WorldWideScience

Sample records for transmission protocol sctp

  1. Analisis Pengaruh Ukuran Window Pada Pengendali Kemacetan di SCTP Menggunakan Fitur Multihoming

    Directory of Open Access Journals (Sweden)

    Agus Halid

    2015-07-01

    Abstract  Stream Control Transmission Protocol (SCTP is a protocol that is similar to the Transmission Control Protocol (TCP and User Datagram Protocol (UDP. SCTP is a protocol that is both reliable and connectionless. This protocol has the ability multistreaming and multihoming in the transmit data. This research is the modeling of the SCTP using OPNET simulator that can be accelerated for researchers in the field of networking. SCTP on the simulator was built to perform modifications to TCP. Modeling starts with building a network scenarios and determine the bandwidth on the path that will be passed by data packets. Modification of window size in this research using 1 MMS, 2 MMS up to 10 MMS on congestion control. The aim is to disclose the effect of modification of the window size to the value packet loss, delay and throughput. The measurement results show that the throughput rate is highest in the Second Scenario as shown in Table 6.4 with throughput value of 433.566,0244 bits/s. Using window size in congestion control is intended to prevent a flood of data on the endpoint that can lead to packet loss.   Keywords—Congestion control, throughput, delay, packet loss, window size, multihoming, SCTP

  2. A transport layer protocol for the future high speed grid computing: SCTP versus fast tcp multihoming

    International Nuclear Information System (INIS)

    Arshad, M.J.; Mian, M.S.

    2010-01-01

    TCP (Transmission Control Protocol) is designed for reliable data transfer on the global Internet today. One of its strong points is its use of flow control algorithm that allows TCP to adjust its congestion window if network congestion is occurred. A number of studies and investigations have confirmed that traditional TCP is not suitable for each and every type of application, for example, bulk data transfer over high speed long distance networks. TCP sustained the time of low-capacity and short-delay networks, however, for numerous factors it cannot be capable to efficiently deal with today's growing technologies (such as wide area Grid computing and optical-fiber networks). This research work surveys the congestion control mechanism of transport protocols, and addresses the different issues involved for transferring the huge data over the future high speed Grid computing and optical-fiber networks. This work also presents the simulations to compare the performance of FAST TCP multihoming with SCTP (Stream Control Transmission Protocol) multihoming in high speed networks. These simulation results show that FAST TCP multihoming achieves bandwidth aggregation efficiently and outperforms SCTP multihoming under a similar network conditions. The survey and simulation results presented in this work reveal that multihoming support into FAST TCP does provide a lot of benefits like redundancy, load-sharing and policy-based routing, which largely improves the whole performance of a network and can meet the increasing demand of the future high-speed network infrastructures (such as in Grid computing). (author)

  3. Stream Control Transmission Protocol as a Transport for SIP: a case study

    Directory of Open Access Journals (Sweden)

    Giuseppe De Marco

    2004-06-01

    Full Text Available The dominant signalling protocol both in future wireless and wired networks will be the Session Initiation Protocol (SIP, as pointed out in the 3G IP-based mobile networks specifications, entailing a fully Internet integrated network. The use of SIP in the IP Multimedia Subsytem (IMS of Release 5 involves the development of servers capable to handle a large number of call requests. The signaling traffic associated to such requests could explode, if an intelligent congestion control were not introduced. Stream Control Transmission Protocol (SCTP was born to support transport of SS7 signaling messages. However, many of the SCTP features are also useful for transport of SIP messages, as: congestion control mechanism, good separation among independent messages, multihoming. Indeed, adoption of SCTP as transport of SIP signaling might prove useful in some situations where usual transport protocols, like TCP and UDP, suffer performance degradation. In this paper, we analyse the general framework wherein SIP operates and we discuss the benefits of using SCTP as a transport for SIP, toward fair sharing of network resources. This study is carried on in the context of the implementation of an high-performance SIP Proxy Server. We also present some preliminar results of an implementation of SIP over SCTP/UDP in a real LAN environment.

  4. Analysis of Retransmission Policies for Parallel Data Transmission

    Directory of Open Access Journals (Sweden)

    I. A. Halepoto

    2018-06-01

    Full Text Available Stream control transmission protocol (SCTP is a transport layer protocol, which is efficient, reliable, and connection-oriented as compared to transmission control protocol (TCP and user datagram protocol (UDP. Additionally, SCTP has more innovative features like multihoming, multistreaming and unordered delivery. With multihoming, SCTP establishes multiple paths between a sender and receiver. However, it only uses the primary path for data transmission and the secondary path (or paths for fault tolerance. Concurrent multipath transfer extension of SCTP (CMT-SCTP allows a sender to transmit data in parallel over multiple paths, which increases the overall transmission throughput. Parallel data transmission is beneficial for higher data rates. Parallel transmission or connection is also good in services such as video streaming where if one connection is occupied with errors the transmission continues on alternate links. With parallel transmission, the unordered data packets arrival is very common at receiver. The receiver has to wait until the missing data packets arrive, causing performance degradation while using CMT-SCTP. In order to reduce the transmission delay at the receiver, CMT-SCTP uses intelligent retransmission polices to immediately retransmit the missing packets. The retransmission policies used by CMT-SCTP are RTX-SSTHRESH, RTX-LOSSRATE and RTX-CWND. The main objective of this paper is the performance analysis of the retransmission policies. This paper evaluates RTX-SSTHRESH, RTX-LOSSRATE and RTX-CWND. Simulations are performed on the Network Simulator 2. In the simulations with various scenarios and parameters, it is observed that the RTX-LOSSRATE is a suitable policy.

  5. Analisis Kualitas VoIP pada SCTP Menggunakan ECN dan AQM

    Directory of Open Access Journals (Sweden)

    La Surimi

    2015-07-01

    Abstract VoIP is the real time applications that are highly dependent on the quality of  delay and jitter, which it is difficult to be met by protocol that has reliable data transfer feature and  congestion control such as TCP. On the other hand the use of UDP that has no congestion control make chance of causing congestion in the network is very large. The use of SCTP as an alternative protocol was also not able to accommodate the weaknesses of TCP and UDP. Some research shows that repairs or modifications to the SCTP congestion control mechanism is needed. The Use of ECN and AQM in some studies show that these two mechanisms can reduce delay and jitter. This study tested the quality of VoIP over SCTP with ECN and AVQ, in NS2. Simulations carried out by independent replication technique, and the results showed that ECN and AVQ can increase the value of MOS VoIP calls significantly in non ideal network scenarios. This study also did comparison of SCTP MOS that uses ECN and AVQ with MOS values VoIP using TCP and UDP. The result showed that SCTP with ECN and AVQ outperform TCP but can not surpass UDP yet.   Keywords— VoIP, SCTP, ECN, AQM,AVQ.

  6. Network protocol changes can improve DisCom WAN performance : evaluating TCP modifications and SCTP in the ASC tri-lab environment.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Hu, Tan Chang

    2005-06-01

    The Advanced Simulation and Computing (ASC) Distance Computing (DisCom) Wide Area Network (WAN) is a high performance, long distance network environment that is based on the ubiquitous TCP/IP protocol set. However, the Transmission Control Protocol (TCP) and the algorithms that govern its operation were defined almost two decades ago for a network environment vastly different from the DisCom WAN. In this paper we explore and evaluate possible modifications to TCP that purport to improve TCP performance in environments like the DisCom WAN. We also examine a much newer protocol, SCTP (Stream Control Transmission Protocol) that claims to provide reliable network transport while also implementing multi-streaming, multi-homing capabilities that are appealing in the DisCom high performance network environment. We provide performance comparisons and recommendations for continued development that will lead to network communications protocol implementations capable of supporting the coming ASC Petaflop computing environments.

  7. Analysis of SCTP and TCP based communication in high-speed clusters

    International Nuclear Information System (INIS)

    Kozlovszky, M.; Berceli, T.; Kutor, L.

    2006-01-01

    Performance and financial constraints are pushing modern DAQs (Data Acquisition Systems) to use distributed cluster environments instead of monolith one-box systems. Inside clusters application communication layers should support outstanding high performance requirements. We are currently investigating different network protocols that could meet the requirements of high speed/low latency peer-to-peer communication within DAQ clusters. We have carried out various performance measurements with TCP and SCTP over Fast and Gigabit Ethernet. We are focusing on Ethernet Technologies, because this transport medium is broad deployed, cost efficient and it has much better cost/throughput ratio than other available communication alternatives (e.g.: Myrinet, Infiniband). During this study, a protocol performance measurement application with different peer transport components has been developed. In the first part of the paper, we give a short comparison of the two protocols (SCTP and TCP), and an introduction of the transport layer structure developed. Later on we discuss the performance results of single/multi-stream peer-to-peer communication, give overview about application code transition possibilities from application developer point of view between the two protocols, and draw conclusions about usability

  8. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  9. A Seamless Ubiquitous Telehealthcare Tunnel

    Directory of Open Access Journals (Sweden)

    Sao-Jie Chen

    2013-08-01

    Full Text Available Mobile handheld devices are rapidly using to implement healthcare services around the World. Fundamentally, these services utilize telemedicine technologies. A disconnection of a mobile telemedicine system usually results in an interruption, which is embarrassing, and reconnection is necessary during the communication session. In this study, the Stream Control Transmission Protocol (SCTP is adopted to build a stable session tunnel to guarantee seamless switching among heterogeneous wireless communication standards, such as Wi-Fi and 3G. This arrangement means that the telemedicine devices will not be limited by a fixed wireless connection and can switch to a better wireless channel if necessary. The tunnel can transmit plain text, binary data, and video streams. According to the evaluation of the proposed software-based SCTP-Tunnel middleware shown, the performance is lower than anticipated and is slightly slower than a fixed connection. However, the transmission throughput is still acceptable for healthcare professionals in a healthcare enterprise or home care site. It is necessary to build more heterogeneous wireless protocols into the proposed tunnel-switching scheme to support all possible communication protocols. In addition, SCTP is another good choice for promoting communication in telemedicine and healthcare fields.

  10. Probabilistic Chain Teleportation of a Qutrit-State

    International Nuclear Information System (INIS)

    Wang Meiyu; Yan Fengli

    2010-01-01

    We investigate chain teleportation of a qutrit-state via the non-maximally two-qutrit entangled channels. For the case of four parties, the efficiencies of two chain teleportation protocols, the separate chain teleportation protocol (SCTP), and the global chain teleportation protocol (GCTP), are calculated. In SCTP the errors are corrected between every step while in GCTP the errors are corrected only at the end. Furthermore, we present a piecewise global chain teleportation protocol (PGCTP) for keeping away from the inconvenience of error-correction of GCTP. We show that PGCTP is more efficient than SCTP. (general)

  11. Optimizing the ASC WAN: evaluating network performance tools for comparing transport protocols.

    Energy Technology Data Exchange (ETDEWEB)

    Lydick, Christopher L.

    2007-07-01

    The Advanced Simulation & Computing Wide Area Network (ASC WAN), which is a high delay-bandwidth network connection between US Department of Energy National Laboratories, is constantly being examined and evaluated for efficiency. One of the current transport-layer protocols which is used, TCP, was developed for traffic demands which are different from that on the ASC WAN. The Stream Control Transport Protocol (SCTP), on the other hand, has shown characteristics which make it more appealing to networks such as these. Most important, before considering a replacement for TCP on any network, a testing tool that performs well against certain criteria needs to be found. In order to try to find such a tool, two popular networking tools (Netperf v.2.4.3 & v.2.4.6 (OpenSS7 STREAMS), and Iperf v.2.0.6) were tested. These tools implement both TCP and SCTP and were evaluated using four metrics: (1) How effectively can the tool reach a throughput near the bandwidth? (2) How much of the CPU does the tool utilize during operation? (3) Is the tool freely and widely available? And, (4) Is the tool actively developed? Following the analysis of those tools, this paper goes further into explaining some recommendations and ideas for future work.

  12. Background Traffic-Based Retransmission Algorithm for Multimedia Streaming Transfer over Concurrent Multipaths

    Directory of Open Access Journals (Sweden)

    Yuanlong Cao

    2012-01-01

    Full Text Available The content-rich multimedia streaming will be the most attractive services in the next-generation networks. With function of distribute data across multipath end-to-end paths based on SCTP's multihoming feature, concurrent multipath transfer SCTP (CMT-SCTP has been regarded as the most promising technology for the efficient multimedia streaming transmission. However, the current researches on CMT-SCTP mainly focus on the algorithms related to the data delivery performance while they seldom consider the background traffic factors. Actually, background traffic of realistic network environments has an important impact on the performance of CMT-SCTP. In this paper, we firstly investigate the effect of background traffic on the performance of CMT-SCTP based on a close realistic simulation topology with reasonable background traffic in NS2, and then based on the localness nature of background flow, a further improved retransmission algorithm, named RTX_CSI, is proposed to reach more benefits in terms of average throughput and achieve high users' experience of quality for multimedia streaming services.

  13. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  14. L2-LBMT: A Layered Load Balance Routing Protocol for underwater multimedia data transmission

    Science.gov (United States)

    Lv, Ze; Tang, Ruichun; Tao, Ye; Sun, Xin; Xu, Xiaowei

    2017-12-01

    Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network (UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol (L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer (SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado (3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.

  15. Evaluation of video transmission of MAC protocols in wireless sensor network

    Science.gov (United States)

    Maulidin, Mahmuddin, M.; Kamaruddin, L. M.; Elsaikh, Mohamed

    2016-08-01

    Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmission is one of the important applications for the future that can be transmitted with low aspect in side of cost and also power consumption. In this paper, comparison of five different MAC WSN protocol for video transmission namely IEEE 802.11 standard, IEEE 802.15.4 standard, CSMA/CA, Berkeley-MAC, and Lightweight-MAC protocol are studied. Simulation experiment has been conducted in OMNeT++ with INET network simulator software to evaluate the performance. Obtained results indicate that IEEE 802.11 works better than other protocol in term of packet delivery, throughput, and latency.

  16. Analysis of transmission speed of AX.25 Protocol implemented in satellital earth station UPTC

    Directory of Open Access Journals (Sweden)

    Oscar Fernando Vera Cely

    2015-11-01

    Full Text Available One of the important parameters for the proper functioning of satellital ground station projected on Pedagogical and Technological University of Colombia (UPTC is the efficiency in transmission speed on communications protocol. This paper shows the results of analysis of the transmission speed of the AX.25 protocol implemented in the communication system of the satellital ground station UPTC. It begins with a brief description of the implemented hardware; the behavior of the transmission rate is evaluated using a theoretical analysis based on equations to estimate this parameter in the operation of the protocol, then tests are performed using the hardware that the satellital ground station UPTC has and finally, the conclusions are presented. Based on comparison of the theoretical analysis results obtained experimentally, it became apparent that AX.25 protocol efficiency is higher when increasing the number of frames.

  17. Data transmission protocol for Pi-of-the-Sky cameras

    Science.gov (United States)

    Uzycki, J.; Kasprowicz, G.; Mankiewicz, M.; Nawrocki, K.; Sitek, P.; Sokolowski, M.; Sulej, R.; Tlaczala, W.

    2006-10-01

    The large amount of data collected by the automatic astronomical cameras has to be transferred to the fast computers in a reliable way. The method chosen should ensure data streaming in both directions but in nonsymmetrical way. The Ethernet interface is very good choice because of its popularity and proven performance. However it requires TCP/IP stack implementation in devices like cameras for full compliance with existing network and operating systems. This paper describes NUDP protocol, which was made as supplement to standard UDP protocol and can be used as a simple-network protocol. The NUDP does not need TCP protocol implementation and makes it possible to run the Ethernet network with simple devices based on microcontroller and/or FPGA chips. The data transmission idea was created especially for the "Pi of the Sky" project.

  18. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  19. An improved IEEE 802.11 protocol for reliable data transmission in power distribution fault diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)

    2010-10-15

    In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.

