum sharing (SS) multiple-input multiple-output (MIMO) systems over Rayleigh fading channels. More specifically, we present closed-form capacity formulas for such systems with and without optimal power

  11. Capacity analysis of spectrum sharing spatial multiplexing MIMO systems

    Yang, Liang; Qaraqe, Khalid A.; Serpedin, Erchin; Alouini, Mohamed-Slim

    2014-01-01

    This paper considers a spectrum sharing (SS) multiple-input multiple-output (MIMO) system operating in a Rayleigh fading environment. First the capacity of a single-user SS spatial multiplexing system is investigated in two scenarios that assume

  12. Performance analysis of distributed beamforming in a spectrum sharing system

    Yang, Liang; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2012-01-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with the licensed primary users under an interference temperature constraint. We assume that DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit-error rate performance. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an outage probability analysis for a random vector quantization (RVQ) design algorithm. Numerical results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  13. Performance analysis of distributed beamforming in a spectrum sharing system

    Yang, Liang

    2012-09-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with the licensed primary users under an interference temperature constraint. We assume that DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit-error rate performance. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an outage probability analysis for a random vector quantization (RVQ) design algorithm. Numerical results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  14. Joint switched multi-spectrum and transmit antenna diversity for spectrum sharing systems

    Sayed, Mostafa M.; Abdallah, Mohamed M.; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2013-01-01

    . In this paper, we consider a secondary network comprised of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx) sharing the same spectrum with multiple primary users (PUs), each with a distinct spectrum

  15. Achievable capacity of a spectrum sharing system over hyper fading channels

    Ekin, Sabit; Yilmaz, Ferkan; Ç elebi, Hasari Burak; Qaraqe, Khalid A.; Alouini, Mohamed-Slim; Serpedin, Erchin

    2009-01-01

    Cognitive radio with spectrum sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, achievable capacity gain of spectrum sharing systems over dynamic fading

  16. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent’s limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent’s cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent’s view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  17. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks.

    Ming Liu

    Full Text Available Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent's limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent's cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent's view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved.

  18. Cooperative AF Relaying in Spectrum-Sharing Systems: Outage Probability Analysis under Co-Channel Interferences and Relay Selection

    Xia, Minghua

    2012-11-01

    For cooperative amplify-and-forward (AF) relaying in spectrum-sharing wireless systems, secondary users share spectrum resources originally licensed to primary users to communicate with each other and, thus, the transmit power of secondary transmitters is strictly limited by the tolerable interference powers at primary receivers. Furthermore, the received signals at a relay and at a secondary receiver are inevitably interfered by the signals from primary transmitters. These co-channel interferences (CCIs) from concurrent primary transmission can significantly degrade the performance of secondary transmission. This paper studies the effect of CCIs on outage probability of the secondary link in a spectrum-sharing environment. In particular, in order to compensate the performance loss due to CCIs, the transmit powers of a secondary transmitter and its relaying node are respectively optimized with respect to both the tolerable interference powers at the primary receivers and the CCIs from the primary transmitters. Moreover, when multiple relays are available, the technique of opportunistic relay selection is exploited to further improve system performance with low implementation complexity. By analyzing lower and upper bounds on the outage probability of the secondary system, this study reveals that it is the tolerable interference powers at primary receivers that dominate the system performance, rather than the CCIs from primary transmitters. System designers will benefit from this result in planning and designing next-generation broadband spectrum-sharing systems.

  19. On multiuser switched diversity transmission for spectrum sharing systems

    Qaraqe, Marwa

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users share the spectrum with primary users. In particular, we devise two schemes for selecting the user among those that satisfy the interference constraints and achieve an acceptable signal-to-noise ratio (SNR) level. The first scheme selects the user with the maximum SNR at the receiver, whereas in the second scheme the users are scanned in a sequential manner until an acceptable user is found. In addition, we consider two power adaptive settings. In the on/off power adaptive setting, the users transmit based on whether the interference constraint is met or not while in the full power adaptive setting, the users vary their transmission power to satisfy the interference constraint. Finally, we present numerical results of our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load of both schemes. © 2012 ICST.

  20. Interference-aware random beam selection for spectrum sharing systems

    Abdallah, Mohamed M.

    2012-09-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this paper, we develop interference-aware random beam selection schemes that provide enhanced throughput for the secondary link under the condition that the interference observed at the primary link is within a predetermined acceptable value. For a secondary transmitter equipped with multiple antennas, our schemes select a random beam, among a set of power- optimized orthogonal random beams, that maximizes the capacity of the secondary link while satisfying the interference constraint at the primary receiver for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the signal-to-noise and interference ratio (SINR) statistics as well as the capacity of the secondary link. Finally, we present numerical results that study the effect of system parameters including number of beams and the maximum transmission power on the capacity of the secondary link attained using the proposed schemes. © 2012 IEEE.

  1. Cross-Layer Design in Dynamic Spectrum Sharing Systems

    Shadmand A

    2010-01-01

    Full Text Available We consider a dynamic spectrum sharing system consisting of a primary user, whose licensed spectrum is allowed to be accessed by a secondary user as long as it does not violate the prescribed interference limit inflicted on the primary user. Assuming the Nakagami- block-fading environment, we aim at maximizing the performance of secondary user's link in terms of average spectral efficiency (ASE and error performance under the specified packet error rate (PER and average interference limit constraints. To this end, we employ a cross-layer design policy which combines adaptive power and coded discrete M-QAM modulation scheme at the physical layer with a truncated automatic repeat request (ARQ protocol at the data link layer, and simultaneously satisfies the aforementioned constraints. Numerical results affirm that the secondary link of spectrum sharing system combining ARQ with adaptive modulation and coding (AMC achieves significant gain in ASE depending on the maximum number of retransmissions initiated by the ARQ protocol. The results further indicate that the ARQ protocol essentially improves the packet loss rate performance of the secondary link.

  2. Joint switched multi-spectrum and transmit antenna diversity for spectrum sharing systems

    Sayed, Mostafa M.

    2013-10-01

    In spectrum sharing systems, a secondary user (SU) is allowed to share the spectrum with a primary (licensed) network under the condition that the interference observed at the receivers of the primary users (PU-Rxs) is below a predetermined level. In this paper, we consider a secondary network comprised of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx) sharing the same spectrum with multiple primary users (PUs), each with a distinct spectrum. We develop transmit antenna diversity schemes at the SU-Tx that exploit the multi-spectrum diversity provided by the existence of multiple PUs so as to optimize the signal-to-noise ratio (SNR) at the SU-Rx. In particular, assuming bounded transmit power at the SU-Tx, we develop switched selection schemes that select the primary spectrum and the SU-Tx transmit antenna that maintain the SNR at the SU-Rx above a specific threshold. Assuming Rayleigh fading channels and binary phase-shift keying (BPSK) transmission, we derive the average bit-error-rate (BER) and average feedback load expressions for the proposed schemes. For the sake of comparison, we also derive a BER expression for the optimal selection scheme that selects the best antenna/spectrum pair that maximizes the SNR at the SU-Rx, in exchange of high feedback load and switching complexity. Finally, we show that our analytical results are in perfect agreement with the simulation results. © 2013 IEEE.

  3. 76 FR 81991 - National Spectrum Sharing Research Experimentation, Validation, Verification, Demonstration and...

    2011-12-29

    ... NATIONAL SCIENCE FOUNDATION National Spectrum Sharing Research Experimentation, Validation... requirements of national level spectrum research, development, demonstration, and field trial facilities... to determine the optimal way to manage and use the radio spectrum. During Workshop I held at Boulder...

  4. Performance analysis of distributed beamforming in a spectrum sharing system

    Yang, Liang

    2013-05-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with some licensed primary users under an interference temperature constraint. We assume that the DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit error rate performance metrics. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an analysis for a random vector quantization design algorithm. Specifically, the approximate statistics functions of the squared inner product between the optimal and quantized vectors are derived. With these statistics, we analyze the outage performance. Furthermore, the effects of channel estimation error and number of primary users on the system performance are investigated. Finally, optimal power adaptation and cochannel interference are considered and analyzed. Numerical and simulation results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  5. UAS CNPC Satellite Link Performance - Sharing Spectrum with Terrestrial Systems

    Kerczewski, Robert J.; Wilson, Jeffrey D.; Bishop, William D.

    2016-01-01

    In order to provide for the safe integration of unmanned aircraft systems into the National Airspace System, the control and non-payload communications (CNPC) link connecting the ground-based pilot with the unmanned aircraft must be highly reliable. A specific requirement is that it must operate using aviation safety radiofrequency spectrum. The 2012 World Radiocommunication Conference (WRC-12) provided a potentially suitable allocation for radio line-of-sight (LOS), terrestrial based CNPC link at 5030-5091 MHz. For a beyond radio line-of-sight (BLOS), satellite-based CNPC link, aviation safety spectrum allocations are currently inadequate. Therefore, the 2015 WRC will consider the use of Fixed Satellite Service (FSS) bands to provide BLOS CNPC under Agenda Item 1.5. This agenda item requires studies to be conducted to allow for the consideration of how unmanned aircraft can employ FSS for BLOS CNPC while maintaining existing systems. Since there are terrestrial Fixed Service systems also using the same frequency bands under consideration in Agenda Item 1.5 one of the studies required considered spectrum sharing between earth stations on-board unmanned aircraft and Fixed Service station receivers. Studies carried out by NASA have concluded that such sharing is possible under parameters previously established by the International Telecommunications Union. As the preparation for WRC-15 has progressed, additional study parameters Agenda Item 1.5 have been proposed, and some studies using these parameters have been added. This paper examines the study results for the original parameters as well as results considering some of the more recently proposed parameters to provide insight into the complicated process of resolving WRC-15 Agenda Item 1.5 and achieving a solution for BLOS CNPC for unmanned aircraft.

  6. Cooperative AF Relaying in Spectrum-Sharing Systems: Performance Analysis under Average Interference Power Constraints and Nakagami-m Fading

    Xia, Minghua

    2012-06-01

    Since the electromagnetic spectrum resource becomes more and more scarce, improving spectral efficiency is extremely important for the sustainable development of wireless communication systems and services. Integrating cooperative relaying techniques into spectrum-sharing cognitive radio systems sheds new light on higher spectral efficiency. In this paper, we analyze the end-to-end performance of cooperative amplify-and-forward (AF) relaying in spectrum-sharing systems. In order to achieve the optimal end-to-end performance, the transmit powers of the secondary source and the relays are optimized with respect to average interference power constraints at primary users and Nakagami-$m$ fading parameters of interference channels (for mathematical tractability, the desired channels from secondary source to relay and from relay to secondary destination are assumed to be subject to Rayleigh fading). Also, both partial and opportunistic relay-selection strategies are exploited to further enhance system performance. Based on the exact distribution functions of the end-to-end signal-to-noise ratio (SNR) obtained herein, the outage probability, average symbol error probability, diversity order, and ergodic capacity of the system under study are analytically investigated. Our results show that system performance is dominated by the resource constraints and it improves slowly with increasing average SNR. Furthermore, larger Nakagami-m fading parameter on interference channels deteriorates system performance slightly. On the other hand, when interference power constraints are stringent, opportunistic relay selection can be exploited to improve system performance significantly. All analytical results are corroborated by simulation results and they are shown to be efficient tools for exact evaluation of system performance.

  7. Indigenous opportunistic bacteria inhabit mammalian gut-associated lymphoid tissues and share a mucosal antibody-mediated symbiosis.

    Obata, Takashi; Goto, Yoshiyuki; Kunisawa, Jun; Sato, Shintaro; Sakamoto, Mitsuo; Setoyama, Hiromi; Matsuki, Takahiro; Nonaka, Kazuhiko; Shibata, Naoko; Gohda, Masashi; Kagiyama, Yuki; Nochi, Tomonori; Yuki, Yoshikazu; Fukuyama, Yoshiko; Mukai, Akira; Shinzaki, Shinichiro; Fujihashi, Kohtaro; Sasakawa, Chihiro; Iijima, Hideki; Goto, Masatoshi; Umesaki, Yoshinori; Benno, Yoshimi; Kiyono, Hiroshi

    2010-04-20

    The indigenous bacteria create natural cohabitation niches together with mucosal Abs in the gastrointestinal (GI) tract. Here we report that opportunistic bacteria, largely Alcaligenes species, specifically inhabit host Peyer's patches (PPs) and isolated lymphoid follicles, with the associated preferential induction of antigen-specific mucosal IgA Abs in the GI tract. Alcaligenes were identified as the dominant bacteria on the interior of PPs from naïve, specific-pathogen-free but not from germ-free mice. Oral transfer of intratissue uncultured Alcaligenes into germ-free mice resulted in the presence of Alcaligenes inside the PPs of recipients. This result was further supported by the induction of antigen-specific Ab-producing cells in the mucosal (e.g., PPs) but not systemic compartment (e.g., spleen). The preferential presence of Alcaligenes inside PPs and the associated induction of intestinal secretory IgA Abs were also observed in both monkeys and humans. Localized mucosal Ab-mediated symbiotic immune responses were supported by Alcaligenes-stimulated CD11c(+) dendritic cells (DCs) producing the Ab-enhancing cytokines TGF-beta, B-cell-activating factor belonging to the TNF family, and IL-6 in PPs. These CD11c(+) DCs did not migrate beyond the draining mesenteric lymph nodes. In the absence of antigen-specific mucosal Abs, the presence of Alcaligenes in PPs was greatly diminished. Thus, indigenous opportunistic bacteria uniquely inhabit PPs, leading to PP-DCs-initiated, local antigen-specific Ab production; this may involve the creation of an optimal symbiotic environment on the interior of the PPs.

  8. On the performance of spectrum sharing systems with multiple antennas

    Yang, Liang

    2012-01-01

    In this paper, we study the capacity of spectrum sharing (SS) multiple-input multiple-output (MIMO) systems over Rayleigh fading channels. More specifically, we present closed-form capacity formulas for such systems with and without optimal power and rate adaptation. A lower bound on the capacity is also derived to characterize the scaling law of the capacity. Results show that increasing the number of antennas has a negative effect on the system capacity in the low signal-to-noise (SNR) regime and the scaling law at high SNR is similar to the conventional MIMO systems. In addition, a lower bound on the capacity of the SS keyhole MIMO channels is analyzed. We also present a capacity analysis of SS MIMO maximal ratio combining (MRC) systems and the results show that the capacity of such systems always decreases with the increase of the number of antennas. Numerical results are finally given to illustrate our analysis. © 2012 ICST.

  9. Energy efficient cross layer design for spectrum sharing systems

    Alabbasi, Abdulrahman

    2016-10-06

    We propose a cross layer design that optimizes the energy efficiency of spectrum sharing systems. The energy per good bit (EPG) is considered as an energy efficiency metric. We optimize the secondary user\\'s transmission power and media access frame length to minimize the EPG metric. We protect the primary user transmission via an outage probability constraint. The non-convex targeted problem is optimized by utilizing the generalized convexity theory and verifying the strictly pseudo-convex structure of the problem. Analytical results of the optimal power and frame length are derived. We also used these results in proposing an algorithm, which guarantees the existence of a global optimal solution. Selected numerical results show the improvement of the proposed system compared to other systems. © 2016 IEEE.

  10. 77 FR 18793 - Spectrum Sharing Innovation Test-Bed Pilot Program

    2012-03-28

    .... 120322212-2212-01] Spectrum Sharing Innovation Test-Bed Pilot Program AGENCY: National Telecommunications... Innovation Test-Bed pilot program to assess whether devices employing Dynamic Spectrum Access techniques can... Spectrum Sharing Innovation Test-Bed (Test-Bed) pilot program to examine the feasibility of increased...

  11. Switch and examine transmit diversity for spectrum sharing systems

    Abdallah, Mohamed M.

    2011-06-01

    In this paper, we develop a switch and examine transmit diversity algorithm for spectrum sharing cognitive networks. We consider a cognitive network composed of a primary link that employs constant rate and constant power transmission scheme with automatic-and-repeat request (ARQ) protocol, while the secondary link is composed of a fixed power multiple-antenna secondary transmitter and a single antenna receiver. Our objective is to develop a low complex transmit diversity algorithm at the secondary transmitter that maximizes the performance of the secondary link in terms of the effective throughput while maintaining a predetermined maximum loss in the packet rate of the primary link. In achieving this objective, we develop an algorithm that selects the best antenna, which maintains the quality of the secondary link in terms of signal-to-noise ratio above a specific threshold, based on overhearing the acknowledgment (ACK) and negative acknowledgment (NACK) feedback messages transmitted over the primary link. We also develop closed form expressions for the bit error rates and the effective throughput of the secondary link. © 2011 IEEE.

  12. Capacity analysis of spectrum sharing spatial multiplexing MIMO systems

    Yang, Liang

    2014-12-01

    This paper considers a spectrum sharing (SS) multiple-input multiple-output (MIMO) system operating in a Rayleigh fading environment. First the capacity of a single-user SS spatial multiplexing system is investigated in two scenarios that assume different receivers. To explicitly show the capacity scaling law of SS MIMO systems, some approximate capacity expressions for the two scenarios are derived. Next, we extend our analysis to a multiple user system with zero-forcing receivers (ZF) under spatially-independent scheduling and analyze the sum-rate. Furthermore, we provide an asymptotic sum-rate analysis to investigate the effects of different parameters on the multiuser diversity gain. Our results show that the secondary system with a smaller number of transmit antennas Nt and a larger number of receive antennas Nr can achieve higher capacity at lower interference temperature Q, but at high Q the capacity follows the scaling law of the conventional MIMO systems. However, for a ZF SS spatial multiplexing system, the secondary system with small Nt and large Nr can achieve the highest capacity throughout the entire region of Q. For a ZF SS spatial multiplexing system with scheduling, the asymptotic sum-rate scales like Ntlog2(Q(KNtNp-1)/Nt), where Np denotes the number of antennas of the primary receiver and K represents the number of secondary transmitters.

  13. Joint random beam and spectrum selection for spectrum sharing systems with partial channel state information

    Abdallah, Mohamed M.

    2013-11-01

    In this work, we develop joint interference-aware random beam and spectrum selection scheme that provide enhanced performance for the secondary network under the condition that the interference observed at the primary receiver is below a predetermined acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a set of primary links composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes jointly select a beam, among a set of power-optimized random beams, as well as the primary spectrum that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint. In particular, we consider the case where the interference level is described by a q-bit description of its magnitude, whereby we propose a technique to find the optimal quantizer thresholds in a mean square error (MSE) sense. © 2013 IEEE.

  14. Joint random beam and spectrum selection for spectrum sharing systems with partial channel state information

    Abdallah, Mohamed M.; Sayed, Mostafa M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2013-01-01

    In this work, we develop joint interference-aware random beam and spectrum selection scheme that provide enhanced performance for the secondary network under the condition that the interference observed at the primary receiver is below a predetermined acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a set of primary links composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes jointly select a beam, among a set of power-optimized random beams, as well as the primary spectrum that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint. In particular, we consider the case where the interference level is described by a q-bit description of its magnitude, whereby we propose a technique to find the optimal quantizer thresholds in a mean square error (MSE) sense. © 2013 IEEE.

  15. The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

    Y. B. Li

    2012-09-01

    Full Text Available The competitive price game model is used to analyze the spectrum sharing problem in the cognitive radio networks, and the spectrum sharing problem with the constraints of available spectrum resource from primary users is further discussed in this paper. The Rockafeller multiplier method is applied to deal with the constraints of available licensed spectrum resource, and the improved profits function is achieved, which can be used to measure the impact of shared spectrum price strategies on the system profit. However, in the competitive spectrum sharing problem of practical cognitive radio network, primary users have to determine price of the shared spectrum without the acknowledgement of the other primary user’s price strategies. Thus a fast gradient iterative calculation method of equilibrium price is proposed, only with acknowledgement of the price strategies of shared spectrum during last cycle. Through the adaptive iteration at the direction with largest gradient of improved profit function, the equilibrium price strategies can be achieved rapidly. It can also avoid the predefinition of adjustment factor according to the parameters of communication system in conventional linear iteration method. Simulation results show that the proposed competitive price spectrum sharing model can be applied in the cognitive radio networks with constraints of available licensed spectrum, and it has better convergence performance.

  16. Opportunistic Music

    Hachet , Martin; Kian , Arash; Berthaut , Florent; Franco , Jean-Sébastien; Desainte-Catherine , Myriam

    2009-01-01

    International audience; While mixed reality has inspired the development of many new musical instruments, few approaches explore the potential of mobile setups. We present a new musical interaction concept, called "opportunistic music". It allows musicians to recreate a hardware musical controller using any objects of their immediate environment. This approach benefits from the physical properties of real objects for controlling music. Our prototype is based on a stereo-vision tracking system...

  17. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  18. Achievable capacity of a spectrum sharing system over hyper fading channels

    Ekin, Sabit

    2009-11-01

    Cognitive radio with spectrum sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, achievable capacity gain of spectrum sharing systems over dynamic fading environments is studied. For the analysis, a theoretical fading model called hyper fading model that is suitable to the dynamic nature of cognitive radio channel is proposed. Closed-form expression of probability density function (PDF) and cumulative density function (CDF) of the signal-to-noise ratio (SNR) for secondary users in spectrum sharing systems are derived. In addition, the capacity gains achievable with spectrum sharing systems in high and low power regions are obtained. Numerical simulations are performed to study the effects of different fading figures, average powers, interference temperature, and number of secondary users on the achievable capacity.

  19. Cooperative AF Relaying in Spectrum-Sharing Systems: Outage Probability Analysis under Co-Channel Interferences and Relay Selection

    Xia, Minghua; Aissa, Sonia

    2012-01-01

    For cooperative amplify-and-forward (AF) relaying in spectrum-sharing wireless systems, secondary users share spectrum resources originally licensed to primary users to communicate with each other and, thus, the transmit power of secondary

  20. Resource allocation in shared spectrum access communications for operators with diverse service requirements

    Kibria, Mirza Golam; Villardi, Gabriel Porto; Ishizu, Kentaro; Kojima, Fumihide; Yano, Hiroyuki

    2016-12-01

    In this paper, we study inter-operator spectrum sharing and intra-operator resource allocation in shared spectrum access communication systems and propose efficient dynamic solutions to address both inter-operator and intra-operator resource allocation optimization problems. For inter-operator spectrum sharing, we present two competent approaches, namely the subcarrier gain-based sharing and fragmentation-based sharing, which carry out fair and flexible allocation of the available shareable spectrum among the operators subject to certain well-defined sharing rules, traffic demands, and channel propagation characteristics. The subcarrier gain-based spectrum sharing scheme has been found to be more efficient in terms of achieved throughput. However, the fragmentation-based sharing is more attractive in terms of computational complexity. For intra-operator resource allocation, we consider resource allocation problem with users' dissimilar service requirements, where the operator supports users with delay constraint and non-delay constraint service requirements, simultaneously. This optimization problem is a mixed-integer non-linear programming problem and non-convex, which is computationally very expensive, and the complexity grows exponentially with the number of integer variables. We propose less-complex and efficient suboptimal solution based on formulating exact linearization, linear approximation, and convexification techniques for the non-linear and/or non-convex objective functions and constraints. Extensive simulation performance analysis has been carried out that validates the efficiency of the proposed solution.

  1. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    Radaydeh, Redha M.; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2016-01-01

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered

  2. Two-way cooperative AF relaying in spectrum-sharing systems: Enhancing cell-edge performance

    Xia, Minghua; Aï ssa, Sonia

    2012-01-01

    signal-to-noise ratio (SNR). These important findings provide fresh perspectives for system designers to improve spectral efficiency of secondary users in next-generation broadband spectrum-sharing wireless systems. © 2012 IEEE.

  3. Underlay Spectrum Sharing Techniques with In-Band Full-Duplex Systems using Improper Gaussian Signaling

    Gaafar, Mohamed; Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim

    2016-01-01

    Sharing the spectrum with in-band full-duplex (FD) primary users (PUs) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-interference introduced at the primary network may dramatically impede

  4. Analysis of technology and business antecedents for spectrum sharing in mobile broadband networks

    Yrjölä, S. (Seppo)

    2017-01-01

    Abstract Sharing is emerging as one of the megatrends influencing future business opportunities, and wireless communications is no exception to this development. Future mobile broadband networks will operate on different types of spectrum bands including shared spectrum, which calls for changes in the operation and management of the networks. The creation and capture of value by the different players in the mobile broadband ecosystem is expected to change due to regulation, technology, an...

  5. A Novel Two-Stage Dynamic Spectrum Sharing Scheme in Cognitive Radio Networks

    Guodong Zhang; Wei Heng; Tian Liang; Chao Meng; Jinming Hu

    2016-01-01

    In order to enhance the efficiency of spectrum utilization and reduce communication overhead in spectrum sharing process,we propose a two-stage dynamic spectrum sharing scheme in which cooperative and noncooperative modes are analyzed in both stages.In particular,the existence and the uniqueness of Nash Equilibrium (NE) strategies for noncooperative mode are proved.In addition,a distributed iterative algorithm is proposed to obtain the optimal solutions of the scheme.Simulation studies are carried out to show the performance comparison between two modes as well as the system revenue improvement of the proposed scheme compared with a conventional scheme without a virtual price control factor.

  6. Multi-spectrum and transmit-antenna switched diversity schemes for spectrum sharing systems: A performance analysis

    Sayed, Mostafa

    2012-12-01

    In spectrum sharing systems, a secondary user (SU) is allowed to share the spectrum with a primary licensed user under the condition that the interference at the the primary user receiver (PU-Rx) is below a predetermined threshold. Joint primary spectrum and transmit antenna selection diversity schemes can be utilized as an efficient way to meet the quality of service (QoS) demands of the SUs while satisfying the interference constraint. In this paper, we consider a secondary link comprised of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx) sharing the same spectrum with a number of primary users (PUs) operating at distinct spectra. We present a performance analysis for two primary spectrum and transmit antenna switched selection schemes with different amount of feedback requirements. In particular, assuming Rayleigh fading and BPSK transmission, we derive approximate BER expressions for the presented schemes. For the sake of comparison, we also derive a closed-form BER expression for the optimal selection scheme that selects the best pair in terms of the SU-Rx signal-to-noise ratio (SNR) which has the disadvantage of high feedback requirements. Finally, our results are verified with numerical simulations. © 2012 IEEE.

  7. A fully distributed method for dynamic spectrum sharing in femtocells

    Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio; Kovacs, Istvan

    2012-01-01

    such characteristics are combined the traditional network planning and optimization of cellular networks fails to be cost effective. Therefore, a greater deal of automation is needed in femtocells. In particular, this paper proposes a novel method for autonomous selection of spectrum/ channels in femtocells....... This method effectively mitigates cotier interference with no signaling at all across different femtocells. Still, the method has a remarkable simple implementation. The efficiency of the proposed method was evaluated by system level simulations. The results show large throughput gains for the cells...

  8. Scalable Spectrum Sharing Mechanism for Local Area Networks Deployment

    Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio; Kovacs, Istvan Zsolt

    2010-01-01

    in high mobility conditions. These goals can be only achieved through the use highly Optimized Local Area (OLA) access networks, operating at low range and low power transmissions. The efficient sharing of radio resources among OLAs will be very difficult to achieve with a traditional network planning......The availability on the market of powerful and lightweight mobile devices has led to a fast diffusion of mobile services for end users and the trend is shifting from voice based services to multimedia contents distribution. The current access networks are, however, able to support relatively low...... data rates and with limited Quality of Service (QoS). In order to extend the access to high data rate services to wireless users, the International Telecommunication Union (ITU) established new requirements for future wireless communication technologies of up to 1Gbps in low mobility and up to 100Mbps...

  9. Capacity limits of spectrum-sharing systems over hyper-fading channels

    Ekin, Sabit

    2011-01-20

    Cognitive radio (CR) with spectrum-sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, the achievable capacity gain of spectrum-sharing systems over dynamic fading environments is studied. To perform a general analysis, a theoretical fading model called hyper-fading model that is suitable to the dynamic nature of CR channel is proposed. Closed-form expressions of probability density function (PDF) and cumulative density function (CDF) of the signal-to-noise ratio (SNR) for secondary users (SUs) in spectrum-sharing systems are derived. In addition, the capacity gains achievable with spectrum-sharing systems in high and low power regions are obtained. The effects of different fading figures, average fading powers, interference temperatures, peak powers of secondary transmitters, and numbers of SUs on the achievable capacity are investigated. The analytical and simulation results show that the fading figure of the channel between SUs and primary base-station (PBS), which describes the diversity of the channel, does not contribute significantly to the system performance gain. © 2011 John Wiley & Sons, Ltd.

  10. Capacity limits of spectrum-sharing systems over hyper-fading channels

    Ekin, Sabit; Yilmaz, Ferkan; Ç elebi, Hasari Burak; Qaraqe, Khalid A.; Alouini, Mohamed-Slim; Serpedin, Erchin

    2011-01-01

    Cognitive radio (CR) with spectrum-sharing feature is a promising technique to address the spectrum under-utilization problem in dynamically changing environments. In this paper, the achievable capacity gain of spectrum-sharing systems over dynamic fading environments is studied. To perform a general analysis, a theoretical fading model called hyper-fading model that is suitable to the dynamic nature of CR channel is proposed. Closed-form expressions of probability density function (PDF) and cumulative density function (CDF) of the signal-to-noise ratio (SNR) for secondary users (SUs) in spectrum-sharing systems are derived. In addition, the capacity gains achievable with spectrum-sharing systems in high and low power regions are obtained. The effects of different fading figures, average fading powers, interference temperatures, peak powers of secondary transmitters, and numbers of SUs on the achievable capacity are investigated. The analytical and simulation results show that the fading figure of the channel between SUs and primary base-station (PBS), which describes the diversity of the channel, does not contribute significantly to the system performance gain. © 2011 John Wiley & Sons, Ltd.

  11. Delay performance of a broadcast spectrum sharing network in Nakagami-m fading

    Khan, Fahd Ahmed; Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2014-01-01

    In this paper, we analyze the delay performance of a point-to-multipoint secondary network (P2M-SN), which is concurrently sharing the spectrum with a point-to-multipoint primary network (P2M-PN). The channel is assumed to be independent

  12. Interference-aware random beam selection schemes for spectrum sharing systems

    Abdallah, Mohamed

    2012-10-19

    Spectrum sharing systems have been recently introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a predetermined/acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a primary link composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes select a beam, among a set of power-optimized random beams, that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the SINR statistics as well as the capacity and bit error rate (BER) of the secondary link.

  13. Simultaneous wireless information and power transfer for spectrum sharing in cognitive radio communication systems

    Benkhelifa, Fatma

    2016-07-26

    In this paper, we consider the simultaneous wireless information and power transfer for the spectrum sharing (SS) in cognitive radio (CR) systems with a multi-antenna energy harvesting (EH) primary receiver (PR). The PR uses the antenna switching (AS) technique that assigns a subset of the PR\\'s antennas to harvest the energy from the radio frequency (RF) signals sent by the secondary transmitter (ST), and assigns the rest of the PR\\'s antennas to decode the information data. In this context, the primary network allows the secondary network to use the spectrum as long as the interference induced by the secondary transmitter (ST)\\'s signals is beneficial for the energy harvesting process at the PR side. The objective of this work is to show that the spectrum sharing is beneficial for both the SR and PR sides and leads to a win-win situation. To illustrate the incentive of the spectrum sharing cognitive system, we evaluate the mutual outage probability (MOP) introduced in [1] which declares an outage event if the PR or the secondary receiver (SR) is in an outage. Through the simulation results, we show that the performance of our system in terms of the MOP is always better than the performance of the system in the absence of ST and improves as the ST-PR interference increases. © 2016 IEEE.

  14. Outage Analysis of Spectrum-Sharing over M-Block Fading with Sensing Information

    Alabbasi, Abdulrahman

    2016-07-13

    Future wireless technologies, such as, 5G, are expected to support real-time applications with high data throughput, e.g., holographic meetings. From a bandwidth perspective, cognitive radio is a promising technology to enhance the system’s throughput via sharing the licensed spectrum. From a delay perspective, it is well known that increasing the number of decoding blocks will improve the system robustness against errors, while increasing the delay. Therefore, optimally allocating the resources to determine the tradeoff of tuning the length of decoding blocks while sharing the spectrum is a critical challenge for future wireless systems. In this work, we minimize the targeted outage probability over the block-fading channels while utilizing the spectrum-sharing concept. The secondary user’s outage region and the corresponding optimal power are derived, over twoblocks and M-blocks fading channels. We propose two suboptimal power strategies and derive the associated asymptotic lower and upper bounds on the outage probability with tractable expressions. These bounds allow us to derive the exact diversity order of the secondary user’s outage probability. To further enhance the system’s performance, we also investigate the impact of including the sensing information on the outage problem. The outage problem is then solved via proposing an alternating optimization algorithm, which utilizes the verified strict quasiconvex structure of the problem. Selected numerical results are presented to characterize the system’s behavior and show the improvements of several sharing concepts.

  15. On the performance of spectrum sharing systems with two-way relaying and multiuser diversity

    Yang, Liang

    2012-08-01

    In this letter, we consider a spectrum sharing network with two-way relaying and multi-user diversity. More specifically, one secondary transmitter with the best channel quality is selected and splits its partial power to relay its received signals to the primary users by using the amplify-and-forward relaying protocol. We derive a tight approximation for the resulting outage probability. Based on this formula, the performance of the spectral sharing region and the cell coverage are analyzed. Numerical results are given to verify our analysis and are discussed to illustrate the advantages of our newly proposed scheme. © 1997-2012 IEEE.

  16. Two-way cooperative AF relaying in spectrum-sharing systems: Enhancing cell-edge performance

    Xia, Minghua

    2012-09-01

    In this contribution, two-way cooperative amplify-and-forward (AF) relaying technique is integrated into spectrumsharing wireless systems to improve spectral efficiency of secondary users (SUs). In order to share the available spectrum resources originally dedicated to primary users (PUs), the transmit power of a SU is optimized with respect to the average tolerable interference power at primary receivers. By analyzing outage probability and achievable data rate at the base station and at a cell-edge SU, our results reveal that the uplink performance is dominated by the average tolerable interference power at primary receivers, while the downlink always behaves like conventional one-way AF relaying and its performance is dominated by the average signal-to-noise ratio (SNR). These important findings provide fresh perspectives for system designers to improve spectral efficiency of secondary users in next-generation broadband spectrum-sharing wireless systems. © 2012 IEEE.

  17. Exploring the Cognitive Foundations of the Shared Attention Mechanism: Evidence for a Relationship between Self-Categorization and Shared Attention across the Autism Spectrum

    Skorich, Daniel P.; Gash, Tahlia B.; Stalker, Katie L.; Zheng, Lidan; Haslam, S. Alexander

    2017-01-01

    The social difficulties of autism spectrum disorder (ASD) are typically explained as a disruption in the Shared Attention Mechanism (SAM) sub-component of the theory of mind (ToM) system. In the current paper, we explore the hypothesis that SAM's capacity to construct the self-other-object relations necessary for shared-attention arises from a…

  18. CBRS Spectrum Sharing between LTE-U and WiFi: A Multiarmed Bandit Approach

    Imtiaz Parvez

    2016-01-01

    Full Text Available The surge of mobile devices such as smartphone and tablets requires additional capacity. To achieve ubiquitous and high data rate Internet connectivity, effective spectrum sharing and utilization of the wireless spectrum carry critical importance. In this paper, we consider the use of unlicensed LTE (LTE-U technology in the 3.5 GHz Citizens Broadband Radio Service (CBRS band and develop a multiarmed bandit (MAB based spectrum sharing technique for a smooth coexistence with WiFi. In particular, we consider LTE-U to operate as a General Authorized Access (GAA user; hereby MAB is used to adaptively optimize the transmission duty cycle of LTE-U transmissions. Additionally, we incorporate downlink power control which yields a high energy efficiency and interference suppression. Simulation results demonstrate a significant improvement in the aggregate capacity (approximately 33% and cell-edge throughput of coexisting LTE-U and WiFi networks for different base station densities and user densities.

  19. Spectrum sharing in cognitive radio networks medium access control protocol based approach

    Pandit, Shweta

    2017-01-01

    This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.

  20. Spectrum Sharing Based on a Bertrand Game in Cognitive Radio Sensor Networks

    Biqing Zeng

    2017-01-01

    Full Text Available In the study of power control and allocation based on pricing, the utility of secondary users is usually studied from the perspective of the signal to noise ratio. The study of secondary user utility from the perspective of communication demand can not only promote the secondary users to meet the maximum communication needs, but also to maximize the utilization of spectrum resources, however, research in this area is lacking, so from the viewpoint of meeting the demand of network communication, this paper designs a two stage model to solve spectrum leasing and allocation problem in cognitive radio sensor networks (CRSNs. In the first stage, the secondary base station collects the secondary network communication requirements, and rents spectrum resources from several primary base stations using the Bertrand game to model the transaction behavior of the primary base station and secondary base station. The second stage, the subcarriers and power allocation problem of secondary base stations is defined as a nonlinear programming problem to be solved based on Nash bargaining. The simulation results show that the proposed model can satisfy the communication requirements of each user in a fair and efficient way compared to other spectrum sharing schemes.

  1. End-to-end performance of cooperative relaying in spectrum-sharing systems with quality of service requirements

    Asghari, Vahid Reza; Aissa, Sonia

    2011-01-01

    We propose adopting a cooperative relaying technique in spectrum-sharing cognitive radio (CR) systems to more effectively and efficiently utilize available transmission resources, such as power, rate, and bandwidth, while adhering to the quality

  2. Exploring the Cognitive Foundations of the Shared Attention Mechanism: Evidence for a Relationship Between Self-Categorization and Shared Attention Across the Autism Spectrum.

    Skorich, Daniel P; Gash, Tahlia B; Stalker, Katie L; Zheng, Lidan; Haslam, S Alexander

    2017-05-01

    The social difficulties of autism spectrum disorder (ASD) are typically explained as a disruption in the Shared Attention Mechanism (SAM) sub-component of the theory of mind (ToM) system. In the current paper, we explore the hypothesis that SAM's capacity to construct the self-other-object relations necessary for shared-attention arises from a self-categorization process, which is weaker among those with more autistic-like traits. We present participants with self-categorization and shared-attention tasks, and measure their autism-spectrum quotient (AQ). Results reveal a negative relationship between AQ and shared-attention, via self-categorization, suggesting a role for self-categorization in the disruption in SAM seen in ASD. Implications for intervention, and for a ToM model in which weak central coherence plays a role are discussed.

  3. Shared familial transmission of autism spectrum and attention-deficit/hyperactivity disorders.

    Musser, Erica D; Hawkey, Elizabeth; Kachan-Liu, Svetlana S; Lees, Paul; Roullet, Jean-Baptiste; Goddard, Katrina; Steiner, Robert D; Nigg, Joel T

    2014-07-01

    To determine whether familial transmission is shared between autism spectrum disorders and attention-deficit/hyperactivity disorder, we assessed the prevalence, rates of comorbidity, and familial transmission of both disorders in a large population-based sample of children during a recent 7 year period. Study participants included all children born to parents with the Kaiser Permanente Northwest (KPNW) Health Plan between 1 January 1998 and 31 December 2004 (n = 35,073). Children and mothers with physician-identified autism spectrum disorders (ASD) and/or attention-deficit/hyperactivity disorder (ADHD) were identified via electronic medical records maintained for all KPNW members. Among children aged 6-12 years, prevalence was 2.0% for ADHD and 0.8% for ASD; within those groups, 0.2% of the full sample (19% of the ASD sample and 9.6% of the ADHD sample) had co-occurring ASD and ADHD, when all children were included. When mothers had a diagnosis of ADHD, first born offspring were at 6-fold risk of ADHD alone (OR = 5.02, p disorders shares familial transmission with ADHD. ADHD and ASD have a partially overlapping diathesis. © 2014 The Authors. Journal of Child Psychology and Psychiatry. © 2014 Association for Child and Adolescent Mental Health.

  4. A Unified Framework for the Ergodic Capacity of Spectrum Sharing Cognitive Radio Systems

    Sboui, Lokman

    2012-12-29

    We consider a spectrum sharing communication scenario in which a primary and a secondary users are communicating, simultaneously, with their respective destinations using the same frequency carrier. Both optimal power profile and ergodic capacity are derived for fading channels, under an average transmit power and an instantaneous interference outage constraints. Unlike previous studies, we assume that the secondary user has a noisy version of the cross link and the secondary link Channel State Information (CSI). After deriving the capacity in this case, we provide an ergodic capacity generalization, through a unified expression, that encompasses several previously studied spectrum sharing settings. In addition, we provide an asymptotic capacity analysis at high and low signal-to-noise ratio (SNR). Numerical results, applied for independent Rayleigh fading channels, show that at low SNR regime, only the secondary channel estimation matters with no effect of the cross link on the capacity; whereas at high SNR regime, the capacity is rather driven by the cross link CSI. Furthermore, a practical on-off power allocation scheme is proposed and is shown, through numerical results, to achieve the full capacity at high and low SNR regimes and suboptimal rates in the medium SNR regime.

  5. Performance analysis of switch-based multiuser scheduling schemes with adaptive modulation in spectrum sharing systems

    Qaraqe, Marwa

    2014-04-01

    This paper focuses on the development of multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, two scheduling schemes are proposed for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme focuses on optimizing the average spectral efficiency by selecting the user that reports the best channel quality. In order to alleviate the relatively high feedback required by the first scheme, a second scheme based on the concept of switched diversity is proposed, where the base station (BS) scans the secondary users in a sequential manner until a user whose channel quality is above an acceptable predetermined threshold is found. We develop expressions for the statistics of the signal-to-interference and noise ratio as well as the average spectral efficiency, average feedback load, and the delay at the secondary BS. We then present numerical results for the effect of the number of users and the interference constraint on the optimal switching threshold and the system performance and show that our analysis results are in perfect agreement with the numerical results. © 2014 John Wiley & Sons, Ltd.

  6. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    Qaraqe, Marwa

    2012-12-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  7. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    Qaraqe, Marwa; Abdallah, Mohamed M.; Serpedin, Erchin; Alouini, Mohamed-Slim; Alnuweiri, Hussein M.

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  8. Interference-Aware Spectrum Sharing Techniques for Next Generation Wireless Networks

    Qaraqe, Marwa Khalid

    2011-11-20

    Background: Reliable high-speed data communication that supports multimedia application for both indoor and outdoor mobile users is a fundamental requirement for next generation wireless networks and requires a dense deployment of physically coexisting network architectures. Due to the limited spectrum availability, a novel interference-aware spectrum-sharing concept is introduced where networks that suffer from congested spectrums (secondary-networks) are allowed to share the spectrum with other networks with available spectrum (primary-networks) under the condition that limited interference occurs to primary networks. Objective: Multiple-antenna and adaptive rate can be utilized as a power-efficient technique for improving the data rate of the secondary link while satisfying the interference constraint of the primary link by allowing the secondary user to adapt its transmitting antenna, power, and rate according to the channel state information. Methods: Two adaptive schemes are proposed using multiple-antenna transmit diversity and adaptive modulation in order to increase the spectral-efficiency of the secondary link while maintaining minimum interference with the primary. Both the switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan-and-wait combining antenna technique (SWC) where there is a secondary transmission only when a branch with an acceptable performance is found; else the data is buffered. Results: In both these schemes the constellation size and selected transmit branch are determined to minimized the average number of switches and achieve the highest spectral efficiency given a minimum bit-error-rate (BER), fading conditions, and peak interference constraint. For delayed sensitive applications, two schemes using power control are used: SES-PC and BES-PC. In these schemes the secondary transmitter sends data using a nominal power level, which is optimized to minimize the average delay. Several numerical examples show

  9. Underlay Spectrum Sharing Techniques with In-Band Full-Duplex Systems using Improper Gaussian Signaling

    Gaafar, Mohamed

    2016-10-26

    Sharing the spectrum with in-band full-duplex (FD) primary users (PUs) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-interference introduced at the primary network may dramatically impede the secondary user (SU) opportunity to access the spectrum. To tackle this problem, we use the so-called improper Gaussian signaling. Particularly, we assume the downlink transmission of a SU that uses improper Gaussian signaling while the FD PU pair implements the regular proper Gaussian signaling. First, we derive a closed form expression and an upper bound for the SU and PUs outage probabilities, respectively. Second, we optimize the SU signal parameters to minimize its outage probability while maintaining the required PUs quality-of-service based on the average channel state information (CSI). Moreover, we provide the conditions to reap merits from employing improper Gaussian signaling at the SU. Third, we design the SU signal parameters based on perfect knowledge of its direct link instantaneous CSI and investigate all benefits that can be achieved at both the SU and PUs. Finally, we provide some numerical results that demonstrate the advantages of using improper Gaussian signaling to access the spectrum of the FD PUs.

