WorldWideScience

Sample records for survey feeder network

  1. Controlling and Monitoring of Electric Feeders Using GSM Network Technology

    Directory of Open Access Journals (Sweden)

    AHMED Afaz Uddin

    2013-10-01

    Full Text Available The application of computer interfaced controlling devices is increasingly rapidly in modern age. Analogous wired systems are substituted by computer interfaced system alternatives in growingnumber of industries. Such control systems had been developed with complex and critical high-end stuffs. In this paper, we developed an automated system that controls the switching of electric feeder power supply featuring the existing GSM technology. The target is tooperate the device according to a preset sequence of on-off mode for three feeders after a particular time interval and to monitor the running condition. The device sends short message updating the status of every action. It also warns the consumers about load shedding using GSM module via sending message. Controlling the gate pulse of a MOSFET that operates the relay, it executes on-off operation of the circuit breaker of the respective feeders. Since GSM technology is used worldwide for communication, third world countries that are still struggling to meet the power demand can use this technology to operate and monitor the condition of power distribution. To operate the GSM device, AT command of GSM location operation for SIM900 is used. This paper targets to improve the power distribution system in developing countries like India, Bangladesh, Nepal where powercrisis and load shedding is quite a common phenomenon.

  2. Optimal Design of the Feeder-Bus Network Based on the Transfer System

    Directory of Open Access Journals (Sweden)

    Lianbo Deng

    2013-01-01

    Full Text Available This paper studied the classic feeder-bus network design problem (FBNDP, which can be described as follows: for the passenger travel demand between rail stations and bus stops on a given urban transit network, it designs the optimal feeder bus routes and frequencies so as to minimize the passengers’ travel expense and the operator’s cost. We extended the demand pattern of M-to-1 in most existing researches to M-to-M. We comprehensively considered the passenger travel cost, which includes the waiting and riding cost on the bus, riding cost on rail, and transfer cost between these two transportation modes, and presented a new genetic algorithm that determines the optimal feeder-bus operating frequencies under strict constraint conditions. The numerical examples under different demand patterns have been experienced and analysed, which showed the robustness and efficiency of the presented algorithm. We also found that the distribution pattern of the travel demand has a significant influence on the feeder-bus network construction.

  3. A novel full soft-switching resonant power converter for mid-feeder voltage regulation of low voltage distribution network

    OpenAIRE

    Ji, Chao; Watson, Alan James; Clare, Jon C.; Johnson, Christopher Mark

    2016-01-01

    This paper presents a novel resonant based, high power density power electronics converter solution for mid-feeder voltage regulation of a low voltage (LV) distribution network. Owing to the use of high switching frequency operation and a full soft-switching control strategy, the proposed converter is capable of superimposing LV compensation into the feeder voltage, to achieve a significant system effect with a compact system volume and correspondingly smaller absolute power loss.

  4. Network Reduction Algorithm for Developing Distribution Feeders for Real-Time Simulators: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Nagarajan, Adarsh; Nelson, Austin; Prabakar, Kumaraguru; Hoke, Andy; Asano, Marc; Ueda, Reid; Nepal, Shaili

    2017-06-15

    As advanced grid-support functions (AGF) become more widely used in grid-connected photovoltaic (PV) inverters, utilities are increasingly interested in their impacts when implemented in the field. These effects can be understood by modeling feeders in real-time systems and testing PV inverters using power hardware-in-the-loop (PHIL) techniques. This paper presents a novel feeder model reduction algorithm using a Monte Carlo method that enables large feeders to be solved and operated on real-time computing platforms. Two Hawaiian Electric feeder models in Synergi Electric's load flow software were converted to reduced order models in OpenDSS, and subsequently implemented in the OPAL-RT real-time digital testing platform. Smart PV inverters were added to the real-time model with AGF responses modeled after characterizing commercially available hardware inverters. Finally, hardware inverters were tested in conjunction with the real-time model using PHIL techniques so that the effects of AGFs on the choice feeders could be analyzed.

  5. EHRA research network surveys

    DEFF Research Database (Denmark)

    Bongiorni, Maria Grazia; Chen, Jian; Dagres, Nikolaos;

    2015-01-01

    of surveys covering the controversial issues in clinical electrophysiology (EP). With this in mind, an EHRA EP research network has been created, which included EP centres in Europe among which the surveys on 'hot topic' were circulated. This review summarizes the overall experience conducting EP wires over...

  6. Emergency Service Restoration and Load Balancing in Distribution Networks Using Feeder Loadings Balance Index

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Sang Yule [Anyang University, Anyang (Korea); Jung, Ho Sung; Shin, Myong Chul [Natural Sciences Campus, Suwon (Korea)

    2002-05-01

    This paper presents an algorithm to obtain an approximate optimal solution for the service restoration and load balancing of large scale radial distribution system in a real-time operation environment. Since the problem is formulated as a combinatorial optimization problem, it is difficult to solve a large-scale combinatorial optimization problem accurately within the reasonable computation time. Therefore, in order to find an approximate optimal solution quickly, the authors proposed an algorithm which combines optimization called cyclic best-first search with heuristic based feeder loadings balance index for computational efficiency and robust performance. To demonstrate the validity of the proposed algorithm, numerical calculations are carried out the KEPCO's 108 bus distribution system. (author). 14 refs., 9 figs., 4 tabs.

  7. Realization of Distribution Network Feeder Terminal Unit Based on Dual-DSP

    Directory of Open Access Journals (Sweden)

    Fanrong Wang

    2012-07-01

    Full Text Available This study presents the design proposal of distribution network monitoring unit based on dual-DSP. A detailed description of the hardware structure about the device is introduced which including signal scheduling, SPI communication, the serial human-computer communication and network communication. Also the study describes the software process about the master and slave DSPs. Then the analog precision test and the protection response test are carried out. The result shows that the design proposal is correct.

  8. Value-based distribution feeder automation planning

    Energy Technology Data Exchange (ETDEWEB)

    Teng, Jen-Hao [Department of Electrical Engineering, I-Shou University, No. 1, Section 1, Syuecheng Road, Dashu Township, Kaohsiung 840, Taiwan (Taiwan); Lu, Chan-Nan [Department of Electrical Engineering, National Sun Yat-Sen University, Kaohsiung, Taiwan (Taiwan)

    2006-03-15

    In a competitive electric energy market, service quality and reliability are two of the essential issues of the business. Distribution automation has been chosen by many utilities around the world as one of the most reliable measures for reducing outage time in their distribution networks. Considering network reliability data and the customer interruption costs, a value-based planning method is proposed in this paper to find the optimal numbers and locations of switches in feeder automation systems. The proposed method takes reliability costs, maintenance and investment costs into account to obtain a feeder automation plan that has a maximum benefit and a proper system reliability requirement. Three stages are involved in the search for optimal solution. Using minimum feeder data and assume equally distributed feeder loads, stage 1 gives initial estimates of reliability indices and costs, and benefit/cost ratios of different feeder automation options. To gain the maximum benefits from feeder automation with reasonable costs, results of stage 1 are used to select feeders with highest priorities for automations. Stage 2 determines the optimum locations of switches that minimize feeder outage costs, and in stage 3, the best locations for tie switches in the automated network are determined. Numerical processing procedure is described and the solution efficiency and results are compared with those obtained from a genetic algorithm. (author)

  9. Femtocell Networks: A Survey

    CERN Document Server

    Chandrasekhar, Vikram

    2008-01-01

    The surest way to increase the system capacity of a wireless link is by getting the transmitter and receiver closer to each other, which creates the dual benefits of higher quality links and more spatial reuse. network with nomadic users, this inevitably involves deploying more infrastructure, typically in the of microcells, hotspots, distributed antennas, or relays. A less expensive alternative is the recent concept of femtocells, also called home base-stations, which are data access points installed by home users get better indoor voice and data coverage. In this article, we overview the technical and business arguments for femtocells, and describe the state-of-the-art on each front. We also describe the technical challenges facing femtocell networks, and give some preliminary ideas for how to overcome them.

  10. Outlier detection in surveying networks

    OpenAIRE

    Preweda, Edward

    2014-01-01

    The paper refers to the robust estimation methods, which allows to eliminate outliers in surveying networks. Network adjustment is performed by the method of least squares. A key problem is the correct selection of weights, resulting from the different standard deviations of observations. In the case of gross errors their impact on the results of the alignment can be minimized by reducing the weight of outstanding observations. The second solution is the elimination of such observations as th...

  11. Comprehensive Cost Minimization in Distribution Networks Using Segmented-time Feeder Reconfiguration and Reactive Power Control of Distributed Generators

    DEFF Research Database (Denmark)

    Chen, Shuheng; Hu, Weihao; Chen, Zhe

    2016-01-01

    In this paper, an efficient methodology is proposed to deal with segmented-time reconfiguration problem of distribution networks coupled with segmented-time reactive power control of distributed generators. The target is to find the optimal dispatching schedule of all controllable switches...... and distributed generators’ reactive powers in order to minimize comprehensive cost. Corresponding constraints, including voltage profile, maximum allowable daily switching operation numbers (MADSON), reactive power limits, and so on, are considered. The strategy of grouping branches is used to simplify...... (FAHPSO) is implemented in VC++ 6.0 program language. A modified version of the typical 70-node distribution network and several real distribution networks are used to test the performance of the proposed method. Numerical results show that the proposed methodology is an efficient method for comprehensive...

  12. Feeder Differential Protection Based on EPON Communication for Smart Distribution Networks%基于EPON通信的智能配电网馈线差动保护

    Institute of Scientific and Technical Information of China (English)

    徐光福; 张春合; 严伟; 朱中华; 余群兵; 徐舒

    2014-01-01

    The development of smart distribution grid is towards the meshed and multi-source network topology,and the traditional feeder protection and automation(FA)are finding it increasingly difficult to meet the requirements for self-healing. Current differential protection is widely applied to the protection of transmission feeders owing to its inherent strengths of high sensitivity,selectivity and speed,which relies on the provision of a relatively high-bandwidth communication channel,and the existing synchronous digital hierarchy/plesiochronous digital hierarchy(SDH/PDH) networks have proven well suited to this task,but the communication equipment has a low bandwidth and is costly for the distribution grid.This paper presents a current differential protection device for the smart distribution grid,and the sampling value (SV) can be exchanged between these devices over the Ethernet passive optical network(EPON).The device adopts the SV synchronization algorithm based on IEEE 1588 to realize current differential protection of multi-terminal distribution lines.Now the device has successfully been put into operation in some 10 kV distribution lines.%智能配电网正朝着网格化、多电源的拓扑结构发展,传统配电网保护、馈线自动化(FA)已经越来越难以满足智能配电网自愈的要求。电流差动保护由于其优越的速动性、灵敏性和选择性而广泛地应用于输电线路,现有的方法是采用专用光纤通道或者基于同步数字系列/准同步数字系列(SDH/PDH)技术的复用通道来实现,但架设这些通信设备费用高且通信速率慢。文中提出并研制了一种适用于智能配电网的差动保护的装置,该装置基于以太无源光网络(EPON)来实现差动保护装置之间采样数据的传输,配以抗延时抖动及 IEEE 1588同步算法,实现多端线路差动保护。测试表明,保护能够准确动作,满足精度和动作时间的要求。该装置已在某10 kV线路挂网运行。

  13. The Users’ Survey of Network Ethics in Taiwan Academic Network

    Directory of Open Access Journals (Sweden)

    Tao-Ming Chuang

    1998-12-01

    Full Text Available The research using the questionnaire methods is to survey the status of users in TANet and to investigate users' valuing system on network moral norms. The purposes have following: 1. analyzing and comparing different kinds of network policies, computing policies, or codes of information ethics in order to conceive the new rules on the information superhighway; 2. investigating users' background, motivation, and valuing system on network ethics; 3. analyzing network educator's attitudes on network moral norms and the methodology of ethical education in network courses; and 4. establishing the course's foundation of network ethics. [Article content in Chinese

  14. Navigation in spatial networks: A survey

    Science.gov (United States)

    Huang, Wei; Chen, Shengyong; Wang, Wanliang

    2014-01-01

    The study on the navigation process in spatial networks has attracted much attention in recent years due to the universal applications in real communication networks. This article surveys recent advances of the navigation problem in spatial networks. Due to the ability to overcome scaling limitations in utilizing geometric information for designing navigation algorithms in spatial networks, we summarize here several important navigation algorithms based on geometric information on both homogeneous and heterogeneous spatial networks. Due to the geometric distance employed, the cost associated with the lengths of additional long-range connections is also taken into account in this survey. Therefore, some contributions reporting how the distribution of long-range links’ lengths affects the average navigation time are summarized. We also briefly discuss two other related processes, i.e. the random walk process and the transportation process. Finally, a few open discussions are included at the end of this survey.

  15. Colour preferences of UK garden birds at supplementary seed feeders.

    Science.gov (United States)

    Rothery, Luke; Scott, Graham W; Morrell, Lesley J

    2017-01-01

    Supplementary feeding of garden birds generally has benefits for both bird populations and human wellbeing. Birds have excellent colour vision, and show preferences for food items of particular colours, but research into colour preferences associated with artificial feeders is limited to hummingbirds. Here, we investigated the colour preferences of common UK garden birds foraging at seed-dispensing artificial feeders containing identical food. We presented birds simultaneously with an array of eight differently coloured feeders, and recorded the number of visits made to each colour over 370 30-minute observation periods in the winter of 2014/15. In addition, we surveyed visitors to a garden centre and science festival to determine the colour preferences of likely purchasers of seed feeders. Our results suggest that silver and green feeders were visited by higher numbers of individuals of several common garden bird species, while red and yellow feeders received fewer visits. In contrast, people preferred red, yellow, blue and green feeders. We suggest that green feeders may be simultaneously marketable and attractive to foraging birds.

  16. Colour preferences of UK garden birds at supplementary seed feeders

    Science.gov (United States)

    Rothery, Luke; Scott, Graham W.

    2017-01-01

    Supplementary feeding of garden birds generally has benefits for both bird populations and human wellbeing. Birds have excellent colour vision, and show preferences for food items of particular colours, but research into colour preferences associated with artificial feeders is limited to hummingbirds. Here, we investigated the colour preferences of common UK garden birds foraging at seed-dispensing artificial feeders containing identical food. We presented birds simultaneously with an array of eight differently coloured feeders, and recorded the number of visits made to each colour over 370 30-minute observation periods in the winter of 2014/15. In addition, we surveyed visitors to a garden centre and science festival to determine the colour preferences of likely purchasers of seed feeders. Our results suggest that silver and green feeders were visited by higher numbers of individuals of several common garden bird species, while red and yellow feeders received fewer visits. In contrast, people preferred red, yellow, blue and green feeders. We suggest that green feeders may be simultaneously marketable and attractive to foraging birds. PMID:28212435

  17. Bluetooth Low Energy Mesh Networks: A Survey.

    Science.gov (United States)

    Darroudi, Seyed Mahdi; Gomez, Carles

    2017-06-22

    Bluetooth Low Energy (BLE) has gained significant momentum. However, the original design of BLE focused on star topology networking, which limits network coverage range and precludes end-to-end path diversity. In contrast, other competing technologies overcome such constraints by supporting the mesh network topology. For these reasons, academia, industry, and standards development organizations have been designing solutions to enable BLE mesh networks. Nevertheless, the literature lacks a consolidated view on this emerging area. This paper comprehensively surveys state of the art BLE mesh networking. We first provide a taxonomy of BLE mesh network solutions. We then review the solutions, describing the variety of approaches that leverage existing BLE functionality to enable BLE mesh networks. We identify crucial aspects of BLE mesh network solutions and discuss their advantages and drawbacks. Finally, we highlight currently open issues.

  18. Bluetooth Low Energy Mesh Networks: A Survey

    Science.gov (United States)

    Darroudi, Seyed Mahdi; Gomez, Carles

    2017-01-01

    Bluetooth Low Energy (BLE) has gained significant momentum. However, the original design of BLE focused on star topology networking, which limits network coverage range and precludes end-to-end path diversity. In contrast, other competing technologies overcome such constraints by supporting the mesh network topology. For these reasons, academia, industry, and standards development organizations have been designing solutions to enable BLE mesh networks. Nevertheless, the literature lacks a consolidated view on this emerging area. This paper comprehensively surveys state of the art BLE mesh networking. We first provide a taxonomy of BLE mesh network solutions. We then review the solutions, describing the variety of approaches that leverage existing BLE functionality to enable BLE mesh networks. We identify crucial aspects of BLE mesh network solutions and discuss their advantages and drawbacks. Finally, we highlight currently open issues. PMID:28640183

  19. Peer to Peer Networks Management Survey

    CERN Document Server

    Amad, Mourad; Aïssani, Djamil

    2012-01-01

    Peer-to-Peer systems are based on the concept of resources localization and mutualisation in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamically, resources reliability and availability constitute a critical issue. The resource discovery problem arises in the context of peer to peer (P2P) networks, where at any point of time a peer may be placed at or removed from any location over a general purpose network. Locating a resource or service efficiently is one of the most important issues related to peer-to-peer networks. The objective of a search mechanism is to successfully locate resources while incurring low overhead and low delay. This paper presents a survey on P2P networks management: classification, applications, platforms, simulators and security.

  20. Survey on Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Reeta Chhatani

    2016-01-01

    Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.

  1. IPv6 Network Mobility Route Optimization Survey

    Directory of Open Access Journals (Sweden)

    Samer S. Hassan

    2011-01-01

    Full Text Available Problem statement: This study describes that the Next Generation of Networks (NGN communication will supports multiple technologies, handles the mobility of end users to move through heterogeneous access networks, with ability to connect to different networks. Where the Internet Engineer Task Force maintain (IETF the Mobile IPv6 (MIPv6 to handles the mobility of networks (NEMO, to provide wide band and more scalable network services. One of the MIPv6 built-in features is Route Optimization (RO to solve the inefficient route problem. Conclusion/Recommendations: The main objective of this article is to survey, classify and make a compression between the available schemes for route optimization over the last years depends on the basic criteria generated from the published articles within different network topology. This article presents the problem of suboptimal route which is further increased with increasing of nesting levels and there is no such one scheme is perfect for all network environments.

  2. Survey on Opportunistic Networks in Delay Tolerant Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Koushik.C.P

    2016-02-01

    Full Text Available Delay Tolerant Network is an emerging research field in Mobile sensor network. It use forwarding technique to transmit the message from source to destination, there is no complete path between sources to destination. Due to mobility of nodes there is frequent change in node paten and difficult to find the path, there is chance that message keep on forwarded inside the network. In this paper we made detail survey on Opportunistic Routing Protocol in mobile network, and in that node getting the message form neighbor node and moving away from Sink. We proposed a technique in Gradient based Routing Protocol to solve node moving away from sink with message.

  3. Cognitive Relay Networks: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Ayesha Naeem

    2015-07-01

    Full Text Available Cognitive radio is an emerging technology to deal with the scarcity and requirement of radio spectrum by dynamically assigning spectrum to unlicensed user . This revolutionary technology shifts the paradigm in the wireless system design by all owing unlicensed user the ability to sense, adapt and share the dynamic spectrum. Cognitive radio technology have been applied to different networks and applications ranging from wireless to public saf ety, smart grid, medical, rela y and cellular applications to increase the throughput and spectrum efficiency of the network. Among these applications, cognitive relay networks is one of the application where cognitive radio technology has been applied. Cognitiv e rela y network increases the network throughput by reducing the complete pa th loss and also by ensuring cooper ation among secondary users and cooperation among primary and secondary users. In this paper , our aim is to provide a survey on cognitive relay network. We also provide a detailed review on existing schemes in cognitive relay networks on the basis of relaying protocol, relay cooperation and channel model.

  4. Okefenokee National Wildlife Refuge Nightjar Survey Network Survey Field Procedures and Completed Data Sheets

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Raw data and survey instructions from the Nightjar Survey Network's nighjar survey on Okefenokee NWR. Nightjar Surveys are standardized population counts conducted...

  5. Bayesian networks in neuroscience: a survey.

    Science.gov (United States)

    Bielza, Concha; Larrañaga, Pedro

    2014-01-01

    Bayesian networks are a type of probabilistic graphical models lie at the intersection between statistics and machine learning. They have been shown to be powerful tools to encode dependence relationships among the variables of a domain under uncertainty. Thanks to their generality, Bayesian networks can accommodate continuous and discrete variables, as well as temporal processes. In this paper we review Bayesian networks and how they can be learned automatically from data by means of structure learning algorithms. Also, we examine how a user can take advantage of these networks for reasoning by exact or approximate inference algorithms that propagate the given evidence through the graphical structure. Despite their applicability in many fields, they have been little used in neuroscience, where they have focused on specific problems, like functional connectivity analysis from neuroimaging data. Here we survey key research in neuroscience where Bayesian networks have been used with different aims: discover associations between variables, perform probabilistic reasoning over the model, and classify new observations with and without supervision. The networks are learned from data of any kind-morphological, electrophysiological, -omics and neuroimaging-, thereby broadening the scope-molecular, cellular, structural, functional, cognitive and medical- of the brain aspects to be studied.

  6. Microscopic filter feeders near boundaries

    Science.gov (United States)

    Pepper, Rachel; Roper, Marcus; Ryu, Sangjin; Matsudiara, Paul; Stone, Howard

    2009-11-01

    We show through calculations, simulations, and experiments that the eddies often observed near sessile filter feeders are due to the presence of nearby boundaries. We model the common filter feeder Vorticella, which is approx 50 μm across and which feeds by removing bacteria from ocean or pond water that it draws towards itself. We use an analytic stokeslet model and a Brinkman flow approximation with the organism modeled as a cylinder with two different boundary conditions to predict the size of the eddy caused by two parallel no-slip boundaries that represent the slides between which experimental observations are often made. We also use three-dimensional finite-element simulations to fully solve for the flow around a model Vorticella. Additionally, we track particles around live feeding Vorticella in order to determine the experimental flow field. Our models are in good agreement both with each other and with the experiments. We also show through calculations that filter feeders such as Vorticella can greatly enhance their nutrient uptake by feeding at an angle rather than perpendicular to a substrate.

  7. A review of CANDU feeder wall thinning

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Han Sub [Korea Electric Power Research Institute, Daejeon (Korea, Republic of)

    2010-10-15

    Flow Accelerated Corrosion is an active degradation mechanism of CANDU feeder. The tight bend downstream to Grayloc weld connection, close to reactor face, suffers significant wall thinning by FAC. Extensive in-service inspection of feeder wall thinning is very difficult because of the intense radiation field, complex geometry, and space restrictions. Development of a knowledge-based inspection program is important in order to guarantee that adequate wall thickness is maintained throughout the whole life of feeder. Research results and plant experiences are reviewed, and the plant inspection databases from Wolsong Units One to Four are analyzed in order to support developing such a knowledge-based inspection program. The initial thickness before wall thinning is highly non-uniform because of bending during manufacturing stage, and the thinning rate is non-uniform because of the mass transfer coefficient distributed non-uniformly depending on local hydraulics. It is obvious that the knowledge-based feeder inspection program should focus on both fastest thinning locations and thinnest locations. The feeder wall thinning rate is found to be correlated proportionately with QV of each channel. A statistical model is proposed to assess the remaining life of each feeder using the QV correlation and the measured thicknesses. W-1 feeder suffered significant thinning so that the shortest remaining life barely exceeded one year at the end of operation before replacement. W-2 feeder showed far slower thinning than W-1 feeder despite the faster coolant flow. It is believed that slower thinning in W-2 is because of higher chromium content in the carbon steel feeder material. The average Cr content of W-2 feeder is 0.051%, while that value is 0.02% for W-1 feeder. It is to be noted that FAC is reduced substantially even though the Cr content of W-2 feeder is still very low

  8. Distribution Network Intelligent Planning Considering Feeder Line Automatic Layout and Tie-line Wiring Investment%考虑馈线自动布局和联络接线费用的配电网智能规划

    Institute of Scientific and Technical Information of China (English)

    李游; 常鲜戎

    2012-01-01

    An improved genetic algorithm is adopted to operate distribution network structure layout automation. From the point of view of removing the collection of to-be-selected lines and rationally utilizing planning inforrration for optimization, this paper presents a new real-number encoding based on to-be-planned load nodes number and a new decoding based on short distance feeder line layout to carry out the feeder line automatic layout. Such improved genetic operations as fragment reordering crossover, displacement mutation operator and the /~ + 2. selector are used to search for the optimal radiative structure. Moreover, according to the principle of dosed-loop design and open-loop distribution network operation, the planning mode[ takes into account the heuristic tie-line wiring scheme on the basis of the optimal distribution network to obtain "hand in hand" distribution network that can enhance power supply reliability. It is shown by a case study that the algorithm can greatly reduce the workload of a planner and yield a satisfactory solution in a relatively small number of iterations. Meanwhile, it is shown by calculation results that the algorithm is feasible and of practical value.%采用一种改进遗传算法进行配电网智能规划。从取消待选线路集设定、合理利用规划信息引导寻优等角度出发,提出一种基于待规划负荷节点数的实数编码方式和基于短距离馈线集合的解码方式进行馈线自动布局,并通过片段重组交叉、位移变异算子和μ+λ选择算子等改进型遗传操作对辐射型网络寻优。此外,根据配电网络的闭环设计、开环运行原则,在最优辐射型配电网络基础上考虑了启发式联络接线方案,以得到手拉手配电网络提高地区供电可靠性。经算例验证,所提算法能够大幅减少规划人员工作量,并能在较少迭代次数内得到符合工程要求的满意解。同时,算例结果表明了算法的可行性和实用价值。

  9. High altitude clouds impacts on the design of optical feeder link and optical ground station network for future broadband satellite services

    Science.gov (United States)

    Poulenard, S.; Ruellan, M.; Roy, B.; Riédi, J.; Parol, F.; Rissons, A.

    2014-03-01

    Optical links at 1.55μm are envisaged to cope with the increasing capacity demand from geostationary telecom satellite operators without the need of Radio Frequency (RF) coordination. Due to clouds blockages, site diversity techniques based on a network of Optical Ground Stations (OGS) are necessary to reach the commonly required link availability (e.g. 99.9% over the year). Evaluation of the N Optical Ground Station Network (N-OGSN) availability is based on Clouds Masks (CMs) and depends on the clouds attenuation taken in the optical communication budget link. In particular, low attenuation of high semitransparent clouds (i.e. cirrus) could be incorporated into the budget link at the price of larger or more powerful optical terminals. In this paper, we present a method for the calibration of the attenuation at 1.55 μm of high semitransparent clouds. We perform OGS localization optimization in Europe and we find that the incorporation of thin cirrus attenuation in the budget link reduces by 20% the number of handover (i.e. switches OGS) and the handover rate. It is also shown that the minimum number of station required in Europe to reach 99.9% link availability is 10 to 11. When the zone of research is enlarged the Africa, this number is reduced to 3 to 4.

  10. A tutorial survey of topics in wireless networking: Part I

    Indian Academy of Sciences (India)

    Anurag Kumar; D Manjunath

    2007-12-01

    In this two part paper, we provide a survey of recent and emerging topics in wireless networking. We view the area of wireless networking as dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In the first part of the paper, we first survey the area by providing a taxonomy of wireless networks as they have been deployed. Then, we provide a quick tutorial on the main issues in the wireless ‘physical’ layer, which is concerned with transporting bits over the radio frequency spectrum. Then, we proceed to discuss some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In the second part of the paper, we first analyse random access wireless networks and pay special attention to 802·11 (Wi-Fi) networks. We then survey some topics in ad hoc multihop wireless networks, where we discuss arbitrary networks, as well as some theory of dense random networks. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  11. Link Prediction in Complex Networks: A Survey

    CERN Document Server

    Lu, Linyuan

    2010-01-01

    Link prediction in complex networks has attracted increasing attention from both physical and computer science communities. The algorithms can be used to extract missing information, identify spurious interactions, evaluate network evolving mechanisms, and so on. This article summaries recent progress about link prediction algorithms, emphasizing on the contributions from physical perspectives and approaches, such as the random-walk-based methods and the maximum likelihood methods. We also introduce three typical applications: reconstruction of networks, evaluation of network evolving mechanism and classification of partially labelled networks. Finally, we introduce some applications and outline future challenges of link prediction algorithms.

  12. Green Cellular Networks: A Survey, Some Research Issues and Challenges

    CERN Document Server

    Hasan, Ziaul; Bhargava, Vijay K

    2011-01-01

    Energy efficiency in cellular networks is a growing concern for cellular operators to not only maintain profitability, but also to reduce the overall environment effects. This emerging trend of achieving energy efficiency in cellular networks is motivating the standardization authorities and network operators to continuously explore future technologies in order to bring improvements in the entire network infrastructure. In this article, we present a brief survey of methods to improve the power efficiency of cellular networks, explore some research issues and challenges and suggest some techniques to enable an energy efficient or "green" cellular network. Since base stations consume a maximum portion of the total energy used in a cellular system, we will first provide a comprehensive survey on techniques to obtain energy savings in base stations. Next, we discuss how heterogenous network deployment based on micro, pico and femto-cells can be used to achieve this goal. Since cognitive radio and cooperative rela...

  13. A Survey of 5G Network: Architecture and Emerging Technologies

    National Research Council Canada - National Science Library

    Gupta, A; Jha, R. K

    2015-01-01

    .... This paper presents the results of a detailed survey on the fifth generation (5G) cellular network architecture and some of the key emerging technologies that are helpful in improving the architecture and meeting the demands of users...

  14. Networked Control System – A Survey

    Directory of Open Access Journals (Sweden)

    M. Brindha

    2013-07-01

    Full Text Available Networked Control System (NCS is a synthetic application which combines control science, computer science and network technology. It is a kind of feedback control systems wherein the control loops are closed through real time control network. NCS technology is applied in industry control system because of its simple structure, easy maintenance and high reliability. Networked control systems (NCSs have been gaining popularity with their high potential in widespread applications and becoming realizable with the rapid developments in computer, communication and control technologies. This paper reviews the development history of the NCS, and point out the field of further researches.

  15. A tutorial survey of topics in wireless networking: Part II

    Indian Academy of Sciences (India)

    Anurag Kumar; D Manjunath

    2007-12-01

    This is the second part of the survey of recent and emerging topics in wireless networking. We provide an overview of the area of wireless networking as that of dealing with problems of resource allocation so that the various connections that utilise the network achieve their desired performance objectives. In Part I we provided a taxonomy of wireless networks as they have been deployed. We then provided a quick survey of the main issues in the wireless 'physical' layer. We then discussed some resource allocation formulations in CDMA (code division multiple access) cellular networks and OFDMA (orthogonal frequency division multiple access) networks. In this part we begin with a discussion of random access wireless networks. We first provide an overview of the evolution of random access networks from Aloha to the currently popular 802·11 (Wi-Fi) networks. We then analyse the performance of the 802·11 random access protocol. We briefly discuss the problem of optimal association of nodes to Wi-Fi access points. Next, we consider topics in ad hoc multihop wireless networks. We first discuss topology and cross layer control. For the latter, we describe the important maximum weight link scheduling algorithm. The connectivity and capacity of randomly deployed networks are then analysed. Finally, we provide an overview of the technical issues in the emerging area of wireless sensor networks.

  16. Survey on Security Issues in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Bassem Mokhtar

    2015-12-01

    Full Text Available Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides lacking infrastructure, communicating entities move with various accelerations. Accordingly, this impedes establishing reliable end-to-end communication paths and having efficient data transfer. Thus, VANETs have different network concerns and security challenges to get the availability of ubiquitous connectivity, secure communications, and reputation management systems which affect the trust in cooperation and negotiation between mobile networking entities. In this survey, we discuss the security features, challenges, and attacks of VANETs, and we classify the security attacks of VANETs due to the different network layers.

  17. A survey on routing in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    XIAO Renyi; WU Guozheng

    2007-01-01

    One of the most important issues in wireless sensor networks is data delivery service between sensors and the data collection unit (called sink ). Although sensor networks and mobile ad hoc networks are similar to some extent, they are radically distinct in many aspects. Sensor networks have many unique features, making them more challenging and need further research efforts. The existing routing protocols for sensor networks can be classified as indicator-based and indicator-free. In this survey, we make a comparative study of these protocols. Open issues and research directions are pointed out as guidelines for our future work.

  18. Modeling Marine Electromagnetic Survey with Radial Basis Function Networks

    Directory of Open Access Journals (Sweden)

    Agus Arif

    2014-11-01

    Full Text Available A marine electromagnetic survey is an engineering endeavour to discover the location and dimension of a hydrocarbon layer under an ocean floor. In this kind of survey, an array of electric and magnetic receivers are located on the sea floor and record the scattered, refracted and reflected electromagnetic wave, which has been transmitted by an electric dipole antenna towed by a vessel. The data recorded in receivers must be processed and further analysed to estimate the hydrocarbon location and dimension. To conduct those analyses successfuly, a radial basis function (RBF network could be employed to become a forward model of the input-output relationship of the data from a marine electromagnetic survey. This type of neural networks is working based on distances between its inputs and predetermined centres of some basis functions. A previous research had been conducted to model the same marine electromagnetic survey using another type of neural networks, which is a multi layer perceptron (MLP network. By comparing their validation and training performances (mean-squared errors and correlation coefficients, it is concluded that, in this case, the MLP network is comparatively better than the RBF network[1].[1] This manuscript is an extended version of our previous paper, entitled Radial Basis Function Networks for Modeling Marine Electromagnetic Survey, which had been presented on 2011 International Conference on Electrical Engineering and Informatics, 17-19 July 2011, Bandung, Indonesia.

  19. A survey of statistical network models

    CERN Document Server

    Goldenberg, Anna; Fienberg, Stephen E; Airoldi, Edoardo M

    2009-01-01

    Networks are ubiquitous in science and have become a focal point for discussion in everyday life. Formal statistical models for the analysis of network data have emerged as a major topic of interest in diverse areas of study, and most of these involve a form of graphical representation. Probability models on graphs date back to 1959. Along with empirical studies in social psychology and sociology from the 1960s, these early works generated an active network community and a substantial literature in the 1970s. This effort moved into the statistical literature in the late 1970s and 1980s, and the past decade has seen a burgeoning network literature in statistical physics and computer science. The growth of the World Wide Web and the emergence of online networking communities such as Facebook, MySpace, and LinkedIn, and a host of more specialized professional network communities has intensified interest in the study of networks and network data. Our goal in this review is to provide the reader with an entry poin...

  20. A survey on RBF Neural Network for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Henali Sheth

    2014-12-01

    Full Text Available Network security is a hot burning issue nowadays. With the help of technology advancement intruders or hackers are adopting new methods to create different attacks in order to harm network security. Intrusion detection system (IDS is a kind of security software which inspects all incoming and outgoing network traffic and it will generate alerts if any attack or unusual behavior is found in a network. Various approaches are used for IDS such as data mining, neural network, genetic and statistical approach. Among this Neural Network is more suitable approach for IDS. This paper describes RBF neural network approach for Intrusion detection system. RBF is a feed forward and supervise technique of neural network.RBF approach has good classification ability but its performance depends on its parameters. Based on survey we find that RBF approach has some short comings. In order to overcome this we need to do proper optimization of RBF parameters.

  1. A Survey on Wireless Sensor Network Security

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.

  2. A hybrid evolutionary algorithm for distribution feeder reconfiguration

    Institute of Scientific and Technical Information of China (English)

    Taher; NIKNAM; Ehsan; AZAD; FARSANI

    2010-01-01

    This paper presents a new method to reduce the distribution system loss by feeder reconfiguration.This new method combines self-adaptive particle swarm optimization(SAPSO) with shuffled frog-leaping algorithm(SFLA) in an attempt to find the global optimal solutions for the distribution feeder reconfiguration(DFR).In PSO algorithm,appropriate adjustment of the parameters is cumbersome and usually requires a lot of time and effort.Thus,a self-adaptive framework is proposed to improve the robustness of PSO.In SAPSO the learning factors of PSO coevolve with the particles.SFLA is combined with the SAPSO algorithm to improve its performance.The proposed algorithm is tested on two distribution test networks.The results of simulation show that the proposed algorithm is very powerful and guarantees to obtain the global optimization in minimum time.

  3. Socially-Aware Networking: A Survey

    OpenAIRE

    Xia, Feng; Liu, Li; Li, Jie; Ma, Jianhua; Vasilakos, Athanasios V.

    2013-01-01

    The widespread proliferation of handheld devices enables mobile carriers to be connected at anytime and anywhere. Meanwhile, the mobility patterns of mobile devices strongly depend on the users' movements, which are closely related to their social relationships and behaviors. Consequently, today's mobile networks are becoming increasingly human centric. This leads to the emergence of a new field which we call socially-aware networking (SAN). One of the major features of SAN is that social awa...

  4. An RFID Based Smart Feeder for Hummingbirds.

    Science.gov (United States)

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  5. Coherence-Multiplexed Optical RF Feeder Networks

    NARCIS (Netherlands)

    Meijerink, Arjan; Taniman, Robert O.; Etten, van Wim

    2007-01-01

    An optical RF feeding system for wireless access is proposed, in which the radio access points are distinguished by means of coherence multiplexing (CM). CM is a rather unknown and potentially inexpensive optical code division multiple access technique, which is particularly suitable for relatively

  6. Lifetime of Sensor Network by Exploiting Heterogeneity- A Survey

    Directory of Open Access Journals (Sweden)

    Ritesh Kumar Singh

    2014-07-01

    Full Text Available Wireless sensor networks (WSN are emerging in various fields. A large number of sensors in these applications are unattended and work autonomously. Lifetime is an important parameter which is critical for different algorithms for data transfer. Moreover it is responsible for the throughput and the failure of the network. Heterogeneous wireless sensor network, on top of clustering technique, has evolved as the major parameter to increase the lifetime of the Sensor network, data transfer, energy consumption and the scalability of the sensor network. This paper surveys the different clustering algorithm and dependencies for heterogeneous wireless sensor network. This paper is for scholars to gain sufficient knowledge of wireless sensor network (WSN, its important characteristics, and performance metrics with factors responsible for a WSN system. It can help a scholar to start a quick research by understanding all the respective parameters and energy oriented strategies in WSN.

  7. Containership Traffic Optimization on Feeder Shipping Line

    Directory of Open Access Journals (Sweden)

    Drozhzhyn Oleksii

    2016-12-01

    Full Text Available This article is devoted to feeder containership traffic optimization on the trunk and feeder shipping lines. The optimization is fulfilled in case of the necessity of laden containers delivery between fixed pairs of ports as well as in case of the requirement not to exceed the vessel's capacity, taking into account her residual value during transition between feeder port lines. The paper takes into account uneven distribution of empty container equipment in ports of line and the solution is suggested considering the estimation of the empty TEU’s number which is subject to reposition.

  8. A Frequency-Based Assignment Model under Day-to-Day Information Evolution of Oversaturated Conditions on a Feeder Bus Service

    Directory of Open Access Journals (Sweden)

    Silin Zhang

    2017-02-01

    Full Text Available Day-to-day information is increasingly being implemented in transit networks worldwide. Feeder bus service (FBS plays a vital role in a public transit network by providing feeder access to hubs and rails. As a feeder service, a space-time path for frequent passengers is decided by its dynamic strategy procedure, in which a day-to-day information self-learning mechanism is identified and analyzed from our survey data. We formulate a frequency-based assignment model considering day-to-day evolution under oversaturated conditions, which takes into account the residual capacity of bus and the comfort feelings of sitting or standing. The core of our proposed model is to allocate the passengers on each segment belonging to their own paths according to multi-utilities transformed from the time values and parametric demands, such as frequency, bus capacity, seat comfort, and stop layout. The assignment method, albeit general, allows us to formulate an equivalent optimization problem in terms of interaction between the FBS’ operation and frequent passengers’ rational behaviors. Finally, a real application case is generated to test the ability of the modeling framework capturing the theoretical consequents, serving the passengers’ dynamic externalities.

  9. Survey of propagation Model in wireless Network

    Directory of Open Access Journals (Sweden)

    Hemant Kumar Sharma

    2011-05-01

    Full Text Available To implementation of mobile ad hoc network wave propagation models are necessary to determine propagation characteristic through a medium. Wireless mobile ad hoc networks are self creating and self organizing entity. Propagation study provides an estimation of signal characteristics. Accurate prediction of radio propagation behaviour for MANET is becoming a difficult task. This paper presents investigation of propagation model. Radio wave propagation mechanisms are absorption, reflection, refraction, diffraction and scattering. This paper discuss free space model, two rays model, and cost 231 hata and its variants and fading model, and summarized the advantages and disadvantages of these model. This study would be helpful in choosing the correct propagation model.

  10. Modeling Marine Electromagnetic Survey with Radial Basis Function Networks

    Directory of Open Access Journals (Sweden)

    Agus Arif

    2011-08-01

    Full Text Available A marine electromagnetic survey is an engineering endeavour to discover the location and dimension of a hydrocarbon layer under an ocean floor. In this kind of survey, an array of electric and magnetic receivers are located on the sea floor and record the scattered, refracted and reflected electromagnetic wave, which has been transmitted by an electric dipole antenna towed by a vessel. The data recorded in receivers must be processed and further analysed to estimate the hydrocarbon location and dimension. To conduct those analyses successfuly, a radial basis function (RBF network could be employed to become a forward model of the input-output relationship of the data from a marine electromagnetic survey. This type of neural networks is working based on distances between its inputs and predetermined centres of some basis functions. A previous research had been conducted to model the same marine electromagnetic survey using another type of neural networks, which is a multi layer perceptron (MLP network. By comparing their validation and training performances (mean-squared errors and correlation coefficients, it is concluded that, in this case, the MLP network is comparatively better than the RBF network

  11. Survey of WiMAX Networks

    Directory of Open Access Journals (Sweden)

    Mr. Ajay Roy

    2013-06-01

    Full Text Available IEEE 802.16(Broadband Wireless MAN is fastgrowing wireless broadband networks of the world. WiMAX isone of the key technology cof IEEE 802.16 standard .In thispaper we provide an overview of WiMAX.

  12. Clustering in Wireless Sensor Networks- A Survey

    Directory of Open Access Journals (Sweden)

    Sukhkirandeep Kaur

    2016-06-01

    Full Text Available Increased demand of Wireless Sensor Networks (WSN in various applications has made it a hot research area. Several challenges imposed which include energy conservation, scalability, limited network resources etc. with energy conservation being the most important. Clustering improves the energy efficiency by making high power nodes as cluster heads (CHs which reduces the chance of energy depletion of nodes. Scalability, fault tolerance, data aggregation, energy efficiency are some of the main objectives of clustering. This paper discusses various challenges associated with clustering and different methods or techniques developed to overcome these challenges. Various clustering approaches have been summarized and few prominent Quality of service (QoS based clustering routing protocols for WSN have been identified. Comparison of these approaches and protocols is discussed based on some parameters.

  13. A Batch Feeder for Inhomogeneous Bulk Materials

    Science.gov (United States)

    Vislov, I. S.; Kladiev, S. N.; Slobodyan, S. M.; Bogdan, A. M.

    2016-04-01

    The work includes the mechanical analysis of mechanical feeders and batchers that find application in various technological processes and industrial fields. Feeders are usually classified according to their design features into two groups: conveyor-type feeders and non-conveyor feeders. Batchers are used to batch solid bulk materials. Less frequently, they are used for liquids. In terms of a batching method, they are divided into volumetric and weighting batchers. Weighting batchers do not provide for sufficient batching accuracy. Automatic weighting batchers include a mass controlling sensor and systems for automatic material feed and automatic mass discharge control. In terms of operating principle, batchers are divided into gravitational batchers and batchers with forced feed of material using conveyors and pumps. Improved consumption of raw materials, decreased loss of materials, ease of use in automatic control systems of industrial facilities allows increasing the quality of technological processes and improve labor conditions. The batch feeder suggested by the authors is a volumetric batcher that has no comparable counterparts among conveyor-type feeders and allows solving the problem of targeted feeding of bulk material batches increasing reliability and hermeticity of the device.

  14. Ego Network Analysis of Upper Division Physics Student Survey

    Science.gov (United States)

    Brewe, Eric

    2017-01-01

    We present the analysis of student networks derived from a survey of upper division physics students. Ego networks focus on the connections that center on one person (the ego). The ego networks in this talk come from a survey that is part of an overall project focused on understanding student retention and persistence. The theory underlying this work is that social and academic integration are essential components to supporting students continued enrollment and ultimately graduation. This work uses network analysis as a way to investigate the role of social and academic interactions in retention and persistence decisions. We focus on student interactions with peers, on mentoring interactions with physics department faculty, and on engagement in physics groups and how they influence persistence. Our results, which are preliminary, will help frame the ongoing research project and identify ways in which departments can support students. This work supported by NSF grant #PHY 1344247.

  15. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges

    Directory of Open Access Journals (Sweden)

    Marjan Radi

    2012-01-01

    Full Text Available A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  16. Multipath routing in wireless sensor networks: survey and research challenges.

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Lee, Malrey

    2012-01-01

    A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.

  17. Effect of artificial feeders on pollen loads of the hummingbirds of Cerro de la Muerte, Costa Rica.

    Science.gov (United States)

    Avalos, Gerardo; Soto, Alejandra; Alfaro, Willy

    2012-03-01

    hummingbirds carried no pollen. Mist nets located 3km from La Georgina returned few captures (one-to-three specimens) per sampling date, contrasting with observations made before feeders were present. These results suggest that sugar-water feeders gather hummingbirds in over considerable distances drawing them away from flowers. The competitive and antagonistic pattern shown between feeders and flowers indicate that natural pollination system could be significantly altered. Supplementing hummingbirds with food seems likely to interfere with pollination networks already stressed by many anthropogenic effects.

  18. Networking Ethics: A Survey of Bioethics Networks Across the U.S.

    Science.gov (United States)

    Fausett, Jennifer Kleiner; Gilmore-Szott, Eleanor; Hester, D Micah

    2016-06-01

    Ethics networks have emerged over the last few decades as a mechanism for individuals and institutions over various regions, cities and states to converge on healthcare-related ethical issues. However, little is known about the development and nature of such networks. In an effort to fill the gap in the knowledge about such networks, a survey was conducted that evaluated the organizational structure, missions and functions, as well as the outcomes/products of ethics networks across the country. Eighteen established bioethics networks were identified via consensus of three search processes and were approached for participation. The participants completed a survey developed for the purposes of this study and distributed via SurveyMonkey. Responses were obtained from 10 of the 18 identified and approached networks regarding topic areas of: Network Composition and Catchment Areas; Network Funding and Expenses; Personnel; Services; and Missions and Accomplishments. Bioethics networks are designed primarily to bring ethics education and support to professionals and hospitals. They do so over specifically defined areas-states, regions, or communities-and each is concerned about how to stay financially healthy. At the same time, the networks work off different organizational models, either as stand-alone organizations or as entities within existing organizational structures.

  19. Phase balancing optimization for radial feeder systems

    Science.gov (United States)

    Zhu, Jinxiang

    In the power distribution systems, unbalanced feeder causes deteriorating power quality and increases investment and operating costs. There are two approaches to balance a feeder system. One approach is feeder reconfiguration, the other is phase swapping. Feeder reconfiguration is an on-line operation of sectionalizing switches. However, feeder reconfiguration is difficult to find the phase balancing solution for a unbalanced feeder system. On the other hand, phase swapping is a direct and effective approach for phase balancing. Phase swapping is an off-line operation of re-tapping loads/laterals to the phase lines during maintenance and restoration periods. Unfortunately, phase balancing problem has not received its deserved importance. Deregulation in power industry has arisen phase balancing issue because it can improve power quality, improve service reliability, and reduce total costs. Thus, phase balancing can enhance utility competitive capability. This research provides utilities the optimization tools to maximize the benefits of phase balancing and minimize the costs. This dissertation proposed several mathematical formulations, including Mixed-integer programming (MIP), Dynamic programming (DP), Simulated annealing (SA), and Fuzzy logic (FL), to perform phase swapping to balance phase in a radial feeder. Due to the discrete nature of phase swapping, a MIP model is proposed to find the optimal phase swapping scheme for small-sized feeder. Candidate sets and monitored branches are then introduced to solve the large-scale feeder systems. Possibilistic integer programming (PIP) is proposed to incorporate load uncertainties in phase swapping problems. The tests show that the load uncertainties may change the optimal phase swapping. DP computation is significant reduced by introducing the tighter upper/lower bounds. The upper bound can be quickly obtained by assignment algorithm. Even though SA is a time-consuming heuristic method, it can provide better solution

  20. Fair Optimization and Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Wlodzimierz Ogryczak

    2014-01-01

    Full Text Available Optimization models related to designing and operating complex systems are mainly focused on some efficiency metrics such as response time, queue length, throughput, and cost. However, in systems which serve many entities there is also a need for respecting fairness: each system entity ought to be provided with an adequate share of the system’s services. Still, due to system operations-dependant constraints, fair treatment of the entities does not directly imply that each of them is assigned equal amount of the services. That leads to concepts of fair optimization expressed by the equitable models that represent inequality averse optimization rather than strict inequality minimization; a particular widely applied example of that concept is the so-called lexicographic maximin optimization (max-min fairness. The fair optimization methodology delivers a variety of techniques to generate fair and efficient solutions. This paper reviews fair optimization models and methods applied to systems that are based on some kind of network of connections and dependencies, especially, fair optimization methods for the location problems and for the resource allocation problems in communication networks.

  1. Clustering Algorithms for Heterogeneous Wireless Sensor Networks - A Brief Survey

    Directory of Open Access Journals (Sweden)

    A.MeenaKowshalya

    2011-09-01

    Full Text Available Wireless sensor networks (WSN are emerging in vari ous fields like disaster management, battle field surveillance and border security surveillance. A la rge number of sensors in these applications are unattended and work autonomously. Clustering is a k ey technique to improve the network lifetime, reduc e the energy consumption and increase the scalability of the sensor network. In this paper, we study the impact of heterogeneity of the nodes to the perform ance of WSN. This paper surveys the different clust ering algorithm for heterogeneous WSN .

  2. A Survey of Clustering Approaches for Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Mihir Mehta

    2014-02-01

    Full Text Available In MANET, Clustering is the most significant research area now days. Clustering offers several advantages like it improves stability of network, enhances routing in network, efficient resource allocation among mobile nodes in network and hierarchical routing structure. This survey paper analyzes number of clustering approaches which are widely used for partitioning mobile nodes into different virtual groups. Each clustering algorithm considers different parameters for selection of Cluster Head in Cluster. Cluster Head election is invoked on demand and it is aimed to decrease the computation and communication cost in MANET. Each approach has its own pros and cons.

  3. Survey of buffer management policies for delay tolerant networks

    Directory of Open Access Journals (Sweden)

    Sweta Jain

    2014-04-01

    Full Text Available Delay tolerant networks (DTN are a class of networks that are a subset of the traditional mobile ad-hoc networks. It differs from mobile ad hoc networks (MANETs in the sense that it can withstand high delays in delivering data because of frequent network partitions, limited bandwidth and storage constraints persisting in such networks. Owing to these inherent characteristics of the delay tolerant networks improving delivery ratio in such networks depends on two main factors-use of routing strategy and a good buffer management policy. Many routing protocols have been proposed in the literature for DTN. Buffer management is a very important factor in DTN because of the very limited buffer space available in DTN nodes. Although a scheduling policy in DTN determines which message has to be forwarded first, the dropping policy decides which messages are to be dropped in case of buffer overflow. This Letter presents a survey of the existing buffer management policies proposed for DTN and discusses the pros and cons of these approaches. The buffer management techniques have been classified on the basis of information used by them whether they are based on local information of messages available at the node or global information of all the messages in the network.

  4. An RFID Based Smart Feeder for Hummingbirds

    Directory of Open Access Journals (Sweden)

    Vicente Ibarra

    2015-12-01

    Full Text Available We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH by developing a Radio Frequency Identification (RFID based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird, the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  5. A Survey on Coverage Control Protocols in Wireless Sensor Networks

    OpenAIRE

    2013-01-01

    Coverage control algorithms play an important role in Wireless sensor network. Effective coverage control algorithms sense its coverage area with less energy spent. These coverage control models falls under various approaches like clustering, evolutionary, mobility based approaches. This paper makes a detailed survey on coverage control protocols coming under various classifications. In addition, it also discussed several protocols working mechanism with its evaluation metrics.

  6. A Survey on Event Mining for ICT Network Infrastructure Management

    Institute of Scientific and Technical Information of China (English)

    LIU Zheng; LI Tao; WANG Junchang

    2016-01-01

    Managing large⁃scale complex network infrastructures is chal⁃lenging due to the huge number of heterogeneous network el⁃ements. The goal of this survey is to provide an overview of event mining techniques applied in the network management domain. Event mining includes a series of techniques for au⁃tomatically and effectively discovering valuable knowledge from historical event/log data. We present three research challenges (i.e., event generation, root cause analysis, and failure prediction) for event mining in network management and introduce the corresponding solutions. Event generation (i.e., converting messages in log files into structured events) is the first step in many event mining applications. Automat⁃ic root cause analysis can locate the faulty elements/compo⁃nents without the help of experienced domain experts. Fail⁃ure prediction in proactive fault management improves net⁃work reliability. The representative studies to address the three aforementioned challenges are reviewed and their main ideas are summarized in the survey. In addition, our survey shows that using event mining techniques can improve the network management efficiency and reduce the management cost.

  7. Survey of trust models in different network domains

    CERN Document Server

    Momani, Mohammad

    2010-01-01

    This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained, highlighting that reputation partially affects trust. A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests. The methodologies used to model trust and their references are presented. The factors affecting trust updating are summarised and some examples of the systems in which these factors have been implemented are given. The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes (binary events). However, wireless senso...

