WorldWideScience

Sample records for regulation 6-802 procedures

  1. 48 CFR 225.802-70 - Contracts for performance outside the United States and Canada.

    Science.gov (United States)

    2010-10-01

    ... outside the United States and Canada. 225.802-70 Section 225.802-70 Federal Acquisition Regulations System... States and Canada. Follow the procedures at PGI 225.802-70 when placing a contract requiring performance outside the United States and Canada. Also see Subpart 225.74, Defense Contractors Outside the United...

  2. Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.

    Science.gov (United States)

    Ullah, Sana; Chen, Min; Kwak, Kyung Sup

    2012-12-01

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.

  3. 29 CFR 1926.802 - Cofferdams.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 8 2010-07-01 2010-07-01 false Cofferdams. 1926.802 Section 1926.802 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Underground Construction, Caissons, Cofferdams and...

  4. On IEEE 802.15.6 IR-UWB receivers - simulations for DBPSK modulation.

    Science.gov (United States)

    Niemelä, Ville; Hämäläinen, Matti; Iinatti, Jari

    2013-01-01

    In 2002, Federal Communications Commission (FCC) was the first in defining regulations for ultra wideband (UWB) communications followed by Europe and Japan some years later. Focusing on impulse radio (IR) UWB, in 2007 was the time for the first published standard targeting in personal area networks, released by the IEEE. The second IEEE released standard including UWB definitions is targeted for wireless body area networks (WBAN) and was published in 2012. As the wireless communications has been and will be passing through almost any levels in society, the natural step with WBAN is using it in different medical, healthcare and wellbeing applications. The arguments for these are related to the modern lifestyle, in which people have increasingly more free time and are more interested in taking care of their health and wellbeing. Another challenge is the population composition, i.e., aging in developed countries which call for new solutions and procedures, particularly from cost wise. In this paper, we are evaluating UWB receivers based on the IEEE 802.15.6 physical layer definitions and capable of detecting differentially encoded modulation. The evaluation is performed using two different WBAN channel models.

  5. 28 CFR 802.1 - Introduction.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Introduction. 802.1 Section 802.1 Judicial Administration COURT SERVICES AND OFFENDER SUPERVISION AGENCY FOR THE DISTRICT OF COLUMBIA DISCLOSURE OF RECORDS General § 802.1 Introduction. This part contains regulations of the Court Services and...

  6. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  7. Formal analysis and evaluation of the back-off procedure in IEEE802.11P VANET

    Science.gov (United States)

    Jin, Li; Zhang, Guoan; Zhu, Xiaojun

    2017-07-01

    The back-off procedure is one of the media access control technologies in 802.11P communication protocol. It plays an important role in avoiding message collisions and allocating channel resources. Formal methods are effective approaches for studying the performances of communication systems. In this paper, we establish a discrete time model for the back-off procedure. We use Markov Decision Processes (MDPs) to model the non-deterministic and probabilistic behaviors of the procedure, and use the probabilistic computation tree logic (PCTL) language to express different properties, which ensure that the discrete time model performs their basic functionality. Based on the model and PCTL specifications, we study the effect of contention window length on the number of senders in the neighborhood of given receivers, and that on the station’s expected cost required by the back-off procedure to successfully send packets. The variation of the window length may increase or decrease the maximum probability of correct transmissions within a time contention unit. We propose to use PRISM model checker to describe our proposed back-off procedure for IEEE802.11P protocol in vehicle network, and define different probability properties formulas to automatically verify the model and derive numerical results. The obtained results are helpful for justifying the values of the time contention unit.

  8. 48 CFR 2922.802 - General.

    Science.gov (United States)

    2010-10-01

    ... 2922.802 Federal Acquisition Regulations System DEPARTMENT OF LABOR SOCIOECONOMIC PROGRAMS APPLICATION OF LABOR LAWS TO GOVERNMENT ACQUISITIONS Equal Employment Opportunity 2922.802 General. Executive... Labor promote full realization of equal opportunity for all persons regardless of race, color, religion...

  9. 10 CFR 2.802 - Petition for rulemaking.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Petition for rulemaking. 2.802 Section 2.802 Energy... Rulemaking § 2.802 Petition for rulemaking. (a) Any interested person may petition the Commission to issue, amend or rescind any regulation. The petition should be addressed to the Secretary, Attention...

  10. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    Science.gov (United States)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  11. 20 CFR 802.211 - Petition for review.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Petition for review. 802.211 Section 802.211 Employees' Benefits BENEFITS REVIEW BOARD, DEPARTMENT OF LABOR RULES OF PRACTICE AND PROCEDURE Prereview... support such proposed result. The Longshore Desk Book and Black Lung Desk Book are not intended as final...

  12. Efficient Beacon Collision Resolution Procedure for IEEE 802.15.4 /Zigbee Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Bassam A. Zafar

    2017-04-01

    Full Text Available While IEEE 802.15.4/Zigbee is a promising technology for Wireless Personal Area Networks, several transmission problems are not yet resolved. In particular, the problem of beacon transmission interferences is causing the device connection loss to the network. In order to resolve this problem, we present a new distributed and reactive procedure for beacon collision resolution. It is an extension of the alignment procedure to reorganize randomly the beacon transmission time when a collision has occurred. The detail of the proposed procedure will be fully described and analyzed. The performance of our approach is performed by simulations. The results show that our approach reduces the collision probability and the device disconnections consequently.

  13. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    Science.gov (United States)

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  14. 16 CFR 802.53 - Certain foreign banking transactions.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Certain foreign banking transactions. 802.53 Section 802.53 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS, STATEMENTS AND... foreign banking transactions. An acquisition which requires the consent or approval of the Board of...

  15. 16 CFR 802.70 - Acquisitions subject to order.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Acquisitions subject to order. 802.70 Section 802.70 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS, STATEMENTS AND... the Federal Trade Commission or of any Federal court in an action brought by the Federal Trade...

  16. 20 CFR 802.105 - Stay of payment pending appeal.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Stay of payment pending appeal. 802.105... PROCEDURE General Provisions Introductory § 802.105 Stay of payment pending appeal. (a) As provided in... ten days after it becomes due pending final decision in any proceeding before the Board unless so...

  17. 15 CFR 971.802 - Public disclosure of documents received by NOAA.

    Science.gov (United States)

    2010-01-01

    ... received by NOAA. 971.802 Section 971.802 Commerce and Foreign Trade Regulations Relating to Commerce and... Miscellaneous § 971.802 Public disclosure of documents received by NOAA. (a) Purpose. This section provides a... assure that NOAA has a complete and proper basis for determining the legality and appropriateness of...

  18. 16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.

    Science.gov (United States)

    2010-01-01

    ... institutional investors. 802.64 Section 802.64 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS... § 802.64 Acquisitions of voting securities by certain institutional investors. (a) Institutional investor. For purposes of this section, the term institutional investor means any entity of the following...

  19. 20 CFR 802.216 - Service and form of papers.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Service and form of papers. 802.216 Section... Prereview Procedures Initial Processing § 802.216 Service and form of papers. (a) All papers filed with the...), date of signature, and certificate of service. (b) For each paper filed with the Board, the original...

  20. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    Science.gov (United States)

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  1. Performance Analysis of IEEE 802.15.6 CSMA/CA Protocol for WBAN Medical Scenario through DTMC Model.

    Science.gov (United States)

    Kumar, Vivek; Gupta, Bharat

    2016-12-01

    The newly drafted IEEE 802.15.6 standard for Wireless Body Area Networks (WBAN) has been concentrating on a numerous medical and non-medical applications. Such short range wireless communication standard offers ultra-low power consumption with variable data rates from few Kbps to Mbps in, on or around the proximity of the human body. In this paper, the performance analysis of carrier sense multiple access with collision avoidance (CSMA/CA) scheme based on IEEE 802.15.6 standard in terms of throughput, reliability, clear channel assessment (CCA) failure probability, packet drop probability, and end-to-end delay has been presented. We have developed a discrete-time Markov chain (DTMC) to significantly evaluate the performances of IEEE 802.15.6 CSMA/CA under non-ideal channel condition having saturated traffic condition including node wait time and service time. We also visualize that, as soon as the payload length increases the CCA failure probability increases, which results in lower node's reliability. Also, we have calculated the end-to-end delay in order to prioritize the node wait time cause by backoff and retransmission. The user priority (UP) wise DTMC analysis has been performed to show the importance of the standard especially for medical scenario.

  2. Performance comparison of IEEE 802.11g and IEEE 802.11n in the presence of interference from 802.15.4 networks

    OpenAIRE

    Masood, Syed Haani

    2013-01-01

    In this paper we compare the packet error rate (PER) and maximum throughput of IEEE 802.11n and IEEE 802.11g under interference from IEEE 802.15.4 by using MATLAB to simulate the IEEE PHY for 802.11n and 802.11g networks.

  3. 6 CFR 25.6 - Procedures for designation of qualified anti-terrorism technologies.

    Science.gov (United States)

    2010-01-01

    ...-terrorism technologies. 25.6 Section 25.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.6 Procedures for designation of qualified anti-terrorism technologies. (a) Application Procedure. Any person, firm or other...

  4. 49 CFR 17.6 - What procedures apply to the selection of programs and activities under these regulations?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false What procedures apply to the selection of programs and activities under these regulations? 17.6 Section 17.6 Transportation Office of the Secretary of Transportation INTERGOVERNMENTAL REVIEW OF DEPARTMENT OF TRANSPORTATION PROGRAMS AND ACTIVITIES § 17.6 What...

  5. Design of handoff procedures for broadband wireless access IEEE 802.16 based networks

    Directory of Open Access Journals (Sweden)

    V. Rangel–Licea

    2008-01-01

    Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.

  6. Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards

    Science.gov (United States)

    Sharma, V.; Singh, H.; Malhotra, J.

    2012-12-01

    Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

  7. 28 CFR 30.6 - What procedures apply to the selection of programs and activities under these regulations?

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false What procedures apply to the selection of programs and activities under these regulations? 30.6 Section 30.6 Judicial Administration DEPARTMENT OF... consult with local elected officials. (b) Each state that adopts a process shall notify the Attorney...

  8. A Fast MAC-Layer Handover for an IEEE 802.16e-Based WMAN

    Science.gov (United States)

    Ray, Sayan K.; Pawlikowski, Krzysztof; Sirisena, Harsha

    We propose a modification of the IEEE 802.16e hard handover (HHO) procedure, which significantly reduces the handover latency constraint of the original HHO procedure in IEEE 802.16e networks. It allows a better handling of the delay-sensitive traffic by avoiding unnecessary time-consuming scanning and synchronization activity as well as simplifies the network re-entry procedure. With the help of the backhaul network, it reduces the number of control messages in the original handover policy, making the handover latency acceptable also for real-time streaming traffic. Preliminary performance evaluation studies show that the modified handover procedure is able to reduce the total handover latency by about 50%.

  9. A comparison of 802.11ah and 802.15.4 for IoT

    Directory of Open Access Journals (Sweden)

    N. Ahmed

    2016-09-01

    Full Text Available The emerging IEEE 802.11ah is a promising communication standard that supports a massive number of heterogeneous devices in the Internet of Things (IoT. It provides attractive features like improved scalability, low energy consumption, and coverage of large area. In this paper, we analyze the performance of IEEE 802.11ah, and compare it with a prominent alternative, the IEEE 802.15.4. The simulation results show that the new 802.11ah standard performs better than the 802.15.4 in terms of association time, throughput, delay, and coverage range.

  10. 28 CFR 802.22 - Fees.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Fees. 802.22 Section 802.22 Judicial... Privacy Act § 802.22 Fees. The Agency shall charge fees under the Privacy Act for duplication of records... Information Act (See § 802.10(i)(1)). ...

  11. Evaluation of IEEE 802.11g and 802.16 for Lunar Surface Exploration Missions Using MACHETE Simulations

    Science.gov (United States)

    Segui, John; Jennings, Esther; Vyas, Hemali

    2009-01-01

    In this paper, we investigated the suitability of terrestrial wireless networking technologies for lunar surface exploration missions. Specifically, the scenario we considered consisted of two teams of collaborating astronauts, one base station and one rover, where the base station and the rover have the capability of acting as relays. We focused on the evaluation of IEEE 802.11g and IEEE 802.16 protocols, simulating homogeneous 802.11g network, homogeneous 802.16 network, and heterogeneous network using both 802.11g and 802.16. A mix of traffic flows were simulated, including telemetry, caution and warning, voice, command and file transfer. Each traffic type had its own distribution profile, data volume, and priority. We analyzed the loss and delay trade-offs of these wireless protocols with various link-layer options. We observed that 802.16 network managed the channel better than an 802.11g network due to controlled infrastructure and centralized scheduling. However, due to the centralized scheduling, 802.16 also had a longer delay. The heterogeneous (hybrid) of 802.11/802.16 achieved a better balance of performance in terms of data loss and delay compared to using 802.11 or 802.16 alone.

  12. 32 CFR 246.6 - Procedures.

    Science.gov (United States)

    2010-07-01

    ... costs and to increase the efficiency and effectiveness of these audits. Information copies of the audit... STRIPES (S&S) NEWSPAPER AND BUSINESS OPERATIONS § 246.6 Procedures. (a) General. (1) Authority to...) The Stars and Stripes and the S&S business operations shall conform to applicable regulations and laws...

  13. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  14. 12 CFR 219.6 - Payment procedures.

    Science.gov (United States)

    2010-01-01

    ... obtain payment of costs incurred prior to the time the financial institution receives this notice. [Reg... PROVIDING FINANCIAL RECORDS; RECORDKEEPING REQUIREMENTS FOR CERTAIN FINANCIAL RECORDS (REGULATION S) Reimbursement to Financial Institutions for Providing Financial Records § 219.6 Payment procedures. (a) Notice...

  15. 46 CFR 176.802 - Hull.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Hull. 176.802 Section 176.802 Shipping COAST GUARD... CERTIFICATION Material Inspections § 176.802 Hull. (a) At each initial and subsequent inspection for... ready for inspections of the hull structure and its appurtenances, including the following: (1...

  16. 46 CFR 115.802 - Hull.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Hull. 115.802 Section 115.802 Shipping COAST GUARD....802 Hull. (a) At each initial and subsequent inspection for certification of a vessel, the owner or managing operator shall be prepared to conduct tests and have the vessel ready for inspections of the hull...

  17. Traffic Prioritisation in 802.15.6 MAC – Analysis of its CSMA/CA Algorithm and Proposals for Improvement

    Directory of Open Access Journals (Sweden)

    M. Bukvić

    2015-06-01

    Full Text Available This paper focuses on the treatment of uplink traffic of the highest data priority, i.e. Emergency traffic in the 802.15.6 standard for a wireless body area network (WBAN. This standard is one of the choices available for the so-called wearable Internet or wireless connection between electronic devices worn on or implanted in the human body. The features for positive discrimination of emergency traffic are identified at three different components in the 802.15.6 standard in order to emphasize the importance of its prioritized delivery that must be always preserved due to potential applications in the field of monitoring of health variables. However, prioritization could be compromised by the anomaly in the medium access under contention algorithms in standard 802.15.6. That is the reason that we find it appropriate to address the anomaly, i.e. to describe a sequence of packets that can bring a station into the state in which it sends highest-priority data frames with the parameters of the back-off algorithm used for traffic with a significantly lower priority and thus reduces the station’s chances to access the medium. The main contribution of this work is to identify the set of five conditions that must be met at the same time in order to make the anomaly to appear, and explain that the scene for anomaly manifestation would be set up periodically in secured communication. We provide a simulation study and discussion on the available solutions for preventing this anomaly including a minor change to the algorithm at the level of the standard.

  18. Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCA in Non-saturation Condition

    Science.gov (United States)

    Kim, Tae Ok; Kim, Kyung Jae; Choi, Bong Dae

    We analyze the MAC performance of the IEEE 802.11 DCF and 802.11e EDCA in non-saturation condition where device does not have packets to transmit sometimes. We assume that a flow is not generated while the previous flow is in service and the number of packets in a flow is geometrically distributed. In this paper, we take into account the feature of non-saturation condition in standards: possibility of transmission performed without preceding backoff procedure for the first packet arriving at the idle station. Our approach is to model a stochastic behavior of one station as a discrete time Markov chain. We obtain four performance measures: normalized channel throughput, average packet HoL (head of line) delay, expected time to complete transmission of a flow and packet loss probability. Our results can be used for admission control to find the optimal number of stations with some constraints on these measures.

  19. Active Channel Reservation for Coexistence Mechanism (ACROS) for IEEE 802.15.4 and IEEE 802.11

    Science.gov (United States)

    Shin, Soo Young; Woo, Dong Hyuk; Lee, Jong Wook; Park, Hong Seong; Kwon, Wook Hyun

    In this paper, a coexistence mechanism between IEEE 802.15.4 and IEEE 802.11b, Active Channel Reservation for cOexiStence (ACROS), is proposed. The key idea underlining ACROS is to reserve the channel for IEEE 802.15.4 transmission, where IEEE 802.11 transmissions are forbidden. The request-to-send (RTS)/clear-to send (CTS) mechanism within IEEE 802.11 is used to reserve a channel. The proposed ACROS mechanism is implemented into a PC based prototype. The embedded version of ACROS is also developed to mitigate the timing drift problem in the PC-based ACROS. The efficiency of ACROS is shown using the throughput and packet error rate achieved in actual experiments.

  20. Dicty_cDB: CHN802 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available CH (Link to library) CHN802 (Link to dictyBase) - - - Contig-U16336-1 CHN802P (Link... to Original site) CHN802F 543 CHN802Z 788 CHN802P 1311 - - Show CHN802 Library CH (Link to library) Clone ID CHN802 (Link to dict...yBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig Contig-U16336-1 Original site URL http://dict...ASFKIVEVMSCNKFSSKRIGYLAASQSFNEGTDVIVLATHQIRKDFLSSN QSEAYLALNCLSNICTTDLARELANDILTLLSTQKTHILKRAITVLYKIFLRYPESL...NETKFINQCINEIKEELKGDMQKKTVAVQKLTY IQMLGFDISWASFKIVEVMSCNKFSSKRIGYLAASQSFNEGTDVIVLATHQIRKDFLSSN QSEAYLALNCLSNICT

  1. Traffic Regulation on Wireless 802.11 Networks Using Multiple Queue Technique

    Science.gov (United States)

    Dhanal, Radhika J.; Patil, G. A.

    2010-11-01

    WLAN technologies are becoming increasingly popular and are platform for many future applications. IEEE 802.11 Wireless LAN (WLAN) is an excellent solution for the broadband wireless networking. This paper presents a simple approach to enhance the performance of real time (RT) and non-real time (NRT) services over the 802.11 WLAN by using some special queues. This requires the system to first identify the type of service and then use the appropriate scheduling algorithm. The admission control algorithm is used first to determine the admission of particular station. Deficit round robin algorithm is used to set the priorities to RT and NRT packets in order to increase the QoS of WLAN. So we can combine both these algorithms by implementing them one after another. The proposed scheme can improve Voice/Data/Video services through simple software upgrades by reducing the delay, jitter and increasing the throughput. Through simulation, we show that the proposed scheme can give better QoS than existing schemes.

  2. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications

    Science.gov (United States)

    Mišić, Jelena; (Sherman) Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184

  3. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications.

    Science.gov (United States)

    Misić, Jelena; Sherman Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

  4. Simulasi Kinerja Jaringan Nirkabel IEEE-802.11a dan IEEE-802.11g Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Helm Fitriawan

    2014-03-01

    Full Text Available Wireless network uses transmission media based on radio waves. This type of networks is mainly useddue to its efficiency and mobility in data exchanging. This paper reports the modeling and simulation of wirelessnetworks based on Cisco Aironet 1130ag access point devices with IEEE 802.11a and IEEE 802.11g standards. Themodeling and simulation are performed using network simulator version 2 (NS-2 that is installed on operationsystem Linux Ubuntu v.10.10. The NS-2 is commonly used and works well in numerous types of network simulation. From simulation, we obtain quality of service parameters by employing several simulation scenarios in terms ofnumber of nodes, distances, and packet data sizes. It can be concluded from simulation results that the IEEE 802.11gnetworks transfer data with better quality than those of IEEE 802.11a networks.  Furthermore, the IEEE 802.11gnetworks provide a higher throughput, with smaller amount of delay and packet loss percentage compared to thoseof IEEE 802.11a networks.

  5. Path loss variation of on-body UWB channel in the frequency bands of IEEE 802.15.6 standard.

    Science.gov (United States)

    Goswami, Dayananda; Sarma, Kanak C; Mahanta, Anil

    2016-06-01

    The wireless body area network (WBAN) has gaining tremendous attention among researchers and academicians for its envisioned applications in healthcare service. Ultra wideband (UWB) radio technology is considered as excellent air interface for communication among body area network devices. Characterisation and modelling of channel parameters are utmost prerequisite for the development of reliable communication system. The path loss of on-body UWB channel for each frequency band defined in IEEE 802.15.6 standard is experimentally determined. The parameters of path loss model are statistically determined by analysing measurement data. Both the line-of-sight and non-line-of-sight channel conditions are considered in the measurement. Variations of parameter values with the size of human body are analysed along with the variation of parameter values with the surrounding environments. It is observed that the parameters of the path loss model vary with the frequency band as well as with the body size and surrounding environment. The derived parameter values are specific to the particular frequency bands of IEEE 802.15.6 standard, which will be useful for the development of efficient UWB WBAN system.

  6. 42 CFR 417.802 - Allowable costs.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Allowable costs. 417.802 Section 417.802 Public... PLANS Health Care Prepayment Plans § 417.802 Allowable costs. (a) General rule. The costs that are considered allowable for HCPP reimbursement are the same as those for reasonable cost HMOs and CMPs specified...

  7. 21 CFR 172.802 - Acetone peroxides.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Acetone peroxides. 172.802 Section 172.802 Food and... Multipurpose Additives § 172.802 Acetone peroxides. The food additive acetone peroxides may be safely used in... acetone peroxide, with minor proportions of higher polymers, manufactured by reaction of hydrogen peroxide...

  8. A coexistence model of IEEE 802.15.4 and IEEE 802.1 lbIg

    NARCIS (Netherlands)

    Yuan, Wei; Wang, Xiangyu; Linnartz, J.P.M.G.

    2007-01-01

    IEEE 802.15.4 was developed to meet the needs for low-rate wireless communication. However, due to its low power, IEEE 802.15.4 is potentially vulnerable to interference by other wireless technologies having much higher power and working in the same industrial, scientific, and medical (ISM) band

  9. KIH-802: 2-nitroimidazole-1-acetohydroxamate as a hypoxic cell radiosensitizer

    International Nuclear Information System (INIS)

    Hori, H.; Murayama, C.; Mori, T.; Shibamoto, Y.; Abe, M.; Onoyama, Y.; Inayama, S.

    1989-01-01

    We have identified potassium 2-nitroimidazole-1-acetohydroxamate (KIH-802) as a hypoxic cell radiosensitizer potentially superior to Miso. The water-soluble acetohydroxamates of 2-nitroimidazole (KIH-802; free acid 801) and 4-nitroimidazole (KIH-852) were designed, synthesized, and evaluated by in vitro and in vivo screening against EMT6 cells. Enhancement ratios of KIH-802 and 801 were 1.92 and 1.68, respectively, compared with 1.58 for MISO all at 1 mM. These acetohydroxamates are also expected to be more effective in vitro than SR-2508 based on our previous experiments. In vivo ERs of KIH-802, 801, and 852 were 1.75, 1.50, and 1.35, respectively, compared with 1.57 for MISO all at the same dose of 200 mg/kg. The data clearly show that the addition of an acetohydroxamic acid moiety to the 2-nitroimidazole skeleton can enhance radiosensitizing ability

  10. 28 CFR 802.26 - Receipt of demand.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Receipt of demand. 802.26 Section 802.26... DISCLOSURE OF RECORDS Subpoenas or Other Legal Demands for Testimony or the Production or Disclosure of Records or Other Information § 802.26 Receipt of demand. If, in connection with a proceeding to which the...

  11. 802.11 Wireless Networks The Definitive Guide

    CERN Document Server

    Gast, Matthew S

    2005-01-01

    As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware avail

  12. 30 CFR 227.802 - How will MMS terminate a State's delegation agreement?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How will MMS terminate a State's delegation... MINERALS REVENUE MANAGEMENT DELEGATION TO STATES Performance Review § 227.802 How will MMS terminate a State's delegation agreement? This section explains the procedures MMS will use to terminate all or a...

  13. Standardy 802.11n a 802.11e v bezdrátových sítích

    OpenAIRE

    Novák, Ondřej

    2009-01-01

    Tato bakalářská práce je zaměřena na problematiku standardů bezdrátových sítí. Teoreticky popisuje nejznámější standardy skupiny standardů IEEE 802.11, jejich funkce a chování. Dále práce podrobněji rozebírá nový standard 802.11n a specifikaci standardu 802.11e, WMM. Práce obsahuje zprávu o praktických testech standardů 802.11n a WMM, které slouží pro objektivní posouzení schopností těchto standardů. This bachelor thesis is focused on broad issue of wireless network standards. It theoretic...

  14. 21 CFR 524.802 - Enrofloxacin, silver sulfadiazine emulsion.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Enrofloxacin, silver sulfadiazine emulsion. 524... ANIMAL DRUGS § 524.802 Enrofloxacin, silver sulfadiazine emulsion. (a) Specifications. Each milliliter contains 5 milligrams (mg) enrofloxacin and 10 mg silver sulfadiazine. (b) Sponsor. See No. 000859 in § 510...

  15. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Pichet Ritthisoonthorn

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  16. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  17. Fiber optics backbone for IEEE 802.3 networks

    Science.gov (United States)

    Shani, Ron

    1990-01-01

    In the last few years the IEEE 802.3 committee has developed fiber optics inter-repeater link standard called FOIRL. This standard defines the "Fiber Optics Media Access Unit" (FOMAU) which is used to connect two IEEE 802.3 repeaters that are up to 1Km apart. The IEEE 802.3 lOBaseF task force is currently standardizing a full F/O system in two directions: passive and active. The active approach is a compromise between the FOIRL (Asynchronous) approach and the Synchronous approach. As a result of this activity the IEEE 802.3 standard will define three different F/O interfaces and several devices that will not inter-operate. Such a standard will lower the credibility among the IEEE 802.3 user community, as customers will be confused amidst the many chapters and devices with no clear choice. This paper describes a method that can reduce the number of standards to two (passive and active), while proposing a solution for all the requirements of 802.3 F/O LAN. (The question of passive vs active approach will be discussed in this paper).

  18. Applying Game Theory in 802.11 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Tomas Cuzanauskas

    2015-07-01

    Full Text Available IEEE 802.11 is one of the most popular wireless technologies in recent days. Due to easiness of adaption and relatively low cost the demand for IEEE 802.11 devices is increasing exponentially. IEEE works in two bands 2.4 GHz and 5 GHz, these bands are known as ISM band. The unlicensed bands are managed by authority which set simple rules to follow when using unlicensed bands, the rules includes requirements as maximum power, out-of-band emissions control as well as interference mitigation. However these rules became outdated as IEEE 802.11 technology is emerging and evolving in hours the rules aren’t well suited for current capabilities of IEEE 802.11 devices. In this article we present game theory based algorithm for IEEE 802.11 wireless devices, we will show that by using game theory it’s possible to achieve better usage of unlicensed spectrum as well as partially decline CSMA/CA. Finally by using this approach we might relax the currently applied maximum power rules for ISM bands, which enable IEEE 802.11 to work on longer distance and have better propagation characteristics.

  19. 5 CFR 2635.802 - Conflicting outside employment and activities.

    Science.gov (United States)

    2010-01-01

    ... activities. 2635.802 Section 2635.802 Administrative Personnel OFFICE OF GOVERNMENT ETHICS GOVERNMENT ETHICS STANDARDS OF ETHICAL CONDUCT FOR EMPLOYEES OF THE EXECUTIVE BRANCH Outside Activities § 2635.802 Conflicting... use chemical solvents has been offered a consulting contract to provide advice to an affected company...

  20. Impact of cell load on 5GHz IEEE 802.11 WLAN

    OpenAIRE

    Abu-Tair, Mamoun; Bhatti, Saleem Noel

    2017-01-01

    We have conducted an empirical study of the latest 5GHz IEEE 802.11 wireless LAN (WLAN) variants of 802.11n (5GHz) and 802.11ac (Wave 1), under different cell load conditions. We have considered typical configurations of both protocols on a Linux testbed. Under light load,there is no clear difference between 802.11n and 802.11ac in terms of performance and energy consumption. However, in some cases of high cell load, we have found that there may be a small advantage with 802.11ac. Overall, we...

  1. 25 CFR 170.802 - How is road maintenance funded?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How is road maintenance funded? 170.802 Section 170.802 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAND AND WATER INDIAN RESERVATION ROADS PROGRAM BIA Road Maintenance § 170.802 How is road maintenance funded? (a) The U.S. Congress funds a BIA...

  2. 50 CFR 32.6 - What are the procedures for publication of refuge-specific sport fishing regulations?

    Science.gov (United States)

    2010-10-01

    ... refuge-specific sport fishing regulations? 32.6 Section 32.6 Wildlife and Fisheries UNITED STATES FISH... sport fishing regulations? (a) Refuge-specific fishing regulations are issued only at the time of or after the opening of a wildlife refuge area to sport fishing. (b) Refuge-specific fishing regulations...

  3. An 802.11k Compliant Framework for Cooperative Handoff in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Korakis Thanasis

    2009-01-01

    Full Text Available Abstract In IEEE 802.11-based wireless networks, the stations (STAs are associated with the available access points (APs and communicate through them. In traditional handoff schemes, the STAs get information about the active APs in their neighborhood by scanning the available channels and listening to transmitted beacons. This paper proposes an 802.11k compliant framework for cooperative handoff where the STAs are informed about the active APs by exchanging information with neighboring STAs. Besides, the APs share useful information that can be used by the STAs in a handoff process. In this way, we minimize the delay of the scanning procedure. We evaluate the performance of our mechanisms through OPNET simulations. We demonstrate that our scheme reduces the scanning delay up to 92%. Consequently, our system is more capable in meeting the needs of QoS-sensitive applications.

  4. 28 CFR 802.13 - Verifying your identity.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Verifying your identity. 802.13 Section... COLUMBIA DISCLOSURE OF RECORDS Privacy Act § 802.13 Verifying your identity. (a) Requests for your own records. When you make a request for access to records about yourself, you must verify your identity. You...

  5. 28 CFR 802.20 - Accounting of disclosures.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Accounting of disclosures. 802.20 Section... COLUMBIA DISCLOSURE OF RECORDS Privacy Act § 802.20 Accounting of disclosures. (a) We will provide an accounting of all disclosures of a record for five years or until the record is destroyed, whichever is...

  6. Recent results from E802 and E859

    International Nuclear Information System (INIS)

    Zajc, W.A.

    1991-01-01

    Recent single-particle inclusive measurements and two-particle correlation data from E802 and its successor, E859, are presented. The K + /π + ratio observed for collisions of 14.6 A· 28 Si ions on various targets is presented as a function of both forward and transverse energy. Source sizes are determined via interferometry using π + , π - , K + and proton pairs

  7. 32 CFR 145.6 - Procedures.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Procedures. 145.6 Section 145.6 National Defense... THE OFFICE OF SPECIAL COUNSEL OF THE MERIT SYSTEMS PROTECTION BOARD § 145.6 Procedures. (a... corrective or disciplinary action considered appropriate because of facts disclosed by such an investigation...

  8. 802.11s Wireless Mesh Network Visualization Application

    Science.gov (United States)

    Mauldin, James Alexander

    2014-01-01

    Results of past experimentation at NASA Johnson Space Center showed that the IEEE 802.11s standard has better performance than the widely implemented alternative protocol B.A.T.M.A.N (Better Approach to Mobile Ad hoc Networking). 802.11s is now formally incorporated into the Wi- Fi 802.11-2012 standard, which specifies a hybrid wireless mesh networking protocol (HWMP). In order to quickly analyze changes to the routing algorithm and to support optimizing the mesh network behavior for our intended application a visualization tool was developed by modifying and integrating open source tools.

  9. 20 CFR 408.802 - When will we suspend your SVB payments?

    Science.gov (United States)

    2010-04-01

    ....802 Section 408.802 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Suspensions and Terminations Suspension § 408.802 When will we suspend your SVB... underway for a substitute representative payee.) (b) Effect of suspension. When we correctly suspend your...

  10. Fingerprinting 802.11 Devices

    National Research Council Canada - National Science Library

    Ellch, Jonathan P

    2006-01-01

    The research presented in this thesis provides the reader with a set of algorithms and techniques that enable the user to remotely determine what chipset and device driver an 802.11 device is using...

  11. Enhancing PMIPv6 for Better Handover Performance among Heterogeneous Wireless Networks in a Micromobility Domain

    Directory of Open Access Journals (Sweden)

    Magagula LinohA

    2010-01-01

    Full Text Available This paper analyzes the reduction of handover delay in a network-based localized mobility management framework assisted by IEEE 802.21 MIH services. It compares the handover signaling procedures with host-based localized MIPv6 (HMIPv6, with network-based localized MIPv6 (PMIPv6, and with PMIPv6 assisted by IEEE 802.21 to show how much handover delay reduction can be achieved. Furthermore, the paper proposes and gives an in-depth analysis of PMIPv6 optimized with a handover coordinator (HC, which is a network-based entity, to further improve handover performance in terms of handover delay and packet loss while maintaining minimal signaling overhead in the air interface among converged heterogeneous wireless networks. Simulation and analytical results show that indeed handover delay and packet loss are reduced.

  12. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  13. Low latency adaptive streaming of HD H.264 video over 802.11 wireless networks with cross-layer feedback

    Science.gov (United States)

    Patti, Andrew; Tan, Wai-tian; Shen, Bo

    2007-09-01

    Streaming video in consumer homes over wireless IEEE 802.11 networks is becoming commonplace. Wireless 802.11 networks pose unique difficulties for streaming high definition (HD), low latency video due to their error-prone physical layer and media access procedures which were not designed for real-time traffic. HD video streaming, even with sophisticated H.264 encoding, is particularly challenging due to the large number of packet fragments per slice. Cross-layer design strategies have been proposed to address the issues of video streaming over 802.11. These designs increase streaming robustness by imposing some degree of monitoring and control over 802.11 parameters from application level, or by making the 802.11 layer media-aware. Important contributions are made, but none of the existing approaches directly take the 802.11 queuing into account. In this paper we take a different approach and propose a cross-layer design allowing direct, expedient control over the wireless packet queue, while obtaining timely feedback on transmission status for each packet in a media flow. This method can be fully implemented on a media sender with no explicit support or changes required to the media client. We assume that due to congestion or deteriorating signal-to-noise levels, the available throughput may drop substantially for extended periods of time, and thus propose video source adaptation methods that allow matching the bit-rate to available throughput. A particular H.264 slice encoding is presented to enable seamless stream switching between streams at multiple bit-rates, and we explore using new computationally efficient transcoding methods when only a high bit-rate stream is available.

  14. Take control of your 802.11n airport network

    CERN Document Server

    Fleishman, Glenn

    2009-01-01

    Make your 802.11n-based AirPort network fast, reliable, and secure! Find real-world advice from Wi-Fi wizard Glenn Fleishman on setting up the 802.11n models of Apple's AirPort Express, AirPort Extreme, and Time Capsule, with full information about the simultaneous dual-band models introduced in early 2009. You'll get help with all the special networking details, such as how to set the best band and channel for your network, use pre-802.11n base stations and clients without hurting performance, set up complex Int

  15. Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices

    Directory of Open Access Journals (Sweden)

    Pieter Robyns

    2017-01-01

    Full Text Available We present two novel noncooperative MAC layer fingerprinting and tracking techniques for Wi-Fi (802.11 enabled mobile devices. Our first technique demonstrates how a per-bit entropy analysis of a single captured frame allows an adversary to construct a fingerprint of the transmitter that is 80.0 to 67.6 percent unique for 50 to 100 observed devices and 33.0 to 15.1 percent unique for 1,000 to 10,000 observed devices. We show how existing mitigation strategies such as MAC address randomization can be circumvented using only this fingerprint and temporal information. Our second technique leverages peer-to-peer 802.11u Generic Advertisement Service (GAS requests and 802.11e Block Acknowledgement (BA requests to instigate transmissions on demand from devices that support these protocols. We validate these techniques using two datasets, one of which was recorded at a music festival containing 28,048 unique devices and the other at our research lab containing 138 unique devices. Finally, we discuss a number of countermeasures that can be put in place by mobile device vendors in order to prevent noncooperative tracking through the discussed techniques.

  16. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 μm CMOS

    International Nuclear Information System (INIS)

    Wu Bin; Zhou Yumei; Zhu Yongxu; Zhang Zhengdong; Cai Jingjing

    2011-01-01

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 μm 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 x 2.6 mm 2 area and consumes 83 mW under typical work modes. (semiconductor integrated circuits)

  17. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 μm CMOS

    Science.gov (United States)

    Bin, Wu; Yumei, Zhou; Yongxu, Zhu; Zhengdong, Zhang; Jingjing, Cai

    2011-05-01

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 μm 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 × 2.6 mm2 area and consumes 83 mW under typical work modes.

  18. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 {mu}m CMOS

    Energy Technology Data Exchange (ETDEWEB)

    Wu Bin; Zhou Yumei; Zhu Yongxu; Zhang Zhengdong; Cai Jingjing, E-mail: wubin@ime.ac.cn [Institute of Microelectronics, Chinese Academy of Sciences, Beijing 100029 (China)

    2011-05-15

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 {mu}m 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 x 2.6 mm{sup 2} area and consumes 83 mW under typical work modes. (semiconductor integrated circuits)

  19. Regulations and Procedures Manual

    Energy Technology Data Exchange (ETDEWEB)

    Young, Lydia J. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2011-07-25

    The purpose of the Regulations and Procedures Manual (RPM) is to provide LBNL personnel with a reference to University and Lawrence Berkeley National Laboratory (LBNL or Laboratory) policies and regulations by outlining normal practices and answering most policy questions that arise in the day-to-day operations of Laboratory organizations. Much of the information in this manual has been condensed from detail provided in LBNL procedure manuals, Department of Energy (DOE) directives, and Contract DE-AC02-05CH11231. This manual is not intended, however, to replace any of those documents. RPM sections on personnel apply only to employees who are not represented by unions. Personnel policies pertaining to employees represented by unions may be found in their labor agreements. Questions concerning policy interpretation should be directed to the LBNL organization responsible for the particular policy. A link to the Managers Responsible for RPM Sections is available on the RPM home page. If it is not clear which organization is responsible for a policy, please contact Requirements Manager Lydia Young or the RPM Editor.

  20. Regulations and Procedures Manual

    Energy Technology Data Exchange (ETDEWEB)

    Young, Lydia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2010-09-30

    The purpose of the Regulations and Procedures Manual (RPM) is to provide Laboratory personnel with a reference to University and Lawrence Berkeley National Laboratory policies and regulations by outlining the normal practices and answering most policy questions that arise in the day-to-day operations of Laboratory departments. Much of the information in this manual has been condensed from detail provided in Laboratory procedure manuals, Department of Energy (DOE) directives, and Contract DE-AC02-05CH11231. This manual is not intended, however, to replace any of those documents. The sections on personnel apply only to employees who are not represented by unions. Personnel policies pertaining to employees represented by unions may be found in their labor agreements. Questions concerning policy interpretation should be directed to the department responsible for the particular policy. A link to the Managers Responsible for RPM Sections is available on the RPM home page. If it is not clear which department should be called, please contact the Associate Laboratory Director of Operations.

  1. TCP Performance in Multi-Polling Game Theory-Based IEEE 802.11 Networks

    Directory of Open Access Journals (Sweden)

    Cuzanauskas Tomas

    2016-12-01

    Full Text Available Easy usage and integration with various applications made IEEE 802.11 one of the most used technologies these days, both at home and business premises. Over the years, there have been many additional improvements to the 802.11 standards. Nevertheless, the algorithms and Media Access Control (MAC layer methods are almost the same as in previous Wi-Fi versions. In this paper, a set of methods to improve the total system capacity is proposed – such as efficient transmit power management based on Game Theory with a custom wireless medium protocol. The transmit power management and wireless medium protocol is verified by both simulation and real application scenarios. The results conclude that the capacity of the proposed wireless medium protocol is overall 20 percent higher than the standard 802.11 wireless medium access protocols. Additional TCP Acknowledgment filtering, which was tested together with the proposed wireless medium access protocol, can provide up to 10-percent-higher TCP throughput in high-density scenarios, especially for asymmetrical traffic cases. The conducted research suggests that efficient power management could result in lighter transmit power allocation rules that are currently set by the local regulators for current Wi-Fi devices. Thus, better propagation characteristics and wireless medium management would lead to an overall higher wireless system capacity.

  2. 47 CFR 76.802 - Disposition of cable home wiring.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Disposition of cable home wiring. 76.802... MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Cable Inside Wiring § 76.802 Disposition of cable home wiring. (a)(1) Upon voluntary termination of cable service by a subscriber in a single unit installation, a...

  3. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Marco Passafiume

    2017-03-01

    Full Text Available Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.

  4. An Improved Approach for RSSI-Based only Calibration-Free Real-Time Indoor Localization on IEEE 802.11 and 802.15.4 Wireless Networks.

    Science.gov (United States)

    Passafiume, Marco; Maddio, Stefano; Cidronali, Alessandro

    2017-03-29

    Assuming a reliable and responsive spatial contextualization service is a must-have in IEEE 802.11 and 802.15.4 wireless networks, a suitable approach consists of the implementation of localization capabilities, as an additional application layer to the communication protocol stack. Considering the applicative scenario where satellite-based positioning applications are denied, such as indoor environments, and excluding data packet arrivals time measurements due to lack of time resolution, received signal strength indicator (RSSI) measurements, obtained according to IEEE 802.11 and 802.15.4 data access technologies, are the unique data sources suitable for indoor geo-referencing using COTS devices. In the existing literature, many RSSI based localization systems are introduced and experimentally validated, nevertheless they require periodic calibrations and significant information fusion from different sensors that dramatically decrease overall systems reliability and their effective availability. This motivates the work presented in this paper, which introduces an approach for an RSSI-based calibration-free and real-time indoor localization. While switched-beam array-based hardware (compliant with IEEE 802.15.4 router functionality) has already been presented by the author, the focus of this paper is the creation of an algorithmic layer for use with the pre-existing hardware capable to enable full localization and data contextualization over a standard 802.15.4 wireless sensor network using only RSSI information without the need of lengthy offline calibration phase. System validation reports the localization results in a typical indoor site, where the system has shown high accuracy, leading to a sub-metrical overall mean error and an almost 100% site coverage within 1 m localization error.

  5. Revisión del estado del arte deIR-Ultra-Wideband y simulación de la respuesta impulsiva del canal IEEE802.15.4a Review of the state of art of IR-Ultra-Wideband and simulation of Impulse Responce of the IEEE 802.15.4a channel

    Directory of Open Access Journals (Sweden)

    Julio Suárez Páez

    2010-06-01

    Full Text Available Este artículo realiza una revisión del estado del arte de la tecnología basada en canales de Banda Ultra Ancha (UWB, Ultra–Wideband enfocándose en su regulación, estandarización, aplicaciones básicas, modelo de canal IEEE 802.15.4a y simulación de la respuesta impulsiva de este tipo de canal. También se pretende introducir al lector en las tecnologías basadas en canales IR–UWB y en los parámetros para el modelamiento y simulación del canal UWB IEEE 802.15.4a.This paper reviews the state of the art of the technology based in channels of Ultra Wide band (UWB Ultra–Wideband focusing on its regulation, standardization, basic applications, IEEE 802.15.4a channel model and simulation of the impulsive response of this type of channel. Also, it aims to introduce the reader to the technologies based on IR–UWB channels and the parameters for modeling and simulation of IEEE 802.15.4a UWB channel.

  6. Diseño y verificación de un amplificador para IEEE802.16

    OpenAIRE

    Lloret Arjona, Patricia

    2005-01-01

    Hace más de 6 años se empezó a gestar el IEEE802.16, un estándar para una nueva tecnología inalámbrica de banda ancha. El primer capítulo consiste en una introducción sobre este estándar, su evolución, las diferentes versiones que han ido apareciendo y las características principales de cada una de ellas, seguido de un pequeño comentario sobre su faceta comercial, WiMAX. El IEEE802.16 está empezando a tener relevancia, de modo que se decidió realizar un amplificador capaz de...

  7. 32 CFR 162.6 - Procedures.