  20. A reliable transmission protocol for ZigBee-based wireless patient monitoring.

    Science.gov (United States)

    Chen, Shyr-Kuen; Kao, Tsair; Chan, Chia-Tai; Huang, Chih-Ning; Chiang, Chih-Yen; Lai, Chin-Yu; Tung, Tse-Hua; Wang, Pi-Chung

    2012-01-01

    Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking. These systems use wireless technologies to transmit vital signs for medical evaluation. In a multihop ZigBee network, the existing systems usually use broadcast or multicast schemes to increase the reliability of signals transmission; however, both the schemes lead to significantly higher network traffic and end-to-end transmission delay. In this paper, we present a reliable transmission protocol based on anycast routing for wireless patient monitoring. Our scheme automatically selects the closest data receiver in an anycast group as a destination to reduce the transmission latency as well as the control overhead. The new protocol also shortens the latency of path recovery by initiating route recovery from the intermediate routers of the original path. On the basis of a reliable transmission scheme, we implement a ZigBee device for fall monitoring, which integrates fall detection, indoor positioning, and ECG monitoring. When the triaxial accelerometer of the device detects a fall, the current position of the patient is transmitted to an emergency center through a ZigBee network. In order to clarify the situation of the fallen patient, 4-s ECG signals are also transmitted. Our transmission scheme ensures the successful transmission of these critical messages. The experimental results show that our scheme is fast and reliable. We also demonstrate that our devices can seamlessly integrate with the next generation technology of wireless wide area network, worldwide interoperability for microwave access, to achieve real-time patient monitoring.

  1. Efficient SCT Protocol for Post Disaster Communication

    Science.gov (United States)

    Ramesh, T. K.; Giriraja, C. V.

    2017-08-01

    Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. Wireless ad-hoc network architecture is proposed in this paper with access nodes. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and Efficient SCTP (ESTP) algorithm is developed which shows better results in terms of cumulative packet loss.

  2. Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhu Han

    2009-01-01

    Full Text Available Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks, forms virtual MIMO system, and provides diversity gains. In this paper, wireless video transmission protocols are proposed, in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination, and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation, configuration of side information, subject to bandwidth and power constraints. For multiuser cases, most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition, it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.

  3. An adaptive transmission protocol for managing dynamic shared states in collaborative surgical simulation.

    Science.gov (United States)

    Qin, J; Choi, K S; Ho, Simon S M; Heng, P A

    2008-01-01

    A force prediction algorithm is proposed to facilitate virtual-reality (VR) based collaborative surgical simulation by reducing the effect of network latencies. State regeneration is used to correct the estimated prediction. This algorithm is incorporated into an adaptive transmission protocol in which auxiliary features such as view synchronization and coupling control are equipped to ensure the system consistency. We implemented this protocol using multi-threaded technique on a cluster-based network architecture.

  4. Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks

    CSIR Research Space (South Africa)

    Mkuzangwe, NNP

    2015-08-01

    Full Text Available This work implements two anomaly detection algorithms for detecting Transmission Control Protocol Synchronized (TCP SYN) flooding attack. The two algorithms are an adaptive threshold algorithm and a cumulative sum (CUSUM) based algorithm...

  5. Improvement The Transmission Efficiency For Wireless Packet Communication Systems Using Automatic Control for power And Time Slot Width Of Slotted Non persistent ISMA Protocol

    Directory of Open Access Journals (Sweden)

    Saad M. Hardan

    2013-05-01

    Full Text Available In packed communication systems which use a protocol, the protocol should perform the allocation of channels such that the transmission channel is used efficiently. Efficiency is usually measured in terms of channel throughput and the average transmission  delay. The Slotted Nonpersistent ISMA protocol is one of random access protocols used in packed communication systems. In this research a Slotted Nonpersistent ISMA protocol Model with automatic control for power and time slot is proposed. the suggested algorithm enable the base station(access point to control  the protocol time slot length and  transmission power in a dynamic way to control the normalized propagation delay d and to maintain all the uplink signals in the limit of captured power threshold (capture ratio in order to control the  throughput and the average transmission delay of the communication system by an automatic method. the computer simulation results  confirm the activity of the  proposed algorithm for increasing the  throughput and decreasing the average transmission delay by an accepted ratios.

  6. Consistent Steering System using SCTP for Bluetooth Scatternet Sensor Network

    Science.gov (United States)

    Dhaya, R.; Sadasivam, V.; Kanthavel, R.

    2012-12-01

    Wireless communication is the best way to convey information from source to destination with flexibility and mobility and Bluetooth is the wireless technology suitable for short distance. On the other hand a wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Using Bluetooth piconet wireless technique in sensor nodes creates limitation in network depth and placement. The introduction of Scatternet solves the network restrictions with lack of reliability in data transmission. When the depth of the network increases, it results in more difficulties in routing. No authors so far focused on the reliability factors of Scatternet sensor network's routing. This paper illustrates the proposed system architecture and routing mechanism to increase the reliability. The another objective is to use reliable transport protocol that uses the multi-homing concept and supports multiple streams to prevent head-of-line blocking. The results show that the Scatternet sensor network has lower packet loss even in the congestive environment than the existing system suitable for all surveillance applications.

  7. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    Science.gov (United States)

    Townsend, Ben; Abawajy, Jemal; Kim, Tai-Hoon

    2011-01-01

    People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors. PMID:22163845

  8. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    Directory of Open Access Journals (Sweden)

    Tai-Hoon Kim

    2011-04-01

    Full Text Available People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors.

  9. Implementing the GBT data transmission protocol in FPGAs

    CERN Document Server

    Baron, S; Marin, F; Moreira, P; Soos, C

    2009-01-01

    The GBT chip [1] is a radiation tolerant ASIC that can be used to implement bidirectional multipurpose 4.8Gb/s optical links for high-energy physics experiments. It will be proposed to the LHC experiments for combined transmission of physics data, trigger, timing, fast and slow control and monitoring. Although radiation hardness is required on detectors, it is not necessary for the electronics located in the counting rooms, where the GBT functionality can be realized using Commercial Off-The-Shelf (COTS) components. This paper describes efficient physical implementation of the GBT protocol achieved for FPGA devices on Altera and Xilinx devices with source codes developed in Verilog and VHDL. The current platforms are based on Altera StratixIIGX and Xilinx Virtex5.

  10. Correct mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme on ping-pong protocol

    OpenAIRE

    Zhang, Zhanjun

    2004-01-01

    Comment: The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected

  11. The Achilles’ heel of prevention to mother-to-child transmission of HIV: Protocol implementation, uptake, and sustainability

    Science.gov (United States)

    Rodriguez, Violeta J.; LaCabe, Richard P.; Privette, C. Kyle; Douglass, K. Marie; Peltzer, Karl; Matseke, Gladys; Mathebula, Audrey; Ramlagan, Shandir; Sifunda, Sibusiso; Prado, Guillermo “Willy”; Horigian, Viviana; Weiss, Stephen M.; Jones, Deborah L.

    2017-01-01

    Abstract The Joint United Nations Programme on HIV and AIDS proposed to reduce the vertical transmission of HIV from ∼72,200 to ∼8300 newly infected children by 2015 in South Africa (SA). However, cultural, infrastructural, and socio-economic barriers hinder the implementation of the prevention of mother-to-child transmission (PMTCT) protocol, and research on potential solutions to address these barriers in rural areas is particularly limited. This study sought to identify challenges and solutions to the implementation, uptake, and sustainability of the PMTCT protocol in rural SA. Forty-eight qualitative interviews, 12 focus groups discussions (n = 75), and one two-day workshop (n = 32 participants) were conducted with district directors, clinic leaders, staff, and patients from 12 rural clinics. The delivery and uptake of the PMTCT protocol was evaluated using the Consolidated Framework for Implementation Research (CFIR); 15 themes associated with challenges and solutions emerged. Intervention characteristics themes included PMTCT training and HIV serostatus disclosure. Outer-setting themes included facility space, health record management, and staff shortage; inner-setting themes included supply use and availability, staff–patient relationship, and transportation and scheduling. Themes related to characteristics of individuals included staff relationships, initial antenatal care visit, adherence, and culture and stigma. Implementation process themes included patient education, test results delivery, and male involvement. Significant gaps in care were identified in rural areas. Information obtained from participants using the CFIR framework provided valuable insights into solutions to barriers to PMTCT implementation. Continuously assessing and correcting PMTCT protocol implementation, uptake and sustainability appear merited to maximize HIV prevention. PMID:28922974

  12. The Achilles' heel of prevention to mother-to-child transmission of HIV: Protocol implementation, uptake, and sustainability.

    Science.gov (United States)

    Rodriguez, Violeta J; LaCabe, Richard P; Privette, C Kyle; Douglass, K Marie; Peltzer, Karl; Matseke, Gladys; Mathebula, Audrey; Ramlagan, Shandir; Sifunda, Sibusiso; Prado, Guillermo Willy; Horigian, Viviana; Weiss, Stephen M; Jones, Deborah L

    2017-12-01

    The Joint United Nations Programme on HIV and AIDS proposed to reduce the vertical transmission of HIV from ∼72,200 to ∼8300 newly infected children by 2015 in South Africa (SA). However, cultural, infrastructural, and socio-economic barriers hinder the implementation of the prevention of mother-to-child transmission (PMTCT) protocol, and research on potential solutions to address these barriers in rural areas is particularly limited. This study sought to identify challenges and solutions to the implementation, uptake, and sustainability of the PMTCT protocol in rural SA. Forty-eight qualitative interviews, 12 focus groups discussions (n = 75), and one two-day workshop (n = 32 participants) were conducted with district directors, clinic leaders, staff, and patients from 12 rural clinics. The delivery and uptake of the PMTCT protocol was evaluated using the Consolidated Framework for Implementation Research (CFIR); 15 themes associated with challenges and solutions emerged. Intervention characteristics themes included PMTCT training and HIV serostatus disclosure. Outer-setting themes included facility space, health record management, and staff shortage; inner-setting themes included supply use and availability, staff-patient relationship, and transportation and scheduling. Themes related to characteristics of individuals included staff relationships, initial antenatal care visit, adherence, and culture and stigma. Implementation process themes included patient education, test results delivery, and male involvement. Significant gaps in care were identified in rural areas. Information obtained from participants using the CFIR framework provided valuable insights into solutions to barriers to PMTCT implementation. Continuously assessing and correcting PMTCT protocol implementation, uptake and sustainability appear merited to maximize HIV prevention.

  13. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-07-01

    Full Text Available Information technology (IT security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

  14. Analysis of the radius and diameter protocols in terms of pricing telecommunication services

    Directory of Open Access Journals (Sweden)

    Vesna M. Radonjić

    2013-06-01

    client and the server, depending on the current needs of the network. At the transport layer, Diameter uses the TCP or SCTP protocols. When compared to UDP, these protocols provide reliable transmission which is very important for applications exchanging data related to accounting. In addition, the Diameter protocol allows the transmission of accounting information in real time and it incorporates several methods for troubleshooting in order to minimize the loss of accounting data when a failure occurs, which is not the case with RADIUS. Given the present benefits, introduced improvements, flexibility, expandability, IETF and 3GPP's support and the support of big companies, there is a great chance that Diameter will replace RADIUS.   Conclusion   This paper presents a general overview of the RADIUS and Diameter protocols, including some of their basic operations with a special emphasis on accounting applications. The similarities of these protocols are reflected in the support of the same functions in a similar format of the packages. The differences are related to the protocol architectures and the methods of determining authentication, authorization and accounting mechanisms. Regarding accounting aspects, the most important advantages of the Diameter protocol are its possibility to transmit accounting information in real time and implemented mechanisms for troubleshooting in order to minimize the loss of accounting data in case of failure. Owing to to these characteristics, the Diameter protocol achieves a significant advantage over RADIUS in next generation networks.

  15. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  16. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  17. The transmission protocols of gender as female submission device to marital violence

    Directory of Open Access Journals (Sweden)

    Maria Fátima Scaffo

    2011-12-01

    Full Text Available This article examines the way in which women historically respond , in the familiar scenario, to marital violence. In principle, the snip, adopted as an object of study and analysis, consists of a typical mode of violence to the woman filed in the context of the cogs which  configure  the encounter between men and women. It points out the factors enhanced in this  meeting  which produce violence, exploring the  the possibility to reflect on aspects of the masculine condition or in ghosts   of the feminine universe. Considering the gender issue,    the following question is raised: Is the position of women  constructed based on educational principles  which determine  a particular type of role to  them or are there  other determinants? The analysis and discussion of this theme will be carried out considering the generational transmission of norms of gender-protocols from mother to daughter as well as  the constant reissue, in an unreflective manner, , that has been constituted as formative  roots of the   women’s behavior and which are part of the dynamics of the feminine in gender relations, in which the woman occupies a historically subordinate plan. Probably the condition of inferiority reflects  the transmission, from mother to daughter, of stereotyped patterns culturally assigned to women and that are accepted and replicated, almost automatically, in the scenario of marital relations.

  18. Policies and protocols for preventing transmission of HIV infection in oral health care in South Africa.

    Science.gov (United States)

    Ogunbodede, E O; Rudolph, M J

    2002-12-01

    Human immunodeficiency virus (HIV) infection constitutes an unparalleled public health challenge. The unique nature of most oral health procedures, instrumentation and patient-care settings requires specific strategies and protocols aimed at preventing the transmission of HIV/AIDS between oral health care providers and patients, as well as between patients themselves. The present study investigated the level of information and training about protocols and policies for preventing the transmission of HIV/AIDS in oral health care settings in South Africa. The data collection techniques utilised available information, in-depth interviews and an open-ended questionnaire. The respondents were 20 purposively selected key informants who were senior officers for HIV/AIDS programmes and/or oral health organisations. Sixteen (80%) of the respondents reported that there were no existing oral health policies on HIV/AIDS in their health care institutions or organisations. None of the interviewees knew of any specific protocols on HIV/AIDS in the oral health care setting that emanated from South Africa. In addition, none of the dental professional associations had established an infection control committee or a support system for members who might become infected with HIV and develop AIDS. Territorial boundaries existed between sectors within the medical disciplines, as well as between the medical and oral health disciplines. Numerous general impediments were identified, such as prejudice, denial and fear, inadequate training and/or information about the infection, lack of representation and resources for policy planning, a lack of interest from the business sector, and approaching HIV/AIDS in the workplace as a 'one-time issue' Other obstacles identified included unemployment, poverty, illiteracy, disempowerment of women and inadequate communication of policies to service providers. Additional issues raised included the migrant labour systeM, complexities of language and culture

  19. A Hierarchical Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prabhudutta Mohanty

    2014-12-01

    Full Text Available The two important requirements for many Wireless Senor Networks (WSNs are prolonged network lifetime and end-to-end reliability. The sensor nodes consume more energy during data transmission than the data sensing. In WSN, the redundant data increase the energy consumption, latency and reduce reliability during data transmission. Therefore, it is important to support energy efficient reliable data transport in WSNs. In this paper, we present a Hierarchical Energy Efficient Reliable Transport Protocol (HEERTP for the data transmission within the WSN. This protocol maximises the network lifetime by controlling the redundant data transmission with the co-ordination of Base Station (BS. The proposed protocol also achieves end-to-end reliability using a hop-by-hop acknowledgement scheme. We evaluate the performance of the proposed protocol through simulation. The simulation results reveal that our proposed protocol achieves better performance in terms of energy efficiency, latency and reliability than the existing protocols.

  20. HISTOPATHOLOGICAL AND CYTOLOGICAL ANALYSIS OF TRANSMISSIBLE VENEREAL TUMOR IN DOGS AFTER TWO TREATMENT PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Fabiana Aguena Sales Lapa

    2012-06-01

    Full Text Available The transmissible venereal tumor (TVT is a contagious neoplasm of round cells that frequently affect dogs. The treatment consists of chemotherapy being more effective the vincristine alone, however the resistance emergence to this agent due multidrug resistance of the P-glycoprotein (P-gp, a transporter protein encoded by the MDR1 gene, has been taking the association with other drugs. Recent studies demonstrated the antitumoral effect of the avermectins when associated to the vincristine in the treatment of some neoplasms. Therefore, the objective of the present study was to compare the effectiveness of standard treatment of TVT with vincristine only when compared to combined treatment with vincristine and ivermectin, evaluated through number of applications of the two protocols, histopathological and cytological analysis from 50 dogs diagnosed with TVT during the period of 2007 to 2010. The combined protocol significant reduced the number of applications and cytological and histopathological findings collaborate with the hypothesis that the combination of vincristine and ivermectin promotes faster healing than the use of vincristine alone. Combination treatment with vincristine and ivermectin could be in the future an excellent therapeutic alternative for the treatment of TVT for probably reducing the resistance to vincristine, simultaneously reducing the cost of TVT treatment and promoting a faster recovery of the dog.