  8. M Dwarf Exoplanet Survey by the Falcon Telescope Network

    Science.gov (United States)

    Carlson, Randall E.

    2016-10-01

    The Falcon Telescope Network (FTN) consists of twelve automated 20-inch telescopes located around the globe. We control it at the US Air Force Academy in Colorado Springs, Colorado from the Cadet Space Operations Center. We have installed 10 of the 12 sites and anticipate full operational capability by the beginning of 2017. The network's worldwide geographic distribution provides advantages. The primary mission of the FTN is Space Situational Awareness and studying Near Earth Objects. However, we are employing the FTN with its 11' x 11' field-of-view for a five-year, M dwarf exoplanet survey. Specifically, we are searching for Earth-radius exoplanets. We describe the FTN, design considerations going into the FTN's M dwarf exoplanet survey including automated operations, and initial results of the survey.

  9. Implantable Medical Devices; Networking Security Survey

    Directory of Open Access Journals (Sweden)

    Siamak Aram

    2016-08-01

    Full Text Available The industry of implantable medical devices (IMDs is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

  10. A Survey of Wireless Sensor Network Security and Routing Techniques

    Directory of Open Access Journals (Sweden)

    Raja Waseem Anwar

    2015-04-01

    Full Text Available The main purpose of the study is to review the evolution of wireless sensor network security and routing techniques. Recent years have seen tremendous growth in Wireless Sensor Networks (WSNs. As WSN’s become more and more crucial to everyday life, their security and trust become a primary concern. However because of the nature of WSNs, security design can be challenging. Trust-aware routing protocols play a vital role in security of Wireless Sensor Networks (WSNs. The review study provides an overview of Wireless Sensor Network (WSN and discusses security issues and the routing techniques for high quality of service and efficient performance in a WSN. In order to identify gaps and propose research directions in WSN security and routing techniques, the study surveys the existing body of literature in this area. The main focus is on trust concepts and trust based approaches for wireless sensor networks. The study also highlights the difference between trust and security in the context of WSNs. The trust and security are interchangeable with each other when we elaborate a secure system and not same. Various surveys conducted about trust and reputation systems in ad hoc and sensor networks are studied and compared. Finally we summarize the different trust aware routing schemes.

  11. The Global Oscillation Network Group site survey, 2: Results

    Science.gov (United States)

    Hill, Frank; Fischer, George; Forgach, Suzanne; Grier, Jennifer; Leibacher, John W.; Jones, Harrison P.; Jones, Patricia B.; Kupke, Renate; Stebbins, Robin T.; Clay, Donald W.

    1994-01-01

    The Global Oscillation Network Group (GONG) Project will place a network of instruments around the world to observe solar oscillations as continuously as possible for three years. The Project has now chosen the six network sites based on analysis of survey data from fifteen sites around the world. The chosen sites are: Big Bear Solar Observatory, California; Mauna Loa Solar Observatory, Hawaii; Learmonth Solar Observatory, Australia; Udaipur Solar Observatory, India; Observatorio del Teide, Tenerife; and Cerro Tololo Interamerican Observatory, Chile. Total solar intensity at each site yields information on local cloud cover, extinction coefficient, and transparency fluctuations. In addition, the performance of 192 reasonable networks assembled from the individual site records is compared using a statistical principal components analysis. An accompanying paper descibes the analysis methods in detail; here we present the results of both the network and individual site analyses. The selected network has a duty cycle of 93.3%, in good agreement with numerical simulations. The power spectrum of the network observing window shows a first diurnal sidelobe height of 3 x 10(exp -4) with respect to the central component, an improvement of a factor of 1300 over a single site. The background level of the network spectrum is lower by a factor of 50 compared to a single-site spectrum.

  12. A SURVEY ON WAVELENGTH DIVISION MULTIPLEXING (WDM NETWORKS

    Directory of Open Access Journals (Sweden)

    G. Ramesh

    2010-03-01

    Full Text Available Communication networks have emerged as a source of empowerment in today’s society. At the global level, the Internet is becoming the backbone of the modern economy. The new generations in developed countries cannot even conceive of a world without broadband access to the Internet. The inability of the current Internet infrastructure to cope with the wide variety and ever growing number of users, emerging networked applications, usage patterns and business models is increasingly being recognized worldwide. The dynamic growth of Internet traffic and its bursty nature requires high transmission rate. With the advances and the progress in Wavelength Division Multiplexing (WDM technology, the amount of raw bandwidth available in fiber links has increased to high magnitude. This paper presents a survey on WDM networks from its development to the current status. Also an analysis on buffer size in optical networks for real time traffic was performed.

  13. Routing Protocols for Cognitive Radio Networks: A Survey

    CERN Document Server

    Kamruzzaman, S M

    2010-01-01

    with the cognitive radio (CR) technology, a wireless system can exploit opportunistically the radio spectrum licensed to other systems. Thus, CR is regarded as a solution to the problems resulting from the limited available spectrum and the inefficiency in the spectrum usage. The multi-hop CR networks need some novel routing algorithms taking the open spectrum phenomenon into account. The main approach in designing the routing algorithm for the CR networks is the joint design of routing and spectrum management. Works on such issues have just started and are still in a rudimentary stage. In this paper, we survey comprehensively the existing research on the routing protocols for CR networks, especially with reference to CR ad hoc networks. We classify the routing protocols, discuss the essential features of the different protocols, and provide the future research directions.

  14. Vertical-Screw-Auger Conveyer Feeder

    Science.gov (United States)

    Walton, Otis (Inventor); Vollmer, Hubert J. (Inventor)

    2016-01-01

    A conical feeder is attached to a vertically conveying screw auger. The feeder is equipped with scoops and rotated from the surface to force-feed regolith the auger. Additional scoops are possible by adding a cylindrical section above the conical funnel section. Such then allows the unit to collect material from swaths larger in diameter than the enclosing casing pipe of the screw auger. A third element includes a flexible screw auger. All three can be used in combination in microgravity and zero atmosphere environments to drill and recover a wide area of subsurface regolith and entrained volatiles through a single access point on the surface.

  15. Economic viability of distributed energy resources relative to substation and feeder facilities expansion

    DEFF Research Database (Denmark)

    Akorede, M. F.; Hizam, H.; Aris, I.

    2010-01-01

    Distributed energy resources have numerous benefits, of which is transmission network upgrade deferral. This application is particularly important where there are constraints in upgrading of the existing or construction of new generation units and transmission circuits. This paper presents a cost...... of DG when compared with upgrading the existing substation and feeder facilities, especially when incremental load is considered....

  16. Economic viability of distributed energy resources relative to substation and feeder facilities expansion

    DEFF Research Database (Denmark)

    Akorede, M. F.; Hizam, H.; Aris, I.

    2010-01-01

    Distributed energy resources have numerous benefits, of which is transmission network upgrade deferral. This application is particularly important where there are constraints in upgrading of the existing or construction of new generation units and transmission circuits. This paper presents a cost...... of DG when compared with upgrading the existing substation and feeder facilities, especially when incremental load is considered. ©2010 IEEE....

  17. Impact of Rayleigh backscattering on single/dual feeder fiber WDM-PON architectures based on array waveguide gratings

    Institute of Scientific and Technical Information of China (English)

    Muhammad Idrees AFRIDI; Jie ZHANG; Yousaf KHAN; Jiawei HAN; Aftab HUSSEIN; Shahab AHMAD

    2013-01-01

    The performance of colorless wavelength- division multiplexing passive optical network (WDM- PON) systems suffers from transmission impairments due to Rayleigh backscattering (RB). A single feeder fiber colorless WDM-PON architecture was modeled, simulated and analyzed at 25 km distance that sustained the noise induced by RB. We analytically compared the performances between single feeder and dual feeder WDM-PON architectures based on array waveguide gratings (AWGs). For single feeder WDM-PON, the high extinction ratios in both return-to-zeros (RZ)-shaped differential phase shift keying (DPSK) downstream and intensity remodulated upstream data signals helped to increase the tolerance to the noise induced by RB. However, a cost effective colorless system in dual feeder WDM-PON architecture was achieved without any optical amplification and dispersion compensation, low power penalty. These results illustrate that single feeder fiber architecture was cost effective in terms of deployment having a power penalty, while dual feeder fiber had lower power penalty thereby with better performance. Simulation results show that downstream and upstream signals achieved error-free performance at 10-Gbps with negligible penalty and enhanced tolerance to the noise induced by RB over 25 km single mode fiber.

  18. A Survey on Coverage Control Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    V.Nivedhitha

    2013-04-01

    Full Text Available Coverage control algorithms play an important role in Wireless sensor network. Effective coverage control algorithms sense its coverage area with less energy spent. These coverage control models falls under various approaches like clustering, evolutionary, mobility based approaches. This paper makes a detailed survey on coverage control protocols coming under various classifications. In addition, it also discussed several protocols working mechanism with its evaluation metrics.

  19. Localization Algorithms of Underwater Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Han, Guangjie; Jiang, Jinfang; Shu, Lei; Xu, Yongjun; Wang, Feng

    2012-01-01

    In Underwater Wireless Sensor Networks (UWSNs), localization is one of most important technologies since it plays a critical role in many applications. Motivated by widespread adoption of localization, in this paper, we present a comprehensive survey of localization algorithms. First, we classify localization algorithms into three categories based on sensor nodes’ mobility: stationary localization algorithms, mobile localization algorithms and hybrid localization algorithms. Moreover, we compare the localization algorithms in detail and analyze future research directions of localization algorithms in UWSNs. PMID:22438752

  20. Coal gasification: New challenge for the Beaumont rotary feeder

    Science.gov (United States)

    Stelian, J.

    1977-01-01

    The use of rotary feeders in the coal gasification process is described with emphasis on the efficient conversion of coal to clean gaseous fuels. Commercial applications of the rotary feeder system are summarized.

  1. Performance improvement of complementary feeders using static transfer switch system

    Institute of Scientific and Technical Information of China (English)

    Tahir MAHMOOD; Mohammad Ahmad CHOUDHRY

    2009-01-01

    The performance of complementary feeders, running in parallel, can be significantly improved by installing static transfer switches (STSs) at critical locations. We develop the STS control logic, which transfers the critical load from the preferred feeder to the alternate feeder when a voltage sag or a fault occurs on the preferred feeder. A forced commutation technique is proposed and implemented to turn off the preferred feeders' thyristor, thus avoiding cross current to flow and minimizing the transfer time. Simulation results show that the forced commutation technique is more effective as compared to the recently pro-posed time delay technique for STS operation. Two different feeders, namely New Exchange, the preferred feeder, and Sector I-10/2, the alternate feeder of Islamabad Electric Supply COmpany (IESCO), Pakistan, have been selected for case studies. The software PSCAD/EMTDC professional package has been used for simulation.

  2. A Survey on Clustering Algorithms for Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Vivek Katiyar

    2011-01-01

    Full Text Available Potential use of wireless sensor networks (WSNs can be seen in various fields like disaster management, battle field surveillance and border security surveillance since last few years. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Sensor nodes are considered to be homogeneous since the researches in the field of WSNs have been evolved, but some nodes may be of different energy to prolong the lifetime of a WSN and its reliability. In this paper, we study the impact of heterogeneity of nodes to the performance of WSNs. This paper surveys different clustering algorithms for heterogeneous WSNs by classifying algorithms depending upon various clustering attributes.

  3. Energy Efficiency and Renewable Energy Network (EREN): Customer satisfaction survey

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, A.V. [Information International Associates, Inc., Oak Ridge, TN (United States); Henderson, D.P. [Dept. of Energy, Oak Ridge, TN (United States). Office of Scientific and Technical Information

    1996-04-22

    The Energy Efficiency and Renewable Energy Network (EREN) Customer Satisfaction Survey was developed and executed in support of EREN`s continuous quality improvement (CQI) plan. The study was designed to provide information about the demographic make up of EREN users, the value or benefits they derive from EREN, the kinds and quality of services they want, their levels of satisfaction with existing services, their preferences in both the sources of service and the means of delivery, and to provide benchmark data for the establishment of continuous quality improvement measures. The survey was performed by soliciting voluntary participation from members of the EREN Users Group. It was executed in two phases; the first being conducted by phone using a randomly selected group; and the second being conducted electronically and which was open to all of the remaining members of the Users Group. The survey results are described.

  4. SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK

    Directory of Open Access Journals (Sweden)

    FARAZ AHSAN

    2011-08-01

    Full Text Available Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be approached by others, who can listen and interfere in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each other for packet routing, the standard defined for wireless network is unable to identify any malicious activity, by default. Among attacks the ones which create isolation of the nodes on the network are considered more severe. If they last long enough, can result in denial-of-service and hence network collapses completely. The simplest form of such attacks is jamming attack which can block any current legitimate communication. It is easy to launch as no especial hardware is required and the area in range for a particular time can be jammed for any legal communication. Jamming is a specialized Denial of Service attack in which purpose is not to overflow buffers, instead to choke the physical communication channel, hence avoiding jammer is much harder than other forms of denial of service attacks. Unlike other attacks, especially routing attacks, no network parameter and topology etc need to be known in advance before launching jamming attack. However, if the network parameters are known and the attack is intelligently placed, a jammer can last longer resulting in more survival time on the network and damage. This paper surveys on different types of jamming attack and the mitigation techniques generally used. Besides this, we investigate about the approaches proposed that are considered efficient to survive in a jammed region, actively. Finally, we conclude by highlighting the potential areas which can be targeted to optimize in minimizing the effects of a jamming attack, as future directions.

  5. Cognitive radio network in vehicular ad-hoc network (VANET: A survey

    Directory of Open Access Journals (Sweden)

    Joanne Mun-Yee Lim

    2016-05-01

    Full Text Available Cognitive radio network and Vehicular Ad hoc Network (VANET are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges and performance metrics, for different cognitive radio VANET applications.

  6. 46 CFR 58.25-65 - Feeder circuits.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Feeder circuits. 58.25-65 Section 58.25-65 Shipping... AND RELATED SYSTEMS Steering Gear § 58.25-65 Feeder circuits. (a) Each vessel with one or more electric-driven steering-gear power units must have at least two feeder circuits, which must be...

  7. ANALYSIS OF FEEDERS OUTAGES ON THE DISTRIBUTION SYSTEM OF ZARIA TOWN

    OpenAIRE

    Adegboye, B A

    2010-01-01

    The paper is aimed at analysing the outages on the feeders of the distribution system, in Zaria Town, Kaduna State, Nigeria. The 11 kV feeders are the NNPC feeder, Gaskiya feeder, Sabon Gari feeder, NTC/RLY feeder and the Canteen feeder. The 33 kV feeders, on the other hand, are the Shika feeder, Giwa/Makarfi feeder and the Soba feeder. The analysis is based on the daily outage data collected for a period of about one year (April, 2003 to April, 2004 – thirteen months). From these data, the t...

  8. A Survey on Data Dissemination in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    郑霄龙; 万猛

    2014-01-01

    Wireless sensor networks (WSNs) have been applied in a variety of application areas. Most WSN systems, once deployed, are intended to operate unattended for a long period. During the lifetime, it is necessary to fix bugs, reconfigure system parameters, and upgrade the software in order to achieve reliable system performance. However, manually collecting all nodes back and reconfiguring through serial connections with computer is infeasible since it is labor-intensive and inconvenient due to the harsh deploying environments. Hence, data dissemination over multi-hop is desired to facilitate such tasks. This survey discusses the requirements and challenges of data dissemination in WSNs, reviews existing work, introduces some relevant techniques, presents the metrics of the performance and comparisons of the state-of-the-art work, and finally suggests the possible future directions in data dissemination studies. This survey elaborates and compares existing approaches of two categories: structure-less schemes and structure-based schemes, classified by whether or not the network structure information is used during the disseminating process. In existing literatures, different categories have definite boundary and limited analysis on the trade-off between different categories. Besides, there is no survey that discusses the emerging techniques such as Constructive Interference (CI) while these techniques have the chance to change the framework of data dissemination. In a word, even though many efforts have been made, data dissemination in WSNs still needs some more work to embrace the new techniques and improve the efficiency and practicability further.

  9. Operating systems for wireless sensor networks: a survey.

    Science.gov (United States)

    Farooq, Muhammad Omer; Kunz, Thomas

    2011-01-01

    This paper presents a survey on the current state-of-the-art in Wireless Sensor Network (WSN) Operating Systems (OSs). In recent years, WSNs have received tremendous attention in the research community, with applications in battlefields, industrial process monitoring, home automation, and environmental monitoring, to name but a few. A WSN is a highly dynamic network because nodes die due to severe environmental conditions and battery power depletion. Furthermore, a WSN is composed of miniaturized motes equipped with scarce resources e.g., limited memory and computational abilities. WSNs invariably operate in an unattended mode and in many scenarios it is impossible to replace sensor motes after deployment, therefore a fundamental objective is to optimize the sensor motes' life time. These characteristics of WSNs impose additional challenges on OS design for WSN, and consequently, OS design for WSN deviates from traditional OS design. The purpose of this survey is to highlight major concerns pertaining to OS design in WSNs and to point out strengths and weaknesses of contemporary OSs for WSNs, keeping in mind the requirements of emerging WSN applications. The state-of-the-art in operating systems for WSNs has been examined in terms of the OS Architecture, Programming Model, Scheduling, Memory Management and Protection, Communication Protocols, Resource Sharing, Support for Real-Time Applications, and additional features. These features are surveyed for both real-time and non-real-time WSN operating systems.

  10. Operating Systems for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Muhammad Omer Farooq

    2011-05-01

    Full Text Available This paper presents a survey on the current state-of-the-art in Wireless Sensor Network (WSN Operating Systems (OSs. In recent years, WSNs have received tremendous attention in the research community, with applications in battlefields, industrial process monitoring, home automation, and environmental monitoring, to name but a few. A WSN is a highly dynamic network because nodes die due to severe environmental conditions and battery power depletion. Furthermore, a WSN is composed of miniaturized motes equipped with scarce resources e.g., limited memory and computational abilities. WSNs invariably operate in an unattended mode and in many scenarios it is impossible to replace sensor motes after deployment, therefore a fundamental objective is to optimize the sensor motes’ life time. These characteristics of WSNs impose additional challenges on OS design for WSN, and consequently, OS design for WSN deviates from traditional OS design. The purpose of this survey is to highlight major concerns pertaining to OS design in WSNs and to point out strengths and weaknesses of contemporary OSs for WSNs, keeping in mind the requirements of emerging WSN applications. The state-of-the-art in operating systems for WSNs has been examined in terms of the OS Architecture, Programming Model, Scheduling, Memory Management and Protection, Communication Protocols, Resource Sharing, Support for Real-Time Applications, and additional features. These features are surveyed for both real-time and non-real-time WSN operating systems.

  11. Maximum Photovoltaic Penetration Levels on Typical Distribution Feeders: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Hoke, A.; Butler, R.; Hambrick, J.; Kroposki, B.

    2012-07-01

    This paper presents simulation results for a taxonomy of typical distribution feeders with various levels of photovoltaic (PV) penetration. For each of the 16 feeders simulated, the maximum PV penetration that did not result in steady-state voltage or current violation is presented for several PV location scenarios: clustered near the feeder source, clustered near the midpoint of the feeder, clustered near the end of the feeder, randomly located, and evenly distributed. In addition, the maximum level of PV is presented for single, large PV systems at each location. Maximum PV penetration was determined by requiring that feeder voltages stay within ANSI Range A and that feeder currents stay within the ranges determined by overcurrent protection devices. Simulations were run in GridLAB-D using hourly time steps over a year with randomized load profiles based on utility data and typical meteorological year weather data. For 86% of the cases simulated, maximum PV penetration was at least 30% of peak load.

  12. Survey on path and cycle embedding in some networks

    Institute of Scientific and Technical Information of China (English)

    Jun-Ming XU; Meijie MA

    2009-01-01

    To find a cycle (resp. path) of a given length in a graph is the cycle (resp. path) embedding problem. To find cycles of all lengths from its girth to its order in a graph is the pancyclic problem. A stronger concept than the pancylicity is the panconnectivity. A graph of order n is said tobe panconnected if for any pair of different vertices x and y with distance d there exist xy-paths of every length from of to n. The pancyclicity or the panconnectivity is an important property to determine if the topology of a network is suitable for some applications where mapping cycles or paths of any length into the topology of the network is required. The pancyclicity and the panconnectivity of interconnection networks have attracted much research interest in recent years. A large amount of related work appeared in the literature, with some repetitions. The purpose of this paper is to give a survey of the results related to these topics for the hypercube and somehypercube-like networks.

  13. A survey on virtualization of Wireless Sensor Networks.

    Science.gov (United States)

    Islam, Md Motaharul; Hassan, Mohammad Mehedi; Lee, Ga-Won; Huh, Eui-Nam

    2012-01-01

    Wireless Sensor Networks (WSNs) are gaining tremendous importance thanks to their broad range of commercial applications such as in smart home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the specific WSN domains, communication barriers, conflicting goals and the economic interests of different WSN sensor node vendors, it is difficult to introduce a large scale federated WSN. By allowing heterogeneous sensor nodes in WSNs to coexist on a shared physical sensor substrate, virtualization in sensor network may provide flexibility, cost effective solutions, promote diversity, ensure security and increase manageability. This paper surveys the novel approach of using the large scale federated WSN resources in a sensor virtualization environment. Our focus in this paper is to introduce a few design goals, the challenges and opportunities of research in the field of sensor network virtualization as well as to illustrate a current status of research in this field. This paper also presents a wide array of state-of-the art projects related to sensor network virtualization.

  14. A Survey on Virtualization of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ga-Won Lee

    2012-02-01

    Full Text Available Wireless Sensor Networks (WSNs are gaining tremendous importance thanks to their broad range of commercial applications such as in smart home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the specific WSN domains, communication barriers, conflicting goals and the economic interests of different WSN sensor node vendors, it is difficult to introduce a large scale federated WSN. By allowing heterogeneous sensor nodes in WSNs to coexist on a shared physical sensor substrate, virtualization in sensor network may provide flexibility, cost effective solutions, promote diversity, ensure security and increase manageability. This paper surveys the novel approach of using the large scale federated WSN resources in a sensor virtualization environment. Our focus in this paper is to introduce a few design goals, the challenges and opportunities of research in the field of sensor network virtualization as well as to illustrate a current status of research in this field. This paper also presents a wide array of state-of-the art projects related to sensor network virtualization.

  15. Pressurized feeder for biofuels; Paineistettu syoetin biopolttoaineille

    Energy Technology Data Exchange (ETDEWEB)

    Lundqvist, R.; Makkonen, P. [Foster Wheeler Energia Oy, Karhula (Finland). Karhula R and D Center

    1995-12-31

    A new type of pressurized piston feeder has been tested for further development of the IGCC concept. The project is funded by the Finnish Ministry of Trade and Industry. The objective has been to develop a substitute for lock-hopper systems, which are commercial, but far too expensive from an operational point of view, due to high inert gas consumption for pressurization. The new feeder system, which is of dual piston type, uses little inert gas, because the pressurization sequence is performed partially by the piston movement. The project comprised further development of the concept, mechanical testing under atmospheric and pressurized conditions and testing with wood chips, peat and coal at elevated pressures. The main concern has been the wear of seals and gaskets during long term operation and for this reason over 600 hours of testing has been carried out. The tests were carried out between May 1994 and January 1995 with wood chips, peat and coal mainly at 17 bar(a) pressure. During the operation, the system was fine-tuned, and generally, the testing was successful. At the early stage of the tests, the ring seal design was modified and several alternative seal constructions were tested. During the tests, the seal was developed further and improved. The present ring seal design has been proven reliable and it meets the commercial requirements. After the tests, the feeder system was inspected thoroughly and found to be in good condition. A commercially available concept of the feeder has been developed on the basis of the knowledge obtained during the test runs

  16. Flow accelerated corrosion study in feeder pipes

    Energy Technology Data Exchange (ETDEWEB)

    Goyal, P.; Verma, V.; Singh, R.K. [Bhabha Atomic Research Centre, Mumbai (India). Reactor Safety Div.

    2014-11-15

    The Indian Pressurized Heavy Water Reactor (PHWR) core consists of a number of horizontal channels containing nuclear fuel bundles. Parallel coolant channels are connected to Inlet and Outlet header through feeder pipes. Coolant from Reactor Inlet Header is distributed to the coolant channels and after removing heat combines at Reactor Outlet Header. Due to space constraints the feeder pipes are joined to the channel with one or two elbows close to the end fittings of the coolant channels. The carbon steel feeder pipes carry high temperature fluid at higher velocity and are liable to undergo Flow Accelerated Corrosion (FAC). In the recent inspection it has been found that feeders having double elbow are more susceptible to FAC on the intrados of second elbow. But it was found that in some of the elbows maximum thinning due to FAC was observed on the intrados of the first elbow. Hence to resolve this, effect of first bend orientation with respect of upstream direction has been studied. Two different approaches are used for predicting the FAC rate from calculated value of wall shear stress by CFD. One method is based on evaluating of wear rate using Colburn analogy and the other using an empirical equation between wear rate and shear stress. In Colburn analogy, mass transfer coefficient is evaluated by knowing shear stress and equilibrium concentration. For a case study, wall shear stress obtained from k-ε turbulence model was compared with k-ω SST turbulence model and no appreciable change in the wall shear stress has been found. Hence for subsequent analysis k-ε turbulence model was chosen because large mesh size near to the surface (first layer thickness) is permitted due to higher y{sup +} value.

  17. Clustering and community detection in directed networks: A survey

    Science.gov (United States)

    Malliaros, Fragkiskos D.; Vazirgiannis, Michalis

    2013-12-01

    Networks (or graphs) appear as dominant structures in diverse domains, including sociology, biology, neuroscience and computer science. In most of the aforementioned cases graphs are directed - in the sense that there is directionality on the edges, making the semantics of the edges nonsymmetric as the source node transmits some property to the target one but not vice versa. An interesting feature that real networks present is the clustering or community structure property, under which the graph topology is organized into modules commonly called communities or clusters. The essence here is that nodes of the same community are highly similar while on the contrary, nodes across communities present low similarity. Revealing the underlying community structure of directed complex networks has become a crucial and interdisciplinary topic with a plethora of relevant application domains. Therefore, naturally there is a recent wealth of research production in the area of mining directed graphs - with clustering being the primary method sought and the primary tool for community detection and evaluation. The goal of this paper is to offer an in-depth comparative review of the methods presented so far for clustering directed networks along with the relevant necessary methodological background and also related applications. The survey commences by offering a concise review of the fundamental concepts and methodological base on which graph clustering algorithms capitalize on. Then we present the relevant work along two orthogonal classifications. The first one is mostly concerned with the methodological principles of the clustering algorithms, while the second one approaches the methods from the viewpoint regarding the properties of a good cluster in a directed network. Further, we present methods and metrics for evaluating graph clustering results, demonstrate interesting application domains and provide promising future research directions.

  18. Assessment of Feeder Wall Thinning of Wolsong Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Han Sub [KEPRI, Daejeon (Korea, Republic of)

    2010-05-15

    The reactor of CANDUs of Wolsong Nuclear Power generating station is composed of 380 pressure tubes. The primary heat transport circuit of CANDU connects each pressure tube to headers on the way to and from the steam generators. The feeder is A-106 carbon steel, and suffers from wall thinning by Flow Accelerated Corrosion. Excessive thinning deteriorates the pressure retaining capability of piping so that the minimum allowable thickness of feeder should be maintained throughout the life of feeder. The feeder wall thinning should be monitored by in-service inspection. Knowledge-based inspection strategy needs to be developed since combination of high radiation field and geometric restriction near the tight bend location makes extensive inspection very difficult. A thermo hydraulic assessment using computational fluid dynamics software and feeder wall thinning simulation experiments using plaster of Paris may provide valuable information to understand characteristic features of the feeder wall thinning. Plant in-service inspection database may be another source of valuable information. This paper summarizes a review of feeder wall thinning in Wolsong CANDU station. W-1 feeder suffered significant thinning so that it is being replaced along with the plant refurbishment campaign. The other units, W-2approx4, are still in the early portion of their operation life. A result of feeder wall thinning simulation test using plaster of Paris is presented. The knowledge presented in this paper is important information to design a knowledge-based in-service inspection program of feeder wall thinning

  19. A Survey of Network-On-Chip Tools

    Directory of Open Access Journals (Sweden)

    Ahmed Ben Achballah

    2013-10-01

    Full Text Available Nowadays System-On-Chips (SoCs have evolved considerably in term of performances, reliability and integration capacity. The last advantage has induced the growth of the number of cores or Intellectual Properties (IPs in a same chip. Unfortunately, this important number of IPs has caused a new issue which is the intra-communication between the elements of a same chip. To resolve this problem, a new paradigm has been introduced which is the Network-On-Chip (NoC. Since the introduction of the NoC paradigm in the last decade, new methodologies and approaches have been presented by research community and many of them have been adopted by industrials. The literature contains many relevant studies and surveys discussing NoC proposals and contributions. However, few of them have discussed or proposed a comparative study of NoC tools. The objective of this work is to establish a reliable survey about available design, simulation or implementation NoC tools. We collected an important amount of information and characteristics about NoC dedicated tools that we will present throughout this survey. This study is built around a respectable amount of references and we hope it will help scientists.

  20. Data collection for the Sloan Digital Sky Survey - A network-flow heuristic

    Energy Technology Data Exchange (ETDEWEB)

    Lupton, R.; Miller Maley, F. [Princeton Univ., NJ (United States); Young, N. [Dartmouth College, Hanover, NH (United States)

    1996-12-31

    This note describes a combinatorial optimization problem arising in the Sloan Digital Sky Survey and an effective heuristic for the problem that has been implemented and will be used in the Survey. The heuristic is based on network flow theory.

  1. Survey of buffer management policies for delay tolerant networks

    OpenAIRE

    Sweta Jain; Meenu Chawla

    2014-01-01

    Delay tolerant networks (DTN) are a class of networks that are a subset of the traditional mobile ad-hoc networks. It differs from mobile ad hoc networks (MANETs) in the sense that it can withstand high delays in delivering data because of frequent network partitions, limited bandwidth and storage constraints persisting in such networks. Owing to these inherent characteristics of the delay tolerant networks improving delivery ratio in such networks depends on two main factors-use of routing s...

  2. Game Theory for Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Shi, Hai-Yan; Wang, Wan-Liang; Kwok, Ngai-Ming; Chen, Sheng-Yong

    2012-01-01

    Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field. PMID:23012533

  3. A Survey on Secure Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shihong Zou

    2017-01-01

    Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.

  4. Game theory for Wireless Sensor Networks: a survey.

    Science.gov (United States)

    Shi, Hai-Yan; Wang, Wan-Liang; Kwok, Ngai-Ming; Chen, Sheng-Yong

    2012-01-01

    Game theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs). This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field.

  5. Game Theory for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Ngai-Ming Kwok

    2012-07-01

    Full Text Available Game theory (GT is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of wireless sensor networks (WSNs. This article surveys the recent developments and findings of GT, its applications in WSNs, and provides the community a general view of this vibrant research area. We first introduce the typical formulation of GT in the WSN application domain. The roles of GT are described that include routing protocol design, topology control, power control and energy saving, packet forwarding, data collection, spectrum allocation, bandwidth allocation, quality of service control, coverage optimization, WSN security, and other sensor management tasks. Then, three variations of game theory are described, namely, the cooperative, non-cooperative, and repeated schemes. Finally, existing problems and future trends are identified for researchers and engineers in the field.

  6. Harvesting Ambient Environmental Energy for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Gongbo Zhou

    2014-01-01

    Full Text Available In recent years, wireless sensor networks (WSNs have grown dramatically and made a great progress in many applications. But having limited life, batteries, as the power sources of wireless sensor nodes, have restricted the development and application of WSNs which often requires a very long lifespan for better performance. In order to make the WSNs prevalent in our lives, an alternative energy source is required. Environmental energy is an attractive power source, and it provides an approach to make the sensor nodes self-powered with the possibility of an almost infinite lifetime. The goal of this survey is to present a comprehensive review of the recent literature on the various possible energy harvesting technologies from ambient environment for WSNs.

  7. Feeders of Free-Roaming Cats: Personal Characteristics, Feeding Practices, and Data on Cat Health and Welfare in an Urban Setting of Israel.

    Science.gov (United States)

    Gunther, Idit; Raz, Tal; Even Zor, Yehonatan; Bachowski, Yuval; Klement, Eyal

    2016-01-01

    Cat feeders serve as an important source of available food for free-roaming cats (FRCs) and can play a central role in providing data on FRC distribution, welfare, and health. Data on cat feeder personalities as well as a better understanding of their feeding practices offer relevance for decision making concerning FRC population control strategies. The current study surveyed 222 FRC feeders who responded to a municipal trap-neuter-return (TNR) campaign in an Israeli central urban setting. The aim of the study was to describe their personal characteristics, feeding practices, and the FRC populations they feed. Feeders were divided into four groups according to the number of cats they claimed to feed per day (group 1: fed up to 5 cats, group 2: fed 6-10 cats, group 3: fed 11-20 cats, and group 4: fed ≥21 cats). Most feeders were women (81%), with a median age of 58 years (range 18-81). The feeders reported an overall feeding of 3337 cats in 342 different feeding locations. Feeders of group 4 comprised 15.31% (n = 34) of all feeders but fed 56% (n = 1869) of the FRC in 37.42% (n = 128) of the feeding locations. "Heavy" feeders (groups 3 and 4) reported that they traveled significantly longer distances in order to feed the cats. Commercial dry food consisted of 90% of the food they provided, with 66% of them feeding once a day, with less food per cat per day than the other feeder groups. Interestingly, "heavy" feeders were usually singles, had on average fewer siblings, a clear preference for owning cats as pets, and lived in lower income neighborhoods. According to the feeders' reports on the FRC populations they fed, 69.7% (2325/3337) cats were neutered and 11.8% (395/3337) were kittens. In addition, they reported that 1.6% (54/3337) of the cats were limping, 2% (67/3337) suffered from a systemic disease, 4% (135/3337) had skin lesions, and 3.9% (130/3337) were suffering from a chronic disability. Abundance of kittens and morbidity rate were

  8. Photovoltaic power plant as FACTS devices in multi-feeder systems

    OpenAIRE

    2011-01-01

    This paper illustrates possible configurations for a large-scale photovoltaic power plant (PV), to operate as a FACTS (flexible AC transmission system) device in addition to operating as a source of renewable power generation. The inverters in PV plant are reconfigured in such a way that two or more distribution networks/feeders are interconnected. This newly developed system where inverter modules are connected in back to back is addressed as Interline-PV (I-PV) system. Based on the inverter...

  9. Analysis of the U.S. geological survey streamgaging network

    Science.gov (United States)

    Scott, A.G.

    1987-01-01

    This paper summarizes the results from the first 3 years of a 5-year cost-effectiveness study of the U.S. Geological Survey streamgaging network. The objective of the study is to define and document the most cost-effective means of furnishing streamflow information. In the first step of this study, data uses were identified for 3,493 continuous-record stations currently being operated in 32 States. In the second step, evaluation of alternative methods of providing streamflow information, flow-routing models, and regression models were developed for estimating daily flows at 251 stations of the 3,493 stations analyzed. In the third step of the analysis, relationships were developed between the accuracy of the streamflow records and the operating budget. The weighted standard error for all stations, with current operating procedures, was 19.9 percent. By altering field activities, as determined by the analyses, this could be reduced to 17.8 percent. The existing streamgaging networks in four Districts were further analyzed to determine the impacts that satellite telemetry would have on the cost effectiveness. Satellite telemetry was not found to be cost effective on the basis of hydrologic data collection alone, given present cost of equipment and operation.This paper summarizes the results from the first 3 years of a 5-year cost-effectiveness study of the U. S. Geological Survey streamgaging network. The objective of the study is to define and document the most cost-effective means of furnishing streamflow information. In the first step of this study, data uses were identified for 3,493 continuous-record stations currently being operated in 32 States. In the second step, evaluation of alternative methods of providing streamflow information, flow-routing models, and regression models were developed for estimating daily flows at 251 stations of the 3, 493 stations analyzed. In the third step of the analysis, relationships were developed between the accuracy of the

  10. Load Balancing in Wireless Mesh Network: a Survey

    Directory of Open Access Journals (Sweden)

    Maryam Asgari

    Full Text Available Wireless Mesh network (WMN is a state of the art networking standard for next generation of wireless network. The construction of these networks is basis of a network of wireless routers witch forwarding each other`s packets in a multi-hop manner. All us ...

  11. Survey on the information network for environmental technology transfer; Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    In order to promote the interchange of environmental technologies mainly with developing countries (APEC countries), the concrete survey on construction of the information network for technology transfer was carried out. The useful information about environmental technologies for developing countries are not the latest Japanese information but actual field information in practical use which have been developed on the basis of constant improvements. Developing countries want clean technologies with less environmental burden, and difficult-to-obtain information for small and medium-sized businesses. Data were thus collected mainly in the Chubu district, and the information system was composed of an Internet server and in-house LAN. The system featured by easy retrieval and maintenance of the database was adopted. In addition, Internet connection environment and information needs in developing countries were surveyed. Expansion of the database and information supply, and constant addition of fresh information by continuous maintenance are essential in the future. 6 figs.

  12. A Method for Surveying Control Network Optimization Based on Reliability Properties

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zhenglu; DENG Yong; LUO Changlin

    2007-01-01

    Surveying control network optimization design is related to standards,such as precision,reliability,sensitivity and the cost,and these standards are related closely to each other.A new method for surveying control network simulation optimization design is proposed.This method is based on the inner reliability index of the observation values.

  13. Use of Microsoft HoloLens to survey and visualize buried networks

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Survey and positioning of buried infrastructure networks are crucial issues for their maintenance and a starting point for every new Civil Engineering project. 3DCity is a research & development project which consists in a development of software providing a method for quick underground pipe networks surveying and holographic visualization, by using Microsoft HoloLens devices.

  14. Ornithologists by Design: Kindergarteners Design, Construct, and Evaluate Bird Feeders

    Science.gov (United States)

    Shorter, Angela; Segers, Marcia

    2016-01-01

    How can an engineer design a bird feeder that attracts many birds? This question resulted from kindergarten students' observations of the bird feeders in their school's bird sanctuary. The challenging question is the heart of project-based learning (PBL), a teaching strategy in which students tackle real-world problems and design projects to solve…

  15. Automation Selection and Sequencing of Traps for Vibratory Feeders

    DEFF Research Database (Denmark)

    Mathiesen, Simon; Ellekilde, Lars-Peter

    2017-01-01

    Vibratory parts feeders with mechanical orienting devices are used extensively in the assembly automation industry. Even so, the design process is based on trial-and-error approaches and is largely manual. In this paper, a methodology is presented for automatic design of this type of feeder. The ...

  16. Ornithologists by Design: Kindergarteners Design, Construct, and Evaluate Bird Feeders

    Science.gov (United States)

    Shorter, Angela; Segers, Marcia

    2016-01-01

    How can an engineer design a bird feeder that attracts many birds? This question resulted from kindergarten students' observations of the bird feeders in their school's bird sanctuary. The challenging question is the heart of project-based learning (PBL), a teaching strategy in which students tackle real-world problems and design projects to solve…

  17. Configuration System for Simulation Based Design of Vibratory Bowl Feeders

    DEFF Research Database (Denmark)

    Hansson, Michael; Mathiesen, Simon; Ellekilde, Lars-Peter;

    2016-01-01

    Vibratory bowl feeders are still among the most commonly used production equipment for automated part feeding, where parts are correctly oriented for further manipulation by being conveyed through a set of orienting devices. Designing vibratory bowl feeders involves selecting and sequencing a num...

  18. A Survey of Game Theory in Wireless Sensor Networks Security

    Directory of Open Access Journals (Sweden)

    Shigen Shen

    2011-03-01

    Full Text Available Wireless Sensor Networks (WSNs are becoming an integral part of our lives. There are not widespread applications of WSNs without ensuring WSNs security. Due to the limited capabilities of sensor nodes in terms of computation, communication, and energy, providing security to WSNs is challenging. In fact, the process of implementing WSNs security is adaptive and dynamic, which evolves continually. The essence of attack-defend in WSNs security can be expressed by mutual strategies of interdependence while game theory can be used for the purpose of accounting for interactions among strategies of rational decision makers. Therefore, studying WSNs security with game theory has higher scientificity and rationality. This paper presents a survey of security approaches based on game theory in WSNs. According to different applications, a taxonomy is proposed, which divides current existing typical game-theoretic approaches for WSNs security into four categories: preventing Denial of Services (DoS attacks, intrusion detection, strengthening security, and coexistence with malicious sensor nodes. The main ideas of each approach are overviewed while advantages and disadvantages of various approaches are discussed. Then, this paper overviews related work and highlights the difference from other surveys, and points out some future research areas for ensuring WSNs security based on game theory, including Base Station (BS credibility, Intrusion Detection System (IDS efficiency, WSNs mobility, WSNs Quality of Service (QoS, real-world applicability, energy consumption, sensor nodes learning, and expanding game theory applications and different games. Thus, a global view of WSNs security approaches based on game theory is provided. To our best knowledge of knowing, it is the first paper centrally focusing on game theory in WSNs security. It will make the researchers a better understanding of game-theoretic solutions to WSNs security and further research directions.

  19. Operating System Support for High-performance Networking:a Survey

    Institute of Scientific and Technical Information of China (English)

    LIU Zhi-qing; WANG Peng

    2004-01-01

    Crucial applications require direct and efficient access to emerging high-performance networks. This paper surveys the networking subsystem overhead for high-performance networking and the current operating system techniques to address the overhead. This paper aims to identify a few directions for future research work.

  20. A survey on social networks to determine requirements for Learning Networks for professional development of university staff

    NARCIS (Netherlands)

    Brouns, Francis; Berlanga, Adriana; Fetter, Sibren; Bitter-Rijpkema, Marlies; Van Bruggen, Jan; Sloep, Peter

    2009-01-01

    Brouns, F., Berlanga, A. J., Fetter, S., Bitter-Rijpkema, M. E., Van Bruggen, J. M., & Sloep, P. B. (2011). A survey on social networks to determine requirements for Learning Networks for professional development of university staff. International Journal of Web Based Communities, 7(3), 298-311.

  1. The Sloan Digital Sky Survey Standard Star Network

    Science.gov (United States)

    Smith, J. A.; Tucker, D. L.; Chen, B.; Neilsen, E.; Uomoto, A.; Briggs, J. W.; Brinkmann, J.; Fukugita, M.; Gunn, J. E.; Ichikawa, T.; Jorgensen, A. M.; Laubscher, B. E.; Rave, H.; Richmond, M. W.; SDSS Collaboration

    2000-12-01

    We present the newly established standard star network for the u'g'r'i'z' filter system which is being used by Sloan Digital Sky Survey (SDSS). The 164 calibrated stars were chosen to be roughly distributed around the northern sky with a few south of the equator. The stars were selected to give a color range (red and blue) at each location to assist in atmospheric color term derivation and monitoring. All of these initial stars are bluer than ~dM3 as required by the science requirements of the SDSS. Plans for finalizing a larger set of secondary stars observed in each field, redder northern standards and southern hemisphere stars will also be presented. The SDSS is a joint project of The University of Chicago, Fermilab, the Institute for Advanced Study, the Japan Participation Group, The Johns Hopkins University, the Max-Plank-Institut für Astronomie, Princeton University, the United States Naval Observatory, and the University of Washington. Apache Point Observatory, site of teh SDSS, is operated by the Astrophysical Research Consortium. Funding for the project has been provided by the Alfred P. Sloan Foundation, the SDSS member institutions, the National Aeronautics and Space Administration, the National Science Foundation, the U.S. Department of Energy, and Monbusho, Japan.

  2. The provision of spectrum for feeder links of non-geostationary mobile satellites

    Science.gov (United States)

    Bowen, Robert R.

    1993-01-01

    The possibility of sharing spectrum in the 30/20 GHz band between geostationary fixed-satellite systems and feeder-links of low-earth orbit (LEO) mobile-satellite systems is addressed, taking into account that International Telecommunications Union (ITU) Radio Regulation 2613 would be a factor in such sharing. Interference into each network in both the uplink at 30 GHz and the downlink at 20 GHz is considered. It is determined that if sharing were to take place the mobile-satellite may have to cease transmission often for intervals up to 10 seconds, may have to use high-gain tracking antennas on its spacecraft, and may find it an advantage to use code-division multiple access. An alternate solution suggested is to designate a band 50 to 100 MHz wide at 28 and 18 GHz to be used primarily for feeder links to LEO systems.

  3. The project of automatic feeder of sheet for press

    Science.gov (United States)

    Rzasinski, R.

    2017-08-01

    Currently in the industry on a large scale is used of sheet feeders. Unfortunately, the producers more attention focused on the design of the trays with the use of metal circles. In the production of which it is impossible to use of metal circles it is necessary to provide a solution that meets the requirements of the production. Typically, these solutions are unusual and designed exactly the characteristics of the production. The aim of the project was to design of automated feedes belts for painted sheet steel to workspace eccentric press. The main design criteria: The maximum compact design of feeder; The possibility of adjusting the amount of feeder; Easy to change the operating parameters; Maximum number of items selected (catalog, standard); Easy installation design; The simplicity of installing sheet pile in feeder; Positioning accuracy of sheet; The stable characteristics of static and displacement; Reliability. As part of the work was performed the following tasks: • They developed the concept of sheet feeder, • There have been developed to optimize design solutions, • Presented visualization process and verification of strength, • Construction specification of feeder • Designed control system of feeder.

  4. A Dynamic and Heuristic Phase Balancing Method for LV Feeders

    Directory of Open Access Journals (Sweden)

    Samad Taghipour Boroujeni

    2016-01-01

    Full Text Available Due to the single-phase loads and their stochastic behavior, the current in the distribution feeders is not balanced. In addition, the single-phase loads are located in different positions along the LV feeders. So the amount of the unbalanced load and its location affect the feeder losses. An unbalanced load causes the feeder losses and the voltage drop. Because of time-varying behavior of the single-phase loads, phase balancing is a dynamic and combinatorial problem. In this research, a heuristic and dynamic solution for the phase balancing of the LV feeders is proposed. In this method, it is supposed that the loads’ tie could be connected to all phases through a three-phase switch. The aim of the proposed method is to make the feeder conditions as balanced as possible. The amount and the location of single-phase loads are considered in the proposed phase balancing method. Since the proposed method needs no communication interface or no remote controller, it is inexpensive, simple, practical, and robust. Applying this method provides a distributed and dynamic phase balancing control. In addition, the feasibility of reducing the used switches is investigated. The ability of the proposed method in the phase balancing of the LV feeders is approved by carrying out some simulations.

  5. Optimization of an Improved Intermodal Transit Model Equipped with Feeder Bus and Railway Systems Using Metaheuristics Approaches

    Directory of Open Access Journals (Sweden)

    Mohammad Hadi Almasi

    2016-06-01

    Full Text Available One of the serious concerns in network design is creating an efficient and appropriate network capable of efficiently migrating the passenger’s mode of transportation from private to public. The main goal of this study is to present an improved model for combining the feeder bus network design system and the railway transit system while minimizing total cost. In this study, the imperialist competitive algorithm (ICA and the water cycle algorithm (WCA were employed to optimize feeder bus and railway services. The case study and input data were based on a real transit network in Petaling Jaya, Kuala Lumpur, Malaysia. Numerical results for the proposed model, including the optimal solution, statistical optimization results and the convergence rate, as well as comparisons are discussed in detail.

  6. A Survey on Threats and Security schemes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    P.P.Joby

    2015-01-01

    Full Text Available It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.

  7. Human induced pluripotent stem cells on autologous feeders.

    Directory of Open Access Journals (Sweden)

    Kazutoshi Takahashi

    Full Text Available BACKGROUND: For therapeutic usage of induced Pluripotent Stem (iPS cells, to accomplish xeno-free culture is critical. Previous reports have shown that human embryonic stem (ES cells can be maintained in feeder-free condition. However, absence of feeder cells can be a hostile environment for pluripotent cells and often results in karyotype abnormalities. Instead of animal feeders, human fibroblasts can be used as feeder cells of human ES cells. However, one still has to be concerned about the existence of unidentified pathogens, such as viruses and prions in these non-autologous feeders. METHODOLOGY/PRINCIPAL FINDINGS: This report demonstrates that human induced Pluripotent Stem (iPS cells can be established and maintained on isogenic parental feeder cells. We tested four independent human skin fibroblasts for the potential to maintain self-renewal of iPS cells. All the fibroblasts tested, as well as their conditioned medium, were capable of maintaining the undifferentiated state and normal karyotypes of iPS cells. Furthermore, human iPS cells can be generated on isogenic parental fibroblasts as feeders. These iPS cells carried on proliferation over 19 passages with undifferentiated morphologies. They expressed undifferentiated pluripotent cell markers, and could differentiate into all three germ layers via embryoid body and teratoma formation. CONCLUSIONS/SIGNIFICANCE: These results suggest that autologous fibroblasts can be not only a source for iPS cells but also be feeder layers. Our results provide a possibility to solve the dilemma by using isogenic fibroblasts as feeder layers of iPS cells. This is an important step toward the establishment of clinical grade iPS cells.

  8. A survey of TCP over ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Altman, Eitan; Nain, Philippe

    2005-01-01

    The Transmission Control Protocol (TCP) was designed to provide reliable end-to-end delivery of data over unreliable networks. In practice, most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless ad hoc networks can lead to TCP implemen

  9. Feeder assignment optimization algorithm for multi-head mounter

    Institute of Scientific and Technical Information of China (English)

    Peng YUAN; Yueming HU; Haiming LIU; Hongxia GAO

    2006-01-01

    This paper analyzes optimization algorithms of assembly time for a multi-head mounter. The algorithm in this paper is composed of four steps. First, it assigns the components to feeders based on the "one-to-many mapping".Secondly, it assigns nozzles to heads by making full use of the "on-the-fly nozzle change" heads. Thirdly, it organizes the feeder groups so that the heads can pick and place components group by group. Finally, it assigns feeder groups to slots.The result demonstrates that the algorithm has good performance in practice.

  10. Survey of Security Technologies on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuwei Yang

    2015-01-01

    Full Text Available Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized research progress of sensor network security issues as three aspects, key management, authentication, and secure routing, analyzed and commented on these results advantages and disadvantages and pointed out the future direction of the hot research field.

  11. Survey on Routing Protocols for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Aman Sharma

    2012-02-01

    Full Text Available Different routing protocol perform different role in the underwater sensor network. All routing perform each and specific task into underwater sensor network which responsible for networking problems issue that is why this is the latest way of research. Routing term derived from “route” that means a path a way that perform different terms in underwater sensor network problem related issue. The best part is today many routing protocol are present in the underwater wireless sensor network. Some different attributes comes underwater wireless sensor network like likes high bit error rates, limited band-width, 3D deployment and high propagation delay. This paper is referring to as helpful for giving brief overview about each and every protocol and responsible for entire underwater wireless sensor network

  12. Three-dimensional ocean sensor networks: A survey

    Science.gov (United States)

    Wang, Yu; Liu, Yingjian; Guo, Zhongwen

    2012-12-01

    The past decade has seen a growing interest in ocean sensor networks because of their wide applications in marine research, oceanography, ocean monitoring, offshore exploration, and defense or homeland security. Ocean sensor networks are generally formed with various ocean sensors, autonomous underwater vehicles, surface stations, and research vessels. To make ocean sensor network applications viable, efficient communication among all devices and components is crucial. Due to the unique characteristics of underwater acoustic channels and the complex deployment environment in three dimensional (3D) ocean spaces, new efficient and reliable communication and networking protocols are needed in design of ocean sensor networks. In this paper, we aim to provide an overview of the most recent advances in network design principles for 3D ocean sensor networks, with focuses on deployment, localization, topology design, and position-based routing in 3D ocean spaces.

  13. Three-Dimensional Ocean Sensor Networks: A Survey

    Institute of Scientific and Technical Information of China (English)

    WANG Yu; LIU Yingjian; GUO Zhongwen

    2012-01-01

    The past decade has seen a growing interest in ocean sensor networks because of their wide applications in marine research,oceanography,ocean monitoring,offshore exploration,and defense or homeland security.Ocean sensor networks are generally formed with various ocean sensors,autonomous underwater vehicles,surface stations,and research vessels.To make ocean sensor network applications viable,efficient communication among all devices and components is crucial.Due to the unique characteristics of underwater acoustic channels and the complex deployment environment in three dimensional (3D) ocean spaces,new efficient and reliable communication and networking protocols are needed in design of ocean sensor networks.In this paper,we aim to provide an overview of the most recent advances in network design principles for 3D ocean sensor networks,with focuses on deployment,localization,topology design,and position-based routing in 3D ocean spaces.