    Science.gov (United States)

    2010-07-01

    ... Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DEFENSE CONTRACTING PRODUCTIVITY ENHANCING CAPITAL INVESTMENT (PECI) § 162.6 Procedures. The following procedures shall be followed by the DoD Components in the... documentation, pre-investment analysis, financing, and post-investment accountability of PECI projects, when DoD...

  8. Low-power secure body area network for vital sensors toward IEEE802.15.6.

    Science.gov (United States)

    Kuroda, Masahiro; Qiu, Shuye; Tochikubo, Osamu

    2009-01-01

    Many healthcare/medical services have started using personal area networks, such as Bluetooth and ZigBee; these networks consist of various types of vital sensors. These works focus on generalized functions for sensor networks that expect enough battery capacity and low-power CPU/RF (Radio Frequency) modules, but less attention to easy-to-use privacy protection. In this paper, we propose a commercially-deployable secure body area network (S-BAN) with reduced computational burden on a real sensor that has limited RAM/ROM sizes and CPU/RF power consumption under a light-weight battery. Our proposed S-BAN provides vital data ordering among sensors that are involved in an S-BAN and also provides low-power networking with zero-administration security by automatic private key generation. We design and implement the power-efficient media access control (MAC) with resource-constraint security in sensors. Then, we evaluate the power efficiency of the S-BAN consisting of small sensors, such as an accessory type ECG and ring-type SpO2. The evaluation of power efficiency of the S-BAN using real sensors convinces us in deploying S-BAN and will also help us in providing feedbacks to the IEEE802.15.6 MAC, which will be the standard for BANs.

  9. 13 CFR 120.802 - Definitions.

    Science.gov (United States)

    2010-01-01

    ....802 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Development Company... Debenture Proceeds are the portion of Debenture proceeds that finance eligible Project costs (excluding... a commercial or private lender, investor, or Federal (non-SBA), State or local government source...

  10. 802.11 Basic Concepts and Mechanisms for ‎Network Building Management System

    Directory of Open Access Journals (Sweden)

    Aseil Nadhum Kadhum

    2018-02-01

    Full Text Available This research aims at providing the reader with a demonstration of the very standards for wireless networks. We all know IEEE 802.11 and types of scale but what are the differences between the technical and privileges diverse flavors? What is meant by "technically" that level as ten times faster than the level p? Not only cover the creation of this research on the IEEE 802.11 wireless networking standards the most comprehensive, but also pave the modern standard for broadband wireless IEEE 802.11 (Wi-Fi. This paper presents also a trade-off between different technology standards in terms of the extent of coverage, the possibility of expanding the service feature in order to help accommodate the fundamental disparity between these term IEEE 802.11 (LAN RF family of standards for networks .difference between IEEE 802.11 base modifications (a/b/g, etc. in the coding techniques, frequency range and change for the best made the original style of approach to the IEEE 802.11 standard layout (Wi-Fi is intended to be a solution with large cells rapid foreign networks, while Wi-Fi standard plans (802.11 is intended to be a solution for networks operating within the buildings based on the few cells

  11. At R802

    CERN Multimedia

    1974-01-01

    The photo shows on the middle some of the MWPCs of the spectrometer. The experiment R802 was set up by the CERN-Rome Collaboration to study negative particles at angles close to 0 deg. It required special vacuum chambers with enlarged horizontal dimensions and very thin metal windows for insertion in two magnet units adjacent to I-8 (Annual Report 1973 p. 120 and 1974, p. 108). Martin Wensveen stands on the centre, left.

  12. 5 CFR 2634.802 - Requirements.

    Science.gov (United States)

    2010-01-01

    ... ethics agreements. Example: An official of the ABC Aircraft Company is nominated to a Department of... Administrative Personnel OFFICE OF GOVERNMENT ETHICS GOVERNMENT ETHICS EXECUTIVE BRANCH FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Ethics Agreements § 2634.802 Requirements. (a) Ethics...

  13. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    Science.gov (United States)

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  14. 45 CFR 660.6 - What procedures apply to the selection of programs and activities under these regulations?

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false What procedures apply to the selection of programs... Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION INTERGOVERNMENTAL REVIEW OF THE NATIONAL SCIENCE FOUNDATION PROGRAMS AND ACTIVITIES § 660.6 What procedures apply to the selection of programs and activities...

  15. 40 CFR 260.41 - Procedures for case-by-case regulation of hazardous waste recycling activities.

    Science.gov (United States)

    2010-07-01

    ... of hazardous waste recycling activities. 260.41 Section 260.41 Protection of Environment... Rulemaking Petitions § 260.41 Procedures for case-by-case regulation of hazardous waste recycling activities... hazardous waste recycling activities described in § 261.6(a)(2)(iii) under the provisions of § 261.6 (b) and...

  16. 48 CFR 1408.802 - Policy.

    Science.gov (United States)

    2010-10-01

    ... PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Printing and Related Supplies 1408.802... the aggregate of multiple pages. Such duplicating units shall require Departmental approval to be... to 2,500 production units in the aggregate of multiple pages. This volume standard is referred to as...

  17. Design and Implementation of an Enhanced 802.11 MAC Architecture for Single-Hop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ralph Bernasconi

    2007-01-01

    Full Text Available Due to its extreme simplicity and flexibility, the IEEE 802.11 standard is the dominant technology to implement both infrastructure-based WLANs and single-hop ad hoc networks. In spite of its popularity, there is a vast literature demonstrating the shortcomings of using the 802.11 technology in such environments, such as dramatic degradation of network capacity as contention increases and vulnerability to external interferences. Therefore, the design of enhancements and optimizations for the original 802.11 MAC protocol has been a very active research area in the last years. However, all these modifications to the 802.11 MAC protocol were validated only through simulations and/or analytical investigations. In this paper, we present a very unique work as we have designed a flexible hardware/software platform, fully compatible with current implementations of the IEEE 802.11 technology, which we have used to concretely implement and test an enhanced 802.11 backoff algorithm. Our experimental results clearly show that the enhanced mechanism outperforms the standard 802.11 MAC protocol in real scenarios.

  18. 21 CFR 120.6 - Sanitation standard operating procedures.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Sanitation standard operating procedures. 120.6... Provisions § 120.6 Sanitation standard operating procedures. (a) Sanitation controls. Each processor shall have and implement a sanitation standard operating procedure (SSOP) that addresses sanitation...

  19. Voice Communications over 802.11 Ad Hoc Networks: Modeling, Optimization and Call Admission Control

    Science.gov (United States)

    Xu, Changchun; Xu, Yanyi; Liu, Gan; Liu, Kezhong

    Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MAC layer. The model is applied for performance analysis of voice communications over IEEE 802.11 single-hop ad hoc networks. By using the model, we finish the performance optimization of IEEE MAC layer and obtain the maximum number of voice calls in IEEE 802.11 ad hoc networks as well as the statistical performance bounds. Furthermore, we design a fully distributed call admission control (CAC) algorithm which can provide strict statistical QoS guarantee for voice communications over IEEE 802.11 ad hoc networks. Extensive simulations indicate the accuracy of the analytical model and the CAC scheme.

  20. Energy Harvesting - Wireless Sensor Networks for Indoors Applications Using IEEE 802.11

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Sørensen, Thomas; Madsen, Jan

    2014-01-01

    The paper investigates the feasibility of using IEEE 802.11 in energy harvesting low-power sensing applications. The investigation is based on a prototype carbon dioxide sensor node that is powered by artificial indoors light. The wireless communication module of the sensor node is based on the RTX......4100 module. RTX4100 incorporates a wireless protocol that duty-cycles the radio while being compatible with IEEE 802.11 access points. The presented experiments demonstrate sustainable operation but indicate a trade-off between the benefits of using IEEE 802.11 in energy harvesting applications...

  1. A review of recent E802 results

    International Nuclear Information System (INIS)

    Kaufman, S.; Videbaek, F.; Beavis, D.; Bond, P.D.; Chasman, C.; Chen, Z.; Chu, Y.Y.; Cumming, J.B.; Debbe, R.; Gushue, S.; Hansen, O.; Katcoff, S.; Levine, M.J.; Miake, Y.; Moskowitz, B.; Olness, J.; Remsberg, L.P.; Shor, A.; Tanaka, M.; Tannenbaum, M.J.; Van Dijk, J.H.; Vincent, P.; Wegner, H.E.; Engelage, J.; Crawford, H.J.; Juricic, I.; Kurita, K.; Nagamiya, S.; Stankus, P.; Wu, Y.D.; Zajc, W.; Akiba, Y.; Hamagaki, H.; Hayashi, S.; Homma, S.; Torikoshi, M.; Bloomer, M.A.; Cole, B.A.; Costales, J.B.; Grodzins, L.; Huang, H.Z.; Ledoux, R.J.; Morse, R.J.; Parsons, C.G.; Sarabura, M.; Steadman, S.G.; Stephans, G.S.F.; Vutsadakis, V.; Woodruff, D.S.; Hayano, R.S.; Sakurai, H.

    1991-01-01

    Some recent results are presented from AGS E802, a survey experiment which is studying reactions of 14.6 A · GeV beams of protons, 16 O and 28 Si on targets ranging from 9 Be to 197 Au. Spectra for the global forward and transverse energy are shown; in nucleus-nucleus collisions these two quantities are anticorrelated, consistent with a large amount of stopping. Slope parameters from inclusive particle spectra are presented, with the most interesting effect being an apparent ''heating'' of mid-rapidity protons which emerge from the collisions of the largest nuclei. Also given are preliminary data on the production of antiprotons. 8 refs., 4 figs., 1 tab

  2. 26 CFR 1.802(b)-1 - Tax on life insurance companies.

    Science.gov (United States)

    2010-04-01

    .... For the definition of the term “1954 life insurance company taxable income”, see § 1.805-1. (b) The... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Tax on life insurance companies. 1.802(b)-1...) INCOME TAX (CONTINUED) INCOME TAXES Life Insurance Companies § 1.802(b)-1 Tax on life insurance companies...

  3. Blood banking and regulation: procedures, problems, and alternatives

    National Research Council Canada - National Science Library

    Dauer, Edward A

    This volume examines regulatory and policymaking procedures in blood banking, regulatory enforcement and compliance, innovations and alternatives in regulation, congressional oversight and regulatory...

  4. E802 data acquisition complex

    International Nuclear Information System (INIS)

    LeVine, M.J.

    1985-01-01

    The data acquisition architecture planned for experiment E802 is described. A VAX 11/785 will be front-ended by a VME-based array of 68000-family microprocessors, which will be used as intelligent CAMAC crate controllers, event builders, and to augment the computing power of the VAX for on-line analysis of the data. 4 refs

  5. An improved IEEE 802.11 protocol for reliable data transmission in power distribution fault diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)

    2010-10-15

    In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.

  6. A high-linearity InGaP/GaAs HBT power amplifier for IEEE 802.11a/n

    International Nuclear Information System (INIS)

    Cui Jie; Chen Lei; Kang Chunlei; Shi Jia; Zhang Xuguang; Ai Baoli; Liu Yi

    2013-01-01

    A three-stage 4.8–6 GHz monolithic power amplifier (PA) compatible with IEEE 802.11a/n designed based on an advanced 2 μm InGaP/GaAs hetero-junction bipolar transistor (HBT) process is presented. The PA integrates input matching and closed-loop power control circuits on chip. Under 3.3 V DC bias, the amplifier achieves a ∼31 dB small signal gain, excellent wide band input and output matching among overall 1.2 GHz bandwidth, and up to 24.5 dBm linear output power below EVM 3% with IEEE 802.11a 64QAM OFDM input signal. (semiconductor integrated circuits)

  7. Implementation and Evaluation of WLAN 802.11ac for Residential Networks in NS-3

    Directory of Open Access Journals (Sweden)

    Andy Bubune Amewuda

    2018-01-01

    Full Text Available Wi-Fi has been an amazingly successful technology. Its success may be attributed to the fact that, despite the significant advances made in technology over the last decade, it has remained backward compatible. 802.11ac is the latest version of the wireless LAN (WLAN standard that is currently being adopted, and it promises to deliver very high throughput (VHT, operating at the 5 GHz band. In this paper, we report on an implementation of 802.11ac wireless LAN for residential scenario based on the 802.11ax task group scenario document. We evaluate the 802.11ac protocol performance under different operating conditions. Key features such as modulation coding set (MCS, frame aggregation, and multiple-input multiple-output (MIMO were investigated. We also evaluate the average throughput, delay, jitter, optimum range for goodput, and effect of station (STA density per access point (AP in a network. ns-3, an open source network simulator with features supporting 802.11ac, was used to perform the simulation. Results obtained indicate that very high data rates are achievable. The highest data rate, the best mean delay, and mean jitter are possible under combined features of 802.11ac (MIMO and A-MPDU.

  8. 9 CFR 93.802 - Import permit.

    Science.gov (United States)

    2010-01-01

    ... CONVEYANCE AND SHIPPING CONTAINERS Elephants, Hippopotami, Rhinoceroses, and Tapirs § 93.802 Import permit. (a) An elephant, hippopotamus, rhinoceros, or tapir shall not be imported into the United States... export an elephant, hippopotamus, rhinoceros, or tapir to the United States; (2) The name and address of...

  9. Modeling of current consumption in 802.15.4/ZigBee sensor motes.

    Science.gov (United States)

    Casilari, Eduardo; Cano-García, Jose M; Campos-Garrido, Gonzalo

    2010-01-01

    Battery consumption is a key aspect in the performance of wireless sensor networks. One of the most promising technologies for this type of networks is 802.15.4/ZigBee. This paper presents an empirical characterization of battery consumption in commercial 802.15.4/ZigBee motes. This characterization is based on the measurement of the current that is drained from the power source under different 802.15.4 communication operations. The measurements permit the definition of an analytical model to predict the maximum, minimum and mean expected battery lifetime of a sensor networking application as a function of the sensor duty cycle and the size of the sensed data.

  10. Coexistence of IEEE 802.11b/g WLANs and IEEE 802.15.4 WSNs : Modeling and Protocol Enhancements

    NARCIS (Netherlands)

    Yuan, W.

    2011-01-01

    As an emerging short-range wireless technology, IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) are increasingly used in the fields of home control, industrial control, consumer electronics, energy management, building automation, telecom services, personal healthcare, etc. IEEE

  11. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  12. 15 CFR 291.6 - Additional requirements; Federal policies and procedures.

    Science.gov (United States)

    2010-01-01

    ... and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST... requirements; Federal policies and procedures. Recipients and subrecipients are subject to all Federal laws and Federal and Department of Commerce policies, regulations, and procedures applicable to Federal financial...

  13. Modeling of Current Consumption in 802.15.4/ZigBee Sensor Motes

    Directory of Open Access Journals (Sweden)

    Eduardo Casilari

    2010-06-01

    Full Text Available Battery consumption is a key aspect in the performance of wireless sensor networks. One of the most promising technologies for this type of networks is 802.15.4/ZigBee. This paper presents an empirical characterization of battery consumption in commercial 802.15.4/ZigBee motes. This characterization is based on the measurement of the current that is drained from the power source under different 802.15.4 communication operations. The measurements permit the definition of an analytical model to predict the maximum, minimum and mean expected battery lifetime of a sensor networking application as a function of the sensor duty cycle and the size of the sensed data.

  14. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-01-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  15. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-08-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  16. Isolan - A Fibre Optic Network Conforming To IEEE 802.3 Standards

    Science.gov (United States)

    Roworth, D. A. A.; Howe, N.

    1986-10-01

    The progress of the IEEE 802.3 standard for fibre optic LANs is indicated with reference to both mixed media networks and full fibre networks. For a fibre optic network the most suitable layout is a "snowflake" topology composed of multiport repeaters and active fibre hubs. A range of components is described which enables the realisation of such a topology in conformance with the IEEE 802.3 standard.

  17. 40 CFR 246.201-6 - Recommended procedures: Transportation to market.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Recommended procedures: Transportation to market. 246.201-6 Section 246.201-6 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Procedures § 246.201-6 Recommended procedures: Transportation to market. Transportation to market may be...

  18. 28 CFR 63.6 - Procedures.

    Science.gov (United States)

    2010-07-01

    ... Administration DEPARTMENT OF JUSTICE (CONTINUED) FLOODPLAIN MANAGEMENT AND WETLAND PROTECTION PROCEDURES § 63.6..., habitat, hazards, etc.); social concerns (aesthetics, historical and cultural values, land use patterns... proposed action shall not be located in a floodplain or wetland unless the importance of the floodplain or...

  19. The IEEE 802.11a standards

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. The IEEE 802.11a standards. Provides higher data rate and system capacities and uses OFDM in Physical Layer to mitigate the multi path effects;. Supports multiple 20Mhz channel. Each channel being an OFDM Modulated;; 52 Carriers. 48 data carrier; 4 Carry pilot ...

  20. 16 CFR 802.30 - Intraperson transactions.

    Science.gov (United States)

    2010-01-01

    ... partnership, however, the manufacturing plant it is contributing to the formation is exempt under § 802.30(c... transactions. (a) An acquisition (other than the formation of a corporation or unincorporated entity under... the profits of partnership X. A also holds 100% of the voting securities of corporation Y. A pays B in...

  1. Augmenting the Energy-Saving Impact of IEEE 802.3az via the Control Plane

    OpenAIRE

    Thaenchaikun , Chakadkit; Jakllari , Gentian; Paillassa , Béatrice

    2015-01-01

    International audience; IEEE 802.3az, the recent standard for Energy Efficient Ethernet, is one of the main contributions of the ICT industry to the global quest for energy efficiency. Energy consumption reduction is accomplished by essentially replacing the continuous IDLE of legacy IEEE 802.3 cards with a Low Power Idle. While this is an important step in the right direction, studies have shown that the energy saving with IEEE 802.3az highly depends on the traffic load and stops for link ut...

  2. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  3. 12 CFR 1805.802 - Assistance Agreement; sanctions.

    Science.gov (United States)

    2010-01-01

    ... internal controls; and/or (4) Achieve specific lending, investment, and development service objectives... TREASURY COMMUNITY DEVELOPMENT FINANCIAL INSTITUTIONS PROGRAM Terms and Conditions of Assistance § 1805.802... Investment Area(s) includes an Indian Reservation or Targeted Population(s) includes an Indian Tribe, the...

  4. STS-54 DSO 802, Educational activities 'Physics of Toys', equipment

    Science.gov (United States)

    1993-01-01

    Toys for STS-54 Detailed Supplementary Objective (DSO) 802, Educational activities 'Physics of Toys', are displayed on a table top. Part of the educational activities onboard Endeavour, Orbiter Vehicle (OV) 105, will include several experiments with these toys. DSO 802 will allow the crewmembers to experiment with the various types of toys in a microgravity environment while talking to pupils who will be able to monitor (via classroom television (TV) sets) the onboard activities at their schools. NOTE: Also labeled the Application Specific Preprogrammed Experiment Culture System Physic of Toys (ASPEC).

  5. 20 CFR 802.206 - Effect of motion for reconsideration on time for appeal.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Effect of motion for reconsideration on time for appeal. 802.206 Section 802.206 Employees' Benefits BENEFITS REVIEW BOARD, DEPARTMENT OF LABOR... administrative law judge or deputy commissioner shall suspend the running of the time for filing a notice of...

  6. 18 CFR 725.6 - Principles, standards and procedures.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Principles, standards... Responsibilities § 725.6 Principles, standards and procedures. The Principles, Standards and Procedures established... Orders. These Principles, Standards and Procedures are found in 18 CFR parts 710 through 717. ...

  7. 34 CFR 656.6 - What regulations apply?

    Science.gov (United States)

    2010-07-01

    ..., DEPARTMENT OF EDUCATION NATIONAL RESOURCE CENTERS PROGRAM FOR FOREIGN LANGUAGE AND AREA STUDIES OR FOREIGN LANGUAGE AND INTERNATIONAL STUDIES General § 656.6 What regulations apply? The following regulations apply... 34 Education 3 2010-07-01 2010-07-01 false What regulations apply? 656.6 Section 656.6 Education...

  8. Implementation of DoS attack and mitigation strategies in IEEE 802.11b/g WLAN

    Science.gov (United States)

    Deng, Julia; Meng, Ke; Xiao, Yang; Xu, Roger

    2010-04-01

    IEEE 802.11 wireless Local Area Network (WLAN) becomes very prevalent nowadays. Either as a simple range extender for a home wired Ethernet interface, or as a wireless deployment throughout an enterprise, WLAN provides mobility, convenience, and low cost. However, an IEEE 802.11b/g wireless network uses the frequency of unlicensed 2.4GHz, which makes the network unsafe and more vulnerable than traditional Ethernet networks. As a result, anyone who is familiar with wireless network may initiate a Denial of Service (DoS) attack to influence the common communication of the network or even make it crash. In this paper, we present our studies on the DoS attacks and mitigation strategies for IEEE 802.11b/g WLANs and describe some initial implementations using IEEE 802.11b/g wireless devices.

  9. 40 CFR 141.802 - Coliform sampling plan.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 22 2010-07-01 2010-07-01 false Coliform sampling plan. 141.802... sampling plan. (a) Each air carrier under this subpart must develop a coliform sampling plan covering each... required actions, including repeat and follow-up sampling, corrective action, and notification of...

  10. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    OpenAIRE

    V. Balaji; S. Anand; C.R. Hota; G. Raghurama

    2016-01-01

    In this paper we present a Cooperative Spectrum Sensing (CSS) algorithm for Cognitive Radios (CR) based on IEEE 802.22Wireless Regional Area Network (WRAN) standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration) to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22) within a time constraint (channel sensing time). To meet this objectiv...

  11. Buffer Sizing in 802.11 Wireless Mesh Networks

    KAUST Repository

    Jamshaid, Kamran; Shihada, Basem; Xia, Li; Levis, Philip

    2011-01-01

    We analyze the problem of buffer sizing for TCP flows in 802.11-based Wireless Mesh Networks. Our objective is to maintain high network utilization while providing low queueing delays. The problem is complicated by the time-varying capacity of the wireless channel as well as the random access mechanism of 802.11 MAC protocol. While arbitrarily large buffers can maintain high network utilization, this results in large queueing delays. Such delays may affect TCP stability characteristics, and also increase queueing delays for other flows (including real-time flows) sharing the buffer. In this paper we propose sizing link buffers collectively for a set of nodes within mutual interference range called the 'collision domain'. We aim to provide a buffer just large enough to saturate the available capacity of the bottleneck collision domain that limits the carrying capacity of the network. This neighborhood buffer is distributed over multiple nodes that constitute the network bottleneck; a transmission by any of these nodes fully utilizes the available spectral resource for the duration of the transmission. We show that sizing routing buffers collectively for this bottleneck allows us to have small buffers (as low as 2 - 3 packets) at individual nodes without any significant loss in network utilization. We propose heuristics to determine these buffer sizes in WMNs. Our results show that we can reduce the end-to-end delays by 6× to 10× at the cost of losing roughly 5% of the network capacity achievable with large buffers.

  12. Buffer Sizing in 802.11 Wireless Mesh Networks

    KAUST Repository

    Jamshaid, Kamran

    2011-10-01

    We analyze the problem of buffer sizing for TCP flows in 802.11-based Wireless Mesh Networks. Our objective is to maintain high network utilization while providing low queueing delays. The problem is complicated by the time-varying capacity of the wireless channel as well as the random access mechanism of 802.11 MAC protocol. While arbitrarily large buffers can maintain high network utilization, this results in large queueing delays. Such delays may affect TCP stability characteristics, and also increase queueing delays for other flows (including real-time flows) sharing the buffer. In this paper we propose sizing link buffers collectively for a set of nodes within mutual interference range called the \\'collision domain\\'. We aim to provide a buffer just large enough to saturate the available capacity of the bottleneck collision domain that limits the carrying capacity of the network. This neighborhood buffer is distributed over multiple nodes that constitute the network bottleneck; a transmission by any of these nodes fully utilizes the available spectral resource for the duration of the transmission. We show that sizing routing buffers collectively for this bottleneck allows us to have small buffers (as low as 2 - 3 packets) at individual nodes without any significant loss in network utilization. We propose heuristics to determine these buffer sizes in WMNs. Our results show that we can reduce the end-to-end delays by 6× to 10× at the cost of losing roughly 5% of the network capacity achievable with large buffers.

  13. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    Directory of Open Access Journals (Sweden)

    V. Balaji

    2016-01-01

    Full Text Available In this paper we present a Cooperative Spectrum Sensing (CSS algorithm for Cognitive Radios (CR based on IEEE 802.22Wireless Regional Area Network (WRAN standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22 within a time constraint (channel sensing time. To meet this objective, we have developed CSS algorithm using unsupervised K-means clustering classification approach. The received energy level of each Secondary User (SU is considered as the parameter for determining channel availability. The performance of proposed algorithm is quantified in terms of detection accuracy, training and classification delay time. Further, the detection accuracy of our proposed scheme meets the requirement of IEEE 802.22 WRAN with the target probability of falsealrm as 0.1. All the simulations are carried out using Matlab tool.

  14. Evaluation of H.264/AVC over IEEE 802.11p vehicular networks

    Science.gov (United States)

    Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

    2013-12-01

    The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

  15. Implementing 802.11 with microcontrollers wireless networking for embedded systems designers

    CERN Document Server

    Eady, Fred

    2005-01-01

    Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New applications are emerging every day, with wireless capability being embedded in everything from electric meters to hospital patient tracking systems to security devices. This practical reference guides readers through the wireless technology forest, gi

  16. Small incision corneal refractive surgery using the small incision lenticule extraction (SMILE) procedure for the correction of myopia and myopic astigmatism: results of a 6 month prospective study.

    Science.gov (United States)

    Sekundo, Walter; Kunert, Kathleen S; Blum, Marcus

    2011-03-01

    This 6 month prospective multi-centre study evaluated the feasibility of performing myopic femtosecond lenticule extraction (FLEx) through a small incision using the small incision lenticule extraction (SMILE) procedure. Prospective, non-randomised clinical trial. PARTICIPANTS; Ninety-one eyes of 48 patients with myopia with and without astigmatism completed the final 6 month follow-up. The patients' mean age was 35.3 years. Their preoperative mean spherical equivalent (SE) was −4.75±1.56 D. A refractive lenticule of intrastromal corneal tissue was cut utilising a prototype of the Carl Zeiss Meditec AG VisuMax femtosecond laser system. Simultaneously two opposite small ‘pocket’ incisions were created by the laser system. Thereafter, the lenticule was manually dissected with a spatula and removed through one of incisions using modified McPherson forceps. Uncorrected visual acuity (UCVA) and best spectacle corrected visual acuity (BSCVA) after 6 months, objective and manifest refraction as well as slit-lamp examination, side effects and a questionnaire. Six months postoperatively the mean SE was −0.01 D±0.49 D. Most treated eyes (95.6%) were within ±1.0 D, and 80.2% were within ±0.5 D of intended correction. Of the eyes treated, 83.5% had an UCVA of 1.0 (20/20) or better, 53% remained unchanged, 32.3% gained one line, 3.3% gained two lines of BSCVA, 8.8% lost one line and 1.1% lost ≥2 lines of BSCVA. When answering a standardised questionnaire, 93.3% of patients were satisfied with the results obtained and would undergo the procedure again. SMILE is a promising new flapless minimally invasive refractive procedure to correct myopia.

  17. Performance Evaluations for IEEE 802.15.4-based IoT Smart Home Solution

    Directory of Open Access Journals (Sweden)

    Nga Dinh

    2016-09-01

    Full Text Available The Internet of Things (IoT is going to be a market-changing force for a variety of real-time applications such as e-healthcare, home automation, environmental monitoring, and industrial automation. Low power wireless communication protocols offering long lifetime and high reliability such as the IEEE 802.15.4 standard have been a key enabling technology for IoT deployments and are deployed for home automation recently. The issues of the IEEE 802.15.4 networks have moved from theory to real world deployments. The work presented herein intends to demonstrate the use of the IEEE 802.15.4 standard in recent IoT commercial products for smart home applications: the Smart Home Starter Kit. The contributions of the paper are twofold. First, the paper presents how the IEEE 802.15.4 standard is employed in Smart Home Starter Kit. In particular, network topology, network operations, and data transfer mode are investigated. Second, network performance metrics such as end-to-end (E2E delay and frame reception ratio (FRR are evaluated by experiments. In addition, the paper discusses several directions for future improvements of home automation commercial products.

  18. Recommended Practices Guide Securing WLANs using 802.11i

    Energy Technology Data Exchange (ETDEWEB)

    Masica, K

    2006-10-16

    This paper addresses design principles and best practices regarding the implementation and operation of Wireless LAN (WLAN) communication networks based on the 802.11i security standard. First, a general overview of WLAN technology and standards is provided in order to ground the discussion in the evolution of WLAN standards and security approaches. This is followed by a detailed explanation of the 802.11i standard for securing WLAN networks. Principles for designing secure WLAN networks are then presented, followed by a list of specific best practices that can be used as a guideline for organizations considering the deployment of WLAN networks for non-critical control and monitoring applications. Finally, a section on technical issues and considerations for deploying WLAN networks in critical environments is presented.

  19. Impacto de mecanismos de seguridad en sensores IEEE 802.15.4

    OpenAIRE

    Tripp Barba, Carolina; Casademont Serra, Jordi

    2009-01-01

    En la actualidad son muchos los mecanismos de seguridad que el estándar IEEE 802.15.4 permite a las redes inalámbricas de sensores [1] Dicho estándar define las especificaciones de la Capa de Acceso al Medio y la Capa Física de los dispositivos inalámbricos de área personal. La última revisión corresponde al 2006. Dichas revisiones y actualizaciones son hechas por el grupo de trabajo 802.15. Sin embargo estos mecanismos consumen recursos como memoria y batería, que son...

  20. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Science.gov (United States)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  1. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    International Nuclear Information System (INIS)

    Sklavos, N; Selimis, G; Koufopavlou, O

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given

  2. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  3. Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks

    OpenAIRE

    Kuo-Feng Huang; Shih-Jung Wu

    2013-01-01

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services is the primary concern for IEEE802.16j networks. A scheduling scheme that satisfies the QoS requirements has become more important for wireless communications. We proposed an adaptive nontransparent-based distributed scheduling scheme (ANDS) for IEEE 802.16j networks. ANDS comprises three major components: Priority Assignment, Resource Allocation, Preserved Bandwidth Adjustment. Different service-type connections p...

  4. Neutron dosimetry in containment of a pressurized water reactor utilizing the Panasonic UD-802 dosimetry system

    International Nuclear Information System (INIS)

    Kralick, S.C.

    1984-01-01

    The Panasonic UD-802 dosimeter was evaluated as a potential neutron dosimeter for use in containment of a PWR. The Panasonic UD-802 dosimeter, although designed as a beta and gamma dosimeter, is also sensitive to neutrons. UD-802 dosimeters were mounted on polyethylene phantoms and irradiated to known doses at selected locations in containment. The known neutron dose equivalents were determined based on remmeter dose rate measurements and stay times. The thermoluminescent response of the dosimeters and the known neutron dose equivalents were used to obtain a calibration factor at each location. The average calibration factor was 3.7 (unit of dosimeter response per mrem) and all calibration factors were within +-30% of this mean value. The dosimeter distance from the phantom was found to have minimal effect on the response but the system was directionally dependent, necessitating a correction in the calibration factor. The minimum significant dosimeter response was determined independent of any calibration factor. The minimum significant response of the UD-802 to neutrons is a function of the corresponding gamma exposure rate. It is concluded that the Panasonic UD-802 dosimeter can be used for neutron dosimetry in PWR containment

  5. NCBI nr-aa BLAST: CBRC-ACAR-01-0779 [SEVENS

    Lifescience Database Archive (English)

    Full Text Available CBRC-ACAR-01-0779 ref|YP_001127455.1| Putative sigma-B regulator [Geobacillus thermoden...itrificans NG80-2] gb|ABO68710.1| Putative sigma-B regulator [Geobacillus thermodenitrificans NG80-2] YP_001127455.1 5.6 32% ...

  6. 20 CFR 616.4 - Rules, regulations, procedures, forms-resolution of disagreements.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Rules, regulations, procedures, forms-resolution of disagreements. 616.4 Section 616.4 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION..., procedures, forms—resolution of disagreements. All State agencies shall operate in accordance with such rules...

  7. VARNOST BREZŽIČNIH OMREŽIJ PO STANDARDU IEEE 802.11

    OpenAIRE

    Štumberger, Matej

    2013-01-01

    Diplomska naloga se osredotoča na problem varovanja brezžičnih omrežij, zasnovanih po standardu IEEE 802.11. Opisano je združenje IEEE in njihova specifikacija standardov z oznako 802, prav tako pa so opisani tudi standardi, protokoli in tehnike varovanja in zaščite omrežij, ki delujejo po tej specifikaciji. Predstavljeno je tudi trenutno stanje varnosti brezžičnih omrežij na področju mesta Ptuj, opisani in prikazani pa so tudi različni pristopi za zlorabo brezžičnih omrežij, skupaj s program...

  8. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks.

    Science.gov (United States)

    Son, Kyou Jung; Hong, Sung Hyeuck; Moon, Seong-Pil; Chang, Tae Gyu; Cho, Hanjin

    2016-06-03

    This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method.

  9. Detection of Spoofed MAC Addresses in 802.11 Wireless Networks

    Science.gov (United States)

    Tao, Kai; Li, Jing; Sampalli, Srinivas

    Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.

  10. Uplink capacity of multi-class IEEE 802.16j relay networks with adaptive modulation and coding

    DEFF Research Database (Denmark)

    Wang, Hua; Xiong, C; Iversen, Villy Bæk

    2009-01-01

    The emerging IEEE 802.16j mobile multi-hop relay (MMR) network is currently being developed to increase the user throughput and extend the service coverage as an enhancement of existing 802.16e standard. In 802.16j, the intermediate relay stations (RSs) help the base station (BS) communicate...... with those mobile stations (MSs) that are either too far away from the BS or placed in an area where direct communication with BS experiences unsatisfactory level of service. In this paper, we investigate the uplink Erlang capacity of a two-hop 802.16j relay system supporting both voice and data traffics...... with adaptive modulation and coding (AMC) scheme applied in the physical layer. We first develop analytical models to calculate the blocking probability in the access zone and the outage probability in the relay zone, respectively. Then a joint algorithm is proposed to determine the bandwidth distribution...

  11. Study of Allocation Guaranteed Time Slot Wireless Body Area Networks Based on IEEE 802.15.4

    Science.gov (United States)

    Yundra, E.; Harsono, G. D.

    2018-04-01

    This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption

  12. 45 CFR 73.735-802 - Executive order prohibitions.

    Science.gov (United States)

    2010-10-01

    ... CONDUCT Financial Interest § 73.735-802 Executive order prohibitions. (a) Basic prohibition of Executive Order 11222. (1) An employee shall not have a direct or indirect financial interest that conflicts... employee need not have a financial interest that actually conflicts with his or her duties to violate the...

  13. Fragility issues of medical video streaming over 802.11e-WLAN m-health environments.

    Science.gov (United States)

    Tan, Yow-Yiong Edwin; Philip, Nada; Istepanian, Robert H

    2006-01-01

    This paper presents some of the fragility issues of a medical video streaming over 802.11e-WLAN in m-health applications. In particular, we present a medical channel-adaptive fair allocation (MCAFA) scheme for enhanced QoS support for IEEE 802.11 (WLAN), as a modification for the standard 802.11e enhanced distributed coordination function (EDCF) is proposed for enhanced medical data performance. The medical channel-adaptive fair allocation (MCAFA) proposed extends the EDCF, by halving the contention window (CW) after zeta consecutive successful transmissions to reduce the collision probability when channel is busy. Simulation results show that MCAFA outperforms EDCF in-terms of overall performance relevant to the requirements of high throughput of medical data and video streaming traffic in 3G/WLAN wireless environments.

  14. Evaluasi Kinerja IEEE 802.11e HCCA untuk Dukungan QoS pada WLAN Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Amry Daulat Gultom

    2014-06-01

    Full Text Available Wireless Local Area Network (WLAN digunakan oleh trafik multimedia yang seharusnya memerlukan persyaratan jaringan yang lebih baik terhadap delay, jitter dan packet losses. IEEE 802.11 Task Group E memperkenalkan perbaikan protokol MAC 802.11, yaitu Hybrid Coordination Function (HCF, yang terdiri dari dua mekanisme akses: Enhanced Distributed Channel Access (EDCA dan HCF Controlled Channel Access (HCCA yang memberikan dukungan Kualitas Layanan/Quality of Service (QoS bagi trafik multimedia. Tujuan dari penelitian ini adalah untuk memahami algoritma protokol MAC IEEE 802.11e HCCA pada jaringan WLAN, dan menganalisis kinerja protokol MAC 802.11e HCCA pada aplikasi multimedia dengan menggunakan metode simulasi pada NS-2. Metrik kinerja yang diukur adalah jitter dan throughput-nya. Hasil penelitian ini menunjukkan bahwa protokol MAC HCCA dapat memberikan jaminan QoS dibanding protokol MAC DCF, dimana jitter HCCA lebih stabil dari pada jitter DCF. Begitupula dengan throughput HCCA yang tidak berubah selama trafik berlangsung, tidak seperti pada DCF yang masih mengalami fluktuasi yang besar.

  15. Denial of Service Attacks on 802.1X Security Protocol

    National Research Council Canada - National Science Library

    Ozan, Orhan

    2004-01-01

    ... infrastructure, such as military and administrative government LANs. The IEEE 802.11 wireless standard specifies both an authentication service and encryption protocol, but research has demonstrated that these protocols are severely flawed...

  16. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  17. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    OpenAIRE

    Sayef Azad Sakin; Md. Abdur Razzaque; Mohammad Mehedi Hassan; Atif Alamri; Nguyen H. Tran; Giancarlo Fortino

    2017-01-01

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a s...

  18. 48 CFR 2045.371 - Property accountability procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Property accountability procedures. 2045.371 Section 2045.371 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION... accountability procedures. (a) The threshold for detailed reporting of capitalized equipment by contractors is...

  19. PERFORMANCE STUDY OF DISTRIBUTED COORDINATION FUNCTION OVER IEEE 802.11A PHYSICAL LAYER

    Directory of Open Access Journals (Sweden)

    S. SELVAKENEDDY

    2006-06-01

    Full Text Available IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802 for wireless LANs. It has specified an additional physical layer (PHY to support higher data rates, and is termed as the orthogonal frequency division multiplexing (OFDM. In order to exploit its benefits, one of the medium access control (MAC protocols specified in the IEEE 802.11 specification is called distributed coordination function (DCF. DCF is a carrier sense multiple access with collision avoidance (CSMA/CA scheme with slotted binary exponential backoff. The frames can be transmitted using the basic access scheme or the RTS/CTS scheme in DCF. It was demonstrated previously that the RTS/CTS mechanism works well in most scenarios for the previously specified PHYs. In this work, a simple simulator is developed to verify the scalability of the RTS/CTS mechanism over OFDM PHY, which supports much higher data rates.

  20. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  1. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    Science.gov (United States)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  2. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  3. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  4. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  5. Capacity Evaluation for IEEE 802.16e Mobile WiMAX

    Directory of Open Access Journals (Sweden)

    Chakchai So-In

    2010-01-01

    Full Text Available We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the capacity are explained and methods to reduce these overheads are also presented. The advantage of a simple model is that the effect of each decision and sensitivity to various parameters can be seen easily. We illustrate the model by estimating the capacity for three sample applications—Mobile TV, VoIP, and data. The analysis process helps explain various features of IEEE 802.16e Mobile WiMAX. It is shown that proper use of overhead reducing mechanisms and proper scheduling can make an order of magnitude difference in performance. This capacity evaluation method can also be used for validation of simulation models.

  6. Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4

    Directory of Open Access Journals (Sweden)

    Mukhtar Azeem

    2014-01-01

    by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.

  7. An analytical model for the performance analysis of concurrent transmission in IEEE 802.15.4.

    Science.gov (United States)

    Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto

    2014-03-20

    Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.

  8. 75 FR 13050 - Regulations to Amend the Civil Procedures

    Science.gov (United States)

    2010-03-18

    ... Administrative Law Judge state good reason(s) for departing from the civil penalty or permit sanction assessed by... Administrative Law Judge state good reason(s) for departing from the civil penalty or permit sanction, condition.... 100216090-0123-01] RIN 0648-AY66 Regulations to Amend the Civil Procedures AGENCY: Office of General Counsel...

  9. 3G Femto or 802.11g WiFi

    DEFF Research Database (Denmark)

    Jørgensen, Niels T.K.; Rodriguez Larrad, Ignacio; Elling, Jan

    2014-01-01

    In this paper HSPA Release 6 femto and IEEE 802.11g WiFi indoor data solutions are investigated from an end user perspective. Femto and WiFi access points are deployed at typical locations in an urban environment and end user performance is measured. Three key performance indicators (KPI) were...... defined - downlink and uplink user data rates, latency and mobile power consumption. These three KPIs are of high importance when choosing an indoor data solution. Our measurements show that the downlink and uplink data rates of the WiFi solution are significantly higher than femto data rates. Similarly...... active mode power consumption measurements. Based on our KPIs, the preferred indoor data solution today is WiFi. The deciding factor is the combined latency and power performance of the WiFi, where WiFi outperforms the femto....

  10. 75 FR 35631 - Regulations to Amend the Civil Procedures

    Science.gov (United States)

    2010-06-23

    ... Administrative Law Judge state good reason(s) for departing from the civil penalty or permit sanction assessed by... Sec. 904.204(m) that an Administrative Law Judge state good reason(s) for departing from the civil.... 100216090-0205-02] RIN 0648-AY66 Regulations to Amend the Civil Procedures AGENCY: Office of General Counsel...

  11. 28 CFR 505.6 - Procedures for payment.

    Science.gov (United States)

    2010-07-01

    ... ADMINISTRATION COST OF INCARCERATION FEE § 505.6 Procedures for payment. Fees imposed pursuant to this part are... financial responsibility program (see 28 CFR part 545, subpart B), fees are to be included under the... included in that same category. Fees may be subject to interest charges. ...

  12. Study on Additional Carrier Sensing for IEEE 802.15.4 Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bih-Hwang Lee

    2010-06-01

    Full Text Available Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs. The slotted carrier sense multiple access with collision avoidance (CSMA/CA is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC delay and power consumption of CCA detection.

  13. Study on additional carrier sensing for IEEE 802.15.4 wireless sensor networks.

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Ruei-Lung; Wu, Huai-Kuei; Wong, Chi-Ming

    2010-01-01

    Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA) detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS) algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC) delay and power consumption of CCA detection.

  14. 75 FR 76254 - Official Performance and Procedural Requirements for Grain Weighing Equipment and Related Grain...

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF AGRICULTURE Grain Inspection, Packers and Stockyards Administration 7 CFR Part 802 [Docket GIPSA-2010-FGIS-0012] RIN 0580-AB19 Official Performance and Procedural Requirements for Grain Weighing Equipment and Related Grain Handling Systems AGENCY: Grain Inspection, Packers and Stockyards...