  1. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    Science.gov (United States)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  2. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  3. A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States

    International Nuclear Information System (INIS)

    Gao Gan; Wang Liping

    2010-01-01

    By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the 'two-step' transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. (general)

  4. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    Science.gov (United States)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  5. Link-state-estimation-based transmission power control in wireless body area networks.

    Science.gov (United States)

    Kim, Seungku; Eom, Doo-Seop

    2014-07-01

    This paper presents a novel transmission power control protocol to extend the lifetime of sensor nodes and to increase the link reliability in wireless body area networks (WBANs). We first experimentally investigate the properties of the link states using the received signal strength indicator (RSSI). We then propose a practical transmission power control protocol based on both short- and long-term link-state estimations. Both the short- and long-term link-state estimations enable the transceiver to adapt the transmission power level and target the RSSI threshold range, respectively, to simultaneously satisfy the requirements of energy efficiency and link reliability. Finally, the performance of the proposed protocol is experimentally evaluated in two experimental scenarios-body posture change and dynamic body motion-and compared with the typical WBAN transmission power control protocols, a real-time reactive scheme, and a dynamic postural position inference mechanism. From the experimental results, it is found that the proposed protocol increases the lifetime of the sensor nodes by a maximum of 9.86% and enhances the link reliability by reducing the packet loss by a maximum of 3.02%.

  6. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    Science.gov (United States)

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  7. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  8. A review on transport layer protocol performance for delivering video on an adhoc network

    Science.gov (United States)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  9. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  10. Statistical performance evaluation of ECG transmission using wireless networks.

    Science.gov (United States)

    Shakhatreh, Walid; Gharaibeh, Khaled; Al-Zaben, Awad

    2013-07-01

    This paper presents simulation of the transmission of biomedical signals (using ECG signal as an example) over wireless networks. Investigation of the effect of channel impairments including SNR, pathloss exponent, path delay and network impairments such as packet loss probability; on the diagnosability of the received ECG signal are presented. The ECG signal is transmitted through a wireless network system composed of two communication protocols; an 802.15.4- ZigBee protocol and an 802.11b protocol. The performance of the transmission is evaluated using higher order statistics parameters such as kurtosis and Negative Entropy in addition to the common techniques such as the PRD, RMS and Cross Correlation.

  11. An Energy Balanced and Lifetime Extended Routing Protocol for Underwater Sensor Networks.

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Lu, Luxi

    2018-05-17

    Energy limitation is an adverse problem in designing routing protocols for underwater sensor networks (UWSNs). To prolong the network lifetime with limited battery power, an energy balanced and efficient routing protocol, called energy balanced and lifetime extended routing protocol (EBLE), is proposed in this paper. The proposed EBLE not only balances traffic loads according to the residual energy, but also optimizes data transmissions by selecting low-cost paths. Two phases are operated in the EBLE data transmission process: (1) candidate forwarding set selection phase and (2) data transmission phase. In candidate forwarding set selection phase, nodes update candidate forwarding nodes by broadcasting the position and residual energy level information. The cost value of available nodes is calculated and stored in each sensor node. Then in data transmission phase, high residual energy and relatively low-cost paths are selected based on the cost function and residual energy level information. We also introduce detailed analysis of optimal energy consumption in UWSNs. Numerical simulation results on a variety of node distributions and data load distributions prove that EBLE outperforms other routing protocols (BTM, BEAR and direct transmission) in terms of network lifetime and energy efficiency.

  12. Outage Analysis of Cooperative Transmission with Energy Harvesting Relay: Time Switching versus Power Splitting

    Directory of Open Access Journals (Sweden)

    Guanyao Du

    2015-01-01

    Full Text Available This paper investigates the multiuser transmission network with an energy harvesting (EH cooperative relay, where a source transmits independent information to multiple destinations with the help of an energy constrained relay. The relay can harvest energy from the radio frequency (RF signals transmitted from the source, and it helps the multiuser transmission only by consuming the harvested energy. By adopting the time switching and the power splitting relay receiver architectures, we firstly propose two protocols, the time switching cooperative multiuser transmission (TSCMT protocol and the power splitting cooperative multiuser transmission (PSCMT protocol, to enable the simultaneous information processing and EH at the relay for the system. To evaluate the system performance, we theoretically analyze the system outage probability for the two proposed protocols and then derive explicit expressions for each of them, respectively. Numerical results are provided to demonstrate the accuracy of our analytical results and reveal that compared with traditional noncooperative scheme our proposed protocols are green solutions to offer reliable communication and lower system outage probability without consuming additional energy. In particular, for the same transmit power at the source, the PSCMT protocol is superior to the TSCMT protocol to obtain lower system outage probability.

  13. A Performance Evaluation of NACK-Oriented Protocols as the Foundation of Reliable Delay- Tolerant Networking Convergence Layers

    Science.gov (United States)

    Iannicca, Dennis; Hylton, Alan; Ishac, Joseph

    2012-01-01

    Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.

  14. Improving the security of quantum protocols via commit-and-open

    NARCIS (Netherlands)

    I.B. Damgård (Ivan); S. Fehr (Serge); C. Luneman; L. Salvail (Louis); C. Schaffner (Christian)

    2009-01-01

    htmlabstractWe consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general compiler improving the security of such protocols: if the original protocol is secure against an almost honest adversary, then the

  15. Caltech computer scientists develop FAST protocol to speed up Internet

    CERN Multimedia

    2003-01-01

    "Caltech computer scientists have developed a new data transfer protocol for the Internet fast enough to download a full-length DVD movie in less than five seconds. The protocol is called FAST, standing for Fast Active queue management Scalable Transmission Control Protocol" (1 page).

  16. Design and implementation on wireless transmission platform of area radiation monitoring data

    International Nuclear Information System (INIS)

    Li Dan; Ge Liangquan; Lai Wanchang; Ren Yong; Liu Huijun; Wang Guangxi

    2011-01-01

    To solve data transmission problems of radiation area monitoring system, Wireless transmission platform is built based on ZigBee module, thus wireless transmission between the radiation area central node and the monitoring points is achieved. It introduces the framework of ZigBee protocol, APL applications between FFD and RFD module, FFD, module and central node host, and RFD module and monitoring equipment, are developed using simplified protocol stack. Wireless network is set up using a FFD module and two RFD modules, the results show that RSSI are above 50, and the data communication is normal for the transmission distance of 60 m. (authors)

  17. Adaptive Relay Activation in the Network Coding Protocols

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2015-01-01

    State-of-the-art Network coding based routing protocols exploit the link quality information to compute the transmission rate in the intermediate nodes. However, the link quality discovery protocols are usually inaccurate, and introduce overhead in wireless mesh networks. In this paper, we presen...

  18. Alternative approaches to transmission investment

    Energy Technology Data Exchange (ETDEWEB)

    Welch, J.L. [International Transmission Co., Detroit, MI (United States)

    2004-07-01

    The International Transmission Company (ITC) is an independent power transmission company that owns, operates and maintains the high voltage transmission system in southeastern Michigan. The company's current focus is on investing in the transmission infrastructure to improve reliability, relieve congestion, improve access to generation and reduce energy costs for consumers. There is a need for investment in power transmission. Trends indicate that power transactions are on the rise while transmission investment is lagging because pricing protocols are inadequate and there is no regional tariff mechanism to allocate the benefits of new investment. The presentation reviewed the applicability of FTRs to transmission owners and the pitfalls of participant funding pricing. It also outlined the regional benefit allocation mechanism (RBAM) with an illustrative example. It was concluded that existing pricing policies must be improved to address the growing need for transmission investment. RBAM is needed to help investors recover costs from project beneficiaries. figs.

  19. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  20. Improving UDP/IP Transmission Without Increasing Congestion

    Science.gov (United States)

    Burleigh, Scott

    2006-01-01

    Datagram Retransmission (DGR) is a computer program that, within certain limits, ensures the reception of each datagram transmitted under the User Datagram Protocol/Internet Protocol. [User Datagram Protocol (UDP) is considered unreliable because it does not involve a reliability-ensuring connection-initiation dialogue between sender and receiver. UDP is well suited to issuing of many small messages to many different receivers.] Unlike prior software for ensuring reception of UDP datagrams, DGR does not contribute to network congestion by retransmitting data more frequently as an ever-increasing number of messages and acknowledgements is lost. Instead, DGR does just the opposite: DGR includes an adaptive timeout-interval- computing component that provides maximum opportunity for reception of acknowledgements, minimizing retransmission. By monitoring changes in the rate at which message-transmission transactions are completed, DGR detects changes in the level of congestion and responds by imposing varying degrees of delay on the transmission of new messages. In addition, DGR maximizes throughput by not waiting for acknowledgement of a message before sending the next message. All DGR communication is asynchronous, to maximize efficient utilization of network connections. DGR manages multiple concurrent datagram transmission and acknowledgement conversations.

  1. A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios.

    Science.gov (United States)

    Ai, Zheng-Yang; Zhou, Yu-Tong; Song, Fei

    2018-06-13

    It is knotty for current routing protocols to meet the needs of reliable data diffusion during the Internet of Things (IoT) deployments. Due to the random placement, limited resources and unattended features of existing sensor nodes, the wireless transmissions are easily exposed to unauthorized users, which becomes a vulnerable area for various malicious attacks, such as wormhole and Sybil attacks. However, the scheme based on geographic location is a suitable candidate to defend against them. This paper is inspired to propose a smart collaborative routing protocol, Geographic energy aware routing and Inspecting Node (GIN), for guaranteeing the reliability of data exchanging. The proposed protocol integrates the directed diffusion routing, Greedy Perimeter Stateless Routing (GPSR), and the inspecting node mechanism. We first discuss current wireless routing protocols from three diverse perspectives (improving transmission rate, shortening transmission range and reducing transmission consumption). Then, the details of GIN, including the model establishment and implementation processes, are presented by means of the theoretical analysis. Through leveraging the game theory, the inspecting node is elected to monitor the network behaviors. Thirdly, we evaluate the network performances, in terms of transmission delay, packet loss ratio, and throughput, between GIN and three traditional schemes (i.e., Flooding, GPSR, and GEAR). The simulation results illustrate that the proposed protocol is able to outperform the others.

  2. A Comparative Analysis of Transmission Control Protocol Improvement Techniques over Space-Based Transmission Media

    National Research Council Canada - National Science Library

    Lawson, Joseph M

    2006-01-01

    ... justification for the implementation of a given enhancement technique. The research questions were answered through model and simulation of a satellite transmission system via a Linux-based network topology...

  3. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Popovski, Petar

    2018-01-01

    In many practical wireless systems, the signal-to-interference-and-noise ratio (SINR) that is applicable to a certain transmission, referred to as channel state information (CSI), can only be learned after the transmission has taken place and is thereby delayed (outdated). In such systems, hybrid...... automatic repeat request (HARQ) protocols are often used to achieve high throughput with low latency. This paper put forth the family of expandable message space (EMS) protocols that generalize the HARQ protocol and allow for rate adaptation based on delayed CSI at the transmitter (CSIT). Assuming a block...

  4. Adaptive transmission based on multi-relay selection and rate-compatible LDPC codes

    Science.gov (United States)

    Su, Hualing; He, Yucheng; Zhou, Lin

    2017-08-01

    In order to adapt to the dynamical changeable channel condition and improve the transmissive reliability of the system, a cooperation system of rate-compatible low density parity check (RC-LDPC) codes combining with multi-relay selection protocol is proposed. In traditional relay selection protocol, only the channel state information (CSI) of source-relay and the CSI of relay-destination has been considered. The multi-relay selection protocol proposed by this paper takes the CSI between relays into extra account in order to obtain more chances of collabration. Additionally, the idea of hybrid automatic request retransmission (HARQ) and rate-compatible are introduced. Simulation results show that the transmissive reliability of the system can be significantly improved by the proposed protocol.

  5. Improving a mother to child HIV transmission programme through health system redesign: quality improvement, protocol adjustment and resource addition.

    Directory of Open Access Journals (Sweden)

    Michele S Youngleson

    2010-11-01

    Full Text Available Health systems that deliver prevention of mother to child transmission (PMTCT services in low and middle income countries continue to underperform, resulting in thousands of unnecessary HIV infections of newborns each year. We used a combination of approaches to health systems strengthening to reduce transmission of HIV from mother to infant in a multi-facility public health system in South Africa.All primary care sites and specialized birthing centers in a resource constrained sub-district of Cape Metro District, South Africa, were enrolled in a quality improvement (QI programme. All pregnant women receiving antenatal, intrapartum and postnatal infant care in the sub-district between January 2006 and March 2009 were included in the intervention that had a prototype-innovation phase and a rapid spread phase. System changes were introduced to help frontline healthcare workers to identify and improve performance gaps at each step of the PMTCT pathway. Improvement was facilitated and spread through the use of a Breakthrough Series Collaborative that accelerated learning and the spread of successful changes. Protocol changes and additional resources were introduced by provincial and municipal government. The proportion of HIV-exposed infants testing positive declined from 7.6% to 5%. Key intermediate PMTCT processes improved (antenatal AZT increased from 74% to 86%, PMTCT clients on HAART at the time of labour increased from 10% to 25%, intrapartum AZT increased from 43% to 84%, and postnatal HIV testing from 79% to 95% compared to baseline.System improvement methods, protocol changes and addition/reallocation of resources contributed to improved PMTCT processes and outcomes in a resource constrained setting. The intervention requires a clear design, leadership buy-in, building local capacity to use systems improvement methods, and a reliable data system. A systems improvement approach offers a much needed approach to rapidly improve under

  6. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  7. Some Protocols For Optical-Fiber Digital Communications

    Science.gov (United States)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  8. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  9. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  10. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  11. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  12. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  13. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  14. Towards designing energy-efficient routing protocol for wireless mesh networks

    CSIR Research Space (South Africa)

    Dludla, AG

    2009-08-01

    Full Text Available Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based...

  15. Data transmission optical link for RF-GUN project

    Science.gov (United States)

    Olowski, Krzysztof; Zielinski, Jerzy; Jalmuzna, Wojciech; Pozniak, Krzysztof; Romaniuk, Ryszard

    2005-09-01

    Today, the fast optical data transmission is one of the fundamentals of modern distributed control systems. The fibers are widely use as multi-gigabit data stream medium. For a short range transmission, the multimode fibers are in common use. The data rate for this kind of transmission exceeds 10 Gbps for 10 Gigabit Ethernet and 10G Fibre Channel protocols. The Field Programmable Gate Arrays are one of the opportunities of managing the optical transmission. This article is concerning a synchronous optical transmission system via a multimode fiber. The transmission is controlled by the FPGA of two manufacturers: Xilinx and Altera. This paper contains the newest technology overview and market device parameters. It also describes a board for the optical transmission, technical details of the transmission and optical transmission results.

  16. BTP: a Block Transfer Protocol for Delay Tolerant Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Biagioni, Edoardo S.

    2010-01-01

    Wireless sensor networks that are energy-constrained must transmit and receive data as efficiently as possible.  If the transmission is delay tolerant, transferring blocks of accumulated data can be more efficient than transferring each sensed measurement as soon as it is available.  This paper...... proposes a Block Transfer Protocol (BTP) designed for efficient and reliable transmission in wireless sensor networks.  BTP reduces the time it takes to reliably transfer a block of packets compared to conventional link layer protocols, by piggybacking in data packets information about the transfer......, minimizing the number of acknowledgements needed for reliable transmission, and reducing the need for timeouts, which can substantially slow down communication when transmission is unreliable.  In addition, BTP improves reliability by handling false positive acknowledgements and by letting the receivers...