  10. Sharing the Licensed Spectrum of Full-Duplex Systems Using Improper Gaussian Signaling

    Gaafar, Mohamed

    2015-12-01

    Sharing the spectrum with in-band full-duplex (FD) primary users (PU) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-interference introduced at the primary network may dramatically impede the secondary user (SU) opportunity to access the spectrum. In this work, we attempt to tackle this problem through the use of the so-called improper Gaussian signaling. Such a signaling technique has demonstrated its superiority in improving the overall performance in interference limited networks. Particularly, we assume a system with a SU pair working in half-duplex mode that uses improper Gaussian signaling while the FD PU pair implements the regular proper Gaussian signaling techniques. First, we derive a closed form expression for the SU outage probability and an upper bound for the PU outage probability. Then, we optimize the SU signal parameters to minimize its outage probability while maintaining the required PU quality-of-service based on the average channel state information. Finally, we provide some numerical results that validate the tightness of the PU outage probability bound and demonstrate the advantage of employing the improper Gaussian signaling to the SU in order to access the spectrum of the FD PU.

  11. Sharing the Licensed Spectrum of Full-Duplex Systems using Improper Gaussian Signaling

    Gaafar, Mohamed; Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim

    2016-01-01

    Sharing the spectrum with in-band full-duplex (FD) primary users (PU) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-inteference introducsed at the primary network may dramatically impede the secondary user (SU) opportunity to access the spectrum. In this work, we attempt to tackle this problem through the use of so called improper Gaussian signaling (IGS). Such a signaling technique has demonstrated its superiority in improving the overall performance in interference limited networks. Particularly, we assume a system with a SU pair working in half-duplex mode that uses IGS while the FD PU pair implements the regular proper Gaussiam signaling techniques. Frist, we derive a closed form expression for the SU outage probability while maintaining the required PU quality-of-service based on the average channel state information. Finally, we provide some numerical results that validate the tightness of the PU outage probability bound and demonstrate the advantage of employing IGS to the SU in order to access the spectrum of the FD PU.

  12. Sharing the Licensed Spectrum of Full-Duplex Systems using Improper Gaussian Signaling

    Gaafar, Mohamed

    2016-01-06

    Sharing the spectrum with in-band full-duplex (FD) primary users (PU) is a challenging and interesting problem in the underlay cognitive radio (CR) systems. The self-inteference introducsed at the primary network may dramatically impede the secondary user (SU) opportunity to access the spectrum. In this work, we attempt to tackle this problem through the use of so called improper Gaussian signaling (IGS). Such a signaling technique has demonstrated its superiority in improving the overall performance in interference limited networks. Particularly, we assume a system with a SU pair working in half-duplex mode that uses IGS while the FD PU pair implements the regular proper Gaussiam signaling techniques. Frist, we derive a closed form expression for the SU outage probability while maintaining the required PU quality-of-service based on the average channel state information. Finally, we provide some numerical results that validate the tightness of the PU outage probability bound and demonstrate the advantage of employing IGS to the SU in order to access the spectrum of the FD PU.

  13. Exploring Engagement in Shared Reading Activities Between Children with Autism Spectrum Disorder and Their Caregivers.

    Fleury, Veronica P; Hugh, Maria L

    2018-06-05

    Reading aloud to children is a valued practice to promote emergent literacy and language skills that form the foundation for future reading success. We conducted a descriptive study of shared book reading practices between caregivers and their children with autism spectrum disorder (n = 17) and caregivers and their typically developing children (n = 20) to identify factors that can promote or inhibit children's engagement in reading. Caregivers and their children read nine books (familiar, non-fiction, fiction). Children with ASD demonstrated lower levels of passive engagement (looking at the book) and higher levels of non-engaged behavior compared to typically developing children. Caregiver reading quality and book type contributed to joint engagement during reading. Implications of these findings for intervention development are discussed.

  14. Capacity of spectrum sharing Cognitive Radio systems over Nakagami fading channels at low SNR

    Sboui, Lokman

    2013-06-01

    In this paper, we study the ergodic capacity of Cognitive Radio (CR) spectrum sharing systems at low power regime. We focus on Nakagami fading channels. We formally define the low power regime and present closed form expressions of the capacity in the low power regime under various types of interference and/or power constraints, depending on the available channel state information (CSI) of the cross link (CL) between the secondary user transmitter and the primary user receiver. We explicitly characterize two regimes where either the interference constraint or the power constraint dictates the optimal power profile. Our framework also highlights the effects of different fading parameters on the secondary link ergodic capacity. Interestingly, we show that the low power regime analysis provides a specific insight on the capacity behavior of CR that has not been reported by previous studies. © 2013 IEEE.

  15. On the capacity of multiple cognitive links through common relay under spectrum-sharing constraints

    Yang, Yuli

    2011-06-01

    In this paper, we consider an underlay cognitive relaying network consisting of multiple secondary users and introduce a cooperative transmission protocol using a common relay to help with the communications between all secondary source-destination pairs for higher throughput and lower realization complexity. A whole relay-assisted transmission procedure is composed of multiple access phase and broadcast phase, where the relay is equipped with multiple antennas, and the secondary sources and destinations are single-antenna nodes. Considering the spectrum-sharing constraints on the secondary sources and the relay, we analyze the capacity behaviors of the underlay cognitive relaying network under study. The corresponding numerical results provide a convenient tool for the presented network design and substantiate a distinguishing feature of introduced design in that multiple secondary users\\' communications do not rely on multiple relays, hence allowing for a more efficient use of the radio resources. © 2011 IEEE.

  16. Spectrum sharing opportunities of full-duplex systems using improper Gaussian signaling

    Gaafar, Mohamed

    2015-08-01

    Sharing the licensed spectrum of full-duplex (FD) primary users (PU) brings strict limitations on the underlay cognitive radio operation. Particularly, the self interference may overwhelm the PU receiver and limit the opportunity of secondary users (SU) to access the spectrum. Improper Gaussian signaling (IGS) has demonstrated its superiority in improving the performance of interference channel systems. Throughout this paper, we assume a FD PU pair that uses proper Gaussian signaling (PGS), and a half-duplex SU pair that uses IGS. The objective is to maximize the SU instantaneous achievable rate while meeting the PU quality-of-service. To this end, we propose a simplified algorithm that optimizes the SU signal parameters, i.e, the transmit power and the circularity coefficient, which is a measure of the degree of impropriety of the SU signal, to achieve the design objective. Numerical results show the merits of adopting IGS compared with PGS for the SU especially with the existence of week PU direct channels and/or strong SU interference channels.

  17. Secondary access based on sensing and primary ARQ feedback in spectrum sharing systems

    Hamza, Doha R.

    2012-04-01

    In the context of primary/secondary spectrum sharing, we propose a randomized secondary access strategy with access probabilities that are a function of both the primary automatic repeat request (ARQ) feedback and the spectrum sensing outcome. The primary terminal operates in a time slotted fashion and is active only when it has a packet to send. The primary receiver can send a positive acknowledgment (ACK) when the received packet is decoded correctly. Lack of ARQ feedback is interpreted as erroneous reception or inactivity. We call this the explicit ACK scheme. The primary receiver may also send a negative acknowledgment (NACK) when the packet is received in error. Lack of ARQ feedback is interpreted as an ACK or no-transmission. This is called the explicit NACK scheme. Under both schemes, when the primary feedback is interpreted as a NACK, the secondary user assumes that there will be retransmission in the next slot and accesses the channel with a certain probability. When the primary feedback is interpreted as an ACK, the secondary user accesses the channel with either one of two probabilities based on the sensing outcome. Under these settings, we find the three optimal access probabilities via maximizing the secondary throughput given a constraint on the primary throughput. We compare the performance of the explicit ACK and explicit NACK schemes and contrast them with schemes based on either sensing or primary ARQ feedback only. © 2012 IEEE.

  18. On the coexistence of primary and secondary users in spectrum-sharing broadcast channels

    Yang, Yuli

    2013-06-01

    In this paper, we consider a broadcast channel in spectrum-sharing networks, where the base station schedules licensed primary users (PUs) and cognitive secondary users (SUs) simultaneously. Based on such a framework, we present a transmission strategy in the light of dirty paper coding. In order to promise the PUs\\' quality of service (QoS) in the broadcasting, the base station chooses codewords for the users by taking into account that the codewords pertaining to SUs can be pre-subtracted from those pertaining to PUs as if there were no interference from the secondary\\'s data to the primary\\'s data. For the purpose of performance evaluation, by taking capacity behavior and bit error rate (BER) as metrics, we study the achievable data rate regions for both types of users with the introduced design, and analyze the BER performance in corresponding systems implemented with hierarchical modulation. Numerical results substantiate that with flexible management of the spectrum resources, our proposed scheme provides more communication opportunities for SUs while maintaining PUs\\' QoS at an acceptable level. © 2013 IEEE.

  19. Shared heritability of attention-deficit/hyperactivity disorder and autism spectrum disorder.

    Rommelse, Nanda N J; Franke, Barbara; Geurts, Hilde M; Hartman, Catharina A; Buitelaar, Jan K

    2010-03-01

    Attention-deficit/hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are both highly heritable neurodevelopmental disorders. Evidence indicates both disorders co-occur with a high frequency, in 20-50% of children with ADHD meeting criteria for ASD and in 30-80% of ASD children meeting criteria for ADHD. This review will provide an overview on all available studies [family based, twin, candidate gene, linkage, and genome wide association (GWA) studies] shedding light on the role of shared genetic underpinnings of ADHD and ASD. It is concluded that family and twin studies do provide support for the hypothesis that ADHD and ASD originate from partly similar familial/genetic factors. Only a few candidate gene studies, linkage studies and GWA studies have specifically addressed this co-occurrence, pinpointing to some promising pleiotropic genes, loci and single nucleotide polymorphisms (SNPs), but the research field is in urgent need for better designed and powered studies to tackle this complex issue. We propose that future studies examining shared familial etiological factors for ADHD and ASD use a family-based design in which the same phenotypic (ADHD and ASD), candidate endophenotypic, and environmental measurements are obtained from all family members. Multivariate multi-level models are probably best suited for the statistical analysis.

  20. Sum-rate analysis of spectrum sharing spatial multiplexing MIMO systems with zero-forcing and multiuser diversity

    Yang, Liang; Qaraqe, Khalid A.; Serpedin, Erchin; Alouini, Mohamed-Slim

    2013-01-01

    This paper considers a multiuser spectrum sharing (SS) multiple-input multiple-output (MIMO) system with zero-forcing (ZF) operating in a Rayleigh fading environment. We provide an asymptotic sum-rate analysis to investigate the effects of different

  1. Effects of a Social Skills Intervention on Children with Autism Spectrum Disorder and Peers with Shared Deficits

    Radley, Keith C.; O'Handley, Roderick D.; Battaglia, Allison A.; Lum, John D. K.; Dadakhodjaeva, Komila; Ford, William B.; McHugh, Melissa B.

    2017-01-01

    The current study evaluated the effects of the "Superheroes Social Skills" program (Jenson et al. 2011) in promoting accurate demonstration of target social skills in training and generalization conditions in young children with autism spectrum disorder (ASD) and peers with shared social deficits. Three preschool-age children with ASD…

  2. Using Aromatherapy Massage to Increase Shared Attention Behaviours in Children with Autistic Spectrum Disorders and Severe Learning Difficulties

    Solomons, Steve

    2005-01-01

    Children with autistic spectrum disorders (ASD) characteristically display a lack of shared attention behaviours and the lack of these behaviours impacts on their ability to develop social interactions and relationships with others. Steve Solomons, assistant headteacher at Rectory Paddock School and Research Unit in the London Borough of Bromley,…

  3. Adapted Shared Storybook Reading: A Study of Its Application for Children with Autism Spectrum Disorders in Home Settings

    Golloher, Andrea N.

    2018-01-01

    This study investigated the use of an adapted shared reading protocol with three children with autism spectrum disorders (ASD) in home settings. Using a multiple baseline across participants design, this investigation replicated and extended a previous investigation by Browder et al. to children with ASD and home settings. In addition, this study…

  4. Delay analysis of a point-to-multipoint spectrum sharing network with CSI based power allocation

    Khan, Fahd Ahmed

    2012-10-01

    In this paper, we analyse the delay performance of a point-to-multipoint cognitive radio network which is sharing the spectrum with a point-to-multipoint primary network. The channel is assumed to be independent but not identically distributed and has Nakagami-m fading. A constraint on the peak transmit power of the secondary user transmitter (SU-Tx) is also considered in addition to the peak interference power constraint. Based on the constraints, a power allocation scheme which requires knowledge of the instantaneous channel state information (CSI) of the interference links is derived. The SU-Tx is assumed to be equipped with a buffer and is modelled using the M/G/1 queueing model. Closed form expressions for the probability distribution function (PDF) and cumulative distribution function (CDF) of the packet transmission time is derived. Using the PDF, the expressions for the moments of transmission time are obtained. In addition, using the moments, the expressions for the performance measures such as the total average waiting time of packets and the average number of packets waiting in the buffer of the SU-Tx are also obtained. Numerical simulations corroborate the theoretical results. © 2012 IEEE.

  5. Achievable Rate of Spectrum Sharing Cognitive Radio Multiple-Antenna Channels

    Sboui, Lokman

    2015-04-28

    We investigate the spectral efficiency gain of an uplink Cognitive Radio (CR) Multi-Input-Multi-Output system in which the Secondary User (SU) is allowed to share the spectrum with the Primary User (PU) using a specific precoding scheme to communicate with a common receiver. The proposed scheme exploits, at the same time, the free eigenmodes of the primary channel after a space alignment procedure and the interference threshold tolerated by the PU. At the common receiver, we adopt a Successive Interference Cancellation (SIC) technique to eliminate the effect of the detected primary signal transmitted through the exploited eigenmodes. Furthermore, we analyze the SIC operation inaccuracy as well as the CSI estimation imperfection on the PU and SU throughputs. Numerical results show that our proposed scheme enhances considerably the cognitive achievable rate. For instance, in case of a perfect detection of the PU signal, the CR rate remains non-zero for high Signal to Noise Ratio which is usually impossible when we only employ a space alignment technique. We show that a modified water-filling power allocation policy at the PU can increase the secondary rate with a marginal degradation of the primary rate. Finally, we investigate the behavior of the PU and SU rates through the study of the rate achievable region.

  6. Adaptive rate transmission for spectrum sharing system with quantized channel state information

    Abdallah, Mohamed M.

    2011-03-01

    The capacity of a secondary link in spectrum sharing systems has been recently investigated in fading environments. In particular, the secondary transmitter is allowed to adapt its power and rate to maximize its capacity subject to the constraint of maximum interference level allowed at the primary receiver. In most of the literature, it was assumed that estimates of the channel state information (CSI) of the secondary link and the interference level are made available at the secondary transmitter via an infinite-resolution feedback links between the secondary/primary receivers and the secondary transmitter. However, the assumption of having infinite resolution feedback links is not always practical as it requires an excessive amount of bandwidth. In this paper we develop a framework for optimizing the performance of the secondary link in terms of the average spectral efficiency assuming quantized CSI available at the secondary transmitter. We develop a computationally efficient algorithm for optimally quantizing the CSI and finding the optimal power and rate employed at the cognitive transmitter for each quantized CSI level so as to maximize the average spectral efficiency. Our results give the number of bits required to represent the CSI sufficient to achieve almost the maximum average spectral efficiency attained using full knowledge of the CSI for Rayleigh fading channels. © 2011 IEEE.

  7. Achievable rate of spectrum sharing cognitive radio systems over fading channels at low-power regime

    Sboui, Lokman

    2014-11-01

    We study the achievable rate of cognitive radio (CR) spectrum sharing systems at the low-power regime for general fading channels and then for Nakagami fading. We formally define the low-power regime and present the corresponding closed-form expressions of the achievable rate lower bound under various types of interference and/or power constraints, depending on the available channel state information of the cross link (CL) between the secondary-user transmitter and the primary-user receiver. We explicitly characterize two regimes where either the interference constraint or the power constraint dictates the optimal power profile. Our framework also highlights the effects of different fading parameters on the secondary link (SL) ergodic achievable rate. We also study more realistic scenarios when there is either 1-bit quantized channel feedback from the CL alone or 2-bit feedback from both the CL and the SL and propose simple power control schemes and show that these schemes achieve the previously achieved rate at the low-power regime. Interestingly, we show that the low-power regime analysis provides a specific insight into the maximum achievable rate behavior of CR that has not been reported by previous studies.

  8. Achievable rate of cognitive radio spectrum sharing MIMO channel with space alignment and interference temperature precoding

    Sboui, Lokman

    2013-06-01

    In this paper, we investigate the spectral efficiency gain of an uplink Cognitive Radio (CR) Multi-Input MultiOutput (MIMO) system in which the Secondary/unlicensed User (SU) is allowed to share the spectrum with the Primary/licensed User (PU) using a specific precoding scheme to communicate with a common receiver. The proposed scheme exploits at the same time the free eigenmodes of the primary channel after a space alignment procedure and the interference threshold tolerated by the PU. In our work, we study the maximum achievable rate of the CR node after deriving an optimal power allocation with respect to an outage interference and an average power constraints. We, then, study a protection protocol that considers a fixed interference threshold. Applied to Rayleigh fading channels, we show, through numerical results, that our proposed scheme enhances considerably the cognitive achievable rate. For instance, in case of a perfect detection of the PU signal, after applying Successive Interference Cancellation (SIC), the CR rate remains non-zero for high Signal to Noise Ratio (SNR) which is usually impossible when we only use space alignment technique. In addition, we show that the rate gain is proportional to the allowed interference threshold by providing a fixed rate even in the high SNR range. © 2013 IEEE.

  9. Adaptive transmission schemes for MISO spectrum sharing systems: Tradeoffs and performance analysis

    Bouida, Zied

    2014-10-01

    In this paper, we propose a number of adaptive transmission techniques in order to improve the performance of the secondary link in a spectrum sharing system. We first introduce the concept of minimum-selection maximum ratio transmission (MS-MRT) as an adaptive variation of the existing MRT (MRT) technique. While in MRT all available antennas are used for transmission, MS-MRT uses the minimum subset of antennas verifying both the interference constraint (IC) to the primary user and the bit error rate (BER) requirements. Similar to MRT, MS-MRT assumes that perfect channel state information (CSI) is available at the secondary transmitter (ST), which makes this scheme challenging from a practical point of view. To overcome this challenge, we propose another transmission technique based on orthogonal space-time block codes with transmit antenna selection (TAS). This technique uses the full-rate full-diversity Alamouti scheme in order to maximize the secondary\\'s transmission rate. The performance of these techniques is analyzed in terms of the average spectral efficiency (ASE), average number of transmit antennas, average delay, average BER, and outage performance. In order to give the motivation behind these analytical results, the tradeoffs offered by the proposed schemes are summarized and then demonstrated through several numerical examples.

  10. Proactive Spectrum Sharing for SWIPT in MIMO Cognitive Radio Systems Using Antenna Switching Technique

    Benkhelifa, Fatma

    2017-04-24

    In this paper, we consider the simultaneous wireless information and power transfer (SWIPT) for the spectrum sharing (SS) in a multiple-input multiple-output (MIMO) cognitive radio (CR) network. The secondary transmitter (ST) selects only one antenna which maximizes the received signal-to-noise ratio (SNR) at the secondary receiver (SR) and minimizes the interference induced at the primary receiver (PR). Moreover, PR is an energy harvesting (EH) node using the antenna switching (AS) which assigns a subset of its antennas to harvest the energy and assigns the rest to decode its information data. The objective of this work is to show that the SS is advantageous for both SR and PR sides and leads to a win-win situation. To illustrate the incentive of the SS in CR network, we evaluate the energy and data performance metrics in terms of the average harvested energy, the power outage, and the mutual outage probability (MOP) which declares a data outage event if the PR or SR is in an outage. We present some special cases and asymptotic results of the derived analytic results. Through the simulation results, we show the impact of various simulation parameters and the benefits due to the presence of ST.

  11. Adaptive rate transmission for spectrum sharing system with quantized channel state information

    Abdallah, Mohamed M.; Salem, Ahmed H.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2011-01-01

    The capacity of a secondary link in spectrum sharing systems has been recently investigated in fading environments. In particular, the secondary transmitter is allowed to adapt its power and rate to maximize its capacity subject to the constraint of maximum interference level allowed at the primary receiver. In most of the literature, it was assumed that estimates of the channel state information (CSI) of the secondary link and the interference level are made available at the secondary transmitter via an infinite-resolution feedback links between the secondary/primary receivers and the secondary transmitter. However, the assumption of having infinite resolution feedback links is not always practical as it requires an excessive amount of bandwidth. In this paper we develop a framework for optimizing the performance of the secondary link in terms of the average spectral efficiency assuming quantized CSI available at the secondary transmitter. We develop a computationally efficient algorithm for optimally quantizing the CSI and finding the optimal power and rate employed at the cognitive transmitter for each quantized CSI level so as to maximize the average spectral efficiency. Our results give the number of bits required to represent the CSI sufficient to achieve almost the maximum average spectral efficiency attained using full knowledge of the CSI for Rayleigh fading channels. © 2011 IEEE.

  12. End-to-end performance of cooperative relaying in spectrum-sharing systems with quality of service requirements

    Asghari, Vahid Reza

    2011-07-01

    We propose adopting a cooperative relaying technique in spectrum-sharing cognitive radio (CR) systems to more effectively and efficiently utilize available transmission resources, such as power, rate, and bandwidth, while adhering to the quality of service (QoS) requirements of the licensed (primary) users of the shared spectrum band. In particular, we first consider that the cognitive (secondary) user\\'s communication is assisted by an intermediate relay that implements the decode-and-forward (DF) technique onto the secondary user\\'s relayed signal to help with communication between the corresponding source and the destination nodes. In this context, we obtain first-order statistics pertaining to the first- and second-hop transmission channels, and then, we investigate the end-to-end performance of the proposed spectrum-sharing cooperative relaying system under resource constraints defined to assure that the primary QoS is unaffected. Specifically, we investigate the overall average bit error rate (BER), ergodic capacity, and outage probability of the secondary\\'s communication subject to appropriate constraints on the interference power at the primary receivers. We then consider a general scenario where a cluster of relays is available between the secondary source and destination nodes. In this case, making use of the partial relay selection method, we generalize our results for the single-relay scheme and obtain the end-to-end performance of the cooperative spectrum-sharing system with a cluster of L available relays. Finally, we examine our theoretical results through simulations and comparisons, illustrating the overall performance of the proposed spectrum-sharing cooperative system and quantify its advantages for different operating scenarios and conditions. © 2011 IEEE.

  13. Multihop Wireless Networks Opportunistic Routing

    Zeng, Kai; Li, Ming

    2011-01-01

    This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The authors cover many fundamental research issues for this new concept, including the basic principles, performance limit and performance improvement of opportunistic routing compared to traditional routing, energy efficiency and distributed opportunistic routing protocol desig

  14. Partial QoS-Aware Opportunistic Relay Selection Over Two-Hop Channels: End-to-End Performance Under Spectrum-Sharing Requirements

    Yuli Yang,; Hao Ma,; Aissa, Sonia

    2014-01-01

    it with transmission constraints imposed on the transmit power budget and interference to other users. By analyzing the statistics of received SNRs in the first and second hops, we obtain the end-to-end PLR of this scheme in closed form under the considered scenario

  15. Outage and ser performance of an opportunistic multi-user underlay cognitive network

    Khan, Fahd Ahmed

    2012-10-01

    Consider a multi-user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network and a single secondary user is selected for transmission. The channel is assumed to have independent but not identical Nakagami-m fading. Closed form expressions for the outage performance and the symbol-error-rate performance of the opportunistic multi-user secondary network are derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each secondary user. © 2012 IEEE.

  16. Delay performance of a broadcast spectrum sharing network in Nakagami-m fading

    Khan, Fahd Ahmed

    2014-03-01

    In this paper, we analyze the delay performance of a point-to-multipoint secondary network (P2M-SN), which is concurrently sharing the spectrum with a point-to-multipoint primary network (P2M-PN). The channel is assumed to be independent but not identically distributed (i.n.i.d.) and has Nakagami-m fading. A constraint on the peak transmit power of the secondary-user transmitter (SU-Tx) is considered, in addition to the peak interference power constraint. The SU-Tx is assumed to be equipped with a buffer and is modeled using the M/G/1 queueing model. The performance of this system is analyzed for two scenarios: 1) P2M-SN does not experience interference from the primary network (denoted by P2M-SN-NI), and 2) P2M-SN does experience interference from the primary network (denoted by P2M-SN-WI). The performance of both P2M-SN-NI and P2M-SN-WI is analyzed in terms of the packet transmission time, and the closed-form cumulative density function (cdf) of the packet transmission time is derived for both scenarios. Furthermore, by utilizing the concept of timeout, an exact closed-form expression for the outage probability of the P2M-SN-NI is obtained. In addition, an accurate approximation for the outage probability of the P2M-SN-WI is also derived. Furthermore, for the P2M-SN-NI, the analytic expressions for the total average waiting time (TAW-time) of packets and the average number of packets waiting in the buffer of the SU-Tx are also derived. Numerical simulations are also performed to validate the derived analytical results. © 1967-2012 IEEE.

  17. 76 FR 32993 - Toward Innovative Spectrum-Sharing Technologies: A Technical Workshop on Coordinating Federal...

    2011-06-07

    .../WSRD/ . Background: The dramatic rise of radio frequency-based applications has sparked a new sense of urgency among federal users, commercial service providers, equipment developers, and spectrum management...

  18. Shared heritability of attention-deficit/hyperactivity disorder and autism spectrum disorder

    Rommelse, N.N.J.; Franke, B.; Geurts, H.M.; Hartman, C.A.; Buitelaar, J.K.

    2010-01-01

    Attention-deficit/hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are both highly heritable neurodevelopmental disorders. Evidence indicates both disorders co-occur with a high frequency, in 20-50% of children with ADHD meeting criteria for ASD and in 30-80% of ASD children meeting

  19. Shared heritability of attention-deficit/hyperactivity disorder and autism spectrum disorder.

    Rommelse, N.N.J.; Franke, B.; Geurts, H.M.; Hartman, C.A.; Buitelaar, J.K.

    2010-01-01

    Attention-deficit/hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are both highly heritable neurodevelopmental disorders. Evidence indicates both disorders co-occur with a high frequency, in 20-50% of children with ADHD meeting criteria for ASD and in 30-80% of ASD children meeting

  20. Shared heritability of attention-deficit/hyperactivity disorder and autism spectrum disorder

    Rommelse, Nanda N. J.; Franke, Barbara; Geurts, Hilde M.; Hartman, Catharina A.; Buitelaar, Jan K.

    Attention-deficit/hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are both highly heritable neurodevelopmental disorders. Evidence indicates both disorders co-occur with a high frequency, in 20-50% of children with ADHD meeting criteria for ASD and in 30-80% of ASD children meeting

  1. Sum-rate analysis of spectrum sharing spatial multiplexing MIMO systems with zero-forcing and multiuser diversity

    Yang, Liang

    2013-06-01

    This paper considers a multiuser spectrum sharing (SS) multiple-input multiple-output (MIMO) system with zero-forcing (ZF) operating in a Rayleigh fading environment. We provide an asymptotic sum-rate analysis to investigate the effects of different parameters on the multiuser diversity gain. For a ZF SS spatial multiplexing system with scheduling, the asymptotic sum-rate scales like Nt log2(Q(Nt Np√K - 1)/N t), where Np denotes the number of antennas of primary receiver, Q is the interference temperature, and K represents the number of secondary transmitters. © 2013 IEEE.

  2. Spectrum

    Høgfeldt Hansen, Leif

    2016-01-01

    The publication functions as a proces description of the development and construction of an urban furniture SPECTRUM in the city of Gwangju, Republic of Korea. It is used as the cataloque for the exhibition of Spectrum.......The publication functions as a proces description of the development and construction of an urban furniture SPECTRUM in the city of Gwangju, Republic of Korea. It is used as the cataloque for the exhibition of Spectrum....

  3. Features of the broader autism phenotype in people with epilepsy support shared mechanisms between epilepsy and autism spectrum disorder.

    Richard, Annie E; Scheffer, Ingrid E; Wilson, Sarah J

    2017-04-01

    Richard, A.E., I.E. Scheffer and S.J. Wilson. Features of the broader autism phenotype in people with epilepsy support shared mechanisms between epilepsy and autism spectrum disorder. NEUROSCI BIOBEHAV REV 21(1) XXX-XXX, 2016. To inform on mechanisms underlying the comorbidity of epilepsy and autism spectrum disorder (ASD), we conducted meta-analyses to test whether impaired facial emotion recognition (FER) and theory of mind (ToM), key phenotypic traits of ASD, are more common in people with epilepsy (PWE) than controls. We contrasted these findings with those of relatives of individuals with ASD (ASD-relatives) compared to controls. Furthermore, we examined the relationship of demographic (age, IQ, sex) and epilepsy-related factors (epilepsy onset age, duration, seizure laterality and origin) to FER and ToM. Thirty-one eligible studies of PWE (including 1449 individuals: 77% with temporal lobe epilepsy), and 22 of ASD-relatives (N=1295) were identified by a systematic database search. Analyses revealed reduced FER and ToM in PWE compared to controls (p<0.001), but only reduced ToM in ASD-relatives (p<0.001). ToM was poorer in PWE than ASD-relatives. Only weak associations were found between FER and ToM and epilepsy-related factors. These findings suggest shared mechanisms between epilepsy and ASD, independent of intellectual disability. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Opportunistic Beacon Networks

    Türkes, Okan

    2016-01-01

    Modern society is surrounded by an ample spectrum of personal mobile devices with short-range wireless communication support. This ubiquity creates an immense potential of new concepts for people-centric ad hoc networks that can be applied to every personal and social dimension of life. The last

  5. MOSDEN: A Scalable Mobile Collaborative Platform for Opportunistic Sensing Applications

    Prem Prakash Jayaraman

    2014-05-01

    Full Text Available Mobile smartphones along with embedded sensors have become an efficient enabler for various mobile applications including opportunistic sensing. The hi-tech advances in smartphones are opening up a world of possibilities. This paper proposes a mobile collaborative platform called MOSDEN that enables and supports opportunistic sensing at run time. MOSDEN captures and shares sensor data acrossmultiple apps, smartphones and users. MOSDEN supports the emerging trend of separating sensors from application-specific processing, storing and sharing. MOSDEN promotes reuse and re-purposing of sensor data hence reducing the efforts in developing novel opportunistic sensing applications. MOSDEN has been implemented on Android-based smartphones and tablets. Experimental evaluations validate the scalability and energy efficiency of MOSDEN and its suitability towards real world applications. The results of evaluation and lessons learned are presented and discussed in this paper.

  6. Adaptive multi-channel downlink assignment for overloaded spectrum-shared multi-antenna overlaid cellular networks

    Radaydeh, Redha Mahmoud

    2012-10-19

    Overlaid cellular technology has been considered as a promising candidate to enhance the capacity and extend the coverage of cellular networks, particularly indoors. The deployment of small cells (e.g. femtocells and/or picocells) in an overlaid setup is expected to reduce the operational power and to function satisfactorily with the existing cellular architecture. Among the possible deployments of small-cell access points is to manage many of them to serve specific spatial locations, while reusing the available spectrum universally. This contribution considers the aforementioned scenario with the objective to serve as many active users as possible when the available downlink spectrum is overloaded. The case study is motivated by the importance of realizing universal resource sharing in overlaid networks, while reducing the load of distributing available resources, satisfying downlink multi-channel assignment, controlling the aggregate level of interference, and maintaining desired design/operation requirements. These objectives need to be achieved in distributed manner in each spatial space with as low processing load as possible when the feedback links are capacity-limited, multiple small-cell access points can be shared, and data exchange between access points can not be coordinated. This contribution is summarized as follows. An adaptive downlink multi-channel assignment scheme when multiple co-channel and shared small-cell access points are allocated to serve active users is proposed. It is assumed that the deployed access points employ isotropic antenna arrays of arbitrary sizes, operate using the open-access strategy, and transmit on shared physical channels simultaneously. Moreover, each active user can be served by a single transmit channel per each access point at a time, and can sense the concurrent interference level associated with each transmit antenna channel non-coherently. The proposed scheme aims to identify a suitable subset of transmit channels

  7. Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems

    Romano Fantacci

    2016-05-01

    Full Text Available A smart city is an environment where a pervasive, multi-service network is employed to provide citizens improved living conditions as well as better public safety and security. Advanced communication technologies are essential to achieve this goal. In particular, an efficient and reliable communication network plays a crucial role in providing continue, ubiquitous, and reliable interconnections among users, smart devices, and applications. As a consequence, wireless networking appears as the principal enabling communication technology despite the necessity to face severe challenges to satisfy the needs arising from a smart environment, such as explosive data volume, heterogeneous data traffic, and support of quality of service constraints. An interesting approach for meeting the growing data demand due to smart city applications is to adopt suitable methodologies to improve the usage of all potential spectrum resources. Towards this goal, a very promising solution is represented by the Cognitive Radio technology that enables context-aware capability in order to pursue an efficient use of the available communication resources according to the surrounding environment conditions. In this paper we provide a review of the characteristics, challenges, and solutions of a smart city communication architecture, based on the Cognitive Radio technology, by focusing on two new network paradigms—namely, Heterogeneous Network and Machines-to-Machines communications—that are of special interest to efficiently support smart city applications and services.

  8. Performance analysis of adaptive modulation for cognitive radios with opportunistic access

    Chen, Yunfei; Alouini, Mohamed-Slim; Tang, Liang

    2011-01-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing and primary user traffic for Nakagami-m fading channels. Both the adaptive continuous rate scheme

  9. Epidemiology and Ecology of Opportunistic Premise Plumbing Pathogens: Legionella pneumophila, Mycobacterium avium, and Pseudomonas aeruginosa

    BACKGROUND: Legionella pneumophila, Mycobacterium avium, and Pseudomonas aeruginosa are opportunistic premise plumbing pathogens (OPPPs) that persist and grow in household plumbing, habitats they share with humans. Infections caused by these OPPPs involve individuals with preexis...

  10. Opportunistic resource usage in CMS

    Kreuzer, Peter; Hufnagel, Dirk; Dykstra, D; Gutsche, O; Tadel, M; Sfiligoi, I; Letts, J; Wuerthwein, F; McCrea, A; Bockelman, B; Fajardo, E; Linares, L; Wagner, R; Konstantinov, P; Blumenfeld, B; Bradley, D

    2014-01-01

    CMS is using a tiered setup of dedicated computing resources provided by sites distributed over the world and organized in WLCG. These sites pledge resources to CMS and are preparing them especially for CMS to run the experiment's applications. But there are more resources available opportunistically both on the GRID and in local university and research clusters which can be used for CMS applications. We will present CMS' strategy to use opportunistic resources and prepare them dynamically to run CMS applications. CMS is able to run its applications on resources that can be reached through the GRID, through EC2 compliant cloud interfaces. Even resources that can be used through ssh login nodes can be harnessed. All of these usage modes are integrated transparently into the GlideIn WMS submission infrastructure, which is the basis of CMS' opportunistic resource usage strategy. Technologies like Parrot to mount the software distribution via CVMFS and xrootd for access to data and simulation samples via the WAN are used and will be described. We will summarize the experience with opportunistic resource usage and give an outlook for the restart of LHC data taking in 2015.

  11. Performance of an opportunistic multi-user cognitive network with multiple primary users

    Khan, Fahd Ahmed

    2014-04-01

    Consider a multi-user underlay cognitive network where multiple cognitive users, having limited peak transmit power, concurrently share the spectrum with a primary network with multiple users. The channel between the secondary network is assumed to have independent but not identical Nakagami-m fading. The interference channel between the secondary users and the primary users is assumed to have Rayleigh fading. The uplink scenario is considered where a single secondary user is selected for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the momentgenerating function, outage performance and the symbol-error-rate performance are derived. The outage performance is also studied in the asymptotic regimes and the generalized diversity gain of this scheduling scheme is derived. Numerical results corroborate the derived analytical results.

  12. Statistical Delay QoS Provisioning for Energy-Efficient Spectrum-Sharing Based Wireless Ad Hoc Sensor Networks

    Yichen Wang

    2016-01-01

    Full Text Available In this paper, we develop the statistical delay quality-of-service (QoS provisioning framework for the energy-efficient spectrum-sharing based wireless ad hoc sensor network (WAHSN, which is characterized by the delay-bound violation probability. Based on the established delay QoS provisioning framework, we formulate the nonconvex optimization problem which aims at maximizing the average energy efficiency of the sensor node in the WAHSN while meeting PU’s statistical delay QoS requirement as well as satisfying sensor node’s average transmission rate, average transmitting power, and peak transmitting power constraints. By employing the theories of fractional programming, convex hull, and probabilistic transmission, we convert the original fractional-structured nonconvex problem to the additively structured parametric convex problem and obtain the optimal power allocation strategy under the given parameter via Lagrangian method. Finally, we derive the optimal average energy efficiency and corresponding optimal power allocation scheme by employing the Dinkelbach method. Simulation results show that our derived optimal power allocation strategy can be dynamically adjusted based on PU’s delay QoS requirement as well as the channel conditions. The impact of PU’s delay QoS requirement on sensor node’s energy efficiency is also illustrated.

  13. Stimulating creativity through opportunistic software development

    Obrenovic, Z.; Gasevic, D.; Eliëns, A.

    2008-01-01

    Using opportunistic software development principles in computer engineering education encourages students to be creative and to develop solutions that cross the boundaries of diverse technologies. A framework for opportunistic software development education helps to create a space in which students

  14. Stimulating Creativity Through Opportunistic Software Development

    Z. Obrenovic; D. Gasevic; A. P. W. Eliëns (Anton)

    2008-01-01

    htmlabstractUsing opportunistic software development principles in computer engineering education encourages students to be creative and to develop solutions that cross the boundaries of diverse technologies. A framework for opportunistic software development education helps to create a space in

  15. Performance analysis of adaptive modulation for cognitive radios with opportunistic access

    Chen, Yunfei

    2011-06-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing and primary user traffic for Nakagami-m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical results show that spectrum sensing and primary user traffic cause considerable degradation to the bit error rate performance of adaptive modulation in a cognitive radio system with opportunistic access to the licensed channel. They also show that primary user traffic does not affect the link spectral efficiency performance of adaptive modulation, while the spectrum sensing degrades the link spectral efficiency performance. © 2011 IEEE.

  16. Lung Infections in Systemic Rheumatic Disease: Focus on Opportunistic Infections.

    Di Franco, Manuela; Lucchino, Bruno; Spaziante, Martina; Iannuccelli, Cristina; Valesini, Guido; Iaiani, Giancarlo

    2017-01-29

    Systemic rheumatic diseases have significant morbidity and mortality, due in large part to concurrent infections. The lung has been reported among the most frequent sites of infection in patients with rheumatic disease, who are susceptible to developing pneumonia sustained both by common pathogens and by opportunistic microorganisms. Patients with rheumatic disease show a peculiar vulnerability to infectious complications. This is due in part to intrinsic disease-related immune dysregulation and in part to the immunosuppressive treatments. Several therapeutic agents have been associated to a wide spectrum of infections, complicating the management of rheumatic diseases. This review discusses the most frequent pulmonary infections encountered in rheumatic diseases, focusing on opportunistic agents, consequent diagnostic challenges and appropriate therapeutic strategies.

  17. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  18. Opportunistic Sensing in Wireless Sensor Networks

    Scholten, Johan; Bakker, Pascal

    Opportunistic sensing systems consist of changing constellations of wireless sensor nodes that, for a limited amount of time, work together to achieve a common goal. Such constellations are self-organizing and come into being spontaneously. This paper presents an opportunistic sensing system to

  19. Power allocation and achievable data rate in spectrum-sharing channels under adaptive primary service outage constraints

    Yang, Yuli; Aï ssa, Sonia

    2012-01-01

    used, provides an interference-tolerable zone. Based on this gap, a secondary user (SU) has an increased opportunity to access the licensed spectrum and to determine the transmit power it should use to keep the PU's quality-of-service (QoS) unaffected

  20. 77 FR 41956 - Relocation of and Spectrum Sharing by Federal Government Stations-Technical Panel and Dispute...

    2012-07-17

    ... process through which any disagreements that may arise over the execution, timing, or cost of transition... or employee from each agency who is responsible for relocation or sharing efforts and who is... also an employee of one of the respective appointing agencies, his or her regular compensation in that...

  1. Quantum game application to spectrum scarcity problems

    Zabaleta, O. G.; Barrangú, J. P.; Arizmendi, C. M.

    2017-01-01

    Recent spectrum-sharing research has produced a strategy to address spectrum scarcity problems. This novel idea, named cognitive radio, considers that secondary users can opportunistically exploit spectrum holes left temporarily unused by primary users. This presents a competitive scenario among cognitive users, making it suitable for game theory treatment. In this work, we show that the spectrum-sharing benefits of cognitive radio can be increased by designing a medium access control based on quantum game theory. In this context, we propose a model to manage spectrum fairly and effectively, based on a multiple-users multiple-choice quantum minority game. By taking advantage of quantum entanglement and quantum interference, it is possible to reduce the probability of collision problems commonly associated with classic algorithms. Collision avoidance is an essential property for classic and quantum communications systems. In our model, two different scenarios are considered, to meet the requirements of different user strategies. The first considers sensor networks where the rational use of energy is a cornerstone; the second focuses on installations where the quality of service of the entire network is a priority.

  2. Candida glabrata: an emerging oral opportunistic pathogen.

    Li, L; Redding, S; Dongari-Bagtzoglou, A

    2007-03-01

    Following the widespread use of immunosuppressive therapy and broad-spectrum antimycotic prophylaxis, C. glabrata has emerged as an important opportunistic pathogen in the oral mucosa. In the past, studies on the virulence factors and host-pathogen interactions of this organism were scarce, but continued to rise in recent years. Denture-wearing, immunosuppression, antibiotic therapy, and aging are risk factors for oral colonization or infection with C. glabrata. Compared with C. albicans, C. glabrata exhibits lower oral keratinocyte-adherence capacity, but higher denture-surface-adherence ability. The role of extracellular hydrolase production in the virulence of this organism does not appear to be as important as it is in C. albicans pathogenesis. Although traditionally thought of as a non-transforming yeast organism, both phenotypic switching and pseudohyphal formation have recently been identified in C. glabrata, but their role in pathogenesis is not known. With the exception of granulocyte monocyte colony-stimulating factor, C. glabrata triggers a lower proinflammatory cytokine response in oral epithelial cells than does C. albicans, in a strain-dependent manner. C. glabrata is less susceptible to killing by human beta-defensins than is C. albicans and exhibits various degrees of resistance to the antifungal activity of salivary histatins and mucins. In addition, C. glabrata possesses both innate and acquired resistance against antifungal drugs, due to its ability to modify ergosterol biosynthesis, mitochondrial function, or antifungal efflux. This resistance allows for its relative overgrowth over other susceptible species and may contribute to the recent emergence of C. glabrata infections in chronically immunocompromised populations. Further investigations on the virulence and host-pathogen interactions of C. glabrata are needed to better define the pathogenesis of oral C. glabrata infection in susceptible hosts.

  3. A graph model for opportunistic network coding

    Sorour, Sameh; Aboutoraby, Neda; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    © 2015 IEEE. Recent advancements in graph-based analysis and solutions of instantly decodable network coding (IDNC) trigger the interest to extend them to more complicated opportunistic network coding (ONC) scenarios, with limited increase

  4. Cocoon: A lightweight opportunistic networking middleware for community-oriented smart mobile applications

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    Modern society is surrounded by an ample spectrum of smart mobile devices. This ubiquity forms a high potential for community-oriented opportunistic ad hoc networking applications. Nevertheless, today’s smart mobile devices such as smartphones, tablets, and wristbands are still onerous to

  5. Analytical evaluation of adaptive-modulation-based opportunistic cognitive radio in nakagami-m fading channels

    Chen, Yunfei; Alouini, Mohamed-Slim; Tang, Liang; Khan, Fahdahmed

    2012-01-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing, primary user (PU) traffic, and time delay for Nakagami- m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical examples are presented to quantify the effects of spectrum sensing, PU traffic, and time delay for different system parameters. © 1967-2012 IEEE.

  6. Analytical evaluation of adaptive-modulation-based opportunistic cognitive radio in nakagami-m fading channels

    Chen, Yunfei

    2012-09-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing, primary user (PU) traffic, and time delay for Nakagami- m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical examples are presented to quantify the effects of spectrum sensing, PU traffic, and time delay for different system parameters. © 1967-2012 IEEE.

  7. Evaluation of Opportunistic Routing Algorithms on Opportunistic Mobile Sensor Networks with Infrastructure Assistance

    Le Viet Duc, L Duc; Scholten, Johan; Havinga, Paul J.M.