  15. 8.64-11.62 GHz CMOS VCO and divider in a zero-IF 802.11a/b/g WLAN and Bluetooth application

    International Nuclear Information System (INIS)

    Sun Yu; Mei Niansong; Lu Bo; Huang Yumei; Hong Zhiliang

    2010-01-01

    A fully integrated VCO and divider implemented in SMIC 0.13-μm RFCMOS 1P8M technology with a 1.2 V supply voltage is presented. The frequency of the VCO is tuning from 8.64 to 11.62 GHz while the quadrature LO signals for 802.11a WLAN in 5.8 GHz band or for 802.11b/g WLAN and Bluetooth in 2.4 GHz band can be obtained by a frequency division by 2 or 4, respectively. A 6 bit switched capacitor array is applied for precise tuning of all necessary frequency bands. The testing results show that the VCO has a phase noise of-113 dBc - 1 MHz offset from the carrier of 5.5 GHz by dividing VCO output by two and the VCO core consumes 3.72 mW. The figure-of-merit for the tuning-range (FOM T ) of the VCO is -192.6 dBc/Hz. (semiconductor integrated circuits)

  16. 8.64-11.62 GHz CMOS VCO and divider in a zero-IF 802.11a/b/g WLAN and Bluetooth application

    Energy Technology Data Exchange (ETDEWEB)

    Sun Yu; Mei Niansong; Lu Bo; Huang Yumei; Hong Zhiliang, E-mail: yumeihuang@fudan.edu.c [ASIC and System State Key Laboratory, Fudan University, Shanghai 201203 (China)

    2010-10-15

    A fully integrated VCO and divider implemented in SMIC 0.13-{mu}m RFCMOS 1P8M technology with a 1.2 V supply voltage is presented. The frequency of the VCO is tuning from 8.64 to 11.62 GHz while the quadrature LO signals for 802.11a WLAN in 5.8 GHz band or for 802.11b/g WLAN and Bluetooth in 2.4 GHz band can be obtained by a frequency division by 2 or 4, respectively. A 6 bit switched capacitor array is applied for precise tuning of all necessary frequency bands. The testing results show that the VCO has a phase noise of-113 dBc - 1 MHz offset from the carrier of 5.5 GHz by dividing VCO output by two and the VCO core consumes 3.72 mW. The figure-of-merit for the tuning-range (FOM{sub T}) of the VCO is -192.6 dBc/Hz. (semiconductor integrated circuits)

  17. Interleukin-6 receptor expression in contracting human skeletal muscle: regulating role of IL-6

    DEFF Research Database (Denmark)

    Keller, Pernille; Penkowa, Milena; Keller, Charlotte

    2005-01-01

    Contracting muscle fibers produce and release IL-6, and plasma levels of this cytokine are markedly elevated in response to physical exercise. We recently showed autocrine regulation of IL-6 in human skeletal muscle in vivo and hypothesized that this may involve up-regulation of the IL-6 receptor....... Infusion of rhIL-6 to humans had no effect on the mRNA level of the IL-6 receptor, whereas there was an increase at the protein level. IL-6 receptor mRNA increased similarly in muscle of both IL-6 KO mice and wild-type mice in response to exercise. In conclusion, exercise increases IL-6 receptor production....... Therefore, we investigated IL-6 receptor regulation in response to exercise and IL-6 infusion in humans. Furthermore, using IL-6-deficient mice, we investigated the role of IL-6 in the IL-6 receptor response to exercise. Human skeletal muscle biopsies were obtained in relation to: 3 h of bicycle exercise...

  18. 5 CFR 837.802 - Benefits under another retirement system for Federal employees based on the most recent separation.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Benefits under another retirement system for Federal employees based on the most recent separation. 837.802 Section 837.802 Administrative... system for Federal employees based on the most recent separation. (a) Generally. An annuitant who has...

  19. A PROPOSED NOVEL ARCHITECTURE OF EC CONTROL SYSTEM USING IEEE 802.11n NETWORK AT ITER-INDIA GYROTRON TEST FACILITY

    Directory of Open Access Journals (Sweden)

    Deepak Mandge

    2017-06-01

    Full Text Available IEEE 802.11 Wi-Fi networks are increasingly becoming popular for its use in industrial applications. With the availability of recent amendments to IEEE 802.11 series of standards, particularly IEEE 802.11n, the adoption of Wi-Fi networks for process automation is gaining more focus and importance. The installation of Wireless networks naturally provides reduction in cable and its maintenance related costs, provides increased flexibility and mobility to enhance performance of industrial control system. The IEEE 802.11n supports parameterization that can be set for particular industrial applications and hence it has addressed to the aspects of timeliness and criticality to some extent. This paper proposes the use of IEEE 802.11n network to interconnect field instruments with Siemens PLC controller in harsh EMI/EMC environment. An application example is shown where the alternate control system architecture is developed in which non-critical and non-safety signals are communicated over Wi-Fi. While, for critical and safety signals, traditional hardwired signals methods can be implemented.

  20. The Exploration of Network Coding in IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Deze Zeng

    2011-01-01

    communication protocol should be energy efficient. The IEEE 802.15.4 is designed as a standard protocol for low power, low data rate, low complexity, and short range connections in WPANs. The standard supports allocating several numbers of collision-free guarantee time slots (GTSs within a superframe for some time-critical transmissions. Recently, COPE was proposed as a promising network coding architecture to essentially improve the throughput of wireless networks. In this paper, we exploit the network coding technique at coordinators to improve energy efficiency of the WPAN. Some related practical issues, such as GTS allocation and multicast, are also discussed in order to exploit the network coding opportunities efficiently. Since the coding opportunities are mostly exploited, our proposal achieves both higher energy efficiency and throughput performance than the original IEEE 802.15.4.

  1. 16 CFR 802.42 - Partial exemption for acquisitions in connection with the formation of certain joint ventures or...

    Science.gov (United States)

    2010-01-01

    ... connection with the formation of certain joint ventures or other corporations. 802.42 Section 802.42... acquisitions in connection with the formation of certain joint ventures or other corporations. (a) Whenever one or more of the contributors in the formation of a joint venture or other corporation which otherwise...

  2. Analysis and Enhancement of IEEE 802.15.4e DSME Beacon Scheduling Model

    Directory of Open Access Journals (Sweden)

    Kwang-il Hwang

    2014-01-01

    Full Text Available In order to construct a successful Internet of things (IoT, reliable network construction and maintenance in a sensor domain should be supported. However, IEEE 802.15.4, which is the most representative wireless standard for IoT, still has problems in constructing a large-scale sensor network, such as beacon collision. To overcome some problems in IEEE 802.15.4, the 15.4e task group proposed various different modes of operation. Particularly, the IEEE 802.15.4e deterministic and synchronous multichannel extension (DSME mode presents a novel scheduling model to solve beacon collision problems. However, the DSME model specified in the 15.4e draft does not present a concrete design model but a conceptual abstract model. Therefore, in this paper we introduce a DSME beacon scheduling model and present a concrete design model. Furthermore, validity and performance of DSME are evaluated through experiments. Based on experiment results, we analyze the problems and limitations of DSME, present solutions step by step, and finally propose an enhanced DSME beacon scheduling model. Through additional experiments, we prove the performance superiority of enhanced DSME.

  3. Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    M. Udin Harun Al Rasyid

    2013-12-01

    Full Text Available IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology. Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca

  4. The regulatory practice of the French financial regulator, 2006-2011. From substantive to procedural financial regulation?

    Directory of Open Access Journals (Sweden)

    Thierry Kirat

    2015-11-01

    Full Text Available Fraud and misconduct in financial markets have recently become a key regulatory issue against the backdrop of the financial crisis. This paper investigates the sanctions policy and practices of the French financial regulator, Autorité des Marchés Financiers (AMF. It argues that, over time, the AMF has shifted from substantive to procedural regulation of finance. This shift consists in departing from sanctions based on observed outcomes in the market and, instead, assessing how the internal organizational schemes of financial firms actually perform. The AMF’s new policy and practice involves a process of legalization of organizations; it also evidences a tendency to delegate regulation to financial firms themselves

  5. Simultaneous transmission of the IEEE 802.11 radio signal and optical Gbit Ethernet over the multimode fiber link

    Science.gov (United States)

    Maksymiuk, L.; Podziewski, A.

    2015-09-01

    In the paper we present a successful joint transmission of the IEEE 802.11 signal and an optical Gbit Ethernet over a multimode fiber based link. Most importantly, the multiplexation of both signals was performed in the optical domain. Due to the utilization of the multimode fiber the OBI noise was avoided and both channels were able to operate at the same wavelength. We prove that potential RoF link for IEEE 802.11 signal distribution may be used to additionally transmit other signals as Gbit Ethernet and therefore utilize the fiber infrastructure installed more effectively. The qualities of both the IEEE 802.11 and Ethernet transmissions fulfilled the requirements imposed by appropriate standards.

  6. An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes

    Directory of Open Access Journals (Sweden)

    Szott Szymon

    2010-01-01

    Full Text Available We present a novel model of IEEE 802.11 EDCA with support for analysing networks with misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the model by extensive simulation analysis and by comparing it to three other IEEE 802.11 models. The results show that our model behaves satisfactorily and outperforms other widely acknowledged models. Secondly, a comparison with simulation results in several scenarios with misbehaving nodes proves that our model performs correctly for these scenarios. The proposed model can, therefore, be considered as an original contribution to the area of EDCA models and backoff misbehaviour.

  7. IEEE 802.3 Fiber Optic Inter-Repeater Link

    Science.gov (United States)

    Tarrant, Peter J.

    1987-01-01

    This paper describes the implementation of a fiber optic inter-repeater link (FOIRL), used for connecting two remote copper segments of an IEEE 802.3 local area network. The rationale for the design, the signalling used and the collision detection mechanism is discussed. The evolution of the draft international standard for the FOIRL and the concurrence amongst various manufacturers is also presented. Finally some examples of typical applications, highlighting the ease of installation, are given.

  8. Developments in UK defect assessment procedures R6 revision 4 and BS7910

    International Nuclear Information System (INIS)

    Sharples, J.K.; Ainsworth, R.A.; Budden, P.J.

    2003-01-01

    The R6 defect assessment procedures have been developed over many years by the UK nuclear power generation industry. The procedures are updated on a regular basis, taking into account the information resulting from the R6 development programme and other available information worldwide. A major revision, Revision 4, of the R6 procedures was released in 2000. Just prior to that release, in 1999, the British Standards flaw assessment procedure BS7910 was issued and combined and updated the previous published documents PD6493 and PD6539, for components operating at temperatures where creep was negligible and important, respectively. BS79l0 is also under constant development. This paper provides a brief overview of the BS7910 and R6 Revision 4 procedures and describes updates to the respective documents since they were first issued. Some ongoing developments which will lead to future revisions to the documents are also described. (author)

  9. Study Protocol for the Preschooler Regulation of Emotional Stress (PRES Procedure

    Directory of Open Access Journals (Sweden)

    Livio Provenzi

    2017-09-01

    Full Text Available Background: Emotional stress regulation (ESR rapidly develops during the first months of age and includes different behavioral strategies which largely contribute to children’s behavioral and emotional adjustment later in life. The assessment of ESR during the first years of life is critical to identify preschool children who are at developmental risk. Although ESR is generally included in larger temperament batteries [e.g., the Laboratory Temperament Assessment Battery (Lab-TAB], there is no standardized observational procedure to specifically assess and measure ESR in preschool aged children.Aim: Here, we describe the development of an observational procedure to assess ESR in preschool aged children [i.e., the Preschooler Regulation of Emotional Stress (PRES Procedure] and the related coding system.Methods: Four Lab-TAB emotional stress episodes (i.e., the Stranger, the Perfect Circle, the Missing Sticker, and the Transparent Box have been selected. Independent coders developed a list of ESR codes resulting in two general indexes (i.e., active engagement and stress level and five specific indexes (i.e., anger, control, fear, inhibition, sadness. Finally, specific actions have been planned to assess the validity and the coding system reliability of PRES procedure.Ethics and Dissemination: The study has been approved by the Ethical Committee of the Scientific Institute IRCCS Eugenio Medea, Bosisio Parini (Italy. The PRES validation and reliability assessment as well as its use with healthy and at-risk populations of preschool children will be object of future scientific publications and international conference presentations.

  10. 16 CFR 802.2 - Certain acquisitions of real property assets.

    Science.gov (United States)

    2010-01-01

    ... new automobile plant in anticipation of increased demand for its cars. The market does not improve and... for in excess of $50 million (as adjusted). The parcel contains a race track and a golf course. The golf course qualifies as recreational land pursuant to § 802.2(f), but the race track is not included...

  11. Analysis Of Impact Of Various Parameters On BER Performance For IEEE 802.11b

    Directory of Open Access Journals (Sweden)

    Nilesh B. Kalani

    2015-08-01

    Full Text Available Abstract This paper discusses about IEEE 802.11b simulation model implemented using LabVIEW software and its analyses for impact on bit error rate BER for different parameters as channel type channel number data transmission rate and packet size. Audio file is being transmitted processed and analyzed using the model for various parameters. This paper gives analysis of BER verses ESN0 for various parameter like data rate packet size and communication channel for the IEEE 802.11b simulation model generated using LabVIEW. It is proved that BER can be optimized by tweaking different parameters of wireless communication system.

  12. Service differentiated and adaptive CSMA/CA over IEEE 802.15.4 for Cyber-Physical Systems.

    Science.gov (United States)

    Xia, Feng; Li, Jie; Hao, Ruonan; Kong, Xiangjie; Gao, Ruixia

    2013-01-01

    Cyber-Physical Systems (CPS) that collect, exchange, manage information, and coordinate actions are an integral part of the Smart Grid. In addition, Quality of Service (QoS) provisioning in CPS, especially in the wireless sensor/actuator networks, plays an essential role in Smart Grid applications. IEEE 802.15.4, which is one of the most widely used communication protocols in this area, still needs to be improved to meet multiple QoS requirements. This is because IEEE 802.15.4 slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) employs static parameter configuration without supporting differentiated services and network self-adaptivity. To address this issue, this paper proposes a priority-based Service Differentiated and Adaptive CSMA/CA (SDA-CSMA/CA) algorithm to provide differentiated QoS for various Smart Grid applications as well as dynamically initialize backoff exponent according to traffic conditions. Simulation results demonstrate that the proposed SDA-CSMA/CA scheme significantly outperforms the IEEE 802.15.4 slotted CSMA/CA in terms of effective data rate, packet loss rate, and average delay.

  13. Group-Orthogonal Code-Division Multiplex: A Physical-Layer Enhancement for IEEE 802.11n Networks

    Directory of Open Access Journals (Sweden)

    Felip Riera-Palou

    2010-01-01

    Full Text Available The new standard for wireless local area networks (WLANs, named IEEE 802.11n, has been recently released. This new norm builds upon and remains compatible with the previous WLANs standards IEEE 802.11a/g while it is able to achieve transmission rates of up to 600 Mbps. These increased data rates are mainly a consequence of two important new features: (1 multiple antenna technology at transmission and reception, and (2 optional doubling of the system bandwidth thanks to the availability of an additional 20 MHz band. This paper proposes the use of Group-Orthogonal Code Division Multiplex (GO-CDM as a means to improve the performance of the 802.11n standard by further exploiting the inherent frequency diversity. It is explained why GO-CDM synergistically matches with the two aforementioned new features and the performance gains it can offer under different configurations is illustrated. Furthermore, the effects that group-orthogonal has on key implementation issues such as channel estimation, carrier frequency offset, and peak-to-average power ratio (PAPR are also considered.

  14. SEMICONDUCTOR INTEGRATED CIRCUITS 8.64-11.62 GHz CMOS VCO and divider in a zero-IF 802.11a/b/g WLAN and Bluetooth application

    Science.gov (United States)

    Yu, Sun; Niansong, Mei; Bo, Lu; Yumei, Huang; Zhiliang, Hong

    2010-10-01

    A fully integrated VCO and divider implemented in SMIC 0.13-μm RFCMOS 1P8M technology with a 1.2 V supply voltage is presented. The frequency of the VCO is tuning from 8.64 to 11.62 GHz while the quadrature LO signals for 802.11a WLAN in 5.8 GHz band or for 802.11b/g WLAN and Bluetooth in 2.4 GHz band can be obtained by a frequency division by 2 or 4, respectively. A 6 bit switched capacitor array is applied for precise tuning of all necessary frequency bands. The testing results show that the VCO has a phase noise of—113 dBc @ 1 MHz offset from the carrier of 5.5 GHz by dividing VCO output by two and the VCO core consumes 3.72 mW. The figure-of-merit for the tuning-range (FOMT) of the VCO is -192.6 dBc/Hz.

  15. The Effectiveness of Group Training of Procedural Emotion Regulation Strategies in Cognitive Coping of Individuals Suffering Substance Abuse

    Directory of Open Access Journals (Sweden)

    ali ghaedniay jahromi

    2015-02-01

    Full Text Available Objective: The aim of this study was to examine the effectiveness of group training of procedural emotion regulation strategies in cognitive coping of individuals suffering substance abuse. Method: A quasi-experimental design along with pretest-posttest and control group was used for this study. Then, 16 patients suffering substance abuse were selected through convenience sampling and were randomly assigned to two control and experimental groups. The experimental group received 10 sessions of group training of procedural emotion regulation strategies while the control group received no treatment. Both groups before and after the treatment completed the Persian version of cognitive emotion regulation questionnaire (Hasani, 2011. Results: The results showed that group training of e procedural motion regulation strategies leads to a reduction in maladaptive strategies such as self-blame, rumination, catastrophizing, and other-blame and an increase in adaptive strategies such as refocus on planning, positive reappraisal, and perspective development. Conclusion: Training of procedural emotion regulation strategies via the reduction of maladaptive and increase of adaptive cognitive emotion regulation strategies can provide the opportunity for the improvement and non-return to substance abuse.

  16. Algorithmic strategies for adapting to environmental changes in 802.11 location fingerprinting

    DEFF Research Database (Denmark)

    Hansen, Rene; Wind, Rico; Jensen, Christian S.

    2010-01-01

    Ubiquitous and accurate indoor positioning represents a key capability of an infrastructure that enables indoor location-based services. At the same time, such positioning has yet to be achieved. Much research uses commercial, off-the-shelf 802.11 (Wi-Fi) hardware for indoor positioning. In parti......Ubiquitous and accurate indoor positioning represents a key capability of an infrastructure that enables indoor location-based services. At the same time, such positioning has yet to be achieved. Much research uses commercial, off-the-shelf 802.11 (Wi-Fi) hardware for indoor positioning....... In particular, the dominant fingerprinting technique uses a database (called a radio map) of manually collected Wi-Fi signal strengths and is able to achieve positioning accuracies that enable a wide range of location-based services. However, a major weakness of fingerprinting occurs when changes occur...

  17. Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i

    Directory of Open Access Journals (Sweden)

    De Rango Floriano

    2006-01-01

    Full Text Available This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outlined. The last phase of the authentication process, represented by the 4-way handshake procedure, is shown to be unsafe from DoS attack. This can produce the undesired effect of memory exhaustion if a flooding DoS attack is conducted. In order to avoid DoS attack without increasing the complexity of wireless mobile devices too much and without changing through some further control fields of the frame structure of wireless security protocols, a solution is found and an extension of WPA and IEEE 802.11 is proposed. A protocol extension with three "static" variants and with a resource-aware dynamic approach is considered. The three enhancements to the standard protocols are achieved through some simple changes on the client side and they are robust against DoS and DoS flooding attack. Advantages introduced by the proposal are validated by simulation campaigns and simulation parameters such as attempted attacks, successful attacks, and CPU load, while the algorithm execution time is evaluated. Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different resource availability in terms of CPU and memory or if resource availability significantly changes in time, a dynamic approach that is able to switch among three different modalities could be more suitable.

  18. Pokročilé možnosti tvarování datového toku v OS Linux pro sítě 802.3 a 802.11

    OpenAIRE

    Pánek, Michal

    2013-01-01

    Táto bakalárska práca sa zaoberá možnosťami tvarovania a kontroly dátového toku, v operačnom systéme Linux. Prvá časť práce sa zaoberá preskúmaním jednotlivých ná- strojov potrebných pre prácu s dátovým tokom. Druhá časť práce sa zaoberá metodamy určenými na tvarovanie dátového toku. Z tých boli vybrané a popísané metody, určené pre použitie v štandartoch 802.3 a 802.11. Práca sa v druhej časti zamerala na me- tody Hierarchical Token Bucket a Class-based queueing. Tretia časť práce je praktic...

  19. 30 CFR 75.802 - Protection of high-voltage circuits extending underground.

    Science.gov (United States)

    2010-07-01

    ...-Voltage Distribution § 75.802 Protection of high-voltage circuits extending underground. (a) Except as... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protection of high-voltage circuits extending... which shall be grounded through a suitable resistor at the source transformers, and a grounding circuit...

  20. Outdoor Long-Range WLANs : A Lesson for IEEE 802.11ah

    NARCIS (Netherlands)

    Aust, Stefan; Venkatesha Prasad, R.; Niemegeers, Ignas G M M

    2015-01-01

    Several service applications have been reported by many who proposed the use of wireless LANs (WLANs) over a wide variety of outdoor deployments. In particular, the upcoming IEEE 802.11ah WLAN protocol will enable a longer transmission range between WLAN access points (APs) and stations (STAs) up to

  1. Administrative procedures for regulating construction and operation of nuclear power plants

    International Nuclear Information System (INIS)

    Cochaud, J.P.

    1981-01-01

    This article first explains that nuclear power plants in France are governed by a complex system of regulations within the framework of different laws concerning, in particular, protection of the environment, public health and workers. It then examines the administrative procedures and the licensing regime for nuclear power plants. (NEA) [fr

  2. 32 CFR 765.6 - Regulations for Pearl Harbor, Hawaii.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Regulations for Pearl Harbor, Hawaii. 765.6... RULES RULES APPLICABLE TO THE PUBLIC § 765.6 Regulations for Pearl Harbor, Hawaii. The Commander, U.S. Naval Base, Pearl Harbor, Hawaii, is responsible for prescribing and enforcing such rules and...

  3. Efficient Transmission of H.264 Video over Multirate IEEE 802.11e WLANs

    Directory of Open Access Journals (Sweden)

    Alnuweiri Hussein

    2008-01-01

    Full Text Available The H.264 video encoding technology, which has emerged as one of the most promising compression standards, offers many new delivery-aware features such as data partitioning. Efficient transmission of H.264 video over any communication medium requires a great deal of coordination between different communication network layers. This paper considers the increasingly popular and widespread 802.11 Wireless Local Area Networks (WLANs and studies different schemes for the delivery of the baseline and extended profiles of H.264 video over such networks. While the baseline profile produces data similar to conventional video technologies, the extended profile offers a partitioning feature that divides video data into three sets with different levels of importance. This allows for the use of service differentiation provided in the WLAN. This paper examines the video transmission performance of the existing contention-based solutions for 802.11e, and compares it to our proposed scheduled access mechanism. It is demonstrated that the scheduled access scheme outperforms contention-based prioritized services of the 802.11e standard. For partitioned video, it is shown that the overhead of partitioning is too high, and better results are achieved if some partitions are aggregated. The effect of link adaptation and multirate operation of the physical layer (PHY is also investigated in this paper.

  4. Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Mina Malekzadeh

    2010-01-01

    Full Text Available In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.

  5. A Novel Prioritization Scheme to Improve QoS in IEEE 802.11e Networks

    Directory of Open Access Journals (Sweden)

    Navid Tadayon

    2010-01-01

    Full Text Available IEEE 802.11 WLAN utilizes a distributed function at its MAC layer, namely, DCF to access the wireless medium. Due to its distributed nature, DCF is able to guarantee working stability in a wireless medium while maintaining the assembling and maintenance cost in a low level. However, DCF is inefficient in dealing with real-time traffics due to its incapability on providing QoS. IEEE 802.11e was introduced as a supplementary standard to cope with this problem. This standard introduces an Enhanced Distributed Coordination Function (EDCF that works based on diff-Serve model and can serve multiple classes of traffics (by using different prioritizations schemes. With the emergence of new time-sensitive applications, EDCF has proved to be yet inefficient in dealing with these kinds of traffics because it could not provide network with well-differentiated QoS. In this study, we propose a novel prioritization scheme to improve QoS level in IEEE 802.11e network. In this scheme, we replace Uniform PDF with Gamma PDF, which has salient differentiating properties. We investigate the suitability and superiority of this scheme on furnishing network with well-differentiated QoS using probabilistic analysis. We strengthen our claims by extensive simulation runs.

  6. Performance Analysis of Non-saturated IEEE 802.11 DCF Networks

    Science.gov (United States)

    Zhai, Linbo; Zhang, Xiaomin; Xie, Gang

    This letter presents a model with queueing theory to analyze the performance of non-saturated IEEE 802.11 DCF networks. We use the closed queueing network model and derive an approximate representation of throughput which can reveal the relationship between the throughput and the total offered load under finite traffic load conditions. The accuracy of the model is verified by extensive simulations.

  7. Modeling and Performance Analysis of Route-Over and Mesh-Under Routing Schemes in 6LoWPAN under Error-Prone Channel Condition

    Directory of Open Access Journals (Sweden)

    Tsung-Han Lee

    2013-01-01

    Full Text Available 6LoWPAN technology has attracted extensive attention recently. It is because 6LoWPAN is one of Internet of Things standard and it adapts to IPv6 protocol stack over low-rate wireless personal area network, such as IEEE 802.15.4. One view is that IP architecture is not suitable for low-rate wireless personal area network. It is a challenge to implement the IPv6 protocol stack into IEEE 802.15.4 devices due to that the size of IPv6 packet is much larger than the maximum packet size of IEEE 802.15.4 in data link layer. In order to solve this problem, 6LoWPAN provides header compression to reduce the transmission overhead for IP packets. In addition, two selected routing schemes, mesh-under and route-over routing schemes, are also proposed in 6LoWPAN to forward IP fragmentations under IEEE 802.15.4 radio link. The distinction is based on which layer of the 6LoWPAN protocol stack is in charge of routing decisions. In route-over routing scheme, the routing distinction is taken at the network layer and, in mesh-under, is taken by the adaptation layer. Thus, the goal of this research is to understand the performance of two routing schemes in 6LoWPAN under error-prone channel condition.

  8. A distributed scheme to manage the dynamic coexistence of IEEE 802.15.4-based health-monitoring WBANs.

    Science.gov (United States)

    Deylami, Mohammad N; Jovanov, Emil

    2014-01-01

    The overlap of transmission ranges between wireless networks as a result of mobility is referred to as dynamic coexistence. The interference caused by coexistence may significantly affect the performance of wireless body area networks (WBANs) where reliability is particularly critical for health monitoring applications. In this paper, we analytically study the effects of dynamic coexistence on the operation of IEEE 802.15.4-based health monitoring WBANs. The current IEEE 802.15.4 standard lacks mechanisms for effectively managing the coexistence of mobile WBANs. Considering the specific characteristics and requirements of health monitoring WBANs, we propose the dynamic coexistence management (DCM) mechanism to make IEEE 802.15.4-based WBANs able to detect and mitigate the harmful effects of coexistence. We assess the effectiveness of this scheme using extensive OPNET simulations. Our results indicate that DCM improves the successful transmission rates of dynamically coexisting WBANs by 20%-25% for typical medical monitoring applications.

  9. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  10. 802.11 Wireless Infrastructure To Enhance Medical Response to Disasters

    Science.gov (United States)

    Arisoylu, Mustafa; Mishra, Rajesh; Rao, Ramesh; Lenert, Leslie A.

    2005-01-01

    802.11 (WiFi) is a well established network communications protocol that has wide applicability in civil infrastructure. This paper describes research that explores the design of 802.11 networks enhanced to support data communications in disaster environments. The focus of these efforts is to create network infrastructure to support operations by Metropolitan Medical Response System (MMRS) units and Federally-sponsored regional teams that respond to mass casualty events caused by a terrorist attack with chemical, biological, nuclear or radiological weapons or by a hazardous materials spill. In this paper, we describe an advanced WiFi-based network architecture designed to meet the needs of MMRS operations. This architecture combines a Wireless Distribution Systems for peer-to-peer multihop connectivity between access points with flexible and shared access to multiple cellular backhauls for robust connectivity to the Internet. The architecture offers a high bandwidth data communications infrastructure that can penetrate into buildings and structures while also supporting commercial off-the-shelf end-user equipment such as PDAs. It is self-configuring and is self-healing in the event of a loss of a portion of the infrastructure. Testing of prototype units is ongoing. PMID:16778990

  11. Incorporating antenna beamswitching technique into drivers for IEEE802.11 WLAN devices

    CSIR Research Space (South Africa)

    Mofolo, M

    2015-11-23

    Full Text Available the beamswitching technique for switched parasitic array (SPA) and electronically steerable parasitic array radiator (ESPAR) antennas in the drivers for IEEE802.11 WLAN devices. The modifications of the open source drivers (ath5k and ath9k) to enable real...

  12. Seguridad en redes inalámbricas 802.11

    OpenAIRE

    Madrid Molina, Juan Manuel

    2006-01-01

    La falta de seguridad en las redes inalámbricas es un problema que, a pesar de su gravedad, no ha recibido la atención debida por parte de los administradores de redes y los responsablesde la información. Este artículo presenta las tecnologías existentes para mejorar el nivel de seguridad en las redes inalámbricas 802.11, con sus ventajas, desventajas y escenarios de aplicación. Lack of security in wireless LANs is a problem which has not been correctly assessed by network managers ...

  13. Scrap of gloveboxes No. 801-W and No. 802-W

    CERN Document Server

    Ohuchi, S; Kurosawa, M; Okane, S; Usui, T

    2002-01-01

    Both gloveboxes No. 801-W for measuring samples of uranium or plutonium and No. 802-W for analyzing the quantity of uranium or plutonium are established at twenty five years ago in the analyzing room No. 108 of Plutonium Fuel Research Facility. It was planned to scrap the gloveboxes and to establish new gloveboxes. This report describes the technical view of the scrapping works.

  14. 7 CFR 400.138 - Procedures for salary offset; methods of collection.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Procedures for salary offset; methods of collection. 400.138 Section 400.138 Agriculture Regulations of the Department of Agriculture (Continued) FEDERAL... Management-Regulations for the 1986 and Succeeding Crop Years § 400.138 Procedures for salary offset; methods...

  15. Basic security measures for IEEE 802.11 wireless networks

    OpenAIRE

    Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David

    2008-01-01

    This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educat...

  16. Hybrid Polling Method for Direct Link Communication for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2008-10-01

    Full Text Available The direct link communication between STAtions (STAs is one of the techniques to improve the MAC performance of IEEE 802.11 infrastructure networks. For the efficient direct link communication, in the literature, the simultaneous polling method was proposed to allow the multiple direct data communication to be performed simultaneously. However, the efficiency of the simultaneous polling method is affected by the interference condition. To alleviate the problem of the lower polling efficiency with the larger interference range, the hybrid polling method is proposed for the direct link communication between STAs in IEEE 802.11 infrastructure networks. By the proposed polling method, we can integrate the sequential and simultaneous polling methods properly according to the interference condition. Numerical examples are also presented to show the medium access control (MAC performance improvement by the proposed polling method.

  17. BOB-RED queue management for IEEE 802.15.4 wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Wu Jean-Lien

    2011-01-01

    Full Text Available Abstract Multimedia services over resource constrained wireless sensor networks (WSNs face a performance bottleneck issue from the gateway node to the sink node. Therefore, the queue management at the gateway node is crucial for diversified messages conveyed from the front nodes to the sink node. In this article, beacon order-based random early detection (BOB-RED queue management is proposed. BOB-RED is a dynamic adaptation scheme based on adjusting beacon interval and superframe duration in the IEEE 802.15.4 MAC superframe accompanied with RED queue management scheme to increase the transmission efficiency of multimedia over WSNs. We focus on the performance improvement upon different traffic loads over WSNs. Evaluation metrics include end-to-end delay, packet delivery ratio, and energy consumption in IEEE 802.15.4 beacon enabled mode. Simulation results show that BOB-RED can effectively decrease end-to-end delay and energy consumption compared to the DropTail scheme.

  18. 7 CFR 400.137 - Procedures for salary offset; types of collection.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Procedures for salary offset; types of collection. 400.137 Section 400.137 Agriculture Regulations of the Department of Agriculture (Continued) FEDERAL CROP...-Regulations for the 1986 and Succeeding Crop Years § 400.137 Procedures for salary offset; types of collection...

  19. BPIFB6 Regulates Secretory Pathway Trafficking and Enterovirus Replication.

    Science.gov (United States)

    Morosky, Stefanie; Lennemann, Nicholas J; Coyne, Carolyn B

    2016-05-15

    Bactericidal/permeability-increasing protein (BPI) fold-containing family B, member 3 (BPIFB3) is an endoplasmic reticulum (ER)-localized host factor that negatively regulates coxsackievirus B (CVB) replication through its control of the autophagic pathway. Here, we show that another member of the BPIFB family, BPIFB6, functions as a positive regulator of CVB, and other enterovirus, replication by controlling secretory pathway trafficking and Golgi complex morphology. We show that similar to BPIFB3, BPIFB6 localizes exclusively to the ER, where it associates with other members of the BPIFB family. However, in contrast to our findings that RNA interference (RNAi)-mediated silencing of BPIFB3 greatly enhances CVB replication, we show that silencing of BPIFB6 expression dramatically suppresses enterovirus replication in a pan-viral manner. Mechanistically, we show that loss of BPIFB6 expression induces pronounced alterations in retrograde and anterograde trafficking, which correlate with dramatic fragmentation of the Golgi complex. Taken together, these data implicate BPIFB6 as a key regulator of secretory pathway trafficking and viral replication and suggest that members of the BPIFB family participate in diverse host cell functions to regulate virus infections. Enterovirus infections are associated with a number of severe pathologies, such as aseptic meningitis, dilated cardiomyopathy, type I diabetes, paralysis, and even death. These viruses, which include coxsackievirus B (CVB), poliovirus (PV), and enterovirus 71 (EV71), co-opt the host cell secretory pathway, which controls the transport of proteins from the endoplasmic reticulum to the Golgi complex, to facilitate their replication. Here we report on the identification of a novel regulator of the secretory pathway, bactericidal/permeability-increasing protein (BPI) fold-containing family B, member 6 (BPIFB6), whose expression is required for enterovirus replication. We show that loss of BPIFB6 expression

  20. BPIFB6 Regulates Secretory Pathway Trafficking and Enterovirus Replication

    Science.gov (United States)

    Morosky, Stefanie; Lennemann, Nicholas J.

    2016-01-01

    ABSTRACT Bactericidal/permeability-increasing protein (BPI) fold-containing family B, member 3 (BPIFB3) is an endoplasmic reticulum (ER)-localized host factor that negatively regulates coxsackievirus B (CVB) replication through its control of the autophagic pathway. Here, we show that another member of the BPIFB family, BPIFB6, functions as a positive regulator of CVB, and other enterovirus, replication by controlling secretory pathway trafficking and Golgi complex morphology. We show that similar to BPIFB3, BPIFB6 localizes exclusively to the ER, where it associates with other members of the BPIFB family. However, in contrast to our findings that RNA interference (RNAi)-mediated silencing of BPIFB3 greatly enhances CVB replication, we show that silencing of BPIFB6 expression dramatically suppresses enterovirus replication in a pan-viral manner. Mechanistically, we show that loss of BPIFB6 expression induces pronounced alterations in retrograde and anterograde trafficking, which correlate with dramatic fragmentation of the Golgi complex. Taken together, these data implicate BPIFB6 as a key regulator of secretory pathway trafficking and viral replication and suggest that members of the BPIFB family participate in diverse host cell functions to regulate virus infections. IMPORTANCE Enterovirus infections are associated with a number of severe pathologies, such as aseptic meningitis, dilated cardiomyopathy, type I diabetes, paralysis, and even death. These viruses, which include coxsackievirus B (CVB), poliovirus (PV), and enterovirus 71 (EV71), co-opt the host cell secretory pathway, which controls the transport of proteins from the endoplasmic reticulum to the Golgi complex, to facilitate their replication. Here we report on the identification of a novel regulator of the secretory pathway, bactericidal/permeability-increasing protein (BPI) fold-containing family B, member 6 (BPIFB6), whose expression is required for enterovirus replication. We show that loss of

  1. 32 CFR 1900.31 - Procedures for business information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for business information. 1900.31 Section 1900.31 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE... Matters § 1900.31 Procedures for business information. (a) In general. Business information obtained by...

  2. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    Science.gov (United States)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  3. IEEE 802.3 Ethernet, Current Status and Future Prospects at the LHC

    CERN Document Server

    Dobinson, Robert W; Haas, S W; Martin, B; Le Vine, M J; Saka, F

    2000-01-01

    The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging.

  4. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-01-16

    IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly.

  5. Dynamic subframe allocation for mobile broadband m-health using IEEE 802.16j mobile multihop relay networks.

    Science.gov (United States)

    Alinejad, Ali; Istepanian, R S H; Philip, N

    2012-01-01

    The concept of 4G health will be one of the key focus areas of future m-health research and enterprise activities in the coming years. WiMAX technology is one of the constituent 4G wireless technologies that provides broadband wireless access (BWA). Despite the fact that WiMAX is able to provide a high data rate in a relatively large coverage; this technology has specific limitations such as: coverage, signal attenuation problems due to shadowing or path loss, and limited available spectrum. The IEEE 802.16j mobile multihop relay (MMR) technology is a pragmatic solution designed to overcome these limitations. The aim of IEEE 802.16j MMR is to expand the IEEE 802.16e's capabilities with multihop features. In particular, the uplink (UL) and downlink (DL) subframe allocation in WiMAX network is usually fixed. However, dynamic frame allocation is a useful mechanism to optimize uplink and downlink subframe size dynamically based on the traffic conditions through real-time traffic monitoring. This particular mechanism is important for future WiMAX based m-health applications as it allows the tradeoff in both UL and DL channels. In this paper, we address the dynamic frame allocation issue in IEEE 802.16j MMR network for m-health applications. A comparative performance analysis of the proposed approach is validated using the OPNET Modeler(®). The simulation results have shown an improved performance of resource allocation and end-to-end delay performance for typical medical video streaming application.

  6. Effects of IL-6 on pyruvate dehydrogenase regulation in mouse skeletal muscle

    DEFF Research Database (Denmark)

    Biensø, Rasmus Sjørup; Knudsen, Jakob Grunnet; Brandt, Nina

    2014-01-01

    Skeletal muscle regulates substrate choice according to demand and availability and pyruvate dehydrogenase (PDH) is central in this regulation. Circulating interleukin (IL)-6 increases during exercise and IL-6 has been suggested to increase whole body fat oxidation. Furthermore, IL-6 has been...... reported to increase AMP-activated protein kinase (AMPK) phosphorylation and AMPK suggested to regulate PDHa activity. Together, this suggests that IL-6 may be involved in regulating PDH. The aim of this study was to investigate the effect of a single injection of IL-6 on PDH regulation in skeletal muscle...... in fed and fasted mice. Fed and 16-18 h fasted mice were injected with either 3 ng · g(-1) recombinant mouse IL-6 or PBS as control. Fasting markedly reduced plasma glucose, muscle glycogen, muscle PDHa activity, as well as increased PDK4 mRNA and protein content in skeletal muscle. IL-6 injection did...

  7. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  8. Note n. SD3-DEM-01 regulations procedures relative to the based nuclear installations dismantling

    International Nuclear Information System (INIS)

    2003-02-01

    This note aims to define the regulations procedures relative to the safety of based nuclear installations dismantling defined by the decree of the 11 december 1963 modified. The first part describes the two main phases of a based nuclear installation life, the operating and the dismantling phase. The second part is devoted to the procedures. (A.L.B.)

  9. Delay efficient cooperation in public safety vehicular networks using LTE and IEEE 802.11p

    KAUST Repository

    Atat, Rachad

    2012-01-01

    Cooperative schemes for critical content distribution over vehicular networks are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range communications with the base station (BS) and 802.11p is considered for inter-vehicle collaboration on the short range. A high mobility environment with correlated shadowing is adopted. Both schemes are shown to outperform non-cooperative unicasting and multicasting, respectively, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2012 IEEE.

  10. Performance Analysis of Different Backoff Algorithms for WBAN-Based Emerging Sensor Networks.

    Science.gov (United States)

    Khan, Pervez; Ullah, Niamat; Ali, Farman; Ullah, Sana; Hong, Youn-Sik; Lee, Ki-Young; Kim, Hoon

    2017-03-02

    The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure of IEEE 802.15.6 Medium Access Control (MAC) protocols for the Wireless Body Area Network (WBAN) use an Alternative Binary Exponential Backoff (ABEB) procedure. The backoff algorithm plays an important role to avoid collision in wireless networks. The Binary Exponential Backoff (BEB) algorithm used in different standards does not obtain the optimum performance due to enormous Contention Window (CW) gaps induced from packet collisions. Therefore, The IEEE 802.15.6 CSMA/CA has developed the ABEB procedure to avoid the large CW gaps upon each collision. However, the ABEB algorithm may lead to a high collision rate (as the CW size is incremented on every alternative collision) and poor utilization of the channel due to the gap between the subsequent CW. To minimize the gap between subsequent CW sizes, we adopted the Prioritized Fibonacci Backoff (PFB) procedure. This procedure leads to a smooth and gradual increase in the CW size, after each collision, which eventually decreases the waiting time, and the contending node can access the channel promptly with little delay; while ABEB leads to irregular and fluctuated CW values, which eventually increase collision and waiting time before a re-transmission attempt. We analytically approach this problem by employing a Markov chain to design the PFB scheme for the CSMA/CA procedure of the IEEE 80.15.6 standard. The performance of the PFB algorithm is compared against the ABEB function of WBAN CSMA/CA. The results show that the PFB procedure adopted for IEEE 802.15.6 CSMA/CA outperforms the ABEB procedure.

  11. Performance Analysis of Different Backoff Algorithms for WBAN-Based Emerging Sensor Networks

    Directory of Open Access Journals (Sweden)

    Pervez Khan

    2017-03-01

    Full Text Available The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA procedure of IEEE 802.15.6 Medium Access Control (MAC protocols for the Wireless Body Area Network (WBAN use an Alternative Binary Exponential Backoff (ABEB procedure. The backoff algorithm plays an important role to avoid collision in wireless networks. The Binary Exponential Backoff (BEB algorithm used in different standards does not obtain the optimum performance due to enormous Contention Window (CW gaps induced from packet collisions. Therefore, The IEEE 802.15.6 CSMA/CA has developed the ABEB procedure to avoid the large CW gaps upon each collision. However, the ABEB algorithm may lead to a high collision rate (as the CW size is incremented on every alternative collision and poor utilization of the channel due to the gap between the subsequent CW. To minimize the gap between subsequent CW sizes, we adopted the Prioritized Fibonacci Backoff (PFB procedure. This procedure leads to a smooth and gradual increase in the CW size, after each collision, which eventually decreases the waiting time, and the contending node can access the channel promptly with little delay; while ABEB leads to irregular and fluctuated CW values, which eventually increase collision and waiting time before a re-transmission attempt. We analytically approach this problem by employing a Markov chain to design the PFB scheme for the CSMA/CA procedure of the IEEE 80.15.6 standard. The performance of the PFB algorithm is compared against the ABEB function of WBAN CSMA/CA. The results show that the PFB procedure adopted for IEEE 802.15.6 CSMA/CA outperforms the ABEB procedure.

  12. A low-power 802.11 AD compatible 60-GHz phase-locked loop in 65-NM CMOS

    KAUST Repository

    Cheema, Hammad M.; Arsalan, Muhammad; Salama, Khaled N.; Shamim, Atif

    2015-01-01

    A 60-GHz fundamental frequency phase locked loop (PLL) as part of a highly integrated system-on-chip transmitter with onchip memory and antenna is presented. As a result of localized optimization approach for each component, the PLL core components only consume 30.2 mW from a 1.2 V supply. A systematic design procedure to achieve high phase margin and wide locking range is presented. The reduction of parasitic and fixed capacitance contributions in the voltage controlled oscillator enables the coverage of the complete 802.11 ad frequency band from 57.2 to 65.8 GHz. A new 4-stage distribution network supplying the local oscillator (LO) signal to the mixer, the feedback loop and the external equipment is introduced. The prescaler based on the static frequency division approach is enhanced using shunt-peaking and asymmetric capacitive loading. The current mode logic based divider chain is optimized for low power and minimum silicon foot-print. A dead-zone free phase frequency detector, low leakage charge pump, and an integrated second-order passive filter completes the feedback loop. The PLL implemented in 65 nm CMOS process occupies only 0.6 mm2 of chip space and has a measured locking range from 56.8 to 66.5 GHz. The reference spurs are lower than -40 dBc and the in-band and out-of-band phase noise is -88.12 dBc/Hz and -117 dBc/Hz, respectively.

  13. A low-power 802.11 AD compatible 60-GHz phase-locked loop in 65-NM CMOS

    KAUST Repository

    Cheema, Hammad M.

    2015-01-23

    A 60-GHz fundamental frequency phase locked loop (PLL) as part of a highly integrated system-on-chip transmitter with onchip memory and antenna is presented. As a result of localized optimization approach for each component, the PLL core components only consume 30.2 mW from a 1.2 V supply. A systematic design procedure to achieve high phase margin and wide locking range is presented. The reduction of parasitic and fixed capacitance contributions in the voltage controlled oscillator enables the coverage of the complete 802.11 ad frequency band from 57.2 to 65.8 GHz. A new 4-stage distribution network supplying the local oscillator (LO) signal to the mixer, the feedback loop and the external equipment is introduced. The prescaler based on the static frequency division approach is enhanced using shunt-peaking and asymmetric capacitive loading. The current mode logic based divider chain is optimized for low power and minimum silicon foot-print. A dead-zone free phase frequency detector, low leakage charge pump, and an integrated second-order passive filter completes the feedback loop. The PLL implemented in 65 nm CMOS process occupies only 0.6 mm2 of chip space and has a measured locking range from 56.8 to 66.5 GHz. The reference spurs are lower than -40 dBc and the in-band and out-of-band phase noise is -88.12 dBc/Hz and -117 dBc/Hz, respectively.