  17. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  18. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  19. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  20. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  1. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  2. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  3. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Osama Moh’d Alia

    2014-01-01

    Full Text Available Energy conservation in wireless sensor networks (WSNs is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network’s lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  4. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    Science.gov (United States)

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  5. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  6. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  7. High-Performance CCSDS AOS Protocol Implementation in FPGA

    Science.gov (United States)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  8. Rural emergency medical technician pre-hospital electrocardiogram transmission.

    Science.gov (United States)

    Powell, A M; Halon, J M; Nelson, J

    2014-01-01

    Emergent care of the acute heart attack patient continues to be at the forefront of quality and cost reduction strategies throughout the healthcare industry. Although the average cardiac door-to-balloon (D2B) times have decreased substantially over the past few years, there are still vast disparities found in D2B times in populations that reside in rural areas. Such disparities are mostly related to prolonged travel time and subsequent delays in cardiac catherization lab team activation. Urban ambulance companies that are routinely staffed with paramedic level providers have been successful in the implementation of pre-hospital 12-lead electrocardiogram (ECG) protocols as a strategy to reduce D2B times. The authors sought to evaluate the evidence related to the risk and benefits associated with the replication of an ECG transmission protocol in a small rural emergency medical service. The latter is staffed with emergency medical technician-basics (EMT-B), emergency medical technician-advanced (EMT-A), and emergency medical technician-intermediate (EMT-I) level. The evidence reviewed was limited to studies with relevant data regarding the challenges and complexities of the ECG transmission process, the difficulties associated with ECG transmission in rural settings, and ECG transmission outcomes by provider level. The evidence supports additional research to further evaluate the feasibility of ECG transmission at the non-paramedic level. Multiple variables must be investigated including equipment cost, utilization, and rural transmission capabilities. Clearly, pre-hospital ECG transmission and early activation of the cardiac catheterization laboratory are critical components to successfully decreasing D2B times.

  9. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  10. Investigating a reduced size real-time transport protocol for low-bandwidth networks

    CSIR Research Space (South Africa)

    Kakande, JN

    2011-09-01

    Full Text Available in this work as RTP-Lite, requires investigation. A cyclical approach to compression of the RTP headers was used with different compression cycle patterns for Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) transport. Measurements over...

  11. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  12. Mosquito transmission of the rodent malaria parasite Plasmodium chabaudi

    Directory of Open Access Journals (Sweden)

    Spence Philip J

    2012-12-01

    Full Text Available Abstract Background Serial blood passage of Plasmodium increases virulence, whilst mosquito transmission inherently regulates parasite virulence within the mammalian host. It is, therefore, imperative that all aspects of experimental malaria research are studied in the context of the complete Plasmodium life cycle. Methods Plasmodium chabaudi chabaudi displays many characteristics associated with human Plasmodium infection of natural mosquito vectors and the mammalian host, and thus provides a unique opportunity to study the pathogenesis of malaria in a single infection setting. An optimized protocol that permits efficient and reproducible vector transmission of P. c. chabaudi via Anopheles stephensi was developed. Results and conclusions This protocol was utilized for mosquito transmission of genetically distinct P. c. chabaudi isolates, highlighting differential parasite virulence within the mosquito vector and the spectrum of host susceptibility to infection initiated via the natural route, mosquito bite. An apposite experimental system in which to delineate the pathogenesis of malaria is described in detail.

  13. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    OpenAIRE

    Townsend, Ben; Abawajy, Jemal; Kim, Tai-Hoon

    2011-01-01

    People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase...

  14. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  15. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  16. Secure and Reliable IPTV Multimedia Transmission Using Forward Error Correction

    Directory of Open Access Journals (Sweden)

    Chi-Huang Shih

    2012-01-01

    Full Text Available With the wide deployment of Internet Protocol (IP infrastructure and rapid development of digital technologies, Internet Protocol Television (IPTV has emerged as one of the major multimedia access techniques. A general IPTV transmission system employs both encryption and forward error correction (FEC to provide the authorized subscriber with a high-quality perceptual experience. This two-layer processing, however, complicates the system design in terms of computational cost and management cost. In this paper, we propose a novel FEC scheme to ensure the secure and reliable transmission for IPTV multimedia content and services. The proposed secure FEC utilizes the characteristics of FEC including the FEC-encoded redundancies and the limitation of error correction capacity to protect the multimedia packets against the malicious attacks and data transmission errors/losses. Experimental results demonstrate that the proposed scheme obtains similar performance compared with the joint encryption and FEC scheme.

  17. Maritime wideband communication networks video transmission scheduling

    CERN Document Server

    Yang, Tingting

    2014-01-01

    This Springer Brief covers emerging maritime wideband communication networks and how they facilitate applications such as maritime distress, urgency, safety and general communications. It provides valuable insight on the data transmission scheduling and protocol design for the maritime wideband network. This brief begins with an introduction to maritime wideband communication networks including the architecture, framework, operations and a comprehensive survey on current developments. The second part of the brief presents the resource allocation and scheduling for video packet transmission wit

  18. Energy Consumption Research of Mobile Data Collection Protocol for Underwater Nodes Using an USV

    Directory of Open Access Journals (Sweden)

    Zhichao Lv

    2018-04-01

    Full Text Available The Unmanned Surface Vehicle (USV integrated with an acoustic modem is a novel mobile vehicle for data collection, which has an advantage in terms of mobility, efficiency, and collection cost. In the scenario of data collection, the USV is controlled autonomously along the planning trajectory and the data of underwater nodes are dynamically collected. In order to improve the efficiency of data collection and extend the life of the underwater nodes, a mobile data collection protocol for underwater nodes using the USV was proposed. In the protocol, the stop-and-wait ARQ transmission mechanism is adopted, where the duty cycle is designed considering the ratio between the sleep mode and the detection mode, and the transmission ratio is defined by the duty cycle, wake-up signal cycles, and USV’s speed. According to protocol, the evaluation index for energy consumption is constructed based on the duty cycle and the transmission ratio. The energy consumption of the protocol is simulated and analyzed using the mobile communication experiment data of USV, taking into consideration USV’s speed, data sequence length, and duty cycle. Optimized protocol parameters are identified, which in turn denotes the proposed protocol’s feasibility and effectiveness.

  19. Performance of amplify-and-forward multihop transmission over relay clusters with different routing strategies

    KAUST Repository

    Yilmaz, Ferkan; Khan, Fahd Ahmed; Alouini, Mohamed-Slim

    2014-01-01

    We consider a multihop relay network in which two terminals are communicating with each other via a number of cluster of relays. Performance of such networks depends on the routing protocols employed. In this paper, we find the expressions for the Average Symbol Error Probability (ASEP) performance of Amplify-and-Forward (AF) multihop transmission for the simplest routing protocol in which the relay transmits using the channel having the best Signal to Noise Ratio (SNR). The ASEP performance of a better protocol proposed in Gui et al. (2009) known as the adhoc protocol is also analyzed. The derived expressions for the performance are a convenient tool to analyze the performance of AF multihop transmission over relay clusters. Monte-Carlo simulations verify the correctness of the proposed formulation and are in agreement with analytical results. Furthermore, we propose new generalized protocols termed as last-nhop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol, to get improved ASEP performances. The ASEP performance of these proposed schemes is analysed by computer simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forwardbackward variant. The complexity of the protocols is also studied. Copyright © 2014 Inderscience Enterprises Ltd.

  20. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  1. Nuclear data transmission based on zigbee

    International Nuclear Information System (INIS)

    Cui Yan; Fang Fang; Chen Wei; Jiang Zancheng

    2007-01-01

    Zigbee, a new wireless communication protocol, which is an important technology supporting wireless sensor networks. We introduce a solution of nuclear data transmission based on zigbee, the cc2420 build up the core of the data acquisition module and the wireless transceive module, and realized remote monitor and nuclear data quickly analysis. (authors)

  2. Multi-protocol header generation system

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, David A.; Ignatowski, Michael; Jayasena, Nuwan; Loh, Gabriel

    2017-09-05

    A communication device includes a data source that generates data for transmission over a bus, and a data encoder that receives and encodes outgoing data. An encoder system receives outgoing data from a data source and stores the outgoing data in a first queue. An encoder encodes outgoing data with a header type that is based upon a header type indication from a controller and stores the encoded data that may be a packet or a data word with at least one layered header in a second queue for transmission. The device is configured to receive at a payload extractor, a packet protocol change command from the controller and to remove the encoded data and to re-encode the data to create a re-encoded data packet and placing the re-encoded data packet in the second queue for transmission.

  3. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  4. Effective Data Acquisition Protocol for Multi-Hop Heterogeneous Wireless Sensor Networks Using Compressive Sensing

    Directory of Open Access Journals (Sweden)

    Ahmed M. Khedr

    2015-10-01

    Full Text Available In designing wireless sensor networks (WSNs, it is important to reduce energy dissipation and prolong network lifetime. Clustering of nodes is one of the most effective approaches for conserving energy in WSNs. Cluster formation protocols generally consider the heterogeneity of sensor nodes in terms of energy difference of nodes but ignore the different transmission ranges of them. In this paper, we propose an effective data acquisition clustered protocol using compressive sensing (EDACP-CS for heterogeneous WSNs that aims to conserve the energy of sensor nodes in the presence of energy and transmission range heterogeneity. In EDACP-CS, cluster heads are selected based on the distance from the base station and sensor residual energy. Simulation results show that our protocol offers a much better performance than the existing protocols in terms of energy consumption, stability, network lifetime, and throughput.

  5. [Perinatal HIV transmission prophylaxis in the Liege region].

    Science.gov (United States)

    Jacquet, Y; Hoyoux, C; Dresse, M F

    1998-08-01

    In Liège, since February 1994, Protocole ACTG 076 has been followed for prevention of perinatal transmission of VIH. The pregnant women are treated by AZT during pregnancy and delivery. The newborn is also treated during 6 weeks. Following this treatment strategy, vertical transmission rate of VIH has dropped from 25.6% to 8.7%. The PCR is particulary promising for the early detection of infection in newborn, but definitive conclusion about infective status of the newborn can't be done during the first week of life. The potential role of intrapartum transmission is now under evaluation in the hope to establish the safest mode of delivery.

  6. A Review of Communications Protocol for Intelligent Remote Terminal Unit Development

    Directory of Open Access Journals (Sweden)

    Mohd Ruddin Ab. Ghani

    2013-11-01

    Full Text Available This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU. Supervisory Control and Data Acquisition (SCADA system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI and International Standard Organization (ISO. The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3, controller area network (CAN, International Electro-technical Commission (IEC 60870, transmission control protocol/internet protocol (TCP/IP.

  7. Prioritizing Signaling Information Transmission in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Jasmina Baraković

    2011-01-01

    Full Text Available Next generation transport network is characterized by the use of in-band signaling, where Internet Protocol (IP packets carrying signaling or media information are mixed in transmission. Since transport resources are limited, when any segment of access or core network is congested, IP packets carrying signaling information may be discarded. As a consequence, it may be impossible to implement reachability and quality of service (QoS. Since present approaches are insufficient to completely address this problem, a novel approach is proposed, which is based on prioritizing signaling information transmission. To proof the concept, a simulation study was performed using Network Simulator version 2 (ns-2 and independently developed Session Initiation Protocol (SIP module. The obtained results were statistically processed using Statistical Package for the Social Sciences (SPSS version 15.0. Summarizing our research results, several issues are identified for future work.

  8. Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network

    Science.gov (United States)

    Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru

    Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.

  9. Protocol: Transmission and prevention of influenza in Hutterites: Zoonotic transmission of influenza A: swine & swine workers

    Directory of Open Access Journals (Sweden)

    Loeb Mark

    2009-11-01

    Full Text Available Abstract Background Among swine, reassortment of influenza virus genes from birds, pigs, and humans could generate influenza viruses with pandemic potential. Humans with acute infection might also be a source of infection for swine production units. This article describes the study design and methods being used to assess influenza A transmission between swine workers and pigs. We hypothesize that transmission of swine influenza viruses to humans, transmission of human influenza viruses to swine, and reassortment of human and swine influenza A viruses is occurring. The project is part of a Team Grant; all Team Grant studies include active surveillance for influenza among Hutterite swine farmers in Alberta, Canada. This project also includes non-Hutterite swine farms that are experiencing swine respiratory illness. Methods/Design Nurses conduct active surveillance for influenza-like-illness (ILI, visiting participating communally owned and operated Hutterite swine farms twice weekly. Nasopharyngeal swabs and acute and convalescent sera are obtained from persons with any two such symptoms. Swabs are tested for influenza A and B by a real time RT-PCR (reverse transcriptase polymerase chain reaction at the Alberta Provincial Laboratory for Public Health (ProvLab. Test-positive participants are advised that they have influenza. The occurrence of test-positive swine workers triggers sampling (swabbing, acute and convalescent serology of the swine herd by veterinarians. Specimens obtained from swine are couriered to St. Jude Children's Research Hospital, Memphis, TN for testing. Veterinarians and herd owners are notified if animal specimens are test-positive for influenza. If swine ILI occurs, veterinarians obtain samples from the pigs; test-positives from the animals trigger nurses to obtain specimens (swabbing, acute and convalescent serology from the swine workers. ProvLab cultures influenza virus from human specimens, freezes these cultures and

  10. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  11. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  12. MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME

    Directory of Open Access Journals (Sweden)

    R. Shalin

    2012-09-01

    Full Text Available The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion. In order to provide a efficient communication it is necessary to recover the loss of packets. The proposed scheme implements Hash based FEC with auto XOR scheme for this purpose. The scheme is implemented through Forward error correction, MD5 and XOR for providing efficient transmission of multimedia data. The proposed scheme provides transmission high accuracy, throughput and low latency and loss.

  13. A Power-Efficient Access Point Operation for Infrastructure Basic Service Set in IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Hua Ye Ming

    2006-01-01

    Full Text Available Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handheld devices with wireless LAN capability. In this paper, a hybrid protocol named improved PCF operation is proposed, which intelligently chooses the access point- (AP- assisted DCF (distributed coordinator function and enhanced PCF (point coordinator function transmission mechanism of IEEE 802.11 protocol in an infrastructure-based wireless LAN environment. Received signal strength indicator (RSSI is used to determine the tradeoff between direct mobile-to-mobile transmission and transmission routed by AP. Based on the estimation, mobile stations can efficiently communicate directly instead of being routed through AP if they are in the vicinity of each other. Furthermore, a smart AP protocol is proposed as extension to the improved PCF operation by utilizing the historical end-to-end delay information to decide the waking up time of mobile stations. Simulation results show that using the proposed protocol, energy consumption of mobile devices can be reduced at the cost of slightly longer end-to-end packet delay compared to traditional IEEE 802.11 PCF protocol. However, in a non-time-critical environment, this option can significantly prolong the operation time of mobile devices.

  14. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    Science.gov (United States)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  15. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  16. Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices

    Directory of Open Access Journals (Sweden)

    Zhiwei Wang

    2017-01-01

    Full Text Available Smart grid aims to improve the reliability, efficiency, and security of the traditional grid, which allows two-way transmission and efficiency-driven response. However, a main concern of this new technique is that the fine-grained metering data may leak the personal privacy information of the customers. Thus, the data aggregation mechanism for privacy protection is required for the meter report protocol in smart grid. In this paper, we propose an efficient privacy-preserving meter report protocol for the isolated smart grid devices. Our protocol consists of an encryption scheme with additively homomorphic property and a linearly homomorphic signature scheme, where the linearly homomorphic signature scheme is suitable for privacy-preserving data aggregation. We also provide security analysis of our protocol in the context of some typical attacks in smart grid. The implementation of our protocol on the Intel Edison platform shows that our protocol is efficient enough for the physical constrained devices, like smart meters.