  14. Feeders of free-roaming cats: personal characteristics, feeding practices and data on cat health and welfare in an urban setting of Israel

    Directory of Open Access Journals (Sweden)

    Idit eGunther

    2016-03-01

    Full Text Available Cat feeders serve as an important source of available food for free-roaming cats (FRC and can play a central role in providing data on FRC distribution, welfare, and health. Data on cat feeder personalities as well as a better understanding of their feeding practices offer relevance for decision making concerning FRC population control strategies. The current study surveyed 222 FRC feeders who responded to a municipal trap-neuter-return (TNR campaign in an Israeli central urban setting. The aim of the study was to describe their personal characteristics, feeding practices and the FRC populations they feed. Feeders were divided into four groups according to the number of cats they claimed to feed per day (group 1: fed up to five cats; group 2: fed six to 10 cats; group 3: fed 11-20 cats; group 4: fed ≥21 cats. Most feeders were women (81%, with a median age of 58 years (range 18-81. The feeders reported an overall feeding of 3,337 cats in 342 different feeding locations. Feeders of group 4 comprised of 15.31% (n=34 of all feeders, but fed 56% (n=1869 of the FRC in 37.42% (n=128 of the feeding locations. 'Heavy' feeders (groups 3 and 4 reported that they traveled significantly longer distances in order to feed the cats. Commercial dry food consisted of 90% of the food they provided, with 66% of them feeding once a day, with less food per cat per day than the other feeder groups. Interestingly, 'heavy' feeders were usually singles, had on average fewer siblings, a clear preference for owning cats as pets and lived in lower income neighborhoods. According to the feeders' reports on the FRC populations they fed, 69.7% (2325/3337 cats were neutered and 11.8% (395/3337 were kittens. In addition, they reported that 1.6% (54/3337 of the cats were limping, 2% (67/3337 suffered from a systemic disease, 4% (135/3337 had skin lesions, and 3.9% (130/3337 were suffering from a chronic disability. Abundance of kittens and morbidity rate were significantly and

  15. A new angle on microscopic suspension feeders near boundaries.

    Science.gov (United States)

    Pepper, Rachel E; Roper, Marcus; Ryu, Sangjin; Matsumoto, Nobuyoshi; Nagai, Moeto; Stone, Howard A

    2013-10-15

    Microscopic sessile suspension feeders are a critical component in aquatic ecosystems, acting as an intermediate trophic stage between bacteria and higher eukaryotic taxa. Because they live attached to boundaries, it has long been thought that recirculation of the feeding currents produced by sessile suspension feeders inhibits their ability to access fresh fluid. However, previous models for the feeding flows of these organisms assume that they feed by pushing fluid perpendicular to surfaces they live upon, whereas we observe that sessile suspension feeders often feed at an angle to these boundaries. Using experiments and calculations, we show that living suspension feeders (Vorticella) likely actively regulate the angle that they feed relative to a substratum. We then use theory and simulations to show that angled feeding increases nutrient and particle uptake by reducing the reprocessing of depleted water. This work resolves an open question of how a key class of suspension-feeding organisms escapes physical limitations associated with their sessile lifestyle.

  16. Feeder use predicts both acquisition and transmission of a contagious pathogen in a North American songbird.

    Science.gov (United States)

    Adelman, James S; Moyers, Sahnzi C; Farine, Damien R; Hawley, Dana M

    2015-09-22

    Individual heterogeneity can influence the dynamics of infectious diseases in wildlife and humans alike. Thus, recent work has sought to identify behavioural characteristics that contribute disproportionately to individual variation in pathogen acquisition (super-receiving) or transmission (super-spreading). However, it remains unknown whether the same behaviours enhance both acquisition and transmission, a scenario likely to result in explosive epidemics. Here, we examined this possibility in an ecologically relevant host-pathogen system: house finches and their bacterial pathogen, Mycoplasma gallisepticum, which causes severe conjunctivitis. We examined behaviours likely to influence disease acquisition (feeder use, aggression, social network affiliations) in an observational field study, finding that the time an individual spends on bird feeders best predicted the risk of conjunctivitis. To test whether this behaviour also influences the likelihood of transmitting M. gallisepticum, we experimentally inoculated individuals based on feeding behaviour and tracked epidemics within captive flocks. As predicted, transmission was fastest when birds that spent the most time on feeders initiated the epidemic. Our results suggest that the same behaviour underlies both pathogen acquisition and transmission in this system and potentially others. Identifying individuals that exhibit such behaviours is critical for disease management. © 2015 The Author(s).

  17. SAFIRE - a robotic inspection system for CANDU feeders

    Energy Technology Data Exchange (ETDEWEB)

    Buckingham, R. [OC Robotics, Bristol (United Kingdom)

    2011-07-01

    The condition of primary circuit feeder pipes in CANDU reactors is relevant to the commercial viability and plant life. One known wear mechanism is external fretting between feeder pipes and adjacent services or support structures, particularly within the Upper Feeder Cabinet (UFC). Fretting leads to wall thinning which must not exceed certain agreed limits. Chafe shields have been added to protect the feeder pipes. Regular inspections are required of the chafe shields, feeder pipes and other structures that may cause feeder damage. Historically, the dose received by inspectors conducting this work has been significant. For this reason Ontario Power Generation has invested in a remotely operated robot system to conduct visual inspections within the UFC. This system, called SAFIRE for 'Snake-Arm Feeder Inspection Robot Equipment' has been deployed at Pickering during 2010 and 2011 and has been used to inspect areas that are extremely difficult to inspect with existing manual techniques. The 2011 scope of work included inspection of a total of 660 feeder pipes in three UFC quadrants, in two reactors. The full scope was completed over a one-month period in Autumn 2011 in which SAFIRE was used during 23, twelve hour shifts. This included two periods each of 72 hours of continuous operation using multiple teams of operators. SAFIRE is remote controlled delivery system for multiple cameras to record still images and video. The main system elements include a snake-arm robot mounted on a mobile vehicle. It can be controlled from up to 500m away using a fibre/copper connection. The snake-arm is 2.2m long, 25mm wide and has 18 degrees of freedom. It is designed to snake between the rows of feeder pipes to inspect feeder/hanger interfaces, both above and below the feeder cabinet catwalks. Future upgrades offer the potential to add additional tools to increase functionality. This paper describes the SAFIRE development process from inception to operational experience

  18. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  19. A New Angle on Microscopic Suspension Feeders near Boundaries

    OpenAIRE

    Pepper, Rachel E.; Roper, Marcus; Ryu, Sangjin; Matsumoto, Nobuyoshi; Nagai, Moeto; Stone, Howard A.

    2013-01-01

    Microscopic sessile suspension feeders are a critical component in aquatic ecosystems, acting as an intermediate trophic stage between bacteria and higher eukaryotic taxa. Because they live attached to boundaries, it has long been thought that recirculation of the feeding currents produced by sessile suspension feeders inhibits their ability to access fresh fluid. However, previous models for the feeding flows of these organisms assume that they feed by pushing fluid perpendicular to surfaces...

  20. Nearby boundaries create eddies near microscopic filter feeders

    OpenAIRE

    Pepper, Rachel E.; Roper, Marcus; Ryu, Sangjin; Matsudaira, Paul; Stone, Howard A.

    2009-01-01

    We show through calculations, simulations and experiments that the eddies often observed near sessile filter feeders are frequently due to the presence of nearby boundaries. We model the common filter feeder Vorticella, which is approximately 50 µm across and which feeds by removing bacteria from ocean or pond water that it draws towards itself. We use both an analytical stokeslet model and a Brinkman flow approximation that exploits the narrow-gap geometry to predict the size of the eddy cau...

  1. Functional and aesthetic approach to design of bird feeders

    Science.gov (United States)

    Kukhta, A.; Kukhta, M.

    2015-10-01

    Anthropogenic objects which load the urban environment negatively affects the human psyche. The alternative is attracting elements of the natural environment into urban environment, of which some of the most frequently identified are birds. Attracting birds in the city is possible by means of feeders and artificial nests, however, both must be harmonious. The aim of this study is to analyze the essential functions of the feeders, and their integration into the environmental design and development of the city. On this basis an original feeder which is convenient for use by birds and attracts people's attention is developed. In this paper we apply comparative analysis of different types of feeders encountered in Tomsk, bird watching, and evaluate usability of different types of feeders from the position of their convenience both for birds and human beings. Historical-cultural analysis for determining features of the architectural and environmental design of Tomsk is carried out, the method allows us to solve engineering problems. In this study the feeder convenient for bird use is designed which blends harmoniously with the architectural design of Tomsk.

  2. TECHNOLOGICAL SETUP OF A HOPPER FEEDER FOR PIGS

    Directory of Open Access Journals (Sweden)

    Kovalenko V. P.

    2015-05-01

    Full Text Available Constructive-technological parameters of a hopper feeder have been established. They help to synchronize feeder’s flow and feed consumption by animals. Synchronization of these factors eliminates the initial cause of feed loss during fattening. It was found out that the main influence on feed loss is exerted by shape and geometrical parameters of feedstuff fill at the bottom of feeder, which depend on their physical and mechanical properties and on the feedstuff level in a hopper feeder. The fill balance condition at the bottom of a feeder is provided by compensation of feedstuff weight pressure inside a hopper due to the weight of a surcharge layer. The thickness of layer is proportional to the height of feedstuff volume inside a hopper and does not depend on technological gap between discharging feed line and the bottom of a feeder. It is found out that the discharging feedstuff is distributed throughout the bottom of a feeder. There is a central nonmoving area in the cone shape in alignment with the axis of the discharging feed line. This area functions as a shutter, which reduces the effective area of discharging channel. It is determined that the flow of feedstuff is set by adjusting the technological gap between discharging feed line and its bottom within defined limits. In accordance with physical and mechanical properties of feed this dependence of feedstuff flow allows to determine corresponding functional parameters of discharging feed line in order to meet the needs of a group of fattening animals

  3. Outlier Detection Techniques For Wireless Sensor Networks: A Survey

    NARCIS (Netherlands)

    Zhang, Y.; Meratnia, Nirvana; Havinga, Paul J.M.

    2008-01-01

    In the field of wireless sensor networks, measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are

  4. Social Networking in School Psychology Training Programs: A Survey of Faculty and Graduate Students

    Science.gov (United States)

    Pham, Andy V.; Goforth, Anisa N.; Segool, Natasha; Burt, Isaac

    2014-01-01

    The increasing use of social networking sites has become an emerging focus in school psychology training, policy, and research. The purpose of the current study is to present data from a survey on social networking among faculty and graduate students in school psychology training programs. A total of 110 faculty and 112 graduate students in school…

  5. Network Structure Inference, A Survey: Motivations, Methods, and Applications

    CERN Document Server

    Brugere, Ivan; Berger-Wolf, Tanya Y

    2016-01-01

    Networks are used to represent relationships between entities in many complex systems, spanning from online social networks to biological cell development and brain activity. These networks model relationships which present various challenges. In many cases, relationships between entities are unambiguously known: are two users friends in a social network? Do two researchers collaborate on a published paper? Do two road segments in a transportation system intersect? These are unambiguous and directly observable in the system in question. In most cases, relationship between nodes are not directly observable and must be inferred: does one gene regulate the expression of another? Do two animals who physically co-locate have a social bond? Who infected whom in a disease outbreak? Existing approaches use specialized knowledge in different home domains to infer and measure the goodness of inferred network for a specific task. However, current research lacks a rigorous validation framework which employs standard stat...

  6. 配网馈线自动化开关安装位置及保护定值整定探讨%Discussion on the Installation Position of Automatic Switch of the Feeder Line of Distribution Network and Protection Setting

    Institute of Scientific and Technical Information of China (English)

    王荣; 喻亮亮; 龚宇亮; 陈天一

    2014-01-01

    This paper discussed and analyzed the instal ation position of automatic switch of the feeder line, at the same time, analyzing the numerical set ing protection of the relay of the automatic switch of feeder line, hoping to provide a refe-rence for the instal ation and running of the installation po-sition of automatic switch of the feeder line of distribution ne-twork.%本文对馈线自动化开关安装位置进行了探讨与分析,同时对馈线上的自动化开关继电保护定值整定进行了分析,希望能为配网馈线自动化开关的安装及运行提供参考。

  7. Survey of Promising Technologies for 5G Networks

    Directory of Open Access Journals (Sweden)

    Nam Tuan Le

    2016-01-01

    Full Text Available As an enhancement of cellular networks, the future-generation 5G network can be considered an ultra-high-speed technology. The proposed 5G network might include all types of advanced dominant technologies to provide remarkable services. Consequently, new architectures and service management schemes for different applications of the emerging technologies need to be recommended to solve issues related to data traffic capacity, high data rate, and reliability for ensuring QoS. Cloud computing, Internet of things (IoT, and software-defined networking (SDN have become some of the core technologies for the 5G network. Cloud-based services provide flexible and efficient solutions for information and communications technology by reducing the cost of investing in and managing information technology infrastructure. In terms of functionality, SDN is a promising architecture that decouples control planes and data planes to support programmability, adaptability, and flexibility in ever-changing network architectures. However, IoT combines cloud computing and SDN to achieve greater productivity for evolving technologies in 5G by facilitating interaction between the physical and human world. The major objective of this study provides a lawless vision on comprehensive works related to enabling technologies for the next generation of mobile systems and networks, mainly focusing on 5G mobile communications.

  8. Graphical methods for analysing feedback in biological networks - A survey

    Science.gov (United States)

    Radde, Nicole; Bar, Nadav S.; Banaji, Murad

    2010-01-01

    Observed phenotypes usually arise from complex networks of interacting cell components. Qualitative information about the structure of these networks is often available, while quantitative information may be partial or absent. It is natural then to ask what, if anything, we can learn about the behaviour of the system solely from its qualitative structure. In this article we review some techniques which can be applied to answer this question, focussing in particular on approaches involving graphical representations of model structure. By applying these techniques to various cellular network examples, we discuss their strengths and limitations, and point to future research directions.

  9. Head teacher professional networks in Italy: preliminary results of a national survey

    Directory of Open Access Journals (Sweden)

    Maurissens Isabel de

    2016-06-01

    Full Text Available In this article, we present the preliminary results of a national survey conducted by INDIRE on head teachers communities and professional networks. About one-fourth of the total population of Italian public school leaders participated in the survey. One of the main intents of this research is to contribute to understanding of the phenomenon of professional networks frequented by school leaders and to pave the way for a further reflection on how to use such networks for head teachers’ training so as to support their daily professional practice conducted too often in isolation.

  10. Efficient Resource Management for Multicast Ad Hoc Networks: Survey

    Directory of Open Access Journals (Sweden)

    Amit Chopra

    2016-09-01

    Full Text Available Group communication over multicast ad hoc network suffers from insufficient utilization of limited resources, i.e. shared channel, battery, data processing capabilities and storage space etc. Multicast routing protocol should be able to manage all these resources because their consumption depends upon different factors, i.e. Unicast/Multicast network operations, dynamic topology due to mobility, control overhead due to scalability, packet loss and retransmission due to collision and congestion etc. All these factors may cause unnecessary network load, delay and unfair resource utilization. However, multicast ad hoc routing protocols are more efficient than Unicast routing protocols, but they also suffer from performance degradation factors discussed above. Researchers have developed various layer wise solutions for resource optimization. In this paper, we will explore the different schemes for fair utilization of network resources.

  11. a survey of security vulnerabilities in wireless sensor networks

    African Journals Online (AJOL)

    user

    Sensor networks offer a powerful combination of distributed sensing, computing and communications. They lend ... These tiny sensor nodes, consisting of sensing, data ... base station (or gateway) which in turn sends it to the user as shown in ...

  12. Wireless Networks with RF Energy Harvesting: A Contemporary Survey

    OpenAIRE

    Lu, Xiao; Wang,Ping; Niyato, Dusit; Kim, Dong In; Han, Zhu

    2014-01-01

    Radio frequency (RF) energy transfer and harvesting techniques have recently become alternative methods to power the next generation wireless networks. As this emerging technology enables proactive energy replenishment of wireless devices, it is advantageous in supporting applications with quality of service (QoS) requirement. In this paper, we present an extensive literature review on the research progresses in wireless networks with RF energy harvesting capability, referred to as RF energy ...

  13. A Survey of Encroachment Disclosure in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Sushma J. Gaurkar

    2013-02-01

    Full Text Available In wireless sensor network (WSN security is the major issuebecause of its hostile nature. The traditional intrusion detectiontechnique and traditional access control will not providereliability and security if they do not work cooperatively. If thesecurity is compromised, there could be serious consequencesstarting from theft of information, loss of privacy and reachingeven bankruptcy of that institution. In this paper a brief surveyon some recent intrusion detection technique & access controlmechanism in wireless sensor network is presented anddiscusses them in detail.

  14. Survey of Green Radio Communications Networks: Techniques and Recent Advances

    Directory of Open Access Journals (Sweden)

    Mohammed H. Alsharif

    2013-01-01

    Full Text Available Energy efficiency in cellular networks has received significant attention from both academia and industry because of the importance of reducing the operational expenditures and maintaining the profitability of cellular networks, in addition to making these networks “greener.” Because the base station is the primary energy consumer in the network, efforts have been made to study base station energy consumption and to find ways to improve energy efficiency. In this paper, we present a brief review of the techniques that have been used recently to improve energy efficiency, such as energy-efficient power amplifier techniques, time-domain techniques, cell switching, management of the physical layer through multiple-input multiple-output (MIMO management, heterogeneous network architectures based on Micro-Pico-Femtocells, cell zooming, and relay techniques. In addition, this paper discusses the advantages and disadvantages of each technique to contribute to a better understanding of each of the techniques and thereby offer clear insights to researchers about how to choose the best ways to reduce energy consumption in future green radio networks.

  15. A New Optimization Framework To Solve The Optimal Feeder Reconfiguration And Capacitor Placement Problems

    Directory of Open Access Journals (Sweden)

    Mohammad-Reza Askari

    2015-07-01

    Full Text Available Abstract This paper introduces a new stochastic optimization framework based bat algorithm BA to solve the optimal distribution feeder reconfiguration DFR as well as the shunt capacitor placement and sizing in the distribution systems. The objective functions to be investigated are minimization of the active power losses and minimization of the total network costs an. In order to consider the uncertainties of the active and reactive loads in the problem point estimate method PEM with 2m scheme is employed as the stochastic tool. The feasibility and good performance of the proposed method are examined on the IEEE 69-bus test system.

  16. Experience with the ULISS-30 inertial survey system for local geodetic and cadastral network control

    Science.gov (United States)

    Forsberg, Rene

    1991-09-01

    The capability of the recently developed SAGEM ULISS-30 inertial survey system for performing local surveys at high accuracies have been tested in a field campaign carried out November 1989 on the island of Fyn, Denmark, in cooperation with the Swedish National Land Survey. In the test a number of lines between existing national geodetic control points were surveyed, along with points in the less reliably determined cadastral network, forming an irregular network pattern of 10 15 km extent. The survey involved frequent offset measurements (up to 50 100 m) with an ISS-integrated total station. The profile geometries were not particularly suited for inertial surveys, with narrow and rather winding roads, necessitating frequent vehicle turns. In addition to the pure inertial surveys a kinematic GPS/inertial test was also carried out, using a pair of Ashtech L-XII receivers. The inertial survey results, analyzed with a smoothing algoritm utilizing common points on forward/backward runs, indicate that 5-cm accuracies are possible on reasonably straight profiles of 5 km length, corresponding to a 10 ppm “best-case” accuracy for double-run traverses. On longer, more winding traverses error levels of 10 20 cm are typical. To handle the inertial data optimally, proper network adjustments are required. A discussion of suitable adjustment models of both conventional and collocation type is included in the paper.

  17. A Survey on Energy Efficiency for Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Sarra Mamechaoui

    2013-04-01

    Full Text Available Reduction of CO2 emissions is a major global environmental issue. Over the past few years, wireless andmobile communications are becoming increasingly popular with consumers. The Most popular kind ofwireless access is known as Wireless Mesh Networks (WMNs that provide wireless connectivity throughlot cheaper and more supple backhaul infrastructure relative to wired solutions. Wireless Mesh Network(WMN is a new emerging technology which has been adopted as the wireless internetworking solution forthe near future. Due to higher energy consumption in the information and communication technology (ICTindustries, and which would have an impact on the environment, energy efficiency has become a key factorto evaluate the performance of a communication network.This paper primarily focuses on the classification layer the greatest existing approaches devoted to theconservation of energy. It is also discussing the most interesting works on energy saving in WMNsnetworks.

  18. Seismic analysis of ITER fourth PF (Poloidal Field Coil) feeder

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Sumei, E-mail: smliu@ipp.ac.cn [School of Engineering, Anhui Agricultural University, Hefei 230036 (China); Institute of Plasma Physics, Chinese Academy of Science, Hefei 230031 (China); Chen, Wei [School of Engineering, Anhui Agricultural University, Hefei 230036 (China); Song, Yuntao; Ni, Xiaojun; Wang, Zhongwei [Institute of Plasma Physics, Chinese Academy of Science, Hefei 230031 (China); Chen, Yonghua; Gong, Chenyu [Magnet Division, TKM, ITER Organization, Route de Vinon sur Verdon, 13115 St. Paul Lez Durance (France)

    2014-10-15

    The ITER feeder systems connect the ITER magnet systems located inside the main cryostat to the cryo-plant, power-supply and control system interfaces outside the cryostat. The main purpose of the feeders is to convey the cryogenic supply and electrical power to the coils as well as house the instrumentation wiring. The PF busbar which carries 52 kA current will suffer from high Lorentz force due to the background magnetic field inspired by the coils and the self-field between every pair of busbars. Except their mechanical strength and thermal insulation performance must be achieved, the dynamic mechanism on PF structure should be assessed. This paper presents the simulation and seismic analysis on ITER 4th PF feeder including the Coil Terminal Box and S-bend Box (CTB and SBB), the Cryostat Feed-through (CFT), the In-Cryostat-Feeder (ICF), especially for the ground supports and main outer-tube firstly. This analysis aims to study seismic resistance on system design under local seismograms with floor response spectrum, the structural response vibration mode and response duration results of displacement, membrane stress, and bending stress on structure under different directions actuating signals were obtained by using the single-seismic spectrum analysis and Dead Weight analysis respectively. Based on the simulative and analytical results, the system seismic resistance and the integrity of the support structure in the 4th PF feeder have been studied and the detail design confirmed.

  19. Survey on Routing Protocol in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    R.Devika

    2013-02-01

    Full Text Available The Wireless Sensor Network (WSN is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. WSN are generally used to monitor activities and report events, such as fire, overheating etc. in a specific area or environment. It routs data back to the Base Station (BS. Data transmission is usually a multi-hop from node to nodetowards the BS. Sensor nodes are limited in power, computational and communication bandwidth. Primary goal of researchers is to find the energy efficient routing protocol. This study highlights the different routing protocol with advantages and limitations.

  20. Displacement Analysis of Building Movement by using the Survey of Align Network at KOMAC

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dae-Il; Seo, Dong-Hyuk; Ahn, Tae-Sung; Kwon, Hyeok-Jung; Kim, Han-Sung; Cho, Yong-Sub [Korea Atomic Energy Research Institute, Gyeongju (Korea, Republic of)

    2014-10-15

    100MeV proton linac has been operated and provided to beam users in KOMAC (Korea Multi-purpose Accelerator Complex). Proton linac is composed of a 50keV proton injector, a 3MeV RFQ, 20MeV DTL tanks, 100MeV DTL tanks, beam dump and beam line for 20MeV and 100MeV. To align the accelerator components, the align networks based on reference point were installed on the wall inside tunnel. The survey works of align networks were accomplished by using the laser tracker. In this paper, the survey of align networks is performed and its results are presented. In recent survey of align networks, it was monitored to move the locations. The analysis of displacement was confirmed by compare the align networks. This analysis was used to re-align the accelerator components which can be compensated location of reference points. The displacement monitoring should be performed during the long-term period and need to find the other method for real-time, not the survey of align networks.

  1. A Survey on Terrorist Network Mining: Current Trends and Opportunities

    Directory of Open Access Journals (Sweden)

    Akhilesh Tiwari

    2012-09-01

    Full Text Available Along with the modernization and widespread usage of Internet, the security of the mankind has become one of the major issues today. The threat of human society from the terrorists is the challenge faced dominantly. Advancement in the technology has not only helped the common people for the growth but also these inhuman people to adversely affect the society with sophisticated techniques. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed and detected. To achieve this, the law enforcement agencies are using data mining techniques as one of the effective solution. One such technique of data mining is Social network analysis which studies terrorist networks for the identification of relationships and associations that may exist between terrorist nodes. Terrorist activities can also be detected by means of analyzing Web traffic content. This paper studies social network analysis, web traffic content and explores various ways foridentifying terrorist activities.

  2. Survey and benchmark of block ciphers for wireless sensor networks

    NARCIS (Netherlands)

    Law, Yee Wei; Doumen, Jeroen; Hartel, Pieter

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. In this paper, we have identified the candidates of block ciphers

  3. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. In this paper, we have identified the candidates of block ciphers

  4. The Power Grid as a complex network : A survey

    NARCIS (Netherlands)

    Pagani, Giuliano Andrea; Aiello, Marco

    2013-01-01

    The statistical tools of Complex Network Analysis are of useful to understand salient properties of complex systems, may these be natural or pertaining human engineered infrastructures. One of these that is receiving growing attention for its societal relevance is that of electricity distribution. I

  5. Survey of Attacks on Mobile AdhocWireless Networks

    Directory of Open Access Journals (Sweden)

    Vikas Solomon Abel

    2011-02-01

    Full Text Available Security has always been a key issue with wireless networks since there are no physical boundaries. Experience has shown numerous vulnerabilities to a variety of attacks even when security measures are in place. In the combined Internet-MANET environment also security is an important issue keeping in view the Internet connectivity and attack on the MANET protocols.

  6. A Survey of Indoor Positioning Systems for Wireless Personal Networks

    NARCIS (Netherlands)

    Gu, Y.; Lo, A.; Niemegeers, I.

    2009-01-01

    Recently, indoor positioning systems (IPSs) have been designed to provide location information of persons and devices. The position information enables location-based protocols for user applications. Personal networks (PNs) are designed to meet the users' needs and interconnect users' devices equipp

  7. A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop.

    Science.gov (United States)

    Zhang, Lifu; Zhang, Heng

    2016-03-26

    Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have received increasing attention from many inter-disciplines. Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients. This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop. This paper also discusses several future research directions under these two umbrellas.

  8. A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop

    Directory of Open Access Journals (Sweden)

    Lifu Zhang

    2016-03-01

    Full Text Available Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have received increasing attention from many inter-disciplines. Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients. This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop. This paper also discusses several future research directions under these two umbrellas.

  9. The coverage problem in video-based wireless sensor networks: a survey.

    Science.gov (United States)

    Costa, Daniel G; Guedes, Luiz Affonso

    2010-01-01

    Wireless sensor networks typically consist of a great number of tiny low-cost electronic devices with limited sensing and computing capabilities which cooperatively communicate to collect some kind of information from an area of interest. When wireless nodes of such networks are equipped with a low-power camera, visual data can be retrieved, facilitating a new set of novel applications. The nature of video-based wireless sensor networks demands new algorithms and solutions, since traditional wireless sensor networks approaches are not feasible or even efficient for that specialized communication scenario. The coverage problem is a crucial issue of wireless sensor networks, requiring specific solutions when video-based sensors are employed. In this paper, it is surveyed the state of the art of this particular issue, regarding strategies, algorithms and general computational solutions. Open research areas are also discussed, envisaging promising investigation considering coverage in video-based wireless sensor networks.

  10. Collecting Family Health History using an Online Social Network: a Nationwide Survey among Potential Users

    Science.gov (United States)

    Welch, Brandon M.; O’Connell, Nathaniel S.; Qanungo, Suparna; Halbert-Hughes, Chanita; Schiffman, Joshua D.

    2015-01-01

    Family health history (FHx) is one of the most important risk factors for disease. Unfortunately, collection and use of FHx is under-utilized in the clinical setting. Efforts to improve collection of FHx have had minimal impact. A novel approach to collect FHx using social networking capabilities is being explored. We conducted a nationwide survey of 5,258 respondents to 1- assess the interest in using an online social network for FHx, 2- identify if such a tool would have clinical utility, and 3- identify notable trends and potential concerns. We found survey respondents to be very supportive of the proposed approach and interesting trends related to age, education, and race were identified. Results from this survey will be used to guide future research and development of a proposed FHx social network application. PMID:26958272

  11. Holes Detection in Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Smita Karmakar

    2014-04-01

    Full Text Available Now a day’s, it has been a great idea of research on using Wireless Sensor Networks (WSNs to assist in the initial deployment of sensor nodes. Hole problem in WSNs is the most fundamental Problem in WSNs. Hole means a communication gap in WSNs. Finding an optimal sensor deployment strategy that would minimize the cost, reduce the node failure and also reduce the communication overhead. Then it provides a maximum degree of area coverage with lower cost of deployment of sensor nodes, best possible communication and maintaining the network connectivity. However, it increases the quality of service in WSNs that is extremely challenging. In this article, we present various types of holes, a comparative study of various types of holes and various types of coverage holes. At the end, we proposed an Algorithm to detect hole. In this paper, we aim to give the solution of hole problems of area coverage in WSNs.

  12. A Survey: variants of TCP in Ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Komal Zaman

    2013-11-01

    Full Text Available MANET (Mobile Ad-hoc network forms a temporary network of wireless mobile nodes without any infrastructure where all nodes are allowed to move freely, configure themselves and interconnect with its neighbors to perform peer to peer communication and transmission. TCP (Transmission Control Protocol offers reliable, oriented connection and mechanism of end to end delivery. This article provides the review and comparison of existing variants of TCP for instance: The TCP Tahoe, The TCP Reno, The TCP New Reno, The Lite, The Sack, The TCP Vegas, Westwood and The TCP Fack. TCP’s performance depends on the type of its variants due to missing of congestion control or improper activation procedures such as Slow Start, Fast Retransmission, and Congestion Avoidance, Retransmission, Fast Recovery, Selective Acknowledgement mechanism and Congestion Control. This analysis is essential to be aware about a better TCP implementation for a specific scenario and then nominated a suitable one.

  13. Neural Network based Software Effort Estimation: A Survey

    OpenAIRE

    Muhammad Waseem Khan; Imran Qureshi

    2014-01-01

    Software effort estimation is used to estimate how many resources and how many hours are required to develop a software project. The accurate and reliable prediction is the key to success of a project. There are numerous mechanisms in software effort estimation but accurate prediction is still a challenge for the researchers and software project managers. In this paper, the use of Neural Network techniques for Software Effort Estimation is discussed and evaluate on the basis of MMRE and Predi...

  14. Dynamic power control for wireless backbone mesh networks: a survey

    CSIR Research Space (South Africa)

    Olwal, TO

    2010-01-01

    Full Text Available advantages, such as low up-front cost, easy network maintenance, robustness, and reliable service coverage. Second, the WMRs provide redundant paths between the sender and the receiver of the wireless connection. This feature provides path reliability.... The advantage of the third-order algorithms over the second order algorithms appeared to eliminate the slight overshoot observed in early iterations. It should be noted that CDMA cell model requires centralized arbiter and thus procedure on how independent...

  15. Stature System Protocols for Peer to Peer Networks: A Survey

    OpenAIRE

    Ankita Thadani; Vinit Gupta; IndraJeet Rajput

    2014-01-01

    There are various websites presently used by us so the situation arises where people transact with unknown agents and take decision for these agents for by considering the stature score. Central idea of this paper is to compare online stature reporting systems that are particularly suitable for the peer to peer network but uses different approaches for calculating the stature of an entity. This paper describes the working of these stature systems, their properties and various parameters advan...

  16. Technologies to Increase PV Hosting Capacity in Distribution Feeders: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Ding, Fei; Mather, Barry; Gotseff, Peter

    2016-08-01

    This paper studies the distributed photovoltaic (PV) hosting capacity in distribution feeders by using the stochastic analysis approach. Multiple scenario simulations are conducted to analyze several factors that affect PV hosting capacity, including the existence of voltage regulator, PV location, the power factor of PV inverter and Volt/VAR control. Based on the conclusions obtained from simulation results, three approaches are then proposed to increase distributed PV hosting capacity, which can be formulated as the optimization problem to obtain the optimal solution. All technologies investigated in this paper utilize only existing assets in the feeder and therefore are implementable for a low cost. Additionally, the tool developed for these studies is described.

  17. Phased array ultrasonic inspection of feeder welds - regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, B.; Kirkhope, K.; Colligan, L.; Valpy, B.; Stevenson, J. [Canadian Nuclear Safety Commission, Ottawa, Ontario (Canada)

    2011-07-01

    The Canadian Nuclear Safety Commission has accepted the application of Phased Array Ultrasonic Testing (PAUT) in lieu of Radiographic Testing for feeder piping replacement at the Point Lepreau and Bruce A Units 1 and 2 refurbishment projects. Background information regarding the principles and elements of the CNSC regulatory approach for the acceptance of PAUT for feeder installation will be discussed, addressing quality management and regulatory oversight activities focused on inspection reliability and dose reduction. CNSC staff's views for future direction on the application of PAUT in lieu of RT in regulatory framework and codes and standards are also discussed. (author)

  18. Technologies to Increase PV Hosting Capacity in Distribution Feeders

    Energy Technology Data Exchange (ETDEWEB)

    Ding, Fei; Mather, Barry; Gotseff, Peter

    2016-11-14

    This paper studies the distributed photovoltaic (PV) hosting capacity in distribution feeders by using the stochastic analysis approach. Multiple scenario simulations are conducted to analyze several factors that affect PV hosting capacity, including the existence of voltage regulator, PV location, the power factor of PV inverter and Volt/VAR control. Based on the conclusions obtained from simulation results, three approaches are then proposed to increase distributed PV hosting capacity, which can be formulated as the optimization problem to obtain the optimal solution. All technologies investigated in this paper utilize only existing assets in the feeder and therefore are implementable for a low cost. Additionally, the tool developed for these studies is described.

  19. Chinese Surveying and Control Network for Earth-Orbit Satellites and Deep Space Detection

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The relationship between the surveying and control network(CSN) for earth-orbit satellite and spatial geodesy, and the relationship between the CSN for deep space celestial bodies and detectors, and deep space detection are briefly summarized, and so are the basic technical needs of the deep space surveying and control network(DSN). Then, the techniques, the constituents and the distributing of Chinese satellite CSN (CSCSN) and other radio observing establishments in China are introduced. Lastly, with the primary CSCSN and other observing establishments, some projects for China to rebuild a more perfect CSCSN, and to establish a DSN are analyzed and stated.

  20. Optical local area network emulations over Ethernet passive optical networks: A survey

    Institute of Scientific and Technical Information of China (English)

    PENG YunFeng; KUANG YuJun; LONG KePing

    2008-01-01

    As a promising solution to efficiently achieving fiber to the home (FTTH), Ethernet passive optical network (EPON) is currently improved to provide intercommunica-tion among customers, together with normal traffic delivery, via optical local area network emulation. It is a new research direction and expected to enhance the normal EPON performances. The purpose of this article is to review the state-of-the-art solutions to emulating optical local area networks (OLANs) over EPON. We discuss the major problems involved, e.g., network architecture, control mecha-nisms, and other potential enhancements. We also outline areas for future re-searches.

  1. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-07-01

    measure trust of other nodes when they cooperate with each other to detect malicious nodes. Albers et al. [95] proposed a general architecture for an...Issues and Evaluation Considerations,” RFC 2501, Jan . 1999. [2] J. Jubin and J. Tornow, “The DARPA Packet Radio Network Protocols,” Proc. IEEE, vol. 75...no. 1, Jan . 1987, pp. 21-32. [3] A. J. Tardiff and J.W. Gowens, Editors, “ARL Advanced Telecom- munication and Information Distribution Research

  2. STATURE SYSTEM PROTOCOLS FOR PEER TO PEER NETWORKS: A SURVEY

    Directory of Open Access Journals (Sweden)

    Ankita Thadani

    2015-10-01

    Full Text Available There are various websites presently used by us so the situation arises where people transact with unknown agents and take decision for these agents for by considering the stature score. Central idea of this paper is to compare online stature reporting systems that are particularly suitable for the peer to peer network but uses different approaches for calculating the stature of an entity. This paper describes the working of these stature systems, their properties and various parameters advantages and disadvantages. Finally, it concludes by comparison of all these stature system protocols.

  3. Stature System Protocols for Peer to Peer Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Ankita Thadani

    2014-12-01

    Full Text Available There are various websites presently used by us so the situation arises where people transact with unknown agents and take decision for these agents for by considering the stature score. Central idea of this paper is to compare online stature reporting systems that are particularly suitable for the peer to peer network but uses different approaches for calculating the stature of an entity. This paper describes the working of these stature systems, their properties and various parameters advantages and disadvantages. Finally, it concludes by comparison of all these stature system protocols.

  4. A Survey of Key Technology of Network Public Opinion Analysis

    Directory of Open Access Journals (Sweden)

    Li Su Ying

    2016-01-01

    Full Text Available The internet has become an important base for internet users to make comments because of its interactivity and fast dissemination. The outbreak of internet public opinion has become a major risk for network information security. Domestic and foreign researchers had carried out extensive and in-depth study on public opinion. Fruitful results have achieved in the basic theory research and emergency handling and other aspects of public opinion. But research on the public opinion in China is still in the initial stage, the key technology of the public opinion analysis is still as a starting point for in-depth study and discussion.

  5. A survey of trust, control and information in networks

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    This paper focuses on which characteristics managers take into account when they choose and evaluate business partners, and the interrelationship between the constructs trust, control and information. The paper is based on a survey which includes 101 small and middle-sized manufacturing companies...... and information is found. The findings indicate that the three constructs are relevant, and the level of embeddedness is found to influence both the absolute and the relative importance of the three constructs, and thereby the role of management accounting at different development stages of relationships....

  6. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  7. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  8. A Survey on M2M Service Networks

    Directory of Open Access Journals (Sweden)

    Juhani Latvakoski

    2014-11-01

    Full Text Available The number of industrial applications relying on the Machine to Machine (M2M services exposed from physical world has been increasing in recent years. Such M2M services enable communication of devices with the core processes of companies. However, there is a big challenge related to complexity and to application-specific M2M systems called “vertical silos”. This paper focuses on reviewing the technologies of M2M service networks and discussing approaches from the perspectives of M2M information and services, M2M communication and M2M security. Finally, a discussion on technologies and approaches potentially enabling future autonomic M2M service networks are provided. According to our conclusions, it is seen that clear definition of the architectural principles is needed to solve the “vertical silo” problem and then, proceeding towards enabling autonomic capabilities for solving complexity problem appears feasible. Several areas of future research have been identified, e.g., autonomic information based services, optimization of communications with limited capability devices, real-time messaging, creation of trust and end to end security, adaptability, reliability, performance, interoperability, and maintenance.

  9. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  10. Identifying public health policymakers' sources of information: comparing survey and network analyses.

    Science.gov (United States)

    Oliver, Kathryn A; de Vocht, Frank; Money, Annemarie; Everett, Martin

    2017-05-01

    Research suggests that policymakers often use personal contacts to find information and advice. However, the main sources of information for public health policymakers are not known. This study aims to describe policymakers' sources of information. A questionnaire survey of public health policymakers across Greater Manchester (GM) was carried out (response rate 48%). All policy actors above Director level involved in public health policy (finding, analyzing or producing information, producing or implementing policy) in GM were included in the sampling frame. Respondents were provided with a list of sources of information and asked which they used (categorical data) and to name specific individuals who acted as sources of information (network data). Data were analyzed using frequencies and network analysis. The most frequently chosen sources of information from the categorical data were NICE, government websites and Directors of Public Health. However, the network data showed that the main sources of information in the network were actually mid-level managers in the NHS, who had no direct expertise in public health. Academics and researchers did not feature in the network. Both survey and network analyses provide useful insights into how policymakers access information. Network analysis offers practical and theoretical contributions to the evidence-based policy debate. Identifying individuals who act as key users and producers of evidence allows academics to target actors likely to use and disseminate their work.

  11. New Survey Questions and Estimators for Network Clustering with Respondent-Driven Sampling Data

    CERN Document Server

    Verdery, Ashton M; Siripong, Nalyn; Abdesselam, Kahina; Bauldry, Shawn

    2016-01-01

    Respondent-driven sampling (RDS) is a popular method for sampling hard-to-survey populations that leverages social network connections through peer recruitment. While RDS is most frequently applied to estimate the prevalence of infections and risk behaviors of interest to public health, like HIV/AIDS or condom use, it is rarely used to draw inferences about the structural properties of social networks among such populations because it does not typically collect the necessary data. Drawing on recent advances in computer science, we introduce a set of data collection instruments and RDS estimators for network clustering, an important topological property that has been linked to a network's potential for diffusion of information, disease, and health behaviors. We use simulations to explore how these estimators, originally developed for random walk samples of computer networks, perform when applied to RDS samples with characteristics encountered in realistic field settings that depart from random walks. In partic...

  12. Microplastic in a macro filter feeder: Humpback whale Megaptera novaeangliae.

    NARCIS (Netherlands)

    E., Besseling,; E.M., Foekema,; J.A. van, Franeker; Leopold, Mardik F; Kuhn, S.; Bravo Rebolledo, E.L.; Hese, E.; Mielke, L.; IJzer, J.|info:eu-repo/dai/nl/304839663; Kamminga, P.; Koelmans, A.A.

    2015-01-01

    Marine filter feeders are exposed to microplastic because of their selection of small particles as food source. Baleen whales feed by filtering small particles from large water volumes. Macroplastic was found in baleen whales before. This study is the first to show the presence of microplastic in in

  13. Microplastic in a macro filter feeder: humpback whale Megaptera novaeangliae

    NARCIS (Netherlands)

    Besseling, E.; Foekema, E.M.; Franeker, van J.A.; Leopold, M.F.; Bravo Rebolledo, E.; Kuehn, S.; Mielke, L.; Heberle-Bors, E.; Ijzer, J.; Kamminga, P.; Koelmans, A.A.

    2015-01-01

    Marine filter feeders are exposed to microplastic because of their selection of small particles as food source. Baleen whales feed by filtering small particles from large water volumes. Macroplastic was found in baleen whales before. This study is the first to show the presence of microplastic in in

  14. Microplastic in a macro filter feeder: Humpback whale Megaptera novaeangliae.

    NARCIS (Netherlands)

    E., Besseling,; E.M., Foekema,; J.A. van, Franeker; Leopold, Mardik F; Kuhn, S.; Bravo Rebolledo, E.L.; Hese, E.; Mielke, L.; IJzer, J.; Kamminga, P.; Koelmans, A.A.

    2015-01-01

    Marine filter feeders are exposed to microplastic because of their selection of small particles as food source. Baleen whales feed by filtering small particles from large water volumes. Macroplastic was found in baleen whales before. This study is the first to show the presence of microplastic in in

  15. A Decentralized Storage Strategy for Residential Feeders with Photovoltaics

    DEFF Research Database (Denmark)

    Marra, Francesco; Yang, Guangya; Træholt, Chresten

    2014-01-01

    This paper proposes a decentralized voltage support strategy for LV residential feeders with high roof-top PV capacity installed. The proposed strategy is capable of increasing the local consumption at private households with PV during high generation periods, by the use of locally controlled...

  16. Nearby boundaries create eddies near microscopic filter feeders.

    Science.gov (United States)

    Pepper, Rachel E; Roper, Marcus; Ryu, Sangjin; Matsudaira, Paul; Stone, Howard A

    2010-05-06

    We show through calculations, simulations and experiments that the eddies often observed near sessile filter feeders are frequently due to the presence of nearby boundaries. We model the common filter feeder Vorticella, which is approximately 50 microm across and which feeds by removing bacteria from ocean or pond water that it draws towards itself. We use both an analytical stokeslet model and a Brinkman flow approximation that exploits the narrow-gap geometry to predict the size of the eddy caused by two parallel no-slip boundaries that represent the slides between which experimental observations are often made. We also use three-dimensional finite-element simulations to fully solve for the flow around a model Vorticella and analyse the influence of multiple nearby boundaries. Additionally, we track particles around live feeding Vorticella in order to determine the experimental flow field. Our models are in good agreement both with each other and with experiments. We also provide approximate equations to predict the experimental eddy sizes owing to boundaries both for the case of a filter feeder between two slides and for the case of a filter feeder attached to a perpendicular surface between two slides.

  17. A survey of spectrum prediction methods in cognitive radio networks

    Science.gov (United States)

    Wu, Jianwei; Li, Yanling

    2017-04-01

    Spectrum prediction technology is an effective way to solve the problems of processing latency, spectrum access, spectrum collision and energy consumption in cognitive radio networks. Spectral prediction technology is divided into three categories according to its nature, namely, spectral prediction method based on regression analysis, spectrum prediction method based on Markov model and spectrum prediction method based on machine learning. By analyzing and comparing the three kinds of prediction models, the author hopes to provide some reference for the later researchers. In this paper, the development situation, practical application and existent problems of three kinds of forecasting models are analyzed and summarized. On this basis, this paper discusses the development trend of the next step.

  18. SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS: A SURVEY

    Directory of Open Access Journals (Sweden)

    Ali Dorri

    2015-02-01

    Full Text Available MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration and self-maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In addition, defeating approaches against attacks have been evaluated in some important metrics. After analyses and evaluations, future scopes of work have been presented.

  19. Informal Networks Social Capital of Fathers: What Does the Social Engagement Survey Tell Us?

    Science.gov (United States)

    Ravanera, Zenaida

    2007-01-01

    Using the General Social Survey on Social Engagement conducted by Statistics Canada in 2003, this paper examines social capital derived from informal networks and its variation among men categorized as: (1) men with no children, and (2) men living with children in (a) intact, (b) step, and (c) lone parent families. The focus on men stems from a…

  20. Survey on the cryptanalysis of wireless sensor networks using side-channel analysis

    CSIR Research Space (South Africa)

    Moabalobelo, T

    2012-09-01

    Full Text Available as they are deployed in open environments with no protective physical shielding. In this survey paper, we give an overview of the side channel attacks (particularly power analysis attacks) against wireless sensor networks and in addition discuss some of the suggested...

  1. Dry coal feeder development program at Ingersoll-Rand Research, Incorporated. [for coal gasification systems

    Science.gov (United States)

    Mistry, D. K.; Chen, T. N.

    1977-01-01

    A dry coal screw feeder for feeding coal into coal gasification reactors operating at pressures up to 1500 psig is described. Results on the feeder under several different modes of operation are presented. In addition, three piston feeder concepts and their technical and economical merits are discussed.

  2. Novel Methods to Determine Feeder Locational PV Hosting Capacity and PV Impact Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Reno, Matthew J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Coogan, Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Seuss, John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    Often PV hosting capacity analysis is performed for a limited number of distribution feeders. For medium - voltage distribution feeders, previous results generally analyze less than 20 feeders, and then the results are extrapolated out to similar types of feeders. Previous hosting capacity research has often focused on determining a single value for the hosting capacity for the entire feeder, whereas this research expands previous hosting capacity work to investigate all the regions of the feeder that may allow many different hosting capacity values wit h an idea called locational hosting capacity (LHC)to determine the largest PV size that can be interconnected at different locations (buses) on the study feeders. This report discusses novel methods for analyzing PV interconnections with advanced simulati on methods. The focus is feeder and location - specific impacts of PV that determine the locational PV hosting capacity. Feeder PV impact signature are used to more precisely determine the local maximum hosting capacity of individual areas of the feeder. T he feeder signature provides improved interconnection screening with certain zones that show the risk of impact to the distribution feeder from PV interconnections.

  3. 75 FR 8395 - Bunker Hill Groundwater Basin, Riverside-Corona Feeder Project, San Bernardino and Riverside...

    Science.gov (United States)

    2010-02-24

    ... Bureau of Reclamation Bunker Hill Groundwater Basin, Riverside-Corona Feeder Project, San Bernardino and.../EIR for the proposed Riverside-Corona Feeder Project. The public and agencies are invited to comment..., and construction of the Riverside-Corona Feeder Project including: (i) 20 groundwater wells;...

  4. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    Coast, Australia, 21-26 May 2006. [4] P. Albers , O. Camp, J.-M. Percher, B. Jouga, L. Mé, and R. Puttini, “Security in Ad Hoc Networks: a General...10th Euromicro Workshop on Parallel, Distributed, and Network-based Processing, Canary Islands, Spain, Jan . 2002, pp. 403-410. [7] S. Buchegger and...DETECTION Albers et al.(2002) [4] -Direct observation for anomaly detection or misuse detection -General misbehaving nodes No experimental results

  5. DATA-CENTRIC ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS: A SURVEY

    Directory of Open Access Journals (Sweden)

    Raj Kumar Mondal

    2015-11-01

    Full Text Available This survey paper is more focused and can serve those who like to overall concept about all data centric routing for wireless sensor networks. To the best of our knowledge, our paper is the first work to make a classification of routing protocols in sensor networks. Sensor networks are classified by considering several architectural factors such as network dynamics, data aggregations, node capabilities and the data delivery model. Such classification is helpful for a designer to select the appropriate infrastructure for his/her application. Our work is a dedicated study of different data centric routing protocol. Wireless sensor network (WSN consists of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing and wireless communication. Routing in sensor networks is very challenging, due to several characteristics that distinguish them from contemporary communication and wireless ad-hoc networks. Many new goal and data-oriented algorithms have been proposed for the problem of routing data in sensor networks. Most routing protocols can be classified as data-centric, hierarchical and location-based. Data-centric protocols are query-based and depend on the naming of desired data and also do some aggregation and reduction of data in order to save energy. Hierarchical protocols aim at clustering the nodes. Location-based protocols utilize the position information to relay the data to the desired regions. In this paper, we give a survey of data-centric routing protocols for Wireless Sensor Network and compare their strengths and limitations. We also highlight the advantages and performance issues of each routing technique.

  6. DATA-CENTRIC ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS: A SURVEY

    Directory of Open Access Journals (Sweden)

    Raj Kumar Mondal

    2014-02-01

    Full Text Available This survey paper is more focused and can serve those who like to overall concept about all data centric routing for wireless sensor networks. To the best of our knowledge, our paper is the first work to make a classification of routing protocols in sensor networks. Sensor networks are classified by considering several architectural factors such as network dynamics, data aggregations, node capabilities and the data delivery model. Such classification is helpful for a designer to select the appropriate infrastructure for his/her application. Our work is a dedicated study of different data centric routing protocol. Wireless sensor network (WSN consists of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing and wireless communication . Routing in sensor networks is very challenging, due to several characteristics that distinguish them from contemporary communication and wireless ad-hoc networks. Many new goal and data-oriented algorithms have been proposed for the problem of routing data in sensor networks. Most routing protocols can be classified as data-centric, hierarchical and location-based. Data-centric protocols are query-based and depend on the naming of desired data and also do some aggregation and reduction of data in order to save energy. Hierarchical protocols aim at clustering the nodes. Location-based protocols utilize the position information to relay the data to the desired regions. In this paper, we give a survey of data-centric routing protocols for Wireless Sensor Network and compare their strengths and limitations. We also highlight the advantages and performance issues of each routing technique.

  7. Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Bhavana Butani

    2014-10-01

    Full Text Available Wireless sensor networks (WSNs are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key or other confidential information like node’s id etc from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing security schemes against Node capture attack. Our survey provides deep insights of existing techniques that enhance the attacking efficiency of the node capture attack in wireless sensor network. It also analyzes various detection and key pre-distribution schemes for inventing a new scheme to improve resilience against node capture attack.

  8. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Khalid

    2017-01-01

    Full Text Available Underwater wireless sensor networks are a newly emerging wireless technology in which small size sensors with limited energy and limited memory and bandwidth are deployed in deep sea water and various monitoring operations like tactical surveillance, environmental monitoring, and data collection are performed through these tiny sensors. Underwater wireless sensor networks are used for the exploration of underwater resources, oceanographic data collection, flood or disaster prevention, tactical surveillance systems, and unmanned underwater vehicles. Sensor nodes consist of a small memory, a central processing unit, and an antenna. Underwater networks are much different from terrestrial sensor networks as radio waves cannot be used in underwater wireless sensor networks. Acoustic channels are used for communication in deep sea water. Acoustic signals have many limitations, such as limited bandwidth, higher end-to-end delay, network path loss, higher propagation delay, and dynamic topology. Usually, these limitations result in higher energy consumption with a smaller number of packets delivered. The main aim nowadays is to operate sensor nodes having a smaller battery for a longer time in the network. This survey has discussed the state-of-the-art localization based and localization-free routing protocols. Routing associated issues in the area of underwater wireless sensor networks have also been discussed.

  9. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey

    Science.gov (United States)

    Ndiaye, Musa; Hancke, Gerhard P.; Abu-Mahfouz, Adnan M.

    2017-01-01

    Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN) provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management. PMID:28471390

  10. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey.

    Science.gov (United States)

    Ndiaye, Musa; Hancke, Gerhard P; Abu-Mahfouz, Adnan M

    2017-05-04

    Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN) provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  11. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey

    Directory of Open Access Journals (Sweden)

    Musa Ndiaye

    2017-05-01

    Full Text Available Wireless sensor networks (WSNs are becoming increasingly popular with the advent of the Internet of things (IoT. Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  12. Photovoltaic Hosting Capacity of Feeders with Reactive Power Control and Tap Changers

    Energy Technology Data Exchange (ETDEWEB)

    Ceylan, Oğuzhan; Paudyal, Sumit; Bhattarai, Bishnu P.; Myers, Kurt S.

    2017-06-01

    This paper proposes an algorithm to determine photovoltaic (PV) hosting capacity of power distribution networks as a function of number of PV injection nodes, reactive power support from the PVs, and the sub-station load tap changers (LTCs). In the proposed method, several minute by minute simulations are run based on randomly chosen PV injection nodes, daily PV output profiles, and daily load profiles from a pool of high-resolution realistic data set. The simulation setup is built using OpenDSS and MATLAB. The performance of the proposed method is investigated in the IEEE 123-node distribution feeder for multiple scenarios. The case studies are performed particularly for one, two, five and ten PV injection nodes, and looking at the maximum voltage deviations. Case studies show that the PV hosting capacity of the 123-node feeder greatly differs with the number of PV injection nodes. We have also observed that the PV hosting capacity increases with reactive power support and higher tap position of sub-station LTC.