  14. Energy Balance Regulating Neuropeptides Are Expressed through Pregnancy and Regulated by Interleukin-6 Deficiency in Mouse Placenta.

    Science.gov (United States)

    Pazos, Patricia; Lima, Luis; Diéguez, Carlos; García, María C

    2014-01-01

    The placenta produces a number of signaling molecules including metabolic and reproductive hormones as well as several inflammatory mediators. Among them, Interleukin-6 (IL-6), a well-known immune and metabolic regulator, acts peripherally modulating metabolic function and centrally increasing energy expenditure and reducing body fat. IL-6 interacts with key hypothalamic neuropeptidergic systems controlling energy homeostasis such as those producing the orexigenic/anabolic: neuropeptide Y (NPY) and agouti-related peptide (AgRP) and anorectic/catabolic neuropeptides: proopiomelanocortin (POMC) and cocaine and amphetamine regulated transcript (CART). Human and rat placenta have been identified as source of these neuropeptides, but their expression and regulation in murine placental tissues remain unknown. Therefore, placental mRNA levels of IL-6, NPY, AgRP, POMC, and CART at different pregnancy stages (gestational days 13, 15, and 18) were analyzed by real time PCR, as were the effect of IL-6 deficiency (IL-6 knockout mice) on their placental expression. Our results showed that placenta-derived neuropeptides were regulated by gestational age and IL-6 throughout the second half of mouse pregnancy. These data suggest that IL-6 may participate in the fine tune control of energy balance during pregnancy by extending its action as a metabolic signal to the main organ at the fetomaternal interface: the placenta.

  15. Do cysteine residues regulate transient receptor potential canonical type 6 (TRPC6) channel protein expression?

    DEFF Research Database (Denmark)

    Thilo, Florian; Liu, Ying; Krueger, Katharina

    2012-01-01

    The regulation of calcium influx through transient receptor potential canonical type 6 channel is mandatory for the activity of human monocytes. We submit the first evidence that cysteine residues of homocysteine or acetylcysteine affect TRPC6 expression in human monocytes. We observed that patie......The regulation of calcium influx through transient receptor potential canonical type 6 channel is mandatory for the activity of human monocytes. We submit the first evidence that cysteine residues of homocysteine or acetylcysteine affect TRPC6 expression in human monocytes. We observed...... that patients with chronic renal failure had significantly elevated homocysteine levels and TRPC6 mRNA expression levels in monocytes compared to control subjects. We further observed that administration of homocysteine or acetylcysteine significantly increased TRPC6 channel protein expression compared...... to control conditions. We therefore hypothesize that cysteine residues increase TRPC6 channel protein expression in humans....

  16. IEEE 802.11 ECG monitoring system.

    Science.gov (United States)

    Tejero-Calado, Juan; Lopez-Casado, Carmen; Bernal-Martin, Antonio; Lopez-Gomez, Miguel; Romero-Romero, Marco; Quesada, Guillermo; Lorca, Julio; Rivas, Ramon

    2005-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. This kind of devices favours at-home hospitalization, reducing the affluence to sanitary assistance centers to make routine controls. This fact causes a really favourable social impact, especially for elder people, rural-zone inhabitant, chronic patients and handicapped people. Furthermore, it offers new functionalities to physicians and will reduce the sanitary cost. Among these functionalities, biomedical signals can be sent to other devices (screen, PDA, PC...) or processing centers, without restricting the patients' mobility. The aim of this project is the development and implementation of a reduced size multi-channel electrocardiograph based on IEEE 802.11, which allows wireless monitoring of patients, and the insertion of the information into the TCP/IP Hospital network.

  17. Investigating the efficiency of IEEE 802.15.4 for medical monitoring applications.

    Science.gov (United States)

    Pelegris, P; Banitsas, K

    2011-01-01

    Recent advancements in wireless communications technologies bring us one step closer to provide reliable Telecare services as an alternative to patients staying in a hospital mainly for monitoring purposes. In this research we investigate the efficiency of IEEE 802.15.4 in a simple scenario where a patient is being monitored using an ECG and a blood analysis module. This approach binds well with assisted living solutions, by sharing the network infrastructure for both monitoring and control while taking advantage of the low power features of the protocol. Such applications are becoming more and more realistic to implement as IEEE 802.15.4 compatible hardware becomes increasingly available. Our aim is to examine the impact of Beacon and Superframe Order in the medium access delay, dropped packets, end to end delay, average retransmission attempts and consumed power focusing on this bandwidth demanding situation where the network load does not allow low duty cycles, in order to draw some conclusions on the effect that this will have to telemonitoring applications.

  18. Mig-6 regulates endometrial genes involved in cell cycle and progesterone signaling

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Jung-Yoon; Kim, Tae Hoon; Lee, Jae Hee [Department of Obstetrics, Gynecology & Reproductive Biology, Michigan State University, Grand Rapids, MI (United States); Dunwoodie, Sally L. [Developmental and Stem Cell Biology Division, Victor Chang Cardiac Research Institute, Darlinghurst, New South Wales 2010 (Australia); St. Vincent' s Clinical School and the School of Biotechnology and Biomolecular Sciences, University of New South Wales, Kensington, New South Wales 2033 (Australia); Ku, Bon Jeong, E-mail: bonjeong@cnu.ac.kr [Department of Internal Medicine, Chungnam National University School of Medicine, Daejeon (Korea, Republic of); Jeong, Jae-Wook, E-mail: JaeWook.Jeong@hc.msu.edu [Department of Obstetrics, Gynecology & Reproductive Biology, Michigan State University, Grand Rapids, MI (United States); Department of Women' s Health, Spectrum Health System, Grand Rapids, MI (United States)

    2015-07-10

    Mitogen inducible gene 6 (Mig-6) is an important mediator of progesterone (P4) signaling to inhibit estrogen (E2) signaling in the uterus. Ablation of Mig-6 in the murine uterus leads to the development of endometrial hyperplasia and E2-induced endometrial cancer. To identify the molecular pathways regulated by Mig-6, we performed microarray analysis on the uterus of ovariectomized Mig-6{sup f/f} and PGR{sup cre/+}Mig-6{sup f/f} (Mig-6{sup d/d}) mice treated with vehicle or P4 for 6 h. The results revealed that 772 transcripts were significantly regulated in the Mig-6{sup d/d} uterus treated with vehicle as compared with Mig-6{sup f/f} mice. The pathway analysis showed that Mig-6 suppressed the expression of gene-related cell cycle regulation in the absence of ovarian steroid hormone. The epithelium of Mig-6{sup d/d} mice showed a significant increase in the number of proliferative cells compared to Mig-6{sup f/f} mice. This microarray analysis also revealed that 324 genes are regulated by P4 as well as Mig-6. Cited2, the developmentally important transcription factor, was identified as being regulated by the P4-Mig-6 axis. To determine the role of Cited2 in the uterus, we used the mice with Cited2 that were conditionally ablated in progesterone receptor-positive cells (PGR{sup cre/+}Cited2{sup f/f}; Cited2{sup d/d}). Ablation of Cited2 in the uterus resulted in a significant reduction in the ability of the uterus to undergo a hormonally induced decidual reaction. Identification and analysis of these responsive genes will help define the role of P4 as well as Mig-6 in regulating uterine biology. - Highlights: • We identify Mig-6- and P4-regulated uterine genes by microarray analysis. • Mig-6 suppresses cell cycle progression and epithelial cell proliferation in uterus. • We identify the Mig-6 dependent induced genes by P4. • Cited2 plays an important role for decidualization as a P4 and Mig-6 target gene.

  19. 48 CFR 2910.002 - Procedures.

    Science.gov (United States)

    2010-10-01

    ... Section 2910.002 Federal Acquisition Regulations System DEPARTMENT OF LABOR ACQUISITION PLANNING MARKET RESEARCH 2910.002 Procedures. (a) In accordance with FAR 6.302-1(c), purchase descriptions must not specify... Contracts, should include product information concerning multiple sources based on research from www...

  20. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  1. 32 CFR 1697.8 - Procedures for salary offset.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for salary offset. 1697.8 Section 1697.8 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM SALARY OFFSET § 1697.8 Procedures for salary offset. (a) Deductions to liquidate an employee's debt will be by...

  2. 78 FR 62362 - Revisions to Procedural Regulations Governing Transportation by Intrastate Pipelines; Electronic...

    Science.gov (United States)

    2013-10-21

    ...] Revisions to Procedural Regulations Governing Transportation by Intrastate Pipelines; Electronic Tariff... under the Commission's jurisdiction pursuant to the Natural Gas Policy Act of 1978 or the Natural Gas Act.\\1\\ Take notice that, effective November 12, 2013, the list of available eTariff Type of Filing...

  3. Spectrum and service pricing for 802.22 networks

    DEFF Research Database (Denmark)

    Stefan, Andrei Lucian; Rota, Cyril; Pratas, Nuno

    2011-01-01

    of channels which have an impact on the demand, and thus on the spectrum pricing. The second part of the paper exemplifies how a Bertrand game model can solve the issue of service pricing for a Wireless Regional Area Network (WRAN) operator that is trying to deploy an 802.22 network in a region where...... a competitor already exists. In this work the service pricing was envisioned as a network preplanning step, one that would show the potential revenues for an operator by entering as inputs, among other, the competitor's coverage area and spectrum pricing. The case study has been conducted through CNPT1...

  4. Energy Balance Regulating Neuropeptides Are Expressed through Pregnancy and Regulated by Interleukin-6 Deficiency in Mouse Placenta

    Directory of Open Access Journals (Sweden)

    Patricia Pazos

    2014-01-01

    Full Text Available The placenta produces a number of signaling molecules including metabolic and reproductive hormones as well as several inflammatory mediators. Among them, Interleukin-6 (IL-6, a well-known immune and metabolic regulator, acts peripherally modulating metabolic function and centrally increasing energy expenditure and reducing body fat. IL-6 interacts with key hypothalamic neuropeptidergic systems controlling energy homeostasis such as those producing the orexigenic/anabolic: neuropeptide Y (NPY and agouti-related peptide (AgRP and anorectic/catabolic neuropeptides: proopiomelanocortin (POMC and cocaine and amphetamine regulated transcript (CART. Human and rat placenta have been identified as source of these neuropeptides, but their expression and regulation in murine placental tissues remain unknown. Therefore, placental mRNA levels of IL-6, NPY, AgRP, POMC, and CART at different pregnancy stages (gestational days 13, 15, and 18 were analyzed by real time PCR, as were the effect of IL-6 deficiency (IL-6 knockout mice on their placental expression. Our results showed that placenta-derived neuropeptides were regulated by gestational age and IL-6 throughout the second half of mouse pregnancy. These data suggest that IL-6 may participate in the fine tune control of energy balance during pregnancy by extending its action as a metabolic signal to the main organ at the fetomaternal interface: the placenta.

  5. Radio Frequency Fingerprinting Techniques Through Preamble Modification in IEEE 802.11B

    Science.gov (United States)

    2014-06-30

    4.2.1 Wald–Wolfowitz Runs Test . . . . . . . . . . . . . . . . . . . . . . 41 4.2.2 Wald–Wolfowitz Application to SXS System . . . . . . . . . . . . 42...Station SXS Signals eXploitation System USB Universal Serial Bus xiv Acronym Definition USRP Universal Software Radio Peripheral WLAN Wireless Local...Electronics Engineers (IEEE) defines standards applicable to the IEEE 802.11 protocol, however the standard does not reach the level of specificity to dictate

  6. Adaptive Radio Resource Allocation in Hierarchical QoS Scheduling for IEEE 802.16 Systems

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2007-01-01

    Future mobile communication systems such as IEEE 802.16 are expected to deliver a variety of multimedia services with diverse QoS requirements. To guarantee the QoS provision, appropriate scheduler architecture and scheduling algorithms have to be carefully designed. In this paper, we propose...

  7. Improving Energy Efficiency in Idle Listening of IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2016-01-01

    Full Text Available This paper aims to improve energy efficiency of IEEE 802.11 wireless local area networks (WLANs by effectively dealing with idle listening (IL, which is required for channel sensing and is unavoidable in a contention-based channel access mechanism. Firstly, we show that IL is a dominant source of energy drain in WLANs and it cannot be effectively alleviated by the power saving mechanism proposed in the IEEE 802.11 standard. To solve this problem, we propose an energy-efficient mechanism that combines three schemes in a systematic way: downclocking, frame aggregation, and contention window adjustment. The downclocking scheme lets a station remain in a semisleep state when overhearing frames destined to neighbor stations, whereby the station consumes the minimal energy without impairing channel access capability. As well as decreasing the channel access overhead, the frame aggregation scheme prolongs the period of semisleep time. Moreover, by controlling the size of contention window based on the number of stations, the proposed mechanism decreases unnecessary IL time due to collision and retransmission. By deriving an analysis model and performing extensive simulations, we confirm that the proposed mechanism significantly improves the energy efficiency and throughput, by up to 2.8 and 1.8 times, respectively, compared to the conventional power saving mechanisms.

  8. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  9. Achievable Rate Estimation of IEEE 802.11ad Visual Big-Data Uplink Access in Cloud-Enabled Surveillance Applications.

    Science.gov (United States)

    Kim, Joongheon; Kim, Jong-Kook

    2016-01-01

    This paper addresses the computation procedures for estimating the impact of interference in 60 GHz IEEE 802.11ad uplink access in order to construct visual big-data database from randomly deployed surveillance camera sensing devices. The acquired large-scale massive visual information from surveillance camera devices will be used for organizing big-data database, i.e., this estimation is essential for constructing centralized cloud-enabled surveillance database. This performance estimation study captures interference impacts on the target cloud access points from multiple interference components generated by the 60 GHz wireless transmissions from nearby surveillance camera devices to their associated cloud access points. With this uplink interference scenario, the interference impacts on the main wireless transmission from a target surveillance camera device to its associated target cloud access point with a number of settings are measured and estimated under the consideration of 60 GHz radiation characteristics and antenna radiation pattern models.

  10. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  11. 77 FR 60318 - Procedures for Transportation Workplace Drug and Alcohol Testing Programs: 6-acetylmorphine (6-AM...

    Science.gov (United States)

    2012-10-03

    ... 2105-AE14 Procedures for Transportation Workplace Drug and Alcohol Testing Programs: 6-acetylmorphine... 12866 and Regulatory Flexibility Act This Final Rule is not significant for purposes of Executive Order... certify, under the Regulatory Flexibility Act, that this rule does not have a significant economic impact...

  12. Spectrum-efficient multi-channel design for coexisting IEEE 802.15.4 networks: A stochastic geometry approach

    KAUST Repository

    Elsawy, Hesham

    2014-07-01

    For networks with random topologies (e.g., wireless ad-hoc and sensor networks) and dynamically varying channel gains, choosing the long term operating parameters that optimize the network performance metrics is very challenging. In this paper, we use stochastic geometry analysis to develop a novel framework to design spectrum-efficient multi-channel random wireless networks based on the IEEE 802.15.4 standard. The proposed framework maximizes both spatial and time domain frequency utilization under channel gain uncertainties to minimize the number of frequency channels required to accommodate a certain population of coexisting IEEE 802.15.4 networks. The performance metrics are the outage probability and the self admission failure probability. We relax the single channel assumption that has been used traditionally in the stochastic geometry analysis. We show that the intensity of the admitted networks does not increase linearly with the number of channels and the rate of increase of the intensity of the admitted networks decreases with the number of channels. By using graph theory, we obtain the minimum required number of channels to accommodate a certain intensity of coexisting networks under a self admission failure probability constraint. To this end, we design a superframe structure for the coexisting IEEE 802.15.4 networks and a method for time-domain interference alignment. © 2002-2012 IEEE.

  13. Det-WiFi: A Multihop TDMA MAC Implementation for Industrial Deterministic Applications Based on Commodity 802.11 Hardware

    Directory of Open Access Journals (Sweden)

    Yujun Cheng

    2017-01-01

    Full Text Available Wireless control system for industrial automation has been gaining increasing popularity in recent years thanks to their ease of deployment and the low cost of their components. However, traditional low sample rate industrial wireless sensor networks cannot support high-speed application, while high-speed IEEE 802.11 networks are not designed for real-time application and not able to provide deterministic feature. Thus, in this paper, we propose Det-WiFi, a real-time TDMA MAC implementation for high-speed multihop industrial application. It is able to support high-speed applications and provide deterministic network features since it combines the advantages of high-speed IEEE802.11 physical layer and a software Time Division Multiple Access (TDMA based MAC layer. We implement Det-WiFi on commercial off-the-shelf hardware and compare the deterministic performance between 802.11s and Det-WiFi under the real industrial environment, which is full of field devices and industrial equipment. We changed the hop number and the packet payload size in each experiment, and all of the results show that Det-WiFi has better deterministic performance.

  14. Analysing efficiency of IPv6 packet transmission over 6LoWPAN network

    Science.gov (United States)

    Kozłowski, Adam; Sosnowski, Janusz

    2017-08-01

    Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.

  15. Predictable and reliable ECG monitoring over IEEE 802.11 WLANs within a hospital.

    Science.gov (United States)

    Park, Juyoung; Kang, Kyungtae

    2014-09-01

    Telecardiology provides mobility for patients who require constant electrocardiogram (ECG) monitoring. However, its safety is dependent on the predictability and robustness of data delivery, which must overcome errors in the wireless channel through which the ECG data are transmitted. We report here a framework that can be used to gauge the applicability of IEEE 802.11 wireless local area network (WLAN) technology to ECG monitoring systems in terms of delay constraints and transmission reliability. For this purpose, a medical-grade WLAN architecture achieved predictable delay through the combination of a medium access control mechanism based on the point coordination function provided by IEEE 802.11 and an error control scheme based on Reed-Solomon coding and block interleaving. The size of the jitter buffer needed was determined by this architecture to avoid service dropout caused by buffer underrun, through analysis of variations in transmission delay. Finally, we assessed this architecture in terms of service latency and reliability by modeling the transmission of uncompressed two-lead electrocardiogram data from the MIT-BIH Arrhythmia Database and highlight the applicability of this wireless technology to telecardiology.

  16. 12 CFR 791.6 - Subject matter of a meeting.

    Science.gov (United States)

    2010-01-01

    ....6 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE... REGULATIONS; PUBLIC OBSERVATION OF NCUA BOARD MEETINGS Rules of NCUA Board Procedure § 791.6 Subject matter of... all Office Directors and President of the Central Liquidity Facility), and Regional Directors. [61 FR...

  17. Acute myotube protein synthesis regulation by IL-6-related cytokines.

    Science.gov (United States)

    Gao, Song; Durstine, J Larry; Koh, Ho-Jin; Carver, Wayne E; Frizzell, Norma; Carson, James A

    2017-11-01

    IL-6 and leukemia inhibitory factor (LIF), members of the IL-6 family of cytokines, play recognized paradoxical roles in skeletal muscle mass regulation, being associated with both growth and atrophy. Overload or muscle contractions can induce a transient increase in muscle IL-6 and LIF expression, which has a regulatory role in muscle hypertrophy. However, the cellular mechanisms involved in this regulation have not been completely identified. The induction of mammalian target of rapamycin complex 1 (mTORC1)-dependent myofiber protein synthesis is an established regulator of muscle hypertrophy, but the involvement of the IL-6 family of cytokines in this process is poorly understood. Therefore, we investigated the acute effects of IL-6 and LIF administration on mTORC1 signaling and protein synthesis in C2C12 myotubes. The role of glycoprotein 130 (gp130) receptor and downstream signaling pathways, including phosphoinositide 3-kinase (PI3K)-Akt-mTORC1 and signal transducer and activator of transcription 3 (STAT3)-suppressor of cytokine signaling 3 (SOCS3), was investigated by administration of specific siRNA or pharmaceutical inhibitors. Acute administration of IL-6 and LIF induced protein synthesis, which was accompanied by STAT3 activation, Akt-mTORC1 activation, and increased SOCS3 expression. This induction of protein synthesis was blocked by both gp130 siRNA knockdown and Akt inhibition. Interestingly, STAT3 inhibition or Akt downstream mTORC1 signaling inhibition did not fully block the IL-6 or LIF induction of protein synthesis. SOCS3 siRNA knockdown increased basal protein synthesis and extended the duration of the protein synthesis induction by IL-6 and LIF. These results demonstrate that either IL-6 or LIF can activate gp130-Akt signaling axis, which induces protein synthesis via mTORC1-independent mechanisms in cultured myotubes. However, IL-6- or LIF-induced SOCS3 negatively regulates the activation of myotube protein synthesis. Copyright © 2017 the

  18. Delay efficient cooperation in public safety vehicular networks using LTE and IEEE 802.11p

    KAUST Repository

    Atat, Rachad; Yaacoub, Elias E.; Alouini, Mohamed-Slim; Filali, Fethi

    2012-01-01

    (LTE) is used for long range communications with the base station (BS) and 802.11p is considered for inter-vehicle collaboration on the short range. A high mobility environment with correlated shadowing is adopted. Both schemes are shown to outperform

  19. Cross-Layer Measurement on an IEEE 802.11g Wireless Network Supporting MPEG-2 Video Streaming Applications in the Presence of Interference

    Directory of Open Access Journals (Sweden)

    Alessandro Sona

    2010-01-01

    Full Text Available The performance of wireless local area networks supporting video streaming applications, based on MPEG-2 video codec, in the presence of interference is here dealt with. IEEE 802.11g standard wireless networks, that do not support QoS in according with IEEE 802.11e standard, are, in particular, accounted for and Bluetooth signals, additive white Gaussian noise, and competitive data traffic are considered as sources of interference. The goal is twofold: from one side, experimentally assessing and correlating the values that some performance metrics assume at the same time at different layers of an IEEE 802.11g WLAN delivering video streaming in the presence of in-channel interference; from the other side, deducing helpful and practical hints for designers and technicians, in order to efficiently assess and enhance the performance of an IEEE 802.11g WLAN supporting video streaming in some suitable setup conditions and in the presence of interference. To this purpose, an experimental analysis is planned following a cross-layer measurement approach, and a proper testbed within a semianechoic chamber is used. Valuable results are obtained in terms of signal-to-interference ratio, packet loss ratio, jitter, video quality, and interference data rate; helpful hints for designers and technicians are finally gained.

  20. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah.

    Science.gov (United States)

    Tian, Le; Khorov, Evgeny; Latré, Steven; Famaey, Jeroen

    2017-07-04

    IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing

  1. A Mitigation Approach to Counter Initial Ranging Based DoS Attacks on IEEE 802.16-2009

    International Nuclear Information System (INIS)

    Saleem, Y.; Asif, K.H.; Ahmad, T.; Bashir, K.

    2013-01-01

    In recent years increase in wireless accessed devices does not prerequisite any evidence. Security is the main concern for the researchers in 802.16e now-a-days. The layer structures defines that the security sub-layer resides over the physical layer and provides security on the link layer. This paper discusses the security threats present and still unsolved at the initial network entry stage. A mitigation approach to counter Initial Ranging Based DoS attacks on IEEE 802.16-2009 are particularized in this paper. Furthermore the existing solutions of initial ranging vulnerability are analyzed and their limitations are discussed. Proposed solution was checked against these limitations to ensure their absence. Moreover the solution was implemented in OMNET++ and results were analyzed to ensure the practicality and efficiency. (author)

  2. 30 CFR 77.802 - Protection of high-voltage circuits; neutral grounding resistors; disconnecting devices.

    Science.gov (United States)

    2010-07-01

    ... AND SURFACE WORK AREAS OF UNDERGROUND COAL MINES Surface High-Voltage Distribution § 77.802 Protection... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protection of high-voltage circuits; neutral... grounded through a suitable resistor at the source transformers, and a grounding circuit, originating at...

  3. Comparison Of Several Methods Of Implementing A Fiber Optic IEEE 802.3 Ethernet

    Science.gov (United States)

    Thompson, Geoffrey O.

    1987-01-01

    Several different methods of implementing a fiber optic version of IEEE 802.3 10BASE LANs have been proposed as a candidate for standardization by IEEE. There have been extensive discussions as to the relative merits and features of the several systems. This paper will discuss the merits of each for this particular application on a comparative basis.

  4. Final Report Independent Verification Survey of the High Flux Beam Reactor, Building 802 Fan House Brookhaven National Laboratory Upton, New York

    Energy Technology Data Exchange (ETDEWEB)

    Harpeneau, Evan M. [Oak Ridge Institute for Science and Education, Oak Ridge, TN (United States). Independent Environmental Assessment and Verification Program

    2011-06-24

    On May 9, 2011, ORISE conducted verification survey activities including scans, sampling, and the collection of smears of the remaining soils and off-gas pipe associated with the 802 Fan House within the HFBR (High Flux Beam Reactor) Complex at BNL. ORISE is of the opinion, based on independent scan and sample results obtained during verification activities at the HFBR 802 Fan House, that the FSS (final status survey) unit meets the applicable site cleanup objectives established for as left radiological conditions.

  5. 49 CFR 1111.6 - Satisfaction of complaint.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Satisfaction of complaint. 1111.6 Section 1111.6 Transportation Other Regulations Relating to Transportation (Continued) SURFACE TRANSPORTATION BOARD, DEPARTMENT OF TRANSPORTATION RULES OF PRACTICE COMPLAINT AND INVESTIGATION PROCEDURES § 1111.6 Satisfaction of...

  6. Public regulation of site selection for nuclear power plants. Present procedures and reform proposals: an annotated bibliography

    International Nuclear Information System (INIS)

    Klema, E.D.; West, R.L.

    1977-01-01

    Part I of this bibliography contains literature which describes the process of power-plant siting as conducted by the utilities, siting procedures at the point of initiative, analytical tools employed or proposed for site assessment by enterprises in the industry, and the wide range of considerations which the utilities take into account in making site assessments. Part II contains studies and reports on the structure and process of public regulation of power plant siting: the licensing of nuclear facilities by the NRC under terms of the special Government powers in the field of nuclear energy that have evolved since World War II; the steady expansion of regulatory objectives bearing on site approval for nuclear power plants; local government, State, and other Federal agency regulation of siting; survey siting procedures in other countries; the role of regulatory delay in the long lead-time required for construction and operation of nuclear plants. Part III incudes citations on regulatory structure and practice that are unresponsive to the public interest; regulatory decision making's insufficient accessible to public scrutiny and participation; and regulatory procedures that encourage and protect inefficient practices of the regulated industries. Some legal decisions and case studies are included. Part IV, Reform Proposals, includes citations on regulatory reform and reform of siting regulations. Abstracts are provided with 157 of the citations with many more papers cited by title, author, and accession data

  7. Achievable Rate Estimation of IEEE 802.11ad Visual Big-Data Uplink Access in Cloud-Enabled Surveillance Applications.

    Directory of Open Access Journals (Sweden)

    Joongheon Kim

    Full Text Available This paper addresses the computation procedures for estimating the impact of interference in 60 GHz IEEE 802.11ad uplink access in order to construct visual big-data database from randomly deployed surveillance camera sensing devices. The acquired large-scale massive visual information from surveillance camera devices will be used for organizing big-data database, i.e., this estimation is essential for constructing centralized cloud-enabled surveillance database. This performance estimation study captures interference impacts on the target cloud access points from multiple interference components generated by the 60 GHz wireless transmissions from nearby surveillance camera devices to their associated cloud access points. With this uplink interference scenario, the interference impacts on the main wireless transmission from a target surveillance camera device to its associated target cloud access point with a number of settings are measured and estimated under the consideration of 60 GHz radiation characteristics and antenna radiation pattern models.

  8. Analysis of Adaptive Control Scheme in IEEE 802.11 and IEEE 802.11e Wireless LANs

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Hui-Cheng

    In order to achieve the prioritized quality of service (QoS) guarantee, the IEEE 802.11e EDCAF (the enhanced distributed channel access function) provides the distinguished services by configuring the different QoS parameters to different access categories (ACs). An admission control scheme is needed to maximize the utilization of wireless channel. Most of papers study throughput improvement by solving the complicated multidimensional Markov-chain model. In this paper, we introduce a back-off model to study the transmission probability of the different arbitration interframe space number (AIFSN) and the minimum contention window size (CWmin). We propose an adaptive control scheme (ACS) to dynamically update AIFSN and CWmin based on the periodical monitoring of current channel status and QoS requirements to achieve the specific service differentiation at access points (AP). This paper provides an effective tuning mechanism for improving QoS in WLAN. Analytical and simulation results show that the proposed scheme outperforms the basic EDCAF in terms of throughput and service differentiation especially at high collision rate.

  9. Emotion regulation strategies: procedure modeling of J. Gross and cultural activity approach

    Directory of Open Access Journals (Sweden)

    Elena I. Pervichko

    2015-03-01

    Full Text Available The first part of this paper argued the desirability of structural-dynamic model of emotion regulation in the theoretical and methodological framework of cultural activity paradigm with the construction of a psychologically-based typology of emotion regulation strategies in norm and pathology, and also psychological mechanisms enabling the regulation of emotions. This conclusion was based on the analysis of the basic concepts and paradigms in which the issue of emotion regulation is studied: cognitive and psychoanalytic approaches, concept and emotional development of emotional intelligence, cultural activity approach. The paper considers the procedure model of emotion regulation by J. Gross, identifies emotion regulation strategies and evaluates their effectiveness. The possibilities and limitations of the model. Based on the review of the today research the conclusion is arrived at that the existing labels on a wide range of regulatory strategies remain an open issue.The author’s definition of emotion regulation is drawn. Emotion regulation is deemed as a set of mental processes, psychological mechanisms and regulatory strategies that people use to preserve the capacity for productive activities in a situation of emotional stress; to ensure optimal impulse control and emotions; to maintain the excitement at the optimum level. The second part of this paper provides the general description of emotion regulation strategies, the approach to their typology, the psychological mechanisms of emotion regulation that lie in the basis of this typology, i.e. the main elements of the structural-dynamic model of emotion regulation. The work shows theoretical and methodological efficacy of empirical significance of signs and symbols and also personal reflection. The diagnostic system to allow empirically identify a wide range of emotion regulation strategies is suggested. The psychological mechanisms used by the subject to solve the problem of emotional

  10. WIH-based IEEE 802.11 ECG monitoring implementation.

    Science.gov (United States)

    Moein, A; Pouladian, M

    2007-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. It offers new functionalities to physicians and will reduce the costs. Among these functionalities, biomedical signals can be sent to other devices (PDA, PC . . . ) or processing centers, without restricting the patients' mobility. This article discusses the WIH (Ward-In-Hand) structure and the software required for its implementation before an operational example is presented with its results. The aim of this project is the development and implementation of a reduced size electrocardiograph based on IEEE 802.11 with high speed and more accuracy, which allows wireless monitoring of patients, and the insertion of the information into the Wi-Fi hospital networks.

  11. VLSI implementation of MIMO detection for 802.11n using a novel adaptive tree search algorithm

    International Nuclear Information System (INIS)

    Yao Heng; Jian Haifang; Zhou Liguo; Shi Yin

    2013-01-01

    A 4×4 64-QAM multiple-input multiple-output (MIMO) detector is presented for the application of an IEEE 802.11n wireless local area network. The detectoris the implementation of a novel adaptive tree search(ATS) algorithm, and multiple ATS cores need to be instantiated to achieve the wideband requirement in the 802.11n standard. Both the ATS algorithm and the architectural considerations are explained. The latency of the detector is 0.75 μs, and the detector has a gate count of 848 k with a total of 19 parallel ATS cores. Each ATS core runs at 67 MHz. Measurement results show that compared with the floating-point ATS algorithm, the fixed-point implementation achieves a loss of 0.9 dB at a BER of 10 −3 . (semiconductor integrated circuits)

  12. 6 CFR 5.45 - Procedure when testimony or production of documents is sought; general.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Procedure when testimony or production of... Procedure when testimony or production of documents is sought; general. (a) If official information is... requiring oral testimony, and identification of potentially relevant documents. (c) The appropriate...

  13. Rate Adaptation Based on Collision Probability for IEEE 802.11 WLANs

    Science.gov (United States)

    Kim, Taejoon; Lim, Jong-Tae

    Nowadays IEEE 802.11 wireless local area networks (WLANs) support multiple transmission rates. To achieve the best performance, transmitting stations adopt the various forms of automatic rate fallback (ARF). However, ARF suffers from severe performance degradation as the number of transmitting stations increases. In this paper, we propose a new rate adaptation scheme which adjusts the ARF's up/down threshold according to the channel contention level. Simulation result shows that the proposed scheme achieves fairly good performance compared with the existing schemes.

  14. Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M...... reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably...

  15. Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Ikram Syed

    2016-01-01

    Full Text Available The performance improvement in IEEE 802.11 WLANs in widely fluctuating network loads is a challenging task. To improve the performance in this saturated state, we develop an adaptive backoff algorithm that maximizes the system throughput, reduces the collision probability, and maintains a high fairness for the IEEE 802.11 DCF under dense network conditions. In this paper, we present two main advantages of the proposed ABA-CW algorithm. First, it estimates the number of active stations and then calculates an optimal contention window based on the active station number. Each station calculates the channel state probabilities by observing the channel for the total backoff period. Based on these channel states probabilities, each station can estimate the number of active stations in the network, after which it calculates the optimal CW utilizing the estimated active number of stations. To evaluate the proposed mechanism, we derive an analytical model to determine the network performance. From our results, the proposed ABA-CW mechanism achieved better system performance compared to fixed-CW (BEB, EIED, LILD, and SETL and adaptive-CW (AMOCW, Idle Sense mechanisms. The simulation results confirmed the outstanding performance of the proposed mechanism in that it led to a lower collision probability, higher throughput, and high fairness.

  16. FISCAL PROCEDURE CODE AND REGULATIONS REGARDING TRANSACTIONS WITH AFFILIATES

    Directory of Open Access Journals (Sweden)

    Enea Constantin

    2012-03-01

    Full Text Available In determinate the transfer prices, The Romanian Procedural Fiscal Code stipulates (in the 79th article the obligation for those contributors who make transactions with related entities to draw up a record of transfer prices and to forward it to the tax administrations (at their request. Currently, the UE member states seek harmonization of tax legislation, with the aim of creating a common tax base. An important effect of the common base would be giving up the requirement for compiling a transfer price record, because the realization of income in a member state shall be associated with expenses in the state where the affiliate is located. In Romania, the guidelines on transfer pricing developed by the OECD have been assimilated into the domestic tax regulations (although our country is not yet a member of OECD, in order to harmonize these regulations in the Community. The main effect globalization has on transfer prices is increasing their complexity, as, in fact, economic globalization is reason for the existence of transfer pricing. With the increasing complexity of this area, states are forced either to improve legislation, or to create it, in order to ensure the growth of states income taxes.

  17. Performance characterization of the IEEE 802.11 signal transmission over a multimode fiber PON

    Science.gov (United States)

    Maksymiuk, L.; Siuzdak, J.

    2014-11-01

    In this paper there are presented measurements concerning performance analysis of the IEEE 802.11 signal distribution over multimode fiber based passive optical network. In the paper there are addressed three main sources of impairments: modal noise, frequency response fluctuation of the multimode fiber and non-linear distortion of the signal in the receiver.

  18. Dynamic Contention Window Control Scheme in IEEE 802.11e EDCA-Based Wireless LANs

    Science.gov (United States)

    Abeysekera, B. A. Hirantha Sithira; Matsuda, Takahiro; Takine, Tetsuya

    In the IEEE 802.11 MAC protocol, access points (APs) are given the same priority as wireless terminals in terms of acquiring the wireless link, even though they aggregate several downlink flows. This feature leads to a serious throughput degradation of downlink flows, compared with uplink flows. In this paper, we propose a dynamic contention window control scheme for the IEEE 802.11e EDCA-based wireless LANs, in order to achieve fairness between uplink and downlink TCP flows while guaranteeing QoS requirements for real-time traffic. The proposed scheme first determines the minimum contention window size in the best-effort access category at APs, based on the number of TCP flows. It then determines the minimum and maximum contention window sizes in higher priority access categories, such as voice and video, so as to guarantee QoS requirements for these real-time traffic. Note that the proposed scheme does not require any modification to the MAC protocol at wireless terminals. Through simulation experiments, we show the effectiveness of the proposed scheme.

  19. Characteristics of the Panasonic UD-802 phosphors

    International Nuclear Information System (INIS)

    Ben-Shachar, B.; Catchen, G.L.; Hoffman, J.M.

    1989-01-01

    Several basic dosimetric characteristics of Li 2 B 4 O 7 :Cu and CaSO 4 :Tm phosphors in Panasonic UD-802 dosemeters were measured. The TL dose response linearity was determined over the useful range of personnel and environmental dosimetry (0.005 - 10 mGy), and the minimum measurable doses were calculated. The intrinsic ultraviolet (UV) radiation sensitivity of both phosphors was checked before and after γ irradiation for the purpose of re-assessing high doses. The results indicate that Li 2 B 4 O 7 :Cu is UV sensitive and, therefore, re-assessment is not applicable. Although the CaSO 4 :Tm phosphor exhibited UV sensitivity after γ irradiation, the results were not consistent with those reported earlier and more study is required. The fading of both phosphors was evaluated in Panasonic UD-801 dosemeters for periods up to 90 days. (author)

  20. A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    Seyed Davoud Mousavi

    2018-05-01

    Full Text Available Cooperative communication techniques have recently enabled wireless technologies to overcome their challenges. The main objective of these techniques is to improve resource allocation. In this paper, we propose a new protocol in medium access control (MAC of the IEEE 802.11 standard. In our new protocol, which is called Fair Cooperative MAC (FC-MAC, every relay node participates in cooperation proportionally to its provided cooperation gain. This technique improves network resource allocation by exploiting the potential capacity of all relay candidates. Simulation results demonstrate that the FC-MAC protocol presents better performance in terms of throughput, fairness, and network lifetime.

  1. The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms

    Directory of Open Access Journals (Sweden)

    Trong-Minh Hoang

    2017-01-01

    Full Text Available Security of any wireless network is always an important issue due to its serious impacts on network performance. Practically, the IEEE 802.11 medium access control can be violated by several native or smart attacks that result in downgrading network performance. In recent years, there are several studies using analytical model to analyze medium access control (MAC layer misbehavior issue to explore this problem but they have focused on binary exponential backoff only. Moreover, a practical condition such as the freezing backoff issue is not included in the previous models. Hence, this paper presents a novel analytical model of the IEEE 802.11 MAC to thoroughly understand impacts of misbehaving node on network throughput and delay parameters. Particularly, the model can express detailed backoff algorithms so that the evaluation of the network performance under some typical attacks through numerical simulation results would be easy.

  2. A pseudo differential Gm—C complex filter with frequency tuning for IEEE802.15.4 applications

    Science.gov (United States)

    Xin, Cheng; Lungui, Zhong; Haigang, Yang; Fei, Liu; Tongqiang, Gao

    2011-07-01

    This paper presents a CMOS Gm—C complex filter for a low-IF receiver of the IEEE 802.15.4 standard. A pseudo differential OTA with reconfigurable common mode feedback and common mode feed-forward is proposed as well as the frequency tuning method based on a relaxation oscillator. A detailed analysis of non-ideality of the OTA and the frequency tuning method is elaborated. The analysis and measurement results have shown that the center frequency of the complex filter could be tuned accurately. The chip was fabricated in a standard 0.35 μm CMOS process, with a single 3.3 V power supply. The filter consumes 2.1mA current, has a measured in-band group delay ripple of less than 0.16 μs and an IRR larger than 28 dB at 2 MHz apart, which could meet the requirements oftheIEEE802.15.4 standard.

  3. THE INFLUENCE OF MAC BUFFER ON THE CONTENTION-BASED ACCESS SCHEME WITH BURSTING OPTION FOR IEEE 802.11E WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    S. SELVAKENNEDY

    2006-12-01

    Full Text Available Wireless LANs are increasingly being used for inelastic applications. Currently, there is little support for quality of service in the IEEE 802.11 MAC protocol, and IEEE task group E has defined the 802.11e MAC extension. Enhanced distributed channel access (EDCA is a contention-based scheme of the 802.11e standard. To allow a station to transmit more than one frame from a single contention, an optional feature known as controlled frame-bursting (CFB is introduced in the standard. In this paper, we initially performed an average analysis to determine a suitable burst duration limit. Then, a detailed evaluation and comparison of the EDCA protocol with the CFB option is carried out through simulation to quantify its performance gain. The impact of the MAC transmit buffer size is also incorporated. Accordingly, we have proposed a suitable approach to guide the configuration of the burst duration limit. It is demonstrated that an optimized CFB configuration allows the MAC protocol to achieve 30% more capacity than the basic EDCA scheme.

  4. Green Frame Aggregation Scheme for IEEE 802.11n Networks

    KAUST Repository

    Alaslani, Maha S.

    2015-04-01

    Frame aggregation is one of the major MAC layer enhancements in the IEEE 802.11 family that boosts the network throughput performance. It aims to achieve higher throughput by transmitting huge amount of data in a single transmit oppor- tunity. With the increasing awareness of energy e ciency, it has become vital to rethink about the design of such frame aggregation protocol. Aggregation techniques help to reduce energy consumption over ideal channel conditions. However, in a noisy channel environment, a new energy-aware frame aggregation scheme is required. In this thesis, a novel Green Frame Aggregation (GFA) scheduling scheme has been proposed and evaluated. GFA optimizes the aggregate size based on channel quality in order to minimize the consumed energy. GFA selects the optimal sub-frame size that satisfies the loss constraint for real-time applications as well as the energy budget of the ideal channel situations. The design, the implementation, and evaluation of GFA using testbed deployment is done. The experimental analysis shows that GFA outperforms the conventional frame aggregation methodology in terms of energy e ciency by about 6⇥ in the presence of severe interference conditions. Moreover, GFA also outperforms the static frame sizing method in terms of network goodput and maintains almost the same end- to-end latency.

  5. PhERF6, interacting with EOBI, negatively regulates fragrance biosynthesis in petunia flowers.

    Science.gov (United States)

    Liu, Fei; Xiao, Zhina; Yang, Li; Chen, Qian; Shao, Lu; Liu, Juanxu; Yu, Yixun

    2017-09-01

    In petunia, the production of volatile benzenoids/phenylpropanoids determines floral aroma, highly regulated by development, rhythm and ethylene. Previous studies identified several R2R3-type MYB trans-factors as positive regulators of scent biosynthesis in petunia flowers. Ethylene response factors (ERFs) have been shown to take part in the signal transduction of hormones, and regulation of metabolism and development processes in various plant species. Using virus-induced gene silencing technology, a negative regulator of volatile benzenoid biosynthesis, PhERF6, was identified by a screen for regulators of the expression of genes related to scent production. PhERF6 expression was temporally and spatially connected with scent production and was upregulated by exogenous ethylene. Up-/downregulation of the mRNA level of PhERF6 affected the expression of ODO1 and several floral scent-related genes. PhERF6 silencing led to a significant increase in the concentrations of volatiles emitted by flowers. Yeast two-hybrid, bimolecular fluorescence complementation and co-immunoprecipitation assays indicated that PhERF6 interacted with the N-terminus of EOBI, which includes two DNA binding domains. Our results show that PhERF6 negatively regulates volatile production in petunia flowers by competing for the binding of the c-myb domains of the EOBI protein with the promoters of genes related to floral scent. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  6. 32 CFR 191.6 - Procedures.

    Science.gov (United States)

    2010-07-01

    .... (7) Develop procedures for and implement a program to eliminate sexual harassment in Component work places, consistent with DoD Policy on Sexual Harassment memorandums, and to ensure compliance with the...

  7. 45 CFR 1616.6 - Equal employment opportunity.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Equal employment opportunity. 1616.6 Section 1616.6 Public Welfare Regulations Relating to Public Welfare (Continued) LEGAL SERVICES CORPORATION ATTORNEY HIRING § 1616.6 Equal employment opportunity. A recipient shall adopt employment qualifications, procedures, and policies that meet the...

  8. 48 CFR 1845.405-70 - NASA procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true NASA procedures. 1845.405... ADMINISTRATION CONTRACT MANAGEMENT GOVERNMENT PROPERTY Contractor Use and Rental of Government Property 1845.405... and research property if such property is used in performing services or manufacturing articles for...