  17. Transmission Algorithm with QoS Considerations for a Sustainable MPEG Streaming Service

    Directory of Open Access Journals (Sweden)

    Sang-Hyong Kim

    2017-03-01

    Full Text Available With the proliferation of heterogeneous networks, there is a need to provide multimedia stream services in a sustainable manner. It is especially critical to maintain the Quality of Service (QoS standards. Existing multimedia streaming services have been studied to guarantee QoS on the receiving side. QoS has not been ensured due to the fact that the loss of streaming data to be transmitted has not been considered in network conditions. With an algorithm that considers the QoS and can reduce the overhead of the network, it will be possible to reduce the transmission error and wastage of communication network resources. In this paper, we propose a scheme that improves the reliability of multimedia transmissions by using an adaptive algorithm that switches between UDP (User Datagram Protocol and TCP (Transmission Control Protocol based on the size of the data. In addition, we present a method that retransmits essential portions of the multimedia data, thus improving transmission efficiency. We simulate an MPEG (Moving Picture Experts Group stream service and evaluate the performance of the proposed adaptive MPEG stream service.

  18. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    Science.gov (United States)

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  19. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  20. Improving Wojcik's eavesdropping attack on the ping-pong protocol

    International Nuclear Information System (INIS)

    Zhang Zhanjun; Man Zhongxiao; Li Yong

    2004-01-01

    The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme only induces half of the eavesdropping-induced channel loss in Wojcik's scheme, therefore, in a larger domain of the quantum channel transmission efficiency η, i.e., [0,75%], the eavesdropper Eve can attack all the transmitted bits. The improvement of the ping-pong protocol security produced by Wojcik's is also suitable for our eavesdropping attack

  1. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  2. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  3. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  4. Implementation of two-party protocols in the noisy-storage model

    International Nuclear Information System (INIS)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-01-01

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  5. Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

    International Nuclear Information System (INIS)

    Chen-Xu, Feng; Rong-Zhen, Jiao; Wen-Han, Zhang

    2008-01-01

    The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310 nm up-conversion single-photon detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved. (general)

  6. Surgical protocol for confirmed or suspected cases of Ebola and other highly transmissible diseases.

    Science.gov (United States)

    Badia, Josep M; Rubio-Pérez, Inés; Arias Díaz, Javier; Guirao Garriga, Xavier; Serrablo, Alejandro; Jover Navalón, José M

    2016-01-01

    Outbreaks of viral haemorrhagic fevers such as Ebola can lead to imported cases in Europe and America. The eventuality of surgery in the setting of Ebola Virus Disease (EVD) is low, but the Spanish Association of Surgeons elaborated a surgical protocol for EVD. Elective surgical procedures are not indicated. Emergency cases can be considered in: persons under investigation, possible cases and early confirmed cases. In some conditions usually treated by surgery a medical treatment can be tested. All cases must be treated in high technology hospitals. These hospitals must be equipped with adequate means for healthcare provider's protection. All members of the healthcare team should practice thorough simulation prior to caring for a possible Ebola patient. This protocol is based on international guidelines on use of Personal Protective Equipment, protocols of other scientific societies, and specific recommendations for the operating room environment. Copyright © 2015 AEC. Publicado por Elsevier España, S.L.U. All rights reserved.

  7. FPGA Implementation of Video Transmission System Based on LTE

    Directory of Open Access Journals (Sweden)

    Lu Yan

    2015-01-01

    Full Text Available In order to support high-definition video transmission, an implementation of video transmission system based on Long Term Evolution is designed. This system is developed on Xilinx Virtex-6 FPGA ML605 Evaluation Board. The paper elaborates the features of baseband link designed in Xilinx ISE and protocol stack designed in Xilinx SDK, and introduces the process of setting up hardware and software platform in Xilinx XPS. According to test, this system consumes less hardware resource and is able to transmit bidirectional video clearly and stably.

  8. An Energy-Efficient and High-Quality Video Transmission Architecture in Wireless Video-Based Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yasaman Samei

    2008-08-01

    Full Text Available Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN. With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture. This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.

  9. An Energy-Efficient and High-Quality Video Transmission Architecture in Wireless Video-Based Sensor Networks.

    Science.gov (United States)

    Aghdasi, Hadi S; Abbaspour, Maghsoud; Moghadam, Mohsen Ebrahimi; Samei, Yasaman

    2008-08-04

    Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS) and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN). With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture). This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.

  10. Automated transmission system operation and management : meeting stakeholder information needs

    Energy Technology Data Exchange (ETDEWEB)

    Peelo, D.F.; Toom, P.O. [British Columbia Hydro, Vancouver, BC (Canada)

    1998-12-01

    Information monitoring is considered to be the fundamental basis for moving beyond substation automation and into automated transmission system operation and management. Information monitoring was defined as the acquisition of data and processing the data into decision making. Advances in digital technology and cheaper, more powerful computing capability has made it possible to capture all transmission stakeholder needs in a shared and automated operation and management system. Recognizing that the key to success in the development of transmission systems is automation, BC Hydro has initiated a long-term research and development project to develop the structure and detail of transmission system automation. The involvement of partners, be they utility or equipment suppliers, is essential in order to deal with protocol and similar issues. 3 refs., 1 tab., 3 figs.

  11. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  12. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  13. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  14. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  15. Timing Analysis of Rate Constrained Traffic for the TTEthernet Communication Protocol

    DEFF Research Database (Denmark)

    Tamas-Selicean, Domitian; Pop, Paul; Steiner, Wilfried

    2015-01-01

    Ethernet is a low-cost communication solution offering high transmission speeds. Although its applications extend beyond computer networking, Ethernet is not suitable for real-time and safety-critical systems. To alleviate this, several real-time Ethernet-based communication protocols have been...

  16. A new architecture and MAC protocol for fully flexible hybrid WDM/TDM PON

    NARCIS (Netherlands)

    Das, G.; Lannoo, B.; Jung, H.D.; Koonen, A.M.J.; Colle, D.; Pickavet, M.; Demeester, P.

    2009-01-01

    In this paper we propose a novel architecture and MAC protocol for a scalable, cost effective WDM / TDM PON providing fully flexible dynamic bandwidth allocation for upstream and downstream data transmission.

  17. Exploring the potential of expatriate social networks to reduce HIV and STI transmission: a protocol for a qualitative study.

    Science.gov (United States)

    Crawford, Gemma; Bowser, Nicole Jasmine; Brown, Graham Ernest; Maycock, Bruce Richard

    2013-01-01

    HIV diagnoses acquired among Australian men working or travelling overseas including  Southeast Asia are increasing. This change within transmission dynamics means traditional approaches to prevention need to be considered in new contexts. The significance and role of social networks in mediating sexual risk behaviours may be influential. Greater understanding of expatriate and traveller behaviour is required to understand how local relationships are formed, how individuals enter and are socialised into networks, and how these networks may affect sexual intentions and behaviours. This paper describes the development of a qualitative protocol to investigate how social networks of Australian expatriates and long-term travellers might support interventions to reduce transmission of HIV and sexually transmitted infections. To explore the interactions of male expatriates and long-term travellers within and between their environments, symbolic interactionism will be the theoretical framework used. Grounded theory methods provide the ability to explain social processes through the development of explanatory theory. The primary data source will be interviews conducted in several rounds in both Australia and Southeast Asia. Purposive and theoretical sampling will be used to access participants whose data can provide depth and individual meaning. The role of expatriate and long-term traveller networks and their potential to impact health are uncertain. This study seeks to gain a deeper understanding of the Australian expatriate culture, behavioural contexts and experiences within social networks in  Southeast Asia. This research will provide tangible recommendations for policy and practice as the findings will be disseminated to health professionals and other stakeholders, academics and the community via local research and evaluation networks, conference presentations and online forums. The Curtin University Human Research Ethics Committee has granted approval for this

  18. Exploring the potential of expatriate social networks to reduce HIV and STI transmission: a protocol for a qualitative study

    Science.gov (United States)

    Crawford, Gemma; Bowser, Nicole Jasmine; Brown, Graham Ernest; Maycock, Bruce Richard

    2013-01-01

    Introduction HIV diagnoses acquired among Australian men working or travelling overseas including  Southeast Asia are increasing. This change within transmission dynamics means traditional approaches to prevention need to be considered in new contexts. The significance and role of social networks in mediating sexual risk behaviours may be influential. Greater understanding of expatriate and traveller behaviour is required to understand how local relationships are formed, how individuals enter and are socialised into networks, and how these networks may affect sexual intentions and behaviours. This paper describes the development of a qualitative protocol to investigate how social networks of Australian expatriates and long-term travellers might support interventions to reduce transmission of HIV and sexually transmitted infections. Methods and analysis To explore the interactions of male expatriates and long-term travellers within and between their environments, symbolic interactionism will be the theoretical framework used. Grounded theory methods provide the ability to explain social processes through the development of explanatory theory. The primary data source will be interviews conducted in several rounds in both Australia and Southeast Asia. Purposive and theoretical sampling will be used to access participants whose data can provide depth and individual meaning. Ethics and dissemination The role of expatriate and long-term traveller networks and their potential to impact health are uncertain. This study seeks to gain a deeper understanding of the Australian expatriate culture, behavioural contexts and experiences within social networks in  Southeast Asia. This research will provide tangible recommendations for policy and practice as the findings will be disseminated to health professionals and other stakeholders, academics and the community via local research and evaluation networks, conference presentations and online forums. The Curtin University Human

  19. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  20. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-01-01

    Full Text Available Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3 design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  1. Design of data transmission for a portable DAQ system

    International Nuclear Information System (INIS)

    Zhou Wenxiong; Nan Gangyang; Zhang Jianchuan; Wang Yanyu

    2014-01-01

    Field Programmable Gate Array (FPGA), combined with ARM (Advanced RISC Machines) is increasingly employed in the portable data acquisition (DAQ) system for nuclear experiments to reduce the system volume and achieve powerful and multifunctional capacity. High-speed data transmission between FPGA and ARM is one of the most challenging issues for system implementation. In this paper, we propose a method to realize the high-speed data transmission by using the FPGA to acquire massive data from FEE (Front-end electronics) and send it to the ARM whilst the ARM to transmit the data to the remote computer through the TCP/IP protocol for later process. This paper mainly introduces the interface design of the high-speed transmission method between the FPGA and the ARM, the transmission logic of the FPGA, and the program design of the ARM. The theoretical research shows that the maximal transmission speed between the FPGA and the ARM through this way can reach 50 MB/s. In a realistic nuclear physics experiment, this portable DAQ system achieved 2.2 MB/s data acquisition speed. (authors)

  2. Rate of transmission: a major determinant of the cost of clinical mastitis.

    Science.gov (United States)

    Down, P M; Green, M J; Hudson, C D

    2013-10-01

    The aim of this research was to use probabilistic sensitivity analysis to evaluate the relative importance of different components of a model designed to estimate the cost of clinical mastitis (CM). A particular focus was placed on the importance of pathogen transmission relative to other factors, such as milk price or treatment costs. A stochastic Monte Carlo model was developed to simulate a case of CM at the cow level and to calculate the associated costs for 5 defined treatment protocols. The 5 treatment protocols modeled were 3 d of antibiotic intramammary treatment, 5 d of antibiotic intramammary treatment, 3 d of intramammary and systemic antibiotic treatment, 3d of intramammary and systemic antibiotic treatment plus 1 d of nonsteroidal antiinflammatory drug treatment, and 5 d of intramammary and systemic antibiotic treatment. Uniform distributions were used throughout the model to enable investigation of the cost of CM over a spectrum of clinically realistic scenarios without specifying which scenario was more or less likely. A risk of transmission parameter distribution, based on literature values, was included to model the effect of pathogen transmission to uninfected cows, from cows that remained subclinically infected after treatment for CM. Spearman rank correlation coefficients were used to evaluate the relationships between model input values and the estimated cost of CM. Linear regression models were used to explore the effect that changes to specific independent variables had on the cost of CM. Risk of transmission was found to have the strongest association with the cost of CM, followed by bacteriological cure rate, cost of culling, and yield loss. Other factors such as milk price, cost of labor, and cost of medicines were of minimal influence in comparison. The cost of CM was similar for all 5 treatment protocols. The results from this study suggest that, when seeking to minimize the economic impact of CM in dairy herds, great emphasis should be

  3. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  4. Energy neutral protocol based on hierarchical routing techniques for energy harvesting wireless sensor network

    Science.gov (United States)

    Muhammad, Umar B.; Ezugwu, Absalom E.; Ofem, Paulinus O.; Rajamäki, Jyri; Aderemi, Adewumi O.

    2017-06-01

    Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting techniques together with proper routing protocols, an Energy Neutral state can be achieved so that sensor nodes can run perpetually. In this paper, we propose an Energy Neutral LEACH routing protocol which is an extension to the traditional LEACH protocol. The goal of the proposed protocol is to use Gateway node in each cluster so as to reduce the data transmission ranges of cluster head nodes. Simulation results show that the proposed routing protocol achieves a higher throughput and ensure the energy neutral status of the entire network.

  5. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  6. Adaptive Beaconing in Mobility Aware Clustering Based MAC Protocol for Safety Message Dissemination in VANET

    Directory of Open Access Journals (Sweden)

    Nishu Gupta

    2017-01-01

    Full Text Available Majority of research contributions in wireless access in vehicular environment (WAVE/IEEE 802.11p standard focus on life critical safety-related applications. These applications require regular status update of vehicle’s position referred to as beaconing. Periodic beaconing in vehicle to vehicle communication leads to severe network congestion in the communication channel. The condition worsens under high vehicular density where it impacts reliability and upper bound latency of safety messages. In this paper, WAVE compliant enhancement to the existing IEEE 802.11p protocol is presented which targets prioritized delivery of safety messages while simultaneously provisioning the dissemination of nonsafety messages. Proposed scheme relies on dynamic generation of beacons to mitigate channel congestion and inefficient bandwidth utilization by reducing transmission frequency of beacons. Through the use of clustering mechanism, different beaconing frequencies and different data transmission rates are assigned to prioritize vehicular mobility. Through extensive simulation results, the performance of the proposed approach is evaluated in terms of a wide range of quality of service (QoS parameters for two different transmission ranges. Results show that the proposed protocol provides significant enhancement and stability of the clustered topology in vehicular ad hoc network over existing standard and other protocols with similar applications.

  7. FPGA-based network data transmission scheme for CSNS

    International Nuclear Information System (INIS)

    Wang Xiuku; Zhang Hongyu; Gu Minhao; Xiao Liang

    2012-01-01

    This paper presents the FPGA-based network data transmission solutions for the Data Acquisition System of China Spallation Neutron Source (CSNS). The board with FPGA as the core is used as the hardware platform to realize the transmission of network data. A SOPC system is built and an embedded Linux is transplanted on PowerPC Core. An application program based on Linux has been finished to realize the data transmission via embedded Gigabit Ethernet. The relationship between network transfer performance and packet size was obtained by a test program. In addition, the paper also tried to realize some other ways to transfer data: transplanting PetaLinux on Microblaze, transplanting Lwip protocol stack on PowerPC Core and Microblaze. Their advantages and disadvantages are analyzed and compared in this paper, so that different options and recommendations can be given to meet the actual needs of different projects in the future. (authors)

  8. Persistent RCSMA: A MAC Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

    Directory of Open Access Journals (Sweden)

    J. Alonso-Zárate

    2008-05-01

    Full Text Available The persistent relay carrier sensing multiple access (PRCSMA protocol is presented in this paper as a novel medium access control (MAC protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

  9. Improving Wojcik's eavesdropping attack on the ping-pong protocol

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Zhanjun [Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China) and School of Physics and Material Science, Anhui University, Hefei 230039 (China)]. E-mail: zhangzj@wipm.ac.cn; Man Zhongxiao [Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China); Li Yong [Department of Physics, Central China Normal University, Wuhan 430079 (China)

    2004-11-29

    The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme only induces half of the eavesdropping-induced channel loss in Wojcik's scheme, therefore, in a larger domain of the quantum channel transmission efficiency {eta}, i.e., [0,75%], the eavesdropper Eve can attack all the transmitted bits. The improvement of the ping-pong protocol security produced by Wojcik's is also suitable for our eavesdropping attack.