    2012-01-01

    Recently the increasing number of sensors integrated in smartphones, especially the iPhone and Android phones, has motivated the development of routing algorithms for Opportunistic Mobile Sensor Networks (OppMSNs). Although there are many existing opportunistic routing algorithms, researchers still

  8. Performance analysis of an opportunistic multi-user cognitive network with multiple primary users

    Khan, Fahd Ahmed

    2014-03-01

    Consider a multi-user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network with multiple users. The channel between the secondary network is assumed to have independent but not identical Nakagami-m fading. The interference channel between the secondary users (SUs) and the primary users is assumed to have Rayleigh fading. A power allocation based on the instantaneous channel state information is derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each SU. The uplink scenario is considered where a single SU is selected for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the moment-generating function, outage performance, symbol error rate performance, and the ergodic capacity are derived. Numerical results corroborate the derived analytical results. The performance is also studied in the asymptotic regimes, and the generalized diversity gain of this scheduling scheme is derived. It is shown that when the interference channel is deeply faded and the peak transmit power constraint is relaxed, the scheduling scheme achieves full diversity and that increasing the number of primary users does not impact the diversity order. © 2014 John Wiley & Sons, Ltd.

  9. Power allocation and achievable data rate in spectrum-sharing channels under adaptive primary service outage constraints

    Yang, Yuli

    2012-09-01

    In this paper, we focus on a cognitive radio network where adaptive modulation is adopted in primary links. The gap between the primary user (PU)\\'s received signal-to-noise ratio (SNR) and the lower SNR boundary of the modulation mode that is being used, provides an interference-tolerable zone. Based on this gap, a secondary user (SU) has an increased opportunity to access the licensed spectrum and to determine the transmit power it should use to keep the PU\\'s quality-of-service (QoS) unaffected. However, since the SU cannot obtain perfect information on the PU\\'s received SNR, it has to choose an SNR point between the lower and upper boundaries of the PU\\'s current modulation mode as if this point were the real SNR received by the PU. Considering this issue, in order to quantify the effect of the SU\\'s transmissions on the PU\\'s QoS, we define the PU\\'s service outage probability and obtain its closed-form expressions by taking into account whether the peak transmit power constraint is imposed on the secondary\\'s transmission or not. Subsequently, we derive the SU\\'s achievable data rate in closed form for counterpart scenarios. Numerical results provided here quantify the relation between the PU\\'s service outage probability and the SU\\'s achievable data rate, which further demonstrate that the higher the peak transmit power a secondary transmitter can support, the better performance the cognitive radio network can achieve. © 2012 IEEE.

  10. Outbreak of extended-spectrum β-lactamase-producing Escherichia coli transmitted through breast milk sharing in a neonatal intensive care unit.

    Nakamura, K; Kaneko, M; Abe, Y; Yamamoto, N; Mori, H; Yoshida, A; Ohashi, K; Miura, S; Yang, T T; Momoi, N; Kanemitsu, K

    2016-01-01

    Routine surveillance in a neonatal intensive care unit (NICU) showed an increased detection of extended-spectrum β-lactamase (ESBL)-producing Escherichia coli (ESBL-E. coli) in August 2012, following nearly a year without detection. To describe the investigation and interventions by a hospital infection control team of an outbreak of ESBL-E. coli in a NICU. Six neonates with positive cultures of ESBL-E. coli (five with respiratory colonization, one with a urinary tract infection), control infants who were negative for ESBL-E. coli during the study period, and mothers who donated their breast milk were included. A case-control study was performed to identify possible risk factors for positive ESBL-E. coli cultures and molecular typing of isolated strains by pulsed-field gel electrophoresis. The odds ratio for ESBL-E. coli infection after receiving shared unpasteurized breast milk during the study period was 49.17 (95% confidence interval: 6.02-354.68; P milk of a particular donor. After ceasing the breast milk sharing, the outbreak was successfully terminated. This outbreak indicates that contamination of milk packs can result in transmission of a drug-resistant pathogen to newborn infants. Providers of human breast milk need to be aware of the necessity for low-temperature pasteurization and bacterial cultures, which should be conducted before and after freezing, before prescribing to infants. Copyright © 2015 The Healthcare Infection Society. Published by Elsevier Ltd. All rights reserved.

  11. Large scale fusion of gray matter and resting-state functional MRI reveals common and shared biological markers across the psychosis spectrum in the B-SNIP cohort

    Zheng eWang

    2015-12-01

    Full Text Available To investigate whether aberrant interactions between brain structure and function present similarly or differently across probands with psychotic illnesses (schizophrenia (SZ, schizoaffective disorder (SAD, and bipolar I disorder with psychosis (BP and whether these deficits are shared with their first-degree non-psychotic relatives. A total of 1199 subjects were assessed, including 220 SZ, 147 SAD, 180 psychotic BP, 150 first-degree relatives of SZ, 126 SAD relatives, 134 BP relatives and 242 healthy controls. All subjects underwent structural MRI (sMRI and resting-state functional MRI (rs-fMRI scanning. Joint independent analysis (jICA was used to fuse sMRI gray matter (GM and rs-fMRI amplitude of low frequency fluctuations (ALFF data to identify the relationship between the two modalities. Joint ICA revealed two significantly fused components. The association between functional brain alteration in a prefrontal-striatal-thalamic-cerebellar network and structural abnormalities in the default mode network (DMN was found to be common across psychotic diagnoses and correlated with cognitive function, social function and Schizo-Bipolar Scale (SBS scores. The fused alteration in the temporal lobe was unique to SZ and SAD. The above effects were not seen in any relative group (including those with cluster-A personality. Using a multivariate fused approach involving two widely used imaging markers we demonstrate both shared and distinct biological traits across the psychosis spectrum. Further, our results suggest that the above traits are psychosis biomarkers rather than endophenotypes.

  12. Economic transactions, opportunistic behavior and protective mechanisms

    Koch, Carsten Allan

    Whenever actors participate in transactions they expose themselves to risks of various kinds. Some of these risks are attributable to events outside the control of the participants and are unavoidable. Others originate in, or are aggrevated by, opportunistic actions undertaken by contract partners...... and other co-operators. This paper is concerned with the latter type of risk and the protection against it. Six protective mechanisms, which may serve as safeguards against opportunistic behavior, are presented and discussed. Special attention is paid to reputation effects. It is noted that such effects may...... account for the lack of opportunistic behavior with which networks are often credited. No protective mechanism is, however, effective under all circumstances....

  13. Performance analysis of opportunistic nonregenerative relaying

    Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.; Yang, Hongchuan

    2013-01-01

    Opportunistic relaying in cooperative communication depends on careful relay selection. However, the traditional centralized method used for opportunistic amplify-and-forward protocols requires precise measurements of channel state information at the destination. In this paper, we adopt the max-min criterion as a relay selection framework for opportunistic amplify-and-forward cooperative communications, which was exhaustively used for the decode-and-forward protocol, and offer an accurate performance analysis based on exact statistics of the local signal-to-noise ratios of the best relay. Furthermore, we evaluate the asymptotical performance and deduce the diversity order of our proposed scheme. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over Rayleigh fading channels, and we compare the max-min relay selection with their centralized channel state information-based and partial relay selection counterparts.

  14. Distance-Based Opportunistic Mobile Data Offloading.

    Lu, Xiaofeng; Lio, Pietro; Hui, Pan

    2016-06-15

    Cellular network data traffic can be offload onto opportunistic networks. This paper proposes a Distance-based Opportunistic Publish/Subscribe (DOPS) content dissemination model, which is composed of three layers: application layer, decision-making layer and network layer. When a user wants new content, he/she subscribes on a subscribing server. Users having the contents decide whether to deliver the contents to the subscriber based on the distance information. If in the meantime a content owner has traveled further in the immediate past time than the distance between the owner and the subscriber, the content owner will send the content to the subscriber through opportunistic routing. Simulations provide an evaluation of the data traffic offloading efficiency of DOPS.

  15. Distance-Based Opportunistic Mobile Data Offloading

    Xiaofeng Lu

    2016-06-01

    Full Text Available Cellular network data traffic can be offload onto opportunistic networks. This paper proposes a Distance-based Opportunistic Publish/Subscribe (DOPS content dissemination model, which is composed of three layers: application layer, decision-making layer and network layer. When a user wants new content, he/she subscribes on a subscribing server. Users having the contents decide whether to deliver the contents to the subscriber based on the distance information. If in the meantime a content owner has traveled further in the immediate past time than the distance between the owner and the subscriber, the content owner will send the content to the subscriber through opportunistic routing. Simulations provide an evaluation of the data traffic offloading efficiency of DOPS.

  16. Pattern of gastrointestinal opportunistic infections among HIV ...

    Twenty-two per cent (22%) of these had mixed parasitosis of cryptosporidium and hookworm. There was no significant association of CD4 cells count with intestinal parasitosis. x2 = 5.286 and p=0.259. However marital status was significantly associated with gastrointestinal opportunistic parasitosis with x2 of 12.693, ...

  17. Opportunistic Error Correction for WLAN Applications

    Shao, X.; Schiphorst, Roelof; Slump, Cornelis H.

    2008-01-01

    The current error correction layer of IEEE 802.11a WLAN is designed for worst case scenarios, which often do not apply. In this paper, we propose a new opportunistic error correction layer based on Fountain codes and a resolution adaptive ADC. The key part in the new proposed system is that only

  18. Government Spending Cycles: Ideological or Opportunistic?

    H.P. van Dalen (Hendrik); O.H. Swank (Otto)

    1996-01-01

    textabstractands. The time series analysis, covering the period 1953–1993, allows for different types of government spending. In general, spending is inspired by ideological and opportunistic motives: all government expenditure categories show an upward drift during election times and the partisan

  19. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    Zafar, Ammar; Alouini, Mohamed-Slim; Chen, Yunfei; Radaydeh, Redha M.

    2012-01-01

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  20. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    Zafar, Ammar

    2012-09-16

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  1. Iterative group splitting algorithm for opportunistic scheduling systems

    Nam, Haewoon; Alouini, Mohamed-Slim

    2014-01-01

    An efficient feedback algorithm for opportunistic scheduling systems based on iterative group splitting is proposed in this paper. Similar to the opportunistic splitting algorithm, the proposed algorithm adjusts (or lowers) the feedback threshold

  2. Efficient scheduling request algorithm for opportunistic wireless access

    Nam, Haewoon; Alouini, Mohamed-Slim

    2011-01-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers

  3. Error-rate performance analysis of opportunistic regenerative relaying

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2011-01-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path can

  4. New results on performance analysis of opportunistic regenerative relaying

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2013-01-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may

  5. Accurate performance analysis of opportunistic decode-and-forward relaying

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2011-01-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may

  6. Ultraviolet photovoltaics: Share the spectrum

    Milliron, Delia J.

    2017-08-01

    Electrically controlled windows require power to switch between transparent and tinted states. Now, an ultraviolet light-harvesting solar cell can power smart windows without compromising their control over heat and light.

  7. Pathogenic and opportunistic microorganisms in caves

    Sanchez-Moral Sergio

    2010-01-01

    Full Text Available With today’s leisure tourism, the frequency of visits to many caves makes it necessary to know about possible potentially pathogenic microorganisms in caves, determine their reservoirs, and inform the public about the consequences of such visits. Our data reveal that caves could be a potential danger to visitors because of the presence of opportunistic microorganisms, whose existence and possible development in humans is currently unknown.

  8. Computed tomography in opportunistic lung infections

    Hartelius, H.

    1988-01-01

    Chest radiography in two teenage boys, one with Wiscott-Aldrich's syndrome and one with acute lymphatic leucemia in remission showed increased interstitial pattern. In both computed tomography (CT) of the lungs showed heavy interstitial pneumonia, rather different in appearance but in both cases equal to the CT findings in opportunistic lung infections known from immunoincompetent patients with for instance pneumocystis carinii and/or cytomegalo virus infections. In both patients the CT findings led to lung biopsy establishing the etiologic agent. (orig.)

  9. Mobile opportunistic networks architectures, protocols and applications

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  10. Facilitating Knowledge Sharing

    Holdt Christensen, Peter

    knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organizational settings, the paper explores how knowledge exchange can be conceptualized as going on in four...... distinct situations of exchange denominated organizational exchange yielding extrinsic rewards, organizational exchange yielding intrinsic rewards, financial exchange, and social exchange. The paper argues that each situation of exchange has distinct assumptions about individual behaviour...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  11. Threshold Based Opportunistic Scheduling of Secondary Users in Underlay Cognitive Radio Networks

    Song, Yao

    2011-12-01

    In underlay cognitive radio networks, secondary users can share the spectrum with primary users as long as the interference caused by the secondary users to primary users is below a certain predetermined threshold. It is reasonable to assume that there is always a large pool of secondary users trying to access the channel, which can be occupied by only one secondary user at a given time. As a result, a multi-user scheduling problem arises among the secondary users. In this thesis, by manipulating basic schemes based on selective multi-user diversity, normalized thresholding, transmission power control, and opportunistic round robin, we propose and analyze eight scheduling schemes of secondary users in an underlay cognitive radio set-up. The system performance of these schemes is quantified by using various performance metrics such as the average system capacity, normalized average feedback load, scheduling outage probability, and system fairness of access. In our proposed schemes, the best user out of all the secondary users in the system is picked to transmit at each given time slot in order to maximize the average system capacity. Two thresholds are used in the two rounds of the selection process to determine the best user. The first threshold is raised by the power constraint from the primary user. The second threshold, which can be adjusted by us, is introduced to reduce the feedback load. The overall system performance is therefore dependent on the choice of these two thresholds and the number of users in the system given the channel conditions for all the users. In this thesis, by deriving analytical formulas and presenting numerical examples, we try to provide insights of the relationship between the performance metrics and the involved parameters including two selection thresholds and the number of active users in the system, in an effort to maximize the average system capacity as well as satisfy the requirements of scheduling outage probability and

  12. Opportunistic pathology-based screening for diabetes

    Simpson, Aaron J; Krowka, Renata; Kerrigan, Jennifer L; Southcott, Emma K; Wilson, J Dennis; Potter, Julia M; Nolan, Christopher J; Hickman, Peter E

    2013-01-01

    Objective To determine the potential of opportunistic glycated haemoglobin (HbA1c) testing of pathology samples to detect previously unknown diabetes. Design Pathology samples from participants collected for other reasons and suitable for HbA1c testing were utilised for opportunistic diabetes screening. HbA1c was measured with a Biorad Variant II turbo analyser and HbA1c levels of ≥6.5% (48 mmol/mol) were considered diagnostic for diabetes. Confirmation of previously unknown diabetes status was obtained by a review of hospital medical records and phone calls to general practitioners. Setting Hospital pathology laboratory receiving samples from hospital-based and community-based (CB) settings. Participants Participants were identified based on the blood sample collection location in the CB, emergency department (ED) and inpatient (IP) groups. Exclusions pretesting were made based on the electronic patient history of: age <18 years, previous diabetes diagnosis, query for diabetes status in the past 12 months, evidence of pregnancy and sample collected postsurgery or transfusion. Only one sample per individual participant was tested. Results Of the 22 396 blood samples collected, 4505 (1142 CB, 1113 ED, 2250 IP) were tested of which 327 (7.3%) had HbA1c levels ≥6.5% (48 mmol/mol). Of these 120 (2.7%) were determined to have previously unknown diabetes (11 (1%) CB, 21 (1.9%) ED, 88 (3.9%) IP). The prevalence of previously unknown diabetes was substantially higher (5.4%) in hospital-based (ED and IP) participants aged over 54 years. Conclusions Opportunistic testing of referred pathology samples can be an effective method of screening for diabetes, especially in hospital-based and older persons. PMID:24065696

  13. Trust Management System for Opportunistic Cloud Services

    Kuada, Eric

    2013-01-01

    We have over the past three years been working on the feasibility of Opportunistic Cloud Services (OCS) for enterprises. OCS is about enterprises strategically contributing and utilizing spare IT resources as cloud services. One of the major challenges that such a platform faces is data security...... and trust management issues. This paper presents a trust management system for OCS platforms. It models the concept of trust and applies it to OCS platforms. The trust model and the trust management system are verified through the simulation of the computation of the trust values with Infrastructure...

  14. SpecNet: Spectrum Sensing Sans Frontieres

    Iyer, Anand Padmanabha; Chintalapudi, Krishna; Navda, Vishnu; Ramjee, Ramachandran; Padmanabhan, Venkata N; Murthy, Chandra R

    2011-01-01

    While the under-utilization of licensed spectrum based on measurement studies conducted in a few developed countries has spurred lots of interest in opportunistic spectrum access, there exists no infrastructure today for measuring real-time spectrum occupancy across vast geographical regions. In this paper, we present the design and implementation of SpecNet, a first-of-its-kind platform that allows spectrum analyzers around the world to be networked and efficiently used in a coordinated manner...

  15. TVWS devices spectrum mask test and analysis

    Lamola, MM

    2016-09-01

    Full Text Available Dynamic Spectrum Access (DSA) plays a vital role in opportunistic access to spectrum. A key component of DSA is preventing interference to the incumbent (primary) user from the secondary user. We present the results of an experiment to analyze...

  16. Enabling opportunistic resources for CMS Computing Operations

    Hufnagel, Dick [Fermilab

    2015-11-19

    With the increased pressure on computing brought by the higher energy and luminosity from the LHC in Run 2, CMS Computing Operations expects to require the ability to utilize “opportunistic” resources — resources not owned by, or a priori configured for CMS — to meet peak demands. In addition to our dedicated resources we look to add computing resources from non CMS grids, cloud resources, and national supercomputing centers. CMS uses the HTCondor/glideinWMS job submission infrastructure for all its batch processing, so such resources will need to be transparently integrated into its glideinWMS pool. Bosco and parrot wrappers are used to enable access and bring the CMS environment into these non CMS resources. Here we describe our strategy to supplement our native capabilities with opportunistic resources and our experience so far using them.

  17. Alleviate Cellular Congestion Through Opportunistic Trough Filling

    Yichuan Wang

    2014-04-01

    Full Text Available The demand for cellular data service has been skyrocketing since the debut of data-intensive smart phones and touchpads. However, not all data are created equal. Many popular applications on mobile devices, such as email synchronization and social network updates, are delay tolerant. In addition, cellular load varies significantly in both large and small time scales. To alleviate network congestion and improve network performance, we present a set of opportunistic trough filling schemes that leverage the time-variation of network congestion and delay-tolerance of certain traffic in this paper. We consider average delay, deadline, and clearance time as the performance metrics. Simulation results show promising performance improvement over the standard schemes. The work shed lights on addressing the pressing issue of cellular overload.

  18. Towards New Antifolates Targeting Eukaryotic Opportunistic Infections

    Liu, J.; Bolstad, D; Bolstad, E; Wright, D; Anderson, A

    2009-01-01

    Trimethoprim, an antifolate commonly prescribed in combination with sulfamethoxazole, potently inhibits several prokaryotic species of dihydrofolate reductase (DHFR). However, several eukaryotic pathogenic organisms are resistant to trimethoprim, preventing its effective use as a therapeutic for those infections. We have been building a program to reengineer trimethoprim to more potently and selectively inhibit eukaryotic species of DHFR as a viable strategy for new drug discovery targeting several opportunistic pathogens. We have developed a series of compounds that exhibit potent and selective inhibition of DHFR from the parasitic protozoa Cryptosporidium and Toxoplasma as well as the fungus Candida glabrata. A comparison of the structures of DHFR from the fungal species Candida glabrata and Pneumocystis suggests that the compounds may also potently inhibit Pneumocystis DHFR.

  19. Opportunistic esophagitis in AIDS: Radiographic diagnosis

    Levine, M.S.; Woldenberg, R.; Herlinger, H.; Laufer, I.

    1987-01-01

    Between 1983 and 1986, 35 of 90 patients with acquired immunodeficiency syndrome (AIDS) had double-contrast esophagograms to rule out opportunistic esophagitis. The radiographs were reviewed without knowledge of the clinical or endoscopic findings. Candida esophagitis was diagnosed radiographically in 17 patients who had varying degrees of plaque formation and viral esophagitis in three who had discrete ulcers without plaques. All three patients with viral esophagitis (herpes in 2 and cytomegalo virus in one) and 15 of 17 with Candida esophagitis had endoscopic and/or clinical corroboration of the radiographic diagnosis. Thus, the authors' experience suggests that fungal and viral esophagitis can often be differentiated on double-contrast esophagography, so that appropriate antifungal or antiviral therapy can be instituted without need for endoscopic intervention

  20. Outage Performance in Cognitive Radio Systems with Opportunistic Interference Cancelation

    Di Taranto, Rocco; Popovski, Petar

    2011-01-01

    , respectively. The secondary receiver applies Opportunistic Interference Cancelation (OIC) and Suboptimal Opportunistic Interference Cancelation (S-OIC) thus decoding the primary signal when such an opportunity is created by the rate selected at the primary transmitter and the power received from the primary...

  1. Opportunistic Data Collection in Sparse Wireless Sensor Networks

    Franceschinis Mirko

    2011-01-01

    Full Text Available Opportunistic wireless sensor networks (WSNs have recently been proposed as solutions for many remote monitoring problems. Many such problems, including environmental monitoring, involve large deployment scenarios with lower-than-average node density, as well as a long time scale and limited budgets. Traditional approaches designed for conventional situations, and thus not optimized for these scenarios, entail unnecessary complexity and larger costs. This paper discusses the issues related with the design and test of opportunistic architectures, and presents one possible solution—CHARON (Convergent Hybrid-replication Approach to Routing in Opportunistic Networks. Both algorithm-specific and comparative simulation results are presented, as well as real-world tests using a reference implementation. A comprehensive experimental setup was also used to seek a full characterization of the devised opportunistic approach including the derivation of a simple analytical model that is able to accurately predict the opportunistic message delivery performance in the used test bed.

  2. New resource allocation scheme for cognitive relay networks with opportunistic access

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  3. Exploiting volatile opportunistic computing resources with Lobster

    Woodard, Anna; Wolf, Matthias; Mueller, Charles; Tovar, Ben; Donnelly, Patrick; Hurtado Anampa, Kenyi; Brenner, Paul; Lannon, Kevin; Hildreth, Mike; Thain, Douglas

    2015-12-01

    Analysis of high energy physics experiments using the Compact Muon Solenoid (CMS) at the Large Hadron Collider (LHC) can be limited by availability of computing resources. As a joint effort involving computer scientists and CMS physicists at Notre Dame, we have developed an opportunistic workflow management tool, Lobster, to harvest available cycles from university campus computing pools. Lobster consists of a management server, file server, and worker processes which can be submitted to any available computing resource without requiring root access. Lobster makes use of the Work Queue system to perform task management, while the CMS specific software environment is provided via CVMFS and Parrot. Data is handled via Chirp and Hadoop for local data storage and XrootD for access to the CMS wide-area data federation. An extensive set of monitoring and diagnostic tools have been developed to facilitate system optimisation. We have tested Lobster using the 20 000-core cluster at Notre Dame, achieving approximately 8-10k tasks running simultaneously, sustaining approximately 9 Gbit/s of input data and 340 Mbit/s of output data.

  4. Opportunistic Relay Selection with Cooperative Macro Diversity

    Yu Chia-Hao

    2010-01-01

    Full Text Available We apply a fully opportunistic relay selection scheme to study cooperative diversity in a semianalytical manner. In our framework, idle Mobile Stations (MSs are capable of being used as Relay Stations (RSs and no relaying is required if the direct path is strong. Our relay selection scheme is fully selection based: either the direct path or one of the relaying paths is selected. Macro diversity, which is often ignored in analytical works, is taken into account together with micro diversity by using a complete channel model that includes both shadow fading and fast fading effects. The stochastic geometry of the network is taken into account by having a random number of randomly located MSs. The outage probability analysis of the selection differs from the case where only fast fading is considered. Under our framework, distribution of the received power is formulated using different Channel State Information (CSI assumptions to simulate both optimistic and practical environments. The results show that the relay selection gain can be significant given a suitable amount of candidate RSs. Also, while relay selection according to incomplete CSI is diversity suboptimal compared to relay selection based on full CSI, the loss in average throughput is not too significant. This is a consequence of the dominance of geometry over fast fading.

  5. A graph model for opportunistic network coding

    Sorour, Sameh

    2015-08-12

    © 2015 IEEE. Recent advancements in graph-based analysis and solutions of instantly decodable network coding (IDNC) trigger the interest to extend them to more complicated opportunistic network coding (ONC) scenarios, with limited increase in complexity. In this paper, we design a simple IDNC-like graph model for a specific subclass of ONC, by introducing a more generalized definition of its vertices and the notion of vertex aggregation in order to represent the storage of non-instantly-decodable packets in ONC. Based on this representation, we determine the set of pairwise vertex adjacency conditions that can populate this graph with edges so as to guarantee decodability or aggregation for the vertices of each clique in this graph. We then develop the algorithmic procedures that can be applied on the designed graph model to optimize any performance metric for this ONC subclass. A case study on reducing the completion time shows that the proposed framework improves on the performance of IDNC and gets very close to the optimal performance.

  6. Opportunistic transmitter selection for selfless overlay cognitive radios

    Shaqfeh, Mohammad

    2013-11-01

    We propose an opportunistic strategy to grant channel access to the primary and secondary transmitters in causal selfless overlay cognitive radios over block-fading channels. The secondary transmitter helps the primary transmitter by relaying the primary messages opportunistically, aided by a buffer to store the primary messages temporarily. The optimal channel-aware transmitter- selection strategy is the solution of the maximization of the average secondary rate under the average primary rate requirement and the buffer stability constraints. Numerical results demonstrate the gains of the proposed opportunistic selection strategy. © 2013 IEEE.

  7. Specialized Fungal Parasites and Opportunistic Fungi in Gardens of Attine Ants

    Fernando C. Pagnocca

    2012-01-01

    Full Text Available Ants in the tribe Attini (Hymenoptera: Formicidae comprise about 230 described species that share the same characteristic: all coevolved in an ancient mutualism with basidiomycetous fungi cultivated for food. In this paper we focused on fungi other than the mutualistic cultivar and their roles in the attine ant symbiosis. Specialized fungal parasites in the genus Escovopsis negatively impact the fungus gardens. Many fungal parasites may have small impacts on the ants' fungal colony when the colony is balanced, but then may opportunistically shift to having large impacts if the ants' colony becomes unbalanced.

  8. Low-Feedback Opportunistic Scheduling Schemes for Wireless Networks with Heterogenous Users

    Rashid, Faraan

    2012-07-01

    Efficient implementation of resource sharing strategies in a multi-user wireless environment can improve the performance of a network significantly. In this thesis we study various scheduling strategies for wireless networks and handle the problem of opportunistically scheduling transmissions using channel aware schemes. First we propose a scheme that can handle users with asymmetric channel conditions and is opportunistic in the sense that it exploits the multi-user diversity of the network. The scheme requires the users to have a priori knowledge of their channel distributions. The associated overhead is limited meaning it offers reduced feedback load, that does not scale with the increasing number of users. The main technique used to shrink the feedback load is the contention based distributed implementation of a splitting algorithm that does not require explicit feedback to the scheduler from every user. The users find the best among themselves, in a distributed manner, while requiring just a ternary broadcast feedback from the scheduler at the end of each mini-slot. In addition, it can also handle fairness constraints in time and throughput to various degrees. Next we propose another opportunistic scheduler that offers most of the benefits of the previously proposed scheme but is more practical because it can also handle heterogenous users whose channel distributions are unknown. This new scheme actually reduces the complexity and is also more robust for changing traffic patterns. Finally we extend both these schemes to the scenario where there are fixed thresholds, this enables us to handle opportunistic scheduling in practical systems that can only transmit over finite number of discrete rates with the additional benefit that full feedback session, even from the selected user, is never required.

  9. A Multi-Antenna Framework for Spectrum Reuse Based on Primary-Secondary Cooperation

    Bakr, Omar

    2008-10-01

    This paper proposes a new framework for spectrum reuse. Existing architectures have centered on secondary users (cognitive radios) that can reliably sense primary users and opportunistically transmit, without directly interacting with the primary system. We present a paradigm in which the primary and secondary systems cooperate, to minimize interference to primary users and provide predictable access for secondary users. Because this architecture gives the primary system full control over spectrum sharing, it could be more favorable in the current economic and political environment. We illustrate a concrete instance of our framework by showing how secondary radios can reuse the entire uplink channel of a cellular network, with only modest changes to the primary infrastructure. ©2008 IEEE.

  10. A Multi-Antenna Framework for Spectrum Reuse Based on Primary-Secondary Cooperation

    Bakr, Omar; Johnson, Mark; Wild, Ben; Ramchandran, Kannan

    2008-01-01

    This paper proposes a new framework for spectrum reuse. Existing architectures have centered on secondary users (cognitive radios) that can reliably sense primary users and opportunistically transmit, without directly interacting with the primary system. We present a paradigm in which the primary and secondary systems cooperate, to minimize interference to primary users and provide predictable access for secondary users. Because this architecture gives the primary system full control over spectrum sharing, it could be more favorable in the current economic and political environment. We illustrate a concrete instance of our framework by showing how secondary radios can reuse the entire uplink channel of a cellular network, with only modest changes to the primary infrastructure. ©2008 IEEE.

  11. Cooperative HARQ with Poisson Interference and Opportunistic Routing

    Kaveh, Mostafa; Rajana, Aomgh

    2014-01-01

    This presentation considers reliable transmission of data from a source to a destination, aided cooperatively by wireless relays selected opportunistically and utilizing hybrid forward error correction/detection, and automatic repeat request (Hybrid

  12. Effect of threshold quantization in opportunistic splitting algorithm

    Nam, Haewoon; Alouini, Mohamed-Slim

    2011-01-01

    This paper discusses algorithms to find the optimal threshold and also investigates the impact of threshold quantization on the scheduling outage performance of the opportunistic splitting scheduling algorithm. Since this algorithm aims at finding

  13. Opportunistic transmitter selection for selfless overlay cognitive radios

    Shaqfeh, Mohammad; Zafar, Ammar; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2013-01-01

    We propose an opportunistic strategy to grant channel access to the primary and secondary transmitters in causal selfless overlay cognitive radios over block-fading channels. The secondary transmitter helps the primary transmitter by relaying

  14. Opportunistic quantum network coding based on quantum teleportation

    Shang, Tao; Du, Gang; Liu, Jian-wei

    2016-04-01

    It seems impossible to endow opportunistic characteristic to quantum network on the basis that quantum channel cannot be overheard without disturbance. In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation. Concretely, it utilizes quantum channel for secure transmission of quantum states and can detect eavesdroppers by means of quantum channel verification. What is more, it utilizes classical channel for both opportunistic listening to neighbor states and opportunistic coding by broadcasting measurement outcome. Analysis results show that our scheme can reduce the times of transmissions over classical channels for relay nodes and can effectively defend against classical passive attack and quantum active attack.

  15. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Simeone O

    2007-01-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  16. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    O. Simeone

    2007-03-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  17. Game Theory in Wireless Ad-Hoc Opportunistic Radios

    Mumtaz, Shahid; Gameiro, Atilio

    2010-01-01

    Emerging research in game theory based power control applied to ad hoc opportunist networks shows much promise to help understand the complex interactions between OR nodes in this highly dynamic and distributed environment. Also, the employment of game theory in modeling dynamic situations for opportunist ad hoc networks where OR nodes have incomplete information has led to the application of largely unexplored games such as games of imperfect monitoring. Ad hoc security using game theory is ...

  18. [New approaches to oral cavity opportunistic microbiota study].

    Tets, G V; Vikina, D S; Vecherkovskaia, M F; Domorad, A A; Kharlamova, V V; Tets, V V

    2013-01-01

    Identification of some bacteria of the oral microbiota in humans including opportunistic pathogens capable of causing infections of various locations is a challenging problem for dentistry. Lack of knowledge on oral microbiota is the result of the absence of appropriate culture technique for isolation of pure cultures of those bacteria. The paper presents the study on mixed oral microbial biofilms with isolation and identification of insufficiently explored or still unknown aerobic opportunistic bacteria.

  19. Opportunistic infection of HIV/AIDS patients in West Papua

    Witaningrum, A. M.; Khairunisa, S. Q.; Yunifiar, M. Q.; Bramanthi, R.; Rachman, B. E.; Nasronudin

    2018-03-01

    Human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS) had a major impact on health problemin Indonesia. HIV type 1 (HIV-1) epidemic is currently infected with HIV viruses developing rapidly in Indonesia.Papua provinces have the highest prevalence rate of human immunodeficiency virus type 1 (HIV-1) infection in Indonesia; however, data on opportunistic infection of HIV-1 are limited. The study using medical records as a research sample was conducted among HIV patients from January 2013 - December 2014 in Sele be Solu hospital among 49 patients. Opportunistic infections commonly occur in HIV-infected patients. The aim of the study was to know theprevalence of opportunistic infection among HIV positive patients in West Papua. Forty-nine HIV-1 patients were collected in Sele be Solu Hospital, West Papua.Opportunistic infection was identified such as tuberculosis, tuberculosis Pulmo, tuberculosis and candidiasis, candidiasis and diarrhea. The clinical sign appeared in HIV infected patients such as itchy, cough and loss weight. The prevalence of opportunistic infection indicated the necessity of monitoring the opportunistic infection of HIV/AIDS patients in Indonesia.

  20. Opportunistic MSPA Demonstration #1: Final Report

    Abraham, D. S.; Finley, S. G.; Heckman, D. P.; Lay, N. E.; Lush, C. M.; MacNeal, B. E.

    2015-02-01

    The Opportunistic Multiple Spacecraft Per Antenna (OMSPA) concept seeks to provide smallsat missions with a low-attributed-aperture-fee technique for obtaining routine downlink in a manner that is very low cost to the Deep Space Network (DSN). Unlike traditional MSPA in which the number of spacecraft that can be supported is limited by the number of available receivers, OMSPA makes use of a digital recorder at each station that is capable of capturing IF signals from every spacecraft in the antenna beam within the frequency bands of interest. When smallsat missions see one or more opportunities to intercept the traditionally scheduled antenna beam of a "host" spacecraft, they can transmit open loop during those opportunities. Via a secure Internet site, the smallsat mission operators can then retrieve relevant portions of the digital recording for subsequent demodulation and decoding or subscribe to a service that does it for them. The demonstration discussed in this article was intended to provide prospective smallsat users and the DSN, as the prospective service provider, with demonstrable proof that the OMSPA concept is, in fact, an operationally viable means for obtaining routine downlink telemetry. To do this, the demonstration began by treating Mars Odyssey as a "smallsat" and Mars Reconnaissance Orbiter (MRO) as the "host" spacecraft. Using a specially created Beam Intercept Planning System (BIPS) and a DSN 7-Day Schedule Cross-Comparison (7-DSC) tool, opportunities were identified when Mars Odyssey would be transmitting while in MRO's ground antenna beam. Existing Very Long Baseline Interferometry (VLBI) Science Receivers (VSRs) were used to record the Mars Odyssey downlink telemetry during these opportunities. The recordings were played back to a secure server outside the Flight Operations Network firewall, but inside the JPL firewall. The demonstration team's signal processing personnel retrieved the recordings from this secure server and downloaded them

  1. Position statement on opportunistic genomic screening from the Association of Genetic Nurses and Counsellors (UK and Ireland).

    Middleton, Anna; Patch, Chris; Wiggins, Jennifer; Barnes, Kathy; Crawford, Gill; Benjamin, Caroline; Bruce, Anita

    2014-08-01

    The American College of Medical Genetics and Genomics released recommendations for reporting incidental findings (IFs) in clinical exome and genome sequencing. These suggest 'opportunistic genomic screening' should be available to both adults and children each time a sequence is done and would be undertaken without seeking preferences from the patient first. Should opportunistic genomic screening be implemented in the United Kingdom, the Association of Genetic Nurses and Counsellors (AGNC), which represents British and Irish genetic counsellors and nurses, feels strongly that the following must be considered (see article for complete list): (1) Following appropriate genetic counselling, patients should be allowed to consent to or opt out of opportunistic genomic screening. (2) If true IFs are discovered the AGNC are guided by the report from the Joint Committee on Medical Genetics about the sharing of genetic testing results. (3) Children should not be routinely tested for adult-onset conditions. (4) The formation of a list of variants should involve a representative from the AGNC as well as a patient support group. (5) The variants should be for serious or life-threatening conditions for which there are treatments or preventative strategies available. (6) There needs to be robust evidence that the benefits of opportunistic screening outweigh the potential harms. (7) The clinical validity and utility of variants should be known. (8) There must be a quality assurance framework that operates to International standards for laboratory testing. (9) Psychosocial research is urgently needed in this area to understand the impact on patients.

  2. Spectrum Utilisation and Management in Cognitive Radio Networks

    Patil, Kishor P.

    have confirmed this by showing that the considerable amount of radio spectrum is underutilized. Dynamic Spectrum Access (DSA) and the spectrum refarming are the two viable solutions for the problem of spectrum scarcity. In DSA, unlicensed user opportunistically uses the vacant licensed spectrum...... of licensed spectrum provides efficient use of spectrum. Spectrum refarming means the recovery of spectrum from its existing users for the purpose of re-assignment, either for new uses, or for the introduction of new spectrally efficient technologies. Spectrum refarming is a spectrum management tool that can......In recent years, the demand for radio spectrum for wireless communication is growing due to increase in number of users and popularity of data and multimedia services. This has been observed in the recent auctions completed word wide for the vestige of radio spectrum. The radio spectrum has been...

  3. On the Capacity of Hybrid Wireless Networks with Opportunistic Routing

    Le Tan

    2010-01-01

    Full Text Available This paper studies the capacity of hybrid wireless networks with opportunistic routing (OR. We first extend the opportunistic routing algorithm to exploit high-speed data transmissions in infrastructure network through base stations. We then develop linear programming models to calculate the end-to-end throughput bounds from multiple source nodes to single as well as multiple destination nodes. The developed models are applied to study several hybrid wireless network examples. Through case studies, we investigate several factors that have significant impacts on the hybrid wireless network capacity under opportunistic routing, such as node transmission range, density and distribution pattern of base stations (BTs, and number of wireless channels on wireless nodes and base stations. Our numerical results demonstrate that opportunistic routing could achieve much higher throughput on both ad hoc and hybrid networks than traditional unicast routing (UR. Moreover, opportunistic routing can efficiently utilize base stations and achieve significantly higher throughput gains in hybrid wireless networks than in pure ad hoc networks especially with multiple-channel base stations.

  4. Autism Spectrum Disorder (ASD)

    ... Español (Spanish) Recommend on Facebook Tweet Share Compartir Autism spectrum disorder (ASD) is a developmental disability that can cause ... work. Autism: What's New MMWR article: Prevalence of Autism Spectrum Disorder Data Community Report Press release: Autism Prevalence Slightly ...

  5. Radar spectrum opportunities for cognitive communications transmission

    Wang, L; McGeehan, JP; Williams, C; Doufexi, A

    2008-01-01

    In relation to opportunistic access to radar spectrum, the impact of the radar on a communication system is investigated in this paper. This paper illustrates that by exploring the spatial and temporal opportunities in the radar spectrum and therefore improving the tolerance level to radar interference, a substantial increase on the throughput of a communication system is possible. Results are presented regarding the impact of swept radars on a WiMAX system. The results show the impact of SIR...

  6. Retinitis due to opportunistic infections in Iranian HIV infected patients.

    Ali Abdollahi

    2013-10-01

    Full Text Available We tried to evaluate prevalence and characteristics of Iranian HIV infected patients with retinitis due to opportunistic infections. In this cross sectional study, we evaluated 106 HIV infected patients via indirect ophthalmoscopy and slit lamp examination by 90 lens to find retinitis cases. General information and results of ophthalmologic examination were analyzed. Prevalence of retinitis due to opportunistic infections was 6.6%: cytomegalovirus (CMV retinitis 1.88%, toxoplasmosis retinochoroiditis 1.88% and tuberculosis chorioretinitis 2.83%. CD4 count was higher than 50 cell/µlit in both cases with CMV retinitis. Along with increasing survival in the HIV infected patients, the prevalence of complications such as ocular manifestation due to opportunistic infections are increasing and must be more considered.

  7. Joint opportunistic scheduling and network coding for bidirectional relay channel

    Shaqfeh, Mohammad

    2013-07-01

    In this paper, we consider a two-way communication system in which two users communicate with each other through an intermediate relay over block-fading channels. We investigate the optimal opportunistic scheduling scheme in order to maximize the long-term average transmission rate in the system assuming symmetric information flow between the two users. Based on the channel state information, the scheduler decides that either one of the users transmits to the relay, or the relay transmits to a single user or broadcasts to both users a combined version of the two users\\' transmitted information by using linear network coding. We obtain the optimal scheduling scheme by using the Lagrangian dual problem. Furthermore, in order to characterize the gains of network coding and opportunistic scheduling, we compare the achievable rate of the system versus suboptimal schemes in which the gains of network coding and opportunistic scheduling are partially exploited. © 2013 IEEE.

  8. Efficient scheduling request algorithm for opportunistic wireless access

    Nam, Haewoon

    2011-08-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.

  9. On the secondary users opportunistic scheduling with reduced feedback

    Song, Yao

    2012-03-01

    In underlay cognitive radio systems, secondary users (SUs) can share the spectrum with primary users (PUs) as long as the interference caused by SUs to PUs is below a certain threshold. When multiple SUs want to access the channel, multiuser diversity scheme can be applied to maximize the utilization rate of the channel. In this paper, the performance of selective multi user diversity scheme in underlay cognitive radio system is analyzed. We first start with the case in which all SUs have the same average signal-to-noise ratio (SNR). We then treat the more realistic case involving SUs with different average SNRs. Both power control and no power control scenarios are considered for the SUs. Furthermore, we take scheduling fairness into considerations and study a normalized SNR selection scheme in the case that SUs have different average SNRs. © 2012 IEEE.

  10. Shared pledge shared vision

    Boussaha, Ali; Diatta, Christian Sina

    2005-01-01

    The New Partnership for Africa's Development (NEPAD) is a pledge by African leaders to eradicate poverty and to promote sustainable growth and development. NEPAD is a 'new framework of interaction with the rest of the world, including the industrialised countries and multilateral organizations.' The agenda is based on regional priorities and development plans and its implementation relies on African ownership and management. As a UN system organisation, the IAEA strongly supports the priorities identified in the Millennium Declaration and the New Partnership for Africa's Development. As a technical agency, the IAEA shares its recognized core competencies and technical expertise in support of NEPAD goals. Efforts aim at strengthening institutional capacity building in nuclear sciences and technology and promoting the sustainable application of nuclear techniques for social and economic development. The IAEA has a membership of 34 African countries. The Agency supports them under its technical cooperation programme through provision of expertise, training opportunities and equipment in priority areas identified by the countries themselves. For many African Member States, meeting basic human needs through the implementation of poverty alleviation strategies remains the top priority on the agenda for national development plans and international cooperation programmes. In the context of sustainable development, special attention is being paid to enlarging the contribution of isotopes and nuclear techniques in major areas of economic and social significance and to promoting regional cooperation in nuclear science and technology related fields. As a partner in development, the Agency has promoted and undertaken programmes to support African countries' efforts to address priority development issues particularly in the areas of health care, food and agriculture and water resources development. The IAEA technical cooperation mechanism includes support to the African Regional

  11. Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks †

    Zeng, Feng; Zhao, Nan; Li, Wenjia

    2017-01-01

    In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by the strong share ability of “circles of friends” in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that social relationships among nodes consist of explicit and implicit parts. The explicit part comes from direct contact among nodes, and the implicit part can be measured through the “circles of friends”. We present the definitions of explicit and implicit social relationships between two nodes, adaptive weights of explicit and implicit parts are given according to the contact feature of nodes, and the distributed mechanism is designed to construct the “circles of friends” of nodes, which is used for the calculation of the implicit part of social relationship between nodes. Based on effective measurement of social relationships, we propose a social-based clustering and routing scheme, in which each node selects the nodes with close social relationships to form a local cluster, and the self-control method is used to keep all cluster members always having close relationships with each other. A cluster-based message forwarding mechanism is designed for opportunistic routing, in which each node only forwards the copy of the message to nodes with the destination node as a member of the local cluster. Simulation results show that the proposed social-based clustering and routing outperforms the other classic routing algorithms. PMID:28498309

  12. Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks.