  9. Znhit1 causes cell cycle arrest and down-regulates CDK6 expression

    International Nuclear Information System (INIS)

    Yang, Zhengmin; Cao, Yonghao; Zhu, Xiaoyan; Huang, Ying; Ding, Yuqiang; Liu, Xiaolong

    2009-01-01

    Cyclin-dependent kinase 6 (CDK6) is the key element of the D-type cyclin holoenzymes which has been found to function in the regulation of G1-phase of the cell cycle and is presumed to play important roles in T cell function. In this study, Znhit1, a member of a new zinc finger protein family defined by a conserved Zf-HIT domain, induced arrest in the G1-phase of the cell cycle in NIH/3T3 cells. Of the G1 cell cycle factors examined, the expression of CDK6 was found to be strongly down-regulated by Znhit1 via transcriptional repression. This effect may have correlations with the decreased acetylation level of histone H4 in the CDK6 promoter region. In addition, considering that CDK6 expression predominates in T cells, the negative regulatory role of Znhit1 in TCR-induced T cell proliferation was validated using transgenic mice. These findings identified Znhit1 as a CDK6 regulator that plays an important role in cell proliferation.

  10. 50 CFR 32.3 - What are the procedures for publication of refuge-specific hunting regulations?

    Science.gov (United States)

    2010-10-01

    ... and publication of the opening of a wildlife refuge area to migratory game bird, upland game or big game hunting. (b) Refuge-specific hunting regulations may contain the following items: (1) Wildlife... FISHING General Provisions § 32.3 What are the procedures for publication of refuge-specific hunting...

  11. Oldest Packet Drop (OPD): a Buffering Mechanism for Beaconing in IEEE 802.11p VANETs

    NARCIS (Netherlands)

    van Eenennaam, Martijn; Hendriks, Luuk; Karagiannis, Georgios; Heijenk, Geert

    2011-01-01

    The IEEE 802.11p MAC technology can be used to provide connectivity for real-time vehicle control known as Cooperative Adaptive Cruise Control. Due to the real-time nature of this system, it is paramount the delay of the received information is as small as possible. This paper researches the Oldest

  12. Interference Measurements in IEEE 802.11 Communication Links Due to Different Types of Interference Sources

    NARCIS (Netherlands)

    van Bloem, J.W.H.; Schiphorst, Roelof; Kluwer, Taco; Slump, Cornelis H.

    2012-01-01

    The number of wireless devices (smartphones, laptops, sensors) that use the 2.4 GHz ISM band is rapidly increasing. The most common communication system in this band is Wi-Fi (IEEE 802.11b/g/n). For that reason coexistence between Wi-Fi and other systems becomes more and more important. In this

  13. A pseudo differential Gm-C complex filter with frequency tuning for IEEE802.15.4 applications

    International Nuclear Information System (INIS)

    Cheng Xin; Yang Haigang; Liu Fei; Gao Tongqiang; Zhong Lungui

    2011-01-01

    This paper presents a CMOS G m -C complex filter for a low-IF receiver of the IEEE 802.15.4 standard. A pseudo differential OTA with reconfigurable common mode feedback and common mode feed-forward is proposed as well as the frequency tuning method based on a relaxation oscillator. A detailed analysis of non-ideality of the OTA and the frequency tuning method is elaborated. The analysis and measurement results have shown that the center frequency of the complex filter could be tuned accurately. The chip was fabricated in a standard 0.35 μm CMOS process, with a single 3.3 V power supply. The filter consumes 2.1mA current, has a measured in-band group delay ripple of less than 0.16 μs and an IRR larger than 28 dB at 2 MHz apart, which could meet the requirements oftheIEEE802.15.4 standard. (semiconductor integrated circuits)

  14. CSMA/CCA: A Modified CSMA/CA Protocol Mitigating the Fairness Problem for IEEE 802.11 DCF

    Directory of Open Access Journals (Sweden)

    Wang Xin

    2006-01-01

    Full Text Available Carrier sense multiple access with collision avoidance (CSMA/CA has been adopted by the IEEE 802.11 standards for wireless local area networks (WLANs. Using a distributed coordination function (DCF, the CSMA/CA protocol reduces collisions and improves the overall throughput. To mitigate fairness issues arising with CSMA/CA, we develop a modified version that we term CSMA with copying collision avoidance (CSMA/CCA. A station in CSMA/CCA contends for the shared wireless medium by employing a binary exponential backoff similar to CSMA/CA. Different from CSMA/CA, CSMA/CCA copies the contention window (CW size piggybacked in the MAC header of an overheard data frame within its basic service set (BSS and updates its backoff counter according to the new CW size. Simulations carried out in several WLAN configurations illustrate that CSMA/CCA improves fairness relative to CSMA/CA and offers considerable advantages for deployment in the 802.11-standard-based WLANs.

  15. LARP6 Meets Collagen mRNA: Specific Regulation of Type I Collagen Expression

    Directory of Open Access Journals (Sweden)

    Yujie Zhang

    2016-03-01

    Full Text Available Type I collagen is the most abundant structural protein in all vertebrates, but its constitutive rate of synthesis is low due to long half-life of the protein (60–70 days. However, several hundred fold increased production of type I collagen is often seen in reparative or reactive fibrosis. The mechanism which is responsible for this dramatic upregulation is complex, including multiple levels of regulation. However, posttranscriptional regulation evidently plays a predominant role. Posttranscriptional regulation comprises processing, transport, stabilization and translation of mRNAs and is executed by RNA binding proteins. There are about 800 RNA binding proteins, but only one, La ribonucleoprotein domain family member 6 (LARP6, is specifically involved in type I collagen regulation. In the 5′untranslated region (5’UTR of mRNAs encoding for type I and type III collagens there is an evolutionally conserved stem-loop (SL structure; this structure is not found in any other mRNA, including any other collagen mRNA. LARP6 binds to the 5′SL in sequence specific manner to regulate stability of collagen mRNAs and their translatability. Here, we will review current understanding of how is LARP6 involved in posttranscriptional regulation of collagen mRNAs. We will also discuss how other proteins recruited by LARP6, including nonmuscle myosin, vimentin, serine threonine kinase receptor associated protein (STRAP, 25 kD FK506 binding protein (FKBP25 and RNA helicase A (RHA, contribute to this process.

  16. Performance of the IEEE 802.3 EPON registration scheme under high load

    Science.gov (United States)

    Bhatia, Swapnil P.; Bartos, Radim

    2004-09-01

    The proposed standard for the IEEE 802.3 Ethernet Passive Optical Network includes a random delayed transmission scheme for registration of new nodes. Although the scheme performs well on low loads, our simulation demonstrates the degraded and undesirable performance of the scheme at higher loads. We propose a simple modification to the current scheme that increases its range of operation and is compatible with the IEEE draft standard. We demonstrate the improvement in performance gained without any significant increase in registration delay.

  17. Throughput analysis of the IEEE 802.4 token bus standard under heavy load

    Science.gov (United States)

    Pang, Joseph; Tobagi, Fouad

    1987-01-01

    It has become clear in the last few years that there is a trend towards integrated digital services. Parallel to the development of public Integrated Services Digital Network (ISDN) is service integration in the local area (e.g., a campus, a building, an aircraft). The types of services to be integrated depend very much on the specific local environment. However, applications tend to generate data traffic belonging to one of two classes. According to IEEE 802.4 terminology, the first major class of traffic is termed synchronous, such as packetized voice and data generated from other applications with real-time constraints, and the second class is called asynchronous which includes most computer data traffic such as file transfer or facsimile. The IEEE 802.4 token bus protocol which was designed to support both synchronous and asynchronous traffic is examined. The protocol is basically a timer-controlled token bus access scheme. By a suitable choice of the design parameters, it can be shown that access delay is bounded for synchronous traffic. As well, the bandwidth allocated to asynchronous traffic can be controlled. A throughput analysis of the protocol under heavy load with constant channel occupation of synchronous traffic and constant token-passing times is presented.

  18. Performance analysis of the IEEE 802.16e power management for the initiations of awakening

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    To increase battery life in IEEE 802.16e systems, it is essential to efficiently manage energy in mobile stations. The sleep-mode operation in power management helps to increase the life of a station by saving energy consumption. In power management, there are two important performance metrics: energy consumption and the response delay of awakening medium access control (MAC) service data unit (SDU). While in a base station (BS) initiation of awakening, the two performance metrics should be simultaneously considered, in a mobile subscriber station (MSS) initiation of awakening, the response delay is not considered because it is self-operational. There performance metrics are affected by the minimum sleep interval (Tmin), the maximum sleep interval (Tmax), and the average interarrival time of awakening MAC SDUs (TI) during sleep-mode operation. Therefore, it is imperative to evaluate the two initiations of awakening depending on TI. To reach a fuller understanding of the performance, this paper shows an analytical mode and simulations results for the standard sleep-mode operation in the IEEE 802.16e MAC.

  19. Modulation of brassinosteroid-regulated gene expression by jumonji domain-containing proteins ELF6 and REF6 in Arabidopsis

    OpenAIRE

    Yu, Xiaofei; Li, Li; Li, Lei; Guo, Michelle; Chory, Joanne; Yin, Yanhai

    2008-01-01

    Plant steroid hormones, brassinosteroids (BRs), are of great importance for plant growth and development. BRs signal through a cell surface receptor kinase, BRI1, and a GSK3-like kinase, BIN2, to regulate the BES1/BZR1 family of transcription factors, which directly bind to target gene promoters to activate or repress gene expression and mediate BR responses. To understand how BES1 regulates target gene expression, we identified two BES1-interacting proteins, ELF6 (early flowering 6) and its ...

  20. Adaptive management of energy consumption, reliability and delay of wireless sensor node: Application to IEEE 802.15.4 wireless sensor node.

    Science.gov (United States)

    Kone, Cheick Tidjane; Mathias, Jean-Denis; De Sousa, Gil

    2017-01-01

    Designing a Wireless Sensor Network (WSN) to achieve a high Quality of Service (QoS) (network performance and durability) is a challenging problem. We address it by focusing on the performance of the 802.15.4 communication protocol because the IEEE 802.15.4 Standard is actually considered as one of the reference technologies in WSNs. In this paper, we propose to control the sustainable use of resources (i.e., energy consumption, reliability and timely packet transmission) of a wireless sensor node equipped with photovoltaic cells by an adaptive tuning not only of the MAC (Medium Access Control) parameters but also of the sampling frequency of the node. To do this, we use one of the existing control approaches, namely the viability theory, which aims to preserve the functions and the controls of a dynamic system in a set of desirable states. So, an analytical model, describing the evolution over time of nodal resources, is derived and used by a viability algorithm for the adaptive tuning of the IEEE 802.15.4 MAC protocol. The simulation analysis shows that our solution allows ensuring indefinitely, in the absence of hardware failure, the operations (lifetime duration, reliability and timely packet transmission) of an 802.15.4 WSN and one can temporarily increase the sampling frequency of the node beyond the regular sampling one. This latter brings advantages for agricultural and environmental applications such as precision agriculture, flood or fire prevention. Main results show that our current approach enable to send more information when critical events occur without the node runs out of energy. Finally, we argue that our approach is generic and can be applied to other types of WSN.

  1. Regulations for the maintenance division of the RA reactor, Annex 6; Prilog 6 - Pravilnik poslovanja Odelenja odrzavanja i remonta reaktora RA

    Energy Technology Data Exchange (ETDEWEB)

    Badrljica, R [Reaktor RA, Odelenje odrzavanja, Institute of Nuclear Sciences Boris Kidric, Vinca, Beograd (Serbia and Montenegro)

    1965-12-15

    The regulations for the Division of reactor maintenance include the organizational scheme, tasks of the Division, and operation procedures for all the staff members. [Serbo-Croat] Pravilnik o radu Odelenja za odrzavanje reaktora RA sadrzi opis organizacione strukture sluzbe, zadataka Odelenja, organizacije rada, nacin poslovanja za sve saradnike Odelenja.

  2. 29 CFR 1607.6 - Use of selection procedures which have not been validated.

    Science.gov (United States)

    2010-07-01

    .... 1607.6 Section 1607.6 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY... circumstances in which a user cannot or need not utilize the validation techniques contemplated by these... which has an adverse impact, the validation techniques contemplated by these guidelines usually should...

  3. Mathematical modeling of a radio-frequency path for IEEE 802.11ah based wireless sensor networks

    Science.gov (United States)

    Tyshchenko, Igor; Cherepanov, Alexander; Dmitrii, Vakhnin; Popova, Mariia

    2017-09-01

    This article discusses the process of creating the mathematical model of a radio-frequency path for an IEEE 802.11ah based wireless sensor networks using M atLab Simulink CAD tools. In addition, it describes occurring perturbing effects and determining the presence of a useful signal in the received mixture.

  4. 25 CFR 518.6 - When will a certificate of self-regulation become effective?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false When will a certificate of self-regulation become... PROVISIONS SELF REGULATION OF CLASS II GAMING § 518.6 When will a certificate of self-regulation become effective? A certificate of self-regulation shall become effective on January 1 of the year following the...

  5. SLC6 Neurotransmitter Transporters: Structure, Function, and Regulation

    DEFF Research Database (Denmark)

    Kristensen, Anders S; Andersen, Jacob; Jørgensen, Trine N

    2011-01-01

    The neurotransmitter transporters (NTTs) belonging to the solute carrier 6 (SLC6) gene family (also referred to as the neurotransmitter-sodium-symporter family or Na(+)/Cl(-)-dependent transporters) comprise a group of nine sodium- and chloride-dependent plasma membrane transporters...... for the monoamine neurotransmitters serotonin (5-hydroxytryptamine), dopamine, and norepinephrine, and the amino acid neurotransmitters GABA and glycine. The SLC6 NTTs are widely expressed in the mammalian brain and play an essential role in regulating neurotransmitter signaling and homeostasis by mediating uptake...... of released neurotransmitters from the extracellular space into neurons and glial cells. The transporters are targets for a wide range of therapeutic drugs used in treatment of psychiatric diseases, including major depression, anxiety disorders, attention deficit hyperactivity disorder and epilepsy...

  6. 7 CFR 400.136 - Procedures for salary offset; when deductions may begin.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Procedures for salary offset; when deductions may... Management-Regulations for the 1986 and Succeeding Crop Years § 400.136 Procedures for salary offset; when... amount outlined in the Notice of Intent to collect from the employee's salary, as provided for in § 400...

  7. 40 CFR 57.802 - Request for waiver.

    Science.gov (United States)

    2010-07-01

    ... methods and procedures specified in appendix A, that: (1) The higher of the two net present values of future cash flows completed under the two alternative sets of assumptions set forth in the instructions to schedule D.6 in appendix A in less than liquidation (salvage) value; or (2) The smelter's average...

  8. 16 CFR 802.4 - Acquisitions of voting securities of issuers or non-corporate interests in unincorporated...

    Science.gov (United States)

    2010-01-01

    ..., STATEMENTS AND INTERPRETATIONS UNDER THE HART-SCOTT-RODINO ANTITRUST IMPROVEMENTS ACT OF 1976 EXEMPTION RULES... requirements of the Act pursuant to Section 7A(c) of the Act, this part 802, or pursuant to § 801.21 of this... company. C's assets are a newly constructed, never occupied hotel, including fixtures, furnishings and...

  9. CBL-interacting protein kinase 6 negatively regulates immune response to Pseudomonas syringae in Arabidopsis.

    Science.gov (United States)

    Sardar, Atish; Nandi, Ashis Kumar; Chattopadhyay, Debasis

    2017-06-15

    Cytosolic calcium ion (Ca2+) is an essential mediator of the plant innate immune response. Here, we report that a calcium-regulated protein kinase Calcineurin B-like protein (CBL)-interacting protein kinase 6 (CIPK6) functions as a negative regulator of immunity against the bacterial pathogen Pseudomonas syringae in Arabidopsis thaliana. Arabidopsis lines with compromised expression of CIPK6 exhibited enhanced disease resistance to the bacterial pathogen and to P. syringae harboring certain but not all avirulent effectors, while restoration of CIPK6 expression resulted in abolition of resistance. Plants overexpressing CIPK6 were more susceptible to P. syringae. Enhanced resistance in the absence of CIPK6 was accompanied by increased accumulation of salicylic acid and elevated expression of defense marker genes. Salicylic acid accumulation was essential for improved immunity in the absence of CIPK6. CIPK6 negatively regulated the oxidative burst associated with perception of pathogen-associated microbial patterns (PAMPs) and bacterial effectors. Accelerated and enhanced activation of the mitogen-activated protein kinase cascade in response to bacterial and fungal elicitors was observed in the absence of CIPK6. The results of this study suggested that CIPK6 negatively regulates effector-triggered and PAMP-triggered immunity in Arabidopsis. © The Author 2017. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  10. 16 CFR 802.1 - Acquisitions of goods and realty in the ordinary course of business.

    Science.gov (United States)

    2010-01-01

    ... regional public utility and steam to several industrial sites. This transaction is exempt under § 802.1(c... acting as an agent of the seller or purchaser. 7. “A,” a cruise ship operator, plans to sell for in excess of $50 million (as adjusted) one of its cruise ships to “B,” another cruise ship operator. “A” has...

  11. Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Gaoyuan; Wen, Hong; Wang, Longye; Xie, Ping; Song, Liang; Tang, Jie; Liao, Runfa

    2017-12-26

    In this paper, we propose an adaptive single differential coherent detection (SDCD) scheme for the binary phase shift keying (BPSK) signals in IEEE 802.15.4 Wireless Sensor Networks (WSNs). In particular, the residual carrier frequency offset effect (CFOE) for differential detection is adaptively estimated, with only linear operation, according to the changing channel conditions. It was found that the carrier frequency offset (CFO) and chip signal-to-noise ratio (SNR) conditions do not need a priori knowledge. This partly benefits from that the combination of the trigonometric approximation sin - 1 ( x ) ≈ x and a useful assumption, namely, the asymptotic or high chip SNR, is considered for simplification of the full estimation scheme. Simulation results demonstrate that the proposed algorithm can achieve an accurate estimation and the detection performance can completely meet the requirement of the IEEE 802.15.4 standard, although with a little loss of reliability and robustness as compared with the conventional optimal single-symbol detector.

  12. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  13. Distributed Fair Access Point Selection for Multi-Rate IEEE 802.11 WLANs

    Science.gov (United States)

    Gong, Huazhi; Nahm, Kitae; Kim, Jongwon

    In IEEE 802.11 networks, the access point (AP) selection based on the strongest signal strength often results in the extremely unfair bandwidth allocation among mobile users (MUs). In this paper, we propose a distributed AP selection algorithm to achieve a fair bandwidth allocation for MUs. The proposed algorithm gradually balances the AP loads based on max-min fairness for the available multiple bit rate choices in a distributed manner. We analyze the stability and overhead of the proposed algorithm, and show the improvement of the fairness via computer simulation.

  14. Sandia Administrative Micrographics Facility, Building 802: Hazards assessment document

    International Nuclear Information System (INIS)

    Swihart, A.

    1994-12-01

    The Department of Energy Order 5500.3A requires facility-specific hazards assessments be prepared, maintained, and used for emergency planning purposes. This hazards assessment document describes the chemical and radiological hazards associated with the Sandia Administrative Micrographics Facility, Building 802. The entire inventory was screened according to the potential airborne impact to onsite and offsite individuals. The air dispersion model, ALOHA, estimated pollutant concentrations downwind from the source of a release, taking into consideration the toxicological and physical characteristics of the release site, the atmospheric conditions, and the circumstances of the release. The greatest distance at which a postulated facility event will produce consequences exceeding the Early Severe Health Effects threshold is 33 meters. The highest emergency classification is a Site Area Emergency. The Emergency Planning Zone is 75 meters

  15. Considerations on VoIP Throughput in 802.11 Networks

    Directory of Open Access Journals (Sweden)

    POTORAC, A. D.

    2009-10-01

    Full Text Available Voice data packets have to arrive at the destination in time, with a defined cadence and with low and constant delay in order to allow the real time voice reconstruction. From this point of view, transmitting voice over IP networks is the most sensitive category of applications, especially when wireless medium is involved. The paper discusses the possibilities of transmitting the maximum number of simultaneous voice streams over 802.11 wireless networks considering the main factors which impact with VoIP throughput, in a basic scenario. Starting from a proposed communication model, the number of simultaneous possible VoIP sessions is calculated, taking into consideration the contribution of the protocol overheads, the security overheads, the PHY level timings and the CODEC proprieties. Numerical results are generated and compared.

  16. Basic security measures for IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Oscar P. Sarmiento

    2008-05-01

    Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.

  17. 32 CFR 212.6 - Procedures.

    Science.gov (United States)

    2010-07-01

    ...., v. Chicago School Reform Board of Trustees, et al.) (d) A non-Federal entity covered by this part... entities shall comply with applicable fire and safety regulations; environmental laws; local, State, and...

  18. Low-cost RAU with Optical Power Supply Used in a Hybrid RoF IEEE 802.11 Network

    Science.gov (United States)

    Kowalczyk, M.; Siuzdak, J.

    2014-09-01

    The paper presents design and implementation of a low-cost RAU (Remote Antenna Unit) device. It was designed to work in a hybrid Wi-Fi/optical network based on the IEEE 802.11b/g standard. An unique feature of the device is the possibility of optical power supply.

  19. An Adaptive Medium Access Parameter Prediction Scheme for IEEE 802.11 Real-Time Applications

    Directory of Open Access Journals (Sweden)

    Estefanía Coronado

    2017-01-01

    Full Text Available Multimedia communications have experienced an unprecedented growth due mainly to the increase in the content quality and the emergence of smart devices. The demand for these contents is tending towards wireless technologies. However, these transmissions are quite sensitive to network delays. Therefore, ensuring an optimum QoS level becomes of great importance. The IEEE 802.11e amendment was released to address the lack of QoS capabilities in the original IEEE 802.11 standard. Accordingly, the Enhanced Distributed Channel Access (EDCA function was introduced, allowing it to differentiate traffic streams through a group of Medium Access Control (MAC parameters. Although EDCA recommends a default configuration for these parameters, it has been proved that it is not optimum in many scenarios. In this work a dynamic prediction scheme for these parameters is presented. This approach ensures an appropriate traffic differentiation while maintaining compatibility with the stations without QoS support. As the APs are the only devices that use this algorithm, no changes are required to current network cards. The results show improvements in both voice and video transmissions, as well as in the QoS level of the network that the proposal achieves with regard to EDCA.

  20. ANÁLISE DE DESEMPENHO EM REDES IEEE 802.3 APLICADO PARA SISTEMA DE TEMPO REAL

    Directory of Open Access Journals (Sweden)

    Ricardo Alexsandro de Medeiros Valentim

    2011-06-01

    Full Text Available A tecnologia Ethernet domina o mercado de rede local de computadores. No entanto, não foi estabelecida como uma tecnologia para automação industrial, onde o determinismo procura os requisitos com um desempenho de tempo real. Muitas soluções têm sido propostas para resolver o problema do determinismo não, que se baseiam principalmente no TDMA (acesso múltiplo por divisão de tempo, passagem de token e mestre-escravo. É neste contexto que este trabalho é realizado, através de medidas de desempenho em redes de comunicação que utilizam o padrão IEEE 802.3, observando o comportamento destas redes, quando submetidos a diferentes cenários de sobrecarga. Para isso, as variações foram aprovadas em ambiente de teste, que será baseado em Shared Ethernet (Hub, Ethernet e Ethernet Switch com prioridade (IEEE 802.1Q. Desta forma, é possível indicar quais os dispositivos analisados pelos testes de desempenho demonstrado um comportamento mais adequado para suportar as aplicações com requisitos de tempo real.

  1. A Case for Leveraging 802.11p for Direct Phone-to-Phone Communications

    OpenAIRE

    Choi, Pilsoon; Gao, Jason Hao; Ramanathan, Nadesh; Mao, Mengda; Xu, Shipeng; Boon, Chirn-Chye; Fahmy, Suhaib A.; Peh, Li-Shiuan

    2014-01-01

    WiFi cannot effectively handle the demands of device-to-device communication between phones, due to insufficient range and poor reliability. We make the case for using IEEE 802.11p DSRC instead, which has been adopted for vehicle-to-vehicle communications, providing lower latency and longer range. We demonstrate a prototype motivated by a novel fabrication process that deposits both III-V and CMOS devices on the same die. In our system prototype, the designed RF front-end is interfaced with a...

  2. INCLUSIÓN DE CORRELACIONES TEMPORALES CON DEPENDENCIA A LARGO PLAZO Y PATRONES AUTOSIMILARES EN MODELOS DE REDES IEEE 802.3 INCLUSION OF LONG-RANGE-DEPENDENT TEMPORARY CORRELATIONS AND SELF-SIMILAR PATTERNS IN IEEE 802.3 NETWORKS MODELS

    Directory of Open Access Journals (Sweden)

    Ginno Millán Naveas

    2010-04-01

    Full Text Available En este trabajo se presentan los fundamentos de un proyecto de investigación sobre el modelado de redes de computadoras con mecanismo de control de acceso al medio, según el estándar IEEE 802.3-2005, empleando los postulados de la teoría de conjuntos autosimilares para establecer el nivel de impacto que poseen las correlaciones temporales con dependencia de largo alcance sobre el rendimiento de tales redes. Se postula una nueva forma de estimar grados de autosimilaridad basada en una variación del estimador de Whittle.The foundation of a research project about a model of computer networks with media access control mechanism based on the IEEE standard 802.3-2005 is presented. The model draws from the theory of self-similar sets for establishing the impact level that the long-range-dependent temporary correlations have on the performance of such networks. A new method for the estimation of self-similar levels based on a variation of the Whittle estimator is postulated.

  3. Intrusion Detection and light weight Firewall for the 6LoWPAN networks

    OpenAIRE

    Shreenivas, Dharmini

    2014-01-01

    IPv6 over Low power WPAN (6loWPAN) is an adaption layer introduced between the link layer and the network layer in the TCP/IP protocol stack to t the IPv6 datagrams over the IEEE 802.15.4 link layer. 6loWPAN networks comprise of internet enabled resource-constrained smart objects which are interconnected with each other through the Internet Protocol (IPv6). In Internet of Things (IoT), smart devices of the 6loWPAN networks are connected to the unsecured public Internet. RPL (Routing Protocol ...

  4. Analysis of Radio communication solutions in small and isolated communities under the IEEE 802.22 standard

    OpenAIRE

    Arroyo Arzubi, Alejandro; Castro Lechtaler, Antonio; Foti, Antonio Roberto; Fusario, Rubén J.; García Guibout, Jorge; Sens, Lorena

    2013-01-01

    In recent years the use of wireless communications has increased significantly. Rural communities without cable network communication have found a solution in wireless technologies. Based on previous fieldwork, this paper analyzes software development of integration based technologies for communication equipment. It focuses on the feasibility of the IEEE 802.22 standard as a solution to the wireless problem.

  5. TMACS test procedure TP003: Graphics. Revision 6

    International Nuclear Information System (INIS)

    Scanlan, P.K.; Washburn, S.

    1994-01-01

    The TMACS Software Project Test Procedures translate the project's acceptance criteria into test steps. Software releases are certified when the affected Test Procedures are successfully performed and the customers authorize installation of these changes. This Test Procedure addresses the graphics requirements of the TMACS. The features to be tested are the data display graphics and the graphic elements that provide for operator control and selection of displays

  6. Latency and Jitter Analysis for IEEE 802.11e Wireless LANs

    Directory of Open Access Journals (Sweden)

    Sungkwan Youm

    2013-01-01

    Full Text Available This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF differentiates classes of service and to characterize the probability distribution of the medium access control (MAC layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.

  7. Heterogeneous LTE/802.11a mobile relays for data rate enhancement and energy-efficiency in high speed trains

    KAUST Repository

    Atat, Rachad; Yaacoub, Elias E.; Alouini, Mohamed-Slim; Abu-Dayya, Adnan A.

    2012-01-01

    (LTE) long range links and with the mobile terminals (MTs) inside the train cars using IEEE 802.11a short range links. Scenarios with unicasting and multicasting from the BS are studied, both in the presence and absence of the relays. In addition, LTE

  8. Compliance of blood sampling procedures with the CLSI H3-A6 guidelines

    DEFF Research Database (Denmark)

    Simundic, A. M.; Church, S.; Cornes, M. P.

    2015-01-01

    compliance with the recommended CLSI guideline. Patient identification and test tube labelling were identified as the key guideline issues with the highest combination of probability and potential risk of harm. Administrative staff did not adhere to patient identification procedures during phlebotomy...... are patient identification and tube labelling....... checklist including 29 items was created to assess the compliance of European phlebotomy procedures with the CLSI H3-A6 guideline. A risk occurrence chart of individual phlebotomy steps was created from the observed error frequency and severity of harm of each guideline key issue. The severity of errors...

  9. 48 CFR 410.002 - Procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Procedures. 410.002 Section 410.002 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE COMPETITION AND ACQUISITION PLANNING MARKET RESEARCH 410.002 Procedures. Market research must include obtaining information on...

  10. A time-based admission control mechanism for IEEE 802.11 ad Hoc networks

    OpenAIRE

    Costa, Luís Henrique M. K.; Cerveira, Carlos Rodrigo

    2006-01-01

    This paper presents a time-based admission control mechanism (TAC) for IEEE 802.11 ad hoc networks. The proposed mechanism was adapted to the QoS AODV routing protocol, which takes the quality of service requirements of the data flow into account in the route discovery process. TAC-AODV estimates the idle time of the physical medium based on the frames listened. The incoming traffic is admitted according to the offered load as well as the intra-flow interference, calculated based on the numbe...

  11. 17 CFR 230.802 - Exemption for offerings in connection with an exchange offer or business combination for the...

    Science.gov (United States)

    2010-04-01

    ... connection with an exchange offer or business combination for the securities of foreign private issuers. 230... Offers and Business Combinations § 230.802 Exemption for offerings in connection with an exchange offer or business combination for the securities of foreign private issuers. Offers and sales in any...

  12. CompTIA A+ complete study guide exams 220-801 and 220-802

    CERN Document Server

    Docter, Quentin; Skandier, Toby

    2012-01-01

    CompTIA Authorized, fully updated Study Guide for the leading IT certification: CompTIA A+ CompTIA A+ is the de facto certification for IT technicians. Some vendors even require employees to achieve certification as part of their job training. This book prepares you for both required exams: 220-801 and 220-802. Totally updated to cover the 2012 exams, this popular prep guide covers all the exam objectives. Readers will also have access to additional study tools, including the Sybex Test Engine with bonus practice exams, electronic flashcards, and a glossary of important terms in searchable PD

  13. PHF6 regulates phenotypic plasticity through chromatin organization within lineage-specific genes.

    Science.gov (United States)

    Soto-Feliciano, Yadira M; Bartlebaugh, Jordan M E; Liu, Yunpeng; Sánchez-Rivera, Francisco J; Bhutkar, Arjun; Weintraub, Abraham S; Buenrostro, Jason D; Cheng, Christine S; Regev, Aviv; Jacks, Tyler E; Young, Richard A; Hemann, Michael T

    2017-05-15

    Developmental and lineage plasticity have been observed in numerous malignancies and have been correlated with tumor progression and drug resistance. However, little is known about the molecular mechanisms that enable such plasticity to occur. Here, we describe the function of the plant homeodomain finger protein 6 (PHF6) in leukemia and define its role in regulating chromatin accessibility to lineage-specific transcription factors. We show that loss of Phf6 in B-cell leukemia results in systematic changes in gene expression via alteration of the chromatin landscape at the transcriptional start sites of B-cell- and T-cell-specific factors. Additionally, Phf6 KO cells show significant down-regulation of genes involved in the development and function of normal B cells, show up-regulation of genes involved in T-cell signaling, and give rise to mixed-lineage lymphoma in vivo. Engagement of divergent transcriptional programs results in phenotypic plasticity that leads to altered disease presentation in vivo, tolerance of aberrant oncogenic signaling, and differential sensitivity to frontline and targeted therapies. These findings suggest that active maintenance of a precise chromatin landscape is essential for sustaining proper leukemia cell identity and that loss of a single factor (PHF6) can cause focal changes in chromatin accessibility and nucleosome positioning that render cells susceptible to lineage transition. © 2017 Soto-Feliciano et al.; Published by Cold Spring Harbor Laboratory Press.

  14. 15 CFR 710.6 - Relationship between the Chemical Weapons Convention Regulations and the Export Administration...

    Science.gov (United States)

    2010-01-01

    ... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) § 710.6 Relationship between the Chemical Weapons Convention Regulations and the Export Administration Regulations, the International...

  15. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel.

    Science.gov (United States)

    Sakin, Sayef Azad; Razzaque, Md Abdur; Hassan, Mohammad Mehedi; Alamri, Atif; Tran, Nguyen H; Fortino, Giancarlo

    2017-12-07

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies.

  16. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    Directory of Open Access Journals (Sweden)

    Sayef Azad Sakin

    2017-12-01

    Full Text Available Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a sub-optimal solution by dividing the optimization problem into downlink channel allocation and power assignment sub-problems. Considering fairness, quality of service and minimum interference for customer-premises-equipment, we also develop a greedy algorithm for channel allocation and a non-cooperative game-theoretic framework for near-optimal power allocation. The base stations of networks are treated as players in a game, where they try to increase spectrum utilization by controlling power and reaching a Nash equilibrium point. We further develop a utility function for the game to increase the data rate by minimizing the transmission power and, subsequently, the interference from neighboring networks. A theoretical proof of the uniqueness and existence of the Nash equilibrium has been presented. Performance improvements in terms of data-rate with a degree of fairness compared to a cooperative branch-and-bound-based algorithm and a non-cooperative greedy approach have been shown through simulation studies.

  17. IPv6 Convergence for IoT Cyber–Physical Systems

    Directory of Open Access Journals (Sweden)

    Keith Nolan

    2018-03-01

    Full Text Available We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation. As part of this evolution, we outline the key changes in wireless communications technologies and heterogeneous networking that have arisen during the development of the IoT. We briefly outline the emerging area of cyber–physical systems, and associated technical challenges. We then describe how IP convergence can be viewed as the narrow waist connecting endpoint devices and fieldbus devices with applications and services in new Industry 4.0, and cyber–physical system use cases. We outline how a protocol-packing approach can be used for encapsulating LoRaWAN frames with IEEE 802.15.4 and IEEE 802.11 frames. Extending this, we propose a method for ultracompressed IPv6 signaling, and detail how this can be achieved in an example low-power wide-area technology, namely LoRaWAN. To support our proposed approach, we provide real-world analyses where IPv6 commands undergo a process of ultracompression and are then conveyed to a LoRaWAN endpoint. We find that IPv6 command ultracompression can potentially support command packet sizes that are over 20x smaller than the reported worst-case maximum protocol data unit size of 81 bytes.

  18. A Feasibility Assessment of 6LoWPAN for Secure Communications in the U.S. Army

    Science.gov (United States)

    2016-06-01

    bandwidth. 14. SUBJECT TERMS LoWPAN, 6LoWPAN, 802.15.4, energy , security, feasibility, wireless , networks, range, duration, wireless security...47 Figure 16. Total Energy Expended per Message for Various Data Rates and Transmission Powers...maximize transmission speeds and data throughput pay little concern to energy . This thesis presents a model that assesses 6LoWPAN in both a potential

  19. Civil Procedure In Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    scientific activities conducted by the author, partly based on the author's experience as a member, through a number of years, of the Danish Standing Committee on Procedural Law (Retsplejeraadet), which on a continuous basis evaluates the need for civil procedural reforms in Denmark, and finally also based......The book contains an up-to-date survey of Danish civil procedure after the profound Danish procedural reforms in 2007. It deals with questions concerning competence and function of Danish courts, commencement and preparation of civil cases, questions of evidence and burden of proof, international...... procedural questions, including relations to the Brussels I Regulation and Denmark's participation in this Regulation via a parallel convention with the EU countries, impact on Danish civil procedure of the convention on human rights, preparation and pronouncement of judgment and verdict, questions of appeal...

  20. TMACS test procedure TP010: Integration summary. Revision 6

    International Nuclear Information System (INIS)

    Spurling, D.G.

    1994-01-01

    The TMACS Software Project Test Procedures translate the project's acceptance criteria into test steps. Software releases are certified when the affected Test Procedures are successfully performed and the customers authorize installation of these changes. This Test Procedure verifies that Test Procedures 1, 2, 3, 5 and 9 (WHC-SD-WM-TRP-105, 106, 107, 109 and 113) of TMACS Software Release 4.1 have been successfully completed

  1. Open-source implementation of an ad-hoc IEEE802.11a/g/p software-defined radio on low-power and low-cost general purpose processors

    Directory of Open Access Journals (Sweden)

    S. Ciccia

    2017-12-01

    Full Text Available This work proposes a low-cost and low-power software-defined radio open-source platform with IEEE 802.11 a/g/p wireless communication capability. A state-of-the-art version of the IEEE 802.11 a/g/p software for GNU Radio (a free and open-source software development framework is available online, but we show here that its computational complexity prevents operations in low-power general purpose processors, even at throughputs below the standard. We therefore propose an evolution of this software that achieves a faster and lighter IEEE 802.11 a/g/p transmitter and receiver, suitable for low-power general purpose processors, for which GNU Radio provides very limited support; we discuss and describe the software radio processing structuring that is necessary to achieve the goal, providing a review of signal processing techniques. In particular, we emphasize the advanced reduced-instruction set (RISC machine (ARM study case, for which we also optimize some of the processing libraries. The presented software will remain open-source.

  2. The ionising radiation (medical exposure) regulations - IR (ME) R, Malta

    International Nuclear Information System (INIS)

    Desai, R.; Brejza, P.; Cremona, J.

    2004-01-01

    Full text: The regulations in Malta at present are in draft stage. These regulations partially implement European Council Directive 97/43/Euratom. This Directive lays down the basic measurements for the health and protection of individuals against dangers of ionising radiation in relation to medical exposure. The regulations impose duties on persons administering radiations, to protect people from unnecessary exposure whether as part of their own medical diagnosis, treatment or as part of occupational health worker for health screening, medico-legal procedures, voluntary participation in research etc. These regulations also apply to individuals who help other individuals undergoing medical exposure. Main provisions 1. Regulation 2 contains the definitions of 28 terms used in these regulations. 2. Regulation 3.1 and 3.2 sets out the medical exposures to which the regulations apply. 3. Regulation 4 requires approval of medical exposures due to medical research, from radiation protection board of Malta. 4. Regulation 5 prohibits new procedures involving medical exposure unless it has been justified in advance. 5. Regulation 6 provides conditions justifying medical exposures. It prohibits any medical exposure from being carried out which has not been justified and authorized and sets out matters to be taken into account for justification. 6. Regulation 7 requires that practitioner justifies the exposure, shall pay special attention towards (a) exposure from medical research procedures where there is no direct health benefit to the individual undergoing exposure, (b) exposures for medico-legal purposes; (c) exposures to pregnant or possible pregnant women and (d) exposures to breast-feeding women. 7. Regulation 8.1 to 8.3 prohibit any medical exposure from being carried out which has not been justified and sets out matters to be taken for justification 8. Regulation 8.4 prohibits an exposure if it cannot be justified. 9. Regulation 9 requires the employer to provide a

  3. The Model of Communication Channel in the 802.11b Standard Wireless Network

    Directory of Open Access Journals (Sweden)

    Zdenek Nemec

    2008-01-01

    Full Text Available The paper deals with software modelling of a communication channel in the 802.11b standard wireless network physical layer. A computer model of signal processing was created to verify possibility of the proposal of localisation system. Functionality of the signal generation and processing model was verified by the Spectrum Analyzer. Simulations run inSimulink/Matlab SW. The Simulink is used for the signal processor model and a pure Matlab software is used for mathematical evaluations of data processor model and for determination of initial conditions.

  4. Differential effects of CSF-1R D802V and KIT D816V homologous mutations on receptor tertiary structure and allosteric communication.

    Directory of Open Access Journals (Sweden)

    Priscila Da Silva Figueiredo Celestino Gomes

    Full Text Available The colony stimulating factor-1 receptor (CSF-1R and the stem cell factor receptor KIT, type III receptor tyrosine kinases (RTKs, are important mediators of signal transduction. The normal functions of these receptors can be compromised by gain-of-function mutations associated with different physiopatological impacts. Whereas KIT D816V/H mutation is a well-characterized oncogenic event and principal cause of systemic mastocytosis, the homologous CSF-1R D802V has not been identified in human cancers. The KIT D816V oncogenic mutation triggers resistance to the RTK inhibitor Imatinib used as first line treatment against chronic myeloid leukemia and gastrointestinal tumors. CSF-1R is also sensitive to Imatinib and this sensitivity is altered by mutation D802V. Previous in silico characterization of the D816V mutation in KIT evidenced that the mutation caused a structure reorganization of the juxtamembrane region (JMR and facilitated its departure from the kinase domain (KD. In this study, we showed that the equivalent CSF-1R D802V mutation does not promote such structural effects on the JMR despite of a reduction on some key H-bonds interactions controlling the JMR binding to the KD. In addition, this mutation disrupts the allosteric communication between two essential regulatory fragments of the receptors, the JMR and the A-loop. Nevertheless, the mutation-induced shift towards an active conformation observed in KIT D816V is not observed in CSF-1R D802V. The distinct impact of equivalent mutation in two homologous RTKs could be associated with the sequence difference between both receptors in the native form, particularly in the JMR region. A local mutation-induced perturbation on the A-loop structure observed in both receptors indicates the stabilization of an inactive non-inhibited form, which Imatinib cannot bind.

  5. Differential Effects of CSF-1R D802V and KIT D816V Homologous Mutations on Receptor Tertiary Structure and Allosteric Communication

    Science.gov (United States)

    Da Silva Figueiredo Celestino Gomes, Priscila; Panel, Nicolas; Laine, Elodie; Pascutti, Pedro Geraldo; Solary, Eric; Tchertanov, Luba

    2014-01-01

    The colony stimulating factor-1 receptor (CSF-1R) and the stem cell factor receptor KIT, type III receptor tyrosine kinases (RTKs), are important mediators of signal transduction. The normal functions of these receptors can be compromised by gain-of-function mutations associated with different physiopatological impacts. Whereas KIT D816V/H mutation is a well-characterized oncogenic event and principal cause of systemic mastocytosis, the homologous CSF-1R D802V has not been identified in human cancers. The KIT D816V oncogenic mutation triggers resistance to the RTK inhibitor Imatinib used as first line treatment against chronic myeloid leukemia and gastrointestinal tumors. CSF-1R is also sensitive to Imatinib and this sensitivity is altered by mutation D802V. Previous in silico characterization of the D816V mutation in KIT evidenced that the mutation caused a structure reorganization of the juxtamembrane region (JMR) and facilitated its departure from the kinase domain (KD). In this study, we showed that the equivalent CSF-1R D802V mutation does not promote such structural effects on the JMR despite of a reduction on some key H-bonds interactions controlling the JMR binding to the KD. In addition, this mutation disrupts the allosteric communication between two essential regulatory fragments of the receptors, the JMR and the A-loop. Nevertheless, the mutation-induced shift towards an active conformation observed in KIT D816V is not observed in CSF-1R D802V. The distinct impact of equivalent mutation in two homologous RTKs could be associated with the sequence difference between both receptors in the native form, particularly in the JMR region. A local mutation-induced perturbation on the A-loop structure observed in both receptors indicates the stabilization of an inactive non-inhibited form, which Imatinib cannot bind. PMID:24828813

  6. 32 CFR 50.6 - Procedures.

    Science.gov (United States)

    2010-07-01

    ... purchase or trade. (7) Using promotional incentives to facilitate transactions or to eliminate competition... personnel, except as authorized in Section 2-205 and 5-409 of the Joint Ethics Regulation, DoD 5500.7-R. 5 5...” account or other similar Internet medium for the purpose of establishing a direct deposit for the purchase...

  7. Modeling of Wi-Fi IEEE 802.11ac Offloading Performance For 1000x Capacity Expansion of LTE-Advanced

    DEFF Research Database (Denmark)

    Hu, Liang; Sanchez, Maria Laura Luque; Maternia, Michael

    2013-01-01

    This paper studies indoor Wi-Fi IEEE 802.11ac deployment as a capacity expansion solution of LTE-A (Long Term Evolution-Advanced) network to achieve 1000 times higher capacity. Besides increasing the traffic volume by a factor of x1000, we also increase the minimum target user data rate to 10Mbit...

  8. Wireless Sensor Node Power Profiling Based on IEEE 802.11 and IEEE 802.15.4 Communication Protocols. Modeling and Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Vivek [Idaho National Lab. (INL), Idaho Falls, ID (United States); Richardson, Joseph [Idaho National Lab. (INL), Idaho Falls, ID (United States); Zhang, Yanliang [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-10-01

    retransmission, which result in unanticipated power losses. This report focuses rigorous stochastic modeling of power demand for a schedule-driven WSN utilizing Institute of Electrical and Electronics Engineers 802.11 and 802.15.4 communication protocols. The model captures the generic operation of a schedule-driven WSN when an external event occurs, i.e., sensing, following by processing, and followed by communication. The report will present development of an expression to compute the expected energy consumption per operational cycle of a schedule-driven WSN by taking into consideration the node level activities, i.e., sensing and processing, and the network level activities, i.e., channel access, packet collision, retransmission attempts, and transmission of a data packet.