  10. DESIGN OF CAUCUS MEDIUM ACCESS CONTROL (C-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS IN SMART GRIDS

    Directory of Open Access Journals (Sweden)

    JEETU SHARMA

    2017-10-01

    Full Text Available A Caucus-based medium access control protocol (C-MAC is proposed to reduce the end to end delay and battery consumption of the sensor nodes deployed in the monitoring of various smart grid regions, such as substation, pole and wires, perimeter security, real time and non-real-time monitoring using wireless sensor networks. The objective is to prolong the network lifetime and to reduce the end to end delay by mitigating the energy-hole problem and by eliminating bottlenecks significantly by using caucus based efficient synchronization techniques in multi-hop square grid topology of the wireless sensor networks (WSNs. The protocol self-reliantly and adaptively schedules node’s wake-up times, decreases idle listening and collisions, increases network throughput, and extends network lifetime. It induces a low duty cycle for adjusting wake-up times of sensor nodes. The appropriate selection of active and sleep time slots and next hop relay nodes are proposed to minimize the data transmission latency and to reduce battery consumption to increase the network lifetime. The uniform and synchronized transmission of the data packets is of prime importance to improve the network performance. Simulation results justify that the proposed C-MAC protocol increases the network lifetime, successful data transmission ratio along-with the reduction in end to end delay. The objective of this paper is to envisage benefits and utilization of C-MAC protocol for WSNs deployed in smart grids and to draw the attention of researchers in this area.

  11. AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzad Kiani

    2016-01-01

    Full Text Available Energy issue is one of the most important problems in wireless sensor networks. They consist of low-power sensor nodes and a few base station nodes. They must be adaptive and efficient in data transmission to sink in various areas. This paper proposes an aware-routing protocol based on clustering and recursive search approaches. The paper focuses on the energy efficiency issue with various measures such as prolonging network lifetime along with reducing energy consumption in the sensor nodes and increasing the system reliability. Our proposed protocol consists of two phases. In the first phase (network development phase, the sensors are placed into virtual layers. The second phase (data transmission is related to routes discovery and data transferring so it is based on virtual-based Classic-RBFS algorithm in the lake of energy problem environments but, in the nonchargeable environments, all nodes in each layer can be modeled as a random graph and then begin to be managed by the duty cycle method. Additionally, the protocol uses new topology control, data aggregation, and sleep/wake-up schemas for energy saving in the network. The simulation results show that the proposed protocol is optimal in the network lifetime and packet delivery parameters according to the present protocols.

  12. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-11-25

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  13. Interrupting transmission of soil-transmitted helminths: a study protocol for cluster randomised trials evaluating alternative treatment strategies and delivery systems in Kenya.

    Science.gov (United States)

    Brooker, Simon J; Mwandawiro, Charles S; Halliday, Katherine E; Njenga, Sammy M; Mcharo, Carlos; Gichuki, Paul M; Wasunna, Beatrice; Kihara, Jimmy H; Njomo, Doris; Alusala, Dorcas; Chiguzo, Athuman; Turner, Hugo C; Teti, Caroline; Gwayi-Chore, Claire; Nikolay, Birgit; Truscott, James E; Hollingsworth, T Déirdre; Balabanova, Dina; Griffiths, Ulla K; Freeman, Matthew C; Allen, Elizabeth; Pullan, Rachel L; Anderson, Roy M

    2015-10-19

    In recent years, an unprecedented emphasis has been given to the control of neglected tropical diseases, including soil-transmitted helminths (STHs). The mainstay of STH control is school-based deworming (SBD), but mathematical modelling has shown that in all but very low transmission settings, SBD is unlikely to interrupt transmission, and that new treatment strategies are required. This study seeks to answer the question: is it possible to interrupt the transmission of STH, and, if so, what is the most cost-effective treatment strategy and delivery system to achieve this goal? Two cluster randomised trials are being implemented in contrasting settings in Kenya. The interventions are annual mass anthelmintic treatment delivered to preschool- and school-aged children, as part of a national SBD programme, or to entire communities, delivered by community health workers. Allocation to study group is by cluster, using predefined units used in public health provision-termed community units (CUs). CUs are randomised to one of three groups: receiving either (1) annual SBD; (2) annual community-based deworming (CBD); or (3) biannual CBD. The primary outcome measure is the prevalence of hookworm infection, assessed by four cross-sectional surveys. Secondary outcomes are prevalence of Ascaris lumbricoides and Trichuris trichiura, intensity of species infections and treatment coverage. Costs and cost-effectiveness will be evaluated. Among a random subsample of participants, worm burden and proportion of unfertilised eggs will be assessed longitudinally. A nested process evaluation, using semistructured interviews, focus group discussions and a stakeholder analysis, will investigate the community acceptability, feasibility and scale-up of each delivery system. Study protocols have been reviewed and approved by the ethics committees of the Kenya Medical Research Institute and National Ethics Review Committee, and London School of Hygiene and Tropical Medicine. The study has a

  14. Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Naik, K.; Shihada, Basem

    2013-01-01

    This paper introduces a novel multicopy routing protocol, called Self-Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. SAURP is characterized by the ability of identifying potential opportunities for forwarding messages to their destinations via a novel utility function-based mechanism, in which a suite of environment parameters, such as wireless channel condition, nodal buffer occupancy, and encounter statistics, are jointly considered. Thus, SAURP can reroute messages around nodes experiencing high-buffer occupancy, wireless interference, and/or congestion, while taking a considerably small number of transmissions. The developed utility function in SAURP is proved to be able to achieve optimal performance, which is further analyzed via a stochastic modeling approach. Extensive simulations are conducted to verify the developed analytical model and compare the proposed SAURP with a number of recently reported encounter-based routing approaches in terms of delivery ratio, delivery delay, and the number of transmissions required for each message delivery. The simulation results show that SAURP outperforms all the counterpart multicopy encounter-based routing protocols considered in the study.

  15. Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-07-01

    This paper introduces a novel multicopy routing protocol, called Self-Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. SAURP is characterized by the ability of identifying potential opportunities for forwarding messages to their destinations via a novel utility function-based mechanism, in which a suite of environment parameters, such as wireless channel condition, nodal buffer occupancy, and encounter statistics, are jointly considered. Thus, SAURP can reroute messages around nodes experiencing high-buffer occupancy, wireless interference, and/or congestion, while taking a considerably small number of transmissions. The developed utility function in SAURP is proved to be able to achieve optimal performance, which is further analyzed via a stochastic modeling approach. Extensive simulations are conducted to verify the developed analytical model and compare the proposed SAURP with a number of recently reported encounter-based routing approaches in terms of delivery ratio, delivery delay, and the number of transmissions required for each message delivery. The simulation results show that SAURP outperforms all the counterpart multicopy encounter-based routing protocols considered in the study.

  16. Minimising the risk of prion transmission by contact tonometry.

    Science.gov (United States)

    Amin, S Z; Smith, L; Luthert, P J; Cheetham, M E; Buckley, R J

    2003-11-01

    The unknown prevalence of variant Creutzfeldt-Jakob disease (vCJD) in the UK population has led to fears of horizontal transmission through routine medical procedures. The potential risk of transmission via contact tonometry was examined. The total amount of protein carried over by tonometer tips after applanation of patients was assessed. Tonometer tips had an inherent ability to carry proteinaceous material. There was a large variability in the load carried over between individual patients. Rinsing tonometer tips in water reduced protein carryover. Wiping the tonometer tips also reduced carriage, though less dramatically. There is a small theoretical risk of transmission of vCJD by contact tonometry through reuse, but this should be reduced if the prisms are washed and wiped. In the light of these findings a protocol for the management of reusable tonometer prisms is recommended.

  17. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2004-01-01

    In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The

  18. An implementation of a data-transmission pipelining algorithm on Imote2 platforms

    Science.gov (United States)

    Li, Xu; Dorvash, Siavash; Cheng, Liang; Pakzad, Shamim

    2011-04-01

    Over the past several years, wireless network systems and sensing technologies have been developed significantly. This has resulted in the broad application of wireless sensor networks (WSNs) in many engineering fields and in particular structural health monitoring (SHM). The movement of traditional SHM toward the new generation of SHM, which utilizes WSNs, relies on the advantages of this new approach such as relatively low costs, ease of implementation and the capability of onboard data processing and management. In the particular case of long span bridge monitoring, a WSN should be capable of transmitting commands and measurement data over long network geometry in a reliable manner. While using single-hop data transmission in such geometry requires a long radio range and consequently a high level of power supply, multi-hop communication may offer an effective and reliable way for data transmissions across the network. Using a multi-hop communication protocol, the network relays data from a remote node to the base station via intermediary nodes. We have proposed a data-transmission pipelining algorithm to enable an effective use of the available bandwidth and minimize the energy consumption and the delay performance by the multi-hop communication protocol. This paper focuses on the implementation aspect of the pipelining algorithm on Imote2 platforms for SHM applications, describes its interaction with underlying routing protocols, and presents the solutions to various implementation issues of the proposed pipelining algorithm. Finally, the performance of the algorithm is evaluated based on the results of an experimental implementation.

  19. High–Speed Data Transmission Subsystem of the SEOSAR/PAZ Satellite

    Directory of Open Access Journals (Sweden)

    J. R. O. Fernandez

    2013-04-01

    Full Text Available This paper analyzes a digital interface and bus system modeling and optimization of the SEOSAR/PAZ Earth Observation satellite. The important part of the satellite is an X–band Synthetic Aperture Radar instrument that integrates 384 Transmit/Receive Modules located in 12 antenna panels 7.5 m away from the central processor and controlled by a synchronous 10 Mbps bidirectional serial protocol. This type of mid–range point–to–multipoint transmission is affected by bit errors due to crosstalk, transmission line attenuation and impedance mismatches. The high–speed data communication network has been designed to optimize the transmission by using a simulation model of the data distribution system which takes into account the worst–case scenario and by developing a lab–scaled prototype which exhibits BER of 10-11 for an interfering signal of 10 Vpp. The result is a point–to–multipoint bidirectional transmission network optimized in both directions with optimal values of loads and equalization resistors. This high–speed data transmission subsystem provides a compact design through a simple solution.

  20. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    Science.gov (United States)

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  1. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-12-01

    Full Text Available Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN. Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS. This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime

  2. Does automatic transmission improve driving behavior in older drivers?

    Science.gov (United States)

    Selander, Helena; Bolin, Ingrid; Falkmer, Torbjörn

    2012-01-01

    Most older drivers continue to drive as they age. To maintain safe and independent transport, mobility is important for all individuals, but especially for older drivers. The objective of this study was to investigate whether automatic transmission, compared with manual transmission, may improve the driving behavior of older drivers. In total, 31 older drivers (mean age 75.2 years) and 32 younger drivers - used as a control group (mean age 39.2 years) - were assessed twice on the same fixed route; once in a car with manual transmission and once in a car with automatic transmission. The cars were otherwise identical. The driving behavior was assessed with the Ryd On-Road Assessment driving protocol. Time to completion of left turns (right-hand side driving) and the impact of a distraction task were measured. The older group had more driving errors than the younger group, in both the manual and the automatic transmission car. However, and contrary to the younger drivers, automatic transmission improved the older participants' driving behavior as demonstrated by safer speed adjustment in urban areas, greater maneuvering skills, safer lane position and driving in accordance with the speed regulations. Switching to automatic transmission may be recommended for older drivers as a means to maintain safe driving and thereby the quality of their transport mobility. Copyright © 2011 S. Karger AG, Basel.

  3. Secure and Robust Transmission and Verification of Unknown Quantum States in Minkowski Space

    Science.gov (United States)

    Kent, Adrian; Massar, Serge; Silman, Jonathan

    2014-01-01

    An important class of cryptographic applications of relativistic quantum information work as follows. B generates a random qudit and supplies it to A at point P. A is supposed to transmit it at near light speed c to to one of a number of possible pairwise spacelike separated points Q1, …, Qn. A's transmission is supposed to be secure, in the sense that B cannot tell in advance which Qj will be chosen. This poses significant practical challenges, since secure reliable long-range transmission of quantum data at speeds near to c is presently not easy. Here we propose different techniques to overcome these diffculties. We introduce protocols that allow secure long-range implementations even when both parties control only widely separated laboratories of small size. In particular we introduce a protocol in which A needs send the qudit only over a short distance, and securely transmits classical information (for instance using a one time pad) over the remaining distance. We further show that by using parallel implementations of the protocols security can be maintained in the presence of moderate amounts of losses and errors. PMID:24469425

  4. SIMULATION AND ANALYSIS OF GREEDY ROUTING PROTOCOL IN VIEW OF ENERGY CONSUMPTION AND NETWORK LIFETIME IN THREE DIMENSIONAL UNDERWATER WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    SHEENA KOHLI

    2017-11-01

    Full Text Available Underwater Wireless Sensor Network (UWSN comprises of a number of miniature sized sensing devices deployed in the sea or ocean, connected by dint of acoustic links to each other. The sensors trap the ambient conditions and transmit the data from one end to another. For transmission of data in any medium, routing protocols play a crucial role. Moreover, being battery limited, an unavoidable parameter to be considered in operation and analysis of protocols is the network energy and the network lifetime. The paper discusses the greedy routing protocol for underwater wireless sensor networks. The simulation of this routing protocol also takes into consideration the characteristics of acoustic communication like attenuation, transmission loss, signal to noise ratio, noise, propagation delay. The results from these observations may be used to construct an accurate underwater communication model.

  5. Space Link Extension Protocol Emulation for High-Throughput, High-Latency Network Connections

    Science.gov (United States)

    Tchorowski, Nicole; Murawski, Robert

    2014-01-01

    New space missions require higher data rates and new protocols to meet these requirements. These high data rate space communication links push the limitations of not only the space communication links, but of the ground communication networks and protocols which forward user data to remote ground stations (GS) for transmission. The Consultative Committee for Space Data Systems, (CCSDS) Space Link Extension (SLE) standard protocol is one protocol that has been proposed for use by the NASA Space Network (SN) Ground Segment Sustainment (SGSS) program. New protocol implementations must be carefully tested to ensure that they provide the required functionality, especially because of the remote nature of spacecraft. The SLE protocol standard has been tested in the NASA Glenn Research Center's SCENIC Emulation Lab in order to observe its operation under realistic network delay conditions. More specifically, the delay between then NASA Integrated Services Network (NISN) and spacecraft has been emulated. The round trip time (RTT) delay for the continental NISN network has been shown to be up to 120ms; as such the SLE protocol was tested with network delays ranging from 0ms to 200ms. Both a base network condition and an SLE connection were tested with these RTT delays, and the reaction of both network tests to the delay conditions were recorded. Throughput for both of these links was set at 1.2Gbps. The results will show that, in the presence of realistic network delay, the SLE link throughput is significantly reduced while the base network throughput however remained at the 1.2Gbps specification. The decrease in SLE throughput has been attributed to the implementation's use of blocking calls. The decrease in throughput is not acceptable for high data rate links, as the link requires constant data a flow in order for spacecraft and ground radios to stay synchronized, unless significant data is queued a the ground station. In cases where queuing the data is not an option

  6. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    Science.gov (United States)

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  7. Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks

    Directory of Open Access Journals (Sweden)

    Yulong Shen

    2014-03-01

    Full Text Available This work considers the problem of secure and reliable information transmission via relay cooperation in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While previous work on this problem mainly studied infinite networks and their asymptotic behavior and scaling law results, this papers focuses on a more practical network with finite number of system nodes and explores the corresponding exact result on the number of eavesdroppers one network can tolerate to ensure desired secrecy and reliability. We first study the scenario where path-loss is equal between all pairs of nodes and consider two transmission protocols there, one adopts an optimal but complex relay selection process with less load balance capacity while the other adopts a random but simple relay selection process with good load balance capacity. Theoretical analysis and numerical results are then provided to determine the maximum number of eavesdroppers one network can tolerate to ensure a desired performance in terms of the secrecy outage probability and transmission outage probability. We further extend our study to the more general scenario where path-loss between each pair of nodes also depends on the distance between them, for which a new transmission protocol with both preferable relay selection and good load balance as well as the corresponding theoretical analysis and numerical results are presented.