    Zeng, Feng; Zhao, Nan; Li, Wenjia

    2017-05-12

    In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by the strong share ability of "circles of friends" in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that social relationships among nodes consist of explicit and implicit parts. The explicit part comes from direct contact among nodes, and the implicit part can be measured through the "circles of friends". We present the definitions of explicit and implicit social relationships between two nodes, adaptive weights of explicit and implicit parts are given according to the contact feature of nodes, and the distributed mechanism is designed to construct the "circles of friends" of nodes, which is used for the calculation of the implicit part of social relationship between nodes. Based on effective measurement of social relationships, we propose a social-based clustering and routing scheme, in which each node selects the nodes with close social relationships to form a local cluster, and the self-control method is used to keep all cluster members always having close relationships with each other. A cluster-based message forwarding mechanism is designed for opportunistic routing, in which each node only forwards the copy of the message to nodes with the destination node as a member of the local cluster. Simulation results show that the proposed social-based clustering and routing outperforms the other classic routing algorithms.

  13. Do managers act opportunistically towards the end of their career?

    Kabir, Rezaul; Li, Hao; Veld-Merkoulova, Yulia

    2018-01-01

    As managers approach retirement, their career horizons become shorter and they might start to behave opportunistically by taking a more risk-averse and short-term orientation. Long-term risky investments, such as research and development, can suffer the most from this problem as their payoff comes

  14. Migration and opportunistic feeding increase PCB accumulation in Arctic seabirds.

    Baert, J M; Janssen, C R; Borgå, K; De Laender, F

    2013-10-15

    It is widely accepted that body concentrations of persistent organic pollutants (POPs) tend to increase with trophic level (TL). Yet, little attention has been paid to the causes in the underlying differences in POP body concentrations between species occupying similar TLs. In this paper we use two modeling approaches to quantify the importance of migration and opportunistic feeding, relative to that of trophic level, in explaining interspecific differences in polychlorinated biphenyl (PCB) body concentrations between 6 Arctic seabird species breeding in the Barents Sea: Little Auk (Alle alle), Black Guillemot (Cepphus grylle), Brünnich's Guillemot (Uria lomvia), Common Eider (Somateria mollissima), Black-legged Kittiwake (Rissa tridactyla), and Glaucous Gull (Larus hyperboreus). As a first approach, we use additive models to analyze two independent data sets (n = 470 and n = 726). We demonstrate that migration, opportunistic feeding, and TL significantly (p < 0.001) increase PCB body concentrations by a factor 3.61-4.10, 2.66-20.95, and 2.38-2.41, respectively. Our second approach, using a mechanistic bioaccumulation model, confirmed these positive effects on the body burdens but suggested lower effects of migration, opportunistic feeding, and TL (1.55, 2.39, and 2.38) than did our statistical analysis. These two independent approaches demonstrate that the effects of migration and opportunistic feeding on seabird body burdens can be similar to that of an increase of one TL and should therefore be accounted for in future analyses.

  15. Iterative group splitting algorithm for opportunistic scheduling systems

    Nam, Haewoon

    2014-05-01

    An efficient feedback algorithm for opportunistic scheduling systems based on iterative group splitting is proposed in this paper. Similar to the opportunistic splitting algorithm, the proposed algorithm adjusts (or lowers) the feedback threshold during a guard period if no user sends a feedback. However, when a feedback collision occurs at any point of time, the proposed algorithm no longer updates the threshold but narrows down the user search space by dividing the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a feedback, it is shown that the proposed algorithm significantly alleviates the signaling overhead for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots than the opportunistic splitting algorithm to make a user selection with a given level of scheduling outage probability or provides a higher ergodic capacity given a certain number of mini-slots. © 2013 IEEE.

  16. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  17. Fluconazole resistant opportunistic oro-pharyngeal candida and non ...

    Background: Oro-Pharyngeal Candidiasis (OPC) continues to be considered the most common opportunistic fungal disease in HIV/AIDS patients globally. Azole antifungal agent has become important in the treatment of mucosal candidiasis in HIV patients. Presently, antifungal drug resistance is fast becoming a major ...

  18. Towards Opportunistic Data Dissemination in Mobile Phone Sensor Networks

    Le Viet Duc, L Duc; Scholten, Johan; Havinga, Paul J.M.

    Recently, there has been a growing interest within the research community in developing opportunistic routing protocols. Many schemes have been proposed; however, they differ greatly in assumptions and in type of network for which they are evaluated. As a result, researchers have an ambiguous

  19. Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication

    Schurgot, Mary R.; Comaniciu, Cristina; Jaffrès-Runser, Katia

    2011-01-01

    This article examines the evolution of routing protocols for intermittently connected ad hoc networks and discusses the trend toward social-based routing protocols. A survey of current routing solutions is presented, where routing protocols for opportunistic networks are classified based on the network graph employed. The need to capture performance tradeoffs from a multi-objective perspective is highlighted.

  20. AIRBORNE HYPERSPECTRAL IDENTIFICATION OF INVASIVE AND OPPORTUNISTIC WETLANDS PLANT SPECIES

    Coastal wetlands are among the most fragmented and disturbed ecosystems and the Great Lakes are no exception. One possible result is the observed increase in the presence and dominance of invasive and other opportunistic plant species, such as the common reed (Phragmites australi...

  1. Opportunistic beam training with hybrid analog/digital codebooks for mmWave systems

    Eltayeb, Mohammed E.

    2016-02-25

    © 2015 IEEE. Millimeter wave (mmWave) communication is one solution to provide more spectrum than available at lower carrier frequencies. To provide sufficient link budget, mmWave systems will use beamforming with large antenna arrays at both the transmitter and receiver. Training these large arrays using conventional approaches taken at lower carrier frequencies, however, results in high overhead. In this paper, we propose a beam training algorithm that efficiently designs the beamforming vectors with low training overhead. Exploiting mmWave channel reciprocity, the proposed algorithm relaxes the need for an explicit feedback channel, and opportunistically terminates the training process when a desired quality of service is achieved. To construct the training beamforming vectors, a new multi-resolution codebook is developed for hybrid analog/digital architectures. Simulation results show that the proposed algorithm achieves a comparable rate to that obtained by exhaustive search solutions while requiring lower training overhead when compared to prior work.

  2. Opportunistic beam training with hybrid analog/digital codebooks for mmWave systems

    Eltayeb, Mohammed E.; Alkhateeb, Ahmed; Heath, Robert W.; Al-Naffouri, Tareq Y.

    2016-01-01

    © 2015 IEEE. Millimeter wave (mmWave) communication is one solution to provide more spectrum than available at lower carrier frequencies. To provide sufficient link budget, mmWave systems will use beamforming with large antenna arrays at both the transmitter and receiver. Training these large arrays using conventional approaches taken at lower carrier frequencies, however, results in high overhead. In this paper, we propose a beam training algorithm that efficiently designs the beamforming vectors with low training overhead. Exploiting mmWave channel reciprocity, the proposed algorithm relaxes the need for an explicit feedback channel, and opportunistically terminates the training process when a desired quality of service is achieved. To construct the training beamforming vectors, a new multi-resolution codebook is developed for hybrid analog/digital architectures. Simulation results show that the proposed algorithm achieves a comparable rate to that obtained by exhaustive search solutions while requiring lower training overhead when compared to prior work.

  3. To share and be shared

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  4. Who needs the assumption of opportunistic behavior? Transaction cost economics does not!

    Koch, Carsten Allan

    2000-01-01

    The assumption of opportunistic behavior, familiar from transaction cost economics, has been and remains highly controversial. But opportunistic behavior, albeit undoubtedly an extremely important form of motivation, is not a necessary condition for the contractual problems studied by transaction...

  5. Information sharing as a safeguard against the opportunistic behavior of South African Karoo Lamb farmers

    Merwe, van der Melissa; Kirsten, Johann F.; Trienekens, Jacques H.

    2017-01-01

    Misconduct in global meat supply chains are omnipresent and even more so in differentiated chains where credence attributes such as origin and taste are used to differentiate the product. By definition, these attributes signal asymmetric information which implies that in the presence of bounded

  6. Energy Efficient Four Level Cooperative Opportunistic Communication for Wireless Personal Area Networks (WPAN)

    Rohokale, Vandana M.; Inamdar, Sandeep; Prasad, Neeli R.

    2013-01-01

    For wireless sensor networks (WSN),energy is a scarce resource. Due to limited battery resources, the energy consumption is the critical issue for the transmission as well as reception of the signals in the wireless communication. WSNs are infrastructure-less shared network demanding more energy...... consumption due to collaborative transmissions. This paper proposes a new cooperative opportunistic four level model for IEEE 802.15.4 Wireless Personal Area Network (WPAN).The average per node energy consumption is observed merely about 0.17mJ for the cooperative wireless communication which proves...... the proposed mechanism to be energy efficient. This paper further proposes four levels of cooperative data transmission from source to destination to improve network coverage with energy efficiency....

  7. A Comparative Study of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks

    R. Poonkuzhali; M. Y. Sanavullah; M. R. Gurupriya

    2014-01-01

    Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In Delay tolerant network or Disruption tolerant network opportunistic forwarding technique is widely used. The key idea of opportunistic routing is selecting forwarding nodes to forward data packets and coordination among these nodes to avoid duplicate transmissions. This paper gives the analysis of pros and cons of various opportunistic ...

  8. Sharing City

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  9. Overlay Spectrum Sharing using Improper Gaussian Signaling

    Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim

    2016-01-01

    in overlay cognitive radio system, where the secondary transmitter broadcasts a mixture of two different signals. The first signal is selected from the PGS scheme to match the primary message transmission. On the other hand, the second signal is chosen

  10. Overlay Spectrum Sharing using Improper Gaussian Signaling

    Amin, Osama

    2016-11-30

    Improper Gaussian signaling (IGS) scheme has been recently shown to provide performance improvements in interference limited networks as opposed to the conventional proper Gaussian signaling (PGS) scheme. In this paper, we implement the IGS scheme in overlay cognitive radio system, where the secondary transmitter broadcasts a mixture of two different signals. The first signal is selected from the PGS scheme to match the primary message transmission. On the other hand, the second signal is chosen to be from the IGS scheme in order to reduce the interference effect on the primary receiver. We then optimally design the overlay cognitive radio to maximize the secondary link achievable rate while satisfying the primary network quality of service requirements. In particular, we consider full and partial channel knowledge scenarios and derive the feasibility conditions of operating the overlay cognitive radio systems. Moreover, we derive the superiority conditions of the IGS schemes over the PGS schemes supported with closed form expressions for the corresponding power distribution and the circularity coefficient and parameters. Simulation results are provided to support our theoretical derivations.

  11. Benefits and performance of ATLAS approaches to utilizing opportunistic resources

    Filip\\v{c}i\\v{c}, Andrej; The ATLAS collaboration

    2016-01-01

    ATLAS has been extensively exploring possibilities of using computing resources extending beyond conventional grid sites in the WLCG fabric to deliver as many computing cycles as possible and thereby enhance the significance of the Monte-Carlo samples to deliver better physics results. The difficulties of using such opportunistic resources come from architectural differences such as unavailability of grid services, the absence of network connectivity on worker nodes or inability to use standard authorization protocols. Nevertheless, ATLAS has been extremely successful in running production payloads on a variety of sites, thanks largely to the job execution workflow design in which the job assignment, input data provisioning and execution steps are clearly separated and can be offloaded to custom services. To transparently include the opportunistic sites in the ATLAS central production system, several models with supporting services have been developed to mimic the functionality of a full WLCG site. Some are e...

  12. New results on performance analysis of opportunistic regenerative relaying

    Tourki, Kamel

    2013-12-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may be unusable, and takes into account the effect of the possible erroneously detected and transmitted data at the selected relay. We first derive the signal-to-noise (SNR) statistics for each hop, which are used to determine accurate closed form expressions for end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and end-to-end outage probability for a transmission rate R over Rayleigh fading channels. Furthermore, we evaluate the asymptotical performance and deduce the diversity order. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over linear network architecture. © 2013 Elsevier B.V.

  13. Error-rate performance analysis of opportunistic regenerative relaying

    Tourki, Kamel

    2011-09-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path can be considered unusable, and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We first derive the exact statistics of each hop, in terms of probability density function (PDF). Then, the PDFs are used to determine accurate closed form expressions for end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation where the detector may use maximum ration combining (MRC) or selection combining (SC). Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over linear network (LN) architecture and considering Rayleigh fading channels. © 2011 IEEE.

  14. Node-Dependence-Based Dynamic Incentive Algorithm in Opportunistic Networks

    Ruiyun Yu

    2014-01-01

    Full Text Available Opportunistic networks lack end-to-end paths between source nodes and destination nodes, so the communications are mainly carried out by the “store-carry-forward” strategy. Selfish behaviors of rejecting packet relay requests will severely worsen the network performance. Incentive is an efficient way to reduce selfish behaviors and hence improves the reliability and robustness of the networks. In this paper, we propose the node-dependence-based dynamic gaming incentive (NDI algorithm, which exploits the dynamic repeated gaming to motivate nodes relaying packets for other nodes. The NDI algorithm presents a mechanism of tolerating selfish behaviors of nodes. Reward and punishment methods are also designed based on the node dependence degree. Simulation results show that the NDI algorithm is effective in increasing the delivery ratio and decreasing average latency when there are a lot of selfish nodes in the opportunistic networks.

  15. Accurate performance analysis of opportunistic decode-and-forward relaying

    Tourki, Kamel

    2011-07-01

    In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path may be considered unusable, and the destination may use a selection combining technique. We first derive the exact statistics of each hop, in terms of probability density function (PDF). Then, the PDFs are used to determine accurate closed form expressions for end-to-end outage probability for a transmission rate R. Furthermore, we evaluate the asymptotical performance analysis and the diversity order is deduced. Finally, we validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2011 IEEE.

  16. File sharing

    van Eijk, N.

    2011-01-01

    ‘File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  17. Sinabro: A Smartphone-Integrated Opportunistic Electrocardiogram Monitoring System

    Sungjun Kwon; Dongseok Lee; Jeehoon Kim; Youngki Lee; Seungwoo Kang; Sangwon Seo; Kwangsuk Park

    2016-01-01

    In our preliminary study, we proposed a smartphone-integrated, unobtrusive electrocardiogram (ECG) monitoring system, Sinabro, which monitors a user?s ECG opportunistically during daily smartphone use without explicit user intervention. The proposed system also monitors ECG-derived features, such as heart rate (HR) and heart rate variability (HRV), to support the pervasive healthcare apps for smartphones based on the user?s high-level contexts, such as stress and affective state levels. In th...

  18. Nocardia – Opportunistic chest infection in elderly: A case report

    Sanyal, Kaushik; Sabanathan, Kanagasabesan

    2008-01-01

    In this rare case a non-immunocompromised patient with old Tuberculosis on low dose of steroids presents with opportunistic infection of a weakly aerobic gram positive acid fast, filamentous bacteria called Nocardia. An 80 year old non-smoking white female presented with cough, shortness of breath and purulent sputum. Initial antibiotics given were not helpful. Later microbial diagnosis was Nocardia in sputum sample which was uncommon in a non-immunocompromised. She responded to co-trimoxazol...

  19. Relationship between lactobacilli and opportunistic bacterial pathogens associated with vaginitis.

    Razzak, Mohammad Sabri A; Al-Charrakh, Alaa H; Al-Greitty, Bara Hamid

    2011-04-01

    Vaginitis, is an infectious inflammation of the vaginal mucosa, which sometimes involves the vulva. The balance of the vaginal flora is maintained by the Lactobacilli and its protective and probiotic role in treating and preventing vaginal infection by producing antagonizing compounds which are regarded as safe for humans. The aim of this study was to evaluate the protective role of Lactobacilli against common bacterial opportunistic pathogens in vaginitis and study the effects of some antibiotics on Lactobacilli isolates. In this study (110) vaginal swabs were obtained from women suffering from vaginitis who admitted to Babylon Hospital of Maternity and Paediatrics in Babylon province, Iraq. The study involved the role of intrauterine device among married women with vaginitis and also involved isolation of opportunistic bacterial isolates among pregnant and non pregnant women. This study also involved studying probiotic role of Lactobacilli by production of some defense factors like hydrogen peroxide, bacteriocin, and lactic acid. Results revealed that a total of 130 bacterial isolates were obtained. Intrauterine device was a predisposing factor for vaginitis. The most common opportunistic bacterial isolates were Staphylococcus aureus, Escherichia coli, Streptococcus agalactiae, and Klebsiella pneumoniae. All Lactobacilli were hydrogen peroxide producers while some isolates were bacteriocin producers that inhibited some of opportunistic pathogens (S. aureus, E. coli). Lactobacilli were sensitive to erythromycin while 93.3% of them were resistant to ciprofloxacin and (40%, 53.3%) of them were resistant to amoxicillin and gentamycin respectively. Results revealed that there was an inverse relationship between Lactobacilli presence and organisms causing vaginitis. This may be attributed to the production of defense factors by Lactobacilli. The types of antibiotics used to treat vaginitis must be very selective in order not to kill the beneficial bacteria

  20. Relationship between lactobacilli and opportunistic bacterial pathogens associated with vaginitis

    Razzak, Mohammad Sabri A.; Al-Charrakh, Alaa H.; AL-Greitty, Bara Hamid

    2011-01-01

    Background: Vaginitis, is an infectious inflammation of the vaginal mucosa, which sometimes involves the vulva. The balance of the vaginal flora is maintained by the Lactobacilli and its protective and probiotic role in treating and preventing vaginal infection by producing antagonizing compounds which are regarded as safe for humans. Aim: The aim of this study was to evaluate the protective role of Lactobacilli against common bacterial opportunistic pathogens in vaginitis and study the effec...

  1. Shared leadership

    Ulhøi, John Parm; Müller, Sabine

    2012-01-01

    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  2. Alternative Opportunistic Alert Diffusion to Support Infrastructure Failure during Disasters

    Farouk Mezghani

    2017-10-01

    Full Text Available Opportunistic communications present a promising solution for disaster network recovery in emergency situations such as hurricanes, earthquakes, and floods, where infrastructure might be destroyed. Some recent works in the literature have proposed opportunistic-based disaster recovery solutions, but they have omitted the consideration of mobile devices that come with different network technologies and various initial energy levels. This work presents COPE, an energy-aware Cooperative OPportunistic alErt diffusion scheme for trapped survivors to use during disaster scenarios to report their position and ease their rescue operation. It aims to maintain mobile devices functional for as long as possible for maximum network coverage until reaching proximate rescuers. COPE deals with mobile devices that come with an assortment of networks and aims to perform systematic network interface selection. Furthermore, it considers mobile devices with various energy levels and allows low-energy nodes to hold their charge for longer time with the support of high-energy nodes. A proof-of-concept implementation has been performed to study the doability and efficiency of COPE, and to highlight the lessons learned.

  3. Plancton: an opportunistic distributed computing project based on Docker containers

    Concas, Matteo; Berzano, Dario; Bagnasco, Stefano; Lusso, Stefano; Masera, Massimo; Puccio, Maximiliano; Vallero, Sara

    2017-10-01

    The computing power of most modern commodity computers is far from being fully exploited by standard usage patterns. In this work we describe the development and setup of a virtual computing cluster based on Docker containers used as worker nodes. The facility is based on Plancton: a lightweight fire-and-forget background service. Plancton spawns and controls a local pool of Docker containers on a host with free resources, by constantly monitoring its CPU utilisation. It is designed to release the resources allocated opportunistically, whenever another demanding task is run by the host user, according to configurable policies. This is attained by killing a number of running containers. One of the advantages of a thin virtualization layer such as Linux containers is that they can be started almost instantly upon request. We will show how fast the start-up and disposal of containers eventually enables us to implement an opportunistic cluster based on Plancton daemons without a central control node, where the spawned Docker containers behave as job pilots. Finally, we will show how Plancton was configured to run up to 10 000 concurrent opportunistic jobs on the ALICE High-Level Trigger facility, by giving a considerable advantage in terms of management compared to virtual machines.

  4. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks

    Nadeem Javaid

    2017-03-01

    Full Text Available In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast, second technique is the improved Hydrocast (improved-Hydrocast, and third one is the cooperative improved Hydrocast (Co-improved Hydrocast. In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR of the received signal is not within the predefined threshold then the maximal ratio combining (MRC is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  5. Path Diversity Improved Opportunistic Routing for Underwater Sensor Networks.

    Bai, Weigang; Wang, Haiyan; He, Ke; Zhao, Ruiqin

    2018-04-23

    The packets carried along a pre-defined route in underwater sensor networks are very vulnerble. Node mobility or intermittent channel availability easily leads to unreachable routing. Opportunistic routing has been proven to be a promising paradigm to design routing protocols for underwater sensor networks. It takes advantage of the broadcast nature of the wireless medium to combat packet losses and selects potential paths on the fly. Finding an appropriate forwarding candidate set is a key issue in opportunistic routing. Many existing solutions ignore the impact of candidates location distribution on packet forwarding. In this paper, a path diversity improved candidate selection strategy is applied in opportunistic routing to improve packet forwarding efficiency. It not only maximizes the packet forwarding advancements but also takes the candidate’s location distribution into account. Based on this strategy, we propose two effective routing protocols: position improved candidates selection (PICS) and position random candidates selection (PRCS). PICS employs two-hop neighbor information to make routing decisions. PRCS only uses one-hop neighbor information. Simulation results show that both PICS and PRCS can significantly improve network performance when compared with the previous solutions, in terms of packet delivery ratio, average energy consumption and end-to-end delay.

  6. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks.

    Javaid, Nadeem; Muhammad; Sher, Arshad; Abdul, Wadood; Niaz, Iftikhar Azim; Almogren, Ahmad; Alamri, Atif

    2017-03-19

    In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs) are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast), second technique is the improved Hydrocast (improved-Hydrocast), and third one is the cooperative improved Hydrocast (Co-improved Hydrocast). In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR) of the received signal is not within the predefined threshold then the maximal ratio combining (MRC) is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  7. Path Diversity Improved Opportunistic Routing for Underwater Sensor Networks

    Weigang Bai

    2018-04-01

    Full Text Available The packets carried along a pre-defined route in underwater sensor networks are very vulnerble. Node mobility or intermittent channel availability easily leads to unreachable routing. Opportunistic routing has been proven to be a promising paradigm to design routing protocols for underwater sensor networks. It takes advantage of the broadcast nature of the wireless medium to combat packet losses and selects potential paths on the fly. Finding an appropriate forwarding candidate set is a key issue in opportunistic routing. Many existing solutions ignore the impact of candidates location distribution on packet forwarding. In this paper, a path diversity improved candidate selection strategy is applied in opportunistic routing to improve packet forwarding efficiency. It not only maximizes the packet forwarding advancements but also takes the candidate’s location distribution into account. Based on this strategy, we propose two effective routing protocols: position improved candidates selection (PICS and position random candidates selection (PRCS. PICS employs two-hop neighbor information to make routing decisions. PRCS only uses one-hop neighbor information. Simulation results show that both PICS and PRCS can significantly improve network performance when compared with the previous solutions, in terms of packet delivery ratio, average energy consumption and end-to-end delay.

  8. Location-Aided Reliable Routing for Opportunistic Networks

    Yong Yang; Zhi Ren; Jibi Li

    2012-01-01

    In our study, we investigate the problem of location-based routing in opportunistic networks. Due to the uncertainty of end-to-end paths between sources and destinations, the classical location-based ad hoc routing protocols cannot adapt to the environment of opportunistic networks, which leads to the decrease of the delivery rate of data. To address it, we propose in this paper a novel location-aided routing protocol which is suitable for opportunistic networks. In our protocol, a node can send location information on demand by using prediction mechanism, and when sending a data packet, the node chooses multiple neighbors which are closer to the destination as next hops. If the candidate neighbors do not exist, the node carries the data till it meets a proper neighbor or the destination. Theoretical analysis and simulation results show that our proposed protocol outperforms DREAM (Distance Routing Effect Protocol Mobility) and one of its improved versions, BFDREAM (Boundary Forwarding DREAM), in terms of the delivery rate and overhead.

  9. The 13th International Workshops on Opportunistic Protists (IWOP13).

    Calderon, Enrique J; Cushion, Melanie T; Xiao, Lihua; Lorenzo-Morales, Jacob; Matos, Olga; Kaneshiro, Edna S; Weiss, Louis M

    2015-01-01

    The 13th International Workshops on Opportunistic Protists (IWOP-13) was held November 13-15, 2014 in Seville, Spain. The objectives of the IWOP meetings are to: (1) serve as a forum for exchange of new information among active researchers concerning the basic biology, molecular genetics, immunology, biochemistry, pathogenesis, drug development, therapy, and epidemiology of these immunodeficiency-associated pathogenic eukaryotic microorganisms that are seen in patients with AIDS and; (2) to foster the entry of new and young investigators into these underserved research areas. The IWOP meeting focuses on opportunistic protists; e.g. the free-living amoebae, Pneumocystis, Cryptosporidium, Toxoplasma, the Microsporidia, and kinetoplastid flagellates. This conference represents the major conference which brings together research groups working on these opportunistic pathogens. Progress has been achieved on understanding the biology of these pathogenic organisms, their involvement in disease causation in both immune deficient and immune competent hosts and is providing important insights into these emerging and reemerging pathogens. A continuing concern of the participants is the ongoing loss of scientific expertise and diversity in this research community. This decline is due to the small size of these research communities and an ongoing lack of understanding by the broader scientific community of the challenges and limitations faced by researchers working on these organisms, which makes these research communities very sensitive to declines in research funding. © 2015 The Author(s) Journal of Eukaryotic Microbiology © 2015 International Society of Protistologists.

  10. Genetics Home Reference: autism spectrum disorder

    ... Share: Email Facebook Twitter Home Health Conditions ASD Autism spectrum disorder Printable PDF Open All Close All Enable Javascript to view the expand/collapse boxes. Description Autism spectrum disorder ( ASD ) is a condition that appears very early ...

  11. Autism Spectrum Disorder (ASD): Related Topics

    ... Facebook Tweet Share Compartir Q: Do vaccines cause autism spectrum disorder (ASD)? A: Many studies that have looked at whether there is a relationship between vaccines and autism spectrum disorder (ASD). To date, the studies continue to show ...

  12. Knowledge Sharing

    Holdt Christensen, Peter

    The concept of knowledge management has, indeed, become a buzzword that every single organization is expected to practice and live by. Knowledge management is about managing the organization's knowledge for the common good of the organization -but practicing knowledge management is not as simple...... as that. This article focuses on knowledge sharing as the process seeking to reduce the resources spent on reinventing the wheel.The article introduces the concept of time sensitiveness; i.e. that knowledge is either urgently needed, or not that urgently needed. Furthermore, knowledge sharing...... is considered as either a push or pull system. Four strategies for sharing knowledge - help, post-it, manuals and meeting, and advice are introduced. Each strategy requires different channels for sharing knowledge. An empirical analysis in a production facility highlights how the strategies can be practiced....

  13. Antimicrobial therapy for the treatment of opportunistic infections in HIV/AIDS patients: a critical appraisal

    Seddon J

    2011-04-01

    Full Text Available Jo Seddon1, Sanjay Bhagani21Department of Infectious Diseases, Imperial College Healthcare NHS Trust, London, UK; 2Department of Infection and Immunity, Royal Free Hospital NHS Trust, London, UKAbstract: The widespread use of antiretroviral therapy (ART has entirely changed the management of human immunodeficiency virus (HIV infection and dramatically reduced the rates of opportunistic infections (OI. However, OI continue to cause significant morbidity and mortality in both developed countries, where presentation with advanced HIV infection is common, and also in developing countries where ART is less widely available. Evidence to direct OI guidelines is partly limited by the fact that many large-scale studies date from the pre-ART era and more recent studies are sometimes poorly powered due to the falling rates of OI. Treatment of OI is now known to be as much about antimicrobials as about immune reconstitution with ART, and recent studies help guide the timing of initiation of ART in different infections. OI have also become complicated by the immune reconstitution inflammatory syndrome phenomenon which may occur once successful immune recovery begins. Trimethoprim-sulfamethoxazole has long been one of the most important antibiotics in the treatment and prevention of OI and remains paramount. It has a broad spectrum of activity against Pneumocystis jiroveci, toxoplasmosis, and bacterial infections and has an important role to play in preventing life-threatening OI. New advances in treating OI are coming from a variety of quarters: in cytomegalovirus eye disease, the use of oral rather than intravenous drugs is changing the face of therapy; in cryptococcal meningitis, improved drug formulations and combination therapy is improving clearance rates and reducing drug toxicities; and in gut disease, the possibility of rapid immune restitution with ART is replacing the need for antimicrobials against cryptosporidia and microsporidia.Keywords: HIV

  14. Optimal Caching in Multicast 5G Networks with Opportunistic Spectrum Access

    Emara, Mostafa; Elsawy, Hesham; Sorour, Sameh; Al-Ghadhban, Samir; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2018-01-01

    Cache-enabled small base station (SBS) densification is foreseen as a key component of 5G cellular networks. This architecture enables storing popular files at the network edge (i.e., SBS caches), which empowers local communication and alleviates

  15. The 12th International Workshops on Opportunistic Protists (IWOP-12).

    Weiss, Louis M; Cushion, Melanie T; Didier, Elizabeth; Xiao, Lihua; Marciano-Cabral, Francine; Sinai, Anthony P; Matos, Olga; Calderon, Enrique J; Kaneshiro, Edna S

    2013-01-01

    The 12th International Workshops on Opportunistic Protists (IWOP-12) was held in August 2012 in Tarrytown, New York. The objectives of the IWOP meetings are to: (1) serve as a forum for exchange of new information among active researchers concerning the basic biology, molecular genetics, immunology, biochemistry, pathogenesis, drug development, therapy, and epidemiology of these immunodeficiency-associated pathogenic eukaryotic microorganisms that are seen in patients with AIDS and (2) foster the entry of new and young investigators into these underserved research areas. The IWOP meeting focuses on opportunistic protists, e.g. the free-living amoebae, Pneumocystis, Cryptosporidium, Toxoplasma, the Microsporidia, and kinetoplastid flagellates. This conference represents the major conference that brings together research groups working on these opportunistic pathogens. Slow but steady progress is being achieved on understanding the biology of these pathogenic organisms, their involvement in disease causation in both immune-deficient and immune-competent hosts, and is providing critical insights into these emerging and reemerging pathogens. This IWOP meeting demonstrated the importance of newly developed genomic level information for many of these pathogens and how analysis of such large data sets is providing key insights into the basic biology of these organisms. A great concern is the loss of scientific expertise and diversity in the research community due to the ongoing decline in research funding. This loss of researchers is due to the small size of many of these research communities and a lack of appreciation by the larger scientific community concerning the state of art and challenges faced by researchers working on these organisms. © 2013 The Author(s) Journal of Eukaryotic Microbiology © 2013 International Society of Protistologists.

  16. [Experimental interaction of halophilic prokaryotes and opportunistic bacteria in brine].

    Selivanova, E A; Nemtseva, N V

    2013-01-01

    Study the effect of extremely halophilic archaea and moderately halophilic bacteria on preservation of opportunistic bacteria in brine. 17 strains of moderately halophilic bacteria and 2 strains of extremely halophilic archaea were isolated from continental hypersaline lake Razval of Sol-Iletsk area of Orenburg Region. Identification of pure cultures of prokaryotes was carried out taking into account their phenotype properties and based on determination of 16S RNA gene sequence. The effect of halophilic prokaryote on elimination of Escherichia coli from brine was evaluated during co-cultivation. Antagonistic activity of cell extracts of the studied microorganisms was evaluated by photometric method. A more prolonged preservation of an E. coli strain in brine in the presence of live cells of extremely halophilic archaea Halorubrum tebenquichense and moderately halophilic bacteria Marinococcus halophilus was established. Extracts of cells of extremely halophilic archaea and moderately halophilic bacteria on the contrary displayed antagonistic activity. The protective effect of live cells of halophilic prokaryotes and antagonistic activity of their cell extracts change the period of conservation of opportunistic bacteria in brine that regulates inter-microbial interactions and changes the period of self-purification that reflects the sanitary condition of a hypersaline water body.

  17. Cooperative HARQ with Poisson Interference and Opportunistic Routing

    Kaveh, Mostafa

    2014-01-06

    This presentation considers reliable transmission of data from a source to a destination, aided cooperatively by wireless relays selected opportunistically and utilizing hybrid forward error correction/detection, and automatic repeat request (Hybrid ARQ, or HARQ). Specifically, we present a performance analysis of the cooperative HARQ protocol in a wireless adhoc multihop network employing spatial ALOHA. We model the nodes in such a network by a homogeneous 2-D Poisson point process. We study the tradeoff between the per-hop rate, spatial density and range of transmissions inherent in the network by optimizing the transport capacity with respect to the network design parameters, HARQ coding rate and medium access probability. We obtain an approximate analytic expression for the expected progress of opportunistic routing and optimize the capacity approximation by convex optimization. By way of numerical results, we show that the network design parameters obtained by optimizing the analytic approximation of transport capacity closely follows that of Monte Carlo based exact transport capacity optimization. As a result of the analysis, we argue that the optimal HARQ coding rate and medium access probability are independent of the node density in the network.

  18. Opportunistic Adaptive Transmission for Network Coding Using Nonbinary LDPC Codes

    Cocco Giuseppe

    2010-01-01

    Full Text Available Network coding allows to exploit spatial diversity naturally present in mobile wireless networks and can be seen as an example of cooperative communication at the link layer and above. Such promising technique needs to rely on a suitable physical layer in order to achieve its best performance. In this paper, we present an opportunistic packet scheduling method based on physical layer considerations. We extend channel adaptation proposed for the broadcast phase of asymmetric two-way bidirectional relaying to a generic number of sinks and apply it to a network context. The method consists of adapting the information rate for each receiving node according to its channel status and independently of the other nodes. In this way, a higher network throughput can be achieved at the expense of a slightly higher complexity at the transmitter. This configuration allows to perform rate adaptation while fully preserving the benefits of channel and network coding. We carry out an information theoretical analysis of such approach and of that typically used in network coding. Numerical results based on nonbinary LDPC codes confirm the effectiveness of our approach with respect to previously proposed opportunistic scheduling techniques.

  19. Opportunistic Nonorthogonal Packet Scheduling in Fixed Broadband Wireless Access Networks

    Ahmed Mohamed H

    2006-01-01

    Full Text Available In order to mitigate high cochannel interference resulting from dense channel reuse, the interference management issues are often considered as essential part of scheduling schemes in fixed broadband wireless access (FBWA networks. To that end, a series of literature has been published recently, in which a group of base stations forms an interferer group (downlink transmissions from each base station become dominant interference for the users in other in-group base stations, and the scheduling scheme deployed in the group allows only one base station to transmit at a time. As a result of time orthogonality in transmissions, the dominant cochannel interferers are prevented, and hence the packet error rate can be improved. However, prohibiting concurrent transmissions in these orthogonal schemes introduces throughput penalty as well as higher end-to-end packet delay which might not be desirable for real-time services. In this paper, we utilize opportunistic nonorthogonality among the in-group transmissions whenever possible and propose a novel transmission scheduling scheme for FBWA networks. The proposed scheme, in contrast to the proactive interference avoidance techniques, strives for the improvements in delay and throughput efficiency. To facilitate opportunistic nonorthogonal transmissions in the interferer group, estimation of signal-to-interference-plus-noise ratio (SINR is required at the scheduler. We have observed from simulations that the proposed scheme outperforms the reference orthogonal scheme in terms of spectral efficiency, mean packet delay, and packet dropping rate.

  20. A Novel Cooperative Opportunistic Routing Scheme for Underwater Sensor Networks.

    Ghoreyshi, Seyed Mohammad; Shahrabi, Alireza; Boutaleb, Tuleen

    2016-02-26

    Increasing attention has recently been devoted to underwater sensor networks (UWSNs) because of their capabilities in the ocean monitoring and resource discovery. UWSNs are faced with different challenges, the most notable of which is perhaps how to efficiently deliver packets taking into account all of the constraints of the available acoustic communication channel. The opportunistic routing provides a reliable solution with the aid of intermediate nodes' collaboration to relay a packet toward the destination. In this paper, we propose a new routing protocol, called opportunistic void avoidance routing (OVAR), to address the void problem and also the energy-reliability trade-off in the forwarding set selection. OVAR takes advantage of distributed beaconing, constructs the adjacency graph at each hop and selects a forwarding set that holds the best trade-off between reliability and energy efficiency. The unique features of OVAR in selecting the candidate nodes in the vicinity of each other leads to the resolution of the hidden node problem. OVAR is also able to select the forwarding set in any direction from the sender, which increases its flexibility to bypass any kind of void area with the minimum deviation from the optimal path. The results of our extensive simulation study show that OVAR outperforms other protocols in terms of the packet delivery ratio, energy consumption, end-to-end delay, hop count and traversed distance.

  1. Social-aware data dissemination in opportunistic mobile social networks

    Yang, Yibo; Zhao, Honglin; Ma, Jinlong; Han, Xiaowei

    Opportunistic Mobile Social Networks (OMSNs), formed by mobile users with social relationships and characteristics, enhance spontaneous communication among users that opportunistically encounter each other. Such networks can be exploited to improve the performance of data forwarding. Discovering optimal relay nodes is one of the important issues for efficient data propagation in OMSNs. Although traditional centrality definitions to identify the nodes features in network, they cannot identify effectively the influential nodes for data dissemination in OMSNs. Existing protocols take advantage of spatial contact frequency and social characteristics to enhance transmission performance. However, existing protocols have not fully exploited the benefits of the relations and the effects between geographical information, social features and user interests. In this paper, we first evaluate these three characteristics of users and design a routing protocol called Geo-Social-Interest (GSI) protocol to select optimal relay nodes. We compare the performance of GSI using real INFOCOM06 data sets. The experiment results demonstrate that GSI overperforms the other protocols with highest data delivery ratio and low communication overhead.

  2. The 14th International Workshops on Opportunistic Protists (IWOP 14).

    Cushion, Melanie T; Limper, Andrew H; Porollo, Aleksey; Saper, Vivian E; Sinai, Anthony P; Weiss, Louis M

    2018-05-03

    The 14th International Workshops on Opportunistic Protists (IWOP-14) was held August 10-12, 2017 in Cincinnati, OH, USA. The IWOP meetings focus on opportunistic protists (OIs); for example, free-living amoebae, Pneumocystis spp., Cryptosporidium spp., Toxoplasma, the Microsporidia, and kinetoplastid flagellates. The highlights of Pneumocystis spp. research included the reports of primary homothallism for mating; a potential requirement for sexual replication in its life cycle; a new antigen on the surface of small asci; roles for CLRs, Dectin-1, and Mincle in host responses; and identification of MSG families and mechanisms used for surface variation. Studies of Cryptosporidia spp. included comparative genomics, a new cryopreservation method; the role of mucin in attachment and invasion, and epidemiological surveys illustrating species diversity in animals. One of the five identified proteins in the polar tube of Microsporidia, PTP4, was shown to play a role in host infection. Zebrafish were used as a low cost vertebrate animal model for an evaluation of potential anti-toxoplasma drugs. Folk medicine compounds with anti-toxoplasma activity were presented, and reports on the chronic toxoplasma infection provided evidence for increased tractability for the study of this difficult life cycle stage. Escape from the parasitophorus vacuole and cell cycle regulation were the topics of the study in the acute phase. © 2018 International Society of Protistologists.

  3. Chest x-ray findings of opportunistic infections

    Lee, Yul; Jeon, Suk Chul; Lim, Jeong Ki; Park, Jae Hyung; Kim, Chu Wan

    1983-01-01

    The chest x-ray findings of 20 cases of pulmonary opportunistic infection were analyzed according to causative agents. The results were as follows: 1. Final diagnoses of 20 cases of opportunistic infections were tuberculosis in 6 cases, pneumocystis carinii pneumonia in 5 cases, bacterial infection in 7 cases, and fungal infection in 2 cases. 2. The underlying diseases were leukemia in 6 cases, kidney transplantation in 6 cases, lymphoma in 3 cases, nephrotic syndrome in 1 case, nasopharyngeal cancer in 1 case, multiple myeloma in 1 case, agranulocytosis in 1 case, and hypogammaglobulinemia in 1 case. 3. In tuberculosis, all the 6 cases showed severe manifestations such as military tuberculosis, tuberculous pneumonia, moderately advanced tuberculosis and tuberculous pericarditis. 4. In pneumocystis carinii pneumonia, the most frequent findings were bilateral alveolar densities and peripheral field of the lung was saved in most cases. 5. In 2 cases of fungal infections bilateral multiple cavity nodules were noted. 6. In cases of bacterial infection there was more cases of gram negative infection than gram positive and 2 cases of pseudomonas revealed bilateral multiple cavitary nodules

  4. Spectrum database as a service (SDaaS) for broadband innovation and efficient spectrum utilization

    Mfupe, L

    2013-10-01

    Full Text Available Broadband innovations for future wireless networks involves rapid sharing of radio frequency (RF) spectrum resources by means of dynamic spectrum access techniques (DSA) to satisfy immediate portfolio of heterogeneous demands of wireless IP services...

  5. Keeping pace with criminals: An extended study of designing patrol allocation against adaptive opportunistic criminals

    Zhang, Chao; Gholami, Shahrzad; Kar, Debarun; Sinha, Arunesh; Jain, Manish; Goyal, Ripple; Tambe, Milind

    2016-01-01

    Game theoretic approaches have recently been used to model the deterrence effect of patrol officers’ assignments on opportunistic crimes in urban areas. One major challenge in this domain is modeling the behavior of opportunistic criminals. Compared to strategic attackers (such as terrorists) who execute a well-laid out plan, opportunistic criminals are less strategic in planning attacks and more flexible in executing well-laid plans based on their knowledge of patrol officers’ assignments. I...

  6. The Opportunistic House for Tehran: A Design Prototype

    Sara Khorshidifard

    2015-12-01

    Full Text Available This article is an advocacy research for Tehran, promoting an implication of architectural design as a tool for citizen empowerment and positive environmental change. In the article, I am offering a fresh look at Tehran’s housing problems by speculating an “opportunistic house” typology as a residential style that would serve much more than just shelter. I am making a case for a new house prototype that applies socially-equitable solutions in design. My study finds applications and significance beyond plain housing design and, mainly, onto the design of ad hoc urban public realm spaces. This is in accord with my overarching mission of supporting new way of thinking about, and ultimately offering, welcoming, safe, and energized places for Tehran’s citizens. These will additionally have important implications for inhospitable public spaces worldwide. This research is grounded in my prior, multidisciplinary doctoral studies. The article itself is an initial step in my ongoing research design, of helping to build and revitalize a wide range of urban communities by nurturing their relationship to their built and natural environments. The article is a discussion around the following questions. How can housing design inventions empower citizens? In what manner can design offer progressive living place options whose services go beyond shelter needs? Particularly, in what ways can domestic spaces be designed to also embody other-than-living capacities, for example, for new kinds of public spaces? And eventually, what could a prototype of the opportunistic house look like in the context of a city like Tehran? The article is structured to first present a brief survey of how Tehran house forms and functions have developed historically, with more emphasis on their current state. It will then offer examples of opportunistic uses of domestic spaces in Tehran. This notion is communicated through narrative analysis and photographic vignettes from a few

  7. Genome-Wide Screen for Saccharomyces cerevisiae Genes Contributing to Opportunistic Pathogenicity in an Invertebrate Model Host

    Sujal S. Phadke

    2018-01-01

    Full Text Available Environmental opportunistic pathogens can exploit vulnerable hosts through expression of traits selected for in their natural environments. Pathogenicity is itself a complicated trait underpinned by multiple complex traits, such as thermotolerance, morphology, and stress response. The baker’s yeast, Saccharomyces cerevisiae, is a species with broad environmental tolerance that has been increasingly reported as an opportunistic pathogen of humans. Here we leveraged the genetic resources available in yeast and a model insect species, the greater waxmoth Galleria mellonella, to provide a genome-wide analysis of pathogenicity factors. Using serial passaging experiments of genetically marked wild-type strains, a hybrid strain was identified as the most fit genotype across all replicates. To dissect the genetic basis for pathogenicity in the hybrid isolate, bulk segregant analysis was performed which revealed eight quantitative trait loci significantly differing between the two bulks with alleles from both parents contributing to pathogenicity. A second passaging experiment with a library of deletion mutants for most yeast genes identified a large number of mutations whose relative fitness differed in vivo vs. in vitro, including mutations in genes controlling cell wall integrity, mitochondrial function, and tyrosine metabolism. Yeast is presumably subjected to a massive assault by the innate insect immune system that leads to melanization of the host and to a large bottleneck in yeast population size. Our data support that resistance to the innate immune response of the insect is key to survival in the host and identifies shared genetic mechanisms between S. cerevisiae and other opportunistic fungal pathogens.

  8. To share or not to share? Business aspects of network sharing for Mobile Network Operators

    Berkers, F.T.H.M.; Hendrix, G.; Chatzicharistou, I.; Haas, T. de; Hamera, D.