  9. Apple MdACS6 Regulates Ethylene Biosynthesis During Fruit Development Involving Ethylene-Responsive Factor.

    Science.gov (United States)

    Li, Tong; Tan, Dongmei; Liu, Zhi; Jiang, Zhongyu; Wei, Yun; Zhang, Lichao; Li, Xinyue; Yuan, Hui; Wang, Aide

    2015-10-01

    Ethylene biosynthesis in plants involves different 1-aminocyclopropane-1-carboxylic acid synthase (ACS) genes. The regulation of each ACS gene during fruit development is unclear. Here, we characterized another apple (Malus×domestica) ACS gene, MdACS6. The transcript of MdACS6 was observed not only in fruits but also in other tissues. During fruit development, MdACS6 was initiated at a much earlier stage, whereas MdACS3a and MdACS1 began to be expressed at 35 d before harvest and immediateley after harvest, respectively. Moreover, the enzyme activity of MdACS6 was significantly lower than that of MdACS3a and MdACS1, accounting for the low ethylene biosynthesis in young fruits. Overexpression of MdACS6 (MdACS6-OE) by transient assay in apple showed enhanced ethylene production, and MdACS3a was induced in MdACS6-OE fruits but not in control fruits. In MdACS6 apple fruits silenced by the virus-induced gene silencing (VIGS) system (MdACS6-AN), neither ethylene production nor MdACS3a transcript was detectable. In order to explore the mechanism through which MdACS3a was induced in MdACS6-OE fruits, we investigated the expression of apple ethylene-responsive factor (ERF) genes. The results showed that the expression of MdERF2 was induced in MdACS6-OE fruits and inhibited in MdACS6-AN fruits. Yeast one-hybrid assay showed that MdERF2 protein could bind to the promoter of MdACS3a. Moreover, down-regulation of MdERF2 in apple flesh callus led to a decrease of MdACS3a expression, demonstrating the regulation of MdERF2 on MdACS3a. The mechanism through which MdACS6 regulates the action of MdACS3a was discussed. © The Author 2015. Published by Oxford University Press on behalf of Japanese Society of Plant Physiologists. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  10. 7 CFR 301.75-6 - Interstate movement of regulated nursery stock from a quarantined area.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Interstate movement of regulated nursery stock from a... Citrus Canker Notice of Quarantine and Regulations § 301.75-6 Interstate movement of regulated nursery stock from a quarantined area. (a) Regulated nursery stock may not be moved interstate from a...

  11. Performance trade-off in an adaptive IEEE 802.11ad waveform design for a joint automotive radar and communication system.

    Science.gov (United States)

    2017-05-01

    The IEEE 802.11ad waveform can be used for automotive radar by exploiting the Golay complementary sequences in the preamble of a frame. The performance of radar, however, is limited by the preamble structure. In this paper, we propose an adaptive pre...

  12. DoS detection in IEEE 802.11 with the presence of hidden nodes

    Directory of Open Access Journals (Sweden)

    Joseph Soryal

    2014-07-01

    Full Text Available The paper presents a novel technique to detect Denial of Service (DoS attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS and Frequency Hopping Spread Spectrum (FHSS and the results are presented to validate the algorithm.

  13. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    Science.gov (United States)

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  14. 48 CFR 32.003 - Simplified acquisition procedures financing.

    Science.gov (United States)

    2010-10-01

    ... procedures financing. 32.003 Section 32.003 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING 32.003 Simplified acquisition procedures financing. Unless agency regulations otherwise permit, contract financing shall not be provided for...

  15. An Improved 6LoWPAN Hierarchical Routing Protocol

    Directory of Open Access Journals (Sweden)

    Xue Li

    2015-10-01

    Full Text Available IETF 6LoWPAN working group is engaged in the IPv6 protocol stack research work based on IEEE802.15.4 standard. In this working group, the routing protocol is one of the important research contents. In the 6LoWPAN, HiLow is a well-known layered routing protocol. This paper puts forward an improved hierarchical routing protocol GHiLow by improving HiLow parent node selection and path restoration strategy. GHiLow improves the parent node selection by increasing the choice of parameters. Simutaneously, it also improves path recovery by analysing different situations to recovery path. Therefore, GHiLow contributes to the ehancement of network performance and the decrease of network energy consumption.

  16. Principles of mobile computing and communications

    CERN Document Server

    Othman, Mazliza

    2007-01-01

    Introduction Mobile Computing Applications Evolution of Wireless Networks and Services Summary Cellular Network Architecture UMTS Architecture Public Land Mobile Network Interfaces User Authentication Frequency Reuse Channel Assignment Location Registration and Update Handover Procedures CDMA The Move toward 3G Networks Wireless Local Area Networks IEEE 802.11 Standard IEEE 802.11b Standard (Wi-Fi) IEEE 802.11a Standard IEEE 802.11g Standard HIPERLAN/2 IEEE 802.1x Standard IEEE 802.11i Standard IEEE 802.11e Standard Security Issues IP over 802.11 WLAN Integrating 802.11 WLAN and UMTS Summary Wireless Personal Area Networks HomeRF Bluetooth Technology IEEE 802.15.3 Standard Home Area Networks Summary Wireless Sensor Networks Applications of WSNs Requirements for WSNs WSN Architecture The 802.15.4 Standard The ZigBee Protocol Power Conservation Techniques Network and Communications Configuration of Sensor Networks WSN and Emergency Response Applications Summary Mobile Ad Hoc Networks AODV DSR OLSR TBRPF Summary...

  17. Firefly Clock Synchronization in an 802.15.4 Wireless Network

    Directory of Open Access Journals (Sweden)

    Elmenreich Wilfried

    2009-01-01

    Full Text Available This paper describes the design and implementation of a distributed self-stabilizing clock synchronization algorithm based on the biological example of Asian Fireflies. Huge swarms of these fireflies use the principle of pulse coupled oscillators in order to synchronously emit light flashes to attract mating partners. When applying this algorithm to real sensor networks, typically, nodes cannot receive messages while transmitting, which prevents the networked nodes from reaching synchronization. In order to counteract this deafness problem, we adopt a variant of the Reachback Firefly Algorithm to distribute the timing of light flashes in a given time window without affecting the quality of the synchronization. A case study implemented on 802.15.4 Zigbee nodes presents the application of this approach for a time-triggered communication scheduling and coordinated duty cycling in order to enhance the battery lifetime of the nodes.

  18. UDP/P2Y6 receptor signaling regulates IgE-dependent degranulation in human basophils

    Directory of Open Access Journals (Sweden)

    Manabu Nakano

    2017-10-01

    Conclusions: This study showed that UDP/P2Y6 receptor signaling is involved in the regulation of IgE-dependent degranulation in basophils, which might stimulate the P2Y6 receptor via the autocrine secretion of UTP. Thus, this receptor represents a potential target to regulate IgE-dependent degranulation in basophils during allergic diseases.

  19. Full-duplex transmission of IEEE 802.11ac-compliant MIMO WLAN signals over a 2-km 7-core fiber

    NARCIS (Netherlands)

    Fan, Yuting; Li, Jianqiang; Lei, Yi; Tang, Ming; Yin, Feifei; Dai, Yitang; Xu, Kun

    2017-01-01

    In this Letter, we experimentally demonstrate a full-duplex transmission system of IEEE 802.11ac-compliant multiple-input multiple-output (MIMO) signals over a 2-km 7-core fiber for in-building wireless local-area network (WLAN) distributed antenna systems. For full-duplex 3 � 3 MIMO

  20. Performance Analysis of a Burst Transmission Mechanism Using Microsleep Operation for Green IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Raul Palacios-Trujillo

    2017-07-01

    Full Text Available This paper evaluates the performance of a burst transmission mechanism using microsleep operation to support high energy efficiency in IEEE 802.11 Wireless Local Area Networks (WLANs. This mechanism is an implementation of the IEEE 802.11ac Transmission Opportunity Power Save Mode (TXOP PSM. A device using the TXOP PSM-based mechanism can switch to a low-power sleep state for the time that another device transmits a burst of data frames to a third one. This operation is called microsleep and its feasibility strongly depends on the time and energy consumption that a device incurs in the transitions from and to the sleep state. This paper accounts for the impact of these transitions in the derivation of an analytical model to calculate the energy efficiency of the TXOP PSM-based mechanism under network saturation. Results obtained show that the impact of the transition requirements on the feasibility of microsleep operation can be significant depending on the selected system parameters, although it can be reduced by using burst transmissions. When microsleep operation is feasible, the TXOP PSM-based mechanism can improve the energy efficiency of other legacy mechanisms by up to 424% under high traffic loads.

  1. A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielsen, Christoffer Rosenkilde

    2007-01-01

    Static analysis is successfully used for automatically validating security properties of classical cryptographic protocols. In this paper, we shall employ the same technique to a modern security protocol for wireless networks, namely the latest version of the Privacy and Key Management protocol...... for IEEE 802.16e, PKMv2. This protocol seems to have an exaggerated mixture of security features. Thus, we iteratively investigate which components are necessary for upholding the security properties and which can be omitted safely. This approach is based on the LySa process calculus and employs...

  2. Adaptive rate selection scheme for video transmission to resolve IEEE 802.11 performance anomaly

    Science.gov (United States)

    Tang, Guijin; Zhu, Xiuchang

    2011-10-01

    Multi-rate transmission may lead to performance anomaly in an IEEE 802.11 network. It will decrease the throughputs of all the higher rate stations. This paper proposes an adaptive rate selection scheme for video service when performance anomaly occurs. Considering that video has the characteristic of tolerance to packet loss, we actively drop several packets so as to select the rates as high as possible for transmitting packets. Experiment shows our algorithm can decrease the delay and jitter of video, and improve the system throughput as well.

  3. Comparison of inclusive particle production in 14.6 GeV/c proton-nucleus collisions with simulation

    International Nuclear Information System (INIS)

    Jaffe, D.E.; Lo, K.H.; Comfort, J.R.; Sivertz, M.

    2006-01-01

    Inclusive charged pion, kaon, proton and deuteron production in 14.6 GeV/c proton-nucleus collisions measured by BNL experiment E802 is compared with results from the GEANT3, GEANT4 and FLUKA simulation packages. The FLUKA package is found to have the best overall agreement

  4. Employee Retirement Income Security Act of 1974: rules and regulations for administration and enforcement; claims procedure. Pension and Welfare Benefits Administration, Labor. Final regulation.

    Science.gov (United States)

    2000-11-21

    This document contains a final regulation revising the minimum requirements for benefit claims procedures of employee benefit plans covered by Title I of the Employee Retirement Income Security Act of 1974 (ERISA or the Act). The regulation establishes new standards for the processing of claims under group health plans and plans providing disability benefits and further clarifies existing standards for all other employee benefit plans. The new standards are intended to ensure more timely benefit determinations, to improve access to information on which a benefit determination is made, and to assure that participants and beneficiaries will be afforded a full and fair review of denied claims. When effective, the regulation will affect participants and beneficiaries of employee benefit plans, employers who sponsor employee benefit plans, plan fiduciaries, and others who assist in the provision of plan benefits, such as third-party benefits administrators and health service providers or health maintenance organizations that provide benefits to participants and beneficiaries of employee benefit plans.

  5. A Novel Energy Saving Algorithm with Frame Response Delay Constraint in IEEE 802.16e

    Science.gov (United States)

    Nga, Dinh Thi Thuy; Kim, Mingon; Kang, Minho

    Sleep-mode operation of a Mobile Subscriber Station (MSS) in IEEE 802.16e effectively saves energy consumption; however, it induces frame response delay. In this letter, we propose an algorithm to quickly find the optimal value of the final sleep interval in sleep-mode in order to minimize energy consumption with respect to a given frame response delay constraint. The validations of our proposed algorithm through analytical results and simulation results suggest that our algorithm provide a potential guidance to energy saving.

  6. The regulations concerning the reprocessing business of spent fuels

    International Nuclear Information System (INIS)

    1978-01-01

    In compliance with ''The law for the regulations of nuclear source material, nuclear fuel material and reactors'' these regulations prescribe concerning reprocessing facilities: The procedures to apply for the approval of the design and method of construction and the approval of the change thereof; as well as the procedure to apply for the inspection of the facilities, and details of the inspection (in sections 2-6). After that, the regulations require the enterpriser of reprocessing business to keep necessary records and take necessary measures for safety concerning the facilities, operation of reprocessing equipments, and transportation, storage on disposal of used fuel, materials separated therefrom or materials contaminated by either of them (in sections 8-16). Further, the regulations prescribe the procedure to apply for the approval of the safety rule required to the enterpriser of reprocessing business by above mentioned law and specifies items which should be included into the rule (section 17). Moreover, the regulations require the enterpriser to submit reports of each use of the internationally controllled material and specifies the items which should be included into these reports (section 19). (Matsushima, A.)

  7. Examining Residents' Strategic Mindfulness During Self-Regulated Learning of a Simulated Procedural Skill.

    Science.gov (United States)

    Brydges, Ryan; Hatala, Rose; Mylopoulos, Maria

    2016-07-01

    Simulation-based training is currently embedded in most health professions education curricula. Without evidence for how trainees think about their simulation-based learning, some training techniques may not support trainees' learning strategies. This study explored how residents think about and self-regulate learning during a lumbar puncture (LP) training session using a simulator. In 2010, 20 of 45 postgraduate year 1 internal medicine residents attended a mandatory procedural skills training boot camp. Independently, residents practiced the entire LP skill on a part-task trainer using a clinical LP tray and proper sterile technique. We interviewed participants regarding how they thought about and monitored their learning processes, and then we conducted a thematic analysis of the interview data. The analysis suggested that participants considered what they could and could not learn from the simulator; they developed their self-confidence by familiarizing themselves with the LP equipment and repeating the LP algorithmic steps. Participants articulated an idiosyncratic model of learning they used to interpret the challenges and successes they experienced. Participants reported focusing on obtaining cerebrospinal fluid and memorizing the "routine" version of the LP procedure. They did not report much thinking about their learning strategies (eg, self-questioning). During simulation-based training, residents described assigning greater weight to achieving procedural outcomes and tended to think that the simulated task provided them with routine, generalizable skills. Over this typical 1-hour session, trainees did not appear to consider their strategic mindfulness (ie, awareness and use of learning strategies).

  8. New Solutions Based On Wireless Networks For Dynamic Traffic Lights Management: A Comparison Between IEEE 802.15.4 And Bluetooth

    Directory of Open Access Journals (Sweden)

    Collotta Mario

    2015-09-01

    Full Text Available The Wireless Sensor Networks are widely used to detect and exchange information and in recent years they have been increasingly involved in Intelligent Transportation System applications, especially in dynamic management of signalized intersections. In fact, the real-time knowledge of information concerning traffic light junctions represents a valid solution to congestion problems. In this paper, a wireless network architecture, based on IEEE 802.15.4 or Bluetooth, in order to monitor vehicular traffic flows near to traffic lights, is introduced. Moreover, an innovative algorithm is proposed in order to determine dynamically green times and phase sequence of traffic lights, based on measured values of traffic flows. Several simulations compare IEEE 802.15.4 and Bluetooth protocols in order to identify the more suitable communication protocol for ITS applications. Furthermore, in order to confirm the validity of the proposed algorithm for the dynamic management of traffic lights, some case studies have been considered and several simulations have been performed.

  9. IL-6 has no acute effect on the regulation of urea synthesis in vivo in rats

    DEFF Research Database (Denmark)

    Thomsen, Karen; Aagaard, Niels Kristian; Grønbæk, Henning

    2011-01-01

    Clinical or experimentally induced, active inflammation up-regulates the in vivo capacity of urea synthesis (CUNS), which promotes nitrogen removal from the body and metabolic catabolism. We have shown that tumor necrosis factor a (TNF-a) up-regulates CUNS and increases interleukin 6 expression (IL......-6) within hours of administration. The described effect of TNF-a on nitrogen homeostasis may, therefore, depend on IL-6....

  10. TMACS test procedure TP001: Alarm management. Revision 6

    International Nuclear Information System (INIS)

    Scanlan, P.K.

    1994-01-01

    The TMACS Software Project Test Procedures translate the project's acceptance criteria into test steps. Software releases are certified when the affected Test Procedures are successfully performed and the customers authorize installation of these changes. This Test Procedure addresses the Alarm Management requirements of the TMACS. The features to be tested are: real-time alarming on high and low level and discrete alarms, equipment alarms, dead-band filtering, alarm display color coding, alarm acknowledgement, and alarm logging

  11. Mig-6 plays a critical role in the regulation of cholesterol homeostasis and bile acid synthesis.

    Directory of Open Access Journals (Sweden)

    Bon Jeong Ku

    Full Text Available The disruption of cholesterol homeostasis leads to an increase in cholesterol levels which results in the development of cardiovascular disease. Mitogen Inducible Gene 6 (Mig-6 is an immediate early response gene that can be induced by various mitogens, stresses, and hormones. To identify the metabolic role of Mig-6 in the liver, we conditionally ablated Mig-6 in the liver using the Albumin-Cre mouse model (Alb(cre/+Mig-6(f/f; Mig-6(d/d. Mig-6(d/d mice exhibit hepatomegaly and fatty liver. Serum levels of total, LDL, and HDL cholesterol and hepatic lipid were significantly increased in the Mig-6(d/d mice. The daily excretion of fecal bile acids was significantly decreased in the Mig-6(d/d mice. DNA microarray analysis of mRNA isolated from the livers of these mice showed alterations in genes that regulate lipid metabolism, bile acid, and cholesterol synthesis, while the expression of genes that regulate biliary excretion of bile acid and triglyceride synthesis showed no difference in the Mig-6(d/d mice compared to Mig-6(f/f controls. These results indicate that Mig-6 plays an important role in cholesterol homeostasis and bile acid synthesis. Mice with liver specific conditional ablation of Mig-6 develop hepatomegaly and increased intrahepatic lipid and provide a novel model system to investigate the genetic and molecular events involved in the regulation of cholesterol homeostasis and bile acid synthesis. Defining the molecular mechanisms by which Mig-6 regulates cholesterol homeostasis will provide new insights into the development of more effective ways for the treatment and prevention of cardiovascular disease.

  12. Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kok-Keong Loo

    2011-05-01

    Full Text Available The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  13. Multi-channel multi-radio using 802.11 based media access for sink nodes in wireless sensor networks.

    Science.gov (United States)

    Campbell, Carlene E-A; Khan, Shafiullah; Singh, Dhananjay; Loo, Kok-Keong

    2011-01-01

    The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  14. Beamforming transmission in IEEE 802.11ac under time-varying channels.

    Science.gov (United States)

    Yu, Heejung; Kim, Taejoon

    2014-01-01

    The IEEE 802.11ac wireless local area network (WLAN) standard has adopted beamforming (BF) schemes to improve spectral efficiency and throughput with multiple antennas. To design the transmit beam, a channel sounding process to feedback channel state information (CSI) is required. Due to sounding overhead, throughput increases with the amount of transmit data under static channels. Under practical channel conditions with mobility, however, the mismatch between the transmit beam and the channel at transmission time causes performance loss when transmission duration after channel sounding is too long. When the fading rate, payload size, and operating signal-to-noise ratio are given, the optimal transmission duration (i.e., packet length) can be determined to maximize throughput. The relationship between packet length and throughput is also investigated for single-user and multiuser BF modes.

  15. Reducing the MAC Latency for IEEE 802.11 Vehicular Internet Access

    Directory of Open Access Journals (Sweden)

    Kang Moonsoo

    2010-01-01

    Full Text Available In an intermittently connected environment, access points are sparsely distributed throughout an area. As mobile users travel along the roadway, they can opportunistically connect, albeit temporarily, to roadside 802.11 (Wi-Fi APs for Internet access. Net-working characteristics of vehicular Internet access in an intermittently connected envi ronment face numerous challenges, such as short periods of connectivity and unpredictable connection times. To meet these challenges, we propose an Access Point Report (APR protocol where mobile stations opportunistically collaborate by broadcasting an APR to other mobile stations to fully utilize the short-lived connection periods. APR can optimize the use of short connection periods by minimizing the scanning delay and also act as a hint that enables mobile users to predict when connection can be established.

  16. IEEE 802.15.4 MAC with GTS transmission for heterogeneous devices with application to wheelchair body-area sensor networks.

    Science.gov (United States)

    Shrestha, Bharat; Hossain, Ekram; Camorlinga, Sergio

    2011-09-01

    In wireless personal area networks, such as wireless body-area sensor networks, stations or devices have different bandwidth requirements and, thus, create heterogeneous traffics. For such networks, the IEEE 802.15.4 medium access control (MAC) can be used in the beacon-enabled mode, which supports guaranteed time slot (GTS) allocation for time-critical data transmissions. This paper presents a general discrete-time Markov chain model for the IEEE 802.15.4-based networks taking into account the slotted carrier sense multiple access with collision avoidance and GTS transmission phenomena together in the heterogeneous traffic scenario and under nonsaturated condition. For this purpose, the standard GTS allocation scheme is modified. For each non-identical device, the Markov model is solved and the average service time and the service utilization factor are analyzed in the non-saturated mode. The analysis is validated by simulations using network simulator version 2.33. Also, the model is enhanced with a wireless propagation model and the performance of the MAC is evaluated in a wheelchair body-area sensor network scenario.

  17. Features of Computerized Procedure System of Shin-Kori unit 5 and 6

    International Nuclear Information System (INIS)

    Seong, Nokyu; Jung, Yeonsub; Sung, Chanho

    2016-01-01

    The Computerized Procedure System (CPS) is one of the Man Machine Interface (MMI) resources of Main Control Room (MCR) of the Advanced Power Reactor 1400 (APR1400). The CPS has been continuously improved since it was installed in Shin-Kori unit 3 and 4. The Korea Hydro Nuclear Power Central Research Institute (KHNP CRI) has found the points of improvement of CPS through CPS centered Human Factors Engineering Verification and Validation (HFE V and V) and Operating Experience Review (OER) of reference power plant. This paper shows the main features of CPS of Shin-Kori 5 and 6 unit. This paper shows the main features of CPS of Shin-Kori 5 and 6. These are some of improvements of CPS. This prototype of CPS currently is implementing in CRI. The respective function can be more detailed after testing the prototype. These features will be applied to Shin-Kori 5 and 6 CPS after HFE V and V

  18. Features of Computerized Procedure System of Shin-Kori unit 5 and 6

    Energy Technology Data Exchange (ETDEWEB)

    Seong, Nokyu; Jung, Yeonsub; Sung, Chanho [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    The Computerized Procedure System (CPS) is one of the Man Machine Interface (MMI) resources of Main Control Room (MCR) of the Advanced Power Reactor 1400 (APR1400). The CPS has been continuously improved since it was installed in Shin-Kori unit 3 and 4. The Korea Hydro Nuclear Power Central Research Institute (KHNP CRI) has found the points of improvement of CPS through CPS centered Human Factors Engineering Verification and Validation (HFE V and V) and Operating Experience Review (OER) of reference power plant. This paper shows the main features of CPS of Shin-Kori 5 and 6 unit. This paper shows the main features of CPS of Shin-Kori 5 and 6. These are some of improvements of CPS. This prototype of CPS currently is implementing in CRI. The respective function can be more detailed after testing the prototype. These features will be applied to Shin-Kori 5 and 6 CPS after HFE V and V.

  19. The Proteoglycan Syndecan 4 Regulates Transient Receptor Potential Canonical 6 Channels via RhoA/ROCK Signaling

    DEFF Research Database (Denmark)

    Liu, Ying; Echtermeyer, Frank; Thilo, Florian

    2012-01-01

    OBJECTIVE: Syndecan 4 (Sdc4) modulates signal transduction and regulates activity of protein channels. Sdc4 is essential for the regulation of cellular permeability. We hypothesized that Sdc4 may regulate transient receptor potential canonical 6 (TRPC6) channels, a determinant of glomerular perme...... permeability, in a RhoA/ROCK-dependent manner. METHODS AND RESULTS: Sdc4 knockout (Sdc4(-/-)) mice showed increased glomerular filtration rate and ameliorated albuminuria under baseline conditions and after bovine serum albumin overload (each P...

  20. 48 CFR 225.7602 - Procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Procedures. 225.7602 Section 225.7602 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7602...

  1. 48 CFR 810.002 - Market research procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Market research procedures. 810.002 Section 810.002 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS COMPETITION AND ACQUISITION PLANNING MARKET RESEARCH 810.002 Market research procedures. Contracting officers...

  2. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2011-01-01

    Full Text Available A Wireless Body Area Network (WBAN is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE applications. Since WBAN nodes are used to collect sensitive (life-critical information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS attacks in WBAN at Physical, Medium Access Control (MAC, Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP and Contention Free Period (CFP parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS in WBAN (since most of the data is carried in CFP period. As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  3. A study of IEEE 802.15.4 security framework for wireless body area networks.

    Science.gov (United States)

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  4. Relevance in print of law of administrative regulations according to paragraph 48 BImSchG in the licensing procedure

    International Nuclear Information System (INIS)

    Breuer, R.

    1978-01-01

    The author discusses in great detail the legal problem of administrative regulations according to paragraph 48 of the Bundes-Immissionsschutzgesetz, BImSchG (Federal Act for the prevention of immissions) and their relevance in point of law in licensing procedures. He very carefully and skilfully presents the different opinions stated in the precedents and by the body of doctrine and quite convincingly explains why he rejects the doctrine of allowing the administration some latitude in their judgement, and thus the doctrine of the defensible opinion with regard to the examination by the court of undefined legal terms. According to the auther's view, the administrative regulations should be regarded as anticipated expert opinions because of the way they are drawn up and because of the way the relevant committees setting up the rules are constituted, i.e. they can serve as a basis for judical decisions. In this connection the author points out that in any case it is left to the court's decisions whether a non-formal expert opinion is deemed to be sufficient, or whether the rules of procedure require a formal expert opinion. Furthermore, several ways of enhancing the binding effect of the administrative regulations pursuant to paragraph 48 of the BImSchG by means of legislatory measures are shown. (UN) [de

  5. Optimal Throughput and Self-adaptability of Robust Real-Time IEEE 802.15.4 MAC for AMI Mesh Network

    International Nuclear Information System (INIS)

    Shabani, Hikma; Ahmed, Musse Mohamud; Khan, Sheroz; Hameed, Shahab Ahmed; Habaebi, Mohamed Hadi

    2013-01-01

    A smart grid refers to a modernization of the electricity system that brings intelligence, reliability, efficiency and optimality to the power grid. To provide an automated and widely distributed energy delivery, the smart grid will be branded by a two-way flow of electricity and information system between energy suppliers and their customers. Thus, the smart grid is a power grid that integrates data communication networks which provide the collected and analysed data at all levels in real time. Therefore, the performance of communication systems is so vital for the success of smart grid. Merit to the ZigBee/IEEE802.15.4std low cost, low power, low data rate, short range, simplicity and free licensed spectrum that makes wireless sensor networks (WSNs) the most suitable wireless technology for smart grid applications. Unfortunately, almost all ZigBee channels overlap with wireless local area network (WLAN) channels, resulting in severe performance degradation due to interference. In order to improve the performance of communication systems, this paper proposes an optimal throughput and self-adaptability of ZigBee/IEEE802.15.4std for smart grid

  6. Skeletal muscle interleukin-6 regulates metabolic factors in iWAT during HFD and exercise training

    DEFF Research Database (Denmark)

    Knudsen, Jakob Grunnet; Bertholdt, Lærke; Joensen, Ella

    2015-01-01

    in combination with exercise training (HFD ExTr) for 16 weeks. RESULTS: Total fat mass increased (P mass than HFD Floxed mice. Accordingly, iWAT glucose transporter 4 (GLUT4) protein content, 5'AMP......OBJECTIVE: To investigate the role of skeletal muscle (SkM) interleukin (IL)-6 in the regulation of adipose tissue metabolism. METHODS: Muscle-specific IL-6 knockout (IL-6 MKO) and IL-6(loxP/loxP) (Floxed) mice were subjected to standard rodent diet (Chow), high-fat diet (HFD), or HFD.......05) in HFD IL-6 MKO than HFD Floxed mice, and pyruvate dehydrogenase E1α (PDH-E1α) protein content was higher (P mass through regulation of glucose uptake capacity as well as lipogenic...

  7. An IEEE 802.3 Compatible Real Time Medium Access Control with Length-based Priority

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A new medium access control method is proposed over the predominant Ethernet broadcast channel. Taking advantages of intrinsic variable length characteristic of standard Ethernet frame, message-oriented dynamic priority mechanism is established. Prioritized medium access control operates under a so-called block mode in event of collisions.High priority messages have a chance to preempt block status incurred by low priority ones. By this means, the new MAC provides a conditional deterministic real time performance beyond a statistical one. Experiments demonstrate effectiveness and attractiveness of the proposed scheme. Moreover, this new MAC is completely compatible with IEEE802.3.

  8. Optimizing IEEE 802.11i resource and security essentials for mobile and stationary devices

    CERN Document Server

    Amiri, IS; Saberi, Iman

    2014-01-01

    In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required securi

  9. Resource management framework for QoS scheduling in IEEE 802.16 WiMAX networks

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2009-01-01

    IEEE 802.16, also known as WiMAX, has received much attention recently for its capability to support multiple types of applications with diverse Quality-of-Service (QoS) requirements. Beyond what the standard has defined, radio resource management (RRM) still remains an open issue, which plays...... an important role in QoS provisioning for different types of services. In this chapter, we propose a downlink resource management framework for QoS scheduling in OFDMA based WiMAX systems. Our framework consists of a dynamic resource allocation (DRA) module and a connection admission control (CAC) module...

  10. Downlink resource management for QoS scheduling in IEEE 802.16 WiMAX networks

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2010-01-01

    IEEE 802.16, also known as WiMAX, has received much attention recently for its capability to support multiple types of applications with diverse Quality-of-Service (QoS) requirements. Beyond what the standard has defined, radio resource management (RRM) still remains an open issue, which plays...... an important role in QoS provisioning for different types of services. In this paper, we propose a downlink resource management framework for QoS scheduling in OFDMA based WiMAX systems. Our framework consists of a dynamic resource allocation (DRA) module and a connection admission control (CAC) module. A two...

  11. A Power-Efficient Access Point Operation for Infrastructure Basic Service Set in IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Hua Ye Ming

    2006-01-01

    Full Text Available Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handheld devices with wireless LAN capability. In this paper, a hybrid protocol named improved PCF operation is proposed, which intelligently chooses the access point- (AP- assisted DCF (distributed coordinator function and enhanced PCF (point coordinator function transmission mechanism of IEEE 802.11 protocol in an infrastructure-based wireless LAN environment. Received signal strength indicator (RSSI is used to determine the tradeoff between direct mobile-to-mobile transmission and transmission routed by AP. Based on the estimation, mobile stations can efficiently communicate directly instead of being routed through AP if they are in the vicinity of each other. Furthermore, a smart AP protocol is proposed as extension to the improved PCF operation by utilizing the historical end-to-end delay information to decide the waking up time of mobile stations. Simulation results show that using the proposed protocol, energy consumption of mobile devices can be reduced at the cost of slightly longer end-to-end packet delay compared to traditional IEEE 802.11 PCF protocol. However, in a non-time-critical environment, this option can significantly prolong the operation time of mobile devices.

  12. Accurate Energy Consumption Modeling of IEEE 802.15.4e TSCH Using Dual-BandOpenMote Hardware.

    Science.gov (United States)

    Daneels, Glenn; Municio, Esteban; Van de Velde, Bruno; Ergeerts, Glenn; Weyn, Maarten; Latré, Steven; Famaey, Jeroen

    2018-02-02

    The Time-Slotted Channel Hopping (TSCH) mode of the IEEE 802.15.4e amendment aims to improve reliability and energy efficiency in industrial and other challenging Internet-of-Things (IoT) environments. This paper presents an accurate and up-to-date energy consumption model for devices using this IEEE 802.15.4e TSCH mode. The model identifies all network-related CPU and radio state changes, thus providing a precise representation of the device behavior and an accurate prediction of its energy consumption. Moreover, energy measurements were performed with a dual-band OpenMote device, running the OpenWSN firmware. This allows the model to be used for devices using 2.4 GHz, as well as 868 MHz. Using these measurements, several network simulations were conducted to observe the TSCH energy consumption effects in end-to-end communication for both frequency bands. Experimental verification of the model shows that it accurately models the consumption for all possible packet sizes and that the calculated consumption on average differs less than 3% from the measured consumption. This deviation includes measurement inaccuracies and the variations of the guard time. As such, the proposed model is very suitable for accurate energy consumption modeling of TSCH networks.

  13. Feasibility of space-division-multiplexed transmission of IEEE 802.11 n/ac-compliant wireless MIMO signals over OM3 multimode fiber

    NARCIS (Netherlands)

    Lei, Yi; Li, Jianqiang; Meng, Ziyi; Wu, Rui; Wan, Zhiquan; Fan, Yuting; Zhang, Wenjia; Yin, Feifei; Dai, Yitang; Xu, Kun

    2018-01-01

    In this paper, we have experimentally demonstrated the feasibility of space-division-multiplexed 3 × 3 multiple-input multiple-output (MIMO) transmission over a single OM3 multimode fiber (MMF) using commercial IEEE 802.11 n/ac access points. Throughput performance for different fiber length links

  14. The cell cycle regulator CCDC6 is a key target of RNA-binding protein EWS.

    Directory of Open Access Journals (Sweden)

    Sujitha Duggimpudi

    Full Text Available Genetic translocation of EWSR1 to ETS transcription factor coding region is considered as primary cause for Ewing sarcoma. Previous studies focused on the biology of chimeric transcription factors formed due to this translocation. However, the physiological consequences of heterozygous EWSR1 loss in these tumors have largely remained elusive. Previously, we have identified various mRNAs bound to EWS using PAR-CLIP. In this study, we demonstrate CCDC6, a known cell cycle regulator protein, as a novel target regulated by EWS. siRNA mediated down regulation of EWS caused an elevated apoptosis in cells in a CCDC6-dependant manner. This effect was rescued upon re-expression of CCDC6. This study provides evidence for a novel functional link through which wild-type EWS operates in a target-dependant manner in Ewing sarcoma.

  15. 7 CFR 983.152 - Failed lots/rework procedure.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Failed lots/rework procedure. 983.152 Section 983.152..., ARIZONA, AND NEW MEXICO Rules and Regulations § 983.152 Failed lots/rework procedure. (a) Inshell rework procedure for aflatoxin. If inshell rework is selected as a remedy to meet the aflatoxin regulations of this...

  16. Improving the communication reliability of body sensor networks based on the IEEE 802.15.4 protocol.

    Science.gov (United States)

    Gomes, Diogo; Afonso, José A

    2014-03-01

    Body sensor networks (BSNs) enable continuous monitoring of patients anywhere, with minimum constraints to daily life activities. Although the IEEE 802.15.4 and ZigBee(®) (ZigBee Alliance, San Ramon, CA) standards were mainly developed for use in wireless sensors network (WSN) applications, they are also widely used in BSN applications because of device characteristics such as low power, low cost, and small form factor. However, compared with WSNs, BSNs present some very distinctive characteristics in terms of traffic and mobility patterns, heterogeneity of the nodes, and quality of service requirements. This article evaluates the suitability of the carrier sense multiple access-collision avoidance protocol, used by the IEEE 802.15.4 and ZigBee standards, for data-intensive BSN applications, through the execution of experimental tests in different evaluation scenarios, in order to take into account the effects of contention, clock drift, and hidden nodes on the communication reliability. Results show that the delivery ratio may decrease substantially during transitory periods, which can last for several minutes, to a minimum of 90% with retransmissions and 13% without retransmissions. This article also proposes and evaluates the performance of the BSN contention avoidance mechanism, which was designed to solve the identified reliability problems. This mechanism was able to restore the delivery ratio to 100% even in the scenario without retransmissions.

  17. PGDP [Paducah Gaseous Diffusion Plant]-UF6 handling, sampling, analysis and associated QC/QA and safety related procedures

    International Nuclear Information System (INIS)

    Harris, R.L.

    1987-01-01

    This document is a compilation of Paducah Gaseous Diffusion Plant procedures on UF 6 handling, sampling, and analysis, along with associated QC/QA and safety related procedures. It was assembled for transmission by the US Department of Energy to the Korean Advanced Energy Institute as a part of the US-Korea technical exchange program

  18. Quality of Service Model on Data Link Layer for Mission Critical Traffic on IEEE 802.11g Networks in Infrastructure Mode

    Directory of Open Access Journals (Sweden)

    Gerald B. Fuenmayor-Rivadeneira

    2013-11-01

    Full Text Available This article presents a synthesized review as state of the art of the study of QoS for mission-critical traffic in wireless local area networks that use the IEEE 802.11g protocol. This is to highlight previous research for their contribution will constitute a reference to guide a proposed new approach to ensuring the quality of service for this type of traffic using the above protocol. The review is based on academic and business items made during the current five years. As a result of this review it is evident that there have been many efforts to address the issue but there are still gaps in the characterization of mission-critical traffic and ensuring quality of service for the same, due the new applications and the large host of WiFi networks in business and government, which has led to increased demand for access channels and, therefore, a challenge to the progress already known, such as IEEE 802.1q.

  19. A genome-wide siRNA screen in mammalian cells for regulators of S6 phosphorylation.

    Directory of Open Access Journals (Sweden)

    Angela Papageorgiou

    Full Text Available mTOR complex1, the major regulator of mRNA translation in all eukaryotic cells, is strongly activated in most cancers. We performed a genome-wide RNAi screen in a human cancer cell line, seeking genes that regulate S6 phosphorylation, readout of mTORC1 activity. Applying a stringent selection, we retrieved nearly 600 genes wherein at least two RNAis gave significant reduction in S6-P. This cohort contains known regulators of mTOR complex 1 and is significantly enriched in genes whose depletion affects the proliferation/viability of the large set of cancer cell lines in the Achilles database in a manner paralleling that caused by mTOR depletion. We next examined the effect of RNAi pools directed at 534 of these gene products on S6-P in TSC1 null mouse embryo fibroblasts. 76 RNAis reduced S6 phosphorylation significantly in 2 or 3 replicates. Surprisingly, among this cohort of genes the only elements previously associated with the maintenance of mTORC1 activity are two subunits of the vacuolar ATPase and the CUL4 subunit DDB1. RNAi against a second set of 84 targets reduced S6-P in only one of three replicates. However, an indication that this group also bears attention is the presence of rpS6KB1 itself, Rac1 and MAP4K3, a protein kinase that supports amino acid signaling to rpS6KB1. The finding that S6 phosphorylation requires a previously unidentified, functionally diverse cohort of genes that participate in fundamental cellular processes such as mRNA translation, RNA processing, DNA repair and metabolism suggests the operation of feedback pathways in the regulation of mTORC1 operating through novel mechanisms.

  20. RGS6, but not RGS4, is the dominant regulator of G protein signaling (RGS) modulator of the parasympathetic regulation of mouse heart rate.

    Science.gov (United States)

    Wydeven, Nicole; Posokhova, Ekaterina; Xia, Zhilian; Martemyanov, Kirill A; Wickman, Kevin

    2014-01-24

    Parasympathetic activity decreases heart rate (HR) by inhibiting pacemaker cells in the sinoatrial node (SAN). Dysregulation of parasympathetic influence has been linked to sinus node dysfunction and arrhythmia. RGS (regulator of G protein signaling) proteins are negative modulators of the parasympathetic regulation of HR and the prototypical M2 muscarinic receptor (M2R)-dependent signaling pathway in the SAN that involves the muscarinic-gated atrial K(+) channel IKACh. Both RGS4 and RGS6-Gβ5 have been implicated in these processes. Here, we used Rgs4(-/-), Rgs6(-/-), and Rgs4(-/-):Rgs6(-/-) mice to compare the relative influence of RGS4 and RGS6 on parasympathetic regulation of HR and M2R-IKACh-dependent signaling in the SAN. In retrogradely perfused hearts, ablation of RGS6, but not RGS4, correlated with decreased resting HR, increased heart rate variability, and enhanced sensitivity to the negative chronotropic effects of the muscarinic agonist carbachol. Similarly, loss of RGS6, but not RGS4, correlated with enhanced sensitivity of the M2R-IKACh signaling pathway in SAN cells to carbachol and a significant slowing of M2R-IKACh deactivation rate. Surprisingly, concurrent genetic ablation of RGS4 partially rescued some deficits observed in Rgs6(-/-) mice. These findings, together with those from an acute pharmacologic approach in SAN cells from Rgs6(-/-) and Gβ5(-/-) mice, suggest that the partial rescue of phenotypes in Rgs4(-/-):Rgs6(-/-) mice is attributable to another R7 RGS protein whose influence on M2R-IKACh signaling is masked by RGS4. Thus, RGS6-Gβ5, but not RGS4, is the primary RGS modulator of parasympathetic HR regulation and SAN M2R-IKACh signaling in mice.

  1. Experimental video signals distribution MMF network based on IEEE 802.11 standard

    Science.gov (United States)

    Kowalczyk, Marcin; Maksymiuk, Lukasz; Siuzdak, Jerzy

    2014-11-01

    The article was focused on presentation the achievements in a scope of experimental research on transmission of digital video streams in the frame of specially realized for this purpose ROF (Radio over Fiber) network. Its construction was based on the merge of wireless IEEE 802.11 network, popularly referred as Wi-Fi, with a passive optical network PON based on multimode fibers MMF. The proposed approach can constitute interesting proposal in area of solutions in the scope of the systems monitoring extensive, within which is required covering of a large area with ensuring of a relatively high degree of immunity on the interferences transmitted signals from video IP cameras to the monitoring center and a high configuration flexibility (easily change the deployment of cameras) of such network.

  2. The effects of divided attention at study and reporting procedure on regulation and monitoring for episodic recall.

    Science.gov (United States)

    Sauer, James; Hope, Lorraine

    2016-09-01

    Eyewitnesses regulate the level of detail (grain size) reported to balance competing demands for informativeness and accuracy. However, research to date has predominantly examined metacognitive monitoring for semantic memory tasks, and used relatively artificial phased reporting procedures. Further, although the established role of confidence in this regulation process may affect the confidence-accuracy relation for volunteered responses in predictable ways, previous investigations of the confidence-accuracy relation for eyewitness recall have largely overlooked the regulation of response granularity. Using a non-phased paradigm, Experiment 1 compared reporting and monitoring following optimal and sub-optimal (divided attention) encoding conditions. Participants showed evidence of sacrificing accuracy for informativeness, even when memory quality was relatively weak. Participants in the divided (cf. full) attention condition showed reduced accuracy for fine- but not coarse-grained responses. However, indices of discrimination and confidence diagnosticity showed no effect of divided attention. Experiment 2 compared the effects of divided attention at encoding on reporting and monitoring using both non-phased and 2-phase procedures. Divided attention effects were consistent with Experiment 1. However, compared to those in the non-phased condition, participants in the 2-phase condition displayed a more conservative control strategy, and confidence ratings were less diagnostic of accuracy. When memory quality was reduced, although attempts to balance informativeness and accuracy increased the chance of fine-grained response errors, confidence provided an index of the likely accuracy of volunteered fine-grained responses for both condition. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. 7 CFR 1900.55 - Adverse action procedures.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Adverse action procedures. 1900.55 Section 1900.55 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS... REGULATIONS GENERAL Adverse Decisions and Administrative Appeals § 1900.55 Adverse action procedures. (a) If...

  4. Ribosomal S6K1 in POMC and AgRP Neurons Regulates Glucose Homeostasis but Not Feeding Behavior in Mice

    Directory of Open Access Journals (Sweden)

    Mark A. Smith

    2015-04-01

    Full Text Available Hypothalamic ribosomal S6K1 has been suggested as a point of convergence for hormonal and nutrient signals in the regulation of feeding behavior, bodyweight, and glucose metabolism. However, the long-term effects of manipulating hypothalamic S6K1 signaling on energy homeostasis and the cellular mechanisms underlying these roles are unclear. We therefore inactivated S6K1 in pro-opiomelanocortin (POMC and agouti-related protein (AgRP neurons, key regulators of energy homeostasis, but in contrast to the current view, we found no evidence that S6K1 regulates food intake and bodyweight. In contrast, S6K1 signaling in POMC neurons regulated hepatic glucose production and peripheral lipid metabolism and modulated neuronal excitability. S6K1 signaling in AgRP neurons regulated skeletal muscle insulin sensitivity and was required for glucose sensing by these neurons. Our findings suggest that S6K1 signaling is not a general integrator of energy homeostasis in the mediobasal hypothalamus but has distinct roles in the regulation of glucose homeostasis by POMC and AgRP neurons.