  13. Effect of artificial feeders on pollen loads of the hummingbirds of Cerro de La Muerte, Costa Rica

    Directory of Open Access Journals (Sweden)

    Gerardo Avalos

    2012-03-01

    captured hummingbirds carried no pollen. Mist nets located 3km from La Georgina returned few captures (one-to-three specimens per sampling date, contrasting with observations made before feeders were present. These results suggest that sugar-water feeders gather hummingbirds in over considerable distances drawing them away from flowers. The competitive and antagonistic pattern shown between feeders and flowers indicate that natural pollination system could be significantly altered. Supplementing hummingbirds with food seems likely to interfere with pollination networks already stressed by many anthropogenic effectsEl uso de comederos constituye una práctica común para atraer colibríes, a pesar de que sabemos poco acerca de sus efectos sobre las relaciones ecológicas entre colibríes y sus plantas asociadas. Estudiamos el grupo de colibríes del Cerro de La Muerte, Costa Rica, en un sitio con comederos permanentes (Restaurante La Georgina, así como en un lugar alejado de los comederos. Analizamos cómo el uso y monipolización estacional de los comederos afectaba la carga de polen en cuatro períodos de muestreo entre 2003 y 2005. Esperábamos que las especies que monopolizaban los comederos tuvieran poco o cero polen, y si lo presentaban que la carga de polen estuviera representada por pocas especies en comparación con especies menos dependientes de los comederos. En la estación seca, la especie alfa Panterpe insignis, dominó los comederos. En la estación lluviosa el uso de comederos fue más equitativo. La carga de polen fue muy baja en abundancia (50% de los colibríes tenían poco o cero polen y diversidad (96% de los colibríes tenían polen solamente del género Centropogon. Encontramos una relación competitiva y antagonística entre la visitación de comederos y la abundancia de flores. La carga de polen aumentó en la estación seca al haber más flores, aunque la mayoría de los colibríes capturados no tenían polen. Durante la estación lluviosa, cuando

  14. A survey of research and practices of network-on-chip

    DEFF Research Database (Denmark)

    Bjerregaard, Tobias; Mahadevan, Shankar

    2006-01-01

    The scaling of microchip technologies has enabled large scale systems-on-chip (SoC). Network-on-chip (NoC) research addresses global communication in SoC, involving (i) a move from computation-centric to communication-centric design and (ii) the implementation of scalable communication structures....... This survey presents a perspective on existing NoC research. We define the following abstractions: system, network adapter, network, and link to explain and structure the fundamental concepts. First, research relating to the actual network design is reviewed. Then system level design and modeling...... are discussed. We also evaluate performance analysis techniques. The research shows that NoC constitutes a unification of current trends of intrachip communication rather than an explicit new alternative....

  15. Social Networking Versus Facebook Advertising to Recruit Survey Respondents: A Quasi-Experimental Study

    Science.gov (United States)

    Kypri, Kypros; Bourke, Jesse

    2014-01-01

    Background Increasingly, social contact and knowledge of other people’s attitudes and behavior are mediated by online social media such as Facebook. The main research to which this recruitment study pertains investigates the influence of parents on adolescent alcohol consumption. Given the pervasiveness of online social media use, Facebook may be an effective means of recruitment and intervention delivery. Objective The objective of the study was to determine the efficacy of study recruitment via social networks versus paid advertising on Facebook. Methods We conducted a quasi-experimental sequential trial with response rate as the outcome, and estimates of cost-effectiveness. The target population was parents of 13-17 year old children attending high schools in the Hunter region of New South Wales, Australia. Recruitment occurred via: method (1) social recruitment using Facebook, email-based, social networks, and media coverage followed by method (2) Facebook advertising. Results Using a range of online and other social network approaches only: method (1) 74 parents were recruited to complete a survey over eight months, costing AUD58.70 per completed survey. After Facebook advertising: method (2) 204 parents completed the survey over four weeks, costing AUD5.94 per completed survey. Participants were representative of the parents recruited from the region’s schools using standard mail and email. Conclusions Facebook advertising is a cost-effective means of recruiting parents, a group difficult to reach by other methods. PMID:25230740

  16. Social networking versus facebook advertising to recruit survey respondents: a quasi-experimental study.

    Science.gov (United States)

    Gilligan, Conor; Kypri, Kypros; Bourke, Jesse

    2014-09-17

    Increasingly, social contact and knowledge of other people's attitudes and behavior are mediated by online social media such as Facebook. The main research to which this recruitment study pertains investigates the influence of parents on adolescent alcohol consumption. Given the pervasiveness of online social media use, Facebook may be an effective means of recruitment and intervention delivery. The objective of the study was to determine the efficacy of study recruitment via social networks versus paid advertising on Facebook. We conducted a quasi-experimental sequential trial with response rate as the outcome, and estimates of cost-effectiveness. The target population was parents of 13-17 year old children attending high schools in the Hunter region of New South Wales, Australia. Recruitment occurred via: method (1) social recruitment using Facebook, email-based, social networks, and media coverage followed by method (2) Facebook advertising. Using a range of online and other social network approaches only: method (1) 74 parents were recruited to complete a survey over eight months, costing AUD58.70 per completed survey. After Facebook advertising: method (2) 204 parents completed the survey over four weeks, costing AUD5.94 per completed survey. Participants were representative of the parents recruited from the region's schools using standard mail and email. Facebook advertising is a cost-effective means of recruiting parents, a group difficult to reach by other methods.

  17. Link-prediction to tackle the boundary specification problem in social network surveys

    Science.gov (United States)

    De Wilde, Philippe; Buarque de Lima-Neto, Fernando

    2017-01-01

    Diffusion processes in social networks often cause the emergence of global phenomena from individual behavior within a society. The study of those global phenomena and the simulation of those diffusion processes frequently require a good model of the global network. However, survey data and data from online sources are often restricted to single social groups or features, such as age groups, single schools, companies, or interest groups. Hence, a modeling approach is required that extrapolates the locally restricted data to a global network model. We tackle this Missing Data Problem using Link-Prediction techniques from social network research, network generation techniques from the area of Social Simulation, as well as a combination of both. We found that techniques employing less information may be more adequate to solve this problem, especially when data granularity is an issue. We validated the network models created with our techniques on a number of real-world networks, investigating degree distributions as well as the likelihood of links given the geographical distance between two nodes. PMID:28426826

  18. A hybrid evolutionary algorithm for distribution feeder reconfiguration

    Indian Academy of Sciences (India)

    Taher Niknam; Reza Khorshidi; Bahman Bahmani Firouzi

    2010-04-01

    Distribution feeder reconfiguration (DFR) is formulated as a multiobjective optimization problem which minimizes real power losses, deviation of the node voltages and the number of switching operations and also balances the loads on the feeders. In the proposed method, the distance ($\\lambda_2$ norm) between the vectorvalued objective function and the worst-case vector-valued objective function in the feasible set is maximized. In the algorithm, the status of tie and sectionalizing switches are considered as the control variables. The proposed DFR problem is a non-differentiable optimization problem. Therefore, a new hybrid evolutionary algorithm based on combination of fuzzy adaptive particle swarm optimization (FAPSO) and ant colony optimization (ACO), called HFAPSO, is proposed to solve it. The performance of HFAPSO is evaluated and compared with other methods such as genetic algorithm (GA), ACO, the original PSO, Hybrid PSO and ACO (HPSO) considering different distribution test systems.

  19. Survey of Search and Replication Schemes in Unstructured P2P Networks

    CERN Document Server

    Thampi, Sabu M

    2010-01-01

    P2P computing lifts taxing issues in various areas of computer science. The largely used decentralized unstructured P2P systems are ad hoc in nature and present a number of research challenges. In this paper, we provide a comprehensive theoretical survey of various state-of-the-art search and replication schemes in unstructured P2P networks for file-sharing applications. The classifications of search and replication techniques and their advantages and disadvantages are briefly explained. Finally, the various issues on searching and replication for unstructured P2P networks are discussed.

  20. A Survey on Node Clustering in Cognitive Radio Wireless Sensor Networks

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Kim, Sung Won

    2016-01-01

    Cognitive radio wireless sensor networks (CR-WSNs) have attracted a great deal of attention recently due to the emerging spectrum scarcity issue. This work attempts to provide a detailed analysis of the role of node clustering in CR-WSNs. We outline the objectives, requirements, and advantages of node clustering in CR-WSNs. We describe how a CR-WSN with node clustering differs from conventional wireless sensor networks, and we discuss its characteristics, architecture, and topologies. We survey the existing clustering algorithms and compare their objectives and features. We suggest how clustering issues and challenges can be handled. PMID:27626421

  1. A Survey on Node Clustering in Cognitive Radio Wireless Sensor Networks.

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Kim, Sung Won

    2016-09-10

    Cognitive radio wireless sensor networks (CR-WSNs) have attracted a great deal of attention recently due to the emerging spectrum scarcity issue. This work attempts to provide a detailed analysis of the role of node clustering in CR-WSNs. We outline the objectives, requirements, and advantages of node clustering in CR-WSNs. We describe how a CR-WSN with node clustering differs from conventional wireless sensor networks, and we discuss its characteristics, architecture, and topologies. We survey the existing clustering algorithms and compare their objectives and features. We suggest how clustering issues and challenges can be handled.

  2. Evaluation of the planned Gautrain feeder and distribution system

    CSIR Research Space (South Africa)

    King, DJ

    2008-07-01

    Full Text Available that the main competition for public transport is the private car and to increase public transport usage it must have operational characteristics that give it an advantage over the car. These characteristics are: Convenience - This includes anything from... car users and could lead to them not obeying priority traffic regulations. The increased congestion will also affect local road users that do not travel between Johannesburg and Tshwane and will place an unfair time and cost burden on them. Feeder...

  3. Efficient feeder-free episomal reprogramming with small molecules.

    Directory of Open Access Journals (Sweden)

    Junying Yu

    Full Text Available Genetic reprogramming of human somatic cells to induced pluripotent stem cells (iPSCs could offer replenishable cell sources for transplantation therapies. To fulfill their promises, human iPSCs will ideally be free of exogenous DNA (footprint-free, and be derived and cultured in chemically defined media free of feeder cells. Currently, methods are available to enable efficient derivation of footprint-free human iPSCs. However, each of these methods has its limitations. We have previously derived footprint-free human iPSCs by employing episomal vectors for transgene delivery, but the process was inefficient and required feeder cells. Here, we have greatly improved the episomal reprogramming efficiency using a cocktail containing MEK inhibitor PD0325901, GSK3β inhibitor CHIR99021, TGF-β/Activin/Nodal receptor inhibitor A-83-01, ROCK inhibitor HA-100 and human leukemia inhibitory factor. Moreover, we have successfully established a feeder-free reprogramming condition using chemically defined medium with bFGF and N2B27 supplements and chemically defined human ESC medium mTeSR1 for the derivation of footprint-free human iPSCs. These improvements enabled the routine derivation of footprint-free human iPSCs from skin fibroblasts, adipose tissue-derived cells and cord blood cells. This technology will likely be valuable for the production of clinical-grade human iPSCs.

  4. 30 CFR 75.1003 - Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley...

    Science.gov (United States)

    2010-07-01

    ... wires and bare signal wires; guarding of trolley wires and trolley feeder wires. 75.1003 Section 75.1003... Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley wires and trolley feeder wires. Trolley wires, trolley feeder wires, and bare signal wires shall be insulated...

  5. User satisfaction-based quality evaluation model and survey analysis of network information service

    Institute of Scientific and Technical Information of China (English)

    LEI; Xue; JIAO; Yuying

    2009-01-01

    On the basis of user satisfaction,authors made research hypotheses by learning from relevant e-service quality evaluation models.A questionnaire survey was then conducted on some content-based websites in terms of their convenience,information quality,personalization and site aesthetics,which may affect the overall satisfaction of users.Statistical analysis was also made to build a user satisfaction-based quality evaluation system of network information service.

  6. Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey

    OpenAIRE

    Hodo, Elike; Bellekens, Xavier; Hamilton, Andrew; Tachtatzis, Christos; Atkinson, Robert,

    2017-01-01

    Intrusion detection has attracted a considerable interest from researchers and industries. The community, after many years of research, still faces the problem of building reliable and efficient IDS that are capable of handling large quantities of data, with changing patterns in real time situations. The work presented in this manuscript classifies intrusion detection systems (IDS). Moreover, a taxonomy and survey of shallow and deep networks intrusion detection systems is presented based on ...

  7. ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS – A SURVEY

    Directory of Open Access Journals (Sweden)

    K. Sankar

    2012-06-01

    Full Text Available Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in wireless communication. The performance of the medium access control (MAC scheme not only has a fairly significant end-result on the behaviour of the routing approach employed, but also on the energy consumption of the wireless network interface card (NIC. We investigate the inadequacies of the MAC schemes designed for ad hoc wireless networks in the context of power awareness herein. The topology changes due to uncontrollable factors such as node mobility, weather, interference, noise, as well as on controllable parameters such as transmission power and antenna direction results in significant amount of energy loss. Controlling rapid topology changes by minimizing the maximum transmission power used in ad hoc wireless networks, while still maintaining networks connectivity can prolong battery life and hence network lifetime considerably. In addition, we systematically explore the potential energy consumption pitfalls of non–power-based and power based routing schemes. We suggest a thorough energy-based performance survey of energy aware routing protocols for wireless mobile ad-hoc networks. We also present the statistical performance metrics measured by our simulations.

  8. A survey of ring-building network protocols suitable for command and control group communications

    Science.gov (United States)

    Sobeih, Ahmed; Yurcik, William

    2005-05-01

    Multicasting is the enabling technology for group communication. However, network-layer multicasting (e.g., IP multicast) has not been widely adopted more than 10 years of its invention due to the concerns related to deployment, scalability and network management. Application-layer multicast (ALM) has been proposed as an alternative for IP multicast. In ALM, group communications take place on an overlay network in which each edge corresponds to a direct unicast path between two group members. ALM protocols differ in, among other aspects, the topology of the underlying overlay network (e.g., tree, mesh or ring). Ring-based ALM protocols have the advantages of providing a constant node degree, and enabling the implementation of reliable and totally-ordered message delivery through the use of a ring with a token that contains ordering and flow control information. In addition, a ring overlay network topology is inherently reliable to single node failures. In this paper, we provide a survey and a taxonomy of several ring-building group communication protocols. Investigating the major characteristics of ring-building network protocols is an important step towards understanding which of them are suitable for command and control group communications.

  9. Neural model of gene regulatory network: a survey on supportive meta-heuristics.

    Science.gov (United States)

    Biswas, Surama; Acharyya, Sriyankar

    2016-06-01

    Gene regulatory network (GRN) is produced as a result of regulatory interactions between different genes through their coded proteins in cellular context. Having immense importance in disease detection and drug finding, GRN has been modelled through various mathematical and computational schemes and reported in survey articles. Neural and neuro-fuzzy models have been the focus of attraction in bioinformatics. Predominant use of meta-heuristic algorithms in training neural models has proved its excellence. Considering these facts, this paper is organized to survey neural modelling schemes of GRN and the efficacy of meta-heuristic algorithms towards parameter learning (i.e. weighting connections) within the model. This survey paper renders two different structure-related approaches to infer GRN which are global structure approach and substructure approach. It also describes two neural modelling schemes, such as artificial neural network/recurrent neural network based modelling and neuro-fuzzy modelling. The meta-heuristic algorithms applied so far to learn the structure and parameters of neutrally modelled GRN have been reviewed here.

  10. SURVEY ON MOBILE AD HOC NETWORK ATTACKS AND MITIGATION USING ROUTING PROTOCOLS

    Directory of Open Access Journals (Sweden)

    S. P. Manikandan

    2012-01-01

    Full Text Available Mobile Ad hoc Networks (MANET due to its unpredictable topology and bandwidth limitations are vulnerable to attacks. Establishing security measures and finding secure routes are the major challenges faced by MANET. Security issues faced by ad hoc networks are node authentication, insider attack and intrusion detection. Implementing security measures is challenging due to the presence of limited resources in the hardware device and the network. Routing protocols attempt to mitigate the attacks by isolating the malicious nodes. In this study, a survey of various kinds of attacks against MANET is studied. It is also proposed to study modification of AODV and DSR routing protocol implementation with regard to mitigating attacks and intrusion detection. This study studied various approaches to predict and mitigate attacks in MANET."

  11. REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEY

    Directory of Open Access Journals (Sweden)

    Pradeep Chennakesavula

    2016-10-01

    Full Text Available Wireless sensor networks can be termed as a new generation of distributed embedded systems that has a capability of meeting broad range of real-time applications. Examples include radiation monitoring, fire monitoring, border surveillance, and medical care to name but a few. Wireless sensor networks that are deployed in time/mission-critical applications with highly dynamic environments have to interact with the physical phenomenon under stringent timing constraints and severe resource limitations. For such real-time wireless sensor networks, designing and developing a real-time routing protocol that meets the required real-time guarantee of data packets communication is a stimulating field of study that raised many challenges and research issues. In this paper, we present a comprehensive survey of real-time routing protocols in WSN, by discussing each protocol with its key features. Finally, we concluded this paper with open research issues and challenges of real-time routing in WSN.

  12. A Survey of Algorithms and Systems for Expert Location in Social Networks

    Science.gov (United States)

    Lappas, Theodoros; Liu, Kun; Terzi, Evimaria

    Given a particular task and a set of candidates, one often wants to identify the right expert (or set of experts) that can perform the given task. We call this problem the expert-location problem and we survey its different aspects as they arise in practice. For example, given the activities of candidates within a context (e.g., authoring a document, answering a question), we first describe methods for evaluating the level of expertise for each of them. Often, experts are organized in networks that correspond to social networks or organizational structures of companies. We next devote part of the chapter for describing algorithms that compute the expertise level of individuals by taking into account their position in such a network. Finally, complex tasks often require the collective expertise of more than one experts. In such cases, it is more realistic to require a team of experts that can collaborate towards a common goal. We describe algorithms that identify effective expert teams within a network of experts. The chapter is a survey of different algorithms for expertise evaluation and team identification. We highlight the basic algorithmic problems and give some indicative algorithms that have been developed in the literature. We conclude the chapter by providing a comprehensive overview of real-life systems for expert location.

  13. Round-bale feeder design affects hay waste and economics during horse feeding.

    Science.gov (United States)

    Martinson, K; Wilson, J; Cleary, K; Lazarus, W; Thomas, W; Hathaway, M

    2012-03-01

    Many horse owners find round bales convenient, less labor intensive, and more affordable than other hay types, but report an inability to control horse BW gain and excessive hay waste. The objectives were to compare hay waste, hay intake, and payback of 9 round-bale feeders and a no-feeder control when used during horse feeding. Nine round-bale feeders were tested: Cinch Net, Cone, Covered Cradle, Hayhut, Hay Sleigh, Ring, Tombstone, Tombstone Saver, and Waste Less. Each feeder design was placed on the ground in a dirt paddock. Five groups of 5 horses were fed in rotation for a 4-d period with each feeder. Every fourth day, groups were rotated among paddocks and a new round bale was placed in each feeder. In the 5 paddocks used, 5 feeders were installed for d 1 through 20, and the remaining 4 feeders and no-feeder control were installed for d 21 through 40. Groups of horses were sequentially assigned to feeders using two 5 × 5 Latin squares, the first for d 1 through 20, the second for d 21 through 40. Horse groups of similar age, BW, breed, and sex were formed from 25 Quarter Horse and Thoroughbred geldings and open mares (means: 11 yr; 541 kg of BW). Hay on the ground surrounding the feeder was collected daily, dried, and weighed. The total amount of hay removed around each feeder for a 4-d period was considered waste. Dry matter intake was estimated as the difference between hay disappearance and waste. Number of months for the reduction in waste to repay feeder cost (payback) were calculated using hay valued at $110/t, and improved feeder efficiency over the control. Feeder design did not affect hay intake (P > 0.05); all feeders resulted in an estimated hay intake of 2.0 to 2.4% BW; the no-feeder control resulted in a reduced intake of 1.3% BW (P = 0.001). Mean percentage of hay waste differed among feeders (P horse feeding.

  14. Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Md. Akhtaruzzaman Adnan

    2013-12-01

    Full Text Available For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization, compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted.

  15. Bio-mimic optimization strategies in wireless sensor networks: a survey.

    Science.gov (United States)

    Adnan, Md Akhtaruzzaman; Abdur Razzaque, Mohammd; Ahmed, Ishtiaque; Isnin, Ismail Fauzi

    2013-12-24

    For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted.

  16. Clustering method and representative feeder selection for the California solar initiative

    Energy Technology Data Exchange (ETDEWEB)

    Broderick, Robert Joseph; Williams, Joseph R.; Munoz-Ramos, Karina

    2014-02-01

    The screening process for DG interconnection procedures needs to be improved in order to increase the PV deployment level on the distribution grid. A significant improvement in the current screening process could be achieved by finding a method to classify the feeders in a utility service territory and determine the sensitivity of particular groups of distribution feeders to the impacts of high PV deployment levels. This report describes the utility distribution feeder characteristics in California for a large dataset of 8,163 feeders and summarizes the California feeder population including the range of characteristics identified and most important to hosting capacity. The report describes the set of feeders that are identified for modeling and analysis as well as feeders identified for the control group. The report presents a method for separating a utilitys distribution feeders into unique clusters using the k-means clustering algorithm. An approach for determining the feeder variables of interest for use in a clustering algorithm is also described. The report presents an approach for choosing the feeder variables to be utilized in the clustering process and a method is identified for determining the optimal number of representative clusters.

  17. Watersheds for U.S Geological Survey National Stream Quality Accounting Network (NASQAN) sampling sites 1996-2000.

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — A digital representation of the watersheds of 43 sites on large river systems sampled by the National Stream Quality Accounting Network (NASQAN) of the U. S....

  18. Report on the survey in fiscal 1998. Survey on an environment technology transfer information network; 1998 nendo hokokusho. Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    This paper describes a survey on an environment technology transfer information network. Based on the achievements obtained by the surveys in fiscal 1995 and 1996, the ICETT has participated as one organization constituting the APEC environment technology exchange virtual center, and begun providing information since April 1997. As the environment technology information, those items actually employed by factories and operation sites in Japan are put into a data base, and into a home page including training information centering around those contained in the data base, and examples of works done by local governments for prevention of pollution. Furthermore in fiscal 1997, a simulation software for a model process has been developed. Fiscal 1998 strengthened the data base for environment preservation technology information, investigated environment preserving model companies and summarized them including even their management aspect. Investigations were carried out in developing countries on application of cleaner technologies. Gaps far exceeding anticipation exist in every field between these developing countries and Japan. Environment protection measures applied and succeeded in the developing countries as the means to narrow the gaps were collected, and compiled as the specific examples. (NEDO)

  19. The High Time Resolution Universe Survey VI: An Artificial Neural Network and Timing of 75 Pulsars

    CERN Document Server

    Bates, S D; Barsdell, B R; Bhat, N D R; Burgay, M; Burke-Spolaor, S; Champion, D J; Coster, P; D'Amico, N; Jameson, A; Johnston, S; Keith, M J; Kramer, M; Levin, L; Lyne, A; Milia, S; Ng, C; Nietner, C; Possenti, A; Stappers, B; Thornton, D; van Straten, W

    2012-01-01

    We present 75 pulsars discovered in the mid-latitude portion of the High Time Resolution Universe survey, 54 of which have full timing solutions. All the pulsars have spin periods greater than 100 ms, and none of those with timing solutions are in binaries. Two display particularly interesting behaviour; PSR J1054-5944 is found to be an intermittent pulsar, and PSR J1809-0119 has glitched twice since its discovery. In the second half of the paper we discuss the development and application of an artificial neural network in the data-processing pipeline for the survey. We discuss the tests that were used to generate scores and find that our neural network was able to reject over 99% of the candidates produced in the data processing, and able to blindly detect 85% of pulsars. We suggest that improvements to the accuracy should be possible if further care is taken when training an artificial neural network; for example ensuring that a representative sample of the pulsar population is used during the training proc...

  20. Preliminary study on human fibroblasts as feeder layer for human embryonic stem cells culture in vitro

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    To avoid the direct contact with mouse cells and possible heterogeneous pathogen in future application, we need to replace mouse embryonic fibroblastswith human fibroblasts as the feeder layer to maintain human embryonic stem cells growth in the undifferentiated state. We successfully use human fibroblasts derived from aborted fetus and adult prepuce as feeder layer to maintain human embryonic stem cells growth. During the passage and growth on this feeder layer, the human embryonic stem cells can keep their undifferentiated state.

  1. 小电流接地故障暂态选线与定位技术%The Technology of Faulty Feeder Selection and Faulty Section Location Based on Transient Signals for Single-phase Earth Fault in Non-solidly Earthed Network

    Institute of Scientific and Technical Information of China (English)

    薛永端; 张海台; 李成刚; 徐丙垠

    2015-01-01

    我国中压配电网中性点多采用不接地或经消弧线圈接地方式,单相接地(小电流接地)时故障选线和定位困难,长期以来现场实用效果均不理想。接地故障瞬间存在明显的暂态过程,暂态信号包含了丰富的故障位置信息。介绍了利用暂态信号的小电流接地故障选线技术,以及基于配电网自动化(DA)系统的暂态故障分段定位技术。暂态检测技术可靠性高、适应性好、无安全隐患,已在现场获得成功应用。%The neutral point of medium voltage distribution systems are almost isolated or grounded via Petersen coil in China. With great difficulty, the faulty feeder selection and faulty section location under the single-phase earth fault have poor practice effect. There is a distinct transient process after the occurrence a fault which contains detailed fault position information. The transient signals based faulty feeder selection and the transient faulty section location technologies based on Distribution Automation system are introduced in this paper. With high reliability, excellent adaptability and safety, the detection technologies based on transient signals have already been applied onsite successfully.

  2. Enhanced Inter-cell Interference Coordination for Heterogeneous Networks in LTE-Advanced: A Survey

    CERN Document Server

    Lindbom, Lars; Krishnamurthy, Sandeep; Yao, Chunhai; Miki, Nobuhiko; Chandrasekhar, Vikram

    2011-01-01

    Heterogeneous networks (het-nets) - comprising of conventional macrocell base stations overlaid with femtocells, picocells and wireless relays - offer cellular operators burgeoning traffic demands through cell-splitting gains obtained by bringing users closer to their access points. However, the often random and unplanned location of these access points can cause severe near-far problems, typically solved by coordinating base-station transmissions to minimize interference. Towards this direction, the 3rd generation partnership project Long Term Evolution-Advanced (3GPP-LTE or Rel-10) standard introduces time-domain inter-cell interference coordination (ICIC) for facilitating a seamless deployment of a het-net overlay. This article surveys the key features encompassing the physical layer, network layer and back-hauling aspects of time-domain ICIC in Rel-10.

  3. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives

    Directory of Open Access Journals (Sweden)

    Delphine Christin

    2010-04-01

    Full Text Available Wireless Sensor Networks (WSNs are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by the industrial automation community is impeded by open issues, such as security guarantees and provision of Quality of Service (QoS. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine QoS requirements and carry out a threat analysis, which act as basis of our evaluation of the current state-of-the-art. According to the results of this evaluation, we identify and discuss open research issues.

  4. A Survey on Different Approaches for Energy Conservation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rumpa Mukherjee,Arindom Mukherjee

    2013-03-01

    Full Text Available In the recent years the applications of wirelesssensor networksin the fields such as scientific,militaryandhealthcarehave developed. So it hasgained more attention inresearch area. A sensornode is basically a battery powered device and theuse of battery has become a constraints.The mainmotive is to reducetheenergy consumption ofsensor node to increase the network lifetime. In thispaper,wehavediscussedaboutthe energyconsumption of a particular sensor node ofWSNs.Thenwehaverepresentedvarious systematic andcomprehensive schemes of energy conservation,which are subsequently discussed in depth. Specialattention has been giventothe literature survey anddevotion of promising solutions faced in eachtechnique.Wehave provided some solutions thatare being faced in each technique. In the final partwe will look into the different directions forresearch about energy conservation of wirelesssensor networks

  5. Survey of Energy Harvesting Systems for Wireless Sensor Networks in Environmental Monitoring

    Directory of Open Access Journals (Sweden)

    Dziadak Bogdan

    2016-12-01

    Full Text Available Wireless Sensor Networks (WSNs have existed for many years and had assimilated many interesting innovations. Advances in electronics, radio transceivers, processes of IC manufacturing and development of algorithms for operation of such networks now enable creating energy-efficient devices that provide practical levels of performance and a sufficient number of features. Environmental monitoring is one of the areas in which WSNs can be successfully used. At the same time this is a field where devices must either bring their own power reservoir, such as a battery, or scavenge energy locally from some natural phenomena. Improving the efficiency of energy harvesting methods reduces complexity of WSN structures. This survey is based on practical examples from the real world and provides an overview of state-of-the-art methods and techniques that are used to create energyefficient WSNs with energy harvesting.

  6. Application of neural networks for identification of faults in a 3D seismic survey offshore Tunisia

    Science.gov (United States)

    Mastouri, Raja; Marchant, Robin; Marillier, François; Jaboyedoff, Michel; Bouaziz, Samir

    2013-04-01

    The Kerkennah High area (offshore Tunisia) is dominated by series of horst and grabens resulting from multiple tectonic events and multiphase stress (extension, compression, translation). In order to decipher this complex structural history from a 3D seismic survey, a neural network is applied to extract a fault-cube from the amplitude data (which does not image faults directly). The neural network transforms seismic attributes into a new 3D data cube in which faults are highlighted. This technique comprises the following steps. First, we compute several seismic attributes (dip-steering similarity, curvature, frequency, ridge and fault enhancement filters…) that enhance different aspects of the seismic data related to faulting. In a second step, a number of points in the seismic data are selected as representative of either faults or areas devoid of faults. These points are tested by the artificial neural network to determine the range in which the different attributes are representative of faults or not. Based on this learning phase, the neural network is then applied to the entire 3D seismic cube to produce a fault-cube that contains only faults which contrast and continuity have been enhance.

  7. MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey

    Science.gov (United States)

    Han, Ruisong; Yang, Wei; You, Kaiming

    2016-01-01

    Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs) cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs), enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB) is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed. PMID:27999258

  8. Illustrative presentation of some basic concepts of network internal reliability with comments as regards engineering surveys

    Science.gov (United States)

    Prószyński, Witold

    2016-06-01

    The paper integrates some earlier and the recent findings of the author in the area of network internal reliability and presents a consistent system of concepts in this respect. The concepts of outlier detection and outlier identification linked directly with the global model test and the outlier tests respectively, are shown as a basis for the concepts such as outlier detectability and outlier identifiability. Also, a four level classification of gross errors expressed in a form of a tree-diagram is presented including perceptible and imperceptible errors, detectable and undetectable errors and identifiable and unidentifiable errors. Their properties are given mainly in a descriptive way, deliberately limiting rigorous mathematical formulas to a necessary minimum. Understanding of different types of gross errors is useful in analyzing the results of the outlier detection and identification procedures as well as in designing the networks to make them duly robust to observation gross errors. It is of special importance for engineering surveys where quite often low-redundancy networks are used. Main objective of the paper is to demonstrate a clear and consistent system of basic concepts related to network internal reliability.

  9. A Survey of MAC Protocols for Cognitive Radio Body Area Networks

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2015-01-01

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research. PMID:25903551

  10. A Recent Survey on Bloom Filters in Network Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    K.Saravanan,

    2011-03-01

    Full Text Available Computer networks are prone to hacking, viruses and other malware; a Network Intrusion Detection System (NIDS is needed to protect the end-user machines from threats. An effective NIDS is therefore anetwork security system capable of protecting the end user machines well before a threat or intruder affects. NIDS requires a space efficient data base for detection of threats in high speed conditions. A bloom filter is a space efficient randomized data structure for representing a set in order to support membership queries. These Bloom filters allow false positive results (FPR but the space saving capability often outweigh this drawback provided the probability of FPR is controlled. Research is being done to reduce FPR by modifying the structure of bloom filters and enabling it to operate in the increasing network speeds, thus variant bloom filters are being introduced. The aim of this paper is to survey the ways in which Bloom filters have been used and modified to be used in high speed Network Intrusion Detection Systems with their merits and demerits.

  11. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  12. MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey.

    Science.gov (United States)

    Han, Ruisong; Yang, Wei; You, Kaiming

    2016-12-16

    Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs) cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs), enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB) is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed.

  13. Survey of timing/synchronization of operating wideband digital communications networks

    Science.gov (United States)

    Mitchell, R. L.

    1978-01-01

    In order to benefit from experience gained from the synchronization of operational wideband digital networks, a survey was made of three such systems: Data Transmission Company, Western Union Telegraph Company, and the Computer Communications Group of the Trans-Canada Telephone System. The focus of the survey was on deployment and operational experience from a practical (as opposed to theoretical) viewpoint. The objective was to provide a report on the results of deployment how the systems performed, and wherein the performance differed from that predicted or intended in the design. It also attempted to determine how the various system designers would use the benefit of hindsight if they could design those same systems today.

  14. AN EXHAUSTIVE SURVEY ON NATURE INSPIRED METAHEURISTIC ALGORITHMS FOR ENERGY OPTIMIZATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    Soumitra Das

    2015-12-01

    Full Text Available Todays engineering research is highly motivated towards the nature inspired metaheuristic computational algorithm as they have the capability to give better results as compared to the conventional methods. Wireless Sensor Networks(WSNs have become increasingly popular due to their extensive array of applications. Desing of energy efficient routing algorithms is an important issue in the designing of WSNs applications as the lifetime of the sensor node is based on the limited battery powered devices. Therefore to maximize the lifetime of sensor node a comprehensive survey of energy efficient routing algorithms based on natural science have been addressed in this paper. The paper will take the readers into the detailed survey of existing energy optimized routing algorithms considering the natural science (metaheuristic as the base and considering parameters related to energy efficiency as the core objective. The final part of the paper discusses the limitations of various algorithms that has been addressed in this paper and suggestions to overcome them.

  15. Neural network-based survey analysis of risk management practices in new product development

    DEFF Research Database (Denmark)

    Kampianakis, Andreas N.; Oehmen, Josef

    2017-01-01

    The current study investigates the applicability of Artificial Neural Networks (ANNs) to analyse survey data on the effectiveness of risk management practices in product development (PD) projects, and its ability to forecast project outcomes. Moreover, this study presents the relations between risk...... management factors affecting the success of a PD project, such as cost. ANNs were chosen due to the fact that hidden inherent relations can be revealed through this type of quantitative analysis. Flexibility in terms of analysis and adaptability on the given dataset are the great advantages of Artificial...

  16. Automated Stellar Classification for Large Surveys with EKF and RBF Neural Networks

    Institute of Scientific and Technical Information of China (English)

    Ling Bai; Ping Guo; Zhan-Yi Hu

    2005-01-01

    An automated classification technique for large size stellar surveys is proposed. It uses the extended Kalman filter as a feature selector and pre-classifier of the data, and the radial basis function neural networks for the classification.Experiments with real data have shown that the correct classification rate can reach as high as 93%, which is quite satisfactory. When different system models are selected for the extended Kalman filter, the classification results are relatively stable. It is shown that for this particular case the result using extended Kalman filter is better than using principal component analysis.

  17. A Survey on Position-Based Routing Algorithms in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lin Ya-Ping

    2009-02-01

    Full Text Available Wireless sensor networks (WSN have attracted much attention in recent years for its unique characteristics and wide use in many different applications. Routing protocol is one of key technologies in WSN. In this paper, the position-based routing protocols are surveyed and classified into four categories: flooding-based, curve-based, grid-based and ant algorithm-based intelligent. To each category, the main contribution of related routing protocols is shown including the relationship among the routing protocols. The different routing algorithms in the same category and the different categories are compared based on popular metrics. Moreover, some open research directions in WSN are also discussed.

  18. A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    K.P.Manikandan

    2011-03-01

    Full Text Available A Mobile Ad hoc Network (MANET is a dynamic wireless network that can be formed infrastructure less connections in which each node can act as a router. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple the MANET operations. Attack prevention measures, such as authentication and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in routing protocols. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions. Finally, we have identified the challenges and proposed solutions to overcome them. In our survey, we focus on the findings and related works from which to provide secure protocols for MANETs. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.

  19. MODELING AND CONTROL OF A UNIVERSAL PART FEEDER

    Institute of Scientific and Technical Information of China (English)

    Du Winncy

    2005-01-01

    The modeling and motion control of a universal part feeder is addressed. The feeder consists of a flat plate (or called bed) and a part placed on the plate. The bed can vibrate side-by-side (in x axis), back and forth (in y axis), clockwise and counter clockwise (about z axis), actuated by three linear motors (voice coils). When the bed does these vibrations, the part placed on the plat will have position and/or orientation change due to the interaction between the two contact surfaces. By controlling the ways in which the plate vibrates, the position and orientation of the part can be controlled. The two vibration profiles of the bed are investigated in the research: the high-low vibration mode and the bang-bang vibration mode. The motion equations of the bed and the part as well as the control schemes for the high-low vibration mode are presented. Both simulation and real-time testing verify the system's dynamic model and indicate the feasibilities of the developed control laws.

  20. Parsing social network survey data from hidden populations using stochastic context-free grammars.

    Directory of Open Access Journals (Sweden)

    Art F Y Poon

    Full Text Available BACKGROUND: Human populations are structured by social networks, in which individuals tend to form relationships based on shared attributes. Certain attributes that are ambiguous, stigmatized or illegal can create a OhiddenO population, so-called because its members are difficult to identify. Many hidden populations are also at an elevated risk of exposure to infectious diseases. Consequently, public health agencies are presently adopting modern survey techniques that traverse social networks in hidden populations by soliciting individuals to recruit their peers, e.g., respondent-driven sampling (RDS. The concomitant accumulation of network-based epidemiological data, however, is rapidly outpacing the development of computational methods for analysis. Moreover, current analytical models rely on unrealistic assumptions, e.g., that the traversal of social networks can be modeled by a Markov chain rather than a branching process. METHODOLOGY/PRINCIPAL FINDINGS: Here, we develop a new methodology based on stochastic context-free grammars (SCFGs, which are well-suited to modeling tree-like structure of the RDS recruitment process. We apply this methodology to an RDS case study of injection drug users (IDUs in Tijuana, México, a hidden population at high risk of blood-borne and sexually-transmitted infections (i.e., HIV, hepatitis C virus, syphilis. Survey data were encoded as text strings that were parsed using our custom implementation of the inside-outside algorithm in a publicly-available software package (HyPhy, which uses either expectation maximization or direct optimization methods and permits constraints on model parameters for hypothesis testing. We identified significant latent variability in the recruitment process that violates assumptions of Markov chain-based methods for RDS analysis: firstly, IDUs tended to emulate the recruitment behavior of their own recruiter; and secondly, the recruitment of like peers (homophily was dependent on

  1. Study on hierarchical and divisional configuration scheme of feeder automation%分层分区的馈线自动化配置方案研究

    Institute of Scientific and Technical Information of China (English)

    周文俊; 李春建; 王良; 叶灵君; 张君泉

    2013-01-01

    针对配电网特点,采取分层分区的馈线自动化配置方案,提高馈线自动化的实用性。将馈线自动化自下而上分为馈线层、馈线岛层和系统层三个层次。在馈线层和馈线岛层上,根据区域的不同特点提出不同的馈线自动化方案。在单电源线路上,采用简单可靠的无通信就地式FA。在馈线分支线的故障隔离上,提出了出线开关两次重合与支线负荷开关故障过流断开相结合的方法。还提出了一种基于故障信号数量求和的智能分布式FA方法。该方法简便直观,联络开关与分段开关判断逻辑可自动切换,能灵活适应运行方式的调整。在系统层的FA方面,通过网络拓扑与优化运行,在主网故障造成大范围停电时通过配电线路转供电来提高供电可靠性,并具有优化网络运行方式,减少停电的作用。%In order to improve the practicality of feeder automation, this paper adopts the hierarchical and divisional configuration scheme of feeder automation according to features of the distribution network. The feeder automation is divided into three layers from bottom to up:feeder layer, feeder island layer and system layer. On the feeder layer and the feeder island layer, different feeder automation schemes are suggested based on the regional characteristics. The FA mode without communication which is simple and reliable is adopted in the single power line. This paper combines the reclosing the breaker twice with opening the loader breaker to isolate the fault of the feeder’s branch line. A distributive and intelligent feeder automation method based on the sum of fault signals is proposed, which is simple and intuitionistic. This method is able to transform the judgment logic automatically between contact switch and section switch and adapt to the adjustment of the operating mode flexibly. On the system layer, this paper uses network topology and optimization operating to

  2. Clinical utility and limitations of tumor-feeder detection software for liver cancer embolization

    Energy Technology Data Exchange (ETDEWEB)

    Iwazawa, Jin, E-mail: iwazawa.jin@nissay-hp.or.jp [Department of Radiology, Nissay Hospital, 6-3-8 Itachibori, Nishiku, Osaka 550-0012 (Japan); Ohue, Shoichi, E-mail: ponpoko_tanuki.1125@softbank.ne.jp [Department of Radiology, Komatsu Hospital, 11-6 Kawakatsucho, Neyagawa 572-8567 (Japan); Hashimoto, Naoko, E-mail: nhashimoto0316@gmail.com [Department of Radiology, Nissay Hospital, 6-3-8 Itachibori, Nishiku, Osaka 550-0012 (Japan); Muramoto, Osamu, E-mail: muramoto.osamu@nissay-hp.or.jp [Department of Gastroenterology, Nissay Hospital, 6-3-8 Itachibori, Nishiku, Osaka 550-0012 (Japan); Mitani, Takashi, E-mail: mitani.takashi@nissay-hp.or.jp [Department of Radiology, Nissay Hospital, 6-3-8 Itachibori, Nishiku, Osaka 550-0012 (Japan)

    2013-10-01

    Purpose: To evaluate the clinical utility and limitations of a computer software program for detecting tumor feeders of hepatocellular carcinoma (HCC) during transarterial chemoembolization (TACE). Materials and methods: Forty-six patients with 59 HCC nodules underwent nonselective digital subtraction angiography (DSA) and C-arm computed tomography (CT) in the same hepatic artery. C-arm CT data sets were analyzed using the software to identify potential tumor feeders during each TACE session. For DSA analysis, 3 radiologists were independently assigned to identify tumor feeders using the DSA images in a separate session. The sensitivity of the 2 techniques in detecting tumor feeders was compared, with TACE findings as the reference standard. Factors affecting the failure of the software to detect tumor feeders were assessed by univariate and multivariate analyses. Results: We detected 65 tumor feeders supplying 59 HCC nodules during TACE sessions. The sensitivity of the software to detect tumor feeders was significantly higher than that of the manual assessment using DSA (87.7% vs. 71.8%, P < 0.001). Multivariate analysis showed that a tumor feeder diameter of <1.0 mm (hazard ratio [HR], 56.3; P = 0.003) and lipiodol accumulation adjacent to the tumor (HR, 11.4; P = 0.044) were the significant predictors for failure to detect tumor feeders. Conclusion: The software analysis was superior to manual assessment with DSA in detecting tumor feeders during TACE for HCC. However, the capability of the software to detect tumor feeders was limited by vessel caliber and by prior lipiodol accumulation to the tumor.

  3. What clinicians want: findings from a psychotherapy practice research network survey.

    Science.gov (United States)

    Tasca, Giorgio A; Sylvestre, John; Balfour, Louise; Chyurlia, Livia; Evans, Jane; Fortin-Langelier, Benjamin; Francis, Kylie; Gandhi, Jasmine; Huehn, Linda; Hunsley, John; Joyce, Anthony S; Kinley, Jackie; Koszycki, Diana; Leszcz, Molyn; Lybanon-Daigle, Vanessa; Mercer, Deanna; Ogrodniczuk, John S; Presniak, Michelle; Ravitz, Paula; Ritchie, Kerri; Talbot, Jeanne; Wilson, Brian

    2015-03-01

    Practice research networks may be one way of advancing knowledge translation and exchange (KTE) in psychotherapy. In this study, we document this process by first asking clinicians what they want from psychotherapy research. Eighty-two psychotherapists in 10 focus groups identified and discussed psychotherapy research topics relevant to their practices. An analysis of these discussions led to the development of 41 survey items. In an online survey, 1,019 participants, mostly practicing clinicians, rated the importance to their clinical work of these 41 psychotherapy research topics. Ratings were reduced using a principal components analysis in which 9 psychotherapy research themes emerged, accounting for 60.66% of the variance. Two postsurvey focus groups of clinicians (N = 22) aided in interpreting the findings. The ranking of research themes from most to least important were-Therapeutic Relationship/Mechanisms of Change, Therapist Factors, Training and Professional Development, Client Factors, Barriers and Stigma, Technology and Adjunctive Interventions, Progress Monitoring, Matching Clients to Therapist or Therapy, and Treatment Manuals. Few differences were noted in rankings based on participant age or primary therapeutic orientation. Postsurvey focus group participants were not surprised by the top-rated items, as they were considered most proximal and relevant to therapists and their work with clients during therapy sessions. Lower ranked items may be perceived as externally imposed agendas on the therapist and therapy. We discuss practice research networks as a means of creating new collaborations consistent with KTE goals. Findings of this study can help to direct practitioner-researcher collaborations.

  4. A Survey on Urban Traffic Management System Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kapileswar Nellore

    2016-01-01

    Full Text Available Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams. Wireless Sensor networks (WSNs have gained increasing attention in traffic detection and avoiding road congestion. WSNs are very trendy due to their faster transfer of information, easy installation, less maintenance, compactness and for being less expensive compared to other network options. There has been significant research on Traffic Management Systems using WSNs to avoid congestion, ensure priority for emergency vehicles and cut the Average Waiting Time (AWT of vehicles at intersections. In recent decades, researchers have started to monitor real-time traffic using WSNs, RFIDs, ZigBee, VANETs, Bluetooth devices, cameras and infrared signals. This paper presents a survey of current urban traffic management schemes for priority-based signalling, and reducing congestion and the AWT of vehicles. The main objective of this survey is to provide a taxonomy of different traffic management schemes used for avoiding congestion. Existing urban traffic management schemes for the avoidance of congestion and providing priority to emergency vehicles are considered and set the foundation for further research.

  5. A Survey on Urban Traffic Management System Using Wireless Sensor Networks.

    Science.gov (United States)

    Nellore, Kapileswar; Hancke, Gerhard P

    2016-01-27

    Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams. Wireless Sensor networks (WSNs) have gained increasing attention in traffic detection and avoiding road congestion. WSNs are very trendy due to their faster transfer of information, easy installation, less maintenance, compactness and for being less expensive compared to other network options. There has been significant research on Traffic Management Systems using WSNs to avoid congestion, ensure priority for emergency vehicles and cut the Average Waiting Time (AWT) of vehicles at intersections. In recent decades, researchers have started to monitor real-time traffic using WSNs, RFIDs, ZigBee, VANETs, Bluetooth devices, cameras and infrared signals. This paper presents a survey of current urban traffic management schemes for priority-based signalling, and reducing congestion and the AWT of vehicles. The main objective of this survey is to provide a taxonomy of different traffic management schemes used for avoiding congestion. Existing urban traffic management schemes for the avoidance of congestion and providing priority to emergency vehicles are considered and set the foundation for further research.

  6. Network level pavement evaluation with 1 mm 3D survey system

    Directory of Open Access Journals (Sweden)

    Kelvin C.P. Wang

    2015-12-01

    Full Text Available The latest iteration of PaveVision3D Ultra can obtain true 1 mm resolution 3D data at full-lane coverage in all 3 directions at highway speed up to 60 mph. This paper introduces the PaveVision3D Ultra technology for rapid network level pavement survey on approximately 1280 center miles of Oklahoma interstate highways. With sophisticated automated distress analyzer (ADA software interface, the collected 1 mm 3D data provide Oklahoma Department of Transportation (ODOT with comprehensive solutions for automated evaluation of pavement surface including longitudinal profile for roughness, transverse profile for rutting, predicted hydroplaning speed for safety analysis, and cracking and various surface defects for distresses. The pruned exact linear time (PELT method, an optimal partitioning algorithm, is implemented to identify change points and dynamically determine homogeneous segments so as to assist ODOT effectively using the available 1 mm 3D pavement surface condition data for decision-making. The application of 1 mm 3D laser imaging technology for network survey is unprecedented. This innovative technology allows highway agencies to access its options in using the 1 mm 3D system for its design and management purposes, particularly to meet the data needs for pavement management system (PMS, pavement ME design and highway performance monitoring system (HPMS.

  7. Do broilers prefer to eat from a certain type of feeder?

    Directory of Open Access Journals (Sweden)

    DP Neves

    2010-09-01

    Full Text Available This study compared three types of feeders for broilers: Fênix, Tube and Automatic feeders. Bird's feeding behavior and preference were considered in this the evaluation. Preference was assessed by examining birds' behavioral activities, such as eating, standing and lying around the equipments, and meal duration as function of the environmental variables. Data on the behavioral activities and meal size were collected in a broiler commercial farm using a portable video camera, and the direct footages were analyzed. The time spent in each activity, feeding bout duration and time spent near the trough were statistically analyzed using the test of means and medians. Pearson's correlation test was used to evaluate the relationship between ambient environmental data and the time of feeding. A prospective scenario was established and data were pair wised compared to it. There were interactions between environmental characteristics and feeding and lying down activities during the experiment. Eating behavior was more frequent in the area around the Tube feeder. The duration of feeding time was higher when the birds used the Tube feeder (214 ± 28s, followed by the use of the Fênix feeder (123 ± 17s and the Automatic feeder (77 ± 29s. Birds preferred eating from the Tube feeder probably due to the absence of the partition grid above the feeder plate.

  8. Improvement of Local Voltage in Feeders with Photovoltaic using Electric Vehicles

    DEFF Research Database (Denmark)

    Marra, Francesco; Yang, Guangya; Fawzy, Y. T.

    2013-01-01

    profiles. This paper proposes a storage strategy to alleviate voltage rise in feeders with PV, using coordinated electric vehicle (EV) load as the storage solution. The voltage support strategy is easy to implement practically and it is demonstrated on a test feeder emulating a household with roof...

  9. 76 FR 3655 - Bunker Hill Groundwater Basin, Riverside-Corona Feeder Project, San Bernardino and Riverside...

    Science.gov (United States)

    2011-01-20

    ... Bureau of Reclamation Bunker Hill Groundwater Basin, Riverside-Corona Feeder Project, San Bernardino and.../DEIS) for the proposed Riverside-Corona Feeder (RCF) Project. Interested parties are invited to comment..., 555 West 6th Street, San Bernardino, California 92410 Corona Public Library, 650 South Main...

  10. A survey on multimedia-based cross-layer optimization in visual sensor networks.

    Science.gov (United States)

    Costa, Daniel G; Guedes, Luiz Affonso

    2011-01-01

    Visual sensor networks (VSNs) comprised of battery-operated electronic devices endowed with low-resolution cameras have expanded the applicability of a series of monitoring applications. Those types of sensors are interconnected by ad hoc error-prone wireless links, imposing stringent restrictions on available bandwidth, end-to-end delay and packet error rates. In such context, multimedia coding is required for data compression and error-resilience, also ensuring energy preservation over the path(s) toward the sink and improving the end-to-end perceptual quality of the received media. Cross-layer optimization may enhance the expected efficiency of VSNs applications, disrupting the conventional information flow of the protocol layers. When the inner characteristics of the multimedia coding techniques are exploited by cross-layer protocols and architectures, higher efficiency may be obtained in visual sensor networks. This paper surveys recent research on multimedia-based cross-layer optimization, presenting the proposed strategies and mechanisms for transmission rate adjustment, congestion control, multipath selection, energy preservation and error recovery. We note that many multimedia-based cross-layer optimization solutions have been proposed in recent years, each one bringing a wealth of contributions to visual sensor networks.

  11. Artificial Neural Networks for Processing Graphs with Application to Image Understanding: A Survey

    Science.gov (United States)

    Bianchini, Monica; Scarselli, Franco

    In graphical pattern recognition, each data is represented as an arrangement of elements, that encodes both the properties of each element and the relations among them. Hence, patterns are modelled as labelled graphs where, in general, labels can be attached to both nodes and edges. Artificial neural networks able to process graphs are a powerful tool for addressing a great variety of real-world problems, where the information is naturally organized in entities and relationships among entities and, in fact, they have been widely used in computer vision, f.i. in logo recognition, in similarity retrieval, and for object detection. In this chapter, we propose a survey of neural network models able to process structured information, with a particular focus on those architectures tailored to address image understanding applications. Starting from the original recursive model (RNNs), we subsequently present different ways to represent images - by trees, forests of trees, multiresolution trees, directed acyclic graphs with labelled edges, general graphs - and, correspondingly, neural network architectures appropriate to process such structures.

  12. Feeder cells support the culture of induced pluripotent stem cells even after chemical fixation.

    Directory of Open Access Journals (Sweden)

    Xiao-Shan Yue

    Full Text Available Chemically fixed mouse embryonic fibroblasts (MEFs, instead of live feeder cells, were applied to the maintenance of mouse induced pluripotent stem (miPS cells. Formaldehyde and glutaraldehyde were used for chemical fixation. The chemically fixed MEF feeders maintained the pluripotency of miPS cells, as well as their undifferentiated state. Furthermore, the chemically fixed MEF feeders were reused several times without affecting their functions. These results indicate that chemical fixation can be applied to modify biological feeders chemically, without losing their original functions. Chemically fixed MEF feeders will be applicable to other stem cell cultures as a reusable extracellular matrix candidate that can be preserved on a long-term basis.