    2010-01-01

    Radio spectrum and network infrastructure are two essential resources for mobile service delivery, which are both costly and increasingly scarce. In this paper we consider drivers and barriers of network sharing, which is seen as a potential solution for scarcity in these resources. We considered a

  9. Resource sharing in wireless networks: The SAPHYRE approach

    Jorswieck, E.A.; Badia, L.; Fahldieck, T.; Gesbert, D.; Gustafsson, S.; Haardt, M.; Ho, K.-M.; Karipidis, E.; Kortke, A.; Larsson, E.G.; Mark, H.; Nawrocki, M.; Piesiewicz, R.; Römer, F.; Schubert, M.; Sykora, J.; Trommelen, P.H.; Ende, B.D. van; Zorzi, M.

    2010-01-01

    Physical resource sharing between wireless operators and service providers is necessary in order to support efficient, competitive, and innovative wireless communication markets. By sharing resources, such as spectrum or infrastructure, which are usually exclusively allocated interference is created

  10. Opportunistic Neurologic Infections in Patients with Acquired Immunodeficiency Syndrome (AIDS).

    Albarillo, Fritzie; O'Keefe, Paul

    2016-01-01

    Infections of the central nervous system (CNS) in individuals with human immunodeficiency virus (HIV) remain a substantial cause of morbidity and mortality despite the introduction of highly active antiretroviral therapy (HAART) especially in the resource-limited regions of the world. Diagnosis of these infections may be challenging because findings on cerebrospinal fluid (CSF) analysis and brain imaging are nonspecific. While brain biopsy provides a definitive diagnosis, it is an invasive procedure associated with a relatively low mortality rate, thus less invasive modalities have been studied in recent years. Diagnosis, therefore, can be established based on a combination of a compatible clinical syndrome, radiologic and CSF findings, and understanding of the role of HIV in these infections. The most common CNS opportunistic infections are AIDS-defining conditions; thus, treatment of these infections in combination with HAART has greatly improved survival.

  11. Opportunistic microorganisms in patients undergoing antibiotic therapy for pulmonary tuberculosis

    Silvia Maria Rodrigues Querido

    2011-12-01

    Full Text Available Antimicrobial therapy may cause changes in the resident oral microbiota, with the increase of opportunistic pathogens. The aim of this study was to compare the prevalence of Candida, Staphylococcus, Pseudomonas and Enterobacteriaceae in the oral cavity of fifty patients undergoing antibiotic therapy for pulmonary tuberculosis and systemically healthy controls. Oral rinsing and subgingival samples were obtained, plated in Sabouraud dextrose agar with chloramphenicol, mannitol agar and MacConkey agar, and incubated for 48 h at 37ºC. Candida spp. and coagulase-positive staphylococci were identified by phenotypic tests, C. dubliniensis, by multiplex PCR, and coagulase-negative staphylococci, Enterobacteriaceae and Pseudomonas spp., by the API systems. The number of Candida spp. was significantly higher in tuberculosis patients, and C. albicans was the most prevalent specie. No significant differences in the prevalence of other microorganisms were observed. In conclusion, the antimicrobial therapy for pulmonary tuberculosis induced significant increase only in the amounts of Candida spp.

  12. Exact performance analysis of decode-and-forward opportunistic relaying

    Tourki, Kamel

    2010-06-01

    In this paper, we investigate a dual-hop decode-and-forward opportunistic relaying scheme where the source may or may not be able to communicate directly with the destination. In our study, we consider a regenerative relaying scheme in which the decision to cooperate takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive an exact closed-form expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact statistics of each hop. Unlike existing works where the analysis focused on high signal-to-noise ratio (SNR) regime, such results are important to enable the designers to take decisions regarding practical systems that operate at low SNR regime. We show that performance simulation results coincide with our analytical results.

  13. Sinabro: A Smartphone-Integrated Opportunistic Electrocardiogram Monitoring System.

    Kwon, Sungjun; Lee, Dongseok; Kim, Jeehoon; Lee, Youngki; Kang, Seungwoo; Seo, Sangwon; Park, Kwangsuk

    2016-03-11

    In our preliminary study, we proposed a smartphone-integrated, unobtrusive electrocardiogram (ECG) monitoring system, Sinabro, which monitors a user's ECG opportunistically during daily smartphone use without explicit user intervention. The proposed system also monitors ECG-derived features, such as heart rate (HR) and heart rate variability (HRV), to support the pervasive healthcare apps for smartphones based on the user's high-level contexts, such as stress and affective state levels. In this study, we have extended the Sinabro system by: (1) upgrading the sensor device; (2) improving the feature extraction process; and (3) evaluating extensions of the system. We evaluated these extensions with a good set of algorithm parameters that were suggested based on empirical analyses. The results showed that the system could capture ECG reliably and extract highly accurate ECG-derived features with a reasonable rate of data drop during the user's daily smartphone use.

  14. Sinabro: A Smartphone-Integrated Opportunistic Electrocardiogram Monitoring System

    Sungjun Kwon

    2016-03-01

    Full Text Available In our preliminary study, we proposed a smartphone-integrated, unobtrusive electrocardiogram (ECG monitoring system, Sinabro, which monitors a user’s ECG opportunistically during daily smartphone use without explicit user intervention. The proposed system also monitors ECG-derived features, such as heart rate (HR and heart rate variability (HRV, to support the pervasive healthcare apps for smartphones based on the user’s high-level contexts, such as stress and affective state levels. In this study, we have extended the Sinabro system by: (1 upgrading the sensor device; (2 improving the feature extraction process; and (3 evaluating extensions of the system. We evaluated these extensions with a good set of algorithm parameters that were suggested based on empirical analyses. The results showed that the system could capture ECG reliably and extract highly accurate ECG-derived features with a reasonable rate of data drop during the user’s daily smartphone use.

  15. Outage analysis of opportunistic decode-and-forward relaying

    Tourki, Kamel

    2010-09-01

    In this paper, we investigate a dual-hop opportunistic decode-and-forward relaying scheme where the source may or not be able to communicate directly with the destination. We first derive statistics based on exact probability density function (PDF) of each hop. Then, the PDFs are used to determine closed-form outage probability expression for a transmission rate R. Furthermore, we evaluate the asymptotic outage performance and the diversity order is deduced. Unlike existing works where the analysis focused on high signal-to-noise ratio (SNR) regime, such results are important to enable the designers to take decisions regarding practical systems that operate at low SNR regime. We show that performance simulation results coincide with our analytical results under practical assumption of unbalanced hops. © 2010 IEEE.

  16. Opportunistic Sensor Data Collection with Bluetooth Low Energy

    Sergio Aguilar

    2017-01-01

    Full Text Available Bluetooth Low Energy (BLE has gained very high momentum, as witnessed by its widespread presence in smartphones, wearables and other consumer electronics devices. This fact can be leveraged to carry out opportunistic sensor data collection (OSDC in scenarios where a sensor node cannot communicate with infrastructure nodes. In such cases, a mobile entity (e.g., a pedestrian or a vehicle equipped with a BLE-enabled device can collect the data obtained by the sensor node when both are within direct communication range. In this paper, we characterize, both analytically and experimentally, the performance and trade-offs of BLE as a technology for OSDC, for the two main identified approaches, and considering the impact of its most crucial configuration parameters. Results show that a BLE sensor node running on a coin cell battery can achieve a lifetime beyond one year while transferring around 10 Mbit/day, in realistic OSDC scenarios.

  17. Opportunistic Sensor Data Collection with Bluetooth Low Energy.

    Aguilar, Sergio; Vidal, Rafael; Gomez, Carles

    2017-01-23

    Bluetooth Low Energy (BLE) has gained very high momentum, as witnessed by its widespread presence in smartphones, wearables and other consumer electronics devices. This fact can be leveraged to carry out opportunistic sensor data collection (OSDC) in scenarios where a sensor node cannot communicate with infrastructure nodes. In such cases, a mobile entity (e.g., a pedestrian or a vehicle) equipped with a BLE-enabled device can collect the data obtained by the sensor node when both are within direct communication range. In this paper, we characterize, both analytically and experimentally, the performance and trade-offs of BLE as a technology for OSDC, for the two main identified approaches, and considering the impact of its most crucial configuration parameters. Results show that a BLE sensor node running on a coin cell battery can achieve a lifetime beyond one year while transferring around 10 Mbit/day, in realistic OSDC scenarios.

  18. Opportunistic splitting for scheduling using a score-based approach

    Rashid, Faraan

    2012-06-01

    We consider the problem of scheduling a user in a multi-user wireless environment in a distributed manner. The opportunistic splitting algorithm is applied to find the best group of users without reporting the channel state information to the centralized scheduler. The users find the best among themselves while requiring just a ternary feedback from the common receiver at the end of each mini-slot. The original splitting algorithm is modified to handle users with asymmetric channel conditions. We use a score-based approach with the splitting algorithm to introduce time and throughput fairness while exploiting the multi-user diversity of the network. Analytical and simulation results are given to show that the modified score-based splitting algorithm works well as a fair scheduling scheme with good spectral efficiency and reduced feedback. © 2012 IEEE.

  19. Updates on Aspergillus, Pneumocystis and other opportunistic pulmonary mycoses.

    Curbelo, Jose; Galván, Jose María; Aspa, Javier

    2015-12-01

    Mycoses are serious diseases with potentially fatal outcome. The introduction of immunosuppressive treatments and life support techniques has led to a growing prevalence of different degrees of immunosuppression. Compromised immune response is the primary risk factor for the development of opportunistic mycoses. Early diagnosis and treatment are crucial for improving prognosis. However, isolation in cultures or identification using antigen detection techniques cannot distinguish between colonization and invasive infection, and the clinical status of the patient often prevents biopsy sampling. Clinicians thus find themselves in an uncertain position, requiring them to quickly recognize clinical and radiological signs and interpret microbiological results in context. The aim of this review is to provide a general overview of the profile of patients susceptible to these infections, the role of the immune system and, in more detail, the major diagnostic developments that have gained most acceptance and recognition among the scientific community. Copyright © 2014 SEPAR. Published by Elsevier Espana. All rights reserved.

  20. Coopetitive Business Models in Future Mobile Broadband with Licensed Shared Access (LSA)

    P. Ahokangas; M. Matinmikko; I. Atkova; L.F. Minervini; S. Yrjölä; M. Mustonen

    2016-01-01

    Spectrum scarcity forces mobile network operators (MNOs) providing mobile broadband services to develop new business models that address spectrum sharing. It engages MNOs into coopetitive relationship with incumbents. Licensed Shared Access (LSA) concept complements traditional licensing and helps MNOs to access new spectrum bands on a shared basis. This paper discusses spectrum sharing with LSA from business perspective. It describes how coopetition and business model are linked conceptually...

  1. Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network

  2. Regression in autistic spectrum disorders.

    Stefanatos, Gerry A

    2008-12-01

    A significant proportion of children diagnosed with Autistic Spectrum Disorder experience a developmental regression characterized by a loss of previously-acquired skills. This may involve a loss of speech or social responsitivity, but often entails both. This paper critically reviews the phenomena of regression in autistic spectrum disorders, highlighting the characteristics of regression, age of onset, temporal course, and long-term outcome. Important considerations for diagnosis are discussed and multiple etiological factors currently hypothesized to underlie the phenomenon are reviewed. It is argued that regressive autistic spectrum disorders can be conceptualized on a spectrum with other regressive disorders that may share common pathophysiological features. The implications of this viewpoint are discussed.

  3. Additive opportunistic capture explains group hunting benefits in African wild dogs.

    Hubel, Tatjana Y; Myatt, Julia P; Jordan, Neil R; Dewhirst, Oliver P; McNutt, J Weldon; Wilson, Alan M

    2016-03-29

    African wild dogs (Lycaon pictus) are described as highly collaborative endurance pursuit hunters based on observations derived primarily from the grass plains of East Africa. However, the remaining population of this endangered species mainly occupies mixed woodland savannah where hunting strategies appear to differ from those previously described. We used high-resolution GPS and inertial technology to record fine-scale movement of all members of a single pack of six adult African wild dogs in northern Botswana. The dogs used multiple short-distance hunting attempts with a low individual kill rate (15.5%), but high group feeding rate due to the sharing of prey. Use of high-level cooperative chase strategies (coordination and collaboration) was not recorded. In the mixed woodland habitats typical of their current range, simultaneous, opportunistic, short-distance chasing by dogs pursuing multiple prey (rather than long collaborative pursuits of single prey by multiple individuals) could be the key to their relative success in these habitats.

  4. Genomics of adaptation during experimental evolution of the opportunistic pathogen Pseudomonas aeruginosa.

    Alex Wong

    2012-09-01

    Full Text Available Adaptation is likely to be an important determinant of the success of many pathogens, for example when colonizing a new host species, when challenged by antibiotic treatment, or in governing the establishment and progress of long-term chronic infection. Yet, the genomic basis of adaptation is poorly understood in general, and for pathogens in particular. We investigated the genetics of adaptation to cystic fibrosis-like culture conditions in the presence and absence of fluoroquinolone antibiotics using the opportunistic pathogen Pseudomonas aeruginosa. Whole-genome sequencing of experimentally evolved isolates revealed parallel evolution at a handful of known antibiotic resistance genes. While the level of antibiotic resistance was largely determined by these known resistance genes, the costs of resistance were instead attributable to a number of mutations that were specific to individual experimental isolates. Notably, stereotypical quinolone resistance mutations in DNA gyrase often co-occurred with other mutations that, together, conferred high levels of resistance but no consistent cost of resistance. This result may explain why these mutations are so prevalent in clinical quinolone-resistant isolates. In addition, genes involved in cyclic-di-GMP signalling were repeatedly mutated in populations evolved in viscous culture media, suggesting a shared mechanism of adaptation to this CF-like growth environment. Experimental evolutionary approaches to understanding pathogen adaptation should provide an important complement to studies of the evolution of clinical isolates.

  5. Sharing knowledge

    2009-07-01

    The workshop on Climate Change Impacts and Adaptation Strategies for Arctic Indigenous Communities is one stage in developing positions and providing input from the perspectives of Arctic Peoples in preparation for the Indigenous Peoples' Global Summit on Climate Change that will take place in April, 2009, in Anchorage, Alaska. The Summit, organized by the Inuit Circumpolar Council with oversight of an International Steering Committee, will bring together hundreds of indigenous Peoples around the world. This Workshop intended to bring together Arctic Indigenous Peoples to deliver and to share information, academic research, case studies based on traditional knowledge and researchers knowledgeable in traditional knowledge and/or policy issues drawn from traditional knowledge. The following themes were discussed: 1) Traditional knowledge research and education; 2) Laws and lawmaking; 3) Food and health; 4) Organisation; 5) Communications and advocacy. (ln)

  6. Totally opportunistic routing algorithm (TORA) for underwater wireless sensor network.

    Rahman, Ziaur; Hashim, Fazirulhisyam; Rasid, Mohd Fadlee A; Othman, Mohamed

    2018-01-01

    Underwater Wireless Sensor Network (UWSN) has emerged as promising networking techniques to monitor and explore oceans. Research on acoustic communication has been conducted for decades, but had focused mostly on issues related to physical layer such as high latency, low bandwidth, and high bit error. However, data gathering process is still severely limited in UWSN due to channel impairment. One way to improve data collection in UWSN is the design of routing protocol. Opportunistic Routing (OR) is an emerging technique that has the ability to improve the performance of wireless network, notably acoustic network. In this paper, we propose an anycast, geographical and totally opportunistic routing algorithm for UWSN, called TORA. Our proposed scheme is designed to avoid horizontal transmission, reduce end to end delay, overcome the problem of void nodes and maximize throughput and energy efficiency. We use TOA (Time of Arrival) and range based equation to localize nodes recursively within a network. Once nodes are localized, their location coordinates and residual energy are used as a matrix to select the best available forwarder. All data packets may or may not be acknowledged based on the status of sender and receiver. Thus, the number of acknowledgments for a particular data packet may vary from zero to 2-hop. Extensive simulations were performed to evaluate the performance of the proposed scheme for high network traffic load under very sparse and very dense network scenarios. Simulation results show that TORA significantly improves the network performance when compared to some relevant existing routing protocols, such as VBF, HHVBF, VAPR, and H2DAB, for energy consumption, packet delivery ratio, average end-to-end delay, average hop-count and propagation deviation factor. TORA reduces energy consumption by an average of 35% of VBF, 40% of HH-VBF, 15% of VAPR, and 29% of H2DAB, whereas the packet delivery ratio has been improved by an average of 43% of VBF, 26

  7. Totally opportunistic routing algorithm (TORA) for underwater wireless sensor network

    Hashim, Fazirulhisyam; Rasid, Mohd Fadlee A.; Othman, Mohamed

    2018-01-01

    Underwater Wireless Sensor Network (UWSN) has emerged as promising networking techniques to monitor and explore oceans. Research on acoustic communication has been conducted for decades, but had focused mostly on issues related to physical layer such as high latency, low bandwidth, and high bit error. However, data gathering process is still severely limited in UWSN due to channel impairment. One way to improve data collection in UWSN is the design of routing protocol. Opportunistic Routing (OR) is an emerging technique that has the ability to improve the performance of wireless network, notably acoustic network. In this paper, we propose an anycast, geographical and totally opportunistic routing algorithm for UWSN, called TORA. Our proposed scheme is designed to avoid horizontal transmission, reduce end to end delay, overcome the problem of void nodes and maximize throughput and energy efficiency. We use TOA (Time of Arrival) and range based equation to localize nodes recursively within a network. Once nodes are localized, their location coordinates and residual energy are used as a matrix to select the best available forwarder. All data packets may or may not be acknowledged based on the status of sender and receiver. Thus, the number of acknowledgments for a particular data packet may vary from zero to 2-hop. Extensive simulations were performed to evaluate the performance of the proposed scheme for high network traffic load under very sparse and very dense network scenarios. Simulation results show that TORA significantly improves the network performance when compared to some relevant existing routing protocols, such as VBF, HHVBF, VAPR, and H2DAB, for energy consumption, packet delivery ratio, average end-to-end delay, average hop-count and propagation deviation factor. TORA reduces energy consumption by an average of 35% of VBF, 40% of HH-VBF, 15% of VAPR, and 29% of H2DAB, whereas the packet delivery ratio has been improved by an average of 43% of VBF, 26

  8. Leveraging the checkpoint-restart technique for optimizing CPU efficiency of ATLAS production applications on opportunistic platforms

    Cameron, David; The ATLAS collaboration

    2017-01-01

    Data processing applications of the ATLAS experiment, such as event simulation and reconstruction, spend considerable amount of time in the initialization phase. This phase includes loading a large number of shared libraries, reading detector geometry and condition data from external databases, building a transient representation of the detector geometry and initializing various algorithms and services. In some cases the initialization step can take as long as 10-15 minutes. Such slow initialization, being inherently serial, has a significant negative impact on overall CPU efficiency of the production job, especially when the job is executed on opportunistic, often short-lived, resources such as commercial clouds or volunteer computing. In order to improve this situation, we can take advantage of the fact that ATLAS runs large numbers of production jobs with similar configuration parameters (e.g. jobs within the same production task). This allows us to checkpoint one job at the end of its configuration step a...

  9. Opportunistic infection manifestation of HIV-AIDS patients in Airlangga university hospital Surabaya

    Asmarawati, T. P.; Putranti, A.; Rachman, B. E.; Hadi, U.; Nasronudin

    2018-03-01

    Opportunistic infections are common in HIV-infected patients especially those who progress to acquired immunodeficiency syndrome. There are many factors involved in the prevalence of opportunistic infections. We investigated the patterns of opportunistic infection in HIV-infected patients admitted to Airlangga University Hospital Surabaya. This study was an observational study, conducted in adults patients with HIV infection from January 2016 to September 2017. Data collected from the medical records of the patients. The number of samples in this study was 58. The mean age was 42.9 years, mostly male. Most patients admitted were in clinical stadium III or IV. Heterosexual transmission is a common risk factor in patients. The most prevalent opportunistic infections found in patients were oral candidiasis (58.6%), followed by pulmonary tuberculosis (41.4%) and pneumonia/PCP (41.4%). Other infections found were toxoplasmosis, chronic diarrhea, cytomegalovirus, meningitis TB, hepatitis C, amoebiasis, and cerebritis. Opportunistic infections occurred more often in age≥40 years and increased as clinical stadium get worse. From the results, we conclude that oral candidiasis and pulmonary tuberculosis were the most common opportunistic infections found in Airlangga University Hospital. The pattern of opportunistic infections in this study could help the hospital to set priorities related to the management of patients.

  10. Molecular Diagnostics of Arthroconidial Yeasts, Frequent Pulmonary Opportunists.

    Kaplan, Engin; Al-Hatmi, Abdullah M S; Ilkit, Macit; Gerrits van den Ende, A H G; Hagen, Ferry; Meis, Jacques F; de Hoog, G Sybren

    2018-01-01

    Magnusiomyces capitatus and Saprochaete clavata are members of the clade of arthroconidial yeasts that represent emerging opportunistic pulmonary pathogens in immunocompromised patients. Given that standard ribosomal DNA (rDNA) identification often provides confusing results, in this study, we analyzed 34 isolates with the goal of finding new genetic markers for classification using multilocus sequencing and amplified fragment length polymorphism (AFLP). The interspecific similarity obtained using rDNA markers (the internal transcribed spacer [ITS] and large subunit regions) was in the range of 96 to 99%, whereas that obtained using protein-coding loci ( Rbp2 , Act , and Tef1α ) was lower at 89.4 to 95.2%. Ultimately, Rbp2 was selected as the best marker for species distinction. On the basis of cloned ITS data, some strains proved to be misidentified in comparison with the identities obtained with phenotypic characters, protein sequences, and AFLP profiles, indicating that different copies of the ribosomal operon were present in a single species. Antifungal susceptibility testing revealed that voriconazole had the lowest MIC against M. capitatus , while amphotericin B had the lowest MIC against S. clavata Both species exhibited in vitro resistance to fluconazole and micafungin. Copyright © 2017 American Society for Microbiology.

  11. ANTIBIOTIC RESISTANCE IN THE OPPORTUNISTIC PATHOGEN STENOTROPHOMONAS MALTOPHILIA

    María Blanca Sánchez

    2015-06-01

    Full Text Available Stenotrophomonas maltophilia is an environmental bacterium found in the soil, associated with plants and animals, and in aquatic environments. It is also an opportunistic pathogen now causing an increasing number of nosocomial infections. The treatment of S. maltophilia is quite difficult given its intrinsic resistance to a number of antibiotics, and because it is able to acquire new resistances via horizontal gene transfer and mutations. Certainly, strains resistant to quinolones, cotrimoxale and/or cephalosporins - antibiotics commonly used to treat S. maltophilia infections - have emerged. The increasing number of available S. maltophilia genomes has allowed the identification and annotation of a large number of antimicrobial and heavy metal resistance genes. Most encode inactivating enzymes and efflux pumps, but information on their role in intrinsic and acquired resistance is limited. Non-typical antibiotic resistance mechanisms that also form part of the intrinsic resistome have been identified via mutant library screening. These include non-typical antibiotic resistance genes, such as bacterial metabolism genes, and non-inheritable resistant phenotypes, such as biofilm formation and persistence. Their relationships with resistance are complex and require further study.

  12. Comparative analysis of glutaredoxin domains from bacterial opportunistic pathogens

    Leeper, Thomas; Zhang, Suxin; Van Voorhis, Wesley C.; Myler, Peter J.; Varani, Gabriele

    2011-01-01

    NMR structures of the glutaredoxin (GLXR) domains from Br. melitensis and Ba. henselae have been determined as part of the SSGCID initiative. Comparison of the domains with known structures reveals overall structural similarity between these proteins and previously determined E. coli GLXR structures, with minor changes associated with the position of helix 1 and with regions that diverge from similar structures found in the closest related human homolog. Glutaredoxin proteins (GLXRs) are essential components of the glutathione system that reductively detoxify substances such as arsenic and peroxides and are important in the synthesis of DNA via ribonucleotide reductases. NMR solution structures of glutaredoxin domains from two Gram-negative opportunistic pathogens, Brucella melitensis and Bartonella henselae, are presented. These domains lack the N-terminal helix that is frequently present in eukaryotic GLXRs. The conserved active-site cysteines adopt canonical proline/tyrosine-stabilized geometries. A difference in the angle of α-helix 2 relative to the β-sheet surface and the presence of an extended loop in the human sequence suggests potential regulatory regions and/or protein–protein interaction motifs. This observation is consistent with mutations in this region that suppress defects in GLXR–ribonucleotide reductase interactions. These differences between the human and bacterial forms are adjacent to the dithiol active site and may permit species-selective drug design

  13. The opportunistic transmission of wireless worms between mobile devices

    Rhodes, C. J.; Nekovee, M.

    2008-12-01

    The ubiquity of portable wireless-enabled computing and communications devices has stimulated the emergence of malicious codes (wireless worms) that are capable of spreading between spatially proximal devices. The potential exists for worms to be opportunistically transmitted between devices as they move around, so human mobility patterns will have an impact on epidemic spread. The scenario we address in this paper is proximity attacks from fleetingly in-contact wireless devices with short-range communication range, such as Bluetooth-enabled smart phones. An individual-based model of mobile devices is introduced and the effect of population characteristics and device behaviour on the outbreak dynamics is investigated. The model uses straight-line motion to achieve population, though it is recognised that this is a highly simplified representation of human mobility patterns. We show that the contact rate can be derived from the underlying mobility model and, through extensive simulation, that mass-action epidemic models remain applicable to worm spreading in the low density regime studied here. The model gives useful analytical expressions against which more refined simulations of worm spread can be developed and tested.

  14. Effect of threshold quantization in opportunistic splitting algorithm

    Nam, Haewoon

    2011-12-01

    This paper discusses algorithms to find the optimal threshold and also investigates the impact of threshold quantization on the scheduling outage performance of the opportunistic splitting scheduling algorithm. Since this algorithm aims at finding the user with the highest channel quality within the minimal number of mini-slots by adjusting the threshold every mini-slot, optimizing the threshold is of paramount importance. Hence, in this paper we first discuss how to compute the optimal threshold along with two tight approximations for the optimal threshold. Closed-form expressions are provided for those approximations for simple calculations. Then, we consider linear quantization of the threshold to take the limited number of bits for signaling messages in practical systems into consideration. Due to the limited granularity for the quantized threshold value, an irreducible scheduling outage floor is observed. The numerical results show that the two approximations offer lower scheduling outage probability floors compared to the conventional algorithm when the threshold is quantized. © 2006 IEEE.

  15. Recognizing and Conducting Opportunistic Experiments in Education: A Guide for Policymakers and Researchers. REL 2014-037

    Resch, Alexandra; Berk, Jillian; Akers, Lauren

    2014-01-01

    An opportunistic experiment is a type of randomized controlled trial that studies the effects of a planned intervention or policy change with minimal added disruption and cost. This guide defines opportunistic experiments and provides examples, discusses issues to consider when identifying potential opportunistic experiments, and outlines the…

  16. Toward distributed relay selection for opportunistic amplify-and-forward transmission

    Tourki, Kamel

    2011-05-01

    Opportunistic relaying in cooperative communication depends on careful relay selection. However the traditional centralized method used for opportunistic Amplify-and-Forward (OAF) protocols requires precise measurements of channel state information (CSI) at the destination (CSI-OAF). In this paper, we propose a distributed relay selection framework for opportunistic AF (D-OAF) cooperative communications and offer an accurate performance analysis based on exact statistics of the local signalto- noise ratios of the best relay. Furthermore, we validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures, and we compare our new results with their CSI-based counterparts. © 2011 IEEE.

  17. Spectrum Recombination.

    Greenslade, Thomas B., Jr.

    1984-01-01

    Describes several methods of executing lecture demonstrations involving the recombination of the spectrum. Groups the techniques into two general classes: bringing selected portions of the spectrum together using lenses or mirrors and blurring the colors by rapid movement or foreshortening. (JM)

  18. Auction based spectrum management of cognitive radio networks

    Chang, H. B.; Chen, K.-C.; Prasad, Ramjee

    2009-01-01

    (PS-MSs), and we therefore construct a cognitive radio network (CRN) consisting of a PRN with multiple CR-MSs. We propose a spectrum management policy framework such that CR-MSs can compete in utilization of the PRN spectrum bands available to opportunistic transmission of CR-MSs by Vickrey auction...... to the PRN, the overall spectrum utilization, the profit of the service provider, the spectrum access opportunity of the CR-MSs are increased to achieve cowin situation for every party in cognitive radio networks.......Cognitive radio (CR) technology is considered as an effective solution to enhance overall spectrum efficiency, especially primary radio network (PRN) typically having relatively low spectrum utilization. However, to realize CR concept, it is essential to provide enough incentives to PRN and extra...

  19. Activity of antiretroviral drugs in human infections by opportunistic agents

    Izabel Galhardo Demarchi

    2012-03-01

    Full Text Available Highly active antiretroviral therapy (HAART is used in patients infected with HIV. This treatment has been shown to significantly decrease opportunist infections such as those caused by viruses, fungi and particularly, protozoa. The use of HAART in HIV-positive persons is associated with immune reconstitution as well as decreased prevalence of oral candidiasis and candidal carriage. Antiretroviral therapy benefits patients who are co-infected by the human immunodeficiency virus (HIV, human herpes virus 8 (HHV-8, Epstein-Barr virus, hepatitis B virus (HBV, parvovirus B19 and cytomegalovirus (CMV. HAART has also led to a significant reduction in the incidence, and the modification of characteristics, of bacteremia by etiological agents such as Staphylococcus aureus, coagulase negative staphylococcus, non-typhoid species of Salmonella, Streptococcus pneumoniae, Pseudomonas aeruginosa, and Mycobacterium tuberculosis. HAART can modify the natural history of cryptosporidiosis and microsporidiosis, and restore mucosal immunity, leading to the eradication of Cryptosporidium parvum. A similar restoration of immune response occurs in infections by Toxoplasma gondii. The decline in the incidence of visceral leishmaniasis/HIV co-infection can be observed after the introduction of protease inhibitor therapy. Current findings are highly relevant for clinical medicine and may serve to reduce the number of prescribed drugs thereby improving the quality of life of patients with opportunistic diseases.A terapia HAART (terapia antirretroviral altamente ativa é usada em pacientes infectados pelo vírus da imunodeficiência humana (HIV e demonstrou diminuição significativa de infecções oportunistas, tais como as causadas por vírus, fungos, protozoários e bactérias. O uso da HAART está associado com a reconstituição imunológica e diminuição na prevalência de candidíase oral. A terapia antirretroviral beneficia pacientes co-infectados pelo HIV, v

  20. Shared decision making

    ... page: //medlineplus.gov/ency/patientinstructions/000877.htm Shared decision making To use the sharing features on this page, ... treatment you both support. When to use Shared Decision Making Shared decision making is often used when you ...

  1. Non-Orthogonal Opportunistic Beamforming: Performance Analysis and Implementation

    Xia, Minghua

    2012-04-01

    Aiming to achieve the sum-rate capacity in multi-user multi-antenna systems where $N_t$ antennas are implemented at the transmitter, opportunistic beamforming (OBF) generates~$N_t$ orthonormal beams and serves $N_t$ users during each channel use, which results in high scheduling delay over the users, especially in densely populated networks. Non-orthogonal OBF with more than~$N_t$ transmit beams can be exploited to serve more users simultaneously and further decrease scheduling delay. However, the inter-beam interference will inevitably deteriorate the sum-rate. Therefore, there is a tradeoff between sum-rate and scheduling delay for non-orthogonal OBF. In this context, system performance and implementation of non-orthogonal OBF with $N>N_t$ beams are investigated in this paper. Specifically, it is analytically shown that non-orthogonal OBF is an interference-limited system as the number of users $K \\\\to \\\\infty$. When the inter-beam interference reaches its minimum for fixed $N_t$ and~$N$, the sum-rate scales as $N\\\\ln\\\\left(\\\\frac{N}{N-N_t}\\ ight)$ and it degrades monotonically with the number of beams $N$ for fixed $N_t$. On the contrary, the average scheduling delay is shown to scale as $\\\\frac{1}{N}K\\\\ln{K}$ channel uses and it improves monotonically with $N$. Furthermore, two practical non-orthogonal beamforming schemes are explicitly constructed and they are demonstrated to yield the minimum inter-beam interference for fixed $N_t$ and $N$. This study reveals that, if user traffic is light and one user can be successfully served within a single transmission, non-orthogonal OBF can be applied to obtain lower worst-case delay among the users. On the other hand, if user traffic is heavy, non-orthogonal OBF is inferior to orthogonal OBF in terms of sum-rate and packet delay.

  2. Special issue Oceans and Humans Health: the ecology of marine opportunists.

    Burge, Colleen A; Kim, Catherine J S; Lyles, Jillian M; Harvell, C Drew

    2013-05-01

    Opportunistic marine pathogens, like opportunistic terrestrial pathogens, are ubiquitous in the environment (waters, sediments, and organisms) and only cause disease in immune-compromised or stressed hosts. In this review, we discuss four host-pathogen interactions within the marine environment that are typically considered opportunistic: sea fan coral-fungus, eelgrass-Labyrinthula zosterae, sea fan-Labyrinthulomycetes, and hard clam-Quahog Parasite Unknown with particular focus on disease ecology, parasite pathology, host response, and known associated environmental conditions. Disease is a natural part of all ecosystems; however, in some cases, a shift in the balance between the host, pathogen, and the environment may lead to epizootics in natural or cultured populations. In marine systems, host-microbe interactions are less understood than their terrestrial counterparts. The biological and physical changes to the world's oceans, coupled with other anthropogenic influences, will likely lead to more opportunistic diseases in the marine environment.

  3. Performance of an opportunistic multi-user cognitive network with multiple primary users

    Khan, Fahd Ahmed; Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2014-01-01

    for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the momentgenerating function

  4. Performance analysis of an opportunistic multi-user cognitive network with multiple primary users

    Khan, Fahd Ahmed; Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2014-01-01

    constraint is imposed on the secondary network in addition to the limited peak transmit power of each SU. The uplink scenario is considered where a single SU is selected for transmission. This opportunistic selection depends on the transmission channel power

  5. Occurrence of Opportunistic Pathogens Legionella pneumophila and non-tuberculous mycobacteria in hospital plumbing systems

    Occurrence of Opportunistic Pathogens Legionella pneumophila and non-tuberculous mycobacteria in hospital plumbing systems Jill Hoelle, Michael Coughlin, Elizabeth Sotkiewicz, Jingrang Lu, Stacy Pfaller, Mark Rodgers, and Hodon Ryu U.S. Environmental Protection Agency, Cincinnati...

  6. Opportunistic relaying in multipath and slow fading channel: Relay selection and optimal relay selection period

    Sungjoon Park,; Stark, Wayne E.

    2011-01-01

    In this paper we present opportunistic relay communication strategies of decode and forward relaying. The channel that we are considering includes pathloss, shadowing, and fast fading effects. We find a simple outage probability formula

  7. Exploiting opportunistic resources for ATLAS with ARC CE and the Event Service

    AUTHOR|(INSPIRE)INSPIRE-00226583; The ATLAS collaboration; Filipčič, Andrej; Guan, Wen; Tsulaia, Vakhtang; Walker, Rodney; Wenaus, Torre

    2017-01-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from the resources that comprise the Grid computing of most experiments, therefore exploiting these resources requires a change in strategy for the experiment. The resources may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The ARC CE with its non-intrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the Event Service primarily to address the issue of jobs that can be terminated at any point when opportunistic resources are needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in...

  8. Exploiting Opportunistic Resources for ATLAS with ARC CE and the Event Service

    Cameron, David; The ATLAS collaboration

    2016-01-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from the resources that comprise the Grid computing of most experiments, therefore exploiting these resources requires a change in strategy for the experiment. The resources may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The ARC CE with its non-intrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the Event Service primarily to address the issue of jobs that can be terminated at any point when opportunistic resources are needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in...

  9. An Ad-Hoc Opportunistic Dissemination Protocol for Smartphone-based Participatory Traffic Monitoring

    Türkes, Okan; Seraj, Fatjon; Scholten, Johan; Meratnia, Nirvana; Havinga, Paul J.M.

    2015-01-01

    This study introduces an ad-hoc opportunistic data dissemination protocol, called VADISS, that facilitates participatory traffic monitoring applications with smartphones. As a ubiquitous alternative to existing vehicular networking methods, VADISS uses the default WiFi interfaces universally adopted

  10. AFSC/NMML: Cook Inlet Beluga Opportunistic Sightings, 1975 to 2015

    National Oceanic and Atmospheric Administration, Department of Commerce — As a part of National Marine Fisheries Service (NMFS) management of the endangered Cook Inlet beluga whale population, a database of opportunistic beluga whale...

  11. Cook Inlet Beluga Opportunistic Sightings, 1975 to 2015 (NCEI Accession 0142326)

    National Oceanic and Atmospheric Administration, Department of Commerce — As a part of National Marine Fisheries Service (NMFS) management of the endangered Cook Inlet beluga whale population, a database of opportunistic beluga whale...

  12. REMOTE DETENTION OF INVASIVE AND OPPORTUNISTIC PLANT SPECIES IN GREAT LAKES COASTAL WETLANDS

    Invasive and opportunistic plant species have been associated with wetland disturbance. Increases in the abundance of plant species such as common reed (Phragmites australis) in coastal Great Lakes wetlands are hypothesized to occur with shifts toward drier hydrologic regimes, fr...

  13. Scaling up ATLAS Event Service to production levels on opportunistic computing platforms

    AUTHOR|(INSPIRE)INSPIRE-00066086; The ATLAS collaboration; Caballero, Jose; Ernst, Michael; Guan, Wen; Hover, John; Lesny, David; Maeno, Tadashi; Nilsson, Paul; Tsulaia, Vakhtang; van Gemmeren, Peter; Vaniachine, Alexandre; Wang, Fuquan; Wenaus, Torre

    2016-01-01

    Continued growth in public cloud and HPC resources is on track to exceed the dedicated resources available for ATLAS on the WLCG. Examples of such platforms are Amazon AWS EC2 Spot Instances, Edison Cray XC30 supercomputer, backfill at Tier 2 and Tier 3 sites, opportunistic resources at the Open Science Grid (OSG), and ATLAS High Level Trigger farm between the data taking periods. Because of specific aspects of opportunistic resources such as preemptive job scheduling and data I/O, their efficient usage requires workflow innovations provided by the ATLAS Event Service. Thanks to the finer granularity of the Event Service data processing workflow, the opportunistic resources are used more efficiently. We report on our progress in scaling opportunistic resource usage to double-digit levels in ATLAS production.

  14. Scaling up ATLAS Event Service to production levels on opportunistic computing platforms

    Benjamin, Douglas; The ATLAS collaboration; Ernst, Michael; Guan, Wen; Hover, John; Lesny, David; Maeno, Tadashi; Nilsson, Paul; Tsulaia, Vakhtang; van Gemmeren, Peter; Vaniachine, Alexandre; Wang, Fuquan; Wenaus, Torre

    2016-01-01

    Continued growth in public cloud and HPC resources is on track to overcome the dedicated resources available for ATLAS on the WLCG. Example of such platforms are Amazon AWS EC2 Spot Instances, Edison Cray XC30 supercomputer, backfill at the Tier-2 and Tier-3 sites, opportunistic resources at the Open Science Grid, and ATLAS High Level Trigger farm between the data taking periods. Because of opportunistic resources specifics such as preemptive job scheduling and data I/O, their efficient usage requires workflow innovations provided by the ATLAS Event Service. Thanks to the finer granularity of the Event Service data processing workflow, the opportunistic resources are used more efficiently. We report on our progress in scaling opportunistic resource usage to double-digit levels in ATLAS production.

  15. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    Hossain, Md Jahangir; Alouini, Mohamed-Slim; Bhargava, Vijay K.

    2010-01-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second

  16. OPPORTUNISTIC ASPERGILLUS PATHOGENS MEASURED IN HOME AND HOSPITAL TAP WATER BY MOLD SPECIFIC QUANTITATIVE PCR (MSQPCR)

    Opportunistic fungal pathogens are a concern because of the increasing number of immunocompromised patients. The goal of this research was to test a simple extraction method and rapid quantitative PCR (QPCR) measurement of the occurrence of potential pathogens, Aspergillus fumiga...

  17. What It Takes to Be a Pseudomonas aeruginosa? The Core Genome of the Opportunistic Pathogen Updated.

    Benoît Valot

    Full Text Available Pseudomonas aeruginosa is an opportunistic bacterial pathogen able to thrive in highly diverse ecological niches and to infect compromised patients. Its genome exhibits a mosaic structure composed of a core genome into which accessory genes are inserted en bloc at specific sites. The size and the content of the core genome are open for debate as their estimation depends on the set of genomes considered and the pipeline of gene detection and clustering. Here, we redefined the size and the content of the core genome of P. aeruginosa from fully re-analyzed genomes of 17 reference strains. After the optimization of gene detection and clustering parameters, the core genome was defined at 5,233 orthologs, which represented ~ 88% of the average genome. Extrapolation indicated that our panel was suitable to estimate the core genome that will remain constant even if new genomes are added. The core genome contained resistance determinants to the major antibiotic families as well as most metabolic, respiratory, and virulence genes. Although some virulence genes were accessory, they often related to conserved biological functions. Long-standing prophage elements were subjected to a genetic drift to eventually display a G+C content as higher as that of the core genome. This contrasts with the low G+C content of highly conserved ribosomal genes. The conservation of metabolic and respiratory genes could guarantee the ability of the species to thrive on a variety of carbon sources for energy in aerobiosis and anaerobiosis. Virtually all the strains, of environmental or clinical origin, have the complete toolkit to become resistant to the major antipseudomonal compounds and possess basic pathogenic mechanisms to infect humans. The knowledge of the genes shared by the majority of the P. aeruginosa isolates is a prerequisite for designing effective therapeutics to combat the wide variety of human infections.

  18. Lower Bound of Energy-Latency Tradeoff of Opportunistic Routing in Multihop Networks

    Gorce Jean-Marie

    2011-01-01

    Full Text Available Opportunistic networking aims at exploiting sporadic radio links to improve the connectivity of multihop networks and to foster data transmissions. The broadcast nature of wireless channels is an important feature that can be exploited to improve transmissions by using several potential receivers. Opportunistic relaying is thus the first brick for opportunistic networking. However, the advantage of opportunistic relaying may be degraded due to energy increase related to having multiple active receivers. This paper proposes a thorough analysis of opportunistic relaying efficiency under different realistic radio channel conditions. The study is intended to find the best tradeoff between two objectives: energy and latency minimizations, with a hard reliability constraint. We derive an optimal bound, namely, the Pareto front of the related optimization problem, which offers a good insight into the benefits of opportunistic routings compared with classical multihop routing schemes. Meanwhile, the lower bound provides a framework to optimize the parameters at the physical layer, MAC layer, and routing layer from the viewpoint of cross layer during the design or planning phase of a network.

  19. Spectrum pooling in MnWave Networks

    Boccardi, Federico; Shokri-Ghadikolaei, Hossein; Fodor, Gabor

    2016-01-01

    Motivated by the specific characteristics of mmWave technologies, we discuss the possibility of an authorization regime that allows spectrum sharing between multiple operators, also referred to as spectrum pooling. In particular, considering user rate as the performance measure, we assess...

  20. Zellweger Spectrum

    ... severe defect, resulting in essentially nonfunctional peroxisomes. This phenomenon produces the range of severity of the disorders. How is the Zellweger Spectrum Diagnosed? The distinctive shape of the head and face of a child born with one of the diseases of the ...

  1. Resolution 679/013 Resolution 679/013 ANCAP is authorized to direct contracting with the firm Spectrum Geo Inc. for the performance of a contract for the implementation, marketing and revenue sharing program for the acquisition and processing of 2D seismic data in the offshore Uruguay between ANCAP and Spectrum, nonexclusive multi client

    2013-01-01

    The National Administration Portland Alchool and Fuels from Uruguay in the hydrocarbon researching signed a direct contracting with the firm Spectrum GEO Inc. with the aim to provide regional 2D seismic data in shallow, deep and ultra deep offshore waters of Uruguay, in order to delineate more leads and illuminating detail the prospects that lie in footage from the early Cretaceous (3 to 8 seconds TWT) to tertiary (1-4 sec)

  2. Multidrug-resistant opportunistic pathogens challenging veterinary infection control.

    Walther, Birgit; Tedin, Karsten; Lübke-Becker, Antina

    2017-02-01

    Although the problems associated with healthcare-associated infections (HAI) and the emergence of zoonotic and multidrug-resistant pathogens in companion animal (dogs, cats and horses) medicine have been well-known for decades, current progress with respect to practical implementation of infection control programs in veterinary clinics has been limited. Clinical outbreak events reported for methicillin-resistant Staphylooccus aureus (MRSA) and Staphylococcus pseudintermedius (MRSP), extended spectrum beta-lactamase (ESBL)-producing Escherichia coli and multidrug-resistant (MDR) Salmonella Serovars indicate the necessity of infection control strategies for protecting animal patients at risk as well as veterinary personnel. The close bond between humans and their companion animals provides opportunities for exchange of microorganisms, including MDR pathogens. This particular aspect of the "One Health" idea requires more representative surveillance efforts and infection control strategies with respect to animal-species specific characters. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. Optimising social information by game theory and ant colony method to enhance routing protocol in opportunistic networks

    Chander Prabha

    2016-09-01

    Full Text Available The data loss and disconnection of nodes are frequent in the opportunistic networks. The social information plays an important role in reducing the data loss because it depends on the connectivity of nodes. The appropriate selection of next hop based on social information is critical for improving the performance of routing in opportunistic networks. The frequent disconnection problem is overcome by optimising the social information with Ant Colony Optimization method which depends on the topology of opportunistic network. The proposed protocol is examined thoroughly via analysis and simulation in order to assess their performance in comparison with other social based routing protocols in opportunistic network under various parameters settings.