  5. RFX6 Regulates Insulin Secretion by Modulating Ca2+ Homeostasis in Human β Cells

    Directory of Open Access Journals (Sweden)

    Vikash Chandra

    2014-12-01

    Full Text Available Development and function of pancreatic β cells involve the regulated activity of specific transcription factors. RFX6 is a transcription factor essential for mouse β cell differentiation that is mutated in monogenic forms of neonatal diabetes. However, the expression and functional roles of RFX6 in human β cells, especially in pathophysiological conditions, are poorly explored. We demonstrate the presence of RFX6 in adult human pancreatic endocrine cells. Using the recently developed human β cell line EndoC-βH2, we show that RFX6 regulates insulin gene transcription, insulin content, and secretion. Knockdown of RFX6 causes downregulation of Ca2+-channel genes resulting in the reduction in L-type Ca2+-channel activity that leads to suppression of depolarization-evoked insulin exocytosis. We also describe a previously unreported homozygous missense RFX6 mutation (p.V506G that is associated with neonatal diabetes, which lacks the capacity to activate the insulin promoter and to increase Ca2+-channel expression. Our data therefore provide insights for understanding certain forms of neonatal diabetes.

  6. The effect of periodontal treatment on serum leptin, interleukin-6, and C-reactive protein.

    Science.gov (United States)

    Shimada, Yasuko; Komatsu, Yasutaka; Ikezawa-Suzuki, Ikuyo; Tai, Hideaki; Sugita, Noriko; Yoshie, Hiromasa

    2010-08-01

    Previous studies suggest that periodontitis is closely related to obesity and metabolic syndrome. Leptin, a pleiotrophic hormone produced by adipose tissue, has been reported to be related to periodontitis. This study investigates the effects of periodontal treatment on the serum levels of leptin and other cytokines in patients with chronic periodontitis (CP). Serum samples were taken from 33 CP patients (22 non-smokers, 11 smokers) and 18 healthy subjects. The serum leptin, adiponectin, tumor necrosis factor-alpha, interleukin (IL)-6, and C-reactive protein (CRP) levels were measured before and after non-surgical periodontal treatment. Significant differences between healthy and CP patients were found in serum leptin, IL-6, and CRP levels (P = 0.0018, P = 0.0064, and P = 0.0095, respectively). The serum leptin level was associated with mean probing depth, mean clinical attachment level, mean alveolar bone loss, and body mass index. There were significant associations between serum leptin levels and IL-6 and CRP levels. After non-surgical periodontal treatment, serum leptin, IL-6, and CRP levels were significantly decreased (mean +/- SD before and after, P value, respectively: leptin, 8.02 +/- 5.5, 7.10 +/- 4.4, P = 0.015; IL-6, 1.73 +/- 1.02, 1.36 +/- 0.73, P = 0.048; and CRP, 802.0 +/- 1065, 491.2 +/- 479.3, P = 0.047). Periodontal treatment is effective in reducing serum leptin, IL-6, and CRP levels. The results suggest that leptin, IL-6, and CRP could be mediating factors that connect metabolic syndrome and periodontitis.

  7. Forwarding techniques for IP fragmented packets in a real 6LoWPAN network.

    Science.gov (United States)

    Ludovici, Alessandro; Calveras, Anna; Casademont, Jordi

    2011-01-01

    Wireless Sensor Networks (WSNs) are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over) focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  8. Forwarding Techniques for IP Fragmented Packets in a Real 6LoWPAN Network

    Directory of Open Access Journals (Sweden)

    Jordi Casademont

    2011-01-01

    Full Text Available Wireless Sensor Networks (WSNs are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  9. Aggresome formation is regulated by RanBPM through an interaction with HDAC6

    Directory of Open Access Journals (Sweden)

    Louisa M. Salemi

    2014-05-01

    Full Text Available In conditions of proteasomal impairment, the build-up of damaged or misfolded proteins activates a cellular response leading to the recruitment of damaged proteins into perinuclear aggregates called aggresomes. Aggresome formation involves the retrograde transport of cargo proteins along the microtubule network and is dependent on the histone deacetylase HDAC6. Here we show that ionizing radiation (IR promotes Ran-Binding Protein M (RanBPM relocalization into discrete perinuclear foci where it co-localizes with aggresome components ubiquitin, dynein and HDAC6, suggesting that the RanBPM perinuclear clusters correspond to aggresomes. RanBPM was also recruited to aggresomes following treatment with the proteasome inhibitor MG132 and the DNA-damaging agent etoposide. Strikingly, aggresome formation by HDAC6 was markedly impaired in RanBPM shRNA cells, but was restored by re-expression of RanBPM. RanBPM was found to interact with HDAC6 and to inhibit its deacetylase activity. This interaction was abrogated by a RanBPM deletion of its LisH/CTLH domain, which also prevented aggresome formation, suggesting that RanBPM promotes aggresome formation through an association with HDAC6. Our results suggest that RanBPM regulates HDAC6 activity and is a central regulator of aggresome formation.

  10. MicroRNA-365 in macrophages regulates Mycobacterium tuberculosis-induced active pulmonary tuberculosis via interleukin-6.

    Science.gov (United States)

    Song, Qingzhang; Li, Hui; Shao, Hua; Li, Chunling; Lu, Xiao

    2015-01-01

    The present study is to investigate the relationship between microRNA (miR)-365 expression and the levels of interleukin (IL)-6 mRNA and protein in patients with active tuberculosis. From June 2011 to June 2014, 48 patients with active pulmonary tuberculosis induced by Mycobacterium tuberculosis were included in the study. In addition, 23 healthy subjects were enrolled as control. Macrophages were collected by pulmonary alveolus lavage. In addition, serum and mononuclear cells were isolated from peripheral blood. The levels of miR-365 and IL-6 in macrophages, mononuclear cells and serum were determined using quantitative real-time polymerase chain reaction. The protein expression of IL-6 in macrophages and mononuclear cells was measured using Western blotting, while that in serum was detected by enzyme-linked immunoabsorbent assay. Expression of IL-6 mRNA and protein was significantly enhanced in patients with active pulmonary tuberculosis. Increase of IL-6 protein concentration in serum was probably due to the release of IL-6 protein from mononuclear cells in the blood. In addition, miR-365 levels were significantly lowered in patients with active pulmonary tuberculosis. Up-regulated IL-6 expression in macrophages, mononuclear cells and serum in patients with active pulmonary tuberculosis is related to the down-regulation of miR-365, suggesting that miR-365 may regulate the occurrence and immune responses of active pulmonary tuberculosis via IL-6.

  11. 25 CFR 115.802 - May a tribe make a request to OTFM to receive information about its trust account more frequently?

    Science.gov (United States)

    2010-04-01

    ... § 115.802 May a tribe make a request to OTFM to receive information about its trust account more frequently? Yes, a tribe may contact OTFM at any time to: (a) Request information about account transactions and balances; (b) Make arrangements to access account information electronically; or (c) Receive a...

  12. Regulation of cortical contractility and spindle positioning by the protein phosphatase 6 PPH-6 in one-cell stage C. elegans embryos

    Science.gov (United States)

    Afshar, Katayoun; Werner, Michael E.; Tse, Yu Chung; Glotzer, Michael; Gönczy, Pierre

    2010-01-01

    Modulation of the microtubule and the actin cytoskeleton is crucial for proper cell division. Protein phosphorylation is known to be an important regulatory mechanism modulating these cytoskeletal networks. By contrast, there is a relative paucity of information regarding how protein phosphatases contribute to such modulation. Here, we characterize the requirements for protein phosphatase PPH-6 and its associated subunit SAPS-1 in one-cell stage C. elegans embryos. We establish that the complex of PPH-6 and SAPS-1 (PPH-6/SAPS-1) is required for contractility of the actomyosin network and proper spindle positioning. Our analysis demonstrates that PPH-6/SAPS-1 regulates the organization of cortical non-muscle myosin II (NMY-2). Accordingly, we uncover that PPH-6/SAPS-1 contributes to cytokinesis by stimulating actomyosin contractility. Furthermore, we demonstrate that PPH-6/SAPS-1 is required for the proper generation of pulling forces on spindle poles during anaphase. Our results indicate that this requirement is distinct from the role in organizing the cortical actomyosin network. Instead, we uncover that PPH-6/SAPS-1 contributes to the cortical localization of two positive regulators of pulling forces, GPR-1/2 and LIN-5. Our findings provide the first insights into the role of a member of the PP6 family of phosphatases in metazoan development. PMID:20040490

  13. Practical applications of the R6 leak-before-break procedure

    International Nuclear Information System (INIS)

    Bouchard, P.J.

    1997-01-01

    A forthcoming revision to the R6 Leak-before-Break Assessment Procedure is briefly described. Practical application of the LbB concepts to safety-critical nuclear plant is illustrated by examples covering both low temperature and high temperature (>450 degrees C) operating regimes. The examples highlight a number of issues which can make the development of a satisfactory LbB case problematic: for example, coping with highly loaded components, methodology assumptions and the definition of margins, the effect of crack closure owing to weld residual stresses, complex thermal stress fields or primary bending fields, the treatment of locally high stresses at crack intersections with free surfaces, the choice of local limit load solution when predicting ligament breakthrough, and the scope of calculations required to support even a simplified LbB case for high temperature steam pipe-work systems

  14. Practical applications of the R6 leak-before-break procedure

    Energy Technology Data Exchange (ETDEWEB)

    Bouchard, P.J.

    1997-04-01

    A forthcoming revision to the R6 Leak-before-Break Assessment Procedure is briefly described. Practical application of the LbB concepts to safety-critical nuclear plant is illustrated by examples covering both low temperature and high temperature (>450{degrees}C) operating regimes. The examples highlight a number of issues which can make the development of a satisfactory LbB case problematic: for example, coping with highly loaded components, methodology assumptions and the definition of margins, the effect of crack closure owing to weld residual stresses, complex thermal stress fields or primary bending fields, the treatment of locally high stresses at crack intersections with free surfaces, the choice of local limit load solution when predicting ligament breakthrough, and the scope of calculations required to support even a simplified LbB case for high temperature steam pipe-work systems.

  15. Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3

    Science.gov (United States)

    Fujiwara, Toru; Kasami, Tadao; Lin, Shu

    1989-09-01

    The error-detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3 are investigated. These codes are also used for error detection in the data link layer of the Ethernet, a local area network. The weight distributions for various code lengths are calculated to obtain the probability of undetectable error and that of detectable error for a binary symmetric channel with bit-error rate between 0.00001 and 1/2.

  16. Cold-Inducible SIRT6 Regulates Thermogenesis of Brown and Beige Fat

    Directory of Open Access Journals (Sweden)

    Lu Yao

    2017-07-01

    Full Text Available Promoting development and function of brown and beige fat may reduce obesity. Here, we show that fat SIRT6 expression is markedly induced by cold exposure and a β-adrenergic agonist. Deletion of SIRT6 in adipose tissue impairs the thermogenic function of brown adipocytes, causing a morphological “whitening” of brown fat, reduced oxygen (O2 consumption, obesity, decreased core body temperature, and cold sensitivity. Fat SIRT6-deleted mice exhibit increased blood glucose levels, severe insulin resistance, and hepatic steatosis. Moreover, SIRT6 deficiency inhibits the browning of white adipose tissue (WAT following cold exposure or β3-agonist treatment. Depletion of SIRT6 expression in brown adipocytes reduces expression of thermogenic genes, causing a reduction in cellular respiration. Conversely, SIRT6 overexpression in primary fat cells stimulates the thermogenic program. Mechanistically, SIRT6 interacts with and promotes phospho-ATF2 binding to the PGC-1α gene promoter to activate its expression. The present study reveals a critical role for SIRT6 in regulating thermogenesis of fat.

  17. Dose evaluation in criticality accidents using response of panasonic TL personal dosemeters (UD-809/UD-802)

    International Nuclear Information System (INIS)

    Zeyrek, C. T.; Guenduez, H.

    2012-01-01

    This study gives the results of dosimetry measurements carried out in the Silene reactor at Valduc (France) with neutron and photon personal thermoluminescence dosemeters (TLDs) in mixed neutron and gamma radiation fields, in the frame of the international accident dosimetry intercomparison programme in 2002. The intercomparison consisted of a series of three irradiation scenarios. The scenarios took place at the Valduc site (France) by using the Silene experimental reactor. For neutron and photon dosimetry, Panasonic model UD-809 and UD-802 personal TLDs were used together. (authors)

  18. Ribosomal S6K1 in POMC and AgRP Neurons Regulates Glucose Homeostasis but Not Feeding Behavior in Mice.

    Science.gov (United States)

    Smith, Mark A; Katsouri, Loukia; Irvine, Elaine E; Hankir, Mohammed K; Pedroni, Silvia M A; Voshol, Peter J; Gordon, Matthew W; Choudhury, Agharul I; Woods, Angela; Vidal-Puig, Antonio; Carling, David; Withers, Dominic J

    2015-04-21

    Hypothalamic ribosomal S6K1 has been suggested as a point of convergence for hormonal and nutrient signals in the regulation of feeding behavior, bodyweight, and glucose metabolism. However, the long-term effects of manipulating hypothalamic S6K1 signaling on energy homeostasis and the cellular mechanisms underlying these roles are unclear. We therefore inactivated S6K1 in pro-opiomelanocortin (POMC) and agouti-related protein (AgRP) neurons, key regulators of energy homeostasis, but in contrast to the current view, we found no evidence that S6K1 regulates food intake and bodyweight. In contrast, S6K1 signaling in POMC neurons regulated hepatic glucose production and peripheral lipid metabolism and modulated neuronal excitability. S6K1 signaling in AgRP neurons regulated skeletal muscle insulin sensitivity and was required for glucose sensing by these neurons. Our findings suggest that S6K1 signaling is not a general integrator of energy homeostasis in the mediobasal hypothalamus but has distinct roles in the regulation of glucose homeostasis by POMC and AgRP neurons. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  19. 48 CFR 3032.003 - Simplified acquisition procedures financing.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Simplified acquisition procedures financing. 3032.003 Section 3032.003 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND... FINANCING Scope of Part 3032.003 Simplified acquisition procedures financing. Contract financing may be...

  20. MicroRNA, miR-374b, directly targets Myf6 and negatively regulates C2C12 myoblasts differentiation

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Zhiyuan; Sun, Xiaorui; Xu, Dequan; Xiong, Yuanzhu; Zuo, Bo, E-mail: zuobo@mail.hzau.edu.cn

    2015-11-27

    Myogenesis is a complex process including myoblast proliferation, differentiation and myotube formation and is controlled by myogenic regulatory factors (MRFs), MyoD, MyoG, Myf5 and Myf6 (also known as MRF4). MicroRNA is a kind of ∼22 nt-long non-coding small RNAs, and act as key transcriptional or post-transcriptional regulators of gene expression. Identification of miRNAs involved in the regulation of muscle genes could improve our understanding of myogenesis process. In this study, we investigated the regulation of Myf6 gene by miRNAs. We showed that miR-374b specifically bound to the 3'untranslated region (UTR) of Myf6 and down-regulated the expression of Myf6 gene at both mRNA and protein level. Furthermore, miR-374b is ubiquitously expressed in the tissues of adult C57BL6 mouse, and the mRNA abundance increases first and then decreases during C2C12 myoblasts differentiation. Over-expression of miR-374b impaired C2C12 cell differentiation, while inhibiting miR-374b expression by 2′-O-methyl antisense oligonucleotides promoted C2C12 cell differentiation. Taken together, our findings identified miR-374b directly targets Myf6 and negatively regulates myogenesis. - Highlights: • MiR-374b directly targets 3′UTR of Myf6. • MiR-374b negatively regulates Myf6 in C2C12 cells. • MiR-374b abundance significiently changes during C2C12 cells differentiation. • MiR-374b negatively regulates C2C12 cells differentiation.

  1. Mobile Device Passive Localization Based on IEEE 802.11 Probe Request Frames

    Directory of Open Access Journals (Sweden)

    Lin Sun

    2017-01-01

    Full Text Available This paper presents a novel passive mobile device localization mode based on IEEE 802.11 Probe Request frames. In this approach, the listener can discover mobile devices by receiving the Probe Request frames and localize them on his walking path. The unique location of the mobile device is estimated on a geometric diagram and right-angled walking path. In model equations, site-related parameter, that is, path loss exponent, is eliminated to make the approach site-independent. To implement unique localization, the right-angled walking path is designed and the optimal location is estimated from the optional points. The performance of our method has been evaluated inside the room, outside the room, and in outdoor scenarios. Three kinds of walking paths, for example, horizontal, vertical, and slanted, are also tested.

  2. 75 FR 30750 - Drawbridge Operation Regulation; Arkansas Waterway, Little Rock, AR

    Science.gov (United States)

    2010-06-02

    ...-AA09 Drawbridge Operation Regulation; Arkansas Waterway, Little Rock, AR AGENCY: Coast Guard, DHS... procedures on the Baring Cross Railroad Drawbridge across the Arkansas Waterway at mile 119.6 at Little Rock....123(b) state that the draw of the Baring Cross Railroad Drawbridge, mile 119.6, at Little Rock, AR is...

  3. CNEN-NN 6.04 standard adaptation in Brazil for industrial radiographic work in occupied areas or public roads

    International Nuclear Information System (INIS)

    Teixeira, P.B.; Aquino, J.O. de; Souza, L.A. de

    1996-01-01

    The industrial radiographic work that uses mobile equipment in Brazil must be in compliance with the National Commission of Nuclear Energy (CNEN) Regulation CNEN-NN 6.04. It states that every works that employs radiographic equipment in occupied areas or public roads requires a specific radiation protection procedure. This procedure must be approved by the CNEN at least fifteen days before starting the job. It is not always possible to the users to get their licensing work at time, because the industrial radiography jobs need immediate actions. Furthermore, the CNEN-NN 6.04 Regulation does not specify what type of information the procedures should involve, so that some important information had been often missed, causing a delaying in the licensing procedures. The corrective and preventive actions taken by the CNEN to optimize this kind of jobs and to overcome bureaucratic difficulties are described. A standard radiation protection procedure is also presented. (authors). 2 refs., 2 tabs

  4. Emotion regulation strategies in preschool children.

    Science.gov (United States)

    Sala, Maria Nives; Pons, Francisco; Molina, Paola

    2014-11-01

    This study investigated the development of emotion regulation strategies as reflected in the narratives of children between the ages of 3 and 6 years. An experimental procedure based on story completion tasks was devised to elicit the emotion-related narratives of 69 preschool children. Coding of the narratives led to the observation of different emotion regulation strategies: Behavioural strategies, social support, and cognitive reappraisal. Several significant gender and age differences were identified in the use of these strategies. In addition, verbal skills, non-verbal intelligence, and emotion comprehension were found to be associated with use of the observed emotion regulation strategies, although only at specific ages. © 2014 The British Psychological Society.

  5. Mathematical Analysis of EDCA's Performance on the Control Channel of an IEEE 802.11p WAVE Vehicular Network

    Directory of Open Access Journals (Sweden)

    Hussein T. Mouftah

    2010-01-01

    Full Text Available Wireless networks for vehicular environments are gaining increasing importance due to their ability to provide a means for stations on the roadside and radio units on board of vehicles to communicate and share safety-related information, thus reducing the probability of accidents and increasing the efficiency of the transportation system. With this goal in mind, the IEEE is currently developing the Wireless Access in Vehicular Environments (WAVE IEEE 802.11p standard. WAVE devices use the IEEE 802.11's Enhanced Distributed Channel Access (EDCA MAC protocol to compete for the transmission medium. This work proposes an analytical tool to evaluate the performance of EDCA under the specific conditions of the so-called control channel (CCH of a WAVE environment, including the particular EDCA parameter values and the fact that all safety-critical data frames are broadcasted. The protocol is modeled using Markov chains and results related to throughput, frame-error rate, buffer occupancy and delay are obtained under different traffic-load conditions. The main analysis is performed assuming that the CCH works continuously, and then an explanation is given as to the considerations that are needed to account for the fact that activity on the CCH is intermittent.

  6. 75 FR 31699 - Indian Self-Determination Act Contracts and Annual Funding Agreements-Appeal Procedures

    Science.gov (United States)

    2010-06-04

    ... Indian Self-Determination Act Contracts and Annual Funding Agreements--Appeal Procedures AGENCIES: Bureau... Contract Disputes Act, 41 U.S.C. 601-613. Effective January 6, 2007, Congress abolished the Interior Board... technical amendments to their joint regulations governing contracts and annual funding agreements under the...

  7. 48 CFR 22.1406 - Complaint procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Complaint procedures. 22.1406 Section 22.1406 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS APPLICATION OF LABOR LAWS TO GOVERNMENT ACQUISITIONS Employment of Workers with...

  8. RNA epitranscriptomics: Regulation of infection of RNA and DNA viruses by N6 -methyladenosine (m6 A).

    Science.gov (United States)

    Tan, Brandon; Gao, Shou-Jiang

    2018-04-26

    N 6 -methyladenosine (m 6 A) was discovered 4 decades ago. However, the functions of m 6 A and the cellular machinery that regulates its changes have just been revealed in the last few years. m 6 A is an abundant internal mRNA modification on cellular RNA and is implicated in diverse cellular functions. Recent works have demonstrated the presence of m 6 A in the genomes of RNA viruses and transcripts of a DNA virus with either a proviral or antiviral role. Here, we first summarize what is known about the m 6 A "writers," "erasers," "readers," and "antireaders" as well as the role of m 6 A in mRNA metabolism. We then review how the replications of numerous viruses are enhanced and restricted by m 6 A with emphasis on the oncogenic DNA virus, Kaposi sarcoma-associated herpesvirus (KSHV), whose m 6 A epitranscriptome was recently mapped. In the context of KSHV, m 6 A and the reader protein YTHDF2 acts as an antiviral mechanism during viral lytic replication. During viral latency, KSHV alters m 6 A on genes that are implicated in cellular transformation and viral latency. Lastly, we discuss future studies that are important to further delineate the functions of m 6 A in KSHV latent and lytic replication and KSHV-induced oncogenesis. Copyright © 2018 John Wiley & Sons, Ltd.

  9. Performance analyses and improvements for the IEEE 802.15.4 CSMA/CA scheme with heterogeneous buffered conditions.

    Science.gov (United States)

    Zhu, Jianping; Tao, Zhengsu; Lv, Chunfeng

    2012-01-01

    Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes-OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme)-are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  10. Identification of nucleosome assembly protein 1 (NAP1) as an interacting partner of plant ribosomal protein S6 (RPS6) and a positive regulator of rDNA transcription

    Energy Technology Data Exchange (ETDEWEB)

    Son, Ora [Department of Biological Science, Sookmyung Women' s University, Seoul 140-742 (Korea, Republic of); Kim, Sunghan [Department of Biological Science, Sookmyung Women' s University, Seoul 140-742 (Korea, Republic of); Department of Plant Science, Plant Genomics and Breeding Institute, Research Institute of Agriculture and Life Sciences, Seoul National University, Seoul 151-921 (Korea, Republic of); Shin, Yun-jeong [Department of Biological Science, Sookmyung Women' s University, Seoul 140-742 (Korea, Republic of); Kim, Woo-Young [College of Pharmacy, Sookmyung Women' s University, Seoul 140-742 (Korea, Republic of); Koh, Hee-Jong, E-mail: heejkoh@snu.ac.kr [Department of Plant Science, Plant Genomics and Breeding Institute, Research Institute of Agriculture and Life Sciences, Seoul National University, Seoul 151-921 (Korea, Republic of); Cheon, Choong-Ill, E-mail: ccheon@sookmyung.ac.kr [Department of Biological Science, Sookmyung Women' s University, Seoul 140-742 (Korea, Republic of)

    2015-09-18

    The ribosomal protein S6 (RPS6) is a downstream component of the signaling mediated by the target of rapamycin (TOR) kinase that acts as a central regulator of the key metabolic processes, such as protein translation and ribosome biogenesis, in response to various environmental cues. In our previous study, we identified a novel role of plant RPS6, which negatively regulates rDNA transcription, forming a complex with a plant-specific histone deacetylase, AtHD2B. Here we report that the Arabidopsis RPS6 interacts additionally with a histone chaperone, nucleosome assembly protein 1(AtNAP1;1). The interaction does not appear to preclude the association of RPS6 with AtHD2B, as the AtNAP1 was also able to interact with AtHD2B as well as with an RPS6-AtHD2B fusion protein in the BiFC assay and pulldown experiment. Similar to a positive effect of the ribosomal S6 kinase 1 (AtS6K1) on rDNA transcription observed in this study, overexpression or down regulation of the AtNAP1;1 resulted in concomitant increase and decrease, respectively, in rDNA transcription suggesting a positive regulatory role played by AtNAP1 in plant rDNA transcription, possibly through derepression of the negative effect of the RPS6-AtHD2B complex. - Highlights: • Nucleosome assembly protein 1 (AtNAP1) interacts with RPS6 as well as with AtHD2B. • rDNA transcription is regulated S6K1. • Overexpression or down regulation of AtNAP1 results in concomitant increase or decrease in rDNA transcription.

  11. Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit With Cisco Router Simulations

    CERN Document Server

    Liu, Dale

    2009-01-01

    Three exams, two certifications, one complete Cisco training solution for networking professionals! .. .. The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam material covers networking concepts along with new and updated content on network security fundamentals and the basics of wireless networking. .. .. This book can be used as a study guide for either track you choose to receive your CCNA – the single exam, 640-802 or the combined 640-822 and 640-816, and for the CCENT certification wh

  12. Estado del Arte en la detección de intrusiones en las redes 802.11i

    Directory of Open Access Journals (Sweden)

    Carlos Romero Gallardo

    2016-11-01

    Full Text Available En este artículo se presenta un análisis de los diversos mecanismos de seguridad existentes que agregan diferentes niveles de seguridad en las redes inalámbricas. Así también se describe una herramienta altamente empleada para la detección de intrusiones de red, los llamados sistemas de detección de intrusos inalámbricos (WIDS, finalmente se recopila información significativa y actualizada para identificar las diferentes técnicas desarrolladas para la detección de intrusiones en redes 802.11

  13. Dose evaluation in criticality accidents using response of Panasonic TL personal dosemeters (UD-809/UD-802).

    Science.gov (United States)

    Zeyrek, C T; Gündüz, H

    2012-09-01

    This study gives the results of dosimetry measurements carried out in the Silène reactor at Valduc (France) with neutron and photon personal thermoluminescence dosemeters (TLDs) in mixed neutron and gamma radiation fields, in the frame of the international accident dosimetry intercomparison programme in 2002. The intercomparison consisted of a series of three irradiation scenarios. The scenarios took place at the Valduc site (France) by using the Silène experimental reactor. For neutron and photon dosimetry, Panasonic model UD-809 and UD-802 personal TLDs were used together.

  14. 49 CFR 244.17 - Procedures.

    Science.gov (United States)

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS ON SAFETY INTEGRATION PLANS GOVERNING RAILROAD CONSOLIDATIONS, MERGERS, AND ACQUISITIONS OF CONTROL Safety Integration Plans § 244.17 Procedures. (a) Each applicant shall file one...

  15. Differential expression of IL-6/IL-6R and MAO-A regulates invasion/angiogenesis in breast cancer.

    Science.gov (United States)

    Bharti, Rashmi; Dey, Goutam; Das, Anjan Kumar; Mandal, Mahitosh

    2018-04-26

    Monoamine oxidases (MAO) are mitochondrial enzymes functioning in oxidative metabolism of monoamines. The action of MAO-A has been typically described in neuro-pharmacological domains. Here, we have established a co-relation between IL-6/IL-6R and MAO-A and their regulation in hypoxia induced invasion/angiogenesis. We employed various in-vitro and in-vivo techniques and clinical samples. We studied a co-relation among MAO-A and IL-6/IL-6R and tumour angiogenesis/invasion in hypoxic environment in breast cancer model. Activation of IL-6/IL-6R and its downstream was found in hypoxic cancer cells. This elevation of IL-6/IL-6R caused sustained inhibition of MAO-A in hypoxic environment. Inhibition of IL-6R signalling or IL-6R siRNA increased MAO-A activity and inhibited tumour angiogenesis and invasion significantly in different models. Further, elevation of MAO-A with 5-azacytidine (5-Aza) modulated IL-6 mediated angiogenesis and invasive signatures including VEGF, MMPs and EMT in hypoxic breast cancer. High grade invasive ductal carcinoma (IDC) clinical specimen displayed elevated level of IL-6R and depleted MAO-A expression. Expression of VEGF and HIF-1α was unregulated and loss of E-Cadherin was observed in high grade IDC tissue specimen. Suppression of MAO-A by IL-6/IL-6R activation promotes tumour angiogenesis and invasion in hypoxic breast cancer environment.

  16. On the network convergence process in RPL over IEEE 802.15.4 multihop networks: improvement and trade-offs.

    Science.gov (United States)

    Kermajani, Hamidreza; Gomez, Carles

    2014-07-07

    The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently developed by the Internet Engineering Task Force (IETF). Given its crucial role in enabling the Internet of Things, a significant amount of research effort has already been devoted to RPL. However, the RPL network convergence process has not yet been investigated in detail. In this paper we study the influence of the main RPL parameters and mechanisms on the network convergence process of this protocol in IEEE 802.15.4 multihop networks. We also propose and evaluate a mechanism that leverages an option available in RPL for accelerating the network convergence process. We carry out extensive simulations for a wide range of conditions, considering different network scenarios in terms of size and density. Results show that network convergence performance depends dramatically on the use and adequate configuration of key RPL parameters and mechanisms. The findings and contributions of this work provide a RPL configuration guideline for network convergence performance tuning, as well as a characterization of the related performance trade-offs.

  17. On the Network Convergence Process in RPL over IEEE 802.15.4 Multihop Networks: Improvement and Trade-Offs

    Directory of Open Access Journals (Sweden)

    Hamidreza Kermajani

    2014-07-01

    Full Text Available The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL has been recently developed by the Internet Engineering Task Force (IETF. Given its crucial role in enabling the Internet of Things, a significant amount of research effort has already been devoted to RPL. However, the RPL network convergence process has not yet been investigated in detail. In this paper we study the influence of the main RPL parameters and mechanisms on the network convergence process of this protocol in IEEE 802.15.4 multihop networks. We also propose and evaluate a mechanism that leverages an option available in RPL for accelerating the network convergence process. We carry out extensive simulations for a wide range of conditions, considering different network scenarios in terms of size and density. Results show that network convergence performance depends dramatically on the use and adequate configuration of key RPL parameters and mechanisms. The findings and contributions of this work provide a RPL configuration guideline for network convergence performance tuning, as well as a characterization of the related performance trade-offs.

  18. 48 CFR 449.402-3 - Procedure for default.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Procedure for default. 449.402-3 Section 449.402-3 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE CONTRACT MANAGEMENT TERMINATION OF CONTRACTS Termination for Default 449.402-3 Procedure for default. In addition to...

  19. 48 CFR 1449.402-3 - Procedure for default.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Procedure for default. 1449.402-3 Section 1449.402-3 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR CONTRACT MANAGEMENT TERMINATION OF CONTRACTS Termination for Default 1449.402-3 Procedure for default. In...

  20. Machine Learning Untuk Estimasi Posisi Objek Berbasis RSS Fingerprint Menggunakan IEEE 802.11g Pada Lantai 3 Gedung JTETI UGM

    Directory of Open Access Journals (Sweden)

    Chairani Chairani

    2015-05-01

    Full Text Available Penelitian ini membahas tentang estimasi posisi (localization objek dalam gedung menggunakan jaringan wireless atau IEEE 802.11g dengan pendekatan Machine Learning. Metode pada pengukuran RSS menggunakan RSS-based fingerprint.  Algoritma Machine Learning yang digunakan dalam memperkirakan lokasi dari pengukuran RSS-based menggunakan Naive Bayes.  Localization dilakukan pada lantai 3 gedung Jurusan Teknik Elektro dan Teknologi Informasi (JTETI dengan luas 1969,68 m2 dan memiliki 5 buah titik penempatan access point (AP. Untuk membentuk peta fingerprint digunakan dimensi 1 m x 1 m sehingga terbentuk grid sebanyak  1893 buah. Dengan menggunakan software Net Surveyor terkumpul data kekuatan sinyal yang diterima (RSS dari jaringan wireless ke perangkat penerima (laptop sebanyak 86.980 record. Hasil nilai rata-rata error jarak estimasi untuk localization seluruh ruangan di lantai 3 dengan menggunakan algoritma Naive Bayes pada fase offline tahap learning adalah 6,29 meter. Untuk fase online dan tahap post learning diperoleh rata-rata error jarak estimasi sebesar 7,82 meter.

  1. 15 CFR Supplement No. 6 to Part 742 - Guidelines for Submitting Review Requests for Encryption Items

    Science.gov (United States)

    2010-01-01

    ...) State all communication protocols (e.g., X.25, Telnet, TCP, IEEE 802.11, IEEE 802.16, SIP * * *) and cryptographic protocols and methods (e.g., SSL, TLS, SSH, IPSEC, IKE, SRTP, ECCN, MD5, SHA, X.509, PKCS...

  2. Reciprocal positive regulation between TRPV6 and NUMB in PTEN-deficient prostate cancer cells

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sung-Young; Hong, Chansik; Wie, Jinhong [Department of Physiology, Seoul National University College of Medicine, Seoul 110-799 (Korea, Republic of); Department of Biomedical Sciences, Seoul National University College of Medicine, Seoul 110-799 (Korea, Republic of); Kim, Euiyong [Department of Physiology, College of Medicine, Inje University, Busan 614-735 (Korea, Republic of); Kim, Byung Joo [Division of Longevity and Biofunctional Medicine, Pusan National University School of Korean Medicine, Yangsan 626-870 (Korea, Republic of); Ha, Kotdaji [Department of Physiology, Seoul National University College of Medicine, Seoul 110-799 (Korea, Republic of); Department of Biomedical Sciences, Seoul National University College of Medicine, Seoul 110-799 (Korea, Republic of); Cho, Nam-Hyuk; Kim, In-Gyu [Department of Biomedical Sciences, Seoul National University College of Medicine, Seoul 110-799 (Korea, Republic of); Jeon, Ju-Hong [Department of Physiology, Seoul National University College of Medicine, Seoul 110-799 (Korea, Republic of); Department of Biomedical Sciences, Seoul National University College of Medicine, Seoul 110-799 (Korea, Republic of); So, Insuk, E-mail: insuk@snu.ac.kr [Department of Physiology, Seoul National University College of Medicine, Seoul 110-799 (Korea, Republic of); Department of Biomedical Sciences, Seoul National University College of Medicine, Seoul 110-799 (Korea, Republic of)

    2014-04-25

    Highlights: • TRPV6 interacts with tumor suppressor proteins. • Numb has a selective effect on TRPV6, depending on the prostate cancer cell line. • PTEN is a novel regulator of TRPV6–Numb complex. - Abstract: Calcium acts as a second messenger and plays a crucial role in signaling pathways involved in cell proliferation. Recently, calcium channels related to calcium influx into the cytosol of epithelial cells have attracted attention as a cancer therapy target. Of these calcium channels, TRPV6 is overexpressed in prostate cancer and is considered an important molecule in the process of metastasis. However, its exact role and mechanism is unclear. NUMB, well-known tumor suppressor gene, is a novel interacting partner of TRPV6. We show that NUMB and TRPV6 have a reciprocal positive regulatory relationship in PC-3 cells. We repeated this experiment in two other prostate cancer cell lines, DU145 and LNCaP. Interestingly, there were no significant changes in TRPV6 expression following NUMB knockdown in DU145. We revealed that the presence or absence of PTEN was the cause of NUMB–TRPV6 function. Loss of PTEN caused a positive correlation of TRPV6–NUMB expression. Collectively, we determined that PTEN is a novel interacting partner of TRPV6 and NUMB. These results demonstrated a novel relationship of NUMB–TRPV6 in prostate cancer cells, and show that PTEN is a novel regulator of this complex.

  3. Failure to Follow Written Procedures

    Science.gov (United States)

    2017-12-01

    Most tasks in aviation have a mandated written procedure to be followed specifically under the Code of Federal Regulations (CFR) Part 14, Section 43.13(a). However, the incidence of Failure to Follow Procedure (FFP) events continues to be a major iss...

  4. Procedures for sampling radium-contaminated soils

    International Nuclear Information System (INIS)

    Fleischhauer, H.L.

    1985-10-01

    Two procedures for sampling the surface layer (0 to 15 centimeters) of radium-contaminated soil are recommended for use in remedial action projects. Both procedures adhere to the philosophy that soil samples should have constant geometry and constant volume in order to ensure uniformity. In the first procedure, a ''cookie cutter'' fashioned from pipe or steel plate, is driven to the desired depth by means of a slide hammer, and the sample extracted as a core or plug. The second procedure requires use of a template to outline the sampling area, from which the sample is obtained using a trowel or spoon. Sampling to the desired depth must then be performed incrementally. Selection of one procedure over the other is governed primarily by soil conditions, the cookie cutter being effective in nongravelly soils, and the template procedure appropriate for use in both gravelly and nongravelly soils. In any event, a minimum sample volume of 1000 cubic centimeters is recommended. The step-by-step procedures are accompanied by a description of the minimum requirements for sample documentation. Transport of the soil samples from the field is then addressed in a discussion of the federal regulations for shipping radioactive materials. Interpretation of those regulations, particularly in light of their application to remedial action soil-sampling programs, is provided in the form of guidance and suggested procedures. Due to the complex nature of the regulations, however, there is no guarantee that our interpretations of them are complete or entirely accurate. Preparation of soil samples for radium-226 analysis by means of gamma-ray spectroscopy is described

  5. Proteomic Analysis of a Global Regulator GacS Sensor Kinase in the Rhizobacterium, Pseudomonas chlororaphis O6

    Directory of Open Access Journals (Sweden)

    Chul Hong Kim

    2014-06-01

    Full Text Available The GacS/GacA system in the root colonizer Pseudomonas chlororaphis O6 is a key regulator of many traits relevant to the biocontrol function of this bacterium. Proteomic analysis revealed 12 proteins were down-regulated in a gacS mutant of P. chlororaphis O6. These GacS-regulated proteins functioned in combating oxidative stress, cell signaling, biosynthesis of secondary metabolism, and secretion. The extent of regulation was shown by real-time RT-PCR to vary between the genes. Mutants of P. chlororaphis O6 were generated in two GacS-regulated genes, trpE, encoding a protein involved in tryptophan synthesis, and prnA, required for conversion of tryptophan to the antimicrobial compound, pyrrolitrin. Failure of the trpE mutant to induce systemic resistance in tobacco against a foliar pathogen causing soft rot, Pectobacterium carotovorum SCCI, correlated with reduced colonization of root surfaces implying an inadequate supply of tryptophan to support growth. Although colonization was not affected by mutation in the prnA gene, induction of systemic resistance was reduced, suggesting that pyrrolnitrin was an activator of plant resistance as well as an antifungal agent. Study of mutants in the other GacS-regulated proteins will indicate further the features required for biocontrol-activity in this rhizobacterium.

  6. 26 CFR 1.892-6T - Income of international organizations (temporary regulations).

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES Miscellaneous Provisions § 1.892-6T Income of international organizations (temporary regulations). (a) Exempt from tax. Subject to the provisions of section 1 of the... 26 Internal Revenue 9 2010-04-01 2010-04-01 false Income of international organizations (temporary...

  7. BMP6 down-regulates GDNF expression through SMAD1/5 and ERK1/2 signaling pathways in human granulosa-lutein cells.

    Science.gov (United States)

    Zhang, Xin-Yue; Chang, Hsun-Ming; Taylor, Elizabeth L; Leung, Peter C K; Liu, Rui-Zhi

    2018-05-09

    Bone morphogenetic protein 6 (BMP6) is a critical regulator of follicular development that is expressed in mammalian oocytes and granulosa cells. Glial cell line-derived neurotrophic factor (GDNF) is an intraovarian neurotrophic factor that plays an essential role in regulating mammalian oocyte maturation. The aim of this study was to investigate the effect of BMP6 on the regulation of GDNF expression and the potential underlying mechanisms. We used an established immortalized human granulosa cell line (SVOG cells) and primary human granulosa-lutein cells as in vitro cell models. Our results showed that BMP6 significantly down-regulated the expression of GDNF in both SVOG and primary human granulosa-lutein cells. Using dual inhibition approaches (kinase receptor inhibitor and small interfering RNA knockdown), our results showed that both ALK2 and ALK3 are involved in BMP6-induced down-regulation of GDNF. In addition, BMP6 induced the phosphorylation of SMAD1/5/8 and ERK1/2 but not AKT or p38. Among three downstream mediators, both SMAD1 and SMAD5 are involved in BMP6-induced down-regulation of GDNF. Moreover, concomitant knockdown of endogenous SMAD4 and inhibition of ERK1/2 activity completely reversed BMP6-induced down-regulation of GDNF, indicating that both SMAD and ERK1/2 signaling pathways are required for the regulatory effect of BMP6 on GDNF expression. Our findings suggest an additional role for an intrafollicular growth factor in regulating follicular function through their paracrine interactions in human granulosa cells.

  8. CMOS analog baseband circuitry for an IEEE 802.11 b/g/n WLAN transceiver

    International Nuclear Information System (INIS)

    Gong Zheng; Chu Xiaojie; Shi Yin; Lei Qianqian; Lin Min

    2012-01-01

    An analog baseband circuit for a direct conversion wireless local area network (WLAN) transceiver in a standard 0.13-μm CMOS occupying 1.26 mm 2 is presented. The circuit consists of active-RC receiver (RX) 4th order elliptic lowpass filters(LPFs), transmit (PGAs) with DC offset cancellation (DCOC) servo loops, and on-chip output buffers. The RX baseband gain can be programmed in the range of −11 to 49 dB in 2 dB steps with 50–30.2 nV/√Hz input referred noise (IRN) and a 21 to −41 dBm in-band 3rd order interception point (IIP3). The RX/TX LPF cutoff frequencies can be switched between 5 MHz, 10 MHz, and 20 MHz to fulfill the multimode 802.11b/g/n requirements. The TX baseband gain of the I/Q paths are tuned separately from −1.6 to 0.9 dB in 0.1 dB steps to calibrate TX I/Q gain mismatches. By using an identical integrator based elliptic filter synthesis method together with global compensation applied to the LPF capacitor array, the power consumption of the RX LPF is considerably reduced and the proposed chip draws 26.8 mA/8 mA by the RX/TX baseband paths from a 1.2 V supply. (semiconductor integrated circuits)

  9. CMOS analog baseband circuitry for an IEEE 802.11 b/g/n WLAN transceiver

    Science.gov (United States)

    Zheng, Gong; Xiaojie, Chu; Qianqian, Lei; Min, Lin; Yin, Shi

    2012-11-01

    An analog baseband circuit for a direct conversion wireless local area network (WLAN) transceiver in a standard 0.13-μm CMOS occupying 1.26 mm2 is presented. The circuit consists of active-RC receiver (RX) 4th order elliptic lowpass filters(LPFs), transmit (PGAs) with DC offset cancellation (DCOC) servo loops, and on-chip output buffers. The RX baseband gain can be programmed in the range of -11 to 49 dB in 2 dB steps with 50-30.2 nV/√Hz input referred noise (IRN) and a 21 to -41 dBm in-band 3rd order interception point (IIP3). The RX/TX LPF cutoff frequencies can be switched between 5 MHz, 10 MHz, and 20 MHz to fulfill the multimode 802.11b/g/n requirements. The TX baseband gain of the I/Q paths are tuned separately from -1.6 to 0.9 dB in 0.1 dB steps to calibrate TX I/Q gain mismatches. By using an identical integrator based elliptic filter synthesis method together with global compensation applied to the LPF capacitor array, the power consumption of the RX LPF is considerably reduced and the proposed chip draws 26.8 mA/8 mA by the RX/TX baseband paths from a 1.2 V supply.

  10. Licensing procedures for Low-Level Waste disposal facilities

    International Nuclear Information System (INIS)

    Roop, R.D.; Van Dyke, J.W.