  13. Derivation of Human Skin Fibroblast Lines for Feeder Cells of Human Embryonic Stem Cells.

    Science.gov (United States)

    Unger, Christian; Felldin, Ulrika; Rodin, Sergey; Nordenskjöld, Agneta; Dilber, Sirac; Hovatta, Outi

    2016-02-03

    After the first derivations of human embryonic stem cell (hESC) lines on fetal mouse feeder cell layers, the idea of using human cells instead of mouse cells as feeder cells soon arose. Mouse cells bear a risk of microbial contamination, and nonhuman immunogenic proteins are absorbed from the feeders to hESCs. Human skin fibroblasts can be effectively used as feeder cells for hESCs. The same primary cell line, which can be safely used for up to 15 passages after stock preparations, can be expanded and used for large numbers of hESC derivations and cultures. These cells are relatively easy to handle and maintain. No animal facilities or animal work is needed. Here, we describe the derivation, culture, and cryopreservation procedures for research-grade human skin fibroblast lines. We also describe how to make feeder layers for hESCs using these fibroblasts.

  14. Conditioned medium from feeder STO cells increases the attachment of mouse embryonic stem cells.

    Science.gov (United States)

    Amano, Kenichiro; Furuno, Tadahide; Nakanishi, Mamoru

    2006-08-01

    Mouse embryonic stem (ES) cell lines, which were established by culturing on feeder cells, have usually been cultured without feeder cells in the presence of leukemia inhibitory factor. However, proliferating rate of ES cells in the condition is often lower than that with feeder cells. Here, we found that conditioned medium (CM) from feeder cells (STO cells) increased the number of undifferentiated cells in a culture dish by promoting attachment of ES cells. The attached cells were increased in 4 h after replating ES cells in the presence of CM from STO cells, and they formed flat colonies composed of undifferentiated cells. This culture system with CM from feeder cells is useful in preparing a large number of well-defined ES cells. In addition, from present experiments we found that the dish double-coated with gelatin and CM was extremely useful for culturing ES cells.

  15. Minimal incorporation of Deepwater Horizon oil by estuarine filter feeders.

    Science.gov (United States)

    Fry, Brian; Anderson, Laurie C

    2014-03-15

    Natural abundance carbon isotope analyses are sensitive tracers for fates and use of oil in aquatic environments. Use of oil carbon in estuarine food webs should lead to isotope values approaching those of oil itself, -27‰ for stable carbon isotopes reflecting oil origins and -1000‰ for carbon-14 reflecting oil age. To test for transfer of oil from the 2010 Deepwater Horizon spill into estuarine food webs, filter-feeding barnacles (Balanus sp.) and marsh mussels (Geukensia demissa) were collected from Louisiana estuaries near the site of the oil spill. Carbon-14 analyses of these animals from open waters and oiled marshes showed that oil use was <1% and near detection limits estimated at 0.3% oil incorporation. Respiration studies showed no evidence for enhanced microbial activity in bay waters. Results are consistent with low dietary impacts of oil for filter feeders and little overall impact on respiration in the productive Louisiana estuarine systems.

  16. Microplastic in a macro filter feeder: Humpback whale Megaptera novaeangliae.

    Science.gov (United States)

    Besseling, E; Foekema, E M; Van Franeker, J A; Leopold, M F; Kühn, S; Bravo Rebolledo, E L; Heße, E; Mielke, L; IJzer, J; Kamminga, P; Koelmans, A A

    2015-06-15

    Marine filter feeders are exposed to microplastic because of their selection of small particles as food source. Baleen whales feed by filtering small particles from large water volumes. Macroplastic was found in baleen whales before. This study is the first to show the presence of microplastic in intestines of a baleen whale (Megaptera novaeangliae). Contents of its gastrointestinal tract were sieved, dissolved in 10% potassium hydroxide and washed. From the remaining dried material, potential synthetic polymer particles were selected based on density and appearance, and analysed by Fourier transform infrared (FTIR) spectroscopy. Several polymer types (polyethylene, polypropylene, polyvinylchloride, polyethylene terephthalate, nylon) were found, in varying particle shapes: sheets, fragments and threads with a size of 1mm to 17cm. This diversity in polymer types and particle shapes, can be interpreted as a representation of the varying characteristics of marine plastic and the unselective way of ingestion by M. novaeangliae. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Nitrogen fixed by cyanobacteria is utilized by deposit-feeders.

    Directory of Open Access Journals (Sweden)

    Agnes M L Karlson

    Full Text Available Benthic communities below the photic zone depend for food on allochthonous organic matter derived from seasonal phytoplankton blooms. In the Baltic Sea, the spring diatom bloom is considered the most important input of organic matter, whereas the contribution of the summer bloom dominated by diazotrophic cyanobacteria is less understood. The possible increase in cyanobacteria blooms as a consequence of eutrophication and climate change calls for evaluation of cyanobacteria effects on benthic community functioning and productivity. Here, we examine utilization of cyanobacterial nitrogen by deposit-feeding benthic macrofauna following a cyanobacteria bloom at three stations during two consecutive years and link these changes to isotopic niche and variations in body condition (assayed as C:N ratio of the animals. Since nitrogen-fixing cyanobacteria have δ(15N close to -2‰, we expected the δ(15N in the deposit-feeders to decrease after the bloom if their assimilation of cyanobacteria-derived nitrogen was substantial. We also expected the settled cyanobacteria with their associated microheterotrophic community and relatively high nitrogen content to increase the isotopic niche area, trophic diversity and dietary divergence between individuals (estimated as the nearest neighbour distance in the benthic fauna after the bloom. The three surface-feeding species (Monoporeia affinis, Macoma balthica and Marenzelleria arctia showed significantly lower δ(15N values after the bloom, while the sub-surface feeder Pontoporeia femorata did not. The effect of the bloom on isotopic niche varied greatly between stations; populations which increased niche area after the bloom had better body condition than populations with reduced niche, regardless of species. Thus, cyanobacterial nitrogen is efficiently integrated into the benthic food webs in the Baltic, with likely consequences for their functioning, secondary production, transfer efficiency, trophic

  18. Nitrogen fixed by cyanobacteria is utilized by deposit-feeders.

    Science.gov (United States)

    Karlson, Agnes M L; Gorokhova, Elena; Elmgren, Ragnar

    2014-01-01

    Benthic communities below the photic zone depend for food on allochthonous organic matter derived from seasonal phytoplankton blooms. In the Baltic Sea, the spring diatom bloom is considered the most important input of organic matter, whereas the contribution of the summer bloom dominated by diazotrophic cyanobacteria is less understood. The possible increase in cyanobacteria blooms as a consequence of eutrophication and climate change calls for evaluation of cyanobacteria effects on benthic community functioning and productivity. Here, we examine utilization of cyanobacterial nitrogen by deposit-feeding benthic macrofauna following a cyanobacteria bloom at three stations during two consecutive years and link these changes to isotopic niche and variations in body condition (assayed as C:N ratio) of the animals. Since nitrogen-fixing cyanobacteria have δ(15)N close to -2‰, we expected the δ(15)N in the deposit-feeders to decrease after the bloom if their assimilation of cyanobacteria-derived nitrogen was substantial. We also expected the settled cyanobacteria with their associated microheterotrophic community and relatively high nitrogen content to increase the isotopic niche area, trophic diversity and dietary divergence between individuals (estimated as the nearest neighbour distance) in the benthic fauna after the bloom. The three surface-feeding species (Monoporeia affinis, Macoma balthica and Marenzelleria arctia) showed significantly lower δ(15)N values after the bloom, while the sub-surface feeder Pontoporeia femorata did not. The effect of the bloom on isotopic niche varied greatly between stations; populations which increased niche area after the bloom had better body condition than populations with reduced niche, regardless of species. Thus, cyanobacterial nitrogen is efficiently integrated into the benthic food webs in the Baltic, with likely consequences for their functioning, secondary production, transfer efficiency, trophic interactions, and

  19. Development of an extruder-feeder biomass direct liquefaction process

    Energy Technology Data Exchange (ETDEWEB)

    White, D.H.; Wolf, D. (Arizona Univ., Tucson, AZ (United States). Dept. of Chemical Engineering)

    1991-10-01

    As an abundant, renewable, domestic energy resource, biomass could help the United States reduce its dependence on imported oil. Biomass is the only renewable energy technology capable of addressing the national need for liquid transportation fuels. Thus, there is an incentive to develop economic conversion processes for converting biomass, including wood, into liquid fuels. Through research sponsored by the US DOE's Biomass Thermochemical Conversion Program, the University of Arizona has developed a unique biomass direct liquefaction system. The system features a modified single-screw extruder capable of pumping solid slurries containing as high as 60 wt % wood flour in wood oil derived vacuum bottoms at pressures up to 3,000 psi. By comparison, conventional pumping systems are capable of pumping slurries containing only 10--20 wt % wood flour in wood oil under similar conditions. The extruder-feeder has been integrated with a unique reactor to form a system which offers potential for improving high pressure biomass direct liquefaction technology. The extruder-feeder acts simultaneously as both a feed preheater and a pumping device for injecting wood slurries into a 3,000 psi pressure reactor in the biomass liquefaction process. An experimental facility was constructed during 1983--84. Following shakedown operations, wood crude oil was produced by mid-1985. During the period January 1985 through July 1988, a total of 57 experimental continuous biomass liquefaction runs were made using White Birch wood feedstock. Good operability was achieved at slurry feed rates up to 30 lb/hr, reactor pressures from 800 to 3,000 psi and temperatures from 350{degrees}C to 430{degrees}C under conditions covering a range of carbon monoxide feed rates and sodium carbonate catalyst addition. Crude wood oils containing as little as 6--10 wt % residual oxygen were produced. 43 refs., 81 figs., 52 tabs.

  20. A Feeder-Bus Dispatch Planning Model for Emergency Evacuation in Urban Rail Transit Corridors

    Science.gov (United States)

    Wang, Yun; Yan, Xuedong; Zhou, Yu; Zhang, Wenyi

    2016-01-01

    The mobility of modern metropolises strongly relies on urban rail transit (URT) systems, and such a heavy dependence causes that even minor service interruptions would make the URT systems unsustainable. This study aims at optimally dispatching the ground feeder-bus to coordinate with the urban rails’ operation for eliminating the effect of unexpected service interruptions in URT corridors. A feeder-bus dispatch planning model was proposed for the collaborative optimization of URT and feeder-bus cooperation under emergency situations and minimizing the total evacuation cost of the feeder-buses. To solve the model, a concept of dummy feeder-bus system is proposed to transform the non-linear model into traditional linear programming (ILP) model, i.e., traditional transportation problem. The case study of Line #2 of Nanjing URT in China was adopted to illustrate the model application and sensitivity analyses of the key variables. The modeling results show that as the evacuation time window increases, the total evacuation cost as well as the number of dispatched feeder-buses decrease, and the dispatched feeder-buses need operate for more times along the feeder-bus line. The number of dispatched feeder-buses does not show an obvious change with the increase of parking spot capacity and time window, indicating that simply increasing the parking spot capacity would cause huge waste for the emergent bus utilization. When the unbalanced evacuation demand exists between stations, the more feeder-buses are needed. The method of this study will contribute to improving transportation emergency management and resource allocation for URT systems. PMID:27676179

  1. A Feeder-Bus Dispatch Planning Model for Emergency Evacuation in Urban Rail Transit Corridors.

    Science.gov (United States)

    Wang, Yun; Yan, Xuedong; Zhou, Yu; Zhang, Wenyi

    The mobility of modern metropolises strongly relies on urban rail transit (URT) systems, and such a heavy dependence causes that even minor service interruptions would make the URT systems unsustainable. This study aims at optimally dispatching the ground feeder-bus to coordinate with the urban rails' operation for eliminating the effect of unexpected service interruptions in URT corridors. A feeder-bus dispatch planning model was proposed for the collaborative optimization of URT and feeder-bus cooperation under emergency situations and minimizing the total evacuation cost of the feeder-buses. To solve the model, a concept of dummy feeder-bus system is proposed to transform the non-linear model into traditional linear programming (ILP) model, i.e., traditional transportation problem. The case study of Line #2 of Nanjing URT in China was adopted to illustrate the model application and sensitivity analyses of the key variables. The modeling results show that as the evacuation time window increases, the total evacuation cost as well as the number of dispatched feeder-buses decrease, and the dispatched feeder-buses need operate for more times along the feeder-bus line. The number of dispatched feeder-buses does not show an obvious change with the increase of parking spot capacity and time window, indicating that simply increasing the parking spot capacity would cause huge waste for the emergent bus utilization. When the unbalanced evacuation demand exists between stations, the more feeder-buses are needed. The method of this study will contribute to improving transportation emergency management and resource allocation for URT systems.

  2. 30 CFR 77.1802 - Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley...

    Science.gov (United States)

    2010-07-01

    ... wires and bare signal wires; guarding of trolley wires and trolley feeder wires. 77.1802 Section 77.1802... Wires and Trolley Feeder Wires § 77.1802 Insulation of trolley wires, trolley feeder wires and bare..., and bare signal wires shall be adequately guarded: (a) At all points where men are required to work or...

  3. Social networking and Internet use among pelvic floor patients: a multicenter survey.

    Science.gov (United States)

    Mazloomdoost, Donna; Kanter, Gregory; Chan, Robert C; Deveaneau, Nicolette; Wyman, Allison M; Von Bargen, Emily C; Chaudhry, Zaid; Elshatanoufy, Solafa; Miranne, Jeannine M; Chu, Christine M; Pauls, Rachel N; Arya, Lily A; Antosh, Danielle D

    2016-11-01

    Internet resources are becoming increasingly important for patients seeking medical knowledge. It is imperative to understand patient use and preferences for using the Internet and social networking websites to optimize patient education. The purpose of this study was to evaluate social networking and Internet use among women with pelvic floor complaints to seek information for their conditions as well as describe the likelihood, preferences, and predictors of website usage. This was a cross-sectional, multicenter study of women presenting to clinical practices of 10 female pelvic medicine and reconstructive surgery fellowship programs across the United States, affiliated with the Fellows' Pelvic Research Network. New female patients presenting with pelvic floor complaints, including urinary incontinence, pelvic organ prolapse, and fecal incontinence were eligible. Participants completed a 24 item questionnaire designed by the authors to assess demographic information, general Internet use, preferences regarding social networking websites, referral patterns, and resources utilized to learn about their pelvic floor complaints. Internet use was quantified as high (≥4 times/wk), moderate (2-3 times/wk), or minimal (≤1 time/wk). Means were used for normally distributed data and medians for data not meeting this assumption. Fisher's exact and χ(2) tests were used to evaluate the associations between variables and Internet use. A total of 282 surveys were analyzed. The majority of participants, 83.3%, were white. The mean age was 55.8 years old. Referrals to urogynecology practices were most frequently from obstetrician/gynecologists (39.9%) and primary care providers (27.8%). Subjects were well distributed geographically, with the largest representation from the South (38.0%). Almost one third (29.9%) were most bothered by prolapse complaints, 22.0% by urgency urinary incontinence, 20.9% by stress urinary incontinence, 14.9% by urgency/frequency symptoms, and 4

  4. Diffusion on social networks: Survey data from rural villages in central China

    Directory of Open Access Journals (Sweden)

    Hang Xiong

    2016-06-01

    Full Text Available Empirical studies on social diffusions are often restricted by the access to data of diffusion and social relations on the same objects. We present a set of first-hand data that we collected in ten rural villages in central China through household surveys. The dataset contains detailed and comprehensive data of the diffusion of an innovation, the major social relationships and the household level demographic characteristics in these villages. The data have been used to study peer effects in social diffusion using simulation models, “Peer Effects and Social Network: The Case of Rural Diffusion in Central China” [1]. They can also be used to estimate spatial econometric models. Data are supplied with this article.

  5. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

    Directory of Open Access Journals (Sweden)

    Mohamed S. Abdalzaher

    2016-06-01

    Full Text Available We present a study of using game theory for protecting wireless sensor networks (WSNs from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  6. Information system evolution at the French National Network of Seismic Survey (BCSF-RENASS)

    Science.gov (United States)

    Engels, F.; Grunberg, M.

    2013-12-01

    The aging information system of the French National Network of Seismic Survey (BCSF-RENASS), located in Strasbourg (EOST), needed to be updated to satisfy new practices from Computer science world. The latter means to evolve our system at different levels : development method, datamining solutions, system administration. The new system had to provide more agility for incoming projects. The main difficulty was to maintain old system and the new one in parallel the time to validate new solutions with a restricted team. Solutions adopted here are coming from standards used by the seismological community and inspired by the state of the art of devops community. The new system is easier to maintain and take advantage of large community to find support. This poster introduces the new system and choosen solutions like Puppet, Fabric, MongoDB and FDSN Webservices.

  7. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

    Science.gov (United States)

    Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-06-29

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  8. A Survey on Temperature-Aware Routing Protocols in Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangman Moh

    2013-08-01

    Full Text Available The rapid growth of the elderly population in the world and the rising cost of healthcare impose big issues for healthcare and medical monitoring. A Wireless Body Sensor Network (WBSN is comprised of small sensor nodes attached inside, on or around a human body, the main purpose of which is to monitor the functions and surroundings of the human body. However, the heat generated by the node’s circuitry and antenna could cause damage to the human tissue. Therefore, in designing a routing protocol for WBSNs, it is important to reduce the heat by incorporating temperature into the routing metric. The main contribution of this paper is to survey existing temperature-aware routing protocols that have been proposed for WBSNs. In this paper, we present a brief overview of WBSNs, review the existing routing protocols comparatively and discuss challenging open issues in the design of routing protocols.

  9. A survey of system architecture requirements for health care-based wireless sensor networks.

    Science.gov (United States)

    Egbogah, Emeka E; Fapojuwo, Abraham O

    2011-01-01

    Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.

  10. A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abraham O. Fapojuwo

    2011-05-01

    Full Text Available Wireless Sensor Networks (WSNs have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera. However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.

  11. Site effects in the Amatrice municipality through dense seismic network and detailed geological-geophysical survey

    Science.gov (United States)

    Cultrera, Giovanna; Cardinali, Mauro; de Franco, Roberto; Gallipoli, Maria Rosaria; Pacor, Francesca; Pergalani, Floriana; Milana, Giuliano; Moscatelli, Massimiliano

    2017-04-01

    After the first mainshock of the 2016 Central Italy seismic sequence, several Italian Institutions (under the umbrella of the Italian Center for Seismic Microzonation; http://www.centromicrozonazionesismica.it) conducted a preparatory survey to seismic microzonation of the Amatrice municipality, badly affected by the Mw 6.0 Amatrice earthquake of August 24. Despite the difficulties due to the heavily damaged investigated area and the winter weather condition, a large amount of different data were gathered in a very short time: (i) geological and geomorphological surveys (field trip and photo-geological interpretation), (ii) geophysical measurements (noise single-station and arrays, geoelectric, seismic refraction, MASW), and (iii) continuous seismic recordings from temporary network. In particular, 35 seismic stations were installed from half-September to early-December in an area of 170 km2, equipped with both velocimeter and accelerometer. They recorded thousands of earthquakes, including the Mw 6.5 of October 30, 2016; the continuous data will be organized in the EIDA repository (http://www.orfeus-eu.org/data/eida) through the INGV EIDA-node. The sites selection was performed according to the following criteria: representativeness of the geological conditions of 26 hamlets that experienced a damage level greater than VII MCS degree, optimization of the network geometry for array analysis, redundancy of bedrock reference sites, safety and accessibility. The photo-geology and the field investigations allowed the realization of a detailed geological-technical map of the area, characterized by peculiar features, namely the distinction between bedrock and Quaternary deposits (alluvial deposits and terraces, alluvial fans, landslides) and morpho-structural features (faults, folds, bedding attitude). Preliminary results allowed also the evaluation of the velocity models that show surface shear wave velocities (Vs) ranging from 200 m/s to 600 m/s. Data analysis of

  12. Survey on Energy Efficiency in DSR/AODV Protocols in Wireless Network

    Directory of Open Access Journals (Sweden)

    M.Selvi

    2013-05-01

    Full Text Available The demand for high data-rate multimedia wireless communications has been growing rapidly. As standards are addressing higher capacity wireless links to meet increasing demands, device power consumption is also increasing. Although silicon technology is progressing exponentially, doubling about every two years, processor power consumption is also increasing by 150% every two years. In contrast, the improvement in battery technology is much slower, increasing a modest 10% every two years, leading to an exponentially increasing gap between the demand for energy and the battery capacity offered. Furthermore, the shrinking device sizes are also imposing an ergonomic limit on the battery capacity available. A wireless network consists of a large number of small sensor nodes with sensing, data processing, and communication capabilities, which are deployed in a region of interest and collaborate to accomplish a common task, a sensor network has many unique characteristics, such as denser node deployment, higher unreliability of sensor nodes, asymmetric data transmission, and severe power, computation, and memory constraints, which present many new challenges for the development and eventual application of wireless sensor networks. In particular, sensor nodes are usually battery-powered and should operate without attendance for a relatively long period of time. In most cases, it is very difficult and even impossible to change or recharge batteries for these sensor nodes. Thus, energy-saving routing protocol in wireless networks is necessary for increasing the network lifetime. In this paper we present a comparative study of different routing algorithms and analysis of same is presented in the paper. Different routing protocols have been proposed to improve the performance. All routing protocols have different behavior than others for improving and maintaining the routing performance. Routing protocols determines the route, which is required .The

  13. Manufacturing design and development of the current feeders and coil terminal boxes for JT-60SA

    Energy Technology Data Exchange (ETDEWEB)

    Kizu, Kaname, E-mail: kizu.kaname@jaea.go.jp [Japan Atomic Energy Agency, Naka, Ibaraki 311-0193 (Japan); Murakami, Haruyuki; Natsume, Kyohei; Tsuchiya, Katsuhiko; Koide, Yoshihiko; Yoshida, Kiyoshi [Japan Atomic Energy Agency, Naka, Ibaraki 311-0193 (Japan); Obana, Tetsuhiro; Hamaguchi, Shinji; Takahata, Kazuya [National Institute for Fusion Science, Toki, Gifu 509-5292 (Japan)

    2015-10-15

    Highlights: • Key components for current feeding system for JT-60SA were developed and tested. • The joint resistance of feeder joint sample was 1.7 nΩ at 2 T, 20 kA. • Trial manufacturing of crank shaped feeder showed the max. dimensional error of 3 mm. • Feeder insulation samples showed >60 MPa in shear strength at 77 K. - Abstract: Feeders and coil terminal boxes (CTBs) of the superconducting magnets for JT-60SA have been designed. A small tool which can connect soldering joint with vertical direction in the cryostat has been developed. The joint resistance of the sample showed 1.7 nΩ at 2 T, 4.2 K, 20 kA which is within the requirement of <5 nΩ. A prototype feeder in CTB with crank shape was manufactured. The maximum dimensional error was 3 mm being within the requirement of ±10 mm. Feeder insulation samples showed a shear strength >60 MPa which is much higher than the requirement of 10 MPa as derived from analysis. Since all the manufacturing processes concerned have been proof-tested, the production of feeders and CTBs has been released.

  14. 739 observed NEAs and new 2-4m survey statistics within the EURONEAR network

    CERN Document Server

    Vaduvescu, O; Tudorica, A; Popescu, M; Colas, F; Asher, D J; Sonka, A; Suciu, O; Lacatus, D; Paraschiv, A; Badescu, T; Tercu, O; Dumitriu, A; Chirila, A; Stecklum, B; Licandro, J; Nedelcu, A; Turcu, E; Vachier, F; Beauvalet, L; Taris, F; Bouquillon, L; Nunez, F Pozo; Saavedra, J P Colque; Unda-Sanzana, E; Karami, M; Khosroshahi, H G; Toma, R; Ledo, H; Tyndall, A; Patrick, L; Fohring, D; Muelheims, D; Enzian, G; Klaes, D; Lenz, D; Mahlberg, P; Ordenes, Y; Sendlinger, K

    2013-01-01

    We report follow-up observations of 477 program Near-Earth Asteroids (NEAs) using nine telescopes of the EURONEAR network having apertures between 0.3 and 4.2 m. Adding these NEAs to our previous results we now count 739 program NEAs followed-up by the EURONEAR network since 2006. The targets were selected using EURONEAR planning tools focusing on high priority objects. Analyzing the resulting orbital improvements suggests astrometric follow-up is most important days to weeks after discovery, with recovery at a new opposition also valuable. Additionally we observed 40 survey fields spanning three nights covering 11 sq. degrees near opposition, using the Wide Field Camera on the 2.5m Isaac Newton Telescope (INT), resulting in 104 discovered main belt asteroids (MBAs) and another 626 unknown one-night objects. These fields, plus program NEA fields from the INT and from the wide field MOSAIC II camera on the Blanco 4m telescope, generated around 12,000 observations of 2,000 minor planets (mostly MBAs) observed i...

  15. Fitness for service assessment of degraded CANDU feeder piping-Canadian regulatory expectations

    Energy Technology Data Exchange (ETDEWEB)

    Jin, John C., E-mail: john.jin@cnsc-ccsn.gc.c [Operational Engineering Assessment Div., Canadian Nuclear Safety Commission (Canada); Awad, Raoul [Operational Engineering Assessment Div., Canadian Nuclear Safety Commission (Canada)

    2011-03-15

    Allowance for the continued operation of feeder piping at some Canadian CANDU stations, which is experiencing active degradation mechanisms, has been based primarily on augmented inspection practices and conservative fitness for service assessments. The major degradation mechanisms identified to date are: pipe wall thinning due to Flow Accelerated Corrosion (FAC) and service induced cracking due to Intergranular Cracking due to Stress Corrosion Cracking (SCC) and potentially Low Temperature Creep Cracking (LTCC) mechanisms. Given that currently available industry codes and standards do not provide sufficient guidelines/criteria for assessing the degradation of feeder pipes, the Canadian Nuclear Safety Commission (CNSC) has asked the utilities to establish feeder pipe specific procedures to provide reasonable assurance that the risk associated with the feeder degradation is maintained at an acceptably low level. In response to this requirement, the Canadian CANDU industry has developed and continued to update feeder fitness for service guidelines to provide evaluation procedures and industry standard acceptance criteria for assessing the structural integrity of the feeder pipes. The scope and frequency of inspections are determined based on the results of the fitness for service assessments taking into account the relative susceptibility of feeder pipes to each specific degradation mechanism. While industry practices for the management of degraded feeder pipes have, in general, been complied with the regulatory expectations, outstanding issues still remain. Major regulatory concerns include uncertainties associated with limitations in both the inspection techniques and the mechanistic understanding of the degradation processes, which can impede inspection planning and fitness for service assessments. This paper presents the regulator's view of the current situation with respect to degradation of feeder piping, its implications for nuclear safety and the

  16. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  17. Feasibility and practice of nodular iron casting feeder-less production

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The volumetric changes of castings and dimension changes of mould cavity occurring during liquid cooling and solidification of nodular iron castings were described. The feasibility and prerequisites to realize feeder-less production of nodular iron castings was analyzed and proved with practical examples. It was pointed out that the feeder-less foundry method is by no means a feeding-less method, and it was emphasized that adopting high carbon equivalent, high rigidity mould, simultaneous and synchronous solidification, and intensifying cooling capacity of the mould to increase feeding effect of the gating system are important to successfully realize feeder-less production of nodular iron castings.

  18. Feeding Against Gravity with Spot Feeders in High Silicon Ductile Iron

    DEFF Research Database (Denmark)

    Vedel-Smith, Nikolaj Kjelgaard; Tiedje, Niels Skat

    2014-01-01

    A test pattern, with three different moduli castings was developed to investigate methods to optimise feeding of high silicon ductile cast irons. Different feeder types, modulus, and locations were investigated using both an insulating and an exothermal sleeve material. Porosities were analysed......-hill against gravity. This effect may contribute to the thermal expansion created by the exothermal reaction. It was also found that the optimum feeder size does not scale linearly with the casting modulus but that larger casting modulus requires relatively smaller modulus feeders. The thermal gradient created...

  19. Feasibility and practice of nodular iron casting feeder-less production

    Directory of Open Access Journals (Sweden)

    ZHOU Gen

    2006-02-01

    Full Text Available The volumetric changes of castings and dimension changes of mould cavity occurring during liquid cooling and solidification of nodular iron castings were described. The feasibility and prerequisites to realize feeder-less production of nodular iron castings was analyzed and proved with practical examples. It was pointed out that the feeder-less foundry method is by no means a feeding-less method, and it was emphasized that adopting high carbon equivalent, high rigidity mould, simultaneous and synchronous solidification, and intensifying cooling capacity of the mould to increase feeding effect of the gating system are important to successfully realize feeder-less production of nodular iron castings.

  20. Convex relaxation of Optimal Power Flow in Distribution Feeders with embedded solar power

    DEFF Research Database (Denmark)

    Hermann, Alexander Niels August; Wu, Qiuwei; Huang, Shaojun;

    2016-01-01

    There is an increasing interest in using Distributed Energy Resources (DER) directly coupled to end user distribution feeders. This poses an array of challenges because most of today’s distribution feeders are designed for unidirectional power flow. Therefore when installing DERs such as solar pa...... to minimize the global line losses of the feeder. The mathematical model is presented in details. Further, case studies are completed with simulations involving a 15-bus radial distribution system. These simulations are run for 24 hour periods, with actual solar data and demand data....

  1. Modeling and Control of Low Voltage Flexible Units for Enhanced Operation of Distribution Feeders

    DEFF Research Database (Denmark)

    Raboni, Pietro; Hu, Weihao; Chaudhary, Sanjay

    2013-01-01

    Battery (EVB) is proposed for providing primary regulation in grid connected mode and for hierarchically manage an islanded LV distribution feeder. The unit models are described and a novel EVB model directly based on manufacturer’s data is proposed and evaluated comparing its performances with Sim......PowerSystems library block. Moreover a voltage dependant power term is applied to the Voltage-Source Converter (VSC) control scheme of the EVB for improving the performances of the islanded feeder. The control is tested in case of under frequency and consequent load shedding occurring at the residential feeder...

  2. Real-time modeling and simulation of distribution feeder and distributed resources

    Science.gov (United States)

    Singh, Pawan

    The analysis of the electrical system dates back to the days when analog network analyzers were used. With the advent of digital computers, many programs were written for power-flow and short circuit analysis for the improvement of the electrical system. Real-time computer simulations can answer many what-if scenarios in the existing or the proposed power system. In this thesis, the standard IEEE 13-Node distribution feeder is developed and validated on a real-time platform OPAL-RT. The concept and the challenges of the real-time simulation are studied and addressed. Distributed energy resources include some of the commonly used distributed generation and storage devices like diesel engine, solar photovoltaic array, and battery storage system are modeled and simulated on a real-time platform. A microgrid encompasses a portion of an electric power distribution which is located downstream of the distribution substation. Normally, the microgrid operates in paralleled mode with the grid; however, scheduled or forced isolation can take place. In such conditions, the microgrid must have the ability to operate stably and autonomously. The microgrid can operate in grid connected and islanded mode, both the operating modes are studied in the last chapter. Towards the end, a simple microgrid controller modeled and simulated on the real-time platform is developed for energy management and protection for the microgrid.

  3. Laminin-511 expression is associated with the functionality of feeder cells in human embryonic stem cell culture.

    Science.gov (United States)

    Hongisto, Heidi; Vuoristo, Sanna; Mikhailova, Alexandra; Suuronen, Riitta; Virtanen, Ismo; Otonkoski, Timo; Skottman, Heli

    2012-01-01

    Fibroblast feeder cells play an important role in supporting the derivation and long term culture of undifferentiated, pluripotent human embryonic stem cells (hESCs). The feeder cells secrete various growth factors and extracellular matrix (ECM) proteins into extracellular milieu. However, the roles of the feeder cell-secreted factors are largely unclear. Animal feeder cells and use of animal serum also make current feeder cell culture conditions unsuitable for derivation of clinical grade hESCs. We established xeno-free feeder cell lines using human serum (HS) and studied their function in hESC culture. While human foreskin fibroblast (hFF) feeder cells were clearly hESC supportive, none of the established xeno-free human dermal fibroblast (hDF) feeder cells were able to maintain undifferentiated hESC growth. The two fibroblast types were compared for their ECM protein synthesis, integrin receptor expression profiles and key growth factor secretion. We show that hESC supportive feeder cells produce laminin-511 and express laminin-binding integrins α3ß1, α6ß1 and α7ß1. These results indicate specific laminin isoforms and integrins in maintenance of hESC pluripotency in feeder-dependent cultures. In addition, several genes with a known or possible role for hESC pluripotency were differentially expressed in distinct feeder cells. Copyright © 2011 Elsevier B.V. All rights reserved.

  4. Stability analysis and compensation of network-induced delays in communication-based power system control: A survey.

    Science.gov (United States)

    Liu, Shichao; Liu, Peter Xiaoping; Wang, Xiaoyu

    2017-01-01

    This survey is to summarize and compare existing and recently emerging approaches for the analysis and compensation of the effects of network-induced delays on the stability and performance of communication-based power control systems. Several important communication-based power control systems are briefly introduced. The deterministic and stochastic methodologies of analyzing the impacts of network-induced delays on the stability of the communication-based power control systems are summarized and compared. A variety of control approaches are reviewed and compared for mitigating the effects of network-induced delays, depending on several design requirements, such as model dependence and design difficulty. The summary and comparison of these control approaches in this survey provide researchers and utilities valuable guidance for designing advanced communication-based power control systems in the future.

  5. Analysis of broadcasting satellite service feeder link power control and polarization

    Science.gov (United States)

    Sullivan, T. M.

    1982-01-01

    Statistical analyses of carrier to interference power ratios (C/Is) were performed in assessing 17.5 GHz feeder links using (1) fixed power and power control, and (2) orthogonal linear and orthogonal circular polarizations. The analysis methods and attenuation/depolarization data base were based on CCIR findings to the greatest possible extent. Feeder links using adaptive power control were found to neither cause or suffer significant C/I degradation relative to that for fixed power feeder links having similar or less stringent availability objectives. The C/Is for sharing between orthogonal linearly polarized feeder links were found to be significantly higher than those for circular polarization only in links to nominally colocated satellites from nominally colocated Earth stations in high attenuation environments.

  6. Decision Support for Optimal Repositioning of Containers in a Feeder System

    Directory of Open Access Journals (Sweden)

    Danijela Tuljak-Suban

    2008-03-01

    Full Text Available The transport of empty containers represents a seriousproblem in the fast growing sphere of maritime container transport.The most widespread type of container transport organizationin maritime transport is the hub and spoke mode, whichenables the transport of a great number of containers via largevessels between hub ports, from where feeder ships transport tosmaller ports that thus gravitate to the central hub port. The articlecontains a detailed analysis of the northern Adriatic portsand the feeder connections with the hub ports of the Mediterranean.A two-level VRPPD (Vehicle Routing Problem withPickup and Delivery problem is modelled on a graph, wherethe transport of full containers is privileged over the transport ofempty containers. This enables the simulation of the feeder systemin the n01them Adriatic, meaning that it shows the ship'soperator the movement programme with minimal transportcosts for the superfluous empty containers in the complex of theregular transports of full containers in the feeder system.

  7. Voltage Support Study of Smart PV Inverters on a High-Photovoltaic Penetration Utility Distribution Feeder

    Energy Technology Data Exchange (ETDEWEB)

    Ding, Fei; Pratt, Annabelle; Bialek, Tom; Bell, Frances; McCarty, Michael; Atef, Kahveh; Nagarajan, Adarsh; Gotseff, Peter

    2016-11-21

    This paper reports on tools and methodologies developed to study the impact of adding rooftop photovoltaic (PV) systems, with and without the ability to provide voltage support, on the voltage profile of distribution feeders. Simulation results are provided from a study of a specific utility feeder. The simulation model of the utility distribution feeder was built in OpenDSS and verified by comparing the simulated voltages to field measurements. First, we set all PV systems to operate at unity power factor and analyzed the impact on feeder voltages. Then we conducted multiple simulations with voltage support activated for all the smart PV inverters. These included different constant power factor settings and volt/VAR controls.

  8. Structural variation of the feeder dikes of explosive eruptions in Miyakejima, Japan

    Science.gov (United States)

    Geshi, Nobuo

    2013-04-01

    Explosive eruptions of basaltic volcanoes exhibit wide variation about its explosivity, from stable lava effusion, mild strombolian eruption, to plinian eruption. Complex behavior of magma within the conduit may control the style of eruption activities, and the structure of the conduit controls the behavior of the ascending magma through the conduit. Existence of external water (ground water) may also affect the explosivity of the eruption. In the caldera wall of Miyakejima, Japan, we can observe various type of the cross section of feeder dikes with its surface products. The new caldera wall exhibits the cross section of a basaltic stratovolcano with numerous feeder and non-feeder dikes. Some feeder dikes connect directly to the lava flow. Some feeder dikes connect to the base of scoria cone with 100- 200 meters across and several tens meters high. Size and internal structure of the scoria cone indicates the mild strombolian activity. Uppermost ten meters of these feeder dikes shows upward-flaring (widen the dike thickness to the surface), which infers the magmatic erosion of the dike wall by explosive activities. More explosive activities formed some diatremes. The depth of these diatreme reaches 100 meters from the original ground surface. Typically, these diatremes connect to very-flat scoria cone and wide-spread thick scoria-fall deposit, which indicates the explosive magmatic activities. The sizes of these flat scoria cones are comparable to that of the scoria cones which was built by sub-plinian eruption (e.g., Izu-Oshima 1986). Upward flaring structure of the diatreme indicates the effective mechanical erosion of the dike wall by the explosive activities. The caldera wall also exhibits some diatremes which formed by the phreatomagmatic eruptions (Suoana diatreme). The wider feeder dikes for lager diatreme suggests the higher magmatic overpressure for the explosive activities in comparison to the less-explosive feeder dikes. Comparison of the structures of

  9. EV Charging Facilities and Their Application in LV Feeders with Photovoltaics

    DEFF Research Database (Denmark)

    Marra, Francesco; Yang, Guangya; Træholt, Chresten

    2013-01-01

    for the different locations in the feeder. With time-series simulations, we quantify the energy size required for a station ESS. A Belgian LV residential grid, modeled using real PV generation and load profiles, is used as case study. The method and simulation results show the effectiveness of using public EV...... charging facilities with the additional function of voltage regulation in feeders with PV....

  10. New Heuristic Strategies for Reactive Power Compensation of Radial Distribution Feeders

    OpenAIRE

    S. F. Mekhamer; M. E. El-Hawary; Soliman, S.A.; Moustafa, M. A.; Mansour, M. M.

    2002-01-01

    In this paper, the authors introduce two new heuristic techniques for reactive power compensation in radial distribution feeders. The methods can be considered as generalization ideas that emerged from recent heuristic search strategies and lead to better results. The methods formulae are derived and the techniques are applied to three feeders. Results of the proposed approaches are compared with previous methods to show the superiority of the proposed methods. To show the closeness or remote...

  11. Organizational and welfare mode of breast centers network: a survey of Sicilian radiologists.

    Science.gov (United States)

    Marino, Maria Adele; Pennisi, Orazio; Donia, Annalisa; Sofia, Carmelo; Guerra, Claudio; Privitera, Carmelo; Romeo, Placido

    2017-04-20

    The European Society of Breast Cancer Specialists has created quality indicators for breast units to establish the minimum standards of care for patients. In Italy, each region differs, indeed, in terms of health care and services warranted to patients suffering from breast cancer. Since Sicilian Regional Administration today is still disregarding implementation of the provisions contained in the proposal of the Ministry of Health entitled "Guidelines on Organizational and Health Care Methods of Breast Centers Network" in November 2015 the Sicilian Regional Group of the Italian Society of Radiology (SIRM) decided to carry out a survey to see the position of the Sicilian Healthcare System and define the gap to bridge over. Sicilian breast imaging radiologists were asked to fill in a questionnaire concerning the type of job relationship (public or private sector), qualification (Manager, Department Manager, Freelancer) and years of experience on breast imaging. With regard to technological requirements, were answered the questions about the number, type, age and completeness of accessories of the equipment supplied in the Sicilian healthcare facilities. The data showed that over 64% of breast imagers in Sicilian centers work in breast units, whereas only 18% are involved in screening programs. A majority of radiologists (81%) working in the breast health care system is very experienced (more than 10 years of experience in the field). The result provided concerning the medical and technical staff demonstrates an uneven situation, but overall an inadequate value compared with the required guidelines especially in interventional procedures. The aim of this paper is to illustrate the method used and the results obtained. These data have to be shared with policy makers to enhance quality improvement in Sicilian Breast Center Network.

  12. A Survey of Communications and Networking Technologies for Energy Management in Buildings and Home Automation

    Directory of Open Access Journals (Sweden)

    Aravind Kailas

    2012-01-01

    Full Text Available With the exploding power consumption in private households and increasing environmental and regulatory restraints, the need to improve the overall efficiency of electrical networks has never been greater. That being said, the most efficient way to minimize the power consumption is by voluntary mitigation of home electric energy consumption, based on energy-awareness and automatic or manual reduction of standby power of idling home appliances. Deploying bi-directional smart meters and home energy management (HEM agents that provision real-time usage monitoring and remote control, will enable HEM in “smart households.” Furthermore, the traditionally inelastic demand curve has began to change, and these emerging HEM technologies enable consumers (industrial to residential to respond to the energy market behavior to reduce their consumption at peak prices, to supply reserves on a as-needed basis, and to reduce demand on the electric grid. Because the development of smart grid-related activities has resulted in an increased interest in demand response (DR and demand side management (DSM programs, this paper presents some popular DR and DSM initiatives that include planning, implementation and evaluation techniques for reducing energy consumption and peak electricity demand. The paper then focuses on reviewing and distinguishing the various state-of-the-art HEM control and networking technologies, and outlines directions for promoting the shift towards a society with low energy demand and low greenhouse gas emissions. The paper also surveys the existing software and hardware tools, platforms, and test beds for evaluating the performance of the information and communications technologies that are at the core of future smart grids. It is envisioned that this paper will inspire future research and design efforts in developing standardized and user-friendly smart energy monitoring systems that are suitable for wide scale deployment in homes.

  13. DistFlow ODE: Modeling, Analyzing and Controlling Long Distribution Feeder

    CERN Document Server

    Wang, Danhua; Chertkov, Michael

    2012-01-01

    We consider a linear feeder connecting multiple distributed loads and generators to the sub-station. Voltage is controlled directly at the sub-station, however, voltage down the line shifts up or down, in particular depending on if the feeder operates in the power export regime or power import regime. Starting from this finite element description of the feeder, assuming that the consumption/generation is distributed heterogeneously along the feeder, and following the asymptotic homogenization approach, we derive simple low-parametric ODE model of the feeder. We also explain how the homogeneous ODE modeling is generalized to account for other distributed effects, e.g. for inverter based and voltage dependent control of reactive power. The resulting system of the DistFlow-ODEs, relating homogenized voltage to flows of real and reactive power along the lines, admits computationally efficient analysis in terms of the minimal number of the feeder line "media" parameters, such as the ratio of the inductance-to-resi...

  14. Flow accelerated corrosion of carbon steel feeder pipes from pressurized heavy water reactors

    Science.gov (United States)

    Singh, J. L.; Kumar, Umesh; Kumawat, N.; Kumar, Sunil; Kain, Vivekanand; Anantharaman, S.; Sinha, A. K.

    2012-10-01

    Detailed investigation of a number of feeder pipes received from Rajasthan Atomic Power Station Unit 2 (RAPS#2) after en-masse feeder pipe replacement after 15.67 Effective Full Power Years (EFPYs) was carried out. Investigations included ultrasonic thickness measurement by ultrasonic testing, optical microscopy, scanning electron microscopy, chemical analysis and X-ray Diffraction (XRD). Results showed that maximum thickness reduction of the feeder had occurred downstream and close to the weld in 32 NB (1.25″/32.75 mm ID) elbows. Rate of Flow Accelerated Corrosion (FAC) was measured to be higher in the lower diameter feeder pipes due to high flow velocity and turbulence. Weld regions had thinned to a lower extent than the parent material due to higher chromium content in the weld. A weld protrusion has been shown to add to the thinning due to FAC and lead to faster thinning rate at localized regions. Surface morphology of inner surface of feeder had shown different size scallop pattern over the weld and parent material. Inter-granular cracks were also observed along the weld fusion line and in the parent material in 32 NB outlet feeder elbow.

  15. Route Design Model of Feeder Bus Service for Urban Rail Transit Stations

    Directory of Open Access Journals (Sweden)

    Zhenjun Zhu

    2017-01-01

    Full Text Available As an important part of urban public transportation systems, the feeder bus fills a service gap left by rail transit, effectively extending the range of rail transit’s service and solving the problem of short-distance travel and interchanges. By defining the potential demand of feeder bus services and considering its relationship with the traffic demands of corresponding staging areas, the distance between road and rail transit, and the repetition factor of road bus lines, this paper established a potential demand model of roads by opening feeder bus services and applying a logit model for passenger flow distribution. Based on a circular route model, a route starting and ending at urban rail transit stations was generated, and a genetic algorithm was then applied to solve it. The Wei-Fang community of Shanghai was selected as the test area. Per the model and algorithm, the feeder route length was conformed to a functional orientation of short-distance travel and the feeder service of a feeder bus; the route mostly covered where conventional bus lines were fewer, which is a finding that is in agreement with the actual situation; the feasibility of the model and algorithm was verified.

  16. Report of 'Survey on Asian environmental information networks'; 'Asia kankyo joho network chosa' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-03-01

    Information systems, mainly aided by computers, are becoming increasingly important, contributing to development of wide areas of societies and economics, to begin with. However, few developing countries have established sufficient information systems, in spite of their strong desires to do so, which will further widen the gap between them and advanced countries, where these systems are acceleratedly advancing. Given these situations, Center of International Cooperation for Computerization (CICC) has been implementing various projects for providing assistance to and cooperation with oversea countries which are trying to develop information systems. This report summarizes the project, which CICC has been commissioned by Optoelectronic Industry and Technology Development Association as part of the cooperation programs, for establishing the Asian environmental information networks. It outlines the research cooperation project for the environmental networks, results of the 4 on-the-spot surveys, 2 occasions for inviting researchers to Japan, and construction of the internet and Asian environmental information network systems. (NEDO)

  17. Manufacture and test of seismic bellows for ITER magnet feeder

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Chen, E-mail: liuchen@ipp.ac.cn [Institute of Plasma Physics Chinese Academy of Sciences, ShuShanhu Road No. 350, Hefei (China); Lu, Kun [Institute of Plasma Physics Chinese Academy of Sciences, ShuShanhu Road No. 350, Hefei (China); Sheng, Liang [AEROSUN-TOLA Expansion Joint Co., Ltd., Jiangjun Road No. 199, Nanjing (China); Song, Yuntao; Su, Jinjin [Institute of Plasma Physics Chinese Academy of Sciences, ShuShanhu Road No. 350, Hefei (China); Su, Man; Gung, Chenyu [ITER Organization, Route de Vinon-sur-Verdon, CS 90 046, 13067 St. Paul-lez-Durance (France)

    2016-11-01

    Highlights: • The design of the double bellows was iterated with the results of analysis based on the Expansion Joint Manufacturers Association (EJMA) standard. • The seismic bellows was tested with cyclic pressurization of the interlayer space to 2 bars absolute pressure for 5 cycles. • 200 cycles of tensile fatigue test with 90 mm of stretching from the nominal design length. • A full tensile test with 315 mm of stretching from its nominal length was conducted. • The prototype bellows was qualified for its leak tightness (less than 1 × 10{sup −9} Pam{sup 3}/s of helium) at all time during the qualification test. - Abstract: This paper presents the key manufacturing and testing processes of the prototype ITER feeder seismic bellows. The design of the double bellows was iterated with the results of analysis based on the Expansion Joint Manufacturers Association (EJMA) standard. Each inner and outer bellows was supported in dedicated molds and formed by a hydraulic pressure machine rated at 800 tons. The double bellows were constructed by welding individual collars to the end flanges. The seismic bellows was tested with cyclic pressurization of the interlayer space to 2 bars absolute pressure for 5 cycles. This was followed by 200 cycles of tensile fatigue test with 90 mm of stretching from the nominal design length. After the mechanical fatigue test, a full tensile test with 315 mm of stretching from its nominal length was conducted. Helium leak tests, with the sensitivity of the helium leak detector set to 1 × 10{sup −9} Pa m{sup 3}/s of helium, were performed at different stages of pressure and mechanical tests. The prototype bellows was qualified for its leak tightness at all time during the qualification test.

  18. Surveying Multidisciplinary Aspects in Real-Time Distributed Coding for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Carlo Braccini

    2015-01-01

    Full Text Available Wireless Sensor Networks (WSNs, where a multiplicity of sensors observe a physical phenomenon and transmit their measurements to one or more sinks, pertain to the class of multi-terminal source and channel coding problems of Information Theory. In this category, “real-time” coding is often encountered for WSNs, referring to the problem of finding the minimum distortion (according to a given measure, under transmission power constraints, attainable by encoding and decoding functions, with stringent limits on delay and complexity. On the other hand, the Decision Theory approach seeks to determine the optimal coding/decoding strategies or some of their structural properties. Since encoder(s and decoder(s possess different information, though sharing a common goal, the setting here is that of Team Decision Theory. A more pragmatic vision rooted in Signal Processing consists of fixing the form of the coding strategies (e.g., to linear functions and, consequently, finding the corresponding optimal decoding strategies and the achievable distortion, generally by applying parametric optimization techniques. All approaches have a long history of past investigations and recent results. The goal of the present paper is to provide the taxonomy of the various formulations, a survey of the vast related literature, examples from the authors’ own research, and some highlights on the inter-play of the different theories.

  19. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects.

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-09-25

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  20. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-01-01

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT. PMID:26404275

  1. A Systems Engineering Survey of Artificial Intelligence and Smart Sensor Networks in a Network-Centric Environment

    Science.gov (United States)

    2009-09-01

    This is an academic paper published by The Artificial Life and Adaptive Robotics Laboratory ( ALAR ) that proposes “a novel network centric multi...Sarker, and M. Barlow, "Network centric multi-agent systems: A novel architecture," The Artificial Life and Adaptive Robotics Laboratory ( ALAR ...Technical Report Series, pp. 1–13, ALAR , Canberra, Australia, Pub. No. TR- ALAR -200504004, 2008. [46] D. M. Buede, The Engineering Design of Systems

  2. A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks

    CERN Document Server

    Deb, Novarun; Chaki, Nabendu

    2011-01-01

    An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task. Arguably, the most common thing in a review paper in the domain of wireless networks is to compare the performances of different solutions using simulation results. However, variance in multiple configuration aspects including that due to different underlying routing protocols, makes the task of simulation based comparative evaluation of IDS solutions somewhat unrealistic. In stead, the authors have followed an analytic approach to identify the gaps in the existing IDS solutions for MANETs and wireless mesh networks. The paper aims to ease the job of a new researcher by exposing him to the state of the art research issues on IDS. Nearly 80% of the works cited in this paper are published ...

  3. Development of a feeder device for logging residue for a drum chipper; Hakkurin syoetoen kehittaeminen energiapuulle

    Energy Technology Data Exchange (ETDEWEB)

    Leinonen, T.; Kemppainen, J.P. [Oulu Univ. (Finland). Dept. of Mechanical Engineering

    1997-12-01

    The aim of this project is to increase the productivity of a large drum chipper by developing a feeder device to be used especially when chipping logging residue. Logging residue from regeneration areas is the most important reserve of forest biomass for the production of renewable energy in Finland. It is possible ecologically and economically to use about 5 million m{sup 3} of logging residue yearly for energy purposes. Currently both large lorry based chippers and smaller forwarder based chippers are used for chipping logging residue. However even the latest versions of these chippers are not well equipped for chipping logging residue. The ball like shape of residue piles causes blockades, if too large amounts of residue are fed into the chipper. Keeping the material flow even is difficult. In this project a prototype of a feeder device will be designed and manufactured to exactly find out the problems, that occur when feeding logging residue to a chipper. The designed prototype is based on a tubular chassis, which supports a conveyor made of steel plates. Prototype also has a 2,5 m wide feeding table and a feeder roll, which is located above the conveyor just before the chipper opening. Both the conveyor and the feeder roll are powered by hydraulic motors. The maximum feeding force is 20 kN. For research purposes both hydraulic pressure and flow can be adjusted individually for both motors. During 1996 activities included designing and building the prototype feeder device. In 1997 the prototype will be tested to find out possible problems, which need to be cured. After problems are solved and other improvements are made, the feeder device will be installed to an existing chipper and then tested again to determine the productivity of the new feeder device compared to the old unit. (orig.)

  4. Adaptive overcurrent relay for the rural Agricultural feeder Based on Niranthara Jyothi Yojana

    Directory of Open Access Journals (Sweden)

    Harish.K,

    2014-10-01

    Full Text Available In certain states like Karnataka and Gujarat of India, farmers are provided with free 3-phase power supply to run their irrigation pump-sets under schemes like Niranthara Jyothi Yojana (NJY. Under this scheme, the rural feeders were bifurcated into agricultural feeders and non-agricultural feeders in order to facilitate 24 hours Supply for Non-agricultural Consumers and 8-10Hrs Supply for Agricultural Consumers. Due to power shortage, the 3-phase supply at the agricultural feeder is given only during the off-peak hours. Rest of the time, the supply is either 2-phase or the feeder is under Load Shedding. 2-phase supply at the station is given exclusively for lighting purpose at Farm houses. But, this 2-phase supply is being illegally tapped and converted to 3-phase by using condensers. Although, this is reflected in the sub-station load curve, it often takes time to detect such misuses. The conventional Overcurrent relay fails to respond to this misuse, unless the set points or pick up values are changed appropriately by human intervention, often the locals influence the substation personnel to keep the set points in such a way that the misuse is not reported. This, at times, may cause cascading disasters in the power system. The proposed relay would not only act as a protective element at the feeder, but also detect the misuse and trip the respective feeder by changing the set points appropriately without involving any human activity, eventually increasing the security of the system. Proposed relay has two working states namely active state and the event log state. The Event log keeps record of the events with real time and date by making use of Real time clock (RTC. This relay also consists of a GSM module which sends SMS to farmers and utility heads regarding the supply status.