  4. When push comes to shove: Compensating and opportunistic strategies in a collective-risk household energy dilemma

    Anya eSkatova

    2016-03-01

    Full Text Available To solve problems like climate change, every little push counts. Community energy schemes are a popular policy targeted to reduce a country’s carbon emissions but the effect they have on energy use depends on whether people can work together as a community. We often find ourselves caught in a dilemma: if others are not doing their bit, why should I? In our experiment participants (N = 118 were matched in groups of 10 to play in a collective-risk game framed as a community energy purchase scheme. They made only one decision about energy use for their virtual household a day, whilst a full round of the game lasted one week in real time. All decisions were entered via personal phone or a home computer. If in the end of the week the group exceeded a pre-paid threshold of energy use, all group members would share a fine. Each day participants received feedback about decisions of their group partners, and in some groups the feedback was manipulated as high (unfair condition or low (fair condition use. High average group use created individual risk for participants to be penalized in the end of the week, even if they did not use much themselves. We found that under the risk of having to pay a fine, participants stayed significantly below the fair-share threshold regardless of unfair behaviour of others. On the contrary, they significantly decreased their consumption towards the end of the game. Seeing that others are doing their bit – using a fair-share – encouraged people to take advantage of the situation: those who played against fair confederates did not follow the normative behaviour but conversely, increased their consumption over the course of the game. These opportunistic strategies were demonstrated by impulsive participants who were also low in punishment sensitivity. We discuss the findings in the light of policy research as well as literature on cooperation and prosocial behaviour.

  5. When Push Comes to Shove: Compensating and Opportunistic Strategies in a Collective-Risk Household Energy Dilemma

    Skatova, Anya, E-mail: anya.skatova@gmail.com [Horizon Digital Economy Research, University of Nottingham, Nottingham (United Kingdom); Warwick Business School, University of Warwick, Coventry (United Kingdom); Bedwell, Benjamin [Horizon Digital Economy Research, University of Nottingham, Nottingham (United Kingdom); Kuper-Smith, Benjamin [Horizon Digital Economy Research, University of Nottingham, Nottingham (United Kingdom); Institute of Neurology, University College London, London (United Kingdom)

    2016-03-14

    To solve problems such as climate change, every little push counts. Community energy schemes are a popular policy targeted to reduce a country’s carbon emissions but the effect they have on energy use depends on whether people can work together as a community. We often find ourselves caught in a dilemma: if others are not doing their bit, why should I? In our experiment, participants (N = 118) were matched in groups of 10 to play in a collective-risk game framed as a community energy purchase scheme. They made only one decision about energy use for their virtual household a day, while a full round of the game lasted 1 week in real time. All decisions were entered via personal phone or a home computer. If in the end of the week the group exceeded a pre-paid threshold of energy use all group members would share a fine. Each day participants received feedback about decisions of their group partners, and in some groups the feedback was manipulated as high (unfair condition) or low (fair condition) use. High average group use created individual risk for participants to be penalized in the end of the week, even if they did not use much themselves. We found that under the risk of having to pay a fine, participants stayed significantly below the fair-share threshold regardless of unfair behavior of others. On the contrary, they significantly decreased their consumption toward the end of the game. Seeing that others are doing their bit – using a fair-share – encouraged people to take advantage of the situation: those who played against fair confederates did not follow the normative behavior but conversely, increased their consumption over the course of the game. These opportunistic strategies were demonstrated by impulsive participants who were also low in punishment sensitivity. We discuss the findings in the light of policy research as well as literature on cooperation and prosocial behavior.

  6. When Push Comes to Shove: Compensating and Opportunistic Strategies in a Collective-Risk Household Energy Dilemma

    Skatova, Anya; Bedwell, Benjamin; Kuper-Smith, Benjamin

    2016-01-01

    To solve problems such as climate change, every little push counts. Community energy schemes are a popular policy targeted to reduce a country’s carbon emissions but the effect they have on energy use depends on whether people can work together as a community. We often find ourselves caught in a dilemma: if others are not doing their bit, why should I? In our experiment, participants (N = 118) were matched in groups of 10 to play in a collective-risk game framed as a community energy purchase scheme. They made only one decision about energy use for their virtual household a day, while a full round of the game lasted 1 week in real time. All decisions were entered via personal phone or a home computer. If in the end of the week the group exceeded a pre-paid threshold of energy use all group members would share a fine. Each day participants received feedback about decisions of their group partners, and in some groups the feedback was manipulated as high (unfair condition) or low (fair condition) use. High average group use created individual risk for participants to be penalized in the end of the week, even if they did not use much themselves. We found that under the risk of having to pay a fine, participants stayed significantly below the fair-share threshold regardless of unfair behavior of others. On the contrary, they significantly decreased their consumption toward the end of the game. Seeing that others are doing their bit – using a fair-share – encouraged people to take advantage of the situation: those who played against fair confederates did not follow the normative behavior but conversely, increased their consumption over the course of the game. These opportunistic strategies were demonstrated by impulsive participants who were also low in punishment sensitivity. We discuss the findings in the light of policy research as well as literature on cooperation and prosocial behavior.

  7. Joint Network Coding and Opportunistic Scheduling for the Bidirectional Relay Channel

    Shaqfeh, Mohammad

    2013-05-27

    In this paper, we consider a two-way communication system in which two users communicate with each other through an intermediate relay over block-fading channels. We investigate the optimal opportunistic scheduling scheme in order to maximize the long-term average transmission rate in the system assuming symmetric information flow between the two users. Based on the channel state information, the scheduler decides that either one of the users transmits to the relay, or the relay transmits to a single user or broadcasts to both users a combined version of the two users’ transmitted information by using linear network coding. We obtain the optimal scheduling scheme by using the Lagrangian dual problem. Furthermore, in order to characterize the gains of network coding and opportunistic scheduling, we compare the achievable rate of the system versus suboptimal schemes in which the gains of network coding and opportunistic scheduling are partially exploited.

  8. Joint Network Coding and Opportunistic Scheduling for the Bidirectional Relay Channel

    Shaqfeh, Mohammad; Alnuweiri, Hussein; Alouini, Mohamed-Slim; Zafar, Ammar

    2013-01-01

    In this paper, we consider a two-way communication system in which two users communicate with each other through an intermediate relay over block-fading channels. We investigate the optimal opportunistic scheduling scheme in order to maximize the long-term average transmission rate in the system assuming symmetric information flow between the two users. Based on the channel state information, the scheduler decides that either one of the users transmits to the relay, or the relay transmits to a single user or broadcasts to both users a combined version of the two users’ transmitted information by using linear network coding. We obtain the optimal scheduling scheme by using the Lagrangian dual problem. Furthermore, in order to characterize the gains of network coding and opportunistic scheduling, we compare the achievable rate of the system versus suboptimal schemes in which the gains of network coding and opportunistic scheduling are partially exploited.

  9. Guidelines for the naming of genes, gene products, and mutants in the opportunistic protists.

    Limper, Andrew H; Weiss, Louis M

    2011-01-01

    The opportunistic protists encompass a wide diversity of organisms including Pneumocystis, Toxoplasma, cryptosporidia, microsporidia, and related genera. Recent advances in the molecular biology and cellular biochemistry of these organisms have led to the identification of an ever growing numbers of key genes and their cognate proteins. Until now, these molecules have not been designated using any consistent nomenclature system, leading to considerable confusion. The participants of the 11th International Workshop on Opportunistic Protists met on August 3, 2010 to reach consensus of a nomenclature system for genes, gene products, and mutants in the opportunistic protists. The following summary reports the consensus agreement to move toward a unified nomenclature system for these organisms. The system is adapted from that used for Saccharomyces cerevisiae. © 2011 The Author(s). Journal of Eukaryotic Microbiology © 2011 International Society of Protistologists.

  10. Public policy and regulatory implications for the implementation of Opportunistic Cloud Computing Services for Enterprises

    Kuada, Eric; Olesen, Henning; Henten, Anders

    2012-01-01

    Opportunistic Cloud Computing Services (OCCS) is a social network approach to the provisioning and management of cloud computing services for enterprises. This paper discusses how public policy and regulations will impact on OCCS implementation. We rely on documented publicly available government...... and corporate policies on the adoption of cloud computing services and deduce the impact of these policies on their adoption of opportunistic cloud computing services. We conclude that there are regulatory challenges on data protection that raises issues for cloud computing adoption in general; and the lack...... of a single globally accepted data protection standard poses some challenges for very successful implementation of OCCS for companies. However, the direction of current public and corporate policies on cloud computing make a good case for them to try out opportunistic cloud computing services....

  11. Diagnostic mode and tumor stage of breast cancers in the setting of opportunistic screening

    Graf, O.; Hopf, G.; Obermayer, M.; Fruehwald, F.; Scheurecker, A.; Kramer, J.

    2006-01-01

    Purpose: To analyze data at the time of diagnosis of breast cancer in three radiology practices in Austria in the setting of opportunistic screening. Materials and methods: In 529 women (ages 31 - 89, mean age 61.1) with breast cancer, the mode of diagnosis (detected clinically or by opportunistic screening), the local tumor stages, and intervals between screening examinations were assessed. Results: In 33.6% (178 of 529) of the cases, the breast cancer was detected clinically, and in 66.4% (351 of 529) of the cases, the cancer was detected by opportunistic screening. Cancers in prognostically favorable stages (in situ carcinomas, pT1 a, pT1 b, pT1c) were detected by opportunistic screening in 79.9% of the cases. The clinically detected cancers were in locally advanced stages (pT2, pT3) in 58.4% of the cases. In the majority of clinically detected cases (75%), the women had never had a mammogram before or had not had a recent one. In 13% of the cases detected by opportunistic screening, diagnosis was made during the first exam, in 40% of the cases, the period since the last mammogram was less than 24 months, and in 47% of the cases, this period was greater than 24 months. Conclusion: In our patients the majority of breast cancers were detected in early stages by opportunistic screening. The use of an organized system with exams at regular intervals may further reduce the number of advanced cancers. (orig.)

  12. Plumbing of hospital premises is a reservoir for opportunistically pathogenic microorganisms: a review.

    Williams, Margaret M; Armbruster, Catherine R; Arduino, Matthew J

    2013-01-01

    Several bacterial species that are natural inhabitants of potable water distribution system biofilms are opportunistic pathogens important to sensitive patients in healthcare facilities. Waterborne healthcare-associated infections (HAI) may occur during the many uses of potable water in the healthcare environment. Prevention of infection is made more challenging by lack of data on infection rate and gaps in understanding of the ecology, virulence, and infectious dose of these opportunistic pathogens. Some healthcare facilities have been successful in reducing infections by following current water safety guidelines. This review describes several infections, and remediation steps that have been implemented to reduce waterborne HAIs.

  13. Opportunistic relaying in multipath and slow fading channel: Relay selection and optimal relay selection period

    Sungjoon Park,

    2011-11-01

    In this paper we present opportunistic relay communication strategies of decode and forward relaying. The channel that we are considering includes pathloss, shadowing, and fast fading effects. We find a simple outage probability formula for opportunistic relaying in the channel, and validate the results by comparing it with the exact outage probability. Also, we suggest a new relay selection algorithm that incorporates shadowing. We consider a protocol of broadcasting the channel gain of the previously selected relay. This saves resources in slow fading channel by reducing collisions in relay selection. We further investigate the optimal relay selection period to maximize the throughput while avoiding selection overhead. © 2011 IEEE.

  14. Performance of systematic and non-systematic ('opportunistic') screening mammography: a comparative study from Denmark

    Bihrmann, Kristine; Jensen, Allan; Olsen, Anne Helene

    2008-01-01

    screening were calculated. RESULTS: Defining BI-RADS(trade mark) 4-5 as a positive screening outcome, the overall sensitivity of opportunistic screening was 33.6% and the specificity was 99.1%. Using BI-RADS(trade mark) 3-5 as positive, the sensitivity was 37.4% and the specificity was 97.9%. Organized...... screening (which was not categorized according to BI-RADS(trade mark)) had an overall sensitivity of 67.2% and a specificity of 98.4%. CONCLUSION: Our study showed a considerably higher sensitivity in organized screening than in opportunistic screening, while the specificity was fairly similar in the two...

  15. Information Sharing Modalities for Mobile Ad-Hoc Networks

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  16. 47 CFR 90.1407 - Spectrum use in the network.

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Spectrum use in the network. 90.1407 Section 90... network. (a) Spectrum use. The Shared Wireless Broadband Network will operate using spectrum associated... from the primary public safety operations in the 763-768 MHz and 793-798 MHz bands. The network...

  17. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate...

  18. Research of opportunistic behavior in the market of non-standard products

    Natalya Sergeyevna Grigoryeva

    2015-03-01

    Full Text Available Objective to study the characteristic features of opportunistic behavior in the markets of complex products not subject to standardization by the example of rendering services during constructionandassembling operations. Methods analysis synthesis collection and description of empirical data. Results a significant amount of theoretical material has been analyzed budgets of constructionandassembling operations have been analyzed normative documents have been studied. A poll of quantity surveyors supervisors of constructionandassembling operations consumers of services and works have been carried out. The differences were revealed in the kinds of opportunistic behavior in the nonstandard products markets compared to the standard products markets the results of those surveys were presented in the earlier works by the author. Scientific novelty it has been shown that in case of individual elaboration of each project due to the uniqueness of the result of economic activity as a single complex the opportunistic behavior has such prerequisites as high costs for measurements and control of the quantity and quality of the rendered services and used materials lack of professional competencies of the consumers in the sphere of activity of the producer. Practical value the key provisions and conclusions of the article can be used in the scientific and educational activity when viewing the issues of opportunistic revelations between economic subjects. nbsp

  19. Loss of competition in the outside host environment generates outbreaks of environmental opportunist pathogens.

    Jani Anttila

    Full Text Available Environmentally transmitted pathogens face ecological interactions (e.g., competition, predation, parasitism in the outside-host environment and host immune system during infection. Despite the ubiquitousness of environmental opportunist pathogens, traditional epidemiology focuses on obligatory pathogens incapable of environmental growth. Here we ask how competitive interactions in the outside-host environment affect the dynamics of an opportunist pathogen. We present a model coupling the classical SI and Lotka-Volterra competition models. In this model we compare a linear infectivity response and a sigmoidal infectivity response. An important assumption is that pathogen virulence is traded off with competitive ability in the environment. Removing this trade-off easily results in host extinction. The sigmoidal response is associated with catastrophic appearances of disease outbreaks when outside-host species richness, or overall competition pressure, decreases. This indicates that alleviating outside-host competition with antibacterial substances that also target the competitors can have unexpected outcomes by providing benefits for opportunist pathogens. These findings may help in developing alternative ways of controlling environmental opportunist pathogens.

  20. Opportunistic error correction for mimo-ofdm: from theory to practice

    Shao, X.; Slump, Cornelis H.

    Opportunistic error correction based on fountain codes is especially designed for the MIMOOFDM system. The key point of this new method is the tradeoff between the code rate of error correcting codes and the number of sub-carriers in the channel vector to be discarded. By transmitting one

  1. Evaluation of two novel barcodes for species recognition of opportunistic pathogens in Fusarium.

    de Hoog, S.; van Diepeningen, A.D.

    2015-01-01

    The genus Fusarium includes more than 200 species of which 73 have been isolated from human infections. Fusarium species are opportunistic human pathogens with variable aetiology. Species determination is best made with the combined phylogeny of protein-coding genes such as elongation factor (TEF1),

  2. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  3. Exploiting opportunistic resources for ATLAS with ARC CE and the Event Service

    Cameron, D.; Filipčič, A.; Guan, W.; Tsulaia, V.; Walker, R.; Wenaus, T.; ATLAS Collaboration

    2017-10-01

    With ever-greater computing needs and fixed budgets, big scientific experiments are turning to opportunistic resources as a means to add much-needed extra computing power. These resources can be very different in design from those that comprise the Grid computing of most experiments, therefore exploiting them requires a change in strategy for the experiment. They may be highly restrictive in what can be run or in connections to the outside world, or tolerate opportunistic usage only on condition that tasks may be terminated without warning. The Advanced Resource Connector Computing Element (ARC CE) with its nonintrusive architecture is designed to integrate resources such as High Performance Computing (HPC) systems into a computing Grid. The ATLAS experiment developed the ATLAS Event Service (AES) primarily to address the issue of jobs that can be terminated at any point when opportunistic computing capacity is needed by someone else. This paper describes the integration of these two systems in order to exploit opportunistic resources for ATLAS in a restrictive environment. In addition to the technical details, results from deployment of this solution in the SuperMUC HPC centre in Munich are shown.

  4. Two-user opportunistic scheduling using hierarchical modulations in wireless networks with heterogenous average link gains

    Hossain, Md Jahangir; Alouini, Mohamed-Slim; Bhargava, Vijay K.

    2010-01-01

    -user opportunistic scheduling (HTS) scheme based on our earlier proposed TBS scheme. This HTS scheme selects the first user based on the largest absolute CNR value among all the users while the second user is selected based on the ratios of the absolute CNRs

  5. Yield of opportunistic targeted screening for type 2 diabetes in primary care: the diabscreen study.

    Klein Woolthuis, E.P.; Grauw, W.J.C. de; Gerwen, W.H.E.M. van; Hoogen, H.J.M. van den; Lisdonk, E.H. van de; Metsemakers, J.F.M.; Weel, C. van

    2009-01-01

    PURPOSE: In screening for type 2 diabetes, guidelines recommend targeting high-risk individuals. Our objectives were to assess the yield of opportunistic targeted screening for type 2 diabetes in primary care and to assess the diagnostic value of various risk factors. METHODS: In 11 family practices

  6. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  7. A P2P Query Algorithm for Opportunistic Networks Utilizing betweenness Centrality Forwarding

    Jianwei Niu

    2013-01-01

    Full Text Available With the proliferation of high-end mobile devices that feature wireless interfaces, many promising applications are enabled in opportunistic networks. In contrary to traditional networks, opportunistic networks utilize the mobility of nodes to relay messages in a store-carry-forward paradigm. Thus, the relay process in opportunistic networks faces several practical challenges in terms of delay and delivery rate. In this paper, we propose a novel P2P Query algorithm, namely Betweenness Centrality Forwarding (PQBCF, for opportunistic networking. PQBCF adopts a forwarding metric called Betweenness Centrality (BC, which is borrowed from social network, to quantify the active degree of nodes in the networks. In PQBCF, nodes with a higher BC are preferable to serve as relays, leading to higher query success rate and lower query delay. A comparison with the state-of-the-art algorithms reveals that PQBCF can provide better performance on both the query success Ratio and query delay, and approaches the performance of Epidemic Routing (ER with much less resource consumption.

  8. Friend-to-friend short message service with opportunistic Wi-Fi beacons

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This study introduces Oppline, an ad hoc opportunistic short message service that can be collaboratively used by everyone who has a smart mobile device. The data exchange method of Oppline is built on top of the universal Wi-Fi standard, thus expedites platform-independent integration of related

  9. Microbiological characterization of aquatic microbiomes targeting taxonomical marker genes and antibiotic resistance genes of opportunistic bacteria.

    Alexander, Johannes; Bollmann, Anna; Seitz, Wolfram; Schwartz, Thomas

    2015-04-15

    The dissemination of medically relevant antibiotic resistance genes (ARGs) (blaVIM-1, vanA, ampC, ermB, and mecA) and opportunistic bacteria (Enterococcus faecium/faecalis, Pseudomonas aeruginosa, Enterobacteriaceae, Staphylococcus aureus, and CNS) was determined in different anthropogenically influenced aquatic habitats in a selected region of Germany. Over a period of two years, four differently sized wastewater treatment plants (WWTPs) with and without clinical influence, three surface waters, four rain overflow basins, and three groundwater sites were analyzed by quantitative Polymerase Chain Reaction (qPCR). Results were calculated in cell equivalents per 100 ng of total DNA extracted from water samples and per 100 mL sample volume, which seems to underestimate the abundance of antibiotic resistance and opportunistic bacteria. High abundances of opportunistic bacteria and ARG were quantified in clinical wastewaters and influents of the adjacent WWTP. The removal capacities of WWTP were up to 99% for some, but not all investigated bacteria. The abundances of most ARG targets were found to be increased in the bacterial population after conventional wastewater treatment. As a consequence, downstream surface water and also some groundwater compartments displayed high abundances of all four ARGs. It became obvious that the dynamics of the ARG differed from the fate of the opportunistic bacteria. This underlines the necessity of an advanced microbial characterization of anthropogenically influenced environments. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. PlayNCool: Opportunistic Network Coding for Local Optimization of Routing in Wireless Mesh Networks

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk

    2013-01-01

    This paper introduces PlayNCool, an opportunistic protocol with local optimization based on network coding to increase the throughput of a wireless mesh network (WMN). PlayNCool aims to enhance current routing protocols by (i) allowing random linear network coding transmissions end-to-end, (ii) r...

  11. HIV-associated opportunistic fungal infections: a guide to using the ...

    This review aims to provide a guide for clinicians to using the clinical microbiology laboratory for management of common HIV-associated opportunistic fungal infections, e.g. mucosal candidiasis, cryptococcosis, Pneumocystis jirovecii pneumonia (PCP), histoplasmosis, etc. Laboratory tests provide valuable guidance at ...

  12. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  13. Sum Utilization of Spectrum with Spectrum Handoff and Imperfect Sensing in Interweave Multi-Channel Cognitive Radio Networks

    Waqas Khalid

    2018-05-01

    Full Text Available Fifth-generation (5G heterogeneous network deployment poses new challenges for 5G-based cognitive radio networks (5G-CRNs as the primary user (PU is required to be more active because of the small cells, random user arrival, and spectrum handoff. Interweave CRNs (I-CRNs improve spectrum utilization by allowing opportunistic spectrum access (OSA for secondary users (SUs. The sum utilization of spectrum, i.e., joint utilization of spectrum by the SU and PU, depends on the spatial and temporal variations of PU activities, sensing outcomes, transmitting conditions, and spectrum handoff. In this study, we formulate and analyze the sum utilization of spectrum with different sets of channels under different PU and SU co-existing network topologies. We consider realistic multi-channel scenarios for the SU, with each channel licensed to a PU. The SU, aided by spectrum handoff, is authorized to utilize the channels on the basis of sensing outcomes and PU interruptions. The numerical evaluation of the proposed work is presented under different network and sensing parameters. Moreover, the sum utilization gain is investigated to analyze the sensitivities of different sensing parameters. It is demonstrated that different sets of channels, PU activities, and sensing outcomes have a significant impact on the sum utilization of spectrum associated with a specific network topology.

  14. Opportunistic or event-driven maintenance at the Stanford Linear Accelerator Center

    Allen, C.W.; Anderson, S.; Erickson, R.; Linebarger, W.; Sheppard, J.C.; Stanek, M.

    1997-03-01

    The Stanford Linear Accelerator Center (SLAC) uses a maintenance management philosophy that is best described as opportunistic or event-driven. Opportunistic maintenance can be defined as a systematic method of collecting, investigating, pre-planning, and publishing a set of proposed maintenance tasks and acting on them when there is an unscheduled failure or repair ''opportunity''. Opportunistic maintenance can be thought of as a modification of the run-to-fail maintenance management philosophy. This maintenance plan was adopted and developed to improve the overall availability of SLAC's linear accelerator, beam delivery systems, and associated controls, power systems, and utilities. In the late 1980's, as the technical complexity of the accelerator facility increased, variations on a conventional maintenance plan were used with mixed results. These variations typically included some type of regular periodic interruption to operations. The periodic shutdowns and unscheduled failures were additive and resulted in unsatisfactory availability. Maintenance issues are evaluated in a daily meeting that includes the accelerator managers, maintenance supervisors and managers, safety office personnel, program managers, and accelerator operators. Lists of pending maintenance tasks are made available to the general SLAC population by a World Wide Web site on a local internet. A conventional information system which pre-dates the WWW site is still being used to provide paper copies to groups that are not yet integrated into the WWW system. The local internet provides real time maintenance information, allowing people throughout the facility to track progress on tasks with essentially real-time status updates. With the introduction of opportunistic maintenance, the accelerator's availability has been measurably better. This paper will discuss processes, rolls and responsibilities of key maintenance groups, and management tools developed to support opportunistic maintenance

  15. Rethinking the Sharing Economy

    Kornberger, Martin; Leixnering, Stephan; Meyer, Renate

    2017-01-01

    Our paper focuses on a non-standard sharing example that harbors the potential to disrupt received wisdom on the sharing economy. While originally entering the field to analyze, broadly from a governance perspective, how the 2015 refugee crisis was handled in Vienna, Austria, we found that the no...... of sharing: economic and moral. Our paper contributes to this Special Issue of the Academy of Management Discoveries by highlighting and explaining the two-fold economic and moral nature of sharing and the organization of sharing between movement and platform....... sharing of resources (i.e., the economic dimension): the sharing of a distinct concern (i.e., the moral dimension of sharing). Our discovery exemplifies such a moral dimension that is rather different from the status quo materialistic treatments focusing on economic transactions and property rights...

  16. Job Sharing in Education.

    Davidson, Wilma; Kline, Susan

    1979-01-01

    The author presents the advantages of job sharing for all school personnel, saying that education is particularly adaptable to this new form of employment. Current job sharing programs in Massachusetts, California, and New Jersey schools are briefly discussed. (SJL)

  17. Production sharing agreements

    1994-01-01

    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  18. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  19. Job Sharing in Geography.

    Kay, Jeanne

    1982-01-01

    Job sharing is an employment alternative in which two qualified individuals manage the responsibilities of a single position. Discusses the barriers to and the potential, advantages, disadvantages, pitfalls, and challenges of job sharing. Focuses on job sharing in the geography profession. (Author/JN)

  20. The Sharing Economy

    Reinhold, Stephan; Dolnicar, Sara

    2017-01-01

    Peer-to-peer accommodation networks in general, and Airbnb in specific, are frequently referred to as part of the sharing economy. This chapter provides an overview of key characteristics of the sharing economy, discusses how these characteristics relate to peer-to-peer accommodation, and positions peer-to-peer accommodation networks within the sharing economy.

  1. Satisfaction and 'comparison sharing'

    Amilon, Anna

    2009-01-01

    the probability of satisfaction. Results show that comparison sharing impacts satisfaction for women, and that those women who share more equally than their peers are more likely to be satisfied, whereas comparison sharing has no influence on satisfaction for men. Also, parents are less likely to be satisfied...

  2. Spectrum 101: An Introduction to Spectrum Management

    2004-03-01

    produces a Joint Restricted Frequency List (JRFL). The JFRL consolidates and classifies the spectrum uses that are most critical to operations and to...Management Office JRFL Joint Restricted Frequency List JSC Joint Spectrum Center JSIR Joint Spectrum Interference Resolution JSME Joint Spectrum...Multifunctional Information Distribution System MILSATCOM Military Satellite Communications MOA Memorandum of Agreement MRFL Master Radio Frequency

  3. Annotation and Anonymity: Playful Photo-Sharing by Visiting Groups of Teenagers

    Rowland, Duncan; Appiah-Kubi, Kwamena; Shipp, Victoria; Mortier, Richard Michael; Benford, Steve

    2015-01-01

    This paper investigates the playful photo taking behaviour of teenagers during group visits to two touristic public events (an airshow and a guided tour of a museum). These studies provide the feedback for the iterative development of a smartphone based anonymous image annotation and sharing application. The resulting implications for the design of such photo systems are examined, specifically the appropriateness of opportunistic upload for social media. Playfulness in photography has many im...

  4. Planning for Bike Share Connectivity to Rail Transit

    Griffin, Greg Phillip; Sener, Ipek Nese

    2016-01-01

    Bike sharing can play a role in providing access to transit stations and then to final destinations, but early implementation of these systems in North America has been opportunistic rather than strategic. This study evaluates local intermodal plan goals using trip data and associated infrastructure such as transit stops and bike share station locations in Austin, Texas, and Chicago, Illinois. Bike sharing use data from both cities suggest a weak relationship with existing rail stations that could be strengthened through collaborative, intermodal planning. The study suggests a planning framework and example language that could be tailored to help address the linkage between bike sharing and transit. Rather than an exhaustive study of the practice, this study provides evidence from these two cities that identify opportunities to improve intermodal planning. Cities that are planning or expanding a bike sharing system should consider carefully how to leverage this mode with existing modes of transport. Regardless of a city’s status in implementing a bike sharing system, planners can leverage information on existing transport systems for planning at regional and local levels. PMID:27872554

  5. Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals

    Chao Zhang

    2016-06-01

    Full Text Available Game theoretic approaches have recently been used to model the deterrence effect of patrol officers’ assignments on opportunistic crimes in urban areas. One major challenge in this domain is modeling the behavior of opportunistic criminals. Compared to strategic attackers (such as terrorists who execute a well-laid out plan, opportunistic criminals are less strategic in planning attacks and more flexible in executing well-laid plans based on their knowledge of patrol officers’ assignments. In this paper, we aim to design an optimal police patrolling strategy against opportunistic criminals in urban areas. Our approach is comprised by two major parts: learning a model of the opportunistic criminal (and how he or she responds to patrols and then planning optimal patrols against this learned model. The planning part, by using information about how criminals responds to patrols, takes into account the strategic game interaction between the police and criminals. In more detail, first, we propose two categories of models for modeling opportunistic crimes. The first category of models learns the relationship between defender strategy and crime distribution as a Markov chain. The second category of models represents the interaction of criminals and patrol officers as a Dynamic Bayesian Network (DBN with the number of criminals as the unobserved hidden states. To this end, we: (i apply standard algorithms, such as Expectation Maximization (EM, to learn the parameters of the DBN; (ii modify the DBN representation that allows for a compact representation of the model, resulting in better learning accuracy and the increased speed of learning of the EM algorithm when used for the modified DBN. These modifications exploit the structure of the problem and use independence assumptions to factorize the large joint probability distributions. Next, we propose an iterative learning and planning mechanism that periodically updates the adversary model. We

  6. Sharing family and household:

    Winther, Ida Wentzel

    Keynote: Family relationships are normatively assumed to be characterized by ‘sharing’, such as living together in the same home, occupying the same place, sharing stuff, blood and biology, spending special and ordinary time together, and consequently creating shared biographical experiences....... In that way, families are thrown into togetherness. At the same time, we see families in varying forms where 'sharing' is lived and contested differently. In Denmark, many children live in nuclear families, and many live in different variations of more than one household. For those who share household...... and family, 'sharing' will be a basic condition. No matter what, they should share life circumstances, more stories, more places and spaces, more households families with both kin and non-kin. This keynote addresses the particular of children’s experiences of living apart and/or living together in sharing...

  7. 'Bounce' and Shergotty Share Common Ground

    2004-01-01

    This illustration compares the spectrum of 'Bounce,' a rock at Meridiani Planum, to that of a martian meteorite found on Earth called Shergotty. Bounce's spectrum, and thus mineral composition, is unique to the rocks studied so far at Merdiani Planum and Gusev Crater, the landings sites of the Mars Exploration Rovers Opportunity and Spirit. However, the results here indicate that Bounce is not a one-of-a-kind rock, but shares origins with Shergotty. Shergotty landed in India in 1865. Bounce's spectra were taken on sol 67 by Opportunity's Moessbauer spectrometer.

  8. Adaptive discrete rate and power transmission for spectrum sharing systems

    Abdallah, Mohamed M.; Salem, Ahmed H.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2012-01-01

    channels available at the secondary transmitter. We consider the problem under the constraints of maximum average interference power levels at the primary receiver. We develop a sub-optimal computationally efficient iterative algorithm for finding

  9. On multiuser switched diversity transmission for spectrum sharing systems

    Qaraqe, Marwa; Abdallah, Mohamed M.; Serpedin, Erchin; Alouini, Mohamed-Slim

    2012-01-01

    to satisfy the interference constraint. Finally, we present numerical results of our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load of both schemes. © 2012 ICST.

  10. Spectrally efficient switched transmit diversity for spectrum sharing systems

    Bouida, Zied; Abdallah, Mohamed M.; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2011-01-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using switched transmit diversity and adaptive modulation in order to increase the spectral efficiency of the secondary link. The proposed bandwidth efficient scheme (BES) uses the scan and wait (SWC) combining technique where a transmission occurs only when a branch with an acceptable performance is found, otherwise data is buffered. In our scheme, the modulation constellation size and the used transmit branch are determined to achieve the highest spectral efficiency given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. Selected numerical examples show that the BES scheme increases the capacity of the secondary link when compared to an existing switching efficient scheme (SES). This spectral efficiency comes at the expense of an increased average number of switched branches and thus an increased average delay. © 2011 IEEE.

  11. Adaptive discrete rate and power transmission for spectrum sharing systems

    Abdallah, Mohamed M.

    2012-04-01

    In this paper we develop a framework for optimizing the performance of the secondary link in terms of the average spectral efficiency assuming quantized channel state information (CSI) of the secondary and the secondary-to-primary interference channels available at the secondary transmitter. We consider the problem under the constraints of maximum average interference power levels at the primary receiver. We develop a sub-optimal computationally efficient iterative algorithm for finding the optimal CSI quantizers as well as the discrete power and rate employed at the cognitive transmitter for each quantized CSI level so as to maximize the average spectral efficiency. We show via analysis and simulations that the proposed algorithm converges for Rayleigh fading channels. Our numerical results give the number of bits required to sufficiently represent the CSI to achieve almost the maximum average spectral efficiency attained using full knowledge of the CSI. © 2012 IEEE.

  12. Spectrally efficient switched transmit diversity for spectrum sharing systems

    Bouida, Zied

    2011-09-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using switched transmit diversity and adaptive modulation in order to increase the spectral efficiency of the secondary link. The proposed bandwidth efficient scheme (BES) uses the scan and wait (SWC) combining technique where a transmission occurs only when a branch with an acceptable performance is found, otherwise data is buffered. In our scheme, the modulation constellation size and the used transmit branch are determined to achieve the highest spectral efficiency given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. Selected numerical examples show that the BES scheme increases the capacity of the secondary link when compared to an existing switching efficient scheme (SES). This spectral efficiency comes at the expense of an increased average number of switched branches and thus an increased average delay. © 2011 IEEE.

  13. Adaptive transmission schemes for MISO spectrum sharing systems

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  14. Interference-aware random beam selection for spectrum sharing systems

    Abdallah, Mohamed M.; Sayed, Mostafa M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2012-01-01

    . In this paper, we develop interference-aware random beam selection schemes that provide enhanced throughput for the secondary link under the condition that the interference observed at the primary link is within a predetermined acceptable value. For a secondary

  15. Inferring demographic history from a spectrum of shared haplotype lengths

    Harris, Kelley; Nielsen, Rasmus

    2013-01-01

    There has been much recent excitement about the use of genetics to elucidate ancestral history and demography. Whole genome data from humans and other species are revealing complex stories of divergence and admixture that were left undiscovered by previous smaller data sets. A central challenge...... is to estimate the timing of past admixture and divergence events, for example the time at which Neanderthals exchanged genetic material with humans and the time at which modern humans left Africa. Here, we present a method for using sequence data to jointly estimate the timing and magnitude of past admixture...

  16. Dynamic quantum secret sharing

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  17. An Overlapping Communities Detection Algorithm via Maxing Modularity in Opportunistic Networks

    Gao Zhi-Peng

    2016-01-01

    Full Text Available Community detection in opportunistic networks has been a significant and hot issue, which is used to understand characteristics of networks through analyzing structure of it. Community is used to represent a group of nodes in a network where nodes inside the community have more internal connections than external connections. However, most of the existing community detection algorithms focus on binary networks or disjoint community detection. In this paper, we propose a novel algorithm via maxing modularity of communities (MMCto find overlapping community structure in opportunistic networks. It utilizes contact history of nodes to calculate the relation intensity between nodes. It finds nodes with high relation intensity as the initial community and extend the community with nodes of higher belong degree. The algorithm achieves a rapid and efficient overlapping community detection method by maxing the modularity of community continuously. The experiments prove that MMC is effective for uncovering overlapping communities and it achieves better performance than COPRA and Conductance.

  18. Larval habitat choice in still water and flume flows by the opportunistic bivalve Mulinia lateralis

    Grassle, Judith P.; Snelgrove, Paul V. R.; Butman, Cheryl Ann

    Competent pediveligers of the coot clam Mulinia lateralis (Say) clearly preferred an organically-rich mud over abiotic glass beads in 24-h flume experiments, and often demonstrated the same choice in still-water experiments. We hypothesize that peediveligers with characteristic helical swimming paths above the bottom can exercise habitat choice in both still water nad flow, but that the limited swimming ambits of physiologically older periveligers require near-bottom flows to move the larvae between sediment patches so that they can exercise habitat choice. Although M. lateralis larvae are planktotrophic, their ability to delay metamorphosis in the absence of a preferred sediment cue is limited to about five days, a shorter time than the lecithotrophi larvae of the opportunistic polychaete species, Capitella spp. I and II. Field distributions of all three opportunistic species may result, at least in part, from active habitat selection for high-organic sediments by settling larvae.

  19. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  20. A non-digging zoobenthivorous fish attracts two opportunistic predatory fish associates

    Cristina Sazima

    Full Text Available Following behaviour among reef fishes involves mostly a digging nuclear species while foraging, which attracts opportunistic followers preying on the exposed organisms. The flying gurnard Dactylopterus volitans preys on benthic animals, mostly crustaceans and small fishes, scratching and probing the bottom with the inner rays of its pectoral fins. We recorded the flying gurnard being followed by two opportunistic predators, the yellow jack Caranx bartholomaei and the coney Cephalopholis fulva at Fernando de Noronha, off northeast Brazil. Albeit not actually digging the substrate, the flying gurnard acts as a nuclear species by exploring algae tufts and by its wandering near the boulders and ledges, disturbing and flushing out hidden animals which thus become available to predation.

  1. EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network

    Halikul Lenando

    2018-01-01

    Full Text Available In opportunistic networks, the nature of intermittent and disruptive connections degrades the efficiency of routing. Epidemic routing protocol is used as a benchmark for most of routing protocols in opportunistic mobile social networks (OMSNs due to its high message delivery and latency. However, Epidemic incurs high cost in terms of overhead and hop count. In this paper, we propose a hybrid routing protocol called EpSoc which utilizes the Epidemic routing forwarding strategy and exploits an important social feature, that is, degree centrality. Two techniques are used in EpSoc. Messages’ TTL is adjusted based on the degree centrality of nodes, and the message blocking mechanism is used to control replication. Simulation results show that EpSoc increases the delivery ratio and decreases the overhead ratio, the average latency, and the hop counts as compared to Epidemic and Bubble Rap.

  2. Buffer Management and Hybrid Probability Choice Routing for Packet Delivery in Opportunistic Networks

    Daru Pan

    2012-01-01

    Full Text Available Due to the features of long connection delays, frequent network partitions, and topology unsteadiness, the design of opportunistic networks faces the challenge of how to effectively deliver data based only on occasional encountering of nodes, where the conventional routing schemes do not work properly. This paper proposes a hybrid probability choice routing protocol with buffer management for opportunistic networks. A delivery probability function is set up based on continuous encounter duration time, which is used for selecting a better node to relay packets. By combining the buffer management utility and the delivery probability, a total utility is used to decide whether the packet should be kept in the buffer or be directly transmitted to the encountering node. Simulation results show that the proposed routing outperforms the existing one in terms of the delivery rate and the average delay.

  3. Node Load Balance Multi-flow Opportunistic Routing in Wireless Mesh Networks

    Wang Tao

    2014-04-01

    Full Text Available Opportunistic routing (OR has been proposed to improve the performance of wireless networks by exploiting the multi-user diversity and broadcast nature of the wireless medium. It involves multiple candidate forwarders to relay packets every hop. The existing OR doesn’t take account of the traffic load and load balance, therefore some nodes may be overloaded while the others may not, leading to network performance decline. In this paper, we focus on opportunities routing selection with node load balance which is described as a convex optimization problem. To solve the problem, by combining primal-dual and sub-gradient methods, a fully distributed Node load balance Multi-flow Opportunistic Routing algorithm (NMOR is proposed. With node load balance constraint, NMOR allocates the flow rate iteratively and the rate allocation decides the candidate forwarder selection of opportunities routing. The simulation results show that NMOR algorithm improves 100 %, 62 % of the aggregative throughput than ETX and EAX, respectively.

  4. An Opportunistic Routing Mechanism Combined with Long-Term and Short-Term Metrics for WMN

    Weifeng Sun

    2014-01-01

    Full Text Available WMN (wireless mesh network is a useful wireless multihop network with tremendous research value. The routing strategy decides the performance of network and the quality of transmission. A good routing algorithm will use the whole bandwidth of network and assure the quality of service of traffic. Since the routing metric ETX (expected transmission count does not assure good quality of wireless links, to improve the routing performance, an opportunistic routing mechanism combined with long-term and short-term metrics for WMN based on OLSR (optimized link state routing and ETX is proposed in this paper. This mechanism always chooses the highest throughput links to improve the performance of routing over WMN and then reduces the energy consumption of mesh routers. The simulations and analyses show that the opportunistic routing mechanism is better than the mechanism with the metric of ETX.

  5. An opportunistic routing mechanism combined with long-term and short-term metrics for WMN.

    Sun, Weifeng; Wang, Haotian; Piao, Xianglan; Qiu, Tie

    2014-01-01

    WMN (wireless mesh network) is a useful wireless multihop network with tremendous research value. The routing strategy decides the performance of network and the quality of transmission. A good routing algorithm will use the whole bandwidth of network and assure the quality of service of traffic. Since the routing metric ETX (expected transmission count) does not assure good quality of wireless links, to improve the routing performance, an opportunistic routing mechanism combined with long-term and short-term metrics for WMN based on OLSR (optimized link state routing) and ETX is proposed in this paper. This mechanism always chooses the highest throughput links to improve the performance of routing over WMN and then reduces the energy consumption of mesh routers. The simulations and analyses show that the opportunistic routing mechanism is better than the mechanism with the metric of ETX.

  6. Draft genome sequences of two opportunistic pathogenic strains of Staphylococcus cohnii isolated from human patients.

    Mendoza-Olazarán, Soraya; Garcia-Mazcorro, José F; Morfín-Otero, Rayo; Villarreal-Treviño, Licet; Camacho-Ortiz, Adrián; Rodríguez-Noriega, Eduardo; Bocanegra-Ibarias, Paola; Maldonado-Garza, Héctor J; Dowd, Scot E; Garza-González, Elvira

    2017-01-01

    Herein, we report the draft-genome sequences and annotation of two opportunistic pathogenic strains of Staphylococcus cohnii isolated from humans. One strain (SC-57) was isolated from blood from a male patient in May 2006 and the other (SC-532) from a catheter from a male patient in June 2006. Similar to other genomes of Staphylococcus species, most genes (42%) of both strains are involved in metabolism of amino acids and derivatives, carbohydrates and proteins. Eighty (4%) genes are involved in virulence, disease, and defense and both species show phenotypic low biofilm production and evidence of increased antibiotic resistance associated to biofilm production. From both isolates, a new Staphylococcal Cassette Chromosome mec was detected: mec class A, ccr type 1. This is the first report of whole genome sequences of opportunistic S. cohnii isolated from human patients.

  7. Improving Network Performance with Affinity based Mobility Model in Opportunistic Network

    Suvadip Batabyal; Parama Bhaumik

    2012-01-01

    Opportunistic network is a type of Delay Tolerant Network which is characterized by intermittent connectivity amongst the nodes and communication largely depends upon the mobility of the participating nodes. The network being highly dynamic, traditional MANET protocols cannot be applied and the nodes must adhere to store-carry-forward mechanism. Nodes do not have the information about the network topology, number of participating nodes and the location of the destination node. Hence, message ...

  8. Effective but costly, evolved mechanisms of defense against a virulent opportunistic pathogen in Drosophila melanogaster.