  8. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels

    Directory of Open Access Journals (Sweden)

    Seung Min Hur

    2009-06-01

    Full Text Available We study the problem of how to alleviate the exposed terminal effect in multihop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that schedules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multihop wireless networks.

  9. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels.

    Science.gov (United States)

    Son, In Keun; Mao, Shiwen; Hur, Seung Min

    2009-01-01

    We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks.

  10. Security Property Validation of the Sensor Network Encryption Protocol (SNEP

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2015-07-01

    Full Text Available Since wireless sensor networks (WSNs have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA, named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

  11. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  12. MDP-based resource allocation for triple-play transmission on xDSL systems

    Science.gov (United States)

    de Souza, Lamartine V.; de Carvalho, Glaucio H. S.; Cardoso, Diego L.; de Carvalho, Solon V.; Frances, Carlos R. L.; Costa, João C. W. A.; Riu, Jaume Rius i.

    2007-09-01

    Many broadband services are based on multimedia applications, such as voice over internet protocol (VoIP), video conferencing, video on demand (VoD), and internet protocol television (IPTV). The combination "triple-play" is often used with IPTV. It simply means offering voice, video and data. IPTV and others services uses digital broadband networks such as ADSL2+ (Asymmetric Digital Subscriber Line) and VDSL (Very High Rate DSL) to transmit the data. We have formulated a MDP (Markov Decision Process) for a triple-play transmission on DSL environment. In this paper, we establish the relationship between DSL transmission characteristics and its finite-state Markov model for a triple-play transmission system. This relationship can be used for a resource management for multimedia applications delivered through a broadband infrastructure. The solution to our optimization problem can be found using dynamic programming (DP) techniques, such as value iteration and its variants. Our study results in a transmission strategy that chooses the optimal resource allocation according the triple-play traffic requirements, defined in technical report TR-126 (Triple-Play Services Quality of Experience Requirements) from DSL Forum, minimizing quality of service (QoS) violations with respect to bandwidth. Three traffic classes (video, audio, and best effort internet data) are defined and analyzed. Our simulation results show parameters like as blocking probability for each class, link utilization and optimal control policies. The MDP-based approach provides a satisfactory way of resource management for a DSL system.

  13. Avian influenza transmission risks: analysis of biosecurity measures and contact structure in Dutch poultry farming.

    Science.gov (United States)

    Ssematimba, A; Hagenaars, T J; de Wit, J J; Ruiterkamp, F; Fabri, T H; Stegeman, J A; de Jong, M C M

    2013-04-01

    In the 2003 epidemic of highly pathogenic avian influenza in Dutch poultry, between-farm virus transmission continued for considerable time despite control measures. Gaining more insight into the mechanisms of this spread is necessary for the possible development of better control strategies. We carried out an in-depth interview study aiming to systematically explore all the poultry production activities to identify the activities that could potentially be related to virus introduction and transmission. One of the between-farm contact risks that were identified is the movement of birds between farms during thinning with violations of on-farm biosecurity protocols. In addition, several other risky management practices, risky visitor behaviours and biosecurity breaches were identified. They include human and fomite contacts that occurred without observing biosecurity protocols, poor waste management practices, presence of other animal species on poultry farms, and poor biosecurity against risks from farm neighbourhood activities. Among the detailed practices identified, taking cell phones and jewellery into poultry houses, not observing shower-in protocols and the exchange of unclean farm equipment were common. Also, sometimes certain protocols or biosecurity facilities were lacking. We also asked the interviewed farmers about their perception of transmission risks and found that they had divergent opinions about the visitor- and neighbourhood-associated risks. We performed a qualitative assessment of contact risks (as transmission pathways) based on contact type, corresponding biosecurity practices, and contact frequency. This assessment suggests that the most risky contact types are bird movements during thinning and restocking, most human movements accessing poultry houses and proximity to other poultry farms. The overall risk posed by persons and equipment accessing storage rooms and the premises-only contacts was considered to be medium. Most of the exposure

  14. On the Performance of the Cache Coding Protocol

    Directory of Open Access Journals (Sweden)

    Behnaz Maboudi

    2018-03-01

    Full Text Available Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these attacks while allowing for the benefits of coding in mesh networks, the cache coding protocol was proposed. This protocol only allows recoding at the relays when the relay has received enough coded packets to decode an entire generation of packets. At that point, the relay node recodes and signs the recoded packets with its own private key, allowing the system to detect and minimize the effect of pollution attacks and making the relays accountable for changes on the data. This paper analyzes the delay performance of cache coding to understand the security-performance trade-off of this scheme. We introduce an analytical model for the case of two relays in an erasure channel relying on an absorbing Markov chain and an approximate model to estimate the performance in terms of the number of transmissions before successfully decoding at the receiver. We confirm our analysis using simulation results. We show that cache coding can overcome the security issues of unrestricted recoding with only a moderate decrease in system performance.

  15. Processing scarce biological samples for light and transmission electron microscopy

    Directory of Open Access Journals (Sweden)

    P Taupin

    2008-06-01

    Full Text Available Light microscopy (LM and transmission electron microscopy (TEM aim at understanding the relationship structure-function. With advances in biology, isolation and purification of scarce populations of cells or subcellular structures may not lead to enough biological material, for processing for LM and TEM. A protocol for preparation of scarce biological samples is presented. It is based on pre-embedding the biological samples, suspensions or pellets, in bovine serum albumin (BSA and bis-acrylamide (BA, cross-linked and polymerized. This preparation provides a simple and reproducible technique to process biological materials, present in limited quantities that can not be amplified, for light and transmission electron microscopy.

  16. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    Directory of Open Access Journals (Sweden)

    Prasan Kumar Sahoo

    2014-11-01

    Full Text Available Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  17. A Conflict-Free Low-Jitter Guaranteed-Rate MAC Protocol for Base-Station Communications in Wireless Mesh Networks

    Science.gov (United States)

    Szymanski, T. H.

    A scheduling algorithm and MAC protocol which provides low-jitter guaranteed-rate (GR) communications between base-stations (BS) in a Wireless Mesh Network (WMN) is proposed. The protocol can provision long-term multimedia services such as VOIP, IPTV, or Video-on-Demand. The time-axis is partitioned into scheduling frames with F time-slots each. A directional antennae scheme is used to provide each directed link with a fixed transmission rate. A protocol such as IntServ is used to provision resources along an end-to-end path of BSs for GR sessions. The Guaranteed Rates between the BSs are then specified in a doubly stochastic traffic rate matrix, which is recursively decomposed to yield a low-jitter GR frame transmission schedule. In the resulting schedule, the end-to-end delay and jitter are small and bounded, and the cell loss rate due to primary scheduling conflicts is zero. For dual-channel WMNs, the MAC protocol can achieve 100% utilization, as well as near-minimal queueing delays and near minimal delay jitter. The scheduling time complexity is O(NFlogNF), where N is the number of BSs. Extensive simulation results are presented.

  18. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  19. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  20. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  1. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  2. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Hadeel Saleh Haj Aliwi

    2016-03-01

    Full Text Available Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway, and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway. The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.

  3. An energy-efficient transmission scheme for real-time data in wireless sensor networks.

    Science.gov (United States)

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-05-20

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance.

  4. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Rabindra Bista

    2010-05-01

    Full Text Available Many wireless sensor network (WSN applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  5. Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.

    Science.gov (United States)

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  6. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  7. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  8. Improved Wojcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss

    International Nuclear Information System (INIS)

    Zhang Zhanjun; Li Yong; Man Zhongxiao

    2005-01-01

    The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme has a zero eavesdropping-induced channel loss and produces perfect anticorrelation. Therefore, the eavesdropper Eve can safely attack all the transmitted bits and the eavesdropping information gain can always exceed the legitimate user's information gain in the whole domain of the quantum channel transmission efficiency η, i.e., [0,100%]. This means that the ping-pong protocol can be completely eavesdropped in its original version. But the improvement of the ping-pong protocol security produced by Wojcik is also suitable for our eavesdropping attack

  9. Evaluation of preventive measures for mother-to-child transmission of HIV in Aracaju, State of Sergipe, Brazil

    Directory of Open Access Journals (Sweden)

    Lígia Mara Dolce de Lemos

    2012-12-01

    Full Text Available INTRODUCTION: The main route of human immunodeficiency virus (HIV infection in children is from mother to child. The preventive measures established for the Aids Clinical Trial Group protocol 076 (ACTG 076 significantly reduces HIV vertical transmission rates. This study aims to evaluate the implementation of the ACTG 076 protocol in the maternity units of State of Sergipe, Brazilian northeast. METHODS: This is a descriptive, retrospective study with a quantitative approach, with HIV positive women and children exposed, attending a Maternity reference for high-risk pregnancies. Data were obtained from patient records registered in the years 1994 to 2010. RESULTS: Amongst the 110 pregnant women and exposed newborns, the ACTG 076 protocol was fully utilized in only 31.8% of the participants. During the prenatal period, zidovudine (ZDV was taken by 79.1% of the pregnant women. Only 49.1% of HIV seropositive patients used ZDV during delivery. Two (1.8% children were considered infected and 50 (45.5% do not have a conclusive diagnosis to date. CONCLUSIONS: There were significant deficiencies in the prevention of mother-to-child transmission of HIV, including lack of compliance with the three phases of the ACTG 076 protocol; inadequacies in prenatal care; inappropriate mode of delivery and lack of adequate follow up of exposed children.

  10. An XML-based communication protocol for accelerator distributed controls

    International Nuclear Information System (INIS)

    Catani, L.

    2008-01-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding

  11. An XML-based communication protocol for accelerator distributed controls

    Energy Technology Data Exchange (ETDEWEB)

    Catani, L. [INFN-Roma Tor Vergata, Rome (Italy)], E-mail: luciano.catani@roma2.infn.it

    2008-03-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding.

  12. Direct measurement of the quantum state of the electromagnetic field in a superconducting transmission line

    International Nuclear Information System (INIS)

    Melo, F. de; Aolita, L.; Davidovich, L.; Toscano, F.

    2006-01-01

    We propose an experimental procedure to directly measure the state of an electromagnetic field inside a resonator, corresponding to a superconducting transmission line, coupled to a Cooper-pair box (CPB). The measurement protocol is based on the use of a dispersive interaction between the field and the CPB, and the coupling to an external classical field that is tuned to resonance with either the field or the CPB. We present a numerical simulation that demonstrates the feasibility of this protocol, which is within reach of present technology

  13. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  14. FF-LYNX: protocol and interfaces for the control and readout of future Silicon detectors

    Energy Technology Data Exchange (ETDEWEB)

    Amendola, A; Bianchi, G; Fanucci, L; Saponara, S; Tongiani, C [Universita di Pisa, Dipartimento di Ingegneria dell' Informazione (DII-EIT), Via G. Caruso 16, 56122 Pisa (Italy); Castaldi, R; Minuti, M; Verdini, P G [INFN, Sezione di Pisa, Largo B. Pontecorvo 3, 56018 Pisa (Italy); Incandela, J; Magazzu, G; Rossin, R, E-mail: Guido.Magazzu@pi.infn.i [University of California at Santa Barbara (UCSB), Department of Physics, 5113 Broida Hall, CA 93106 Santa Barbara (United States)

    2010-06-15

    The FF-LYNX protocol provides an innovative solution for the integrated distribution of Timing, Trigger and Control signals and the data readout in future High Energy Physics experiments. Transmitter and receiver interfaces implementing the FF-LYNX protocol have been simulated with a high-level simulator and in an FPGA based emulator. The design of the interfaces in a commercial CMOS technology as radiation tolerant and low power modules is ongoing and the submission of a test circuit is foreseen in fall 2010. The key features of the protocol are described in this paper as well as its possible application for the transmission from Silicon Trackers to trigger processors with short and constant latency of data to be used for the L1 trigger generation.

  15. Force transmissibility versus displacement transmissibility

    Science.gov (United States)

    Lage, Y. E.; Neves, M. M.; Maia, N. M. M.; Tcherniak, D.

    2014-10-01

    It is well-known that when a single-degree-of-freedom (sdof) system is excited by a continuous motion of the foundation, the force transmissibility, relating the force transmitted to the foundation to the applied force, equals the displacement transmissibility. Recent developments in the generalization of the transmissibility to multiple-degree-of-freedom (mdof) systems have shown that similar simple and direct relations between both types of transmissibility do not appear naturally from the definitions, as happens in the sdof case. In this paper, the authors present their studies on the conditions under which it is possible to establish a relation between force transmissibility and displacement transmissibility for mdof systems. As far as the authors are aware, such a relation is not currently found in the literature, which is justified by being based on recent developments in the transmissibility concept for mdof systems. Indeed, it does not appear naturally, but the authors observed that the needed link is present when the displacement transmissibility is obtained between the same coordinates where the applied and reaction forces are considered in the force transmissibility case; this implies that the boundary conditions are not exactly the same and instead follow some rules. This work presents a formal derivation of the explicit relation between the force and displacement transmissibilities for mdof systems, and discusses its potential and limitations. The authors show that it is possible to obtain the displacement transmissibility from measured forces, and the force transmissibility from measured displacements, opening new perspectives, for example, in the identification of applied or transmitted forces. With this novel relation, it becomes possible, for example, to estimate the force transmissibility matrix with the structure off its supports, in free boundary conditions, and without measuring the forces. As far as force identification is concerned, this

  16. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  17. A Rate-Adaptive MAC Protocol Based on TCP throughput for Ad Hoc Networks in Fading Channels

    Directory of Open Access Journals (Sweden)

    Shoko Uchida

    2008-10-01

    Full Text Available Wireless technology is becoming a leading option for future Internet access. Transmission Control Protocol (TCP is one of the protocols designed on the basis of the transmission characteristics in wired networks. It is known that the TCP performance deteriorates drastically under a wireless communication environment. On the other hand, many wireless networking standards such as IEEE 802.11a, 802.11b, and 802.11g have multirate capability. Therefore, adaptive rate control methods have been proposed for ad hoc networks. However, almost methods require the modification of the request to send (RTS and clear to send (CTS packets. Therefore, the conventional methods are not compatible with the standardized system. In this paper, we propose adaptive rate control mechanisms for ad hoc networks. Our mechanisms are based on the RTS/CTS mechanisms. However, no modifications to the RTS and CTS packets are required in the proposed method. Therefore, our proposed method can attempt to satisfy the conventional IEEE 802.11 standards. Moreover, an adequate transmission rate is selected based on an estimated TCP throughput performance. From simulation results, it is observed that the proposed method can improve the throughput performance without any modification of packet structures.

  18. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  19. A Multipath Routing Protocol Based on Bloom Filter for Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Junwei Jin

    2016-01-01

    Full Text Available On-demand multipath routing in a wireless ad hoc network is effective in achieving load balancing over the network and in improving the degree of resilience to mobility. In this paper, the salvage capable opportunistic node-disjoint multipath routing (SNMR protocol is proposed, which forms multiple routes for data transmission and supports packet salvaging with minimum overhead. The proposed mechanism constructs a primary path and a node-disjoint backup path together with alternative paths for the intermediate nodes in the primary path. It can be achieved by considering the reverse route back to the source stored in the route cache and the primary path information compressed by a Bloom filter. Our protocol presents higher capability in packet salvaging and lower overhead in forming multiple routes. Simulation results show that SNMR outperforms the compared protocols in terms of packet delivery ratio, normalized routing load, and throughput.

  20. RObust header compression (ROHC) performance for multimedia transmission over 3G/4G wireless networks

    DEFF Research Database (Denmark)

    Fitzek, Frank; Rein, S.; Seeling, P.

    2005-01-01

    Robust Header Compression (ROHC) has recently been proposed to reduce the large protocol header overhead when transmitting voice and other continuous meadi over IP based control stacks in wireless networks. In this paper we evaluate the real-time transmission of GSM encoded voice and H. 26L encod...