  5. Watershed boundaries for the U.S. Geological Survey National Water Quality Network

    Science.gov (United States)

    Baker, Nancy T.

    2016-01-01

    The National Water Quality Network (NWQN) for Rivers and Streams includes 113 surface-water river and stream sites monitored by the U.S. Geological Survey (USGS) National Water Quality Program (NWQP). The NWQN represents the consolidation of four historical national networks: the USGS National Water-Quality Assessment (NAWQA) Project, the USGS National Stream Quality Accounting Network (NASQAN), the National Monitoring Network (NMN), and the Hydrologic Benchmark Network (HBN). The NWQN includes 22 large river coastal sites, 41 large river inland sites, 30 wadeable stream reference sites, 10 wadeable stream urban sites, and 10 wadeable stream agricultural sites. In addition to the 113 NWQN sites, 3 large inland river monitoring sites from the USGS Cooperative Matching Funds (Co-op) program are also included in this annual water-quality reporting Web site to be consistent with previous USGS studies of nutrient transport in the Mississippi-Atchafalaya River Basin. This data release contains geo-referenced digital data and associated attributes of watershed boundaries for 113 NWQN and 3 Co-op sites. Two sites, "Wax Lake Outlet at Calumet, LA"; 07381590, and "Lower Atchafalaya River at Morgan City, LA"; 07381600, are outflow distributaries into the Gulf of Mexico. Watershed boundaries were delineated for the portion of the watersheds between "Red River near Alexandria, LA"; 07355500 and "Atchafalaya River at Melville, LA"; 07381495 to the two distributary sites respectively. Drainage area was undetermined for these two distributary sites because the main stream channel outflows into many smaller channels so that streamflow is no longer relative to the watershed area. NWQN watershed boundaries were derived from the Watershed Boundary Dataset-12-digit hydrologic units (WBD-12). The development of the WBD-12 was a coordinated effort between the United States Department of Agriculture-Natural Resources Conservation Service (USDA-NRCS), the USGS, and the Environmental

  6. Development of a network RTK positioning and gravity-surveying application with gravity correction using a smartphone.

    Science.gov (United States)

    Kim, Jinsoo; Lee, Youngcheol; Cha, Sungyeoul; Choi, Chuluong; Lee, Seongkyu

    2013-07-12

    This paper proposes a smartphone-based network real-time kinematic (RTK) positioning and gravity-surveying application (app) that allows semi-real-time measurements using the built-in Bluetooth features of the smartphone and a third-generation or long-term evolution wireless device. The app was implemented on a single smartphone by integrating a global navigation satellite system (GNSS) controller, a laptop, and a field-note writing tool. The observation devices (i.e., a GNSS receiver and relative gravimeter) functioned independently of this system. The app included a gravity module, which converted the measured relative gravity reading into an absolute gravity value according to tides; meter height; instrument drift correction; and network adjustments. The semi-real-time features of this app allowed data to be shared easily with other researchers. Moreover, the proposed smartphone-based gravity-survey app was easily adaptable to various locations and rough terrain due to its compact size.

  7. SURVEY

    DEFF Research Database (Denmark)

    SURVEY er en udbredt metode og benyttes inden for bl.a. samfundsvidenskab, humaniora, psykologi og sundhedsforskning. Også uden for forskningsverdenen er der mange organisationer som f.eks. konsulentfirmaer og offentlige institutioner samt marketingsafdelinger i private virksomheder, der arbejder...... med surveys. Denne bog gennemgår alle surveyarbejdets faser og giver en praktisk indføring i: • design af undersøgelsen og udvælgelse af stikprøver, • formulering af spørgeskemaer samt indsamling og kodning af data, • metoder til at analysere resultaterne...

  8. Model data for pore network modeling of the electrical signature of solute transport in dual-domain media, U.S. Geological Survey data release: U.S. Geological Survey data release

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Pore network simulations were performed to investigate the electrical geophysical signature of solute-transport in dual-domain media. This data release includes...

  9. The patient-doctor relationship and online social networks: results of a national survey.

    Science.gov (United States)

    Bosslet, Gabriel T; Torke, Alexia M; Hickman, Susan E; Terry, Colin L; Helft, Paul R

    2011-10-01

    The use of online social networks (OSNs) among physicians and physicians-in-training, the extent of patient-doctor interactions within OSNs, and attitudes among these groups toward use of OSNs is not well described. To quantify the use of OSNs, patient interactions within OSNs, and attitudes toward OSNs among medical students (MS), resident physicians (RP), and practicing physicians (PP) in the United States. A random, stratified mail survey was sent to 1004 MS, 1004 RP, and 1004 PP between February and May 2010. Percentage of respondents reporting OSN use, the nature and frequency of use; percentage of respondents reporting friend requests by patients or patients' family members, frequency of these requests, and whether or not they were accepted; attitudes toward physician use of OSNs and online patient interactions. The overall response rate was 16.0% (19.8% MS, 14.3% RP, 14.1% PP). 93.5% of MS, 79.4% of RP, and 41.6% of PP reported usage of OSNs. PP were more likely to report having visited the profile of a patient or patient's family member (MS 2.3%, RP 3.9%, PP 15.5%), and were more likely to have received friend requests from patients or their family members (MS 1.2%, RP 7.8%, PP 34.5%). A majority did not think it ethically acceptable to interact with patients within OSNs for either social (68.3%) or patient-care (68.0%) reasons. Almost half of respondents (48.7%) were pessimistic about the potential for OSNs to improve patient-doctor communication, and a majority (79%) expressed concerns about maintaining patient confidentiality. Personal OSN use among physicians and physicians-in-training mirrors that of the general population. Patient-doctor interactions take place within OSNs, and are more typically initiated by patients than by physicians or physicians-in-training. A majority of respondents view these online interactions as ethically problematic.

  10. Artificial Neural Network Application for Partial Discharge Recognition: Survey and Future Directions

    Directory of Open Access Journals (Sweden)

    Abdullahi Abubakar Mas’ud

    2016-07-01

    Full Text Available In order to investigate how artificial neural networks (ANNs have been applied for partial discharge (PD pattern recognition, this paper reviews recent progress made on ANN development for PD classification by a literature survey. Contributions from several authors have been presented and discussed. High recognition rate has been recorded for several PD faults, but there are still many factors that hinder correct recognition of PD by the ANN, such as high-amplitude noise or wide spectral content typical from industrial environments, trial and error approaches in determining an optimum ANN, multiple PD sources acting simultaneously, lack of comprehensive and up to date databank of PD faults, and the appropriate selection of the characteristics that allow a correct recognition of the type of source which are currently being addressed by researchers. Several suggestions for improvement are proposed by the authors include: (1 determining the optimum weights in training the ANN; (2 using PD data captured over long stressing period in training the ANN; (3 ANN recognizing different PD degradation levels; (4 using the same resolution sizes of the PD patterns when training and testing the ANN with different PD dataset; (5 understanding the characteristics of multiple concurrent PD faults and effectively recognizing them; and (6 developing techniques in order to shorten the training time for the ANN as applied for PD recognition Finally, this paper critically assesses the suitability of ANNs for both online and offline PD detections outlining the advantages to the practitioners in the field. It is possible for the ANNs to determine the stage of degradation of the PD, thereby giving an indication of the seriousness of the fault.

  11. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  12. Calculation and Optimization of ITER Upper VS Feeder Under an Electromagnetic Load

    Institute of Scientific and Technical Information of China (English)

    WANG Xianwei; XIE Fei; JIN Huan

    2014-01-01

    The upper vertical stability (VS) feeder is a part connected to the upper VS coil by a welding joint.The function of the feeder is to transfer current and coolant water to the VS coil.A giant electromagnetic force will be generated during normal operation by the current flowing in the VS coils,interacting with the external background field.The Lorentz force will induce Tresca stress in the feeder.The amplitudes of the magnetic field and Lorentz force along the conductor running direction have been calculated based on Maxwell's equations.To extract the Tresca stress in the feeder,a finite element model was created using the software ANSYS and an electromagnetic load was applied on the model.According to the analytical design,the stresses were classified and evaluated based on ASME.In order to reduce the Tresca stress,some optimization works have been done and the Tresca stress has had a significant reduction in the optimized model.This analytical work figured out the stress distribution in the feeder and checked the feasibility of the prototype design model.The ANSYS analysis results will provide a guidance for later improvement and fabrication.

  13. Three key variables involved in feeder preparation for the maintenance of human embryonic stem cells.

    Science.gov (United States)

    Zhou, Di; Liu, Tiancheng; Zhou, Xiaoying; Lu, Guangxiu

    2009-07-01

    Although the development of a feeder-free culture system for future applications of human embryonic stem cells (hESCs), at present the regular culture system uses mitotically inactivated mouse embryonic fibroblasts (mEFs) as feeder cells for maintaining undifferentiated hESCs. Mitomycin C (MMC) is used to inactivate mEFs, but this causes DNA damage, and it is unclear whether MMC remains in the culture system after several washes. Three variables have been evaluated with respect to feeder preparation and MMC involvement, including mEF exposure to MMC, density of feeder cells, and different wash steps during the preparation of feeder cells. These variables are critical to the subsequent planting of hESCs because remnants of MMC would be unsafe with respect to long-term culture of hESCs The novel data here evaluates the remnant amounts of MMC in a hESCs culture system using HPLC/MS/MS. The ultimate objective of this study is the control of MMC within a safe range.

  14. Surveying traffic congestion based on the concept of community structure of complex networks

    Science.gov (United States)

    Ma, Lili; Zhang, Zhanli; Li, Meng

    2016-07-01

    In this paper, taking the traffic of Beijing city as an instance, we study city traffic states, especially traffic congestion, based on the concept of network community structure. Concretely, using the floating car data (FCD) information of vehicles gained from the intelligent transport system (ITS) of the city, we construct a new traffic network model which is with floating cars as network nodes and time-varying. It shows that this traffic network has Gaussian degree distributions at different time points. Furthermore, compared with free traffic situations, our simulations show that the traffic network generally has more obvious community structures with larger values of network fitness for congested traffic situations, and through the GPSspg web page, we show that all of our results are consistent with the reality. Then, it indicates that network community structure should be an available way for investigating city traffic congestion problems.

  15. A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Ogundile, Olayinka O.; Alfa, Attahiru S.

    2017-01-01

    Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision

  16. A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Ogundile, Olayinka O; Alfa, Attahiru S

    2017-05-10

    Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision

  17. SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETEROGENEOUS NETWORK

    Directory of Open Access Journals (Sweden)

    Poulomi Das

    2013-02-01

    Full Text Available To provide uninterrupted service to all subscribers in a wireless network, we need to incorporate a low cost, flexible Heterogeneous network which will be able to link with any kind of network for efficient spectrum utilization, hence improved system capacity. In this connection, Wi-Fi/ Wi MAX integrated network seems to be an ideal solution as it is able to provide easy deployment, high speed data rate and wide range coverage with high throughput, low end to end delay, flat and low jitter. Wi-Fi/ WiMAX integrated network provides Quality of Service (QoS that can support all kinds of real-time application in wireless networks that includes priority scheduling and queuing for bandwidth allocation that is based on traffic scheduling algorithms within wireless networks. In this paper, we have designed a Wi-Fi/ WiMAX integrated network and analyze the performance of different scheduling algorithms for that integrated network and highlight our findings on the scheduling algorithm which will give the best performance for a heterogeneous network.

  18. A Survey on Intrusion in Ad Hoc Networks and its Detection Measures

    Directory of Open Access Journals (Sweden)

    Ms. Preetee K. Karmore,

    2009-05-01

    Full Text Available Ad hoc wireless networks are defined as the category of wireless networks that utilizes multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure hence, they are called infrastructure less networks. The lack of any central coordination makes them more vulnerable to attacks than wirednetworks. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure therefore, detection should be added as another defense before an attacker can breach the system. Network intrusion detection is the process of monitoring the events occurring in the network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality. In this paper, we define and discuss varioustechniques of Intrusion Detection. We also present a description of routing protocols and types of security attacks possible in the network.

  19. Culture of human limbal epithelial stem cells on tenon's fibroblast feeder-layers: a translational approach.

    Science.gov (United States)

    Scafetta, Gaia; Siciliano, Camilla; Frati, Giacomo; De Falco, Elena

    2015-01-01

    The coculture technique is the standard method to expand ex vivo limbal stem cells (LSCs) by using inactivated embryonic murine feeder layers (3T3). Although alternative techniques such as amniotic membranes or scaffolds have been proposed, feeder layers are still considered to be the best method, due to their ability to preserve some critical properties of LSCs such as cell growth and viability, stemness phenotype, and clonogenic potential. Furthermore, clinical applications of LSCs cultured on 3T3 have taken place. Nevertheless, for an improved Good Manufacturing Practice (GMP) compliance, the use of human feeder-layers as well as a fine standardization of the process is strictly encouraged. Here, we describe a translational approach in accordance with GMP regulations to culture LSCs onto human Tenon's fibroblasts (TFs). In this chapter, based on our experience we identify and analyze issues that often are encountered by researchers and discuss solutions to common problems.

  20. Convex relaxation of Optimal Power Flow in Distribution Feeders with embedded solar power

    DEFF Research Database (Denmark)

    Hermann, Alexander Niels August; Wu, Qiuwei; Huang, Shaojun

    2016-01-01

    panels with uncontrolled inverters, the upper limit of installable capacity is quickly reached in many of today’s distribution feeders. This problem can often be mitigated by optimally controlling the voltage angles of inverters. However, the optimal power flow problem in its standard form is a large......There is an increasing interest in using Distributed Energy Resources (DER) directly coupled to end user distribution feeders. This poses an array of challenges because most of today’s distribution feeders are designed for unidirectional power flow. Therefore when installing DERs such as solar...... scale non-convex optimization problem, and thus can’t be solved precisely and also is computationally heavy and intractable for large systems. This paper examines the use of a convex relaxation using Semi-definite programming to optimally control solar power inverters in a distribution grid in order...

  1. A microprocessor-based digital feeder monitor with high-impedance fault detection

    Energy Technology Data Exchange (ETDEWEB)

    Patterson, R.; Tyska, W. [GE Protection and Control, Malvern, PA (United States); Russell, B.D. [Texas A& M Univ., College Station, TX (United States)] [and others

    1994-12-31

    The high impedance fault detection technology developed at Texas A&M University after more than a decade of research, funded in large part by the Electric Power Research Institute, has been incorporated into a comprehensive monitoring device for overhead distribution feeders. This digital feeder monitor (DFM) uses a high waveform sampling rate for the ac current and voltage inputs in conjunction with a high-performance reduced instruction set (RISC) microprocessor to obtain the frequency response required for arcing fault detection and power quality measurements. Expert system techniques are employed to assure security while maintaining dependability. The DFM is intended to be applied at a distribution substation to monitor one feeder. The DFM is packaged in a non-drawout case which fits the panel cutout for a GE IAC overcurrent relay to facilitate retrofits at the majority of sites were electromechanical overcurrent relays already exist.

  2. Effects of feeder layer and BRL conditioned medium on mouse embryonic stem cells

    Institute of Scientific and Technical Information of China (English)

    TsungHsiaochien; christine,L.Mummery

    1990-01-01

    In vitro growth and maintenance of embryonic stem (ES) cell lines derived from ICM cells of various blastocysts of 129 strain mice,the sustenance of their pluripotency and normal karyotype depend on the feeder layer of mouse embryonic fibroblasts (MEF).Compared with the feeder layer of MEF cells,medium conditioned by Buffalo rat liver cells (BRL-CM) is able to maintain pluripotency and karyotypic normality of ES cells only in short term cell propagation.Besides,ES cells grown in BRL-CM are also capable of aggregation with 8-cell embryos of Swiss strain and develop into germ line chimaeras.Modification to the method of aggregating ES cells with early embryos by making a hole in agar layer on the top of MEF feeder cells was shown to be more converient and efficient than the conventional microdrop method.

  3. Conspray dynamic sleeve piston coal feeder. Phase II. Verification tests. Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    1984-01-26

    This report details the performance of Phase II: Verification Tests of the Conspray dynamic sleeve piston coal feeder. The machine performed for 200 hours at 700 psi backpressure, utilizing a 70% to 200 mesh Utah bituminous coal as feedstock. All test work was satisfactorily completed. A post-test inspection was performed. A report of component wear and failures incurred in testing is included as well as suggestions for machine upgrades. The overall conclusion is that the dynamic sleeve piston feeder has proven its ability to operate safely and reliably. When problems have occurred, the machine has demonstrated inherent safety by shutting down without endangering process or personnel. With the recommended improvements incorporated into the feeder, the unit will be ready for installation on a pilot scale coal gasifier. 9 figures, 11 tables.

  4. Identification of human fibroblast cell lines as a feeder layer for human corneal epithelial regeneration.

    Directory of Open Access Journals (Sweden)

    Rong Lu

    Full Text Available There is a great interest in using epithelium generated in vitro for tissue bioengineering. Mouse 3T3 fibroblasts have been used as a feeder layer to cultivate human epithelia including corneal epithelial cells for more than 3 decades. To avoid the use of xeno-components, we evaluated human fibroblasts as an alternative feeder supporting human corneal epithelial regeneration. Five human fibroblast cell lines were used for evaluation with mouse 3T3 fibroblasts as a control. Human epithelial cells isolated from fresh corneal limbal tissue were seeded on these feeders. Colony forming efficiency (CFE and cell growth capacity were evaluated on days 5-14. The phenotype of the regenerated epithelia was evaluated by morphology and immunostaining with epithelial markers. cDNA microarray was used to analyze the gene expression profile of the supportive human fibroblasts. Among 5 strains of human fibroblasts evaluated, two newborn foreskin fibroblast cell lines, Hs68 and CCD1112Sk, were identified to strongly support human corneal epithelial growth. Tested for 10 passages, these fibroblasts continually showed a comparative efficiency to the 3T3 feeder layer for CFE and growth capacity of human corneal epithelial cells. Limbal epithelial cells seeded at 1 × 10(4 in a 35-mm dish (9.6 cm(2 grew to confluence (about 1.87-2.41 × 10(6 cells in 12-14 days, representing 187-241 fold expansion with over 7-8 doublings on these human feeders. The regenerated epithelia expressed K3, K12, connexin 43, p63, EGFR and integrin β1, resembling the phenotype of human corneal epithelium. DNA microarray revealed 3 up-regulated and 10 down-regulated genes, which may be involved in the functions of human fibroblast feeders. These findings demonstrate that commercial human fibroblast cell lines support human corneal epithelial regeneration, and have potential use in tissue bioengineering for corneal reconstruction.

  5. Capacity of Distribution Feeders for Hosting Distributed Energy Resources

    DEFF Research Database (Denmark)

    Papathanassiou, S.; Hatziargyriou, N.; Anagnostopoulos, P.

    The last two decades have seen an unprecedented development of distributed energy resources (DER) all over the world. Several countries have adopted a variety of support schemes (feed-in tariffs, green certificates, direct subsidies, tax exemptions etc.) so as to promote distributed generation (DG...... standards of the networks. To address this need in a timely and effective manner, simplified methodologies and practical rules of thumbs are often applied to assess the DER hosting capacity of existing distribution networks, avoiding thus detailed and time consuming analytical studies. The scope...

  6. Methods to Determine Recommended Feeder-Wide Advanced Inverter Settings for Improving Distribution System Performance

    Energy Technology Data Exchange (ETDEWEB)

    Rylander, Matthew; Reno, Matthew J.; Quiroz, Jimmy E.; Ding, Fei; Li, Huijuan; Broderick, Robert J.; Mather, Barry; Smith, Jeff

    2016-11-21

    This paper describes methods that a distribution engineer could use to determine advanced inverter settings to improve distribution system performance. These settings are for fixed power factor, volt-var, and volt-watt functionality. Depending on the level of detail that is desired, different methods are proposed to determine single settings applicable for all advanced inverters on a feeder or unique settings for each individual inverter. Seven distinctly different utility distribution feeders are analyzed to simulate the potential benefit in terms of hosting capacity, system losses, and reactive power attained with each method to determine the advanced inverter settings.

  7. Benthic suspension feeders: their paramount role in littoral marine food webs.

    Science.gov (United States)

    Gili, J M; Coma, R

    1998-08-01

    In recent years, particular attention has been paid to coupling and energy transfer between benthos and plankton. Because of their abundance, certain benthic suspension feeders have been shown to have a major impact in marine ecosystems. They capture large quantities of particles and might directly regulate primary production and indirectly regulate secondary production in littoral food chains. Suspension feeders develop dense, three-dimensional communities whose structural complexity depends on flow speed. It has been postulated that these communities can self-organize to enhance food capture and thus establish boundary systems capable of successfully exploiting a less structured system, namely, the plankton.

  8. Approximate Calculation of Voltage in Three-Phase Primary Distribution Feeder

    Science.gov (United States)

    Iioka, Daisuke; Iwata, Kubou; Kondo, Hisashi; Sakaguchi, Takuma; Shigetou, Takaya; Matsumura, Toshiro

    An approximate method to calculate voltage in three-phase primary distribution feeder has been proposed. Generally, nonlinear simultaneous equations have been solved to calculate the voltage in power system since the dependence of electrical equipment on voltage is represented by exponential model such as constant power load, constant current load and constant impedance load. The nonlinear simultaneous equations were transformed to linear simultaneous equations by the proposed method. As a result, the proposed method can calculate the voltage without convergence calculations. It was found that the approximate value of voltage in the three-phase primary distribution feeder is in good agreement with the exact value.

  9. Reliable Distribution Feeder Reconfiguration Containing Distributed Generation using Particle Swarm Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    I. Moradi

    2014-03-01

    Full Text Available Distributed feeder reconfiguration (DFR is an operation processand a very important methodfor saving electrical energy and loss reduction in distribution systems. This process is carried out by changingdistribution system topology by opening and/or closing of circuit breakers. Status of the circuit breakers is optimally determined to have an improved system operation and reduced power losses. This paper proposes a multi-objective evolutionary method for distribution feeder reconfiguration. The multi-objectives optimization minimizes power losses and improves reliability of the system. For this purpose a particle swarm optimization algorithm is used for solving the problem. Simulation results show the efficiency of the proposed method for DFR

  10. Consideration and research of high voltage insulation strategy for ITER Feeder busbar joint

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Xiongyi [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); Song, Yuntao, E-mail: songyt@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); Zheng, Jinxing; Yu, Xiaowu; Xiao, Weiwu; Gao, Daming; Tao, Yuming; Wang, Chunyu [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); Gung, Chen-yu; Clayton, Nicholas [ITER IO, Tokamak Department, Magnet Division, 13067 St. Paul lez Durance (France); Niu, Erwu [China International Nuclear Fusion Energy Program Execution, Beijing 100086 (China); Chen, Yonghua; Mitcell, Neil [ITER IO, Tokamak Department, Magnet Division, 13067 St. Paul lez Durance (France)

    2013-10-15

    Highlights: • Several rounds insulation trials for ITER Feeder joint were carried out in ASIPP. • Wet-winding, VPI were practiced and attempt for the best impregnation strategy. • Improvement of wet-winding technology with vacuum assistance was realized. • To supplement the electrical test, DR technology was explored for insulation quality inspection. -- Abstract: The ITER Feeder busbar joint is an important component which connects different sections of busbar which run from the high temperature superconducting current leads to the magnet terminals. High voltage insulated bus bar sections will be assembled onto the feeder support structure (called the containment duct), and the joints between sections will be made in situ. The high voltage insulation over the joint is the final step to complete the insulation of the whole bus bar system, and its quality is key to achieving the required electrical performance of the system. The final joint has a complex external configuration with an irregular structure in places, which makes it difficult for the application of the insulation. The limited access in the Feeder and the complex joint external structure make the implementation of the joint insulation hard to solve. The Feeder group at ASIPP has carried out significant R and D for the joint insulation, involving research on the selection of materials, the design of the insulation structure, the curing technology and the quality inspection method. After many rounds of manufacturing and testing, the insulation strategy for the Feeder joint will focus on the so-called “wet-winding” technology. Despite the fact that this process has some intrinsic disadvantages, it is more appropriate for the joint structure compared to other methods. The sub-suppliers to ASIPP have chosen this impregnation method for the feeder qualification activities based on guidance from ASIPP. This paper describes the research procedure of the ITER Feeder busbar joint insulation

  11. Methods for Dynamic Analysis of Distribution Feeders with High Penetration of PV Generators

    Energy Technology Data Exchange (ETDEWEB)

    Nagarajan, Adarsh; Ayyanar, Raja

    2016-11-21

    An increase in the number of inverter-interfaced photovoltaic (PV) generators on existing distribution feeders affects the design, operation, and control of the distribution systems. Existing distribution system analysis tools are capable of supporting only snapshot and quasi-static analyses. Capturing the dynamic effects of PV generators during the variation in distribution system states is necessary when studying the effects of controller bandwidths, multiple voltage correction devices, and anti-islanding. This work explores the use of dynamic phasors and differential algebraic equations (DAE) for impact analysis of PV generators on the existing distribution feeders.

  12. The infrared luminosities of ˜332 000 SDSS galaxies predicted from artificial neural networks and the Herschel Stripe 82 survey

    Science.gov (United States)

    Ellison, Sara L.; Teimoorinia, Hossein; Rosario, David J.; Mendel, J. Trevor

    2016-01-01

    The total infrared (IR) luminosity (LIR) can be used as a robust measure of a galaxy's star formation rate (SFR), even in the presence of an active galactic nucleus (AGN), or when optical emission lines are weak. Unfortunately, existing all sky far-IR surveys, such as the Infrared Astronomical Satellite (IRAS) and AKARI, are relatively shallow and are biased towards the highest SFR galaxies and lowest redshifts. More sensitive surveys with the Herschel Space Observatory are limited to much smaller areas. In order to construct a large sample of LIR measurements for galaxies in the nearby Universe, we employ artificial neural networks (ANNs), using 1136 galaxies in the Herschel Stripe 82 sample as the training set. The networks are validated using two independent data sets (IRAS and AKARI) and demonstrated to predict the LIR with a scatter σ ˜ 0.23 dex, and with no systematic offset. Importantly, the ANN performs well for both star-forming galaxies and those with an AGN. A public catalogue is presented with our LIR predictions which can be used to determine SFRs for 331 926 galaxies in the Sloan Digital Sky Survey (SDSS), including ˜129 000 SFRs for AGN-dominated galaxies for which SDSS SFRs have large uncertainties.

  13. Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Pearl Antil

    2014-01-01

    Full Text Available Owing to random deployment, environmental factors, dynamic topology, and external attacks, emergence of holes in wireless sensor networks is inescapable. Hole is an area in sensor network around which sensors cease to sense or communicate due to drainage of battery or any fault, either temporary or permanent. Holes impair sensing and communication functions of network; thus their identification is a major concern. This paper discusses different types of holes and significance of hole detection in wireless sensor networks. Coverage hole detection schemes have been classified into three categories based on the type of information used by algorithms, computation model, and network dynamics for better understanding. Then, relative strengths and shortcomings of some of the existing coverage hole detection algorithms are discussed. The paper is concluded by highlighting various future research directions.

  14. A Survey of Congestion Control in Proactive Source Routing Protocol in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Bhagyashree S kayarkar

    2014-12-01

    Full Text Available In mobile ad hoc networks (MANET congestion can take place between the two intermediate nodes, when the packet is transferred from the source to the destination. The congestion in MANET is mainly due to frequent change to topology and high mobility of nodes, which lead to high loss of packet. In ad hoc network the congestion control techniques with TCP becomes difficult to handle since in ad hoc network there is high density of nodes in the network and there is frequent change to topology in the network. In this paper to control the congestion in proactive source routing protocol an error message is generated by the receiver to reduce the packet sending rate. We are using a new control message i.e., Packet Error Announcing Message called (PEAM messages.

  15. A SURVEY OF CONGESTION CONTROL IN PROACTIVE SOURCE ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Bhagyashree S kayarkar

    2015-10-01

    Full Text Available In mobile ad hoc networks (MANET congestion can take place between the two intermediate nodes, when the packet is transferred from the source to the destination. The congestion in MANET is mainly due to frequent change to topology and high mobility of nodes, which lead to high loss of packet. In ad hoc network the congestion control techniques with TCP becomes difficult to handle since in ad hoc network there is high density of nodes in the network and there is frequent change to topology in the network. In this paper to control the congestion in proactive source routing protocol an error message is generated by the receiver to reduce the packet sending rate. We are using a new control message i.e., Packet Error Announcing Message called (PEAM messages.

  16. Energy Systems Integration: Demonstrating Distribution Feeder Voltage Control

    Energy Technology Data Exchange (ETDEWEB)

    2017-01-01

    Overview fact sheet about the Smarter Grid Solutions Integrated Network Testbed for Energy Grid Research and Technology Experimentation (INTEGRATE) project at the Energy Systems Integration Facility. INTEGRATE is part of the U.S. Department of Energy's Grid Modernization Initiative.

  17. E-cadherin gene-engineered feeder systems for supporting undifferentiated growth of mouse embryonic stem cells.

    Science.gov (United States)

    Horie, Masanobu; Ito, Akira; Kiyohara, Takehiko; Kawabe, Yoshinori; Kamihira, Masamichi

    2010-11-01

    Conventionally, embryonic stem (ES) cells are cultured on a cell layer of mouse embryonic fibroblasts (MEFs) as feeder cells to support undifferentiated growth of ES cells. In this study, cell-cell interactions between mouse ES and feeder cells were artificially engineered via an epithelial cell adhesion molecule, E-cadherin, whose expression is considerable in ES cells. Mouse mesenchymal STO and NIH3T3 cells that were genetically engineered to express E-cadherin were used in ES cell cultures as feeder cells. ES cells cultured on the E-cadherin-expressing feeder cells maintained the expression of stem cell markers, alkaline phosphatase (AP), Oct3/4, Nanog and Sox2, and the efficiency of AP-positive colony formation was comparable to MEFs, and much better than parental STO and NIH3T3 cells. Furthermore, ES cells maintained on the E-cadherin-expressing feeder cells possessed the ability to differentiate into the three germ layers both in vitro and in vivo. The results indicated that E-cadherin expression in feeder cells could improve the performance of feeder cells, which may be further applicable to create new artificial feeder cell lines.

  18. Preliminary evaluation of feeder and lint slide moisture addition on ginning, fiber quality, and textile processing of western cotton

    Science.gov (United States)

    The objective of this study was to evaluate the effects of moisture addition at the gin stand feeder conditioning hopper and/or the battery condenser slide on gin performance and Western cotton fiber quality and textile processing. The test treatments included no moisture addition, feeder hopper hum...

  19. 7 CFR 1230.113 - Collection and remittance of assessments for the sale of feeder pigs and market hogs.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Collection and remittance of assessments for the sale of feeder pigs and market hogs. 1230.113 Section 1230.113 Agriculture Regulations of the Department... pigs and market hogs. Pursuant to the provisions of § 1230.71, purchasers of feeder pigs or market...

  20. a Survey of Smart Electrical Boards in Ubiquitous Sensor Networks for Geomatics Applications

    Science.gov (United States)

    Moosavi, S. M. R.; Sadeghi-Niaraki, A.

    2015-12-01

    Nowadays more advanced sensor networks in various fields are developed. There are lots of online sensors spreading around the world. Sensor networks have been used in Geospatial Information Systems (GIS) since sensor networks have expanded. Health monitoring, environmental monitoring, traffic monitoring, etc, are the examples of its applications in Geomatics. Sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements that gives an administrator the ability to instrument, observe, and react to events and phenomena in a specified environment. This paper describes about development boards which can be used in sensor networks and their applications in Geomatics and their role in wireless sensor networks and also a comparison between various types of boards. Boards that are discussed in this paper are Arduino, Raspberry Pi, Beagle board, Cubieboard. The Boards because of their great potential are also known as single board computers. This paper is organized in four phases: First, Reviewing on ubiquitous computing and sensor networks. Second, introducing of some electrical boards. Then, defining some criterions for comparison. Finally, comparing the Ubiquitous boards.

  1. A SURVEY OF SMART ELECTRICAL BOARDS IN UBIQUITOUS SENSOR NETWORKS FOR GEOMATICS APPLICATIONS

    Directory of Open Access Journals (Sweden)

    S. M. R. Moosavi

    2015-12-01

    Full Text Available Nowadays more advanced sensor networks in various fields are developed. There are lots of online sensors spreading around the world. Sensor networks have been used in Geospatial Information Systems (GIS since sensor networks have expanded. Health monitoring, environmental monitoring, traffic monitoring, etc, are the examples of its applications in Geomatics. Sensor network is an infrastructure comprised of sensing (measuring, computing, and communication elements that gives an administrator the ability to instrument, observe, and react to events and phenomena in a specified environment. This paper describes about development boards which can be used in sensor networks and their applications in Geomatics and their role in wireless sensor networks and also a comparison between various types of boards. Boards that are discussed in this paper are Arduino, Raspberry Pi, Beagle board, Cubieboard. The Boards because of their great potential are also known as single board computers. This paper is organized in four phases: First, Reviewing on ubiquitous computing and sensor networks. Second, introducing of some electrical boards. Then, defining some criterions for comparison. Finally, comparing the Ubiquitous boards.

  2. A SURVEY ON SPECTRUM-MAP BASED ON NORMAL OPPORTUNISTIC ROUTING METHODS FOR COGNITIVE RADIO AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hesham Mohammed Ali Abdullah

    2015-11-01

    Full Text Available Cognitive Radio (CR technology has significant impacts on upper layer performance in Ad Hoc Networks (AHNs. In recent times, several number of investigation are conducted in CR are mostly focusing on the opportunistic spectrum admission and physical layer transmission throughput. However, CR technology determination also have considerable impacts in mobile Ad Hoc networks (AHNs, which enables wireless devices to dynamically create networks without essentially use of a fixed infrastructure . Nowadays, establishing a cognitive network is such a difficult task. The most important issues is routing in CRAHNs. In this paper, it majorly focuses on the survey of routing and opportunistic routing schema in CRAHN. The most significant scheme behind this concept is to make use of a suitable routing protocol designed for establishing Cognitive Radio Network (CRN. Due to licensing, the accessibility of radio frequency for wireless communication gets reduced day by day. Thus, there is a necessitate to have some other way to use these frequencies in an efficient manner. Routing is efficient method to solve these issues, but the use of geographical concept is also a challenging task in CRN. Since, there is a lack in detailed understanding of these extremely dynamic opportunistic links and a consistent end-to-end transportation mechanism over the network. Here, it focuses on the study of possible routing approaches with the purpose of be able to be employed in CRAHNs. There is a comparison on performance evaluation of various potential routing approaches in terms of table significant reduction and what solution can be found from the routing protocol are also discussed. The routing protocol attains reliable communications for CRAHNs, without usually getting feedback information from nodes in a CRAHN to considerably accumulate the communication overhead.

  3. Survey of Network-Based Approaches to Research of Cardiovascular Diseases

    Directory of Open Access Journals (Sweden)

    Anida Sarajlić

    2014-01-01

    Full Text Available Cardiovascular diseases (CVDs are the leading health problem worldwide. Investigating causes and mechanisms of CVDs calls for an integrative approach that would take into account its complex etiology. Biological networks generated from available data on biomolecular interactions are an excellent platform for understanding interconnectedness of all processes within a living cell, including processes that underlie diseases. Consequently, topology of biological networks has successfully been used for identifying genes, pathways, and modules that govern molecular actions underlying various complex diseases. Here, we review approaches that explore and use relationships between topological properties of biological networks and mechanisms underlying CVDs.

  4. A Survey on Vertical Handover Decision Framework In Heterogenious Wireless Networks

    Directory of Open Access Journals (Sweden)

    Narayana Srivyshnavi

    2015-05-01

    Full Text Available The wireless network of future will consists different radio access technologies. The transfer of mobile terminal from one point to another point in an active communication needs a handover decision. Due to which vertical handover decision will be a priority. The vertical handover decision can be based on different criteria such as bandwidth, signal strength, cost etc., in order for network selection decision we use two algorithms such as customer surplus value and fuzzy selection algorithm. Our goal is to develop a framework for efficient simulation of VHO selection algorithm .This situation is on OmneT++ in various wireless networks.

  5. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN: A Survey

    Directory of Open Access Journals (Sweden)

    Vinay Kumar

    2012-01-01

    Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.

  6. Comparison of logistic regression and artificial neural network in low back pain prediction: second national health survey.

    Science.gov (United States)

    Parsaeian, M; Mohammad, K; Mahmoudi, M; Zeraati, H

    2012-01-01

    The purpose of this investigation was to compare empirically predictive ability of an artificial neural network with a logistic regression in prediction of low back pain. Data from the second national health survey were considered in this investigation. This data includes the information of low back pain and its associated risk factors among Iranian people aged 15 years and older. Artificial neural network and logistic regression models were developed using a set of 17294 data and they were validated in a test set of 17295 data. Hosmer and Lemeshow recommendation for model selection was used in fitting the logistic regression. A three-layer perceptron with 9 inputs, 3 hidden and 1 output neurons was employed. The efficiency of two models was compared by receiver operating characteristic analysis, root mean square and -2 Loglikelihood criteria. The area under the ROC curve (SE), root mean square and -2Loglikelihood of the logistic regression was 0.752 (0.004), 0.3832 and 14769.2, respectively. The area under the ROC curve (SE), root mean square and -2Loglikelihood of the artificial neural network was 0.754 (0.004), 0.3770 and 14757.6, respectively. Based on these three criteria, artificial neural network would give better performance than logistic regression. Although, the difference is statistically significant, it does not seem to be clinically significant.

  7. Connecting to young adults: an online social network survey of beliefs and attitudes associated with prescription opioid misuse among college students.

    Science.gov (United States)

    Lord, Sarah; Brevard, Julie; Budman, Simon

    2011-01-01

    A survey of motives and attitudes associated with patterns of nonmedical prescription opioid medication use among college students was conducted on Facebook, a popular online social networking Web site. Response metrics for a 2-week random advertisement post, targeting students who had misused prescription medications, surpassed typical benchmarks for online marketing campaigns and yielded 527 valid surveys. Respondent characteristics, substance use patterns, and use motives were consistent with other surveys of prescription opioid use among college populations. Results support the potential of online social networks to serve as powerful vehicles to connect with college-aged populations about their drug use. Limitations of the study are noted.

  8. Survey of WBSNs for Pre-Hospital Assistance: Trends to Maximize the Network Lifetime and Video Transmission Techniques

    Directory of Open Access Journals (Sweden)

    Enrique Gonzalez

    2015-05-01

    Full Text Available This survey aims to encourage the multidisciplinary communities to join forces for innovation in the mobile health monitoring area. Specifically, multidisciplinary innovations in medical emergency scenarios can have a significant impact on the effectiveness and quality of the procedures and practices in the delivery of medical care. Wireless body sensor networks (WBSNs are a promising technology capable of improving the existing practices in condition assessment and care delivery for a patient in a medical emergency. This technology can also facilitate the early interventions of a specialist physician during the pre-hospital period. WBSNs make possible these early interventions by establishing remote communication links with video/audio support and by providing medical information such as vital signs, electrocardiograms, etc. in real time. This survey focuses on relevant issues needed to understand how to setup a WBSN for medical emergencies. These issues are: monitoring vital signs and video transmission, energy efficient protocols, scheduling, optimization and energy consumption on a WBSN.

  9. A Survey on Distributed Filtering and Fault Detection for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hongli Dong

    2014-01-01

    Full Text Available In recent years, theoretical and practical research on large-scale networked systems has gained an increasing attention from multiple disciplines including engineering, computer science, and mathematics. Lying in the core part of the area are the distributed estimation and fault detection problems that have recently been attracting growing research interests. In particular, an urgent need has arisen to understand the effects of distributed information structures on filtering and fault detection in sensor networks. In this paper, a bibliographical review is provided on distributed filtering and fault detection problems over sensor networks. The algorithms employed to study the distributed filtering and detection problems are categorised and then discussed. In addition, some recent advances on distributed detection problems for faulty sensors and fault events are also summarized in great detail. Finally, we conclude the paper by outlining future research challenges for distributed filtering and fault detection for sensor networks.

  10. Survey: Comparison Estimation of Various Routing Protocols in Mobile Ad-Hoc Network

    Directory of Open Access Journals (Sweden)

    Priyanshu

    2014-06-01

    Full Text Available MANET is an autonomous system of mobile nodes attached by wireless links. It represents a complex and dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into an ad-hoc network topology. The devices in the network may have limited transmission range therefore multiple hops may be needed by one node to transfer data to another node in network. This leads to the need for an effective routing protocol. In this paper we study various classifications of routing protocols and their types for wireless mobile ad-hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast Protocols. In this paper we also compare different routing protocols on based on a given set of parameters Scalability, Latency, Bandwidth, Control-overhead, Mobility impact.

  11. A Survey of TCP Reno, New Reno and Sack Over Mobile Ad-Hoc Network

    CERN Document Server

    Khan, Md Nazmul Islam; Aziz, Md Tariq

    2012-01-01

    Transmission Control Protocol (TCP) is often preferred to be implemented at the transport layer of a Mobile Ad-hoc Network (MANET) because of its wide range of applications, which enjoys the advantage of reliable data transmission in the Internet. However, because of some unique characteristics of MANET, TCP cannot offer reliable services while using e-mail, internet search and file transmission in such a network. The research investigates how well the different versions of TCP respond to various performance differentials when subjected to different network stresses and topology changes, aside from identifying the most efficient and robust TCP version(s) for different MANET scenarios. Among several TCP variants, three types are considered important for the analysis, namely TCP Reno, TCP New Reno and TCP Selective Acknowledgment (SACK). In most cases, the TCP performance is found in our study to decrease when the node size and mobility rate is increased in the network. There is, however, exception to this. As ...

  12. Analysis and synthesis of networked control systems: A survey of recent advances and challenges.

    Science.gov (United States)

    Zhang, Dan; Shi, Peng; Wang, Qing-Guo; Yu, Li

    2017-01-01

    A networked control system (NCS) is a control system which involves a communication network. In NCSs, the continuous-time measurement is usually sampled and quantized before transmission. Then, the measurement is transmitted to the remote controller via the communication channel, during which the signal may be delayed, lost or even sometimes not allowed for transmission due to the communication or energy constraints. In recent years, the modeling, analysis and synthesis of networked control systems (NCSs) have received great attention, which leads to a large number of publications. This paper attempts to present an overview of recent advances and unify them in a framework of network-induced issues such as signal sampling, data quantization, communication delay, packet dropouts, medium access constraints, channel fading and power constraint, and present respective solution approaches to each of these issues. We draw some conclusions and highlight future research directions in end.

  13. An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdoulaye Diop

    2013-01-01

    Full Text Available Wireless Sensor Networks (WSNs are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to balance between the security level and the associated energy consumption overhead to mitigate the security risks. Hierarchical routing protocol is more energy-efficient than other routing protocols in WSNs. Many secure cluster-based routing protocols have been proposed in the literature to overcome these constraints. In this paper, we discuss Secure Energy-Efficient Hierarchical Routing Protocols in WSNs and compare them in terms of security, performance and efficiency. Security issues for WSNs and their solutions are also discussed.

  14. Compassionate use of interventions: results of a European Clinical Research Infrastructures Network (ECRIN) survey of ten European countries

    LENUS (Irish Health Repository)

    Whitfield, Kate

    2010-11-12

    Abstract Background \\'Compassionate use\\' programmes allow medicinal products that are not authorised, but are in the development process, to be made available to patients with a severe disease who have no other satisfactory treatment available to them. We sought to understand how such programmes are regulated in ten European Union countries. Methods The European Clinical Research Infrastructures Network (ECRIN) conducted a comprehensive survey on clinical research regulatory requirements, including questions on regulations of \\'compassionate use\\' programmes. Ten European countries, covering approximately 70% of the EU population, were included in the survey (Austria, Denmark, France, Germany, Hungary, Ireland, Italy, Spain, Sweden, and the UK). Results European Regulation 726\\/2004\\/EC is clear on the intentions of \\'compassionate use\\' programmes and aimed to harmonise them in the European Union. The survey reveals that different countries have adopted different requirements and that \\'compassionate use\\' is not interpreted in the same way across Europe. Four of the ten countries surveyed have no formal regulatory system for the programmes. We discuss the need for \\'compassionate use\\' programmes and their regulation where protection of patients is paramount. Conclusions \\'Compassionate use\\' is a misleading term and should be replaced with \\'expanded access\\'. There is a need for expanded access programmes in order to serve the interests of seriously ill patients who have no other treatment options. To protect these patients, European legislation needs to be more explicit and informative with regard to the regulatory requirements, restrictions, and responsibilities in expanded access programmes.

  15. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  16. Social networking experiences on Facebook: A survey of gender differences amongst students

    OpenAIRE

    Melanie Wiese; Juanne Lauer; George Pantazis; Jade Samuels

    2014-01-01

    Orientation: Students’ membership and participation in social networking sites, such as Facebook, has increased in recent years.Research purpose: The study examined students’ access to social network sites and compared male and female students’ usage of Facebook with regards to time commitment, privacy concerns, and the creation and/or maintenance of relationships.Motivation: The study adds to the existing academic literature on this topic by providing a South African perspective.Research des...

  17. User Association in 5G Networks: A Survey and an Outlook

    OpenAIRE

    Liu, D.; Wang, L.; Chen, Y; Elkashlan, M; Wong, K-K; Schober, R; Hanzo, L.

    2015-01-01

    The fifth generation (5G) mobile networks are envisioned to support the deluge of data traffic with reduced energy consumption and improved quality of service (QoS) provision. To this end, key enabling technologies, such as heterogeneous networks (HetNets), massive multiple-input multiple-output (MIMO), and millimeter wave (mmWave) techniques, have been identified to bring 5G to fruition. Regardless of the technology adopted, a user association mechanism is needed to dete...

  18. Message Passing Based Time Synchronization in Wireless Sensor Networks: A Survey

    OpenAIRE

    2016-01-01

    Various protocols have been proposed in the area of wireless sensor networks in order to achieve network-wide time synchronization. A large number of proposed protocols in the literature employ a message passing mechanism to make sensor node clocks tick in unison. In this paper, we first classify Message Passing based Time Synchronization (MPTS) protocols and then analyze them based on different metrics. The classification is based on the following three criteria: structure formation of the n...

  19. A Survey on Vertical Handover Decision Framework In Heterogenious Wireless Networks

    OpenAIRE

    Narayana Srivyshnavi; R.China Appala Naidu

    2015-01-01

    The wireless network of future will consists different radio access technologies. The transfer of mobile terminal from one point to another point in an active communication needs a handover decision. Due to which vertical handover decision will be a priority. The vertical handover decision can be based on different criteria such as bandwidth, signal strength, cost etc., in order for network selection decision we use two algorithms such as customer surplus value and fuzzy selection...

  20. Mesenchymal stem cells as an appropriate feeder layer for prolonged in vitro culture of human induced pluripotent stem cells.

    Science.gov (United States)

    Havasi, Parvaneh; Nabioni, Mohammad; Soleimani, Masoud; Bakhshandeh, Behnaz; Parivar, Kazem

    2013-04-01

    Feeder layers have been applied extensively to support the growth and stemness potential of stem cells for in vitro cultures. Mouse embryonic fibroblast and mouse fibroblast cell line (SNL) are common feeder cells for human induced pluripotent stem cells (hiPSCs) culture. Because of some problems in the use of these animal feeders and in order to simplify the therapeutic application of hiPSCs, we tested human adult bone marrow mesenchymal stem cells (hMSCs) as a potent feeder system. This method benefits from prevention of possible contamination of animal origin feeder systems. hiPSCs transferred onto mitotically inactivated hMSCs and passaged every 5 days. Prior to this culture, MSCs were characterized by flow cytometry of their surface markers and evaluation of their osteogenic and adipogenic differentiation potentials. The morphology, expressions of some specific pluripotency markers such as SSEA-3, NANOG and TRA-1-60, alkaline phosphates activity, formation embryoid bodies and their differentiation potentials of iPSCs on SNL and MSC feeder layers were evaluated. To investigate the prolonged maintenance of pluripotency, the quantitative transcriptions of some pluripotency markers including OCT4, SOX2, NANOG and REX1 were compared in the iPS clones on SNL or MSC feeders. Human iPSCs cultured on human MSCs feeder were slightly thinner and flatter than ones on the other feeder system. Interestingly MSCs supported the prolonged in vitro proliferation of hiPSCs along with maintenance of their pluripotency. Altogether our results suggest human mesenchymal stem cells as an appropriate feeder layer for human iPSCs culture for clinical applications and cell therapy.

  1. Production capacity of estuarine ecosystems and filter feeder stock size: indices for under- or overgrazing

    NARCIS (Netherlands)

    Smaal, A.C.

    2012-01-01

    For extensive shellfish culture, the trophic capacity of the culture system is a major production factor and this is determined by the primary production, the flux of food to the culture sites and the role of competing filter feeders. Various control mechanisms play a role in these processes:

  2. Derivation of stable zebrafish ES-like cells in feeder-free culture.

    Science.gov (United States)

    Hong, Ni; Schartl, Manfred; Hong, Yunhan

    2014-09-01

    Zebrafish offers an excellent opportunity to combine embryological, genetic and molecular analyses of vertebrate development in vivo. Embryonic stem (ES) cells have enormous potential to study developmental potency and differentiation in vitro and thus to complement in vivo approaches. Zebrafish ES-like cells have been produced on a feeder cell layer. Here, we report the derivation of Z428, a zebrafish ES-like cell line, from blastula embryos in feeder-free culture. Fetal bovine serum, fish serum, fish embryo extract, basic fibroblast growth factor, non-essential amino acids and 2-mercaptoethanol were found to be important for Z428 growth. After more than 120 passages and many freezing/thawing cycles over a period of 20 years, Z428 exhibits stable growth and manifests many ES cell features including an ES cell phenotype, high alkaline phosphatase activity and spontaneous differentiation in culture. Most importantly, Z428 was transplantable to blastula hosts and capable of contributing to embryonic tissues and organ systems of the three germ layers. Therefore, Z428 is a stable cell line and contains ES-like cells with pluripotency in vitro and in vivo, and a feeder layer is dispensable for ES-like cell derivation in zebrafish. The derivation and easy maintenance of zebrafish ES-like cells under feeder-free conditions provide a useful extension of the present toolbox for studying development and differentiation in the zebrafish model.

  3. Parametric Study of Cylindrical Dielectric Resonator Antenna (CDRA Feeder with Symmetric Parabolic Reflector

    Directory of Open Access Journals (Sweden)

    S.M. Ali

    2015-06-01

    Full Text Available In this study a parabolic reflector antenna is designed and fabricated for IEEE 802.11a WLAN application. Initially, a single element circular tuning slot coupled Cylindrical Dielectric Resonator Antenna (CDRA feeder is designed and fabricated for a symmetric parabolic reflector. Subsequently, the designed feeder is integrated at the focal point of the parabolic reflector to provide unidirectional radiation pattern with improved gain and sidelobe levels. The measured fractional impedance bandwidth achieved for the proposed antenna is 1.8% for S11<-10 dB from 5.32 to 5.52 GHz. A radiation pattern with broadside radiation and low back radiation has been obtained. A good measurement gain of approximately 13 dB is achieved over the bandwidth by placing CDRA feeder at the focal point of the parabolic reflector. In addition, a comprehensive parametric study has been conducted to realize the effect of slot size and position on the resonance frequency of the designed feeder. Furthermore, a parametric study of various reflector parameters has also been performed to study the effect of size, depth and focal point of the parabolic reflector on gain of the antenna. Important design factors have been identified from the parametric study of the antenna. The experimental and measured results show that the designed antenna is suitable for IEEE WLAN 802.11a wireless application.

  4. The Use of Filter-feeders to Manage Disease in a Changing World

    NARCIS (Netherlands)

    Burge, C.A.; Closek, C.J.; Friedman, C.S.; Groner, M.; Jenkins, C.M.; Shore-Maggio, A.; Welsh, J.E.

    2016-01-01

    Rapid environmental change is linked to increases in aquatic disease heightening the need to develop strategies to manage disease. Filter-feeding species are effective biofilters and can naturally mitigate disease risk to humans and wildlife. We review the role of filter-feeders, with an emphasis on

  5. Optimal foraging by birds: feeder-based experiments for secondary and post-secondary students

    Science.gov (United States)

    Optimal foraging theory attempts to explain the foraging patterns observed in animals, including their choice of particular food items and foraging locations. Here, we describe three exercises designed to test hypotheses about food choice and foraging habitat preference using bird feeders. These e...

  6. 46 CFR 113.25-8 - Distribution of general emergency alarm system feeders and branch circuits.

    Science.gov (United States)

    2010-10-01

    ... Systems § 113.25-8 Distribution of general emergency alarm system feeders and branch circuits. (a) Each... alarm signal. (e) Each system must have one or more branch circuit distribution panels for each zone... 46 Shipping 4 2010-10-01 2010-10-01 false Distribution of general emergency alarm system...