    1985-09-01

    This report describes the procedures applicable to siting and licensing of disposal facilities for low-level radioactive wastes. Primary emphasis is placed on those procedures which are required by regulations, but to the extent possible, non-mandatory activities which will facilitate siting and licensing are also considered. The report provides an overview of how the procedural and technical requirements for a low-level waste (LLW) disposal facility (as defined by the Nuclear Regulatory Commission's Rules 10 CFR Parts 2, 51, and 61) may be integrated with activities to reduce and resolve conflict generated by the proposed siting of a facility. General procedures are described for site screening and selection, site characterization, site evaluation, and preparation of the license application; specific procedures for several individual states are discussed. The report also examines the steps involved in the formal licensing process, including docketing and initial processing, preparation of an environmental impact statement, technical review, hearings, and decisions. It is concluded that development of effective communication between parties in conflict and the utilization of techniques to manage and resolve conflicts represent perhaps the most significant challenge for the people involved in LLW disposal in the next decade. 18 refs., 6 figs

  11. Down-regulation of lipoprotein lipase increases glucose uptake in L6 muscle cells

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, Veronica; Saraff, Kumuda [Department of Chemistry and Biochemistry, California State University Northridge, Northridge, CA 91330-8262 (United States); Medh, Jheem D., E-mail: jheem.medh@csun.edu [Department of Chemistry and Biochemistry, California State University Northridge, Northridge, CA 91330-8262 (United States)

    2009-11-06

    Thiazolidinediones (TZDs) are synthetic hypoglycemic agents used to treat type 2 diabetes. TZDs target the peroxisome proliferator activated receptor-gamma (PPAR-{gamma}) and improve systemic insulin sensitivity. The contributions of specific tissues to TZD action, or the downstream effects of PPAR-{gamma} activation, are not very clear. We have used a rat skeletal muscle cell line (L6 cells) to demonstrate that TZDs directly target PPAR-{gamma} in muscle cells. TZD treatment resulted in a significant repression of lipoprotein lipase (LPL) expression in L6 cells. This repression correlated with an increase in glucose uptake. Down-regulation of LPL message and protein levels using siRNA resulted in a similar increase in insulin-dependent glucose uptake. Thus, LPL down-regulation improved insulin sensitivity independent of TZDs. This finding provides a novel method for the management of insulin resistance.

  12. Fundamentos prácticos de seguridad en redes inalámbricas ieee 802.11

    OpenAIRE

    Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David

    2010-01-01

    Este artículo presenta una discusión tutorial de tres estándares de seguridad de uso común en las redes inalámbri-cas IEEE 802.11: WEP, WPA y WPA2. Se realiza un análisis detallado del algoritmo RC4 que soporta a WEP y se in-dican sus vulnerabilidades. También se revisan los aspectos y características técnicas más relevantes de los protoco-los de cifrado WPA y WPA2 con la finalidad de hacer un análisis comparativo de los tres estándares en términos de la seguridad que ellos proporcionan. Se h...

  13. Licensing procedures according to the Federal Act Protection Against Nuisances

    International Nuclear Information System (INIS)

    Schaefer, K.

    1977-01-01

    On March 1st, 1977 the 9th decree of the Protection Against Nuisances came into force, which, as the first comprehensive and state-uniform regulation contains the principles of the licensing procedure supplementary to legal provisions. The legal provision is based on numerous recent regulations of procedure from which in the meantime an essential stock of regulations relating to the licensing procedure has emerged. In general, two aims are to be achieved by this new regulation: The acceleration and simplification of the licensing procedure as will as the imperative guaranteeing in this procedure of the rights of the neighbouring areas, and of the society in general by a constitutional state. The legal provision provides in part new legal instruments for this. Examples on which the legal provisions are based are presented in the introduction. Subsequent explanations of provisions of the decree are to assist the application of the new act. Relevant regulations of the Federal Act for Protection Against Nuisances, as well as further supplementary provisions are given in the supplement. (orig.) [de

  14. The European Regulation no. 761/2001 EMAS

    International Nuclear Information System (INIS)

    Andriola, L.; Battellini, S.

    2005-08-01

    The Regulation 761/2001 EMAS (Environmental Management and Audit Scheme), introduced by the 1836/93 Community regulation, is one of the tools activated by the European Union in order to apply the 5. and 6. Community Environmental Programme, in the field of firm-environment interactions at first (overcoming the old Command and Control logic), then by extending its applicability to ali Organisations. EMAS is a voluntary tool that enables Organisations to evaluate their own interaction with the Environment, to plan and check the yearly improvement of their environmental performance, providing the public documented relevant information. The report illustrates the procedure far applying this regulation, its implementation and new application trends in Italy and the advantages far firms [it

  15. Adaptive QoS provision for IEEE 802.16e BWA networks based on cross-layer design

    Directory of Open Access Journals (Sweden)

    Kuo GS

    2011-01-01

    Full Text Available Abstract This article proposes an integrated framework for adaptive QoS provision in IEEE 802.16e broadband wireless access networks based on cross-layer design. On one hand, an efficient admission control (AC algorithm is proposed along with a semi-reservation scheme to guarantee the connection-level QoS. First, to guarantee the service continuity for handoff connections and resource efficiency, our semi-reservation scheme considers both users' handoff probability and average resource consumption together, which effectively avoids resource over-reservation and insufficient reservation. For AC, a new/handoff connection is accepted only when the target cell has enough resource to afford both instantaneous and average resource consumption to meet the average source rate request. On the other hand, a joint resource allocation and packet scheduling scheme is designed to provide packet-level QoS guarantee in term of "QoS rate", which can ensure fairness for the services with identical priority level in case of bandwidth shortage. Particularly, an enhanced bandwidth request scheme is designed to reduce unnecessary BR delay and redundant signaling overhead caused by the existing one in IEEE 802.16e, which further improves the packet-level QoS performance and resource efficiency for uplink transmission. Simulation results show that the proposed approach not only balances the tradeoff among connection blocking rate, connection dropping rate, and connection failure rate, but also achieves low mean packet dropping rate (PDR, small deviation of PDR, and low QoS outage rate. Moreover, high resource efficiency is ensured.

  16. Regulation of expression of two LY-6 family genes by intron retention and transcription induced chimerism

    Directory of Open Access Journals (Sweden)

    Mallya Meera

    2008-09-01

    Full Text Available Abstract Background Regulation of the expression of particular genes can rely on mechanisms that are different from classical transcriptional and translational control. The LY6G5B and LY6G6D genes encode LY-6 domain proteins, whose expression seems to be regulated in an original fashion, consisting of an intron retention event which generates, through an early premature stop codon, a non-coding transcript, preventing expression in most cell lines and tissues. Results The MHC LY-6 non-coding transcripts have shown to be stable and very abundant in the cell, and not subject to Nonsense Mediated Decay (NMD. This retention event appears not to be solely dependent on intron features, because in the case of LY6G5B, when the intron is inserted in the artificial context of a luciferase expression plasmid, it is fully spliced but strongly stabilises the resulting luciferase transcript. In addition, by quantitative PCR we found that the retained and spliced forms are differentially expressed in tissues indicating an active regulation of the non-coding transcript. EST database analysis revealed that these genes have an alternative expression pathway with the formation of Transcription Induced Chimeras (TIC. This data was confirmed by RT-PCR, revealing the presence of different transcripts that would encode the chimeric proteins CSNKβ-LY6G5B and G6F-LY6G6D, in which the LY-6 domain would join to a kinase domain and an Ig-like domain, respectively. Conclusion In conclusion, the LY6G5B and LY6G6D intron-retained transcripts are not subjected to NMD and are more abundant than the properly spliced forms. In addition, these genes form chimeric transcripts with their neighbouring same orientation 5' genes. Of interest is the fact that the 5' genes (CSNKβ or G6F undergo differential splicing only in the context of the chimera (CSNKβ-LY6G5B or G6F-LY6G6C and not on their own.

  17. Lipid Regulated Intramolecular Conformational Dynamics of SNARE-Protein Ykt6

    Science.gov (United States)

    Dai, Yawei; Seeger, Markus; Weng, Jingwei; Song, Song; Wang, Wenning; Tan, Yan-Wen

    2016-08-01

    Cellular informational and metabolic processes are propagated with specific membrane fusions governed by soluble N-ethylmaleimide sensitive factor attachment protein receptors (SNARE). SNARE protein Ykt6 is highly expressed in brain neurons and plays a critical role in the membrane-trafficking process. Studies suggested that Ykt6 undergoes a conformational change at the interface between its longin domain and the SNARE core. In this work, we study the conformational state distributions and dynamics of rat Ykt6 by means of single-molecule Förster Resonance Energy Transfer (smFRET) and Fluorescence Cross-Correlation Spectroscopy (FCCS). We observed that intramolecular conformational dynamics between longin domain and SNARE core occurred at the timescale ~200 μs. Furthermore, this dynamics can be regulated and even eliminated by the presence of lipid dodecylphoshpocholine (DPC). Our molecular dynamic (MD) simulations have shown that, the SNARE core exhibits a flexible structure while the longin domain retains relatively stable in apo state. Combining single molecule experiments and theoretical MD simulations, we are the first to provide a quantitative dynamics of Ykt6 and explain the functional conformational change from a qualitative point of view.

  18. A G-protein β subunit, AGB1, negatively regulates the ABA response and drought tolerance by down-regulating AtMPK6-related pathway in Arabidopsis.

    Directory of Open Access Journals (Sweden)

    Dong-bei Xu

    Full Text Available Heterotrimeric G-proteins are versatile regulators involved in diverse cellular processes in eukaryotes. In plants, the function of G-proteins is primarily associated with ABA signaling. However, the downstream effectors and the molecular mechanisms in the ABA pathway remain largely unknown. In this study, an AGB1 mutant (agb1-2 was found to show enhanced drought tolerance, indicating that AGB1 might negatively regulate drought tolerance in Arabidopsis. Data showed that AGB1 interacted with protein kinase AtMPK6 that was previously shown to phosphorylate AtVIP1, a transcription factor responding to ABA signaling. Our study found that transcript levels of three ABA responsive genes, AtMPK6, AtVIP1 and AtMYB44 (downstream gene of AtVIP1, were significantly up-regulated in agb1-2 lines after ABA or drought treatments. Other ABA-responsive and drought-inducible genes, such as RD29A (downstream gene of AtMYB44, were also up-regulated in agb1-2 lines. Furthermore, overexpression of AtVIP1 resulted in hypersensitivity to ABA at seed germination and seedling stages, and significantly enhanced drought tolerance in transgenic plants. These results suggest that AGB1 was involved in the ABA signaling pathway and drought tolerance in Arabidopsis through down-regulating the AtMPK6, AtVIP1 and AtMYB44 cascade.

  19. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic.

    Science.gov (United States)

    Šljivo, Amina; Kerkhove, Dwight; Tian, Le; Famaey, Jeroen; Munteanu, Adrian; Moerman, Ingrid; Hoebeke, Jeroen; De Poorter, Eli

    2018-01-23

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning

  20. Transmembrane helix M6 in sarco(endo)plasmic reticulum Ca(2+)-ATPase forms a functional interaction site with phospholamban. Evidence for physical interactions at other sites.

    Science.gov (United States)

    Asahi, M; Kimura, Y; Kurzydlowski, K; Tada, M; MacLennan, D H

    1999-11-12

    In an earlier study (Kimura, Y., Kurzydlowski, K., Tada, M., and MacLennan, D. H. (1997) J. Biol. Chem. 272, 15061-15064), mutation of amino acids on one face of the phospholamban (PLN) transmembrane helix led to loss of PLN inhibition of sarco(endo)plasmic reticulum Ca(2+)-ATPase (SERCA) molecules. This helical face was proposed to form a site of PLN interaction with a transmembrane helix in SERCA molecules. To determine whether predicted transmembrane helices M4, M5, M6, or M8 in SERCA1a interact with PLN, SERCA1a mutants were co-expressed with wild-type PLN and effects on Ca(2+) dependence of Ca(2+) transport were measured. Wild-type inhibitory interactions shifted apparent Ca(2+) affinity of SERCA1a by an average of -0.34 pCa units, but four of the seven mutations in M4 led to a more inhibitory shift in apparent Ca(2+) affinity, averaging -0.53 pCa units. Seven mutations in M5 led to an average shift of -0.32 pCa units and seven mutations in M8 led to an average shift of -0.30 pCa units. Among 11 mutations in M6, 1, Q791A, increased the inhibitory shift (-0.59 pCa units) and 5, V795A (-0.11), L802A (-0.07), L802V (-0.04), T805A (-0.11), and F809A (-0.12), reduced the inhibitory shift, consistent with the view that Val(795), Leu(802), Thr(805), and Phe(809), located on one face of a predicted M6 helix, form a site in SERCA1a for interaction with PLN. Those mutations in M4, M6, or M8 of SERCA1a that enhanced PLN inhibitory function did not enhance PLN physical association with SERCA1a, but mutants V795A and L802A in M6, which decreased PLN inhibitory function, decreased physical association, as measured by co-immunoprecipitation. In related studies, those PLN mutants that gained inhibitory function also increased levels of co-immunoprecipitation of wild-type SERCA1a and those that lost inhibitory function also reduced association, correlating functional interaction sites with physical interaction sites. Thus, both functional and physical data confirm that PLN

  1. Performance Analyses and Improvements for the IEEE 802.15.4 CSMA/CA Scheme with Heterogeneous Buffered Conditions

    Directory of Open Access Journals (Sweden)

    Chunfeng Lv

    2012-04-01

    Full Text Available Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission schemes—OSTS/BSTS (One Service a Time Scheme/Bulk Service a Time Scheme—are proposed in this paper to improve the behaviors of time-critical buffered networks with heterogeneous unsaturated traffic. First, we propose a model which contains two modified semi-Markov chains and a macro-Markov chain combined with the theory of M/G/1/K queues to evaluate the characteristics of these two improved CSMA/CA schemes, in which traffic arrivals and accessing packets are bestowed with non-preemptive priority over each other, instead of prioritization. Then, throughput, packet delay and energy consumption of unsaturated, unacknowledged IEEE 802.15.4 beacon-enabled networks are predicted based on the overall point of view which takes the dependent interactions of different types of nodes into account. Moreover, performance comparisons of these two schemes with other non-priority schemes are also proposed. Analysis and simulation results show that delay and fairness of our schemes are superior to those of other schemes, while throughput and energy efficiency are superior to others in more heterogeneous situations. Comprehensive simulations demonstrate that the analysis results of these models match well with the simulation results.

  2. A QoS Enhancement Scheme through Joint Control of Clear Channel Assessment Threshold and Contending Window for IEEE 802.11e Broadcasting

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2017-01-01

    Full Text Available In a WLAN, when a great many nodes coexist, the network may readily be congested, thus causing packets dropping and network performance degradation. To solve this issue, a lot of schemes have been proposed. However, most of the previous works attempt to avoid the possible channel congestion by controlling the packets generation rate and/or transmitting power of nodes, while the effects of Clear Channel Assessment (CCA threshold are not well examined. In our paper, a Joint CCA threshold and contending window control algorithm (JCCA is proposed to avoid channel congestion or reduce the congestion probability of broadcasting in an IEEE 802.11e network. Both the network conditions and the priorities of messages are taken into account to improve the broadcasting performance in our paper. According to the simulation results, it can be concluded that our scheme can significantly increase the network throughput as well as packets delivery ratio and reduce the packet transmission delay compared to the IEEE 802.11e and Adaptive Carrier Sensing-Based MAC Designs (ACSBM protocol.

  3. Tumour suppressor protein p53 regulates the stress activated bilirubin oxidase cytochrome P450 2A6

    Energy Technology Data Exchange (ETDEWEB)

    Hu, Hao, E-mail: hao.hu1@uqconnect.edu.au [The University of Queensland, National Research Centre for Environmental Toxicology (Entox), 4072 Brisbane, Queensland (Australia); Yu, Ting, E-mail: t.yu2@uq.edu.au [The University of Queensland, National Research Centre for Environmental Toxicology (Entox), 4072 Brisbane, Queensland (Australia); Arpiainen, Satu, E-mail: Satu.Juhila@orion.fi [Institute of Biomedicine, Department of Pharmacology and Toxicology and Medical Research Center Oulu, Oulu University Hospital and University of Oulu, Oulu (Finland); Lang, Matti A., E-mail: m.lang@uq.edu.au [The University of Queensland, National Research Centre for Environmental Toxicology (Entox), 4072 Brisbane, Queensland (Australia); Hakkola, Jukka, E-mail: Jukka.hakkola@oulu.fi [Institute of Biomedicine, Department of Pharmacology and Toxicology and Medical Research Center Oulu, Oulu University Hospital and University of Oulu, Oulu (Finland); Abu-Bakar, A' edah, E-mail: a.abubakar@uq.edu.au [The University of Queensland, National Research Centre for Environmental Toxicology (Entox), 4072 Brisbane, Queensland (Australia)

    2015-11-15

    Human cytochrome P450 (CYP) 2A6 enzyme has been proposed to play a role in cellular defence against chemical-induced oxidative stress. The encoding gene is regulated by various stress activated transcription factors. This paper demonstrates that p53 is a novel transcriptional regulator of the gene. Sequence analysis of the CYP2A6 promoter revealed six putative p53 binding sites in a 3 kb proximate promoter region. The site closest to transcription start site (TSS) is highly homologous with the p53 consensus sequence. Transfection with various stepwise deletions of CYP2A6-5′-Luc constructs – down to − 160 bp from the TSS – showed p53 responsiveness in p53 overexpressed C3A cells. However, a further deletion from − 160 to − 74 bp, including the putative p53 binding site, totally abolished the p53 responsiveness. Electrophoretic mobility shift assay with a probe containing the putative binding site showed specific binding of p53. A point mutation at the binding site abolished both the binding and responsiveness of the recombinant gene to p53. Up-regulation of the endogenous p53 with benzo[α]pyrene – a well-known p53 activator – increased the expression of the p53 responsive positive control and the CYP2A6-5′-Luc construct containing the intact p53 binding site but not the mutated CYP2A6-5′-Luc construct. Finally, inducibility of the native CYP2A6 gene by benzo[α]pyrene was demonstrated by dose-dependent increases in CYP2A6 mRNA and protein levels along with increased p53 levels in the nucleus. Collectively, the results indicate that p53 protein is a regulator of the CYP2A6 gene in C3A cells and further support the putative cytoprotective role of CYP2A6. - Highlights: • CYP2A6 is an immediate target gene of p53. • Six putative p53REs located on 3 kb proximate CYP2A6 promoter region. • The region − 160 bp from TSS is highly homologous with the p53 consensus sequence. • P53 specifically bind to the p53RE on the − 160 bp region. • HNF4

  4. A MYB transcription factor, DcMYB6, is involved in regulating anthocyanin biosynthesis in purple carrot taproots.

    Science.gov (United States)

    Xu, Zhi-Sheng; Feng, Kai; Que, Feng; Wang, Feng; Xiong, Ai-Sheng

    2017-03-27

    Carrots are widely grown and enjoyed around the world. Purple carrots accumulate rich anthocyanins in the taproots, while orange, yellow, and red carrots accumulate rich carotenoids in the taproots. Our previous studies indicated that variation in the activity of regulatory genes may be responsible for variations in anthocyanin production among various carrot cultivars. In this study, an R2R3-type MYB gene, designated as DcMYB6, was isolated from a purple carrot cultivar. In a phylogenetic analysis, DcMYB6 was grouped into an anthocyanin biosynthesis-related MYB clade. Sequence analyses revealed that DcMYB6 contained the conserved bHLH-interaction motif and two atypical motifs of anthocyanin regulators. The expression pattern of DcMYB6 was correlated with anthocyanin production. DcMYB6 transcripts were detected at high levels in three purple carrot cultivars but at much lower levels in six non-purple carrot cultivars. Overexpression of DcMYB6 in Arabidopsis led to enhanced anthocyanin accumulation in both vegetative and reproductive tissues and upregulated transcript levels of all seven tested anthocyanin-related structural genes. Together, these results show that DcMYB6 is involved in regulating anthocyanin biosynthesis in purple carrots. Our results provide new insights into the regulation of anthocyanin synthesis in purple carrot cultivars.

  5. 14 CFR 302.715 - Post-conference procedure.

    Science.gov (United States)

    2010-01-01

    ... desirable in the interest of further clarification and understanding of the issues. The granting of an... PROCEEDINGS) PROCEDURAL REGULATIONS RULES OF PRACTICE IN PROCEEDINGS Rules Applicable to Mail Rate Proceedings and Mail Contracts Informal Mail Rate Conference Procedure § 302.715 Post-conference procedure. No...

  6. Is a Multi-Hop Relay Scheme Gainful in an IEEE 802.22-Based Cognitive Radio System?

    Science.gov (United States)

    Shin, Jungchae; Lee, Dong-Kyu; Cho, Ho-Shin

    In this paper, we formulate a plan to operate multi-hop relays in IEEE 802.22-based cognitive radio (CR) systems and evaluate system performance to consider the propriety of a multi-hop relay scheme in CR systems. A centralized radio resource management and a simple deployment of relay stations (RSs) are assessed to make relay operations feasible under CR conditions. Simulation results show that the proposed multi-hop relay scheme significantly increases system throughput compared to a no-relay CR system as the incumbent user (IU) traffic gets heavier. Furthermore, the optimal number of hops can be determined given the traffic conditions.

  7. Performance Analysis of the IEEE 802.11A WLAN Standard Optimum and Sub-Optimum Receiver in Frequency-Selective, Slowly Fading Nakagami Channels with AWGN and Pulsed Noise Jamming

    National Research Council Canada - National Science Library

    Kalogrias, Christos

    2004-01-01

    ... 802.11a wireless local area network (WLAN) standard receiver when the signal is transmitted over a frequency selective, slow fading Nakagami channel in a worst case, pulse-noise jamming environment...

  8. IGF-II is up-regulated and myofibres are hypertrophied in regenerating soleus of mice lacking FGF6

    International Nuclear Information System (INIS)

    Armand, Anne-Sophie; Lecolle, Sylvie; Launay, Thierry; Pariset, Claude; Fiore, Frederic; Della Gaspera, Bruno; Birnbaum, Daniel; Chanoine, Christophe; Charbonnier, Frederic

    2004-01-01

    Important functions in myogenesis have been proposed for FGF6, a member of the fibroblast growth factor family accumulating almost exclusively in the myogenic lineage. However, the use of FGF6(-/-) mutant mice gave contradictory results and the role of FGF6 during myogenesis remains largely unclear. Using FGF6(-/-) mice, we first analysed the morphology of the regenerated soleus following cardiotoxin injection and showed hypertrophied myofibres in soleus of the mutant mice as compared to wild-type mice. Secondly, to examine the function of the IGF family in the hypertrophy process, we used semiquantitative and real-time RT-PCR assays and Western blots to monitor the expression of the insulin-like growth factors (IGF-I and IGF-II), their receptors [type I IGF receptor (IGF1R) and IGF-II receptor (IGF2R)], and of a binding protein IGFBP-5 in regenerating soleus muscles of FGF6(-/-) knockout mice vs. wild-type mice. In the mutant, both IGF-II and IGF2R, but not IGF-I and IGF1R, were strongly up-regulated, whereas IGFBP5 was down-regulated, strongly suggesting that, in the absence of FGF6, the mechanisms leading to myofibre hypertrophy were mediated specifically by an IGF-II/IGF2R signalling pathway distinct from the classic mechanism involving IGF-I and IGF1R previously described for skeletal muscle hypertrophy. The potential regulating role of IGFBP5 on IGF-II expression is also discussed. This report shows for the first time a specific role for FGF6 in the regulation of myofibre size during a process of in vivo myogenesis

  9. Tactical Wireless Networking in Coalition Environments: Implementing an IEEE 802.20 Wireless End-User Network Utilizing FLASH-OFDM to Provide a Secure Mobile Extension to Existing WAN

    National Research Council Canada - National Science Library

    Parrish, William J; Tovar, Daniel R

    2005-01-01

    This thesis will focus on the area of 802.20 wireless networking as a feasible "last mile" solution to wireless access in a tactical coalition environment and will be implemented into a series of experiments...

  10. 24 CFR 970.11 - Procedures for the offer of sale to established eligible organizations.

    Science.gov (United States)

    2010-04-01

    ... capabilities; (6) A plan for financing the purchase of the property and a firm financial commitment as stated... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Procedures for the offer of sale to established eligible organizations. 970.11 Section 970.11 Housing and Urban Development Regulations Relating...

  11. 5 CFR 179.304 - Notification procedures.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Notification procedures. 179.304 Section 179.304 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS CLAIMS COLLECTION STANDARDS Administrative Offset § 179.304 Notification procedures. Before collecting any debt...

  12. Leach test of six 192-iridium pellets based on the IAEA 'special form' test procedures

    International Nuclear Information System (INIS)

    Gordon, G.; Gerdingh, R.

    1981-07-01

    The designation 'special form' may be applied to indispersible solid radioactive material if the material meets the requirements of the tests described in the International Atomic Energy Agency Regulations for the Safe Transport of Radioactive Type Materials. This report presents the procedures and results of a leach test performed as specified in the regulations on 6 'as received' active 192-iridium pellets. Mechanical tests were not carried out prior to or following the leach test. The activity of each of the first 6 water baths was found to be between 2.3 and 12.6 μCi, (8.5 x 10 4 and 4.7 x 10 5 Bq) and of the second 6, between 1.3 to 6.0 μCi, (4.8 x 10 4 to 2.2 x 10 5 Bq) thus exceeding the allowable limit

  13. A Multi-Channel Spectrum Sensing Fusion Mechanism for Cognitive Radio Networks: Design and Application to IEEE 802.22 WRANs

    OpenAIRE

    Tadayon, Navid; Aissa, Sonia

    2016-01-01

    The IEEE 802.22 is a new cognitive radio standard that is aimed at extending wireless outreach to rural areas. Known as wireless regional area networks, and designed based on the not-to-interfere spectrum sharing model, WRANs are channelized and centrally-controlled networks working on the under-utilized UHF/VHF TV bands to establish communication with remote users, so-called customer premises equipment (CPEs). Despite the importance of reliable and interference-free operation in these freque...

  14. Medical Surveillance Monthly Report (MSMR). Volume 18, Number 04, April 2011

    Science.gov (United States)

    2011-04-01

    other oral conditions 30,200 (50) 21,641 (47) 2,103 (36) Periodontal disease 1,025 (109) 921 (97) 7 (122) Dental caries 802 (113) 715 (100) 10 (119...6.9 Cholelithiasis 418 6.5 Diseases of pancreas 377 5.9 Diseases of esophagus 366 5.7 Genitourinary system (580-629) 1,226 Calculus of kidney and...rehabilitation procedures (15.8%), and special investigations and examinations (including vision, dental and gynecological exams) (7.5%). In 2010, there were

  15. 5 CFR 179.308 - Accelerated procedures.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Accelerated procedures. 179.308 Section 179.308 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS CLAIMS COLLECTION STANDARDS Administrative Offset § 179.308 Accelerated procedures. OPM may make an administrative...

  16. Licensing procedures for Low-Level Waste disposal facilities

    Energy Technology Data Exchange (ETDEWEB)

    Roop, R.D.; Van Dyke, J.W.

    1985-09-01

    This report describes the procedures applicable to siting and licensing of disposal facilities for low-level radioactive wastes. Primary emphasis is placed on those procedures which are required by regulations, but to the extent possible, non-mandatory activities which will facilitate siting and licensing are also considered. The report provides an overview of how the procedural and technical requirements for a low-level waste (LLW) disposal facility (as defined by the Nuclear Regulatory Commission's Rules 10 CFR Parts 2, 51, and 61) may be integrated with activities to reduce and resolve conflict generated by the proposed siting of a facility. General procedures are described for site screening and selection, site characterization, site evaluation, and preparation of the license application; specific procedures for several individual states are discussed. The report also examines the steps involved in the formal licensing process, including docketing and initial processing, preparation of an environmental impact statement, technical review, hearings, and decisions. It is concluded that development of effective communication between parties in conflict and the utilization of techniques to manage and resolve conflicts represent perhaps the most significant challenge for the people involved in LLW disposal in the next decade. 18 refs., 6 figs.

  17. IEEE 802.11-Based Wireless Sensor System for Vibration Measurement

    Directory of Open Access Journals (Sweden)

    Yutaka Uchimura

    2010-01-01

    Full Text Available Network-based wireless sensing has become an important area of research and various new applications for remote sensing are expected to emerge. One of the promising applications is structural health monitoring of building or civil engineering structure and it often requires vibration measurement. For the vibration measurement via wireless network, time synchronization is indispensable. In this paper, we introduce a newly developed time synchronized wireless sensor network system. The system employs IEEE 802.11 standard-based TSF-counter and sends the measured data with the counter value. TSF based synchronization enables consistency on common clock among different wireless nodes. We consider the scale effect on synchronization accuracy and evaluated the effect by taking beacon collisions into account. The scalability issue by numerical simulations is also studied. This paper also introduces a newly developed wireless sensing system and the hardware and software specifications are introduced. The experiments were conducted in a reinforced concrete building to evaluate synchronization accuracy. The developed system was also applied for a vibration measurement of a 22-story steel structured high rise building. The experimental results showed that the system performed more than sufficiently.

  18. Accurate Simulation of 802.11 Indoor Links: A "Bursty" Channel Model Based on Real Measurements

    Directory of Open Access Journals (Sweden)

    Agüero Ramón

    2010-01-01

    Full Text Available We propose a novel channel model to be used for simulating indoor wireless propagation environments. An extensive measurement campaign was carried out to assess the performance of different transport protocols over 802.11 links. This enabled us to better adjust our approach, which is based on an autoregressive filter. One of the main advantages of this proposal lies in its ability to reflect the "bursty" behavior which characterizes indoor wireless scenarios, having a great impact on the behavior of upper layer protocols. We compare this channel model, integrated within the Network Simulator (ns-2 platform, with other traditional approaches, showing that it is able to better reflect the real behavior which was empirically assessed.

  19. Analisa Horizontal Handover Terhadap Qos Layanan Streaming Multimedia E-Learning Pada Jaringan WLAN 802.11

    Directory of Open Access Journals (Sweden)

    I M.O. Widyantara

    2015-06-01

    Full Text Available In this globalization era, the state of the user who no longer occupies in a single place, but always moving, it is necessary to continuity of communication that will cause a handover. This paper intends to analyze the effect of 802.11 WLAN horizontal handover to the QoS of streaming e-learning. Methods of data collection process using the Cisco 3500 series access point that supports handover with existing network systems, ad-hoc network and type of hard handover. The results of the data analysis showed that the handover process is able to improve the QoS by gradually restored gradually, to get back to normal QoS

  20. Development of an algorithm for X-ray exposures using the Panasonic UD-802A thermoluminescent dosemeter

    International Nuclear Information System (INIS)

    McKittrick, Leo; Currivan, Lorraine; Pollard, David; Nicholls, Colyn; Romero, A.M.; Palethorpe, Jeffrey

    2008-01-01

    Full text: As part of its continuous quality improvement the Dosimetry Service of the Radiological Protection Institute of Ireland (RPII) in conjunction with Panasonic Industrial Europe (UK) has investigated further the use of the standard Panasonic algorithm for X-ray exposures using the Panasonic UD-802A TL dosemeter. Originally developed to satisfy the obsolete standard ANSI 13.11-1983, the standard Panasonic dose algorithm has undergone several revisions such as HPS N13.11-2001. This paper presents a dose algorithm that can be used to correct the dose response at low energies such as X-ray radiation using a four element TL dosemeter due to the behaviour of two different independent phosphors. A series of irradiations with a range of energies using N-20 up to Co-60 were carried out with our particular interest being in responses to X-ray irradiations. Irradiations were performed at: RRPPS, University Hospital Birmingham NHS Foundation Trust, U.K.; HPA, U.K. and CIEMAT, Madrid, Spain. Different irradiation conditions were employed which included: X-ray from narrow and wide spectra as described by ISO 4037-1 (1996), and ISO water slab phantom and PMMA slab phantom respectively. Using the UD-802A TLD and UD-854AT hanger combination, the response data from the series of irradiations was utilised to validate and if necessary, modify the photon/beta branches of the algorithm to: 1. Best estimate Hp(10) and Hp(0.07); 2. Provide information on irradiation energies; 3. Verification by performance tests. This work further advances the algorithm developed at CIEMAT whereby a best-fit, polynomial trend is used with the dose response variations between the independent phosphors. (author)

  1. 29 CFR 1614.305 - Consideration procedures.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Consideration procedures. 1614.305 Section 1614.305 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION FEDERAL SECTOR EQUAL EMPLOYMENT OPPORTUNITY Related Processes § 1614.305 Consideration procedures. (a) Once a petition is filed...

  2. Empirical investigation on the dependence of TCP downstream throughput on SNR in an IEEE802.11b WLAN system

    Directory of Open Access Journals (Sweden)

    Ikponmwosa Oghogho

    2017-04-01

    Full Text Available The dependence of TCP downstream throughput (TCPdownT on signal to noise ratio (SNR in an IEEE802.11b WLAN system was investigated in various environments and varieties of QoS traffic. TCPdownT was measured for various SNR observed. An Infrastructure based IEEE802.11b WLAN system having networked computers on which measurement software were installed, was set up consecutively in various environments (open corridor, small offices with block walls and plaster boards and free space. Empirical models describing TCPdownT against SNR for different signal ranges (all ranges of signals, strong signals only, grey signals only and weak signals only were statistically generated and validated. As the SNR values changed from high (strong signals through low (grey signals to very low (weak signals, our results show a strong dependence of TCPdownT on the received SNR. Our models showed lower RMS errors when compared with other similar models. We observed RMS errors of 0.6734791 Mbps, 0.472209 Mbps, 0.9111563 Mbps and 0.5764460 Mbps for general (all SNR model, strong signals model, grey signals model and Weak signals model respectively. Our models will provide researchers and WLAN systems users with a tool to estimate the TCP downstream throughput in a real network in various environments by monitoring the received SNR.

  3. A Security Strategy for Cyber Threats on Neighbor Discovery in 6Lowpan Networks

    Science.gov (United States)

    2017-12-01

    and P. Demeester, “IETF standardization in the field of the Internet of Things (IoT): A survey,” Journal of Sensor and Actuator Networks, vol. 2...A synthesis.,” IEEE Internet of Things Journal, vol. 1, no. 5, pp. 384–398, 2014. [5] Compression Format for IPv6 Datagrams over IEEE 802.15, RFC... Internet of Things ,” Contiki. Accessed November 19, 2017. [Online]. Available: http://www.contiki-os.org/ [27] “Get started with Contiki.” Accessed

  4. 48 CFR 422.1406 - Complaint procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Complaint procedures. 422.1406 Section 422.1406 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE SOCIOECONOMIC PROGRAMS APPLICATION OF LABOR LAWS TO GOVERNMENT ACQUISITIONS Employment of Workers With Disabilities 422...

  5. Procedural problems in phase-out regulations in nuclear law

    International Nuclear Information System (INIS)

    Kloepfer, Michael

    2012-01-01

    The contribution discusses the legal regulations accompanying German nuclear policy during the past twelve years. There were several radical changes in 2002, 2010, and 2011 which reflect the opinions of the then German governments; some of these regulations, according to the author, were not compatible with German constitutional law.

  6. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems.

    Science.gov (United States)

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-28

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN's MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS.

  7. A TOTP-based enhanced route optimization procedure for mobile IPv6 to reduce handover delay and signalling overhead.

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

  8. A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

    Science.gov (United States)

    Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low

    2014-01-01

    Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398

  9. An empirical evaluation of bufferbloat in IEEE 802.11n wireless networks

    KAUST Repository

    Showail, Ahmad; Jamshaid, Kamran; Shihada, Basem

    2014-01-01

    In this paper, we analyze the impact of large, persistently-full buffers (`bufferbloat') on various network dynamics in IEEE 802.11n wireless networks. Bufferbloat has mostly been studied in the context of wired networks. We study the impact of bufferbloat on a variety of wireless network topologies, including wireless LAN (WLAN) and multi-hop wireless networks. Our results show that a single FTP transfer between two Linux wireless hosts can saturate the buffers in the network stack, leading to RTT delays exceeding 4.5 s in multi-hop configurations. We show that well-designed Aggregate MAC Protocol Data Unit (A-MPDU) MAC-layer frame aggregation can reduce RTT delays while simultaneously increasing network throughput. However, additional measures may still be required to meet the constraints of real-time flows (such as VoIP). Our experiments show that large buffers can deteriorate the fairness in rate allocation in parking lot based multi-hop networks.

  10. An empirical evaluation of bufferbloat in IEEE 802.11n wireless networks

    KAUST Repository

    Showail, Ahmad

    2014-04-06

    In this paper, we analyze the impact of large, persistently-full buffers (`bufferbloat\\') on various network dynamics in IEEE 802.11n wireless networks. Bufferbloat has mostly been studied in the context of wired networks. We study the impact of bufferbloat on a variety of wireless network topologies, including wireless LAN (WLAN) and multi-hop wireless networks. Our results show that a single FTP transfer between two Linux wireless hosts can saturate the buffers in the network stack, leading to RTT delays exceeding 4.5 s in multi-hop configurations. We show that well-designed Aggregate MAC Protocol Data Unit (A-MPDU) MAC-layer frame aggregation can reduce RTT delays while simultaneously increasing network throughput. However, additional measures may still be required to meet the constraints of real-time flows (such as VoIP). Our experiments show that large buffers can deteriorate the fairness in rate allocation in parking lot based multi-hop networks.

  11. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  12. PTP1B is a negative regulator of interleukin 4–induced STAT6 signaling

    Science.gov (United States)

    Lu, Xiaoqing; Malumbres, Raquel; Shields, Benjamin; Jiang, Xiaoyu; Sarosiek, Kristopher A.; Natkunam, Yasodha

    2008-01-01

    Protein tyrosine phosphatase 1B (PTP1B) is a ubiquitously expressed enzyme shown to negatively regulate multiple tyrosine phosphorylation-dependent signaling pathways. PTP1B can modulate cytokine signaling pathways by dephosphorylating JAK2, TYK2, and STAT5a/b. Herein, we report that phosphorylated STAT6 may serve as a cytoplasmic substrate for PTP1B. Overexpression of PTP1B led to STAT6 dephosphorylation and the suppression of STAT6 transcriptional activity, whereas PTP1B knockdown or deficiency augmented IL-4–induced STAT6 signaling. Pretreatment of these cells with the PTK inhibitor staurosporine led to sustained STAT6 phosphorylation consistent with STAT6 serving as a direct substrate of PTP1B. Furthermore, PTP1B-D181A “substrate-trapping” mutants formed stable complexes with phosphorylated STAT6 in a cellular context and endogenous PTP1B and STAT6 interacted in an interleukin 4 (IL-4)–inducible manner. We delineate a new negative regulatory loop of IL-4–JAK-STAT6 signaling. We demonstrate that IL-4 induces PTP1B mRNA expression in a phosphatidylinositol 3-kinase–dependent manner and enhances PTP1B protein stability to suppress IL-4–induced STAT6 signaling. Finally, we show that PTP1B expression may be preferentially elevated in activated B cell–like diffuse large B-cell lymphomas. These observations identify a novel regulatory loop for the regulation of IL-4–induced STAT6 signaling that may have important implications in both neoplastic and inflammatory processes. PMID:18716132

  13. 8 CFR 270.2 - Enforcement procedures.

    Science.gov (United States)

    2010-01-01

    ... Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS PENALTIES FOR DOCUMENT FRAUD § 270.2 Enforcement procedures. (a) Procedures for the filing of complaints. Any person or entity... charges for document fraud committed by refugees at the time of entry. The Service shall not issue a...

  14. 9 CFR 381.311 - Recall procedure.

    Science.gov (United States)

    2010-01-01

    ... CERTIFICATION POULTRY PRODUCTS INSPECTION REGULATIONS Canning and Canned Products § 381.311 Recall procedure... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Recall procedure. 381.311 Section 381.311 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY...

  15. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    Science.gov (United States)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  16. Cauliflower mosaic virus protein P6 inhibits signaling responses to salicylic acid and regulates innate immunity.

    Directory of Open Access Journals (Sweden)

    Andrew J Love

    Full Text Available Cauliflower mosaic virus (CaMV encodes a multifunctional protein P6 that is required for translation of the 35S RNA and also acts as a suppressor of RNA silencing. Here we demonstrate that P6 additionally acts as a pathogenicity effector of an unique and novel type, modifying NPR1 (a key regulator of salicylic acid (SA- and jasmonic acid (JA-dependent signaling and inhibiting SA-dependent defence responses We find that that transgene-mediated expression of P6 in Arabidopsis and transient expression in Nicotiana benthamiana has profound effects on defence signaling, suppressing expression of representative SA-responsive genes and increasing expression of representative JA-responsive genes. Relative to wild-type Arabidopsis P6-expressing transgenics had greatly reduced expression of PR-1 following SA-treatment, infection by CaMV or inoculation with an avirulent bacterial pathogen Pseudomonas syringae pv tomato (Pst. Similarly transient expression in Nicotiana benthamiana of P6 (including a mutant form defective in translational transactivation activity suppressed PR-1a transcript accumulation in response to Agrobacterium infiltration and following SA-treatment. As well as suppressing the expression of representative SA-regulated genes, P6-transgenic Arabidopsis showed greatly enhanced susceptibility to both virulent and avirulent Pst (titres elevated 10 to 30-fold compared to non-transgenic controls but reduced susceptibility to the necrotrophic fungus Botrytis cinerea. Necrosis following SA-treatment or inoculation with avirulent Pst was reduced and delayed in P6-transgenics. NPR1 an important regulator of SA/JA crosstalk, was more highly expressed in the presence of P6 and introduction of the P6 transgene into a transgenic line expressing an NPR1:GFP fusion resulted in greatly increased fluorescence in nuclei even in the absence of SA. Thus in the presence of P6 an inactive form of NPR1 is mislocalized in the nucleus even in uninduced plants

  17. Soporte de QoS con 802.11e para tráfico heterogéneo en ambientes MANET

    OpenAIRE

    Murazzo, María Antonia; Rodríguez, Nelson R.; Guevara, Miguel José; Scheffer, María

    2014-01-01

    Hoy en día existe una gran necesidad de mejorar la calidad de servicio (QoS) ofrecida en redes móviles Ad Hoc (Mobile Ad-Hoc Networks -MANET-) que actualmente sólo ofrecen servicio best effort. Esto posee gran impacto en las aplicaciones que se corren, las cuales generan tráficos con diferentes requerimientos de recursos de la red. El presente trabajo tiene como objetivo fundamental analizar el comportamiento de la implementación de QoS en la sub capa MAC mediante 802.11e en ambientes con trá...

  18. 48 CFR 2917.504-70 - Signature authority and internal procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Signature authority and internal procedures. 2917.504-70 Section 2917.504-70 Federal Acquisition Regulations System DEPARTMENT OF... The Economy Act 2917.504-70 Signature authority and internal procedures. (a) A DOL contracting officer...

  19. 7 CFR 1940.406 - Real estate settlement procedures.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Real estate settlement procedures. 1940.406 Section... AGRICULTURE (CONTINUED) PROGRAM REGULATIONS (CONTINUED) GENERAL Truth in Lending-Real Estate Settlement Procedures § 1940.406 Real estate settlement procedures. (a) General. This section provides the instructions...

  20. Chromatin-remodeling SWI/SNF complex regulates coenzyme Q6 synthesis and a metabolic shift to respiration in yeast.

    Science.gov (United States)

    Awad, Agape M; Venkataramanan, Srivats; Nag, Anish; Galivanche, Anoop Raj; Bradley, Michelle C; Neves, Lauren T; Douglass, Stephen; Clarke, Catherine F; Johnson, Tracy L

    2017-09-08

    Despite its relatively streamlined genome, there are many important examples of regulated RNA splicing in Saccharomyces cerevisiae Here, we report a role for the chromatin remodeler SWI/SNF in respiration, partially via the regulation of splicing. We find that a nutrient-dependent decrease in Snf2 leads to an increase in splicing of the PTC7 transcript. The spliced PTC7 transcript encodes a mitochondrial phosphatase regulator of biosynthesis of coenzyme Q 6 (ubiquinone or CoQ 6 ) and a mitochondrial redox-active lipid essential for electron and proton transport in respiration. Increased splicing of PTC7 increases CoQ 6 levels. The increase in PTC7 splicing occurs at least in part due to down-regulation of ribosomal protein gene expression, leading to the redistribution of spliceosomes from this abundant class of intron-containing RNAs to otherwise poorly spliced transcripts. In contrast, a protein encoded by the nonspliced isoform of PTC7 represses CoQ 6 biosynthesis. Taken together, these findings uncover a link between Snf2 expression and the splicing of PTC7 and establish a previously unknown role for the SWI/SNF complex in the transition of yeast cells from fermentative to respiratory modes of metabolism. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.