    Yixin H Ye; Stephen F Chenoweth; Elizabeth A McGraw

    2009-01-01

    Drosophila harbor substantial genetic variation for antibacterial defense, and investment in immunity is thought to involve a costly trade-off with life history traits, including development, life span, and reproduction. To understand the way in which insects invest in fighting bacterial infection, we selected for survival following systemic infection with the opportunistic pathogen Pseudomonas aeruginosa in wild-caught Drosophila melanogaster over 10 generations. We then examined genome-wide...

  9. Opportunistic Beamforming with Wireless Powered 1-bit Feedback Through Rectenna Array

    Krikidis, Ioannis

    2015-01-01

    This letter deals with the opportunistic beamforming (OBF) scheme for multi-antenna downlink with spatial randomness. In contrast to conventional OBF, the terminals return only 1-bit feedback, which is powered by wireless power transfer through a rectenna array. We study two fundamental topologies for the combination of the rectenna elements; the direct-current combiner and the radio-frequency combiner. The beam outage probability is derived in closed form for both combination schemes, by usi...

  10. The Opportunistic Pathogen Serratia marcescens Utilizes Type VI Secretion To Target Bacterial Competitors ▿†

    Murdoch, Sarah L.; Trunk, Katharina; English, Grant; Fritsch, Maximilian J.; Pourkarimi, Ehsan; Coulthurst, Sarah J.

    2011-01-01

    The type VI secretion system (T6SS) is the most recently described and least understood of the protein secretion systems of Gram-negative bacteria. It is widely distributed and has been implicated in the virulence of various pathogens, but its mechanism and exact mode of action remain to be defined. Additionally there have been several very recent reports that some T6SSs can target bacteria rather than eukaryotic cells. Serratia marcescens is an opportunistic enteric pathogen, a class of bacteria responsible for a significant proportion of hospital-acquired infections. We describe the identification of a functional T6SS in S. marcescens strain Db10, the first report of type VI secretion by an opportunist enteric bacterium. The T6SS of S. marcescens Db10 is active, with secretion of Hcp to the culture medium readily detected, and is expressed constitutively under normal growth conditions from a large transcriptional unit. Expression of the T6SS genes did not appear to be dependent on the integrity of the T6SS. The S. marcescens Db10 T6SS is not required for virulence in three nonmammalian virulence models. It does, however, exhibit dramatic antibacterial killing activity against several other bacterial species and is required for S. marcescens to persist in a mixed culture with another opportunist pathogen, Enterobacter cloacae. Importantly, this antibacterial killing activity is highly strain specific, with the S. marcescens Db10 T6SS being highly effective against another strain of S. marcescens with a very similar and active T6SS. We conclude that type VI secretion plays a crucial role in the competitiveness, and thus indirectly the virulence, of S. marcescens and other opportunistic bacterial pathogens. PMID:21890705

  11. Opportunistic Infections and Complications in Human Immunodeficiency Virus-1-Infected Children: Correlation with immune status

    Jaivinder Yadav

    2014-10-01

    Full Text Available Objectives: The aim of this study was to ascertain the correlation between various opportunistic infections and complications in human immunodeficiency virus (HIV-1-infected children and the immune status of these patients, evaluated by absolute cluster of differentiation 4 (CD4 count and CD4 percentage. Methods: This study was conducted from January 2009 to June 2010 at the Antiretroviral Treatment Centre of the Pt. B.D. Sharma Post Graduate Institute of Medical Sciences, a tertiary care hospital in Rohtak, Haryana, in northern India. A total of 20 HIV-1-infected children aged 4–57 months were studied. Demographic and baseline investigations were performed prior to the start of highly active antiretroviral therapy (HAART. A fixed-dose combination of HAART was given based on the patient’s weight. Baseline investigations were repeated after six months of HAART. Results: There was a significant increase in the patients’ haemoglobin, weight, height and CD4 count after six months of HAART. Significant improvements (P <0.05 were also noted in the patients’ immune status, graded according to the World Health Organization. Conclusion: This study observed that the severity and frequency of opportunistic complications in paediatric patients with HIV-1 increased with a fall in the CD4 count. The treatment of opportunistic infections, along with antiretroviral therapy, may lead to both clinical and immunological recovery as well as a decreased incidence of future opportunistic infections. The CD4 count may give treating physicians an initial idea about the immune status of each child and could also be used as a biological marker of HAART efficacy. Patient compliance must be ensured during HAART as this is a key factor in improving outcomes.

  12. A Preemptive Link State Spanning Tree Source Routing Scheme for Opportunistic Data Forwarding in MANET

    R. Poonkuzhali; M. Y. Sanavullah; A. Sabari

    2014-01-01

    Opportunistic Data Forwarding (ODF) has drawn much attention in mobile adhoc networking research in recent years. The effectiveness of ODF in MANET depends on a suitable routing protocol which provides a powerful source routing services. PLSR is featured by source routing, loop free and small routing overhead. The update messages in PLSR are integrated into a tree structure and no need to time stamp routing updates which reduces the routing overhead.

  13. DIRECTIONAL OPPORTUNISTIC MECHANISM IN CLUSTER MESSAGE CRITICALITY LEVEL BASED ZIGBEE ROUTING

    B.Rajeshkanna *1, Dr.M.Anitha 2

    2018-01-01

    The cluster message criticality level based zigbee routing(CMCLZOR) has been proposed for routing the cluster messages in wireless smart energy home area networks. It employs zigbee opportunistic shortcut tree routing(ZOSTR) and AODV individually for routing normal messages and highly critical messages respectively. ZOSTR allows the receiving nodes to compete for forwarding a packet with the priority of left-over hops rather than stating single next hop node like unicast protocols. Since it h...

  14. Draft genome sequences of two opportunistic pathogenic strains of Staphylococcus cohnii isolated from human patients

    Mendoza-Olazar?n, Soraya; Garcia-Mazcorro, Jos? F.; Morf?n-Otero, Rayo; Villarreal-Trevi?o, Licet; Camacho-Ortiz, Adri?n; Rodr?guez-Noriega, Eduardo; Bocanegra-Ibarias, Paola; Maldonado-Garza, H?ctor J.; Dowd, Scot E.; Garza-Gonz?lez, Elvira

    2017-01-01

    Herein, we report the draft-genome sequences and annotation of two opportunistic pathogenic strains of Staphylococcus cohnii isolated from humans. One strain (SC-57) was isolated from blood from a male patient in May 2006 and the other (SC-532) from a catheter from a male patient in June 2006. Similar to other genomes of Staphylococcus species, most genes (42%) of both strains are involved in metabolism of amino acids and derivatives, carbohydrates and proteins. Eighty (4%) genes are involved...

  15. Reduced feedback opportunistic and layered random beamforming for MIMO-OFDMA systems

    Han, C; Nicolaou, M; Doufexi, A; Armour, SMD

    2007-01-01

    This paper considers a number of techniques employed in opportunistic and layered random beamforming OFDMA schemes that aim to reduce the feedback required to perform scheduling whilst also minimising the throughput degradations resulting from this reduced throughput (due to the lack of full CSI at the Base Station (BS). Frequency response correlation among subcarriers can be exploited to group adjacent subcarriers into clusters which can then be treated as a single unit for feedback purposes...

  16. Towards dynamic spectrum access and 5G, via television white spaces

    Lysko, Albert A

    2017-05-01

    Full Text Available allocations towards sharing the spectrum between different technologies in a dynamic fashion. The key focus will be on the developments in television white space and geolocation spectrum database methods and technologies, with mention of parallels to LTE....

  17. Opportunistic maintenance considering non-homogenous opportunity arrivals and stochastic opportunity durations

    Truong Ba, H.; Cholette, M.E.; Borghesani, P.; Zhou, Y.; Ma, L.

    2017-01-01

    Many systems and manufacturing processes undergo intermittent operation due to external factors (e.g. weather, low market prices), offering opportunities to conduct maintenance with reduced production losses. Making use of appropriate opportunities can thus lead to significant reduction in the total cost of maintenance and improvement in productivity. In this paper, an opportunistic maintenance (OM) model is developed considering two critical properties of real world opportunities: (i) non-homogeneous opportunity arrivals and (ii) stochastic opportunity duration. The model enables exploiting downtime cost savings from “partial” opportunities (stops shorter than the required maintenance time) thus extending the potential benefit of OM. The criteria for accepting maintenance opportunities are found by minimizing the single-cycle total cost. A closed form expression of the single-cycle total cost is derived for a given PM/OM policy and then a Genetic Algorithm is used to solve the optimization problem. Numerical results are presented to assess the benefit of opportunistic maintenance and the marginal benefit of considering partial opportunities. Results indicate that significant savings can be achieved by considering OM. Moreover, it is shown that the novel consideration of partial opportunities significantly increase the benefit of OM. - Highlights: • Opportunistic and time-based preventive maintenance jointly optimized. • Non-homogeneous opportunity arrivals and stochastic durations considered. • “Partial” opportunities considered for the first time. • Opportunity duration thresholds used as a decision criterion. • Numerical study conducted to evaluate benefit of optimized policy.

  18. Opportunistic Carrier Sensing for Energy-Efficient Information Retrieval in Sensor Networks

    Zhao Qing

    2005-01-01

    Full Text Available We consider distributed information retrieval for sensor networks with cluster heads or mobile access points. The performance metric used in the design is energy efficiency defined as the ratio of the average number of bits reliably retrieved by the access point to the total amount of energy consumed. A distributed opportunistic transmission protocol is proposed using a combination of carrier sensing and backoff strategy that incorporates channel state information (CSI of individual sensors. By selecting a set of sensors with the best channel states to transmit, the proposed protocol achieves the upper bound on energy efficiency when the signal propagation delay is negligible. For networks with substantial propagation delays, a backoff function optimized for energy efficiency is proposed. The design of this backoff function utilizes properties of extreme statistics and is shown to have mild performance loss in practical scenarios. We also demonstrate that opportunistic strategies that use CSI may not be optimal when channel acquisition at individual sensors consumes substantial energy. We show further that there is an optimal sensor density for which the opportunistic information retrieval is the most energy efficient. This observation leads to the design of the optimal sensor duty cycle.

  19. Asymmetric competition prevents the outbreak of an opportunistic species after coral reef degradation.

    González-Rivero, Manuel; Bozec, Yves-Marie; Chollett, Iliana; Ferrari, Renata; Schönberg, Christine H L; Mumby, Peter J

    2016-05-01

    Disturbance releases space and allows the growth of opportunistic species, excluded by the old stands, with a potential to alter community dynamics. In coral reefs, abundances of fast-growing, and disturbance-tolerant sponges are expected to increase and dominate as space becomes available following acute coral mortality events. Yet, an increase in abundance of these opportunistic species has been reported in only a few studies, suggesting certain mechanisms may be acting to regulate sponge populations. To gain insights into mechanisms of population control, we simulated the dynamics of the common reef-excavating sponge Cliona tenuis in the Caribbean using an individual-based model. An orthogonal hypothesis testing approach was used, where four candidate mechanisms-algal competition, stock-recruitment limitation, whole and partial mortality-were incorporated sequentially into the model and the results were tested against independent field observations taken over a decade in Belize, Central America. We found that releasing space after coral mortality can promote C. tenuis outbreaks, but such outbreaks can be curtailed by macroalgal competition. The asymmetrical competitive superiority of macroalgae, given by their capacity to pre-empt space and outcompete with the sponge in a size-dependant fashion, supports their capacity to steal the opportunity from other opportunists. While multiple system stages can be expected in coral reefs following intense perturbation macroalgae may prevent the growth of other space-occupiers, such as bioeroding sponges, under low grazing pressure.

  20. Interactions between the tropical sea anemone Aiptasia pallida and Serratia marcescens, an opportunistic pathogen of corals.

    Krediet, Cory J; Meyer, Julie L; Gimbrone, Nicholas; Yanong, Roy; Berzins, Ilze; Alagely, Ali; Castro, Herman; Ritchie, Kim B; Paul, Valerie J; Teplitski, Max

    2014-06-01

    Coral reefs are under increasing stress caused by global and local environmental changes, which are thought to increase the susceptibility of corals to opportunistic pathogens. In the absence of an easily culturable model animal, the understanding of the mechanisms of disease progression in corals remains fairly limited. In the present study, we tested the susceptibility of the tropical sea anemone Aiptasia pallida to an opportunistic coral pathogen (Serratia marcescens). A. pallida was susceptible to S. marcescens PDL100 and responded to this opportunistic coral pathogen with darkening of the tissues and retraction of tentacles, followed by complete disintegration of polyp tissues. Histological observations revealed loss of zooxanthellae and structural changes in eosinophilic granular cells in response to pathogen infection. A screen of S. marcescens mutants identified a motility and tetrathionate reductase mutants as defective in virulence in the A. pallida infection model. In co-infections with the wild-type strain, the tetrathionate reductase mutant was less fit within the surface mucopolysaccharide layer of the host coral Acropora palmata. © 2014 Society for Applied Microbiology and John Wiley & Sons Ltd.

  1. Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication

    Tong Wang

    2017-01-01

    Full Text Available In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G mobile communication networks, among which device-to-device (D2D communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.

  2. Location Prediction-Based Data Dissemination Using Swarm Intelligence in Opportunistic Cognitive Networks

    Jie Li

    2014-01-01

    Full Text Available Swarm intelligence is widely used in the application of communication networks. In this paper we adopt a biologically inspired strategy to investigate the data dissemination problem in the opportunistic cognitive networks (OCNs. We model the system as a centralized and distributed hybrid system including a location prediction server and a pervasive environment deploying the large-scale human-centric devices. To exploit such environment, data gathering and dissemination are fundamentally based on the contact opportunities. To tackle the lack of contemporaneous end-to-end connectivity in opportunistic networks, we apply ant colony optimization as a cognitive heuristic technology to formulate a self-adaptive dissemination-based routing scheme in opportunistic cognitive networks. This routing strategy has attempted to find the most appropriate nodes conveying messages to the destination node based on the location prediction information and intimacy between nodes, which uses the online unsupervised learning on geographical locations and the biologically inspired algorithm on the relationship of nodes to estimate the delivery probability. Extensive simulation is carried out on the real-world traces to evaluate the accuracy of the location prediction and the proposed scheme in terms of transmission cost, delivery ratio, average hops, and delivery latency, which achieves better routing performances compared to the typical routing schemes in OCNs.

  3. Job sharing. Part 1.

    Anderson, K; Forbes, R

    1989-01-01

    This article is the first of a three part series discussing the impact of nurses job sharing at University Hospital, London, Ontario. This first article explores the advantages and disadvantages of job sharing for staff nurses and their supervising nurse manager, as discussed in the literature. The results of a survey conducted on a unit with a large number of job sharing positions, concur with literature findings. The second article will present the evaluation of a pilot project in which two nurses job share a first line managerial position in the Operating Room. The third article will relate the effects of job sharing on women's perceived general well being. Job sharing in all areas, is regarded as a positive experience by both nurse and administrators.

  4. The Sharing Economy

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders

    2015-01-01

    The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not know...... much about it. With the abundant enthusiasm about the benefits that the sharing economy can unleash and the weekly reminders about its dark side, further examination is required to determine the potential of the sharing economy while mitigating its undesirable side effects. The panel will join...... the ongoing debate about the sharing economy and contribute to the discourse with insights about how digital technologies are critical in shaping this turbulent ecosystem. Furthermore, we will define an agenda for future research on the sharing economy as it becomes part of the mainstream society as well...

  5. Probabilistic Infinite Secret Sharing

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  6. BBSRC Data Sharing Policy

    Amanda Collis; David McAllister; Michael Ball

    2011-01-01

    BBSRC recognizes the importance of contributing to the growing international efforts in data sharing. BBSRC is committed to getting the best value for the funds we invest and believes that making research data more readily available will reinforce open scientific inquiry and stimulate new investigations and analyses. BBSRC supports the view that data sharing should be led by the scientific community and driven by scientific need. It should also be cost effective and the data shared should be ...

  7. Factors Impacting Knowledge Sharing

    Schulzmann, David; Slepniov, Dmitrij

    The purpose of this paper is to examine various factors affecting knowledge sharing at the R&D center of a Western MNE in China. The paper employs qualitative methodology and is based on the action research and case study research techniques. The findings of the paper advance our understanding...... about factors that affect knowledge sharing. The main emphasis is given to the discussion on how to improve knowledge sharing in global R&D organizations....

  8. Regulating the sharing economy

    Erickson, Kristofer; Sorensen, Inge

    2016-01-01

    In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian) and economic (allocative, profit-seeking) aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions). This definition of the sharing economy distinguishe...

  9. Phenomenology of experiential sharing

    León, Felipe; Zahavi, Dan

    2016-01-01

    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended to be overl......The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended...

  10. A Data Sharing Story

    Mercè Crosas

    2012-01-01

    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  11. Share your sweets

    Byrnit, Jill; Høgh-Olesen, Henrik; Makransky, Guido

    2015-01-01

    study to examine the sharing behavior of groups of captive chimpanzees and bonobos when introducing the same type of food (branches) manipulated to be of two different degrees of desirability (with or without syrup). Results showed that, the large majority of food transfers in both species came about...... as sharing in which group members were allowed to co-feed or remove food from the stock of the food possessor, and the introduction of high-value food resulted in more sharing, not less. Food sharing behavior differed between species in that chimpanzees displayed significantly more begging behavior than...

  12. In vitro studies on oxidative stress-independent, Ag nanoparticles-induced cell toxicity of Candida albicans, an opportunistic pathogen

    Radhakrishnan VS

    2018-03-01

    Full Text Available Venkatraman Srinivasan Radhakrishnan,1 Surya Prakash Dwivedi,2 Mohammed Haris Siddiqui,3 Tulika Prasad1 1Advanced Instrumentation Research Facility (AIRF, Jawaharlal Nehru University, New Delhi, 2School of Biotechnology, IFTM University, Moradabad, 3Department of Bioengineering, Integral University, Lucknow, Uttar Pradesh, India Abstract: Silver nanoparticles (AgNps have attracted maximal attention among all metal nanoparticles, and the study of their biological properties has gained impetus for further medical adoption. This study evaluated the cellular and molecular mechanisms associated with the action of AgNps against an opportunistic pathogen, Candida albicans. Spherical, stable AgNp (average size 21.6 nm prepared by a chemical reduction method showed minimum inhibitory concentration (required to inhibit the growth of 90% of organisms at 40 µg/mL. AgNps have been reported to induce oxidative stress-mediated programmed cell death through the accumulation of intracellular reactive oxygen species (ROS. However, this study demonstrated that intracellular levels of AgNp-induced ROS could be reversed by using antioxidant ascorbic acid, but the sensitivity of AgNp-treated Candida cells could not be completely reversed. Moreover, in addition to the generation of ROS, the AgNps were found to affect other cellular targets resulting in altered membrane fluidity, membrane microenvironment, ergosterol content, cellular morphology, and ultrastructure. Thus, the generation of ROS does not seem to be the sole major cause of AgNp-mediated cell toxicity in Candida. Rather, the multitargeted action of AgNps, generation of ROS, alterations in ergosterol content, and membrane fluidity together seem to have potentiated anti-Candida action. Thus, this “nano-based drug therapy” is likely to favor broad-spectrum activity, multiple cellular targets, and minimum host toxicity. AgNps, therefore, appear to have the potential to address the challenges in multidrug

  13. Security-Reliability Trade-Off Analysis for Multiuser SIMO Mixed RF/FSO Relay Networks With Opportunistic User Scheduling

    El-Malek, Ahmed H. Abd; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we study the performance of multiuser single-input multiple-output mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling. The considered system includes multiple users, one amplify

  14. Activation and coagulation biomarkers are independent predictors of the development of opportunistic disease in patients with HIV infection

    Rodger, Alison J; Fox, Zoe; Lundgren, Jens

    2009-01-01

    BACKGROUND: Activation and coagulation biomarkers were measured within the Strategies for Management of Antiretroviral Therapy (SMART) trial. Their associations with opportunistic disease (OD) in human immunodeficiency virus (HIV)-positive patients were examined. METHODS: Inflammatory (high-sensi...

  15. Position statement on opportunistic genomic screening from the Association of Genetic Nurses and Counsellors (UK and Ireland)

    Middleton, Anna; Patch, Chris; Wiggins, Jennifer; Barnes, Kathy; Crawford, Gill; Benjamin, Caroline; Bruce, Anita

    2014-01-01

    The American College of Medical Genetics and Genomics released recommendations for reporting incidental findings (IFs) in clinical exome and genome sequencing. These suggest ‘opportunistic genomic screening' should be available to both adults and children each time a sequence is done and would be undertaken without seeking preferences from the patient first. Should opportunistic genomic screening be implemented in the United Kingdom, the Association of Genetic Nurses and Counsellors (AGNC), w...

  16. Opportunistic Infections

    ... Español El VIH es una amenaza de salud grave para las comunidades latinas, quienes se encuentran en gran desventaja respecto de la incidencia de esta enfermedad en los Estados Unidos. Según los CDC, en ...

  17. opportunistic pathogens

    Elham Rezazadeh

    2016-09-01

    (n=20; 13.3 %, C. krusei (n=12; 8 %, C. parapsilosis (n=11; 7.3 %. Out of 67 C. albicans species, 6 species identified as C. dubliniensis and 4 species identified as C. africana. Conclusion: High frequency of non-albicans Candida species and differences in levels of susceptibility to the antifungal agents are important issues in medicine .Therefore, to manage the Candida-related infections properly, molecular diagnostic methods would be fast, reliable and even cost-effective approaches for identification of Candida species.

  18. Opportunistic infections

    Winnie

    2006-09-01

    Sep 1, 2006 ... Antiretroviral (ARV) drugs have been shown to be effective in both ... that prophylactic CTX is cost-effective in a developing world ..... Anglaret X, Toure S, Ouassa T, Dabis F, N'Dri-Yoman T. Thresholds of CD4 cells for.

  19. Millennials and the Sharing Economy

    Ranzini, Giulia; Newlands, Gemma; Anselmi, Guido

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy......Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy...

  20. Mobile energy sharing futures

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez

    2016-01-01

    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... sharing futures....

  1. NCSU Reactor Sharing Program

    Perez, P.B.

    1993-01-01

    The Nuclear Reactor Program at North Carolina State University provides the PULSTAR Research Reactor and associated facilities to eligible institutions with support, in part, from the Department of Energy Reactor Sharing Program. Participation in the NCSU Reactor Sharing Program continues to increase steadily with visitors ranging from advance high school physics and chemistry students to Ph.D. level research from neighboring universities

  2. 'An Arena for Sharing'

    la Cour, Karen; Ledderer, Loni; Hansen, Helle Ploug

    2015-01-01

    relatives). In-depth interviews were conducted in the participants' homes 1 month after the rehabilitation course. Data were analyzed by a constant comparative method. Results: Residential rehabilitation course was identified to serve as an "arena for sharing," underpinned by 3 dimensions of sharing...

  3. Exploring the Sharing Economy

    Netter, Sarah

    Despite the growing interest on the part of proponents and opponents - ranging from business, civil society, media, to policy-makers alike - there is still limited knowledge about the working mechanisms of the sharing economy. The thesis is dedicated to explore this understudied phenomenon...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked......-level tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...

  4. Sharing Rare Attitudes Attracts.

    Alves, Hans

    2018-04-01

    People like others who share their attitudes. Online dating platforms as well as other social media platforms regularly rely on the social bonding power of their users' shared attitudes. However, little is known about moderating variables. In the present work, I argue that sharing rare compared with sharing common attitudes should evoke stronger interpersonal attraction among people. In five studies, I tested this prediction for the case of shared interests from different domains. I found converging evidence that people's rare compared with their common interests are especially potent to elicit interpersonal attraction. I discuss the current framework's theoretical implications for impression formation and impression management as well as its practical implications for improving online dating services.

  5. Spectrum estimation method based on marginal spectrum

    Cai Jianhua; Hu Weiwen; Wang Xianchun

    2011-01-01

    FFT method can not meet the basic requirements of power spectrum for non-stationary signal and short signal. A new spectrum estimation method based on marginal spectrum from Hilbert-Huang transform (HHT) was proposed. The procession of obtaining marginal spectrum in HHT method was given and the linear property of marginal spectrum was demonstrated. Compared with the FFT method, the physical meaning and the frequency resolution of marginal spectrum were further analyzed. Then the Hilbert spectrum estimation algorithm was discussed in detail, and the simulation results were given at last. The theory and simulation shows that under the condition of short data signal and non-stationary signal, the frequency resolution and estimation precision of HHT method is better than that of FFT method. (authors)

  6. Chimpanzees share forbidden fruit.

    Kimberley J Hockings

    2007-09-01

    Full Text Available The sharing of wild plant foods is infrequent in chimpanzees, but in chimpanzee communities that engage in hunting, meat is frequently used as a 'social tool' for nurturing alliances and social bonds. Here we report the only recorded example of regular sharing of plant foods by unrelated, non-provisioned wild chimpanzees, and the contexts in which these sharing behaviours occur. From direct observations, adult chimpanzees at Bossou (Republic of Guinea, West Africa very rarely transferred wild plant foods. In contrast, they shared cultivated plant foods much more frequently (58 out of 59 food sharing events. Sharing primarily consists of adult males allowing reproductively cycling females to take food that they possess. We propose that hypotheses focussing on 'food-for-sex and -grooming' and 'showing-off' strategies plausibly account for observed sharing behaviours. A changing human-dominated landscape presents chimpanzees with fresh challenges, and our observations suggest that crop-raiding provides adult male chimpanzees at Bossou with highly desirable food commodities that may be traded for other currencies.

  7. Economic aspects of spectrum management

    Stibolt, R. D.

    1979-01-01

    Problems associated with the allocation of the radio frequency spectrum are addressed. It is observed that the current method very likely does not allocate the resource to those most valuing its use. Ecomonic criteria by which the effectiveness of resource allocation schemes can be judged are set forth and some thoughts on traditional objections to implementation of market characteristics into frequency allocation are offered. The problem of dividing orbit and spectrum between two satellite services sharing the same band but having significantly different system characteristics is discussed. The problem is compounded by the likelihood that one service will commence operation much sooner than the other. Some alternative schemes are offered that, within proper international constraints, could achieve a desired flexibility in the division of orbit and frequency between the two services domestically over the next several years.

  8. Sharing the dance -

    He, Jing; Ravn, Susanne

    2018-01-01

    In his recent works on daily face-to-face encounters, Zahavi claims that the phenomenon of sharing involves reciprocity. Following Zahavi’s line of thought, we wonder what exactly reciprocity amounts to and how the shared experience emerges from the dynamic process of interaction. By turning...... to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together...

  9. Global resource sharing

    Frederiksen, Linda; Nance, Heidi

    2011-01-01

    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  10. Report endorses data sharing

    The potential benefits of sharing data so outweigh its costs that investigators should be required to include plans for sharing data as part of their grant proposals, according to recommendations issued recently by the Committee on National Statistics (CNSTAT) of the National Research Council (NRC).In their report Sharing Research Data, CNSTAT also recommended that “Journals should give more emphasis to reports of secondary analyses and to replications,” provided that the original collections of data receive full credit. In addition, “Journal editors should require authors to provide access to data during the peer review process.”

  11. PERFORMANCE OPTIMIZATION OF COGNITIVE RADIO WITH WIDEBAND SPECTRUM SENSING

    E. Saraniya

    2014-09-01

    Full Text Available Cognitive radio (CR technology allows the unlicensed user to access the licensed spectrum bands. Spectrum sensing is an essential function in cognitive radio to detect the spectrum holes and opportunistically use the underutilized frequency bands without causing interference to primary user (PU. In this paper we are maximizing the throughput capacity of cognitive radio user and hence the performance of spectrum sensing and protection to licensed user improves over a wideband spectrum sensing band. The simulation of cognitive radio is done by analyzing the performance of energy detector spectrum sensing technique to detect primary user and to formulate the optimization using multiband joint detection method (MJD to achieve suitable trade- off between secondary user access and primary user network. The main aim of this paper is to maximize the probability of detection and to decrease the probabilities of miss detection and false alarm. To maximize the throughput it requires minimizing the throughput loss caused by miss detection and the significant reduction in probability of false alarm helps in achieving the spectral efficiency from the secondary user’s perspective. The simulation results show that the performance increases with the MJD method.

  12. Barriers and facilitators to opportunistic chronic kidney disease screening by general practice nurses.

    Sinclair, Peter M; Day, Jenny; Levett-Jones, Tracy; Kable, Ashley

    2017-10-01

    Opportunistic screening in general practice (GP) is a cost-effective and viable approach to the early identification of chronic kidney disease (CKD). This study sought to identify the barriers and facilitators to CKD screening practices of GP nurses working in a regional area of New South Wales, Australia. An eight-item elicitation questionnaire informed by the Theory of Planned Behaviour was administered to a convenience sample of 26 GP nurses. Participants identified that the advantages of CKD screening were its early detection and treatment, the reduction of disease burden, and the opportunity to increase awareness and provide disease prevention education. These positive attitudinal beliefs were offset by negative beliefs about the impost of opportunistic screening on nursing time, particularly when there were other competing clinical priorities. Participants reported that practice doctors were wary of the financial costs associated with additional non-claimable services and believed that unfunded services, regardless of patient benefit, were difficult to justify in a private business environment. Screening was enabled in GP settings with existing screening protocols or initiatives, and when patients presented with known risk factors. Barriers to screening were more frequently described and illustrated a strong focus on financial aspects of GP. Without reimbursement through the Medicare Benefits Scheme, screening was not considered an economical use of nursing time. Other competing and billable clinical services took precedence. The findings of this study can be used to inform the development and evaluation of interventions that target opportunistic CKD screening in the GP setting. © 2016 Asian Pacific Society of Nephrology.

  13. Anthropogenic disturbance can determine the magnitude of opportunistic species responses on marine urban infrastructures.

    Airoldi, Laura; Bulleri, Fabio

    2011-01-01

    Coastal landscapes are being transformed as a consequence of the increasing demand for infrastructures to sustain residential, commercial and tourist activities. Thus, intertidal and shallow marine habitats are largely being replaced by a variety of artificial substrata (e.g. breakwaters, seawalls, jetties). Understanding the ecological functioning of these artificial habitats is key to planning their design and management, in order to minimise their impacts and to improve their potential to contribute to marine biodiversity and ecosystem functioning. Nonetheless, little effort has been made to assess the role of human disturbances in shaping the structure of assemblages on marine artificial infrastructures. We tested the hypothesis that some negative impacts associated with the expansion of opportunistic and invasive species on urban infrastructures can be related to the severe human disturbances that are typical of these environments, such as those from maintenance and renovation works. Maintenance caused a marked decrease in the cover of dominant space occupiers, such as mussels and oysters, and a significant enhancement of opportunistic and invasive forms, such as biofilm and macroalgae. These effects were particularly pronounced on sheltered substrata compared to exposed substrata. Experimental application of the disturbance in winter reduced the magnitude of the impacts compared to application in spring or summer. We use these results to identify possible management strategies to inform the improvement of the ecological value of artificial marine infrastructures. We demonstrate that some of the impacts of globally expanding marine urban infrastructures, such as those related to the spread of opportunistic, and invasive species could be mitigated through ecologically-driven planning and management of long-term maintenance of these structures. Impact mitigation is a possible outcome of policies that consider the ecological features of built infrastructures and

  14. Anthropogenic disturbance can determine the magnitude of opportunistic species responses on marine urban infrastructures.

    Laura Airoldi

    Full Text Available BACKGROUND: Coastal landscapes are being transformed as a consequence of the increasing demand for infrastructures to sustain residential, commercial and tourist activities. Thus, intertidal and shallow marine habitats are largely being replaced by a variety of artificial substrata (e.g. breakwaters, seawalls, jetties. Understanding the ecological functioning of these artificial habitats is key to planning their design and management, in order to minimise their impacts and to improve their potential to contribute to marine biodiversity and ecosystem functioning. Nonetheless, little effort has been made to assess the role of human disturbances in shaping the structure of assemblages on marine artificial infrastructures. We tested the hypothesis that some negative impacts associated with the expansion of opportunistic and invasive species on urban infrastructures can be related to the severe human disturbances that are typical of these environments, such as those from maintenance and renovation works. METHODOLOGY/PRINCIPAL FINDINGS: Maintenance caused a marked decrease in the cover of dominant space occupiers, such as mussels and oysters, and a significant enhancement of opportunistic and invasive forms, such as biofilm and macroalgae. These effects were particularly pronounced on sheltered substrata compared to exposed substrata. Experimental application of the disturbance in winter reduced the magnitude of the impacts compared to application in spring or summer. We use these results to identify possible management strategies to inform the improvement of the ecological value of artificial marine infrastructures. CONCLUSIONS/SIGNIFICANCE: We demonstrate that some of the impacts of globally expanding marine urban infrastructures, such as those related to the spread of opportunistic, and invasive species could be mitigated through ecologically-driven planning and management of long-term maintenance of these structures. Impact mitigation is a

  15. Regrowth of potential opportunistic pathogens and algae in reclaimed-water distribution systems.

    Jjemba, Patrick K; Weinrich, Lauren A; Cheng, Wei; Giraldo, Eugenio; Lechevallier, Mark W

    2010-07-01

    A study of the quality of reclaimed water in treated effluent, after storage, and at three points in the distribution system of four plants in California, Florida, Massachusetts, and New York was conducted for 1 year. The plants had different treatment processes (conventional versus membrane bioreactor), production capacities, and methods for storage of the water, and the intended end uses of the water were different. The analysis focused on the occurrence of indicator bacteria (heterotrophic bacteria, coliforms, Escherichia coli, and enterococci) and opportunistic pathogens (Aeromonas spp., enteropathogenic E. coli O157:H7, Legionella spp., Mycobacterium spp., and Pseudomonas spp.), as well as algae. Using immunological methods, E. coli O157:H7 was detected in the effluent of only one system, but it was not detected at the sampling points, suggesting that its survival in the system was poor. Although all of the treatment systems effectively reduced the levels of bacteria in the effluent, bacteria regrew in the reservoir and distribution systems because of the loss of residual disinfectant and high assimilable organic carbon levels. In the systems with open reservoirs, algal growth reduced the water quality by increasing the turbidity and accumulating at the end of the distribution system. Opportunistic pathogens, notably Aeromonas, Legionella, Mycobacterium, and Pseudomonas, occurred more frequently than indicator bacteria (enterococci, coliforms, and E. coli). The Mycobacterium spp. were very diverse and occurred most frequently in membrane bioreactor systems, and Mycobacterium cookii was identified more often than the other species. The public health risk associated with these opportunistic pathogens in reclaimed water is unknown. Collectively, our results show the need to develop best management practices for reclaimed water to control bacterial regrowth and degradation of water before it is utilized at the point of use.

  16. Regrowth of Potential Opportunistic Pathogens and Algae in Reclaimed-Water Distribution Systems ▿

    Jjemba, Patrick K.; Weinrich, Lauren A.; Cheng, Wei; Giraldo, Eugenio; LeChevallier, Mark W.

    2010-01-01

    A study of the quality of reclaimed water in treated effluent, after storage, and at three points in the distribution system of four plants in California, Florida, Massachusetts, and New York was conducted for 1 year. The plants had different treatment processes (conventional versus membrane bioreactor), production capacities, and methods for storage of the water, and the intended end uses of the water were different. The analysis focused on the occurrence of indicator bacteria (heterotrophic bacteria, coliforms, Escherichia coli, and enterococci) and opportunistic pathogens (Aeromonas spp., enteropathogenic E. coli O157:H7, Legionella spp., Mycobacterium spp., and Pseudomonas spp.), as well as algae. Using immunological methods, E. coli O157:H7 was detected in the effluent of only one system, but it was not detected at the sampling points, suggesting that its survival in the system was poor. Although all of the treatment systems effectively reduced the levels of bacteria in the effluent, bacteria regrew in the reservoir and distribution systems because of the loss of residual disinfectant and high assimilable organic carbon levels. In the systems with open reservoirs, algal growth reduced the water quality by increasing the turbidity and accumulating at the end of the distribution system. Opportunistic pathogens, notably Aeromonas, Legionella, Mycobacterium, and Pseudomonas, occurred more frequently than indicator bacteria (enterococci, coliforms, and E. coli). The Mycobacterium spp. were very diverse and occurred most frequently in membrane bioreactor systems, and Mycobacterium cookii was identified more often than the other species. The public health risk associated with these opportunistic pathogens in reclaimed water is unknown. Collectively, our results show the need to develop best management practices for reclaimed water to control bacterial regrowth and degradation of water before it is utilized at the point of use. PMID:20453149

  17. Two-user opportunistic scheduling using hierarchical modulations in wireless networks with heterogenous average link gains

    Hossain, Md Jahangir

    2010-03-01

    Our contribution, in this paper, is two-fold. First, we analyze the performance of a hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) scheme, which was proposed by the authors, in a fading environment where different users have different average link gains. Specifically, we present a new expression for the spectral efficiency (SE) of the users and using this expression, we compare the degrees of fairness (DOF) of the TBS scheme with that of classical single user opportunistic scheduling schemes, namely, absolute carrier-to-noise ratio (CNR) based single-best user scheduling (SBS) and normalized CNR based proportional fair scheduling (PFS) schemes. The second contribution is that we propose a new hybrid two-user opportunistic scheduling (HTS) scheme based on our earlier proposed TBS scheme. This HTS scheme selects the first user based on the largest absolute CNR value among all the users while the second user is selected based on the ratios of the absolute CNRs to the corresponding average CNRs of the remaining users. The total transmission rate i.e., the constellation size is selected according to the absolute CNR of the first best user. The total transmission rate is then allocated among these selected users by joint consideration of their absolute CNRs and allocated number of information bit(s) are transmitted to them using hierarchical modulations. Numerical results are presented for a fading environment where different users experience independent but non-identical (i.n.d.) channel fading. These selected numerical results show that the proposed HTS scheme can considerably increase the system\\'s fairness without any degradation of the link spectral efficiency (LSE) i.e., the multiuser diversity gain compared to the classical SBS scheme. These results also show that the proposed HTS scheme has a lower fairness in comparison to the PFS scheme which suffers from a considerable degradation in LSE. © 2010 IEEE.

  18. 47 CFR 27.1307 - Spectrum use in the network.

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Spectrum use in the network. 27.1307 Section 27... network. (a) Spectrum use. The shared wireless broadband network developed by the 700 MHz Public/Private... from the primary public safety operations in the 763-768 MHz and 793-798 MHz bands. The network...

  19. Exact outage analysis of incremental decode-and-forward opportunistic relaying

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2010-01-01

    In this paper, we investigate a dual-hop decode-andforward opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we derive exact closed-form expression for the outage probability based on the exact statistics of each hop. Furthermore, we perform asymptotic analysis and we deduce the diversity order of the scheme. We validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2010 IEEE.

  20. Opportunistic mammography screening provides effective detection rates in a limited resource healthcare system.

    Teh, Yew-Ching; Tan, Gie-Hooi; Taib, Nur Aishah; Rahmat, Kartini; Westerhout, Caroline Judy; Fadzli, Farhana; See, Mee-Hoong; Jamaris, Suniza; Yip, Cheng-Har

    2015-05-15

    Breast cancer is the leading cause of cancer deaths in women world-wide. In low and middle income countries, where there are no population-based mammographic screening programmes, late presentation is common, and because of inadequate access to optimal treatment, survival rates are poor. Mammographic screening is well-studied in high-income countries in western populations, and because it has been shown to reduce breast cancer mortality, it has become part of the healthcare systems in such countries. However the performance of mammographic screening in a developing country is largely unknown. This study aims to evaluate the performance of mammographic screening in Malaysia, a middle income country, and to compare the stage and surgical treatment of screen-detected and symptomatic breast cancer. A retrospective review of 2510 mammograms performed from Jan to Dec 2010 in a tertiary medical centre is carried out. The three groups identified are the routine (opportunistic) screening group, the targeted (high risk) screening group and the diagnostic group. The performance indicators of each group is calculated, and stage at presentation and treatment between the screening and diagnostic group is analyzed. The cancer detection rate in the opportunistic screening group, targeted screening group, and the symptomatic group is 0.5 %, 1.25 % and 26 % respectively. The proportion of ductal carcinoma in situ is 23.1 % in the two screening groups compared to only 2.5 % in the diagnostic group. Among the opportunistic screening group, the cancer detection rate was 0.2 % in women below 50 years old compared to 0.65 % in women 50 years and above. The performance indicators are within international standards. Early-staged breast cancer (Stage 0-2) were 84.6 % in the screening groups compared to 61.1 % in the diagnostic group. From the results, in a setting with resource constraints, targeted screening of high risk individuals will give a higher yield, and if more resources are

  1. Exact outage analysis of incremental decode-and-forward opportunistic relaying

    Tourki, Kamel

    2010-11-01

    In this paper, we investigate a dual-hop decode-andforward opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we derive exact closed-form expression for the outage probability based on the exact statistics of each hop. Furthermore, we perform asymptotic analysis and we deduce the diversity order of the scheme. We validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2010 IEEE.

  2. Service time analysis of secondary packet transmission with opportunistic channel access

    Usman, Muneer; Yang, Hongchuan; Alouini, Mohamed-Slim

    2014-01-01

    Cognitive radio transceiver can opportunistically access the underutilized channels of primary systems for new wireless services. The secondary transmission may be interrupted by the primary user's transmission. To facilitate the delay analysis of such secondary packet transmission, we study the resulting extended delivery time for a fixed-size secondary packet that includes both transmission time and waiting time. In particular we derive the exact distribution functions of extended delivery time of secondary transmission for both continuous sensing and periodic sensing cases. Selected numerical results are presented for illustrating the mathematical formulation.

  3. Opportunistic Beamforming with Wireless Powered 1-bit Feedback Through Rectenna Array

    Krikidis, Ioannis

    2015-11-01

    This letter deals with the opportunistic beamforming (OBF) scheme for multi-antenna downlink with spatial randomness. In contrast to conventional OBF, the terminals return only 1-bit feedback, which is powered by wireless power transfer through a rectenna array. We study two fundamental topologies for the combination of the rectenna elements; the direct-current combiner and the radio-frequency combiner. The beam outage probability is derived in closed form for both combination schemes, by using high order statistics and stochastic geometry.

  4. The Influence of Contrarians and Opportunists on the Stability of a Democracy in the Sznajd Model

    Schneider, Johannes J.

    Sznajd-Weron and Sznajd introduced a model investigating the democratic development in a closed community. This model is based on the USDF-principle ("united we stand, divided we fall"). However, it faces the problem that the system tends either to a dictatorship (i.e., 100% pro or 100% contra) or to a stalemate state (i.e., exactly 50% pro, 50% contra). Based on their model, I will show that a democratic system keeps alive due to the existence of both opportunists and persons in opposition.

  5. Evidence-based consensus on opportunistic infections in inflammatory bowel disease (republication

    2018-04-01

    Full Text Available Inflammatory bowel disease (IBD patients are a high-risk population for opportunistic infections. The IBD group of the Chinese Society of Gastroenterology of the Chinese Medical Association organized an expert group to discuss and develop this consensus opinion. This consensus opinion referenced clinical study results from China and other countries to provide guidance for clinical practices. Eight major topics, including cytomegalovirus infection, Epstein-Barr virus infection, viral hepatitis, bacterial infection, Mycobacterium tuberculosis infection, fungal infection, parasitic infection, and vaccines were introduced in this article.

  6. Service time analysis of secondary packet transmission with opportunistic channel access

    Usman, Muneer

    2014-09-01

    Cognitive radio transceiver can opportunistically access the underutilized channels of primary systems for new wireless services. The secondary transmission may be interrupted by the primary user\\'s transmission. To facilitate the delay analysis of such secondary packet transmission, we study the resulting extended delivery time for a fixed-size secondary packet that includes both transmission time and waiting time. In particular we derive the exact distribution functions of extended delivery time of secondary transmission for both continuous sensing and periodic sensing cases. Selected numerical results are presented for illustrating the mathematical formulation.

  7. A Sharing Proposition.

    Sturgeon, Julie

    2002-01-01

    Describes how the University of Vermont and St. Michael's College in Burlington, Vermont cooperated to share a single card access system. Discusses the planning, financial, and marketplace advantages of the cooperation. (EV)

  8. Pricing Shared Appreciation Mortgages

    Zhong, Yina

    2006-01-01

    This paper develops a model for the valuation of shared appreciation mortgage (SAM) and examines the effect of reduction in interest rate on the mortgage duration and share of property appreciation lender charges. The recent rise in SAM availability, as a result of some secondary market financial support and prerequisite standardization, motivates a more careful consideration of the underlying SAM value. The primary difference between the SAM model and the model for general traditional mor...

  9. Sharing resources@CERN

    Maximilien Brice

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Photo 01: L. to r. Eduardo Aldaz, from the PS division, Corrado Pettenati, Head Librarian, and Isabel Bejar, from the ST division, read their divisional copies of the same book.