  7. Feeder Cell Type Affects the Growth of In Vitro Cultured Bovine Trophoblast Cells

    Directory of Open Access Journals (Sweden)

    Islam M. Saadeldin

    2017-01-01

    Full Text Available Trophectoderm cells are the foremost embryonic cells to differentiate with prospective stem-cell properties. In the current study, we aimed at improving the current approach for trophoblast culture by using granulosa cells as feeders. Porcine granulosa cells (PGCs compared to the conventional mouse embryonic fibroblasts (MEFs were used to grow trophectoderm cells from hatched bovine blastocysts. Isolated trophectoderm cells were monitored and displayed characteristic epithelial/cuboidal morphology. The isolated trophectoderm cells expressed mRNA of homeobox protein (CDX2, cytokeratin-8 (KRT8, and interferon tau (IFNT. The expression level was higher on PGCs compared to MEFs throughout the study. In addition, primary trophectoderm cell colonies grew faster on PGCs, with a doubling time of approximately 48 hrs, compared to MEFs. PGCs feeders produced a fair amount of 17β-estradiol and progesterone. We speculated that the supplementation of sex steroids and still-unknown factors during the trophoblasts coculture on PGCs have helped to have better trophectoderm cell’s growth than on MEFs. This is the first time to use PGCs as feeders to culture trophectoderm cells and it proved superior to MEFs. We propose PGCs as alternative feeders for long-term culture of bovine trophectoderm cells. This model will potentially benefit studies on the early trophoblast and embryonic development in bovines.

  8. Feeder-independent continuous culture of the PICM-19 pig liver stem cell line

    Science.gov (United States)

    The PICM-19 pig liver stem cell line is a bipotent cell line, i.e., capable of forming either bile ductules or hepatocyte monolayers in vitro, that was derived from the primary culture of pig embryonic stem cells. The cell line has been strictly feeder-dependent in that cell replication morphology,...

  9. Hybrid RSOA and fibre raman amplified long reach feeder link for WiMAX-on-fibre

    DEFF Research Database (Denmark)

    Amaya Fernández, Ferney Orlando; Martinez, Javier; Yu, Xianbin;

    2009-01-01

    A distributed fibre Raman amplified long reach optical access feeder link using a reflective semiconductor optical amplifier in the remote base station is experimentally demonstrated for supporting WiMAXover- fibre transmission. The measured values for the error vector magnitude for quadrature ph...

  10. Operation of a cell feeder for coal controlled by a frequency converter. [Czechoslovakia

    Energy Technology Data Exchange (ETDEWEB)

    Stonawski, J.; Sikora, G.

    1984-02-01

    Steam boiler of the Trinec coal-fired power plant with a capacity of 125 t/h, 545 C, 9.5 MPa was equipped with a screw coal feeder with the KT26A-6 Winter-Eichberg motor with a transformer. The screw fee

  11. Establishment and characterization of feeder-cell-dependent bovine fetal liver cell lines

    Science.gov (United States)

    The establishment and initial characterization of bovine fetal liver cell lines is described. Bovine fetal hepatocytes were cultured from the liver of a 34-day bovine fetus by physical disruption of the liver tissue. Released liver cells and clumps of cells were plated on STO feeder layers and wer...

  12. A Survey of Wireless Sensor Network Based Air Pollution Monitoring Systems.

    Science.gov (United States)

    Yi, Wei Ying; Lo, Kin Ming; Mak, Terrence; Leung, Kwong Sak; Leung, Yee; Meng, Mei Ling

    2015-12-12

    The air quality in urban areas is a major concern in modern cities due to significant impacts of air pollution on public health, global environment, and worldwide economy. Recent studies reveal the importance of micro-level pollution information, including human personal exposure and acute exposure to air pollutants. A real-time system with high spatio-temporal resolution is essential because of the limited data availability and non-scalability of conventional air pollution monitoring systems. Currently, researchers focus on the concept of The Next Generation Air Pollution Monitoring System (TNGAPMS) and have achieved significant breakthroughs by utilizing the advance sensing technologies, MicroElectroMechanical Systems (MEMS) and Wireless Sensor Network (WSN). However, there exist potential problems of these newly proposed systems, namely the lack of 3D data acquisition ability and the flexibility of the sensor network. In this paper, we classify the existing works into three categories as Static Sensor Network (SSN), Community Sensor Network (CSN) and Vehicle Sensor Network (VSN) based on the carriers of the sensors. Comprehensive reviews and comparisons among these three types of sensor networks were also performed. Last but not least, we discuss the limitations of the existing works and conclude the objectives that we want to achieve in future systems.

  13. Energy Efficiency and Renewable Energy Network (EREN) customer satisfaction survey, 1997. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, A.V. [Information International Associates, Inc., Oak Ridge, TN (United States); Henderson, D.P. [USDOE Office of Scientific and Technical Information (OSTI), Oak Ridge, TN (United States)

    1997-07-01

    the EREN Customer Satisfaction Survey 1997 was designed to follow up the results of the 1995-96 Surveys, enabling comparison to the 1995- 96 baseline, and to provide additional qualitative feedback about EREN. Both the 1995-96 and 1997 Surveys had these objectives: Identify and define actual EREN users; Determine the value or benefits derived from the use of EREN; Determine the kind and quality of services that users want; Determine the users` levels of satisfaction with existing services; Determine users` preferences in both the sources of service and means of delivery; and Establish continuous quality improvement measures. This report presents the methodology used, scope and limitations of the study, description of the survey instrument, and findings regarding demographics, technical capabilities, usage patterns, general use, importance of and satisfaction with resources, and additional information and comments.

  14. Efficient derivation and genetic modifications of human pluripotent stem cells on engineered human feeder cell lines.

    Science.gov (United States)

    Zou, Chunlin; Chou, Bin-Kuan; Dowey, Sarah N; Tsang, Kitman; Huang, Xiaosong; Liu, Cyndi F; Smith, Cory; Yen, Jonathan; Mali, Prashant; Zhang, Yu Alex; Cheng, Linzhao; Ye, Zhaohui

    2012-08-10

    Derivation of pluripotent stem cells (iPSCs) induced from somatic cell types and the subsequent genetic modifications of disease-specific or patient-specific iPSCs are crucial steps in their applications for disease modeling as well as future cell and gene therapies. Conventional procedures of these processes require co-culture with primary mouse embryonic fibroblasts (MEFs) to support self-renewal and clonal growth of human iPSCs as well as embryonic stem cells (ESCs). However, the variability of MEF quality affects the efficiencies of all these steps. Furthermore, animal sourced feeders may hinder the clinical applications of human stem cells. In order to overcome these hurdles, we established immortalized human feeder cell lines by stably expressing human telomerase reverse transcriptase, Wnt3a, and drug resistance genes in adult mesenchymal stem cells. Here, we show that these immortalized human feeders support efficient derivation of virus-free, integration-free human iPSCs and long-term expansion of human iPSCs and ESCs. Moreover, the drug-resistance feature of these feeders also supports nonviral gene transfer and expression at a high efficiency, mediated by piggyBac DNA transposition. Importantly, these human feeders exhibit superior ability over MEFs in supporting homologous recombination-mediated gene targeting in human iPSCs, allowing us to efficiently target a transgene into the AAVS1 safe harbor locus in recently derived integration-free iPSCs. Our results have great implications in disease modeling and translational applications of human iPSCs, as these engineered human cell lines provide a more efficient tool for genetic modifications and a safer alternative for supporting self-renewal of human iPSCs and ESCs.

  15. Generation of Mouse STO Feeder Cell Lines That Confer Resistance to Several Types of Selective Drugs.

    Science.gov (United States)

    Saitoh, Issei; Sato, Masahiro; Iwase, Yoko; Inada, Emi; Nomura, Toshiki; Akasaka, Eri; Yamasaki, Youichi; Noguchi, Hirofumi

    2012-01-01

    Feeder cells are generally required for establishment and maintenance of embryonic stem (ES)/induced pluripotent stem (iPS) cells. Increased demands for generation of those cells carrying various types of vectors (i.e., KO vectors and transgenes) also require feeder cells that confer resistance to any types of preexisting selective drugs. Unfortunately, the use of the feeders that are resistant to various drugs appears to be limited to a few laboratories. Here we generated a set of gene-engineered STO feeder cells that confer resistance to several commercially available drugs. The STO cells, which have long been used as a feeder for mouse ES and embryonal carcinoma (EC) cells, were transfected with pcBIH [carrying bleomycin resistance gene (ble) and hygromycin B phosphotransferase gene (Hyg)], pcBIP [carrying ble and puromycin resistance gene (puro)], or pcBSN [carrying ble and neomycin resistance gene (neo)]. The resulting stably transfectants (termed SHB for pcBIH, SPB for pcBIP, and SNB for pcBSN) exhibited bleomycin/hygromycin, bleomycin/puromycin, or bleomycin/neomycin, as expected. The morphology of these cells passaged over 18 generations was indistinguishable from that of parental STO cells. Of isolated clones, the SHB3, SPB3, and SNB2 clones successfully supported the growth of mouse ES cells in an undifferentiated state, when coculture was performed. PCR analysis revealed the presence of the selective markers in these clones, as expected. These SHB3, SPB3, and SNB2 cells will thus be useful for the acquisition and maintenance of genetically manipulated ES/iPS cells.

  16. Ethnic differences in women's use of mental health services: do social networks play a role? Findings from a national survey.

    Science.gov (United States)

    Kapadia, Dharmi; Nazroo, James; Tranmer, Mark

    2016-11-28

    The reasons for ethnic differences in women's mental health service use in England remain unclear. The aims of this study were to ascertain: ethnic differences in women's usage of mental health services, if social networks are independently associated with service use, and if the association between women's social networks and service use varies between ethnic groups. Logistic regression modelling of nationally representative data from the Ethnic Minority Psychiatric Illness Rates in the Community (EMPIRIC) survey conducted in England. The analytic sample (2260 women, aged 16-74 years) was drawn from the representative subsample of 2340 women in EMPIRIC for whom data on mental health services, and social networks were available. Pakistani and Bangladeshi women were less likely than White women to have used mental health services (Pakistani OR = 0.23, CI = 0.08-0.65, p = .005; Bangladeshi OR = 0.25, CI = 0.07-0.86, p = .027). Frequent contact with relatives reduced mental health service use (OR = 0.45, CI = 0.23-0.89, p = .023). An increase in perceived inadequate support in women's close networks was associated with increased odds of using mental health services (OR = 1.91, CI = 1.11-3.27, p = .019). The influence of social networks on mental health service use did not differ between ethnic groups. The differential treatment of women from Pakistani and Bangladeshi ethnic groups in primary care settings could be a possible reason for the observed differences in mental health service use.

  17. A Survey Of Tcp Reno, New Reno And Sack Over Mobile Ad-Hoc Network

    Directory of Open Access Journals (Sweden)

    Md Nazmul Islam Khan

    2012-02-01

    Full Text Available Transmission Control Protocol (TCP is often preferred to be implemented at the transport layer of a Mobile Ad-hoc Network (MANET because of its wide range of applications, which enjoys the advantage of reliable data transmission in the Internet. However, because of some unique characteristics of MANET, TCP cannot offer reliable services while using e-mail, internet search and file transmission insuch a network. The research investigates how well the different versions of TCP respond to various performance differentials when subjected to different network stresses and topology changes, aside from identifying the most efficient and robust TCP version(s for different MANET scenarios. Among several TCP variants, three types are considered important for the analysis, namely TCP Reno, TCP New Reno and TCP Selective Acknowledgment (SACK. In most cases, the TCP performance is found in our study to decrease when the node size and mobility rate is increased in the network. There is, however, exception to this. As our simulation results demonstrate, the increases in the node velocity sometimes help the TCP to attain a better performance. The study also reveals that out of the three variants, TCP SACK can adaptrelatively well to the changing network sizes while TCP Reno performs most robustly in the presence ofdifferent mobility rates within MANET.

  18. Mentoring of young professionals in the field of rheumatology in Europe: results from an EMerging EUlar NETwork (EMEUNET) survey.

    Science.gov (United States)

    Frank-Bertoncelj, Mojca; Hatemi, Gulen; Ospelt, Caroline; Ramiro, Sofia; Machado, Pedro; Mandl, Peter; Gossec, Laure; Buch, Maya H

    2014-01-01

    To explore perceptions of, participation in and satisfaction with mentoring programmes among young clinicians and researchers in rheumatology in Europe. To identify mentoring needs and expectations focusing on gender-specific differences. A survey on mentoring in rheumatology was distributed to young clinicians and researchers in rheumatology in Europe through the EMEUNET network. We received 248 responses from 30 European countries. Although 82% of respondents expressed the need for a formal mentoring scheme by EULAR, only 35% participated in mentoring programmes and merely 20% were very satisfied with mentoring. Respondents very satisfied with mentoring were more likely to participate in research, but not clinical mentoring programmes. Career mentoring was perceived as the most beneficial type of mentoring for career development by 46% of respondents, only 35% of respondents, however, declared the existence of career mentoring programmes in their country. There was no gender difference considering participation in mentoring programmes. Women, however, tended to be less satisfied than men with existing mentoring programmes and considered expectations from mentoring as more important for their career development, especially when pertaining to career planning, greater autonomy/responsibility and establishing new networks/collaborations. Career mentoring, especially in the clinical setting, was recognised as a major unmet need of existing mentoring programmes in rheumatology in Europe. Gender-specific differences were identified in the expectations from mentoring. Given this and the importance of mentoring for career prosperity of young physicians and scientists, our survey represents the first step towards developing and refining mentoring programmes in rheumatology in Europe.

  19. Social media use among young rheumatologists and basic scientists: results of an international survey by the Emerging EULAR Network (EMEUNET).

    Science.gov (United States)

    Nikiphorou, Elena; Studenic, Paul; Ammitzbøll, Christian Gytz; Canavan, Mary; Jani, Meghna; Ospelt, Caroline; Berenbaum, Francis

    2017-04-01

    To explore perceptions, barriers and patterns of social media (SM) use among rheumatology fellows and basic scientists. An online survey was disseminated via Twitter, Facebook and by email to members of the Emerging European League Against Rheumatism Network. Questions focused on general demographics, frequency and types of SM use, reasons and barriers to SM use. Of 233 respondents (47 countries), 72% were aged 30-39 years, 66% female. 83% were active users of at least one SM platform and 71% were using SM professionally. The majority used SM for communicating with friends/colleagues (79%), news updates (76%), entertainment (69%), clinical (50%) and research (48%) updates. Facebook was the dominant platform used (91%). SM was reported to be used for information (81%); for expanding professional networks (76%); new resources (59%); learning new skills (47%) and establishing a professional online presence (46%). 30% of non-SM users justified not using SM due to lack of knowledge. There was a substantial use of SM by rheumatologists and basic scientists for social and professional reasons. The survey highlights a need for providing learning resources and increasing awareness of the use of SM. This could enhance communication, participation and collaborative work, enabling its more widespread use in a professional manner. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  20. Development of a Network RTK Positioning and Gravity-Surveying Application with Gravity Correction Using a Smartphone

    Directory of Open Access Journals (Sweden)

    Seongkyu Lee

    2013-07-01

    Full Text Available This paper proposes a smartphone-based network real-time kinematic (RTK positioning and gravity-surveying application (app that allows semi-real-time measurements using the built-in Bluetooth features of the smartphone and a third-generation or long-term evolution wireless device. The app was implemented on a single smartphone by integrating a global navigation satellite system (GNSS controller, a laptop, and a field-note writing tool. The observation devices (i.e., a GNSS receiver and relative gravimeter functioned independently of this system. The app included a gravity module, which converted the measured relative gravity reading into an absolute gravity value according to tides; meter height; instrument drift correction; and network adjustments. The semi-real-time features of this app allowed data to be shared easily with other researchers. Moreover, the proposed smartphone-based gravity-survey app was easily adaptable to various locations and rough terrain due to its compact size.

  1. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks

    CERN Document Server

    Padmavathi, Dr G

    2009-01-01

    Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.

  2. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  3. A survey of content placement strategies for content-centric networking

    Science.gov (United States)

    Naeem, Muhammad Ali; Nor, Shahrudin Awang

    2016-08-01

    Current Internet design is not sufficient to encounter the huge Internet traffic, so it is converted from the host based oncontentinformation based architecture. Some of new content, information based architectures are PSRIP, CCN, NetInf, and DONA. In these ICN architectures, CCN is more attractive to implement the idea of Information Centric Network. And in network cache is most important part of all ICN architectures to implement the main idea of ICN. Ubiquitous cache is not a proof of good performance of the cache. To produce a high performance of cache there is needed to manage a cache in a more efficient manner. There exist many content placement strategies to manage the cache. In this paper, we briefly explain cache and content placement strategies of Content Centric Network architecture.

  4. Efficient Power Utilization Techniques for Wireless Sensor Networks – A Survey

    Directory of Open Access Journals (Sweden)

    Mr. Sharad Saxena,

    2011-02-01

    Full Text Available Micro-sensor networks are widely deployed sensor network in typical geographical areas where human intervention is almost impossible. A WSN is a collection of several small energy limited sensors. These devices are autonomous devices performs the job of data collection and forwarding it to the central node called sink node. The observed data can travel through multiple paths to reach sink node. Sink nodeperforms the task of data fusion to determine a meaningful output. The micro sensors use battery power supply to achieve this goal. The considerable part here is to utilize that limited power supply for a longer time period. Although latest developments in the area of electronics has enabled the development of lowcost and low power sensor networks, still researchers are developing protocols by ifferent approaches to optimize power utilization for such tiny micro-sensors. This paper studies various approaches used by researchers to enhance power utilization.

  5. A Survey on Cross-Layer Design Frameworks for Multimedia Applications over Wireless Networks

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    In the last few years, the Internet throughput, usage and reliability have increased almost exponentially. The introduction of broadband wireless mobile ad hoc networks (MANETs) and cellular networks together with increased computational power have opened the door for a new breed of applications to be created, namely real-time multimedia applications. Delivering real-time multimedia traffic over a complex network like the Internet is a particularly challenging task since these applications have strict quality -of-service (QoS) requirements on bandwidth, delay, and delay jitter. Traditional IP-based best effort service will not be able to meet these stringent requirements. The time-varying nature of wireless channels and resource constrained wireless devices make the problem even more difficult. To improve perceived media quality by end users over wireless Internet, QoS supports can be addressed in different layers, including application layer, transport layer and link layer. Cross layer design is a well-known...

  6. [A case management programme for women with breast cancer: results of a written survey of participating medical and non-medical networking-partners].

    Science.gov (United States)

    Büscher, C; Thorenz, A; Grochocka, A; Koch, U; Watzke, B

    2011-12-01

    Breast cancer patients are as a rule in need of a multiple sequential in-patient, day-patient and out-patient permanent treatment. The required care demands a trans-sectoral networking of all multi-professional persons involved in diagnostics, therapies, rehabilitation and aftercare. A method to develop the integration of treatment processes, as well as thereby resulting in increased effectiveness and efficiency, can constitute the concept of case management. A prerequisite for an effective implementation of case management and thus the starting point of the present survey is a well-functioning network encompassing optimal cooperation. Within the framework of the evaluation of the case management-based integrated care model "mammaNetz" for women with mamma carcinoma as a whole and against the background of the potential for innovation and improvement of case management on the one hand as well as the existence of only few empirical data otherwise, the present survey of members of a trans-sectoral network of the service centre was accomplished. Medical and non-medical networking partners of the service centre (N=168) were questioned by regular mail about different aspects of the cooperation. Identical items in both surveys were compared. The return rate for the medical networking partners is about 59% (n=35), whereby only medical network partners in private practice participated in the survey. For the non-medical networking partners about 60% (n=66) participated. Medical networking partners assess the cooperation with the service centre in reference to the exchange of information slightly more positively (66%) than the non-medical networking partners (59%). Medical networking partners are in significantly more frequent contact with the service centre and see in the cooperation significantly more advantages for their own office/facility (each with p=0.001) than non-medical networking partners. Overall the results suggest that medical as well as non-medical networking

  7. A survey on the approaches in honeypot for implementing network security

    Directory of Open Access Journals (Sweden)

    Niharika Srivastava

    2012-10-01

    Full Text Available Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques fromattackers and intruders. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. This paper discusses the client and server honeypot approaches for the implementation of network security.

  8. A Survey of Unipath Routing Protocols for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M.Barveen Banu

    2013-12-01

    Full Text Available A MANET (Mobile Ad hoc NETwork is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. Routing is a mechanism of exchanging data between the source node and the destination node. Several protocols are used to perform routing the information from the source node to the destination node. The main aim of this paper is to explore the working principles of each unipath routing protocol. The unipath routing protocols are divided into Table-Driven (Proactive, On-demand (Reactive, Hybrid routing protocols.

  9. A survey of medium access control protocols for wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Elvio João Leonardo

    2004-01-01

    Full Text Available A number of issues distinguishes Medium Access Control (MAC protocols for wireless networks from those used in wireline systems. In addition, for ad-hoc networks, the characteristics of the radio channel, the diverse physical-layer technologies available and the range of services envisioned make it a difficult task to design an algorithm to discipline the access to the shared medium that results efficient, fair, power consumption sensitive and delay bound. This article presents the current “state-of-art” in this area, including solutions already commercially available as well as those still in study.

  10. A Survey on Sensor Coverage and Visual Data Capturing/Processing/Transmission in Wireless Visual Sensor Networks

    Directory of Open Access Journals (Sweden)

    Florence G. H. Yap

    2014-02-01

    Full Text Available Wireless Visual Sensor Networks (WVSNs where camera-equipped sensor nodes can capture, process and transmit image/video information have become an important new research area. As compared to the traditional wireless sensor networks (WSNs that can only transmit scalar information (e.g., temperature, the visual data in WVSNs enable much wider applications, such as visual security surveillance and visual wildlife monitoring. However, as compared to the scalar data in WSNs, visual data is much bigger and more complicated so intelligent schemes are required to capture/process/ transmit visual data in limited resources (hardware capability and bandwidth WVSNs. WVSNs introduce new multi-disciplinary research opportunities of topics that include visual sensor hardware, image and multimedia capture and processing, wireless communication and networking. In this paper, we survey existing research efforts on the visual sensor hardware, visual sensor coverage/deployment, and visual data capture/ processing/transmission issues in WVSNs. We conclude that WVSN research is still in an early age and there are still many open issues that have not been fully addressed. More new novel multi-disciplinary, cross-layered, distributed and collaborative solutions should be devised to tackle these challenging issues in WVSNs.

  11. A survey on sensor coverage and visual data capturing/processing/transmission in wireless visual sensor networks.

    Science.gov (United States)

    Yap, Florence G H; Yen, Hong-Hsu

    2014-02-20

    Wireless Visual Sensor Networks (WVSNs) where camera-equipped sensor nodes can capture, process and transmit image/video information have become an important new research area. As compared to the traditional wireless sensor networks (WSNs) that can only transmit scalar information (e.g., temperature), the visual data in WVSNs enable much wider applications, such as visual security surveillance and visual wildlife monitoring. However, as compared to the scalar data in WSNs, visual data is much bigger and more complicated so intelligent schemes are required to capture/process/ transmit visual data in limited resources (hardware capability and bandwidth) WVSNs. WVSNs introduce new multi-disciplinary research opportunities of topics that include visual sensor hardware, image and multimedia capture and processing, wireless communication and networking. In this paper, we survey existing research efforts on the visual sensor hardware, visual sensor coverage/deployment, and visual data capture/ processing/transmission issues in WVSNs. We conclude that WVSN research is still in an early age and there are still many open issues that have not been fully addressed. More new novel multi-disciplinary, cross-layered, distributed and collaborative solutions should be devised to tackle these challenging issues in WVSNs.

  12. Real-Time Distribution Feeder Performance Monitoring, Advisory Control, and Health Management System

    Energy Technology Data Exchange (ETDEWEB)

    Stoupis, James; Mousavi, Mirrasoul

    2014-09-30

    New data collection system equipment was installed in Xcel Energy substations and data was collected from 6 substations and 20 feeders. During Phase I, ABB collected and analyzed 793 real-time events to date from 6 Xcel Energy substations and continues today. The development and integration of several applications was completed during the course of this project, including a model-based faulted segment identification algorithm, with very positive results validated with field-gathered data discussed and included in this report. For mostly underground feeders, the success rate is 90% and the overreach rate is 90%. For mostly overhead feeders, the success rate is 74% and the overreach rate is 50%. The developed method is producing very accurate results for mostly underground feeders. For mostly overhead feeders, due to the bad OMS data quality and varying fault resistance when arcing, the developed method is producing good results but with much room for improvement. One area where the algorithm can be improved is the accuracy for sub-cycle fault events. In these cases, the accuracy of the conventional signal processing methods suffers due to most of these methods being based on a one-cycle processing window. By improving the signal processing accuracy, the accuracy of the faulted segment identification algorithm will also improve significantly. ABB intends to devote research in this area in the near future to help solve this problem. Other new applications developed during the course of the project include volt/VAR monitoring, unbalanced capacitor switching detection, unbalanced feeder loading detection, and feeder overloading detection. An important aspect of the demonstration phase of the project is to show the ability to provide adequate “heads-up” time ahead of customer calls or AMI reports so that the operators are provided with the much needed time to collect information needed to address an outage. The advance notification feature of the demonstration system

  13. Exploring the Usefulness of School Education about Risks on Social Network Sites: A Survey Study

    Science.gov (United States)

    Vanderhoven, Ellen; Schellens, Tammy; Valcke, Martin

    2013-01-01

    The growing popularity of social network sites (SNS) is causing concerns about privacy and security, especially with teenagers, since they show various forms of unsafe behavior on SNS. It has been put forth by researchers, teachers, parents, and teenagers that school is ideally placed to educate teens about risks on SNS and to teach youngsters how…

  14. The E-Business Research Network: summary of the results of the Dutch pilot survey

    NARCIS (Netherlands)

    A. van der Wiele (Ton); A.R.T. Williams (Roger); J.D. van Iwaarden (Jos); M. Wilson (Melanie); B.G. Dale (Barry)

    2001-01-01

    textabstractA project has been started with the intention to develop an E-Business Research Network on E-business related research in business and management. The initiative has been taken in co-operation between Erasmus University and UMIST to develop a project in which the first stage concerns the

  15. A survey of message diffusion portocols in mobile ad hoc networks

    NARCIS (Netherlands)

    Al Hanbali, A.M.; Ibrahim, M.; Simon, V.; Varga, E.; Carreras, I.

    2008-01-01

    For the last twenty years, mobile communications have experienced an explosive growth. In particular, one area of mobile communication, the Mobile Ad hoc Networks (MANETs), has attracted significant attention due to its multiple applications and its challenging research problems. On the other hand,

  16. A survey of Attacks on VoIP networks and Countermeasures

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-06-01

    Jun 1, 2015 ... Julius N. Obidinnu 1 and Ayei E. Ibor ... convergence of the voice and data networks pose a plethora of threats to ... insight into the unpredictable nature of ..... "Security analysis and countermeasures assessment against spit ... Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC),.

  17. Radial MV networks voltage regulation with distribution management system coordinated controller

    Energy Technology Data Exchange (ETDEWEB)

    Bignucolo, Fabio; Caldon, Roberto [University of Padua, Department of Electrical Engineering, Via Gradenigo, 6/A, 35131 Padova (Italy); Prandoni, Valter [CESI Ricerca, Milan (Italy)

    2008-04-15

    The connection of a great number of distributed generation (DG) plants may cause a critical voltage regulation problem in actual medium voltage (MV) radial distribution networks. After a synthetic survey of different strategies reported in literature to solve this problem, a proposal for an active management of the distribution system which makes use of an innovative controller that coordinates the on load tap changer (OLTC) action with the regulation of reactive exchanges between DG plants and feeders, is presented. In order to test the effectiveness of the proposed regulation, the distribution management system coordinated controller (DMSCC) is applied to a realistic radial structure distribution network and its behaviour simulated in managing the MV system during its worst foreseeable working conditions. (author)

  18. The effect of feeder space allocation on behavior of Hy-Line W-36 hens housed in conventional cages.

    Science.gov (United States)

    Thogerson, C M; Hester, P Y; Mench, J A; Newberry, R C; Pajor, E A; Garner, J P

    2009-08-01

    Insufficient feeder space for laying hens could increase competition at the feed trough, resulting in exclusion of low-ranking hens from the feeder. To test this hypothesis, the effects of feeder space allocation (FSA) on feeding behavior, aggression, feather scores, BW, and mortality were evaluated in a common commercial strain of egg-laying chickens. Beak-trimmed Hy-Line W-36 hens (n = 480) were obtained as pullets at 16.5 wk of age and housed in conventional cages on 4 tiers. Five pullets/cage were housed at a stocking density of 434 cm(2)/pullet and an FSA of 12.2 cm/pullet. After 1.5 wk of acclimation, baseline measurements were taken for 2 wk and then pullets were given either 5.8, 7.1, 8.4, 9.7, 10.9, or 12.2 cm of feeder space/hen (16 cages/treatment). Feeding behavior was evaluated in each cage over a 24-h period each month. For each hen, percentage of time spent feeding and synchrony (mean number of additional hens feeding at the same time) were determined and scores were averaged for each cage. For each cage, feeder switching (number of observations in which hens changed from feeding to not feeding) and feeder sharing (probability that feeder access was equally distributed among all hens) were calculated. At monthly intervals, individual hens were weighed and their feathers scored using a 5-point scale on 8 body regions. Data were analyzed using a repeated measures GLM incorporating cage, tier, FSA, and age of the hen. Hens with reduced feeder space spent less time feeding (P cage-mates from the feeder but instead desynchronized their feeding behavior.

  19. A Survey on Topology Control and Maintenance in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Manish Singh

    2014-04-01

    Full Text Available Wireless Sensor Networks (WSNs consist of devices equipped with radio transceivers that cooperate to form and maintain a fully connected network of sensor nodes. WSNs do not have a fixed infrastructure and do not use centralized methods for organization. This flexibility enables them to be used whenever a fixed infrastructure is unfeasible or inconvenient, hence making them attractive for numerous applications ranging from military, civil, industrial or health. Because of their unique structure, and limited energy storage, computational and memory resources, many of the existing protocols and algorithms designed for wired or wireless ad hoc networks cannot be directly used in WSNs. Beside this, they offer a flexible low cost solution to the problem of event monitoring, especially in places with limited accessibility or that represent danger to humans. Applications of  large scale WSNs are becoming a reality example are being a Smart Grid, Machine to Machine communication networks and smart environment. It is expected that a topology control techniques will play an important role in managing the complexity of such highly complicated and distributed systems through self-organization capabilities. WSNs are made of resource constrained wireless devices, which require energy efficient mechanisms, algorithm/protocol. Control on topology is very important for efficient utilization of networks and is composed of two mechanisms, Topology Construction (TC and Topology Maintenance (TM. By using these mechanism various protocols/algorithm have came into existence, like: A3, A3-Coverage (A3-Cov, Simple Tree, Just Tree, etc. This paper provides a full view of the studies of above mentioned algorithms and also provides an analysis of their merits and demerits.

  20. Social networking experiences on Facebook: A survey of gender differences amongst students

    Directory of Open Access Journals (Sweden)

    Melanie Wiese

    2014-02-01

    Full Text Available Orientation: Students’ membership and participation in social networking sites, such as Facebook, has increased in recent years.Research purpose: The study examined students’ access to social network sites and compared male and female students’ usage of Facebook with regards to time commitment, privacy concerns, and the creation and/or maintenance of relationships.Motivation: The study adds to the existing academic literature on this topic by providing a South African perspective.Research design, approach and method: Two-hundred self-administered questionnaires were distributed using convenience sampling. The statistical analysis that was used included Mann-Whitney U-test, t-test and ANOVA analysis.Main findings: Students connect to social networking sites everyday primarily via their mobile phones. Female students reported spending more time on Facebook whilst at the same time expressing more concern for their privacy. Moreover, students were found to use Facebook to maintain existing offline friendships more so than creating new relationships.Managerial implications: Social networking sites such as Facebook play an important role in students’ everyday interpersonal communication. Practically, Facebook provides lecturers, parents and businesses the opportunity to communicate with students in a fast and cost-effective way. Therefore, insight into the variables studied could help marketers and Social Network Site operators to manage privacy concerns in order to effectively target, advertise and communicate with students.Contribution: Although past research has concentrated on the study of Facebook in terms of privacy and members’ uses little research has been conducted on gender differences in this regard, more so within a South African context. Furthermore demographic variables such as gender influence motives and behaviour, as such making the analysis demographics essential.

  1. Comparing the 2000 and 2005 factors affecting the selling price of feeder cattle sold at Arkansas livestock auctions.

    Science.gov (United States)

    Troxel, T R; Barham, B L

    2007-12-01

    The objectives of the study were to determine how factors affecting the selling price of feeder calves changed from 2000 to 2005 and to examine the perception that discounts narrow or even disappear as calf supplies decrease and selling prices increase. Data from weekly Arkansas livestock auctions were collected from January 1 to December 31 in 2000 and 2005. Data included calf sex, breed type, color, muscle score, horn status, frame score, fill, condition, health, and BW. Mean selling prices for 2000 and 2005 were $92.91 +/- 15.05 and $118.32 +/- 15.13 (mean +/- SD; $/45.45 kg), respectively. Individual price observations were subtracted from the respective annual means and became the dependent variable. The selling prices for feeder calves sold in groups of 2 to 5 calves and in groups of >/= 6 calves were greater in 2005 than 2000 (P x Hereford, Angus, Angus x Charolais, and Brahman (P Brahman Cross, Charolais, Charolais x Limousin, Hereford x Limousin, Limousin, Limousin x one-fourth Brahman, Longhorn, Saler and Simmental. Yellow-white face, black-white face, black, and gray feeder calves received an increase in selling price from 2000 to 2005 (P < 0.001). Although fewer horned feeder calves were sold in 2005 (P < 0.01), they received greater discounts in 2005 than 2000 (-$2.86 +/- 0.16 and -$0.51 +/- 0.09; P < 0.001). In 2005, large-framed feeder calves did not receive the premium detected in 2000, but medium-framed feeder calves in 2005 received a greater selling price compared with 2000. Feeder calves with a muscle score of 1 received a greater premium in 2005 compared with 2000 ($2.58 +/- 0.06 and $0.02 +/- 0.09, respectively; P < 0.001). Feeder calves with a muscle score of 2 were discounted in both years, but the discount in 2005 was not as great as in 2000 (P < 0.001). Full and tanked feeder calves received greater discounts in 2005 than in 2000 (P < 0.001). Discounts for fleshy and fat feeder calves were greater in 2005 than in 2000. Most factors

  2. Detection techniques of selective forwarding attacks in wireless sensor networks: a survey

    CERN Document Server

    Sharma, Preeti; Saluja, Krishan Kumar

    2012-01-01

    The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks. There are number of attacks on wireless sensor networks like black hole attack, sink hole attack, Sybil attack, selective forwarding attacks etc. in this paper we will concentrate on selective forwarding attacks In selective forwarding attacks, malicious nodes behave like normal nodes and selectively drop packets. The selection of dropping nodes may be random. Identifying such attacks is very difficult and sometimes impossible. In this paper we have listed up some detection techniques, which have been proposed by different researcher in recent years, there we also have tabular representation of qualitative analysis of detection techniques

  3. A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks

    CERN Document Server

    Agrawal, Sudhir; Sharma, Sanjeev

    2011-01-01

    Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. The absence of a central management agency or a fixed infrastructure is a key feature of MANETs. These nodes communicate with each other by interchange of packets, which for those nodes not in wireless range goes hop by hop. Due to lack of a defined central authority, securitizing the routing process becomes a challenging task thereby leaving MANETs vulnerable to attacks, which results in deterioration in the performance characteristics as well as raises a serious question mark about the reliability of such networks. In this paper we have attempted to present an overview of the routing protocols, the known routing attacks and the proposed countermeasures to these attacks in various works.

  4. A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks

    Science.gov (United States)

    Li, Changle; Zhang, Hanxiao; Hao, Binbin; Li, Jiandong

    2011-01-01

    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. “Large-scale” means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation, clustering manner

  5. The "Snacking Child" and its social network: some insights from an italian survey

    OpenAIRE

    Gregori Dario; Foltran Francesca; Ghidina Marco; Zobec Federica; Ballali Simonetta; Franchin Laura; Berchialla Paola

    2011-01-01

    Abstract Background The hypothesis underlying this work is that the social network of a child might have an impact on the alimentary behaviors, in particular for what concerns snack consumption patterns. Methods 1215 Italian children 6-10 ys old were interviewed using a CATI facility in January 2010. 608 "snackers" and 607 "no-snackers" were identified. Information regarding family composition, child and relatives BMI, mother perception of child weight, child, father and mother physical activ...

  6. A survey of research and practices of network-on-chip

    DEFF Research Database (Denmark)

    Bjerregaard, Tobias; Mahadevan, Shankar

    2006-01-01

    The scaling of microchip technologies has enabled large scale systems-on-chip (SoC). Network-on-chip (NoC) research addresses global communication in SoC, involving (i) a move from computation-centric to communication-centric design and (ii) the implementation of scalable communication structures...... are discussed. We also evaluate performance analysis techniques. The research shows that NoC constitutes a unification of current trends of intrachip communication rather than an explicit new alternative....

  7. A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiandong Li

    2011-03-01

    Full Text Available With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs based the cooperation among the significant amount of nodes have become a hot topic. “Large-scale” means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation

  8. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    OpenAIRE

    Mukherjee, Amitav; Fakoorian, S. A. A.; Huang, Jing; Swindlehurst, A. Lee

    2010-01-01

    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless commu...

  9. Multi-Objective Optimization for Trustworthy Tactical Networks: A Survey and Insights

    Science.gov (United States)

    2013-06-01

    Hierarchical C2 Structure. Various types of auction -based algorithms have been proposed to solve coalition formation problems in the literature such... algorithm ε-constraints swarm optimization auction theory cooperative game theory game theoretic others # of works 0 2 4 6 8 10 min. workload...based on evolutionary algorithms or game theoretic approaches. However, there has been no generic framework to consider MOO problems in tactical networks

  10. Applications of Wireless Sensor Networks in Marine Environment Monitoring: A Survey

    Directory of Open Access Journals (Sweden)

    Guobao Xu

    2014-09-01

    Full Text Available With the rapid development of society and the economy, an increasing number of human activities have gradually destroyed the marine environment. Marine environment monitoring is a vital problem and has increasingly attracted a great deal of research and development attention. During the past decade, various marine environment monitoring systems have been developed. The traditional marine environment monitoring system using an oceanographic research vessel is expensive and time-consuming and has a low resolution both in time and space. Wireless Sensor Networks (WSNs have recently been considered as potentially promising alternatives for monitoring marine environments since they have a number of advantages such as unmanned operation, easy deployment, real-time monitoring, and relatively low cost. This paper provides a comprehensive review of the state-of-the-art technologies in the field of marine environment monitoring using wireless sensor networks. It first describes application areas, a common architecture of WSN-based oceanographic monitoring systems, a general architecture of an oceanographic sensor node, sensing parameters and sensors, and wireless communication technologies. Then, it presents a detailed review of some related projects, systems, techniques, approaches and algorithms. It also discusses challenges and opportunities in the research, development, and deployment of wireless sensor networks for marine environment monitoring.

  11. The "Snacking Child" and its social network: some insights from an italian survey

    Directory of Open Access Journals (Sweden)

    Gregori Dario

    2011-11-01

    Full Text Available Abstract Background The hypothesis underlying this work is that the social network of a child might have an impact on the alimentary behaviors, in particular for what concerns snack consumption patterns. Methods 1215 Italian children 6-10 ys old were interviewed using a CATI facility in January 2010. 608 "snackers" and 607 "no-snackers" were identified. Information regarding family composition, child and relatives BMI, mother perception of child weight, child, father and mother physical activity, TV watching, social network, leisure time habits and dietary habits of peers, were collected. Association of variables with the status of snacker was investigated using a multivariable logistic regression model. Results Snackers children seem to be part of more numerous social network (1.40 friends vs 1.14, p = 0.042 where the majority of peers are also eating snacks, this percentage being significantly higher (89.5 vs 76.3, p Conclusions The snacking child has more active peer-to-peer social relationships, mostly related with sport activities. However, spending leisure time in sportive activities implies being part of a social environment which is definitely a positive one from the point of view of obesity control, and indeed, no increase of overweight/obesity is seen in relation to snack consumption.

  12. Investigation of Faults, Errors and Failures in Wireless Sensor Network: A Systematical Survey

    Directory of Open Access Journals (Sweden)

    Karthick Raghunath K.M

    2013-09-01

    Full Text Available This article addresses the behavioral characteristics of faults, errors and failures in wireless sensor network. Viable usage of compact limited resource constrained microsensors for advance deployment tends to face more challenges during the execution of various event handling and this action reflects to obtain deviated result from reaching the targeted goals. Achieving the targeted goals beyond the limitations necessitate special investigation of possible arising faults. Although many fault management approaches are addressed, none has focused on faulty issues at the wireless sensor network protocol stack level and also at sensor nodes’ component side. Addressing and exploring various impacts of faults, errors and failures at different layers of wireless sensor network protocol stake and at the level of inter-functional units of sensor node components are concerned to be the main theme of this paper. Moreover, the overall investigation along with three phases (prevention, diagnosis, and recovery of fault management furnishes generic life-cycle of fault tolerance management with potential basic relevant parameters.

  13. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    Science.gov (United States)

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

  14. A Survey on Energy Efficient Wireless Sensor Networks for Bicycle Performance Monitoring Application

    Directory of Open Access Journals (Sweden)

    Sadik Kamel Gharghan

    2014-01-01

    Full Text Available Wireless sensor networks (WSNs have greatly advanced in the past few decades and are now widely used, especially for remote monitoring; the list of potential uses seems endless. Three types of wireless sensor technologies (Bluetooth, ZigBee, and ANT have been used to monitor the biomechanical and physiological activities of bicycles and cyclists, respectively. However, the wireless monitoring of these activities has faced some challenges. The aim of this paper is to highlight various methodologies for monitoring cycling to provide an effective and efficient way to overcome the various challenges and limitations of sports cycling using wireless sensor interfaces. Several design criteria were reviewed and compared with different solutions for the implementation of current WSN research, such as low power consumption, long distance communications, small size, and light weight. Conclusions were drawn after observing the example of an advanced and adaptive network technology (ANT network highlighting reduced power consumption and prolonged battery life. The power saving achieved in the slave node was 88–95% compared to the similar ANT protocol used in the medical rehabilitation.

  15. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  16. Applications of wireless sensor networks in marine environment monitoring: a survey.

    Science.gov (United States)

    Xu, Guobao; Shen, Weiming; Wang, Xianbin

    2014-09-11

    With the rapid development of society and the economy, an increasing number of human activities have gradually destroyed the marine environment. Marine environment monitoring is a vital problem and has increasingly attracted a great deal of research and development attention. During the past decade, various marine environment monitoring systems have been developed. The traditional marine environment monitoring system using an oceanographic research vessel is expensive and time-consuming and has a low resolution both in time and space. Wireless Sensor Networks (WSNs) have recently been considered as potentially promising alternatives for monitoring marine environments since they have a number of advantages such as unmanned operation, easy deployment, real-time monitoring, and relatively low cost. This paper provides a comprehensive review of the state-of-the-art technologies in the field of marine environment monitoring using wireless sensor networks. It first describes application areas, a common architecture of WSN-based oceanographic monitoring systems, a general architecture of an oceanographic sensor node, sensing parameters and sensors, and wireless communication technologies. Then, it presents a detailed review of some related projects, systems, techniques, approaches and algorithms. It also discusses challenges and opportunities in the research, development, and deployment of wireless sensor networks for marine environment monitoring.

  17. Surveying American and Turkish middle school students' existing knowledge of earthquakes by using a systemic network

    Science.gov (United States)

    Oguz, Ayse

    Global environmental events are becoming increasingly important, because most of them enter our daily lives and somehow shape our everyday activities. Earthquakes are one of the most important environmental events affecting our life. Despite extensive media coverage, the public's scientific knowledge of earthquakes is limited. The purpose of this study was to design a questionnaire by using a new approach "Systemic Networks" to investigate students' existing knowledge of earthquakes. Systemic networks categorize features systematically in terms of events and their related actions. In the study, systemic networks were constructed around four possible features of earthquakes: (a) what are earthquakes? (b) how do earthquakes happen? (c) how can earthquakes affect other things such as objects or living things? and (d) what can be done to protect from earthquakes? The questionnaire was administered to 823 students in 5th through 8th grades. Participants included in the sample were chosen from two different locations: Aydin, Turkey, which is in a high-risk Earthquake zone; and Columbus/OH, which is in a low risk Earthquake zone. In addition, the majority of students in the United States have received formal instruction about earthquakes whereas the majority of students in Turkey have not. Comprehensive Exploratory Factor Analysis (CEFA version 1.03 for MS Windows) was used to examine students' patterns of thinking. Ten factors were found based on the students' common pattern of thinking and all ten factors represented separate themes framed around the features of systemic networks. The research showed similarities as well as differences between the responses in two countries. The US students' scientific knowledge about earthquakes was significantly higher than Turkish students and they held fewer naive beliefs than Turkish students about the definition of earthquakes and about how earthquakes happen. Over half of the students in both countries do not know about

  18. A Survey on Evasive Network Attack%隐蔽式网络攻击综述

    Institute of Scientific and Technical Information of China (English)

    曹自刚; 熊刚; 赵咏; 郭莉

    2014-01-01

    近年来,随着信息化的推进,国民经济各行各业对网络的依赖性明显增强,网络信息安全问题成为关系国家和社会安全的突出问题。受经济利益驱动,加上各国之间的博弈在网络空间的体现不断加强,具有高技术性、高隐蔽性和长期持续性的网络攻击成为当前网络安全面临的主要挑战之一。文章对这种隐蔽式网络攻击进行了介绍和描述,分析其主要特点和对当前安全体系的挑战。在此基础上综述了国内外隐蔽式网络攻击检测等方面的最新研究进展。最后,对关键技术问题进行了总结,并展望了本领域未来的研究方向。%In recent years, due to advances in informatization, the national economy has become more dependent on networks. As a result, the network and information security has become a prominent problem for the national security and social stability. Driven by economic interests and the game between countries relfected in the growing cyberspace confrontations, network attacks with high-tech, high concealment and long-term sustainability become one of the major challenges in the network security. In this paper, the certain kind of covert attack was referred as the evasive network attack (ENA). Firstly, the main characteristics of ENA and the challenges it brings in current security systems were analyzed, based on which the latest developments at home and abroad for ENA detection and other related studies were reviewed then. Finally, key technical issues and future research directions in this ifeld were summarized.

  19. Maintenance of human embryonic stem cells in animal serum- and feeder layer-free culture conditions.

    Science.gov (United States)

    Amit, Michal; Itskovitz-Eldor, Joseph

    2006-01-01

    The availability of human embryonic stem cells (hESCs) reflects their outstanding potential for research areas such as human developmental biology, teratology, and cell-based therapies. To allow their continuous growth as undifferentiated cells, isolation and culturing were traditionally conducted on mouse embryonic fibroblast feeder layers, using medium supplemented with fetal bovine serum. However, these conditions allow possible exposure of the cells to animal pathogens. Because both research and future clinical application require an animal-free and well-defined culture system for hESCs, these conventional conditions would prevent the use of hESCs in human therapy. This chapter describes optional culture conditions based on either animal-free or feeder-free culture methods for hESCs.

  20. Demonstration of Market-Based Real-Time Electricity Pricing on a Congested Feeder

    DEFF Research Database (Denmark)

    Larsen, Emil Mahler; Pinson, Pierre; le Ray, Guillaume

    2015-01-01

    Congestion management can delay grid reinforcements needed due to the growth of distributed technologies like photovoltaics and electric vehicles. This paper presents a method of congestion management for low voltage feeders using indirect control from the smart grid demonstration EcoGrid EU, where...... five minute electricity pricing is sent to demand. A method for forecasting demand and generating prices in a market framework is presented, and a novel mechanism to ensure prices are fair to customers who can and cannot participate is developed. The proposed market is currently being used to send...... prices to 1900 houses, with a virtual feeder of 28 houses receiving congestion pricing. Simulations are used to calculate the cost from using this congestion management method, while demonstration results indicate that congestion can be managed successfully....

  1. Effects of Home Energy Management Systems on Distribution Utilities and Feeders Under Various Market Structures: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Ruth, Mark; Pratt, Annabelle; Lunacek, Monte; Mittal, Saurabh; Wu, Hongyu; Jones, Wesley

    2015-07-17

    The combination of distributed energy resources (DER) and retail tariff structures to provide benefits to both utility consumers and the utilities is poorly understood. To improve understanding, an Integrated Energy System Model (IESM) is being developed to simulate the physical and economic aspects of DER technologies, the buildings where they reside, and feeders servicing them. The IESM was used to simulate 20 houses with home energy management systems on a single feeder under a time of use tariff to estimate economic and physical impacts on both the households and the distribution utilities. HEMS reduce consumers’ electric bills by precooling houses in the hours before peak electricity pricing. Household savings are greater than the reduction utility net revenue indicating that HEMS can provide a societal benefit providing tariffs are structured so that utilities remain solvent. Utilization of HEMS reduce peak loads during high price hours but shifts it to hours with off-peak and shoulder prices and resulting in a higher peak load.

  2. Underwater wireless optical communication using a blue-light leaky feeder

    Science.gov (United States)

    Xu, Jing; Sun, Bin; Kong, Meiwei; Lin, Aobo; Sarwar, Rohail; Han, Jun; Zhang, Wei; Deng, Ning

    2017-08-01

    A novel concept of using a leaky plastic optical fiber (POF) as the leaky feeder for underwater wireless optical communication (UWOC) is proposed and experimentally demonstrated. The leaky POF can potentially improve the UWOC coverage. Orthogonal frequency division multiplexing (OFDM) is employed in the demonstration to increase spectral efficiency and robustness to modal dispersion of the leaky POF with a large core. A bit rate of 224.61 Mb/s (net bit rate: 183.69 Mb/s) at the two discrete radiation points along a 10-m leaky POF feeder is achieved using 16-quadrature amplitude modulation (QAM)-OFDM modulation. Over a 30-cm underwater channel, the mean bit errors (BERs) measured at the two points are 3.37×10-5 and 3.35×10-3, respectively, which are below the FEC threshold of 3.8×10-3.

  3. SNL fibroblast feeder layers support derivation and maintenance of human induced pluripotent stem cells.

    Science.gov (United States)

    Pan, Chuanying; Hicks, Amy; Guan, Xuan; Chen, Hong; Bishop, Colin E

    2010-04-01

    Induced pluripotent stem (iPS) cells can be derived from human somatic cells by cellular reprogramming. This technology provides a potential source of non-controversial therapeutic cells for tissue repair, drug discovery, and opportunities for studying the molecular basis of human disease. Normally, mouse embryonic fibroblasts (MEFs) are used as feeder layers in the initial derivation of iPS lines. The purpose of this study was to determine whether SNL fibroblasts can be used to support the growth of human iPS cells reprogrammed from somatic cells using lentiviral expressed reprogramming factors. In our study, iPS cells expressed common pluripotency markers, displayed human embryonic stem cells (hESCs) morphology and unmethylated promoters of NANOG and OCT4. These data demonstrate that SNL feeder cells can support the derivation and maintenance of human iPS cells.

  4. Generation of embryoid bodies from mouse embryonic stem cells cultured on STO feeder cells.

    Science.gov (United States)

    Zhou, Qing-Jun; Shao, Jian-Zhong; Xiang, Li-Xin; Hu, Ruo-Zhen; Lu, Yong-Liang; Yao, Hang; Dai, Li-Cheng

    2005-09-01

    Embryoid bodies, which are similar to post-implantation egg-cylinder stage embryos, provide a model for the study of embryo development and stem cell differentiation. We describe here a novel method for generating embryoid bodies from murine embryonic stem (ES) cells cultured on the STO feeder layer. The ES cells grew into compact aggregates in the first 3 days of coculture, then became simple embryoid bodies (EBs) possessing primitive endoderm on the outer layer. They finally turned into cystic embryoid bodies after being transferred to Petri dishes for 1-3 days. Evaluation of the EBs in terms of morphology and differentiating potential indicates that they were typical in structure and could generate cells derived from the three germ layers. The results show that embryoid bodies can form not only in suspension culture but also directly from ES cells cultured on the STO feeder layer.

  5. Trophic interactions between rhizosphere bacteria and bacterial feeders influenced by phosphate and aphids in barley

    DEFF Research Database (Denmark)

    Strandmark, Lisa Bjørnlund; Mørk, Søren; Madsen, Mette Vestergård;

    2006-01-01

    The aim was to study the effects of P fertilization and leaf aphid attack on the trophic interactions of bacteria and bacterial feeders in the rhizospheres of barley plants. The density of protozoa peaked in the rhizospheres of plants fertilized with N and P, whereas nematodes peaked in the rhizo......The aim was to study the effects of P fertilization and leaf aphid attack on the trophic interactions of bacteria and bacterial feeders in the rhizospheres of barley plants. The density of protozoa peaked in the rhizospheres of plants fertilized with N and P, whereas nematodes peaked...... in the rhizospheres of plants to which only N had been added. Fingerprinting of bacterial communities by length heterogeneity polymerase chain reaction revealed differences in community structure between NP rhizospheres and N rhizospheres as well as aphid-related differences within N rhizospheres. Specifically, a...

  6. Effect of Feeder Configuration on the Microstructure of Ductile Cast Iron

    DEFF Research Database (Denmark)

    Vedel-Smith, Nikolaj Kjelgaard; Tiedje, Niels Skat

    2014-01-01

    iron castings. The goal is to enable metallurgists and foundry engineers to more directly target mushy zone development to prolong the possibility to feed through this section. Keeping smaller section open for an extended period will make it possible to use fewer or smaller feeders, with reduced energy......Feeding and microstructure of a test casting rigged with different feeder combinations was studied. Castings were examined and classified by soundness and microstructure. Subsequently the casting macro- and microstructure was analyzed to study how differences in solidification and segregation...... influence the soundness of different sections of the castings. Moreover, the microstructural changes due to variations in thermal gradients are classified, and the variations in the mushy zone described. The paper discusses how solidification and segregation influence porosity and microstructure of ductile...

  7. The effects of automated scatter feeders on captive grizzly bear activity budgets.

    Science.gov (United States)

    Andrews, Nathan L P; Ha, James C

    2014-01-01

    Although captive bears are popular zoo attractions, they are known to exhibit high levels of repetitive behaviors (RBs). These behaviors have also made them particularly popular subjects for welfare research. To date, most research on ursid welfare has focused on various feeding methods that seek to increase time spent searching for, extracting, or consuming food. Prior research indicates an average of a 50% reduction in RBs when attempts are successful and, roughly, a 50% success rate across studies. This research focused on decreasing time spent in an RB while increasing the time spent active by increasing time spent searching for, extracting, and consuming food. The utility of timed, automated scatter feeders was examined for use with captive grizzly bears (Ursis arctos horribilis). Findings include a significant decrease in time spent in RB and a significant increase in time spent active while the feeders were in use. Further, the bears exhibited a wider range of behaviors and a greater use of their enclosure.

  8. Very high precision survey equipment for great distances Surface surveys used to map out the surface network and the tunnelling machines then gyroscopically steered underground.

    CERN Multimedia

    1983-01-01

    At the beginning of the 1980s, CERN embarked on the enormous Large Electron-Positron Collider construction project. The excavation of the 27-kilometre LEP tunnel was a huge technical challenge. The tunnel-boring machines excavated the tunnel in 3.3 km octants and had to be operated with extraordinary precision to ensure that they reached their destination - the bottom of the next vertical shaft - precisely on target. The tunnel was excavated before high-performance instruments were developed for the construction of the Channel Tunnel. As no firms were willing to perform the surveying work, CERN's own surveyors, with experience from the SPS behind them, took up the challenge. At the surface, the surveyors established the world's most accurate geodetic network, performing measurements to an accuracy of 10-7, or 1mm per 10 km, using the Terrameter (see photo). The excavation of the tunnel was completed in 1988 and the finished tunnel's trajectory was found to diverge from the theoretical value specified by the p...

  9. A Branch-and-Price Approach to the Feeder Network Design Problem

    DEFF Research Database (Denmark)

    Santini, Alberto; Plum, Christian Edinger Munk; Røpke, Stefan

    2017-01-01

    transit times. Realistic instances are generated from the LinerLib benchmark suite. The problem is solved with a branch-and-price algorithm, which can solve most instances to optimality within one hour. The results also provide insights on the cost structure and desirable features of optimal routes....... These insights were obtained by means of an analysis where scenarios are generated varying internal and external conditions, such as fuel costs and port demands....

  10. Systematic survey reveals general applicability of "guilt-by-association" within gene coexpression networks

    Directory of Open Access Journals (Sweden)

    Kohane Isaac S

    2005-09-01

    Full Text Available Abstract Background Biological processes are carried out by coordinated modules of interacting molecules. As clustering methods demonstrate that genes with similar expression display increased likelihood of being associated with a common functional module, networks of coexpressed genes provide one framework for assigning gene function. This has informed the guilt-by-association (GBA heuristic, widely invoked in functional genomics. Yet although the idea of GBA is accepted, the breadth of GBA applicability is uncertain. Results We developed methods to systematically explore the breadth of GBA across a large and varied corpus of expression data to answer the following question: To what extent is the GBA heuristic broadly applicable to the transcriptome and conversely how broadly is GBA captured by a priori knowledge represented in the Gene Ontology (GO? Our study provides an investigation of the functional organization of five coexpression networks using data from three mammalian organisms. Our method calculates a probabilistic score between each gene and each Gene Ontology category that reflects coexpression enrichment of a GO module. For each GO category we use Receiver Operating Curves to assess whether these probabilistic scores reflect GBA. This methodology applied to five different coexpression networks demonstrates that the signature of guilt-by-association is ubiquitous and reproducible and that the GBA heuristic is broadly applicable across the population of nine hundred Gene Ontology categories. We also demonstrate the existence of highly reproducible patterns of coexpression between some pairs of GO categories. Conclusion We conclude that GBA has universal value and that transcriptional control may be more modular than previously realized. Our analyses also suggest that methodologies combining coexpression measurements across multiple genes in a biologically-defined module can aid in characterizing gene function or in characterizing

  11. Encapsulated feeder cells within alginate beads for ex vivo expansion of cord blood-derived CD34(+) cells

    National Research Council Canada - National Science Library

    Pan, Xiuwei; Sun, Qiong; Cai, Haibo; Gao, Yun; Tan, Wensong; Zhang, Weian

    2016-01-01

    A co-culture system based on encapsulated feeder cells within alginate beads was developed through optimizing the detailed aspects of the cell culture system to expand CD34-positive (CD34(+)) cells ex vivo...

  12. Thermal analysis of the cryostat feed through for the ITER Tokamak TF feeder

    Science.gov (United States)

    Shanwen, ZHANG; Yuntao, SONG; Kun, LU; Zhongwei, WANG; Jianfeng, ZHANG; Yongfa, QIN

    2017-04-01

    In Tokamaks, the toroidal field (TF) coil feeder is an important component that is used to supply the cryogens and electrical power for the TF coils. As a part of the TF feeder, the cryostat-feed through (CFT) is subject to low temperatures of 9 and 80 K inside and room temperature of 300 K outside. Based on the features of the International Thermonuclear Experimental Reactor TF feeder, the thermal performance of the CFT under the nominal conditions is studied. Taking into account the conductive, convective and radiation heat transfer, the finite element model of the CFT is built. Transient thermal analysis is performed to determine the temperatures of the CFT on the 9th day of cooldown. The model is assessed by comparing the cooling curves of the CFT after 9 days. If the simulation and experimental results are the same, the finite element model can be considered as calibrated. The model predicts that the cooling time will be approximately 26 days and the temperature distribution and heat load of the main components are obtained when the CFT reaches thermal equilibrium. This study provides a valid quantitative characterization of the CFT design.

  13. Urbanization affects neophilia and risk-taking at bird-feeders

    Science.gov (United States)

    Tryjanowski, Piotr; Møller, Anders Pape; Morelli, Federico; Biaduń, Waldemar; Brauze, Tomasz; Ciach, Michał; Czechowski, Paweł; Czyż, Stanisław; Dulisz, Beata; Goławski, Artur; Hetmański, Tomasz; Indykiewicz, Piotr; Mitrus, Cezary; Myczko, Łukasz; Nowakowski, Jacek J.; Polakowski, Michał; Takacs, Viktoria; Wysocki, Dariusz; Zduniak, Piotr

    2016-06-01

    Urban environments cover vast areas with a high density of humans and their dogs and cats causing problems for exploitation of new resources by wild animals. Such resources facilitate colonization by individuals with a high level of neophilia predicting that urban animals should show more neophilia than rural conspecifics. We provided bird-feeders across urban environments in 14 Polish cities and matched nearby rural habitats, testing whether the presence of a novel item (a brightly coloured green object made out of gum with a tuft of hair) differentially delayed arrival at feeders in rural compared to urban habitats. The presence of a novel object reduced the number of great tits Parus major, but also the total number of all species of birds although differentially so in urban compared to rural areas. That was the case independent of the potentially confounding effects of temperature, population density of birds, and the abundance of cats, dogs and pedestrians. The number of great tits and the total number of birds attending feeders increased in urban compared to rural areas independent of local population density of birds. This implies that urban birds have high levels of neophilia allowing them to readily exploit unpredictable resources in urban environments.

  14. Corrosion of carbon steel feeders during dilute chemical decontamination of primary heat transport system of PHWRs

    Energy Technology Data Exchange (ETDEWEB)

    Subramanian, H.; Madasamy, P.; Sathyaseelan, V.S.; Krishnamohan, T.V.; Velmurugan, S.; Narasimhan, S.V. [Water and Steam Chemistry Division, BARC Facilities, Kalpakkam, Tamilnadu (India)

    2012-01-15

    Carbon steel feeders in the primary heat transport system of pressurized heavy water reactors (PHWRs) show significant wall thinning due to flow accelerated corrosion (FAC). This is of great concern, as the wear rate in certain locations exceeds the corrosion allowance by design. This necessitates periodic measurement of wall thickness and in some cases even mid course enmasse replacement of feeders. While analyzing the data on wall thicknesses and in arriving at the wall thinning rate during operation of the reactor, sufficient care has to be taken to account for the wall thinning occurring during full system chemical decontamination campaign which is carried out occasionally to reduce dose rates during reactor shut down. Chemical decontamination of primary heat transport system is carried out using a mixture of organic acids at a total concentration of about 0.1 g/L and at 85 C. The results of experiments carried out under simulated conditions for estimating the wall thinning occurring in carbon steel feeder elbow during dilute chemical decontamination are described in this work. The corrosion rates are quantified. (Copyright copyright 2012 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  15. Manufacture and test of prototype water pipe chase barrier in ITER Magnet Feeder system

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Kun, E-mail: lukun@ipp.ac.cn [Institute of Plasma Physics, Shushan Hu Road 350, Hefei, Anhui (China); Wen, Xinjie; Liu, Chen; Song, Yuntao [Institute of Plasma Physics, Shushan Hu Road 350, Hefei, Anhui (China); Niu, Erwu [ITER China, 15B Fuxing Road, Beijing 100862 (China); Gung, Chenyu; Su, Man [ITER Organization, Route de Vinon-sur-Verdon – CS 90046, 13067 St Paul-lez-Durance Cedex (France)

    2016-11-01

    The Magnet Feeder system in the International Thermonuclear Experimental Reactor (ITER) deploys electrical currents and supercritical helium to the superconducting magnets and the magnet diagnostic signals to the operators. In the current design, the feeders located in the upper L3 level of the Tokamak gallery penetrate the Tokamak coolant water system vault, the biological shield and the cryostat. As a secondary confinement to contain the activated coolant water in the vault in the case of water pipe burst accident, a water barrier is welded between the penetration in the water pipe chase outer wall and the mid-plane of the vacuum jacket of the Feeder Coil Terminal Box (CTB). A thin-wall stainless steel diaphragm with an omega shape profile is welded around the CTB as the water barrier to endure 2 bar hydraulic pressure. In addition, the barrier is designed as a flexible compensator to withstand a maximum of 15 mm of axial displacement of the CTB in case of helium leak accident without failure. This paper presents the detail configuration, the manufacturing and assembly processes of the water barrier. Test results of the prototype water barrier under simulated accident conditions are also reported. Successful qualification of the design and manufacturing process of the water barrier lays a good foundation for the series production of this subsystem.

  16. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs. PMID:22399893

  17. A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments.

    Science.gov (United States)

    Ghamari, Mohammad; Janko, Balazs; Sherratt, R Simon; Harwin, William; Piechockic, Robert; Soltanpur, Cinna

    2016-06-07

    Current progress in wearable and implanted health monitoring technologies has strong potential to alter the future of healthcare services by enabling ubiquitous monitoring of patients. A typical health monitoring system consists of a network of wearable or implanted sensors that constantly monitor physiological parameters. Collected data are relayed using existing wireless communication protocols to a base station for additional processing. This article provides researchers with information to compare the existing low-power communication technologies that can potentially support the rapid development and deployment of WBAN systems, and mainly focuses on remote monitoring of elderly or chronically ill patients in residential environments.

  18. A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments

    Directory of Open Access Journals (Sweden)

    Mohammad Ghamari

    2016-06-01

    Full Text Available Current progress in wearable and implanted health monitoring technologies has strong potential to alter the future of healthcare services by enabling ubiquitous monitoring of patients. A typical health monitoring system consists of a network of wearable or implanted sensors that constantly monitor physiological parameters. Collected data are relayed using existing wireless communication protocols to a base station for additional processing. This article provides researchers with information to compare the existing low-power communication technologies that can potentially support the rapid development and deployment of WBAN systems, and mainly focuses on remote monitoring of elderly or chronically ill patients in residential environments.

  19. A Survey of Downlink Non-Orthogonal Multiple Access for 5G Wireless Communication Networks

    Institute of Scientific and Technical Information of China (English)

    WEI Zhiqiang; YUAN Jinhong; Derrick Wing Kwan Ng; Maged Elkashlan; DING Zhiguo

    2016-01-01

    Non⁃orthogonal multiple access (NOMA) has been recognized as a promising multiple access technique for the next generation cel⁃lular communication networks. In this paper, we first discuss a simple NOMA model with two users served by a single⁃carrier si⁃multaneously to illustrate its basic principles. Then, a more general model with multicarrier serving an arbitrary number of users on each subcarrier is also discussed. An overview of existing works on performance analysis, resource allocation, and multiple⁃in⁃put multiple⁃output NOMA are summarized and discussed. Furthermore, we discuss the key features of NOMA and its potential re⁃search challenges.

  20. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Rabindra Bista

    2010-05-01

    Full Text Available Many wireless sensor network (WSN applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  1. Survey of wireless sensor network applications from a power utility’s distribution perspective

    CSIR Research Space (South Africa)

    Isaac, SJ

    2011-09-01

    Full Text Available University of Pretoria Pretoria, South Africa g.hancke@ieee.org Hinesh Madhoo & Amal Khatri Research and Development Centre ESKOM Johannesburg, South Africa {hinesh.madhoo, amal.khatri}@eskom.co.za Abstract?The task of monitoring and controlling... to different WSN components: ? Plug-and-play of smart transducers: IEEE 1451 [5]. ? Clock synchronisation in measurement and control systems: IEEE 1588 [6]. ? Network architecture: ISO/IEC 29182; ISO/IEC NP 20005; and ISO/IEC NP 30101 [7]. ? Smartgrid...

  2. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN—A Survey

    Directory of Open Access Journals (Sweden)

    Vignesh Raja Karuppiah Ramachandran

    2016-11-01

    Full Text Available With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS, the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN and Wireless Sensor Network (WSN. To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of Wu

  3. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)-A Survey.

    Science.gov (United States)

    Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D; Meratnia, Nirvana; Havinga, Paul J M

    2016-11-29

    With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify

  4. A New Application of Photogrammetry in the Underground Pipe Network Survey

    Directory of Open Access Journals (Sweden)

    Y. Li

    2016-06-01

    Full Text Available This paper mainly introduces a device that can be used for underground pipeline survey task. Through the cameras installed on the device, we can obtain stereo synchronous shooting images, and then use the method of close range photogrammetry to investigate and measure underground objects. During working process, the staff put the camera into the well and to control camera shooting from the ground. Greatly improve work efficiency, at the same time to avoid the underground toxis gas damage to people. The main content of this paper includes three parts: hardware design, software development and test production.

  5. A New Application of Photogrammetry in the Underground Pipe Network Survey

    Science.gov (United States)

    Li, Y.; Feng, Q.; Zhang, N.; Tian, H.; Yang, Y.; Jin, J.; Li, Y.; Zhang, L.

    2016-06-01

    This paper mainly introduces a device that can be used for underground pipeline survey task. Through the cameras installed on the device, we can obtain stereo synchronous shooting images, and then use the method of close range photogrammetry to investigate and measure underground objects. During working process, the staff put the camera into the well and to control camera shooting from the ground. Greatly improve work efficiency, at the same time to avoid the underground toxis gas damage to people. The main content of this paper includes three parts: hardware design, software development and test production.

  6. A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network

    CERN Document Server

    Bhattasali, Tapalina

    2012-01-01

    Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly devastating attack is the sleep deprivation attack, where a malicious node forces legitimate nodes to waste their energy by resisting the sensor nodes from going into low power sleep mode. The goal of this attack is to maximize the power consumption of the target node, thereby decreasing its battery life. Existing works on sleep deprivation attack have mainly focused on mitigation using MAC based protocols, such as S-MAC, T-MAC, B-MAC, etc. In this article, a brief review of some of the recent intrusion detection systems in wireless sensor network environment is presented. Finally, we propose a framework of cluster based layered countermeasure that can efficiently mitig...

  7. A Survey on Underwater Wireless Sensor Networks: Progresses, Applications, and Challenges

    Directory of Open Access Journals (Sweden)

    Premalatha J.

    2016-01-01

    Full Text Available The endangered underwater species always drew the attention of the scientific society since their disappearance would cause irreplaceable loss. Asia is home to some of the most diverse habitats in the earth, but it is estimated that more than one in four species are endangered. In Underwater, a lot of factors are putting marine life under immense pressure. Extreme population pressure is leading to pollution, over-fishing and the devastation of crucial habitats. Consequently, the numbers of almost all fish are declining and many are already endangered. To help these species to survive, their habitat should be strictly protected. This can be achieved by strictly monitoring them. During this course, several parameters, constraints about the species and its environments are focused. Now, advances in sensor technology facilitate the monitoring of species and their habitat with less expenditure. Indeed, the increasing sophistication of underwater wireless sensors offers chances that enable new challenges in a lot of areas, like surveillance one. This paper endorses the use of sensors for monitoring underwater species endangered in their habitat. This paper further examines the key approaches and challenges in the design and implementation of underwater wireless sensor networks. We summarize major applications and the main phenomena related to acoustic propagation, and discuss how they affect the design and operation of communication systems and networking protocols at various layers.

  8. A survey paper on Ant Colony Optimization Routing algorithm for selecting Multiple Feasible Paths for Packet Switched Networks

    Directory of Open Access Journals (Sweden)

    Meenakshi R Patel

    2012-03-01

    Full Text Available ACO algorithms for datagram networks was given by Di Caro Dorigo, in year 1996. Basic mechanisms in typical ACO routing algorithms is Ant-like agents are proactively generated at the nodes to find/check paths toward assigned destinations Ants move hop-by-hop according to a exploratory routing policy based on the local routing .After reaching their destination, ants retrace their path and update nodes routing information according to the quality of the path. Routing information is statistical estimates of the time-to-go to the destination maintained in pheromone arrays. Data are probabilistically spread over the paths according to their estimated quality as stored in the pheromone variables. AntNet algorithms may cause the network congestion and stagnation as the routing table converges. In this paper we perform a survey on modified AntNet routing algorithm using Multiple Ant-Colony Optimization. Multiple ant colonies with different pheromone updating mechanism have different searching traits. By leveraging this feature, much of work is done by designing a set of adaptive rules to facilitate the collaboration between these colonies. This approach can balance the diversity and convergence of solutions generated by different ant colonies and also overcome the problem of Stagnation.

  9. The Frequency of Alcohol Use in Iranian Urban Population: The Results of a National Network Scale Up Survey

    Directory of Open Access Journals (Sweden)

    Ali Nikfarjam

    2017-02-01

    Full Text Available Background In Islamic countries alcohol consumption is considered as against religious values. Therefore, estimation of frequency of alcohol consumptions using direct methods is prone to different biases. In this study, we indirectly estimated the frequency of alcohol use in Iran, in network of a representative sample using network scale up (NSU method. Methods In a national survey, about 400 participants aged above 18 at each province, around 12 000 in total, were recruited. In a gender-match face to face interview, respondents were asked about the number of those who used alcohol (even one episode in previous year in their active social network, classified by age and gender. The results were corrected for the level of visibility of alcohol consumption. Results The relative frequency of alcohol use at least once in previous year, among general population aged above 15, was estimated at 2.31% (95% CI: 2.12%, 2.53%. The relative frequency among males was about 8 times higher than females (4.13% versus 0.56%. The relative frequency among those aged 18 to 30 was 3 times higher than those aged above 30 (3.97% versus 1.36%. The relative frequency among male aged 18 to 30 was about 7%. Conclusion It seems that the NSU is a feasible method to monitor the relative frequency of alcohol use in Iran, and possibly in countries with similar culture. Alcohol use was lower than non-Muslim countries, however, its relative frequency, in particular in young males, was noticeable.

  10. Replacement of murine fibroblasts by human fibroblasts irradiated in obtaining feeder layer for the culture of human keratinocytes

    Energy Technology Data Exchange (ETDEWEB)

    Yoshito, Daniele; Sufi, Bianca S.; Santin, Stefany P.; Mathor, Monica B. [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil); Altran, Silvana C.; Isaac, Cesar [Universidade Sao Paulo (USP), Sao Paulo, SP (Brazil). Fac. de Medicina. Lab. de Microcirurgia Plastica; Esteves-Pedro, Natalia M. [Universidade Sao Paulo (USP), Sao Paulo, SP (Brazil). Fac. de Ciencias Farmaceuticas. Lab. de Controle Biologico; Herson, Marisa R. [DonorTissue Bank of Victoria (Australia)

    2011-07-01

    Human autologous epithelia cultivated in vitro, have been used successfully in treating damage to skin integrity. The methodology allowed the cultivation of these epithelia was described by Rheinwald and Green in 1975, this methodology consisted in seeding keratinocytes onto a feeder layer composed of lineage 3T3 murine fibroblasts, the proliferation rate is controlled through the action of ionizing radiation. However, currently there is a growing concern about the possibility of transmitting prions and murine viruses to transplanted patients. Taking into account this concern, in this present work, we replaced the feeder layer originally composed of murine fibroblasts by human fibroblasts. To obtain this new feeder layer was necessary to standardize the enough irradiation dose to inhibit the replication of human fibroblasts and the verification of effectiveness of the development of keratinocytes culture on a feeder layer thus obtained. According to the obtained results we can verify that the human fibroblasts irradiated at various tested doses (60, 70, 100, 200, 250 and 300 Gy) had their mitotic activity inactivated by irradiation, allowing the use of any of these doses to confection of the feeder layer, since these fibroblasts irradiated still showed viable until fourteen days of cultivation. In the test of colony formation efficiency was observed that keratinocytes seeded on irradiated human fibroblasts were able to develop satisfactorily, preserving their clonogenic potential. Therefore it was possible the replacement of murine fibroblasts by human fibroblasts in confection of the feeder layer, in order to eliminate this xenobiotic component of the keratinocytes culture. (author)

  11. Contribution of Sp1 to Telomerase Expression and Activity in Skin Keratinocytes Cultured With a Feeder Layer.

    Science.gov (United States)

    Bisson, Francis; Paquet, Claudie; Bourget, Jean-Michel; Zaniolo, Karine; Rochette, Patrick J; Landreville, Solange; Damour, Odile; Boudreau, François; Auger, François A; Guérin, Sylvain L; Germain, Lucie

    2015-02-01

    The growth of primary keratinocytes is improved by culturing them with a feeder layer. The aim of this study was to assess whether the feeder layer increases the lifespan of cultured epithelial cells by maintaining or improving telomerase activity and expression. The addition of an irradiated fibroblast feeder layer of either human or mouse origin (i3T3) helped maintain telomerase activity as well as expression of the transcription factor Sp1 in cultured keratinocytes. In contrast, senescence occurred earlier, together with a reduction of Sp1 expression and telomerase activity, in keratinocytes cultured without a feeder layer. Telomerase activity was consistently higher in keratinocytes grown on the three different feeder layers tested relative to cells grown without them. Suppression of Sp1 expression by RNA inhibition (RNAi) reduced both telomerase expression and activity in keratinocytes and also abolished their long-term growth capacity suggesting that Sp1 is a key regulator of both telomerase gene expression and cell cycle progression of primary cultured human skin keratinocytes. The results of the present study therefore suggest that the beneficial influence of the feeder layer relies on its ability to preserve telomerase activity in cultured human keratinocytes through the maintenance of stable levels of Sp1 expression. © 2014 Wiley Periodicals, Inc.

  12. A Comparative Survey Based on Processing Network Traffic Data Using Hadoop Pig and Typical Mapreduce

    Directory of Open Access Journals (Sweden)

    Anjali P P

    2014-02-01

    Full Text Available Big data analysis has now become an integral part of many computational and statistical departments. Analysis of peta-byte scale of data is having an enhanced importance in the present day scenario. Big data manipulation is now considered as a key area of research in the field of data analytics and novel techniques are being evolved day by day. Thousands of transaction requests are being processed in every minute by different websites related to e-commerce, shopping carts and online banking. Here comes the need of network traffic and weblog analysis for which Hadoop comes as a suggested solution. It can efficiently process the Netflow data collected from routers, switches or even from website access logs at fixed intervals.

  13. Bankruptcy prediction for credit risk using neural networks: a survey and new results.

    Science.gov (United States)

    Atiya, A F

    2001-01-01

    The prediction of corporate bankruptcies is an important and widely studied topic since it can have significant impact on bank lending decisions and profitability. This work presents two contributions. First we review the topic of bankruptcy prediction, with emphasis on neural-network (NN) models. Second, we develop an NN bankruptcy prediction model. Inspired by one of the traditional credit risk models developed by Merton (1974), we propose novel indicators for the NN system. We show that the use of these indicators in addition to traditional financial ratio indicators provides a significant improvement in the (out-of-sample) prediction accuracy (from 81.46% to 85.5% for a three-year-ahead forecast).

  14. Survey of main challenges (security and privacy in wireless body area networks for healthcare applications

    Directory of Open Access Journals (Sweden)

    Samaher Al-Janabi

    2017-07-01

    Full Text Available Wireless Body Area Network (WBAN is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN. Finally, open areas for future research and enhancements are explored.

  15. A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile Adhoc Network

    Directory of Open Access Journals (Sweden)

    Lochana Gaulkar,

    2015-03-01

    Full Text Available Location privacy in Location Based Services (LBS is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users.

  16. Emerging Radio and Manet Technology Study: Research Support for a Survey of State-of-the-art Commercial and Military Hardware/Software for Mobile Ad Hoc Networks

    Science.gov (United States)

    2014-10-01

    Emerging Radio and MANET Technology Study Research Support for a Survey of State-of-the-art Commercial and Military Hardware/Software...control (SA+C2) device that could be used by tactical units. This device would connect individual unit members through a mobile ad-hoc network ( MANET ...

  17. Social Networks, the ‘Work’ and Work Force of Chronic Illness Self-Management: A Survey Analysis of Personal Communities

    Science.gov (United States)

    Vassilev, Ivaylo; Rogers, Anne; Blickem, Christian; Brooks, Helen; Kapadia, Dharmi; Kennedy, Anne; Sanders, Caroline; Kirk, Sue; Reeves, David

    2013-01-01

    Self-management support forms a central aspect of chronic Illness management nationally and globally. Evidence for the success of self-management support has mainly focussed on individually-centred outcomes of behavioural change. While it is recognised that social network members play an important role there is currently a gap in knowledge regarding who provides what type of support and under what circumstances. This is relevant for understanding the division of labour and the meeting of needs for those living with a long-term condition. We therefore took a network approach to explore self-management support conceptualising it as types of illness ‘work’ undertaken within peoples’ social networks. 300 people from deprived areas and with chronic illnesses took part in a survey conducted in 2010 in the North West of England. A concentric circles diagram was used as a research tool with which participants identified 2,544 network members who contributed to illness management. The results provide an articulation of how social network members are substantially involved in illness management. Whilst partners and close family make the highest contributions there is evidence of inputs from a wide range of relationships. Network member characteristics (type of relationship, proximity, frequency of contact) impact on the amount of illness work undertaken in peoples’ networks. In networks with ‘no partner’ other people tend to contribute more in the way of illness related work than in networks with a partner. This indicates a degree of substitutability between differently constituted networks, and that the level and type of input by different members of a network might change according to circumstances. A network perspective offers an opportunity to redress the balance of an exclusively individual focus on self-management because it addresses the broader set of contributions and resources available to people in need of chronic illness management and support. PMID

  18. Network global navigation satellite system survey to harmonize water-surface elevation data for the Rainy River Basin

    Science.gov (United States)

    Ziegeweid, Jeffrey R.; Silliker, R. Jason; Densmore, Brenda K.; Krahulik, Justin

    2016-08-15

    Continuously recording water-level streamgages in Rainy Lake and Namakan Reservoir are used to regulate water levels according to rule curves established in 2000 by the International Joint Commission; however, water levels at streamgages were referenced to a variety of vertical datums, confounding efforts to model the flow of water through the system, regulate water levels during periods of high inflow, and evaluate the effectiveness of the rule curves. In October 2014, the U.S. Geological Survey, Natural Resources Canada, International Joint Commission, and National Park Service began a joint field study with the goal of obtaining precise elevations referenced to a uniform vertical datum for all reference marks used to set water levels at streamgages throughout Rainy Lake and Namakan Reservoir. This report was prepared by the U.S. Geological Survey in cooperation with Natural Resources Canada, International Joint Commission, and National Park Service.Three field crews deployed Global Navigation Satellite System receivers statically over 16 reference marks colocated with active and discontinued water-level streamgages throughout Rainy River, Rainy Lake, Namakan Reservoir, and select tributaries of Rainy Lake and Namakan Reservoir. A Global Navigation Satellite System receiver also was deployed statically over a National Geodetic Survey cooperative base network control station for use as a quality-control reference mark. Satellite data were collected simultaneously during a 5-day period and processed independently by the U.S. Geological Survey and Natural Resources Canada to obtain accurate positioning and elevations for the 17 surveyed reference marks. Processed satellite data were used to convert published water levels to elevations above sea level referenced to the Canadian Geodetic Vertical Datum of 2013 in order to compare water-surface elevations referenced to a uniform vertical datum throughout the study area. In this report, an “offset” refers to the

  19. High Accuracy Reference Network (HARN), Closed survey control network (between Order C class 1 and B depending on length of baseline) of 98 monumented points in Scott County - adjustment performed in NAD 1983/1996 HARN (conus), Published in 2005, Scott County.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This High Accuracy Reference Network (HARN) dataset, was produced all or in part from Field Survey/GPS information as of 2005. It is described as 'Closed survey...

  20. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  1. A retrospective survey of childhood glaucoma prevalence according to Childhood Glaucoma Research Network classification

    Directory of Open Access Journals (Sweden)

    Ambika Hoguet

    2016-01-01

    Full Text Available Purpose: To evaluate the Childhood Glaucoma Research Network (CGRN classification system and describe the prevalence of each subtype according to this classification. Materials and Methods: Retrospectively, the medical records of 205 consecutive childhood glaucoma and glaucoma suspect patients at an urban tertiary care center were reviewed. The initial diagnosis and new diagnosis according to CGRN classification were recorded. Results: All patients fit one of the seven categories of the new classification. Seventy-one percent of diagnoses were changed upon reclassification. Twenty-three percent of patients had primary glaucoma (juvenile open-angle glaucoma and primary congenital glaucoma [PCG]; 36% had secondary glaucoma (glaucoma associated with nonacquired ocular anomalies; glaucoma associated with nonacquired systemic disease or syndrome; glaucoma associated with acquired condition; and glaucoma following cataract surgery; and 39% were glaucoma suspect. Of the patients diagnosed with glaucoma, PCG was the most common diagnosis, seen in 32% of patients. Conclusion: The CGRN classification provides a useful method of classifying childhood glaucoma.

  2. Optimal Survey Strategies and Predicted Planet Yields for the Korean Microlensing Telescope Network

    CERN Document Server

    Henderson, Calen B; Han, Cheongho; Skowron, Jan; Penny, Matthew T; Nataf, David; Gould, Andrew P

    2014-01-01

    The Korean Microlensing Telescope Network (KMTNet) will consist of three 1.6m telescopes each with a 4 deg^{2} field of view (FoV) and will be dedicated to monitoring the Galactic Bulge to detect exoplanets via gravitational microlensing. KMTNet's combination of aperture size, FoV, cadence, and longitudinal coverage will provide a unique opportunity to probe exoplanet demographics in an unbiased way. Here we present simulations that optimize the observing strategy for, and predict the planetary yields of, KMTNet. We find preferences for four target fields located in the central Bulge and an exposure time of t_{exp} = 120s, leading to the detection of ~2,200 microlensing events per year. We estimate the planet detection rates for planets with mass and separation across the ranges 0.1 <= M_{p}/M_{Earth} <= 1000 and 0.4 <= a/AU <= 16, respectively. Normalizing these rates to the cool-planet mass function of Cassan (2012), we predict KMTNet will be approximately uniformly sensitive to planets with mas...

  3. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  4. Enhancement of an Error Minimizing Framework for Localizing Jammers in Wireless Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Dr.P.Sivakumar

    2014-01-01

    Full Text Available Jammers can sternly mess up the communication in wireless networks. The jamming attacks can be aggressively eradicate by the protector thus permits by the jammer location information. Our intensions to plan a framework that can be localize multiple jammers with high accuracy. Maximum of surviving jammer localization scheme exploit indirect measurement such as neighbor lists, PDR, hearing range that can be disturbed by jamming attacks which is tough to focus the jammers perfectly. In its place we utilize a direct measurements-JSS. It is difficult to estimate and it can be derive in order signals. So we formulate an estimation scheme that is relying on ambient noise floor. To measure the estimation errors, we can explain an evaluation feedback metric. In addition to decrease the estimation errors by explain an evaluation feedback metric. We utilize the jammer localization problem as nonlinear optimization issue then global optimal solution is nearby jammer location. Then we discover many experimental algorithms for this global optimal solution but the watchdog timer shows our error minimizing framework obtains enhanced performance than the current scheme.

  5. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hiroshi Ishii

    2012-05-01

    Full Text Available The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.

  6. Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues

    Directory of Open Access Journals (Sweden)

    Mohd Aizaini Maarof

    2013-08-01

    Full Text Available Wireless Sensor Networks (WSNs are important and necessary platforms for the future as the concept “Internet of Things” has emerged lately. They are used for monitoring, tracking, or controlling of many applications in industry, health care, habitat, and military. However, the quality of data collected by sensor nodes is affected by anomalies that occur due to various reasons, such as node failures, reading errors, unusual events, and malicious attacks. Therefore, anomaly detection is a necessary process to ensure the quality of sensor data before it is utilized for making decisions. In this review, we present the challenges of anomaly detection in WSNs and state the requirements to design efficient and effective anomaly detection models. We then review the latest advancements of data anomaly detection research in WSNs and classify current detection approaches in five main classes based on the detection methods used to design these approaches. Varieties of the state-of-the-art models for each class are covered and their limitations are highlighted to provide ideas for potential future works. Furthermore, the reviewed approaches are compared and evaluated based on how well they meet the stated requirements. Finally, the general limitations of current approaches are mentioned and further research opportunities are suggested and discussed.

  7. Meta-analysis on the effects of the physical environment, animal traits, feeder and feed characteristics on the feeding behaviour and performance of growing-finishing pigs.

    Science.gov (United States)

    Averós, X; Brossard, L; Dourmad, J Y; de Greef, K H; Edwards, S A; Meunier-Salaün, M C

    2012-08-01

    A meta-analysis, using information from 45 experiments on growing-finishing pigs published in 39 manuscripts, was carried out to determine the simultaneous effects of the physical environment (space allowance, group size, flooring conditions, temperature, presence of enrichment), pig traits (initial body weight (BW) for each studied time interval, sex, genetics), feeder characteristics (water provision within the feeder, feeder design (individual/collective), feeder places/pig, presence of feeder protection) and feed characteristics (feed allowance (ad libitum/restricted), net energy content, crude protein (CP) content), as well as their potential interactions, on the feeding behaviour and performance of growing-finishing pigs. The detrimental effect of low temperature on performance was particularly evident for restricted-fed pigs (P < 0.05). At reduced feeder space allowance, a reduction in the percentage of time spent eating was predicted when increasing initial BW, whereas the opposite was predicted for larger feeder space allowances (P < 0.001). The reduction in visit duration to the feeder in higher BW groups became gradually more important with increasing feeder space allowance (P < 0.01), whereas the increase in the ingestion rate and average daily feed intake (ADFI) with increasing initial BW became smaller with increasing feeder space (P < 0.05). The model predicted a reduction in feed conversion ratio (FCR) with increasing group size (P < 0.05) and floor space allowance (P < 0.01) and on solid floors with or without bedding (P < 0.05). In comparison with other feeders, wet/dry feeders were associated with more frequent but shorter feeder visits (P < 0.05), higher ingestion rates (P < 0.001) and higher ADFI (P < 0.10). The use of protection within individual feeders increased the time spent feeding (P < 0.001), reduced the number of visits per day (P < 0.01), the ingestion rate (P < 0.001) and FCR (P < 0.01) in comparison with other feeder types. Sex

  8. Optimal survey strategies and predicted planet yields for the Korean microlensing telescope network

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Calen B.; Gaudi, B. Scott; Skowron, Jan; Penny, Matthew T.; Gould, Andrew P. [Department of Astronomy, The Ohio State University, 140 West 18th Avenue, Columbus, OH 43210 (United States); Han, Cheongho [Department of Physics, Chungbuk National University, Cheongju 361-763 (Korea, Republic of); Nataf, David, E-mail: henderson@astronomy.ohio-state.edu [Research School of Astronomy and Astrophysics, The Australian National University, Canberra, ACT 2611 (Australia)

    2014-10-10

    The Korean Microlensing Telescope Network (KMTNet) will consist of three 1.6 m telescopes each with a 4 deg{sup 2} field of view (FoV) and will be dedicated to monitoring the Galactic Bulge to detect exoplanets via gravitational microlensing. KMTNet's combination of aperture size, FoV, cadence, and longitudinal coverage will provide a unique opportunity to probe exoplanet demographics in an unbiased way. Here we present simulations that optimize the observing strategy for and predict the planetary yields of KMTNet. We find preferences for four target fields located in the central Bulge and an exposure time of t {sub exp} = 120 s, leading to the detection of ∼2200 microlensing events per year. We estimate the planet detection rates for planets with mass and separation across the ranges 0.1 ≤ M{sub p} /M {sub ⊕} ≤ 1000 and 0.4 ≤ a/AU ≤ 16, respectively. Normalizing these rates to the cool-planet mass function of Cassan et al., we predict KMTNet will be approximately uniformly sensitive to planets with mass 5 ≤ M{sub p} /M {sub ⊕} ≤ 1000 and will detect ∼20 planets per year per dex in mass across that range. For lower-mass planets with mass 0.1 ≤ M{sub p} /M {sub ⊕} < 5, we predict KMTNet will detect ∼10 planets per year. We also compute the yields KMTNet will obtain for free-floating planets (FFPs) and predict KMTNet will detect ∼1 Earth-mass FFP per year, assuming an underlying population of one such planet per star in the Galaxy. Lastly, we investigate the dependence of these detection rates on the number of observatories, the photometric precision limit, and optimistic assumptions regarding seeing, throughput, and flux measurement uncertainties.

  9. Tumorigenic risk of human induced pluripotent stem cell explants cultured on mouse SNL76/7 feeder cells

    Energy Technology Data Exchange (ETDEWEB)

    Kamada, Mizuna; Mitsui, Youji, E-mail: y-mitsui8310@hb.tp1.jp; Kumazaki, Tsutomu; Kawahara, Yuta; Matsuo, Taira; Takahashi, Tomoko, E-mail: t-takahashi@kph.bunri-u.ac.jp

    2014-10-24

    Highlights: • hiPS cell explants formed malignant tumors when SNL76/7 feeder cells were used. • Multi type tumors developed by interaction of SNL76/7 feeder cells with hiPS cells. • Tumorigenic risk occurs by co-culture of hiPS cells with SNL76/7 feeder cells. - Abstract: The potential for tumor formation from transplanted human induced pluripotent stem cell (hiPSC) derivatives represents a high risk in their application to regenerative medicine. We examined the genetic origin and characteristics of tumors, that were formed when 13 hiPSC lines, established by ourselves, and 201B7 hiPSC from Kyoto University were transplanted into severe combined immune-deficient (SCID) mice. Though teratomas formed in 58% of mice, five angiosarcomas, one malignant solitary fibrous tumor and one undifferentiated pleomorphic sarcoma formed in the remaining mice. Three malignant cell lines were established from the tumors, which were derived from mitomycin C (MMC)-treated SNL76/7 (MMC-SNL) feeder cells, as tumor development from fusion cells between MMC-SNL and hiPSCs was negative by genetic analysis. While parent SNL76/7 cells produced malignant tumors, neither MMC-SNL nor MMC-treated mouse embryo fibroblast (MEF) produced malignant tumors. When MMC-SNL feeder cells were co-cultured with hiPSCs, growing cell lines were generated, that expressed genes similar to the parent SNL76/7 cells. Thus, hiPSCs grown on MMC-SNL feeder cells have a high risk of generating feeder-derived malignant tumors. The possible mechanism(s) of growth restoration and the formation of multiple tumor types are discussed with respect of the interactions between MMC-SNL and hiPSC.

  10. Comparison between the cultures of human induced pluripotent stem cells (hiPSCs) on feeder-and serum-free system (Matrigel matrix), MEF and HDF feeder cell lines.

    Science.gov (United States)

    Ghasemi-Dehkordi, Payam; Allahbakhshian-Farsani, Mehdi; Abdian, Narges; Mirzaeian, Amin; Saffari-Chaleshtori, Javad; Heybati, Fatemeh; Mardani, Gashtasb; Karimi-Taghanaki, Alireza; Doosti, Abbas; Jami, Mohammad-Saeid; Abolhasani, Marziyeh; Hashemzadeh-Chaleshtori, Morteza

    2015-09-01

    Human induced pluripotent stem cells (hiPSCs) are a type of pluripotent stem cells artificially derived from an adult somatic cell (typically human fibroblast) by forced expression of specific genes. In recent years, different feeders like inactivated mouse embryonic fibroblasts (MEFs), human dermal fibroblasts (HDFs), and feeder free system have commonly been used for supporting the culture of stem cells in undifferentiated state. In the present work, the culture of hiPSCs and their characterizations on BD Matrigel (feeder-and serum-free system), MEF and HDF feeders using cell culture methods and molecular techniques were evaluated and compared. The isolated HDFs from foreskin samples were reprogrammed to hiPSCs using gene delivery system. Then, the pluripotency ability of hiPSCs cultured on each layer was determined by teratoma formation and immunohistochemical staining. After EBs generation the expression level of three germ layers genes were evaluated by Q-real-time PCR. Also, the cytogenetic stability of hiPSCs cultured on each condition was analyzed by karyotyping and comet assay. Then, the presence of pluripotency antigens were confirmed by Immunocytochemistry (ICC) test and alkaline phosphatase staining. This study were showed culturing of hiPSCs on BD Matrigel, MEF and HDF feeders had normal morphology and could maintain in undifferentiated state for prolonged expansion. The hiPSCs cultured in each system had normal karyotype without any chromosomal abnormalities and the DNA lesions were not observed by comet assay. Moreover, up-regulation in three germ layers genes in cultured hiPSCs on each layer (same to ESCs) compare to normal HDFs were observed (p stem cells culturing especially hiPSCs both MEF and HDF feeders as well as feeder free system like Matrigel are proper despite benefits and disadvantages. Although, MEFs is suitable for supporting of stem cell culturing but it can animal pathogens transferring and inducing immune response. Furthermore

  11. Exploring the Use of information and communication technologies and social networks among university nursing faculty staff. An opinion survey

    Directory of Open Access Journals (Sweden)

    José Luis Fernández-Alemán

    2014-12-01

    Full Text Available Objective. This work sought to analyze the use of Information and Communication Technologies (ICTs and social networks among the university nursing faculty staff in Spain. Methodology. This was a descriptive, cross-sectional study using a questionnaire on ICT skills designed to comply with the research objective, which was evaluated by experts and which was subjected to exploratory analysis of principal components; the reliability of this instrument measured with Cronbach's alpha was 0.85. The information technology tool used to publish the questionnaire on line was Limesurvey. The sample comprised 165 professors from 25 Nursing Faculties and Schools from universities in Spain. Results. Seventy one percent of the total surveyed used internet services to look for information, 63% used the internet as a means for formation and learning, and 72% used it as a communication platform (e-mail and virtual platforms like Sakai and Moodle. Although 51% of the teaching staff surveyed had more than 120 students registered in their courses, hypothesis testing revealed that the number of students in class is not a determining factor for the teaching staff to have greater interest to update its knowledge in ICTs. Younger professors use new technologies more profusely and the most-valued advantage of using ICTs was quick access to information. Professors perceive that after the Bologna Declaration, which requires modifying their teaching-learning processes through the new teaching methodologies, a drop has been produced in their performance and that of their peers in their area of knowledge. Conclusion. The nursing teaching staff is making strong efforts to confront the new challenges posed by ICTs to train the professionals of the 21st century. It is fundamental to pay special attention to improving the university teaching staff's skills in managing ICTs, promoting the implementation of the knowledge acquired.

  12. A survey of online social networking used to support health awareness campaigns in the City of Johannesburg metropolitan municipality

    Directory of Open Access Journals (Sweden)

    Karin Eloff

    2014-03-01

    Full Text Available Background: The Department of Health (DoH at the City of Johannesburg metropolitan municipality in South Africa develops various health awareness campaigns aimed at creating awareness of general health risks within the Johannesburg area. According to staff members of the DoH, the resources utilised in the current campaigns fail to reach a sufficiently broad audience and the campaigns struggle to deliver the intended messages. Furthermore, the development and implementation of campaigns are time consuming and costly.Objectives: This research focused on how online social networking (OSN can support health awareness campaigns for the DoH in the Johannesburg region. OSN may be regarded as a tool that will assist the DoH to reach a wider audience, send health-related messages and provide a two-way communication channel.Method: The research used an exploratory research design with a purposive non-probability sample. A survey was used as the data collection instrument. Statistical analysis was performed on the data obtained from the surveys.Results: The results indicate that the DoH can benefit from the use of OSN in health promotion campaigns. The benefits include, but are not limited to, an increase in engagement with the target market, ease of use and reach within the specified audience.Conclusion: Although there are numerous advantages associated with the integration of OSN by the DoH, the DoH needs to develop training and development programmes for OSN to encourage its use by DoH staff members. The main aim of the programmes is to create internal OSN capabilities to support the OSN strategy.

  13. Exploring the Use of information and communication technologies and social networks among university nursing faculty staff. An opinion survey.

    Science.gov (United States)

    Fernández-Alemán, José Luis; Sánchez García, Ana Belén; López Montesinos, María José; Marqués-Sánchez, Pilar; Bayón Darkistade, Enrique; Pérez Rivera, Francisco Javier

    2014-01-01

    This work sought to analyze the use of Information and Communication Technologies (ICTs) and social networks among the university nursing faculty staff in Spain. This was a descriptive, cross-sectional study using a questionnaire on ICT skills designed to comply with the research objective, which was evaluated by experts and which was subjected to exploratory analysis of principal components; the reliability of this instrument measured with Cronbach's alpha was 0.85. The information technology tool used to publish the questionnaire on line was Limesurvey. The sample comprised 165 professors from 25 Nursing Faculties and Schools from universities in Spain. Seventy one percent of the total surveyed used internet services to look for information, 63% used the internet as a means for formation and learning, and 72% used it as a communication platform (e-mail and virtual platforms like Sakai and Moodle). Although 51% of the teaching staff surveyed had more than 120 students registered in their courses, hypothesis testing revealed that the number of students in class is not a determining factor for the teaching staff to have greater interest to update its knowledge in ICTs. Younger professors use new technologies more profusely and the most-valued advantage of using ICTs was quick access to information. Professors perceive that after the Bologna Declaration, which requires modifying their teaching-learning processes through the new teaching methodologies, a drop has been produced in their performance and that of their peers in their area of knowledge. The nursing teaching staff is making strong efforts to confront the new challenges posed by ICTs to train the professionals of the 21st century. It is fundamental to pay special attention to improving the university teaching staff's skills in managing ICTs, promoting the implementation of the knowledge acquired.

  14. The power of feeder-mask respirometry as a method for examining hummingbird energetics.

    Science.gov (United States)

    Welch, Kenneth C

    2011-03-01

    Many birds spend important portions of their time and energy flying. For this reason, quantification of metabolic rates during flight is of crucial importance to understanding avian energy balance. Measurement of organismal gas exchange rates using a mask enclosing the whole head or respiratory orifices has served as an important tool for studying animal energetics because it can free the rest of the body, permitting movement. Application of so-called "mask respirometry" to the study of avian forward flight energetics presents unique challenges because birds must be tethered to gas analysis equipment thus typically necessitating use of a wind tunnel. Resulting potential alterations to a study organism's behaviour, physiology, and aerodynamics have made interpretation of such studies contentious. In contrast, the study of hovering flight energetics in hummingbirds using a specialized form of mask respirometry is comparatively easy and can be done without a wind tunnel. Small size, hovering flight, and a nectarivorous diet are characteristics shared by all hummingbird species that make these birds ideally suited for this approach. Specifically, nectar feeders are modified to function as respirometry masks hummingbirds voluntarily respire into when hover-feeding. Feeder-mask based respirometry has revealed some of the highest vertebrate metabolic rates in hovering hummingbirds. In this review I discuss techniques for the successful measurement of metabolic rate using feeder-mask respirometry. I also emphasize how this technique has been used to address fundamental questions regarding avian flight energetics such as capacities for fuel use and mechanisms by which ecology, behaviour and energy balance are linked. Copyright © 2010 Elsevier Inc. All rights reserved.

  15. The Linehaul-Feeder Vehicle Routing Problem with Virtual Depots and Time Windows

    Directory of Open Access Journals (Sweden)

    Huey-Kuo Chen

    2011-01-01

    Full Text Available This paper addresses the linehaul-feeder vehicle routing problem with virtual depots and time windows (LFVRPTW. Small and large vehicles deliver services to customers within time constraints; small vehicles en route may reload commodities from either the physical depot or from the larger vehicle at a virtual depot before continuing onward. A two-stage solution heuristic involving Tabu search is proposed to solve this problem. The test results show that the LFVRPTW performs better than the vehicle routing problem with time windows in terms of both objective value and the number of small vehicles dispatched.

  16. High pressure feeder and method of operating to feed granular or fine materials

    Energy Technology Data Exchange (ETDEWEB)

    Vimalchand, Pannalal; Liu, Guohai; Peng, Wan Wang

    2016-08-09

    A coal feed system to feed pulverized low rank coals containing up to 25 wt % moisture to gasifiers operating up to 1000 psig pressure is described. The system includes gas distributor and collector gas permeable pipes imbedded in the lock vessel. Different methods of operation of the feed system are disclosed to minimize feed problems associated with bridging and packing of the pulverized coal. The method of maintaining the feed system and feeder device exit pressures using gas addition or extraction with the pressure control device is also described.

  17. Interactions among contaminant exposure route, kinetics and toxicity in marine deposit-feeders

    DEFF Research Database (Denmark)

    Selck, Henriette

    as the organic model compound, and cadmium (Cd) as the inorganic compound. Worms were exposed either to dissolved (i.e. ... in this thesis, and earlier published literature, that exposure route does matter both for toxicokinetics and toxicity (i.e. critical body residue) of inorganic- and organic contaminants. Exposure to dissolved contaminants resulted in a lower body-burden, reduced elimination rate and increased toxicity (i......Many of the chemicals having the greatest likelihood of causing damage in ecological systems, such as polycyclic aromatic hydrocarbons (PAHs) and metals are of persistent and/or hydrophobic character. Deposit-feeders may be important in facilitating the removal of organic contaminants from bulk...

  18. Research on communication system of underground safety management based on leaky feeder cable

    Institute of Scientific and Technical Information of China (English)

    CHEN Jian-hong; ZHANG Tao; CHENG Yun-cai; ZHANG Han

    2007-01-01

    According to the current working status of underground safety management and production scheduling, the importance and existed problem of underground mine radio communication were summarized, and the basic principle and classification of leaky feeder cable were introduced and the characteristics of cable were analyzed specifically in depth, and the application model of radio communication system for underground mine safety management was put forward. Meanwhile, the research explanation of the system component, function and evaluation was provided. The discussion result indicates that communication system of underground mine safety management which is integrated two-way relay amplifier and other equipment has many communication functions, and underground mine mobile communication can be achieved well.

  19. Interactions among contaminant exposure route, kinetics and toxicity in marine deposit-feeders

    DEFF Research Database (Denmark)

    Selck, Henriette

    Many of the chemicals having the greatest likelihood of causing damage in ecological systems, such as polycyclic aromatic hydrocarbons (PAHs) and metals are of persistent and/or hydrophobic character. Deposit-feeders may be important in facilitating the removal of organic contaminants from bulk...... the downward transport of Flu in sediment. This thesis highlights the importance of particle ingestion as a pathway whereby contaminants can enter benthic food webs and of tracing both parent compound and metabolic products in all compartments of benthic systems. Therefore, in order to develop reliable...

  20. Glassmaking Units and Glass Feeders Production——a New Production Development Stage at JSC "Krastsvetmet"

    Institute of Scientific and Technical Information of China (English)

    MALTSEV E. V.; MAMONOV S. N.; DMITRIEV V. A.; KHORIKOV P. A.

    2012-01-01

    JSC "Krastsvetmet" has launched the production of glass melting units (GU) and glass feeders (GF),with the number of bushings being from 200 to 4000,made from platinum-rhodium alloys doped with oxide-forming and reinforcing elements.The proprietary technology for dispersion-stabilized material of PtRh10DS composition having high strength and performance properties has been developed and applied.Combined products production was launched where bushings made of PtRh-20 alloy are welded to the plate of the dispersion-stabilized PtRh10DS material.The manufacture of seamless spinning assemblies has been organized.