  10. SharePoint governance

    Ali, Mudassar

    2013-01-01

    Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grimstad SharePoint is a web-based business collaboration platform from Microsoft which is very robust and dynamic in nature. The platform has been in the market for more than a decade and has been adapted by large number of organisations in the world. The platform has become larger in scale, richer in features and is improving consistently with every new version. However, SharePoint ...

  11. Information partnerships--shared data, shared scale.

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  12. Regulating the sharing economy

    Kristofer Erickson

    2016-06-01

    Full Text Available In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian and economic (allocative, profit-seeking aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions. This definition of the sharing economy distinguishes it from other related peer-to-peer and collaborative forms of production. Understanding the social and economic motivations for and implications of participating in the sharing economy is important to its regulation. Each of the papers in this special issue contributes to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms. We conclude this essay by suggesting future research to further clarify and render intelligible the sharing economy, not as a contradiction in terms but as an empirically observable realm of socio-economic activity.

  13. 77 FR 40647 - Toward Innovative Spectrum-Sharing Technologies: Wireless Spectrum Research and Development...

    2012-07-10

    ... a telecommunications device for the deaf (TDD) may call the Federal Information Relay Service (FIRS... Federal holidays). DATES: July 24, 2012. SUMMARY: Representatives from Federal research agencies, private industry, and academia will build on the outcomes of Workshop I and Workshop II by identifying realistic...

  14. Opportunistic Screening for Exposure to Bullying in the Pediatric Emergency Department.

    Seltzer, Marlene; Menoch, Margaret; Chen, Charity

    2017-01-01

    To assess opportunistic screening for exposure to bullying in the pediatric emergency department (ED), an anonymous survey inquiring about exposure to physical, verbal, social, and cyber bullying behaviors was given to ED patients 5 to 18 years old. The survey asked about being the recipient, perpetrator, and/or witness of bullying; the frequency of exposure; liking school; missing school; and presenting complaint. Either the child or parent could complete the survey. A total of 909 surveys were analyzed. Exposure was 78.7%. A greater proportion of females reported being victims and witnesses. Youth who reported being both victims and witnesses represented the largest group, with witness-only the second largest. Parents reported less cyber-bullying and witness status to all types of bullying. For children who did not like school, there was a significant difference in exposure versus nonexposure. There was no association with presenting complaint. Opportunistic screening for bullying exposure in pediatric ED patients warrants consideration as it may increase detection of preclinical status and clinical sequelae.

  15. Effect of oral hygiene interventions on opportunistic pathogens in patients after stroke.

    Lam, Otto L T; McMillan, Anne S; Samaranayake, Lakshman P; Li, Leonard S W; McGrath, Colman

    2013-02-01

    Despite the role of the oral cavity as a reservoir of opportunistic pathogens for infection in patients following stroke, the evaluation of the effects of oral hygiene interventions has been largely neglected. This randomized clinical trial included 102 patients undergoing hospital-based rehabilitation for stroke. Patients were randomized to one of 3 groups: oral hygiene instruction (OHI) only; OHI and 0.2% chlorhexidine mouth rinse twice daily; or OHI, 0.2% chlorhexidine mouth rinse twice daily, and assisted brushing twice weekly. Oral samples were obtained at baseline and after 3 weeks for detection of Staphylococcus aureus, aerobic and facultatively anaerobic gram-negative bacilli, and yeasts. Almost three-quarters (72.8%) of the patients harbored oral anaerobic gram-negative bacilli at baseline, and more than half had detectable S aureus (56.8%) and yeasts (59.3%). Percentage frequencies and viable counts of pathogens remained relatively stable during the course of the clinical trial, and no significant differences were observed among the 3 patient groups. In our study cohort, there was no significant difference in the effectiveness of the 3 different oral hygiene interventions on the prevalence or viable counts of oral opportunistic pathogens. Copyright © 2013 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  16. Insights on the Horizontal Gene Transfer of Carbapenemase Determinants in the Opportunistic Pathogen Acinetobacter baumannii

    Da Silva, Gabriela Jorge; Domingues, Sara

    2016-01-01

    Horizontal gene transfer (HGT) is a driving force to the evolution of bacteria. The fast emergence of antimicrobial resistance reflects the ability of genetic adaptation of pathogens. Acinetobacter baumannii has emerged in the last few decades as an important opportunistic nosocomial pathogen, in part due to its high capacity of acquiring resistance to diverse antibiotic families, including to the so-called last line drugs such as carbapenems. The rampant selective pressure and genetic exchange of resistance genes hinder the effective treatment of resistant infections. A. baumannii uses all the resistance mechanisms to survive against carbapenems but production of carbapenemases are the major mechanism, which may act in synergy with others. A. baumannii appears to use all the mechanisms of gene dissemination. Beyond conjugation, the mostly reported recent studies point to natural transformation, transduction and outer membrane vesicles-mediated transfer as mechanisms that may play a role in carbapenemase determinants spread. Understanding the genetic mobilization of carbapenemase genes is paramount in preventing their dissemination. Here we review the carbapenemases found in A. baumannii and present an overview of the current knowledge of contributions of the various HGT mechanisms to the molecular epidemiology of carbapenem resistance in this relevant opportunistic pathogen. PMID:27681923

  17. Allelopathic interactions between the opportunistic species Ulva prolifera and the native macroalga Gracilaria lichvoides.

    Dong Xu

    Full Text Available Allelopathy, one type of direct plant competition, can be a potent mechanism through which plant communities are structured. The aim of this study was to determine whether allelopathic interactions occur between the opportunistic green tide-forming species Ulva prolifera and the native macroalga Gracilaria lichvoides, both of which were collected from the coastline of East China sea. In laboratory experiments, the presence of G. lichvoides at 1.25 g wet weight L(-1 significantly inhibited growth and photosynthesis of U. prolifera at concentrations of 1.25, 2.50, and 3.75 g wet weight L(-1 (p0.05. Culture medium experiments further confirmed that some allelochemicals may be released by both of the tested macroalgae, and these could account for the observed physiological inhibition of growth and photosynthesis. Moreover, the native macroalgae G. lichvoides was a stronger competitor than the opportunistic species U. prolifera. Collectively, the results of the present study represent a significant advance in exploring ecological questions about the effects of green tide blooms on the macroalgal community.

  18. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  19. Reduction rules-based search algorithm for opportunistic replacement strategy of multiple life-limited parts

    Xuyun FU

    2018-01-01

    Full Text Available The opportunistic replacement of multiple Life-Limited Parts (LLPs is a problem widely existing in industry. The replacement strategy of LLPs has a great impact on the total maintenance cost to a lot of equipment. This article focuses on finding a quick and effective algorithm for this problem. To improve the algorithm efficiency, six reduction rules are suggested from the perspectives of solution feasibility, determination of the replacement of LLPs, determination of the maintenance occasion and solution optimality. Based on these six reduction rules, a search algorithm is proposed. This search algorithm can identify one or several optimal solutions. A numerical experiment shows that these six reduction rules are effective, and the time consumed by the algorithm is less than 38 s if the total life of equipment is shorter than 55000 and the number of LLPs is less than 11. A specific case shows that the algorithm can obtain optimal solutions which are much better than the result of the traditional method in 10 s, and it can provide support for determining to-be-replaced LLPs when determining the maintenance workscope of an aircraft engine. Therefore, the algorithm is applicable to engineering applications concerning opportunistic replacement of multiple LLPs in aircraft engines.

  20. Hiding in Fresh Fruits and Vegetables: Opportunistic Pathogens May Cross Geographical Barriers

    Zahra S. Al-Kharousi

    2016-01-01

    Full Text Available Different microbial groups of the microbiome of fresh produce can have diverse effects on human health. This study was aimed at identifying some microbial communities of fresh produce by analyzing 105 samples of imported fresh fruits and vegetables originated from different countries in the world including local samples (Oman for aerobic plate count and the counts of Enterobacteriaceae, Enterococcus, and Staphylococcus aureus. The isolated bacteria were identified by molecular (PCR and biochemical methods (VITEK 2. Enterobacteriaceae occurred in 60% of fruits and 91% of vegetables. Enterococcus was isolated from 20% of fruits and 42% of vegetables. E. coli and S. aureus were isolated from 22% and 7% of vegetables, respectively. Ninety-seven bacteria comprising 21 species were similarly identified by VITEK 2 and PCR to species level. E. coli, Klebsiella pneumoniae, Enterococcus casseliflavus, and Enterobacter cloacae were the most abundant species; many are known as opportunistic pathogens which may raise concern to improve the microbial quality of fresh produce. Phylogenetic trees showed no relationship between clustering of the isolates based on the 16S rRNA gene and the original countries of fresh produce. Intercountry passage of opportunistic pathogens in fresh produce cannot be ruled out, which requires better management.

  1. Isolation of Cryptococcus neoformans and other opportunistic fungi from pigeon droppings.

    Soltani, Maryam; Bayat, Mansour; Hashemi, Seyed J; Zia, Mohammadali; Pestechian, Nader

    2013-01-01

    Invasive fungal infections cause considerable morbidity and mortality in immunocompromised hosts. Pigeon droppings could especially be a potential carrier in the spread of pathogenic yeasts and mold fungi into the environment. The objective of this study was to isolation of Cryptococcus neoformans and other opportunistic fungi from pigeon droppings. One hundred twenty samples of pigeon droppings were suspended 1:10 in saline solution and then cultured. Identification of C. neoformans was performed on bird seed agar, presence of a capsule on India ink preparation, urease production on urea agar medium and RapID yeast plus system. The identification of candida species was based on micro-morphological analysis on corn meal-Tween 80 agar, RapID yeast plus system and growth in CHROMagar candida. The identification of other fungi was based on macromorphologic, microscopic, biochemical and physiological characteristics. The highest frequency of yeasts and mold fungi were observed in Candida albicans 6.6% and Penicillium spp. 25%. The frequency rate of C. neoformans isolation was 2.5%. Several types of fungi are present in pigeon droppings that can spread in environment and transmit to children and elderly as well as immunocompromised patients who are at increased risk of contracting opportunistic diseases.

  2. Isolation of Cryptococcus neoformans and other opportunistic fungi from pigeon droppings

    Maryam Soltani

    2013-01-01

    Full Text Available Background: Invasive fungal infections cause considerable morbidity and mortality in immunocompromised hosts. Pigeon droppings could especially be a potential carrier in the spread of pathogenic yeasts and mold fungi into the environment. The objective of this study was to isolation of Cryptococcus neoformans and other opportunistic fungi from pigeon droppings. Materials and Methods: One hundred twenty samples of pigeon droppings were suspended 1:10 in saline solution and then cultured. Identification of C. neoformans was performed on bird seed agar, presence of a capsule on India ink preparation, urease production on urea agar medium and RapID yeast plus system. The identification of candida species was based on micro-morphological analysis on corn meal-Tween 80 agar, RapID yeast plus system and growth in CHROMagar candida. The identification of other fungi was based on macromorphologic, microscopic, biochemical and physiological characteristics. Results: The highest frequency of yeasts and mold fungi were observed in Candida albicans 6.6% and Penicillium spp. 25%. The frequency rate of C. neoformans isolation was 2.5%. Conclusion: Several types of fungi are present in pigeon droppings that can spread in environment and transmit to children and elderly as well as immunocompromised patients who are at increased risk of contracting opportunistic diseases.

  3. Heavy Metal Distribution in Opportunistic Beach Nourishment: A Case Study in Greece

    Spyros Foteinis

    2013-01-01

    Full Text Available The existence and distribution of persistent pollutants, such as heavy metals, in coastal sediment used for opportunistic beach nourishment, is a problem that has not received much attention. Here, we assessed the coastal sediments in one restoration project for the occurrence and distribution of heavy metals, by utilizing an Energy Dispersive X-Ray Fluorescence (EDXRF system. Heavy metal point sources included (i the effluents of small industries (tanneries, (ii wastewater treatment plant effluents, and (iii paint and oil scraps from substandard ship maintenance activities that take place on ports breakwaters. A few neighboring beaches were found to have similar heavy metal concentrations, with mean values of Cu, Zn, and Pb ranging from 80 to 130, 15 to 25, and 25 to 40 mg/kg, respectively. Existing legislation regarding dredging activities in Greece appears insufficient for sustainable and environmentally friendly nourishment. We conclude that before opportunistic beach restoration projects materialize with material borrowed from ports and harbors the quality of the dredged material needs to be assessed.

  4. Opportunistic insights into occupational health hazards associated with waterpipe tobacco smoking premises in the United Kingdom.

    Al-Bakri, Ali; Jawad, Mohammed; Salameh, Pascale; al'Absi, Mustafa; Kassim, Saba

    2015-01-01

    Smokefree laws aim to protect employees and the public from the dangers of secondhand smoke. Waterpipe premises have significantly increased in number in the last decade, with anecdotal reports of poor compliance with the smokefree law. The literature is bereft of information pertaining to waterpipe premise employees. This study aimed to opportunistically gather knowledge about the occupational health hazards associated with working in waterpipe premises in London, England. Employees from seven convenience-sampled, smokefree-compliant waterpipe premises in London were observed for occupational activities. Opportunistic carbon monoxide (CO) measurements were made among those with whom a rapport had developed. Observations were thematically coded and analysed. Occupational hazards mainly included environmental smoke exposure. Waterpipe-serving employees were required to draw several puffs soon after igniting the coals, thereby providing quality assurance of the product. Median CO levels were 27.5 ppm (range 21-55 ppm) among these employees. Self-reported employee health was poor, with some suggestion that working patterns and smoke exposure was a contributory factor. The smokefree law in England does not appear to protect waterpipe premise employees from high levels of CO. Continued concerns surrounding chronic smoke exposure may contribute to poor self-reported physical and mental wellbeing.

  5. Contributing opportunistic resources to the grid with HTCondor-CE-Bosco

    Weitzel, Derek; Bockelman, Brian

    2017-10-01

    The HTCondor-CE [1] is the primary Compute Element (CE) software for the Open Science Grid. While it offers many advantages for large sites, for smaller, WLCG Tier-3 sites or opportunistic clusters, it can be a difficult task to install, configure, and maintain the HTCondor-CE. Installing a CE typically involves understanding several pieces of software, installing hundreds of packages on a dedicated node, updating several configuration files, and implementing grid authentication mechanisms. On the other hand, accessing remote clusters from personal computers has been dramatically improved with Bosco: site admins only need to setup SSH public key authentication and appropriate accounts on a login host. In this paper, we take a new approach with the HTCondor-CE-Bosco, a CE which combines the flexibility and reliability of the HTCondor-CE with the easy-to-install Bosco. The administrators of the opportunistic resource are not required to install any software: only SSH access and a user account are required from the host site. The OSG can then run the grid-specific portions from a central location. This provides a new, more centralized, model for running grid services, which complements the traditional distributed model. We will show the architecture of a HTCondor-CE-Bosco enabled site, as well as feedback from multiple sites that have deployed it.

  6. SPRINT-SELF: Social-Based Routing and Selfish Node Detection in Opportunistic Networks

    Radu Ioan Ciobanu

    2015-01-01

    Full Text Available Since mobile devices nowadays have become ubiquitous, several types of networks formed over such devices have been proposed. One such approach is represented by opportunistic networking, which is based on a store-carry-and-forward paradigm, where nodes store data and carry it until they reach a suitable node for forwarding. The problem in such networks is how to decide what the next hop will be, since nodes do not have a global view of the network. We propose using the social network information of a node when performing routing, since a node is more likely to encounter members of its own social community than other nodes. In addition, we approximate a node’s contact as a Poisson distribution and show that we can predict its future behavior based on the contact history. Furthermore, since opportunistic network nodes may be selfish, we improve our solution by adding a selfish node detection and avoidance mechanism, which can help reduce the number of unnecessary messages sent in the network, and thus avoid congestion and decrease battery consumption. We show that our algorithm outperforms existing solutions such as BUBBLE Rap and Epidemic in terms of delivery cost and hit rate, as well as the rate of congestion introduced in the network, by testing in various realistic scenarios.

  7. Mathematical Modeling and Analysis Methodology for Opportunistic Routing in Wireless Multihop Networks

    Wang Dongyang

    2015-01-01

    Full Text Available Modeling the forwarding feature and analyzing the performance theoretically for opportunistic routing in wireless multihop network are of great challenge. To address this issue, a generalized geometric distribution (GGD is firstly proposed. Based on the GGD, the forwarding probability between any two forwarding candidates could be calculated and it can be proved that the successful delivery rate after several transmissions of forwarding candidates is irrelevant to the priority rule. Then, a discrete-time queuing model is proposed to analyze mean end-to-end delay (MED of a regular opportunistic routing with the knowledge of the forwarding probability. By deriving the steady-state joint generating function of the queue length distribution, MED for directly connected networks and some special cases of nondirectly connected networks could be ultimately determined. Besides, an approximation approach is proposed to assess MED for the general cases in the nondirectly connected networks. By comparing with a large number of simulation results, the rationality of the analysis is validated. Both the analysis and simulation results show that MED varies with the number of forwarding candidates, especially when it comes to connected networks; MED increases more rapidly than that in nondirectly connected networks with the increase of the number of forwarding candidates.

  8. Mycological assessment of sediments in Ligurian beaches in the Northwestern Mediterranean: pathogens and opportunistic pathogens.

    Salvo, Vanessa-Sarah; Fabiano, Mauro

    2007-05-01

    Sediments of five Ligurian beaches in compliance with European Union bathing water regulations were studied based on the characteristics of the fungal assemblage during the tourism season. Among the 179 taxa of filamentous fungi isolated, 120 were opportunistic pathogens, such as Acremonium sp., and the genus Penicillium was also present as the pathogenic species P. citrinum. Furthermore, 5% of the total filamentous fungi belonged to the dermatophyte genus Microsporum, whose species can cause mycoses. Beach sediments showed elevated densities of opportunistic pathogens, of pathogenic filamentous fungi, and of yeasts during the tourism season. Although monitoring of beach sediments for microbiological contamination is not mandatory, and disease transmission from sediments has not yet been demonstrated, our study suggests that beach sediments may act as a reservoir of potential pathogens, including fungi. In addition, the mycoflora displayed high sensitivity to critical environmental situations in the beaches studied. Therefore, the fungal community can be a useful tool for assessing the quality of sandy beaches in terms of sanitary and environmental quality.

  9. Opportunistic Energy-Aware Amplify-and-Forward Cooperative Systems with Imperfect CSI

    Amin, Osama

    2015-07-29

    Recently, much attention has been paid to the green design of wireless communication systems using energy efficiency (EE) metrics that should capture all energy consumption sources to deliver the required data. In this paper, we design an energyefficient relay assisted communication system based on estimated channel state information (CSI). It employs amplify-andforward relaying and switches between different communication schemes, which are known as direct-transmission, two-hop and cooperative-transmission schemes, using the estimated CSI in order to maximize the EE. Two estimation strategies are assumed, namely disintegrated channel estimation and cascaded channel estimation. To formulate an accurate EE metric for the proposed opportunistic amplify-and-forward system, the channel estimation cost is reflected on the EE metric by including its impact in the signal-to-noise ratio term and in the energy consumption during the channels estimation phase. Based on the formulated EE metric, we propose an adaptive power allocation algorithm to maximize the EE of the proposed opportunistic amplify-andforward system with channel estimation. Furthermore, we study the impact of the estimation parameters on the proposed system via simulation examples.

  10. Labia Majora Share

    Hanjing Lee

    2017-01-01

    Full Text Available Defects involving specialised areas with characteristic anatomical features, such as the nipple, upper eyelid, and lip, benefit greatly from the use of sharing procedures. The vulva, a complex 3-dimensional structure, can also be reconstructed through a sharing procedure drawing upon the contralateral vulva. In this report, we present the interesting case of a patient with chronic, massive, localised lymphedema of her left labia majora that was resected in 2011. Five years later, she presented with squamous cell carcinoma over the left vulva region, which is rarely associated with chronic lymphedema. To the best of our knowledge, our management of the radical vulvectomy defect with a labia majora sharing procedure is novel and has not been previously described. The labia major flap presented in this report is a shared flap; that is, a transposition flap based on the dorsal clitoral artery, which has consistent vascular anatomy, making this flap durable and reliable. This procedure epitomises the principle of replacing like with like, does not interfere with leg movement or patient positioning, has minimal donor site morbidity, and preserves other locoregional flap options for future reconstruction. One limitation is the need for a lax contralateral vulva. This labia majora sharing procedure is a viable option in carefully selected patients.

  11. Decision Analysis of Dynamic Spectrum Access Rules

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  12. Collaborate, compete and share

    Pugliese, Emanuele; Castellano, Claudio; Marsili, Matteo; Pietronero, Luciano

    2009-02-01

    We introduce and study a model of an interacting population of agents who collaborate in groups which compete for limited resources. Groups are formed by random matching agents and their worth is determined by the sum of the efforts deployed by agents in group formation. Agents, on their side, have to share their effort between contributing to their group’s chances to outcompete other groups and resource sharing among partners, when the group is successful. A simple implementation of this strategic interaction gives rise to static and evolutionary properties with a very rich phenomenology. A robust emerging feature is the separation of the population between agents who invest mainly in the success of their group and agents who concentrate in getting the largest share of their group’s profits.

  13. Urban sharing culture

    Fjalland, Emmy Laura Perez

    of the structures of the networked urban mobilities and holds the potentials to change the future mobilities. References Bauman, Zygmunt. 2000. Liquid Modernity. Cambridge: Polity. Beck, Ulrich. 1992. Risk Society: Towards a New Modernity (Published in Association with Theory, Culture & Society). London: SAGE......In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... problems and side effects from concentration of consumption and contamination; and due to the shift from ownership to access it change our basic social cultural norms (Sayer 2005; Sayer 2011) about the ‘good’ life and social status (Freudendal-Pedersen 2007), commons and individuality, responsibility...

  14. Executive summary: Prevention and treatment of opportunistic infections and other coinfections in HIV-infected patients: May 2015.

    Iribarren, José Antonio; Rubio, Rafael; Aguirrebengoa, Koldo; Arribas, Jose Ramón; Baraia-Etxaburu, Josu; Gutiérrez, Félix; Lopez Bernaldo de Quirós, Juan Carlos; Losa, Juan Emilio; Miró, José Ma; Moreno, Santiago; Pérez Molina, José; Podzamczer, Daniel; Pulido, Federico; Riera, Melchor; Rivero, Antonio; Sanz Moreno, José; Amador, Concha; Antela, Antonio; Arazo, Piedad; Arrizabalaga, Julio; Bachiller, Pablo; Barros, Carlos; Berenguer, Juan; Caylá, Joan; Domingo, Pere; Estrada, Vicente; Knobel, Hernando; Locutura, Jaime; López Aldeguer, José; Llibre, Josep Ma; Lozano, Fernando; Mallolas, Josep; Malmierca, Eduardo; Miralles, Celia; Miralles, Pilar; Muñoz, Agustín; Ocampo, Agustín; Olalla, Julián; Pérez, Inés; Pérez Elías, Ma Jesús; Pérez Arellano, José Luis; Portilla, Joaquín; Ribera, Esteban; Rodríguez, Francisco; Santín, Miguel; Sanz Sanz, Jesús; Téllez, Ma Jesús; Torralba, Miguel; Valencia, Eulalia; Von Wichmann, Miguel Angel

    2016-10-01

    Opportunistic infections continue to be a cause of morbidity and mortality in HIV-infected patients. They often arise because of severe immunosuppression resulting from poor adherence to antiretroviral therapy, failure of antiretroviral therapy, or unawareness of HIV infection by patients whose first clinical manifestation of AIDS is an opportunistic infection. The present article is an executive summary of the document that updates the previous recommendations on the prevention and treatment of opportunistic infections in HIV-infected patients, namely, infections by parasites, fungi, viruses, mycobacteria, and bacteria, as well as imported infections. The article also addresses immune reconstitution inflammatory syndrome. This document is intended for all professionals who work in clinical practice in the field of HIV infection. Copyright © 2016 Elsevier España, S.L.U. and Sociedad Española de Enfermedades Infecciosas y Microbiología Clínica. All rights reserved.

  15. Adaptive Opportunistic Cooperative Control Mechanism Based on Combination Forecasting and Multilevel Sensing Technology of Sensors for Mobile Internet of Things

    Yong Jin

    2014-01-01

    Full Text Available In mobile Internet of Things, there are many challenges, including sensing technology of sensors, how and when to join cooperative transmission, and how to select the cooperative sensors. To address these problems, we studied the combination forecasting based on the multilevel sensing technology of sensors, building upon which we proposed the adaptive opportunistic cooperative control mechanism based on the threshold values such as activity probability, distance, transmitting power, and number of relay sensors, in consideration of signal to noise ratio and outage probability. More importantly, the relay sensors would do self-test real time in order to judge whether to join the cooperative transmission, for maintaining the optimal cooperative transmission state with high performance. The mathematical analyses results show that the proposed adaptive opportunistic cooperative control approach could perform better in terms of throughput ratio, packet error rate and delay, and energy efficiency, compared with the direct transmission and opportunistic cooperative approaches.

  16. The presence of opportunistic pathogens, Legionella spp., L. pneumophila and Mycobacterium avium complex, in South Australian reuse water distribution pipelines.

    Whiley, H; Keegan, A; Fallowfield, H; Bentham, R

    2015-06-01

    Water reuse has become increasingly important for sustainable water management. Currently, its application is primarily constrained by the potential health risks. Presently there is limited knowledge regarding the presence and fate of opportunistic pathogens along reuse water distribution pipelines. In this study opportunistic human pathogens Legionella spp., L. pneumophila and Mycobacterium avium complex were detected using real-time polymerase chain reaction along two South Australian reuse water distribution pipelines at maximum concentrations of 10⁵, 10³ and 10⁵ copies/mL, respectively. During the summer period of sampling the concentration of all three organisms significantly increased (P < 0.05) along the pipeline, suggesting multiplication and hence viability. No seasonality in the decrease in chlorine residual along the pipelines was observed. This suggests that the combination of reduced chlorine residual and increased water temperature promoted the presence of these opportunistic pathogens.

  17. Many channel spectrum unfolding

    Najzer, M.; Glumac, B.; Pauko, M.

    1980-01-01

    The principle of the ITER unfolding code as used for the many channel spectrum unfolding is described. Its unfolding ability is tested on seven typical neutron spectra. The effect of the initial spectrum approximation upon the solution is discussed

  18. Pulsar Emission Spectrum

    Gruzinov, Andrei

    2013-01-01

    Emission spectrum is calculated for a weak axisymmetric pulsar. Also calculated are the observed spectrum, efficiency, and the observed efficiency. The underlying flow of electrons and positrons turns out to be curiously intricate.

  19. Autism Spectrum Disorder

    ... Caregiver Education » Fact Sheets Autism Spectrum Disorder Fact Sheet What is autism spectrum disorder? What are some ... of mutations in individual genes but rather spontaneous coding mutations across many genes. De novo mutations may ...

  20. Spectrum monitoring procedures and techniques

    1990-07-01

    The first step towards operating an emitter on a test range is to contact the local frequency manager to establish a schedule. Since restricted radio frequency bands and operations are different at each test range location, most testing is accomplished by sharing the spectrum available with all range users. The telemetry bands in particular require spectrum activity scheduling. The objective is to resolve scheduling conflicts prior to operations. When two programs or projects request to use the same spectrum, their activity can be separated by quard bands, discrete frequencies, time, or operating locations (terrain masking). Priorities assigned to each program usually dictate which program will be scheduled first; however, use of priorities to schedule activities should be avoided and only considered as a last resort. When a scheduling conflict cannot be resolved using these techniques, it is brought to the attention of the responsible program managers. When scheduling activities involve other federal or nonfederal agencies, it is in the best interest of program managers to be as flexible as possible.

  1. A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs

    Xu, Xin; Yuan, Minjiao; Liu, Xiao; Cai, Zhiping; Wang, Tian

    2018-01-01

    In wireless sensor networks (WSNs), communication links are typically error-prone and unreliable, so providing reliable and timely data routing for loss- and delay-sensitive applications in WSNs it is a challenge issue. Additionally, with specific thresholds in practical applications, the loss and delay sensitivity implies requirements for high reliability and low delay. Opportunistic Routing (OR) has been well studied in WSNs to improve reliability for error-prone and unreliable wireless communication links where the transmission power is assumed to be identical in the whole network. In this paper, a Cross-layer Optimized Opportunistic Routing (COOR) scheme is proposed to improve the communication link reliability and reduce delay for loss-and-delay sensitive WSNs. The main contribution of the COOR scheme is making full use of the remaining energy in networks to increase the transmission power of most nodes, which will provide a higher communication reliability or further transmission distance. Two optimization strategies referred to as COOR(R) and COOR(P) of the COOR scheme are proposed to improve network performance. In the case of increasing the transmission power, the COOR(R) strategy chooses a node that has a higher communication reliability with same distance in comparison to the traditional opportunistic routing when selecting the next hop candidate node. Since the reliability of data transmission is improved, the delay of the data reaching the sink is reduced by shortening the time of communication between candidate nodes. On the other hand, the COOR(P) strategy prefers a node that has the same communication reliability with longer distance. As a result, network performance can be improved for the following reasons: (a) the delay is reduced as fewer hops are needed while the packet reaches the sink in longer transmission distance circumstances; (b) the reliability can be improved since it is the product of the reliability of every hop of the routing path

  2. A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs.

    Xu, Xin; Yuan, Minjiao; Liu, Xiao; Liu, Anfeng; Xiong, Neal N; Cai, Zhiping; Wang, Tian

    2018-05-03

    In wireless sensor networks (WSNs), communication links are typically error-prone and unreliable, so providing reliable and timely data routing for loss- and delay-sensitive applications in WSNs it is a challenge issue. Additionally, with specific thresholds in practical applications, the loss and delay sensitivity implies requirements for high reliability and low delay. Opportunistic Routing (OR) has been well studied in WSNs to improve reliability for error-prone and unreliable wireless communication links where the transmission power is assumed to be identical in the whole network. In this paper, a Cross-layer Optimized Opportunistic Routing (COOR) scheme is proposed to improve the communication link reliability and reduce delay for loss-and-delay sensitive WSNs. The main contribution of the COOR scheme is making full use of the remaining energy in networks to increase the transmission power of most nodes, which will provide a higher communication reliability or further transmission distance. Two optimization strategies referred to as COOR(R) and COOR(P) of the COOR scheme are proposed to improve network performance. In the case of increasing the transmission power, the COOR(R) strategy chooses a node that has a higher communication reliability with same distance in comparison to the traditional opportunistic routing when selecting the next hop candidate node. Since the reliability of data transmission is improved, the delay of the data reaching the sink is reduced by shortening the time of communication between candidate nodes. On the other hand, the COOR(P) strategy prefers a node that has the same communication reliability with longer distance. As a result, network performance can be improved for the following reasons: (a) the delay is reduced as fewer hops are needed while the packet reaches the sink in longer transmission distance circumstances; (b) the reliability can be improved since it is the product of the reliability of every hop of the routing path

  3. A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs

    Xin Xu

    2018-05-01

    Full Text Available In wireless sensor networks (WSNs, communication links are typically error-prone and unreliable, so providing reliable and timely data routing for loss- and delay-sensitive applications in WSNs it is a challenge issue. Additionally, with specific thresholds in practical applications, the loss and delay sensitivity implies requirements for high reliability and low delay. Opportunistic Routing (OR has been well studied in WSNs to improve reliability for error-prone and unreliable wireless communication links where the transmission power is assumed to be identical in the whole network. In this paper, a Cross-layer Optimized Opportunistic Routing (COOR scheme is proposed to improve the communication link reliability and reduce delay for loss-and-delay sensitive WSNs. The main contribution of the COOR scheme is making full use of the remaining energy in networks to increase the transmission power of most nodes, which will provide a higher communication reliability or further transmission distance. Two optimization strategies referred to as COOR(R and COOR(P of the COOR scheme are proposed to improve network performance. In the case of increasing the transmission power, the COOR(R strategy chooses a node that has a higher communication reliability with same distance in comparison to the traditional opportunistic routing when selecting the next hop candidate node. Since the reliability of data transmission is improved, the delay of the data reaching the sink is reduced by shortening the time of communication between candidate nodes. On the other hand, the COOR(P strategy prefers a node that has the same communication reliability with longer distance. As a result, network performance can be improved for the following reasons: (a the delay is reduced as fewer hops are needed while the packet reaches the sink in longer transmission distance circumstances; (b the reliability can be improved since it is the product of the reliability of every hop of the

  4. Opportunistic breast cancer early detection in Tyrol, Austria 1996-2004

    Frede, Thomas E.

    2005-01-01

    Purpose: Evaluate the need for a mammography-screening program for Tyrol, as recently proposed in an OeBIG feasibility study commissioned by the Austrian Ministry for Health and Women, in view of the already existing organized opportunistic screening. Materials and methods: This author has examined the state of breast cancer early detection and diagnosis in Tyrol. A comprehensive review of all available data and results based on 3340 primary biopsy recommendations between 1996 and 2004 at our breast centre was performed. Results: Early detection has been improved by organizing the existing opportunistic screening through a true team approach, incorporating not only the clinic's specialties, but also the private radiologists and referring physicians. In 2004, our centre made the definitive diagnosis in 230 (67.6%) of the about 340 primary breast cancer cases occurring yearly in Tyrol with 62.2% being discovered by routine examination and 74.3% stemming from second opinion examinations. About 92.4% of our primary biopsies are performed minimally invasive with an overall 42.9% (1375 of 3205 cases) malignancy rate. Pathological TNM-staging was obtained in over 95% of women under 70 years of age. On average 55.3% (62.0% in 2004) of all discovered cancers were TNM-stage 1 or better lesions (76.2% in our routine patients). With an overall participation of about 75% of our target group (women over 34 years), it is women under the age of 50 years, who most consistently follow our recommendations, resulting in an above average rate of 58.5% TNM-stage 1 and better lesions for all discovered breast cancers (routine and symptomatic) in this group. Conclusions: Opportunistic screening with a true team approach, combined with minimally invasive diagnosis and a strive for excellence have resulted in improved diagnosis, ever expanding patient and referring physician acceptance and an increase of positive prognostic factors, which eclipses the results of any published international

  5. Information Sharing and Knowledge Sharing as Communicative Activities

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  6. Shared Care in Diabetes?

    Bødker, Keld

    2006-01-01

    The Danish National Board of Health has recently released a report that is intended to mark the start of a new project to establish it support for shared care in diabetes. In this paper I raise a number of concerns where lack of attention towards participation from prospective users constitute...

  7. Sharing (and) familiarities

    Rasmussen, Jon Dag; Winther, Ida Wentzel; Davies, Hayley

    but not exclusive to lifestories/biographies, travels, times, spaces and material items, bodies and intimate knowledge of one another, surnames - in the subjective lives of family members? Sociology has traditionally been preoccupied with notions and logics of sharing in homely contexts (e.g. Simmel’s work...

  8. The Sharing Economy

    Hamari, Juho; Sjöklint, Mimmi; Ukkonen, Antti

    2016-01-01

    Information and communications technologies (ICTs) have enabled the rise of so-called “Collaborative Consumption” (CC): the peer-to-peer-based activity of obtaining, giving, or sharing the access to goods and services, coordinated through community-based online services. CC has been expected to a...

  9. Shared goals and development

    Blomberg, Olle

    2015-01-01

    undemanding for children to engage in, and therefore has the potential to play a part in fostering their understanding of other minds. Part of the functional role of shared goals is to enable agents to choose means that are appropriate to realising a goal with others rather than individually. By offering...

  10. Radio resource allocation and dynamic spectrum access

    Benmammar , Badr

    2013-01-01

    We are currently witnessing an increase in telecommunications norms and standards given the recent advances in this field. The increasing number of normalized standards paves the way for an increase in the range of services available for each consumer. Moreover, the majority of available radio frequencies have already been allocated. This explains the emergence of cognitive radio (CR) - the sharing of the spectrum between a primary user and a secondary user.In this book, we will present the state of the art of the different techniques for spectrum access using cooperation and competit

  11. Error-rate performance analysis of incremental decode-and-forward opportunistic relaying

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2010-01-01

    In this paper, we investigate an incremental opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider regenerative relaying in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive a closed-form expression for the end-to-end biterror rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact probability density function (PDF) of each hop. Furthermore, we evaluate the asymptotic error performance and the diversity order is deduced. We show that performance simulation results coincide with our analytical results. ©2010 IEEE.

  12. Prediction Approach of Critical Node Based on Multiple Attribute Decision Making for Opportunistic Sensor Networks

    Qifan Chen

    2016-01-01

    Full Text Available Predicting critical nodes of Opportunistic Sensor Network (OSN can help us not only to improve network performance but also to decrease the cost in network maintenance. However, existing ways of predicting critical nodes in static network are not suitable for OSN. In this paper, the conceptions of critical nodes, region contribution, and cut-vertex in multiregion OSN are defined. We propose an approach to predict critical node for OSN, which is based on multiple attribute decision making (MADM. It takes RC to present the dependence of regions on Ferry nodes. TOPSIS algorithm is employed to find out Ferry node with maximum comprehensive contribution, which is a critical node. The experimental results show that, in different scenarios, this approach can predict the critical nodes of OSN better.

  13. Identification of quorum-sensing regulated proteins in the opportunistic pathogen Pseudomonas aeruginosa by proteomics

    Arevalo-Ferro, C.; Hentzer, Morten; Reil, G.

    2003-01-01

    The Gram-negative bacterium Pseudomonas aeruginosa is an opportunistic human pathogen which is responsible for severe nosocomial infections in immunocompromised patients and is the major pathogen in cystic fibrosis. The bacterium utilizes two interrelated quorum-sensing (QS) systems, which rely......-controlled protein spots of the surface fraction, confirming the high specificity of the compound. Importantly, 20 novel QS-regulated proteins were identified, many of which are involved in iron utilization, suggesting a link between quorum sensing and the iron regulatory system. Two of these proteins, PhuR and Has......Ap, are components of the two distinct haem-uptake systems present in P. aeruginosa. In agreement with the finding that both proteins are positively regulated by the QS cascade, we show that the lasI rhlI double mutant grows poorly with haemoglobin as the only iron source when compared with the wild type...

  14. Error-rate performance analysis of incremental decode-and-forward opportunistic relaying

    Tourki, Kamel

    2010-10-01

    In this paper, we investigate an incremental opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider regenerative relaying in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive a closed-form expression for the end-to-end biterror rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact probability density function (PDF) of each hop. Furthermore, we evaluate the asymptotic error performance and the diversity order is deduced. We show that performance simulation results coincide with our analytical results. ©2010 IEEE.

  15. Prevention and treatment of opportunistic infections and other coinfections in HIV-infected patients: May 2015.

    Iribarren, José Antonio; Rubio, Rafael; Aguirrebengoa, Koldo; Arribas, Jose Ramón; Baraia-Etxaburu, Josu; Gutiérrez, Félix; Lopez Bernaldo de Quirós, Juan Carlos; Losa, Juan Emilio; Miró, José Ma; Moreno, Santiago; Pérez Molina, José; Podzamczer, Daniel; Pulido, Federico; Riera, Melchor; Rivero, Antonio; Sanz Moreno, José; Amador, Concha; Antela, Antonio; Arazo, Piedad; Arrizabalaga, Julio; Bachiller, Pablo; Barros, Carlos; Berenguer, Juan; Caylá, Joan; Domingo, Pere; Estrada, Vicente; Knobel, Hernando; Locutura, Jaime; López Aldeguer, José; Llibre, Josep Ma; Lozano, Fernando; Mallolas, Josep; Malmierca, Eduardo; Miralles, Celia; Miralles, Pilar; Muñoz, Agustín; Ocampo, Agustín; Olalla, Julián; Pérez, Inés; Pérez Elías, Ma Jesús; Pérez Arellano, José Luis; Portilla, Joaquín; Ribera, Esteban; Rodríguez, Francisco; Santín, Miguel; Sanz Sanz, Jesús; Téllez, Ma Jesús; Torralba, Miguel; Valencia, Eulalia; Von Wichmann, Miguel Angel

    2016-10-01

    Despite the huge advance that antiretroviral therapy represents for the prognosis of infection by the human immunodeficiency virus (HIV), opportunistic infections (OIs) continue to be a cause of morbidity and mortality in HIV-infected patients. OIs often arise because of severe immunosuppression resulting from poor adherence to antiretroviral therapy, failure of antiretroviral therapy, or unawareness of HIV infection by patients whose first clinical manifestation of AIDS is an OI. The present article updates our previous guidelines on the prevention and treatment of various OIs in HIV-infected patients, namely, infections by parasites, fungi, viruses, mycobacteria, and bacteria, as well as imported infections. The article also addresses immune reconstitution inflammatory syndrome. Copyright © 2016 Elsevier España, S.L.U. and Sociedad Española de Enfermedades Infecciosas y Microbiología Clínica. All rights reserved.

  16. Accurate outage analysis of incremental decode-and-forward opportunistic relaying

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2011-01-01

    In this paper, we investigate a dual-hop decode-and-forward opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. We first derive the exact statistics of received signal-to-noise (SNR) over each hop with co-located relays, in terms of probability density function (PDF). Then, the PDFs are used to determine very accurate closed-form expression for the outage probability for a transmission rate R. Furthermore, we perform asymptotic analysis and we deduce the diversity order of the scheme. We validate our analysis by showing that performance simulation results coincide with our analytical results over different network architectures. © 2011 IEEE.

  17. Error-rate performance analysis of incremental decode-and-forward opportunistic relaying

    Tourki, Kamel; Yang, Hongchuan; Alouini, Mohamed-Slim

    2011-01-01

    In this paper, we investigate an incremental opportunistic relaying scheme where the selected relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider regenerative relaying in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We derive a closed-form expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation based on the exact probability density function (PDF) of each hop. Furthermore, we evaluate the asymptotic error performance and the diversity order is deduced. We show that performance simulation results coincide with our analytical results. © 2011 IEEE.

  18. Outage Probability versus Fairness Trade-off in Opportunistic Relay Selection with Outdated CSI

    Vicario JoseLopez

    2009-01-01

    Full Text Available We analyze the existing trade-offs in terms of system performance versus fairness of a cooperative system based on opportunistic relay selection (ORS and with outdated channel state information (CSI. In particular, system performance is analytically evaluated in terms of outage probability, and the fairness behavior is assessed based on the power consumption at the different relays. In order to improve the fairness behavior of ORS while keeping the selection diversity gain, we propose a relay selection mechanism where the relay with the highest normalized signal-to-noise ratio (SNR is selected for relaying the source's information. The proposed strategy is compared with existing relay selection strategies by adopting a novel graphical representation inspired by expected profit versus risk plots used in modern portfolio theory. As shown in the paper, this strategy allows operating the system in more favorable points of the outage versus fairness region.

  19. Danish General Practitioners' Use of Prostate-Specific Antigen in Opportunistic Screening for Prostate Cancer

    Jessen, Kasper; Søndergaard, Jens; Larsen, Pia Veldt

    2013-01-01

    Background. The use of prostate-specific antigen test has markedly increased in Danish general practice in the last decade. Despite the national guidelines advice against PSA screening, opportunistic screening is supposed to be the primary reason for this increased number of PSA tests performed....... Aims. Based on the increase in the amount of PSA conducted, we aimed to analyse how GPs in Denmark use the PSA test. Methods. A self-administrated questionnaire concerning symptomatic and asymptomatic patient cases was developed based on the national and international guidelines and the extensive...... literature review, and an in-depth interview conducted with a GP was performed. Results. None of the GPs would do a PSA measurement for an asymptomatic 76-year-old man. For asymptomatic 55- and 42-year-old men, respectively, 21.9% and 18.6% of GPs would measure PSA. Patient request and concern could...

  20. An Arrival and Departure Time Predictor for Scheduling Communication in Opportunistic IoT

    Pozza, Riccardo; Georgoulas, Stylianos; Moessner, Klaus; Nati, Michele; Gluhak, Alexander; Krco, Srdjan

    2016-01-01

    In this article, an Arrival and Departure Time Predictor (ADTP) for scheduling communication in opportunistic Internet of Things (IoT) is presented. The proposed algorithm learns about temporal patterns of encounters between IoT devices and predicts future arrival and departure times, therefore future contact durations. By relying on such predictions, a neighbour discovery scheduler is proposed, capable of jointly optimizing discovery latency and power consumption in order to maximize communication time when contacts are expected with high probability and, at the same time, saving power when contacts are expected with low probability. A comprehensive performance evaluation with different sets of synthetic and real world traces shows that ADTP performs favourably with respect to previous state of the art. This prediction framework opens opportunities for transmission planners and schedulers optimizing not only neighbour discovery, but the entire communication process. PMID:27827909