  1. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    Science.gov (United States)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  2. Improved Wojcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Zhanjun [School of Physics and Material Science, Anhui University, Hefei 230039 (China) and Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: zhangzj@wipm.ac.cn; Li Yong [Department of Physics, Huazhong Normal University, Wuhan 430079 (China); Man Zhongxiao [Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)

    2005-06-27

    The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme has a zero eavesdropping-induced channel loss and produces perfect anticorrelation. Therefore, the eavesdropper Eve can safely attack all the transmitted bits and the eavesdropping information gain can always exceed the legitimate user's information gain in the whole domain of the quantum channel transmission efficiency {eta}, i.e., [0,100%]. This means that the ping-pong protocol can be completely eavesdropped in its original version. But the improvement of the ping-pong protocol security produced by Wojcik is also suitable for our eavesdropping attack.

  3. Evidence of transmission of Mycobacterium tuberculosis by random amplified polymorphic DNA (RAPD) fingerprinting in Taipei City, Taiwan.

    Science.gov (United States)

    Harn, H J; Shen, K L; Ho, L I; Yu, K W; Liu, G C; Yueh, K C; Lee, J H

    1997-01-01

    AIMS: To determine, by strain identification of Mycobacterium tuberculosis, whether transmission has occurred between individuals or whether new strains are present. METHODS: A rapid protocol for random amplified polymorphic DNA (RAPD) analysis was developed. This protocol was applied to 64 strains of M tuberculosis that had been confirmed by culture and microbiological methods. RESULTS: There are five groups of M tuberculosis prevalent in Taipei city, Taiwan. The major types are groups I and III. Groups I and II had been prevalent until the end of last year when, according to our group analysis, they had been eradicated. However, group III was continuously present from the middle of 1995 to the middle of 1996, and group IV was present at the end of both years, which indicated that both groups were transmitted continuously. These clustered strains had demographic characteristics consistent with a finding of transmission tuberculosis. Also, there were 13 of 64 strains with unique RAPD fingerprints that were inferred to be due primarily to the reactivation of infection. In the drug resistance analysis, the major type represented included group III and part of group IV. CONCLUSIONS: Our preliminary data imply, not only that the prevalence of M tuberculosis in Taipei city is due to transmission rather than reactivation, but that drug resistance also may play a role in tuberculosis transmission. Images PMID:9378819

  4. Multihopping Multilevel Clustering Heterogeneity-Sensitive Optimized Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-01-01

    Full Text Available Effective utilization of energy resources in Wireless Sensor Networks (WSNs has become challenging under uncertain distributed cluster-formation and single-hop intercluster communication capabilities. So, sensor nodes are forced to operate at expensive full rate transmission power level continuously during whole network operation. These challenging network environments experience unwanted phenomena of drastic energy consumption and packet drop. In this paper, we propose an adaptive immune Multihopping Multilevel Clustering (MHMLC protocol that executes a Hybrid Clustering Algorithm (HCA to perform optimal centralized selection of Cluster-Heads (CHs within radius of centrally located Base Station (BS and distributed CHs selection in the rest of network area. HCA of MHMLC also produces optimal intermediate CHs for intercluster multihop communications that develop heterogeneity-aware economical links. This hybrid cluster-formation facilitates the sensors to function at short range transmission power level that enhances link quality and avoids packet drop. The simulation environments produce fair comparison among proposed MHMLC and existing state-of-the-art routing protocols. Experimental results give significant evidence of better performance of the proposed model in terms of network lifetime, stability period, and data delivery ratio.

  5. A Game Theory-Based Obstacle Avoidance Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shujun Bi

    2011-09-01

    Full Text Available The obstacle avoidance problem in geographic forwarding is an important issue for location-based routing in wireless sensor networks. The presence of an obstacle leads to several geographic routing problems such as excessive energy consumption and data congestion. Obstacles are hard to avoid in realistic environments. To bypass obstacles, most routing protocols tend to forward packets along the obstacle boundaries. This leads to a situation where the nodes at the boundaries exhaust their energy rapidly and the obstacle area is diffused. In this paper, we introduce a novel routing algorithm to solve the obstacle problem in wireless sensor networks based on a game-theory model. Our algorithm forms a concave region that cannot forward packets to achieve the aim of improving the transmission success rate and decreasing packet transmission delays. We consider the residual energy, out-degree and forwarding angle to determine the forwarding probability and payoff function of forwarding candidates. This achieves the aim of load balance and reduces network energy consumption. Simulation results show that based on the average delivery delay, energy consumption and packet delivery ratio performances our protocol is superior to other traditional schemes.

  6. Data Acquisition and Transmission System for Building Energy Consumption Monitoring

    Directory of Open Access Journals (Sweden)

    Liang Zhao

    2013-01-01

    Full Text Available Building energy consumption monitoring and management system have been developed widely in China in order to gain the real-time data of energy consumption in buildings for analyzing it in the next state work. This paper describes a low-cost and small-sized collector based on the STM32 microcontroller, which can be placed in a building easily to implement the work of data acquisition, storage, and transmission. The collector gathers the electricity, water, heat, and energy consumption data through the RS485 field bus and stores the data into an SD card with mass storage, finally, using Internet to finish the communication and transmission to data server through TCP protocol. The collector has been used in application for two years, and the results show that the system is reliable and stable.

  7. Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jae-Won Lee

    2014-10-01

    Full Text Available The long propagation delay in an underwater acoustic channel makes designing an underwater media access control (MAC protocol more challenging. In particular, handshaking-based MAC protocols widely used in terrestrial radio channels have been known to be inappropriate in underwater acoustic channels, because of the inordinately large latency involved in exchanging control packets. Furthermore, in the case of multi-hop relaying in a hop-by-hop handshaking manner, the end-to-end delay significantly increases. In this paper, we propose a new MAC protocol named cascading multi-hop reservation and transmission (CMRT. In CMRT, intermediate nodes between a source and a destination may start handshaking in advance for the next-hop relaying before handshaking for the previous node is completed. By this concurrent relaying, control packet exchange and data delivery cascade down to the destination. In addition, to improve channel utilization, CMRT adopts a packet-train method where multiple data packets are sent together by handshaking once. Thus, CMRT reduces the time taken for control packet exchange and accordingly increases the throughput. The performance of CMRT is evaluated and compared with that of two conventional MAC protocols (multiple-access collision avoidance for underwater (MACA-U and MACA-U with packet trains (MACA-UPT. The results show that CMRT outperforms other MAC protocols in terms of both throughput and end-to-end delay.

  8. Centrifugation speed affects light transmission aggregometry.

    Science.gov (United States)

    Merolla, M; Nardi, M A; Berger, J S

    2012-02-01

    Light transmission aggregometry (LTA) is considered the gold standard for investigating platelet activity ex vivo. However, LTA protocols are not standardized, and differences in LTA procedure are a potential source of variance in results. Centrifugation speed is an essential component of platelet preparation in LTA, has yet to be standardized, and may affect platelet aggregation results. We sought to investigate the effect of relative centrifugal force (RCF) intensity on LTA results. Ten healthy controls had venous blood drawn and centrifuged at 150, 200, 300, and 500 g for 10 min. Cell counts in whole blood and platelet-rich plasma (PRP) were measured using a hematology analyzer. LTA was performed using 1.0 μm adenosine diphosphate (ADP) and 0.4 μm epinephrine as an agonist. Aggregation (%) was compared at 60, 120, 180, and 300 s and at maximum aggregation. Centrifugation speed was associated with decreasing platelet count (P centrifuge RCF at 60, 120, 180, 300 s and at maximum aggregation (P centrifugation speed in the interpretation of LTA results, supporting the need for standardization of centrifugation RCF in LTA protocols. © 2011 Blackwell Publishing Ltd.

  9. Congenital transmission of Trypanosoma cruzi in Argentina, Honduras, and Mexico: study protocol

    Science.gov (United States)

    2013-01-01

    Background Trypanosoma cruzi has been divided into Discrete Typing Units I and non-I (II-VI). T. cruzi I is predominant in Mexico and Central America, while non-I is predominant in most of South America, including Argentina. Little is known about congenital transmission of T. cruzi I. The specific aim of this study is to determine the rate of congenital transmission of T. cruzi I compared to non-I. Methods/design We are conducting a prospective study to enroll at delivery, 10,000 women in Argentina, 7,500 women in Honduras, and 13,000 women in Mexico. We are measuring transmitted maternal T. cruzi antibodies by performing two rapid tests in cord blood (Stat-Pak, Chembio, Medford, New York, and Trypanosoma Detect, InBios, Seattle, Washington). If at least one of the results is positive, we are identifying infants who are congenitally infected by performing parasitological examinations on cord blood and at 4–8 weeks, and serological follow-up at 10 months. Serological confirmation by ELISA (Wiener, Rosario, Argentina) is performed in cord and maternal blood, and at 10 months. We also are performing T. cruzi standard PCR, real-time quantitative PCR and genotyping on maternal venous blood and on cord blood, and serological examinations on siblings. Data are managed by a Data Center in Montevideo, Uruguay. Data are entered online at the sites in an OpenClinica data management system, and digital pictures of data forms are sent to the Data Center for quality control. Weekly reports allow for rapid feedback to the sites. Trial registration Observational study with ClinicalTrials.gov Identifier NCT01787968 PMID:24119247

  10. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  11. Protocol Processing for 100 Gbit/s and Beyond - A Soft Real-Time Approach in Hardware and Software

    Science.gov (United States)

    Büchner, Steffen; Lopacinski, Lukasz; Kraemer, Rolf; Nolte, Jörg

    2017-09-01

    100 Gbit/s wireless communication protocol processing stresses all parts of a communication system until the outermost. The efficient use of upcoming 100 Gbit/s and beyond transmission technology requires the rethinking of the way protocols are processed by the communication endpoints. This paper summarizes the achievements of the project End2End100. We will present a comprehensive soft real-time stream processing approach that allows the protocol designer to develop, analyze, and plan scalable protocols for ultra high data rates of 100 Gbit/s and beyond. Furthermore, we will present an ultra-low power, adaptable, and massively parallelized FEC (Forward Error Correction) scheme that detects and corrects bit errors at line rate with an energy consumption between 1 pJ/bit and 13 pJ/bit. The evaluation results discussed in this publication show that our comprehensive approach allows end-to-end communication with a very low protocol processing overhead.

  12. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  13. Amyotrophic Lateral Sclerosis and Organ Donation: Is There Risk of Disease Transmission?

    OpenAIRE

    Holmes, Brandon B.; Diamond, Marc I.

    2012-01-01

    A new protocol suggests that patients with amyotrophic lateral sclerosis (ALS) are a viable source of tissue for organ transplantation. However, multiple lines of evidence suggest that many neurodegenerative diseases, including ALS, might progress due to transcellular propagation of protein aggregation among neurons. Transmission of the disease state from donor to host thus may be possible under the permissive circumstances of graft transplantation. We argue for careful patient selection and ...

  14. A Study of Transmission Control Method for Distributed Parameters Measurement in Large Factories and Storehouses

    Directory of Open Access Journals (Sweden)

    Shujing Su

    2015-01-01

    Full Text Available For the characteristics of parameters dispersion in large factories, storehouses, and other applications, a distributed parameter measurement system is designed that is based on the ring network. The structure of the system and the circuit design of the master-slave node are described briefly. The basic protocol architecture about transmission communication is introduced, and then this paper comes up with two kinds of distributed transmission control methods. Finally, the reliability, extendibility, and control characteristic of these two methods are tested through a series of experiments. Moreover, the measurement results are compared and discussed.

  15. Photonics-oriented data transmission network for the KM3NeT prototype detector

    International Nuclear Information System (INIS)

    Hoek, M. van der; Mos, S.; Schmelling, J.W.; Hogenbirk, J.; Heine, E.; Jansweijer, P.; Kieft, G.; Peek, H.; Timmer, P.; Wolf, E. de; Zwart, A.

    2013-01-01

    The design of the readout and data acquisition system of the future KM3NeT neutrino telescope employs 10 Gbps photonic technologies for data transmission to shore. The photonic architecture can handle standard transmission protocols. The generic scheme is based on DWDM technology using lasers on shore and optical modulators in each of the 12,800 Digital Optical Modules arranged on several hundred vertical detection units anchored to the seabed. Each module will house 31 photomultipliers together with auxiliary instrumentation and readout electronics. A 100 km electro-optical fibre cable will connect the optical modules to the store. The readout system will guarantee an individual optical connection between each optical module and the shore. A small-scale prototype of a detection unit with four optical modules is in a realization phase and will allow for in situ testing of the data transmission network. We will present results of laboratory tests of the photonics-oriented transmission layer of the network that have been realized for the prototype detection unit

  16. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  17. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  18. Novel technical solutions for wireless ECG transmission & analysis in the age of the internet cloud.

    Science.gov (United States)

    Al-Zaiti, Salah S; Shusterman, Vladimir; Carey, Mary G

    2013-01-01

    Current guidelines recommend early reperfusion therapy for ST-elevation myocardial infarction (STEMI) within 90 min of first medical encounter. Telecardiology entails the use of advanced communication technologies to transmit the prehospital 12-lead electrocardiogram (ECG) to offsite cardiologists for early triage to the cath lab; which has been shown to dramatically reduce door-to-balloon time and total mortality. However, hospitals often find adopting ECG transmission technologies very challenging. The current review identifies seven major technical challenges of prehospital ECG transmission, including: paramedics inconvenience and transport delay; signal noise and interpretation errors; equipment malfunction and transmission failure; reliability of mobile phone networks; lack of compliance with the standards of digital ECG formats; poor integration with electronic medical records; and costly hardware and software pre-requisite installation. Current and potential solutions to address each of these technical challenges are discussed in details and include: automated ECG transmission protocols; annotatable waveform-based ECGs; optimal routing solutions; and the use of cloud computing systems rather than vendor-specific processing stations. Nevertheless, strategies to monitor transmission effectiveness and patient outcomes are essential to sustain initial gains of implementing ECG transmission technologies. © 2013.

  19. A Rule-Based Data Transfer Protocol for On-Demand Data Exchange in Vehicular Environment

    Directory of Open Access Journals (Sweden)

    Liao Hsien-Chou

    2009-01-01

    Full Text Available The purpose of Intelligent Transport System (ITS is mainly to increase the driving safety and efficiency. Data exchange is an important way to achieve the purpose. An on-demand data exchange is especially useful to assist a driver avoiding some emergent events. In order to handle the data exchange under dynamic situations, a rule-based data transfer protocol is proposed in this paper. A set of rules is designed according to the principle of request-forward-reply (RFR. That is, they are used to determine the timing of data broadcasting, forwarding, and replying automatically. Two typical situations are used to demonstrate the operation of rules. One is the front view of a driver occluded by other vehicles. The other is the traffic jam. The proposed protocol is flexible and extensible for unforeseen situations. Three simulation tools were also implemented to demonstrate the feasibility of the protocol and measure the network transmission under high density of vehicles. The simulation results show that the rule-based protocol is efficient on data exchange to increase the driving safety.

  20. Remote control of the industry processes. POWERLINK protocol application

    Science.gov (United States)

    Wóbel, A.; Paruzel, D.; Paszkiewicz, B.

    2017-08-01

    The present technological development enables the use of solutions characterized by a lower failure rate, and work with greater precision. This allows you to obtain the most efficient production, high speed production and reliability of individual components. The main scope of this article was POWERLINK protocol application for communication with the controller B & R through communication Ethernet for recording process parameters. This enables control of run production cycle using an internal network connected to the PC industry. Knowledge of the most important parameters of the production in real time allows detecting of a failure immediately after occurrence. For this purpose, the position of diagnostic use driver X20CP1301 B&R to record measurement data such as pressure, temperature valve between the parties and the torque required to change the valve setting was made. The use of POWERLINK protocol allows for the transmission of information on the status of every 200 μs.

  1. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    Science.gov (United States)

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  2. Transmission Scheduling and Routing Algorithms for Delay Tolerant Networks

    Science.gov (United States)

    Dudukovich, Rachel; Raible, Daniel E.

    2016-01-01

    The challenges of data processing, transmission scheduling and routing within a space network present a multi-criteria optimization problem. Long delays, intermittent connectivity, asymmetric data rates and potentially high error rates make traditional networking approaches unsuitable. The delay tolerant networking architecture and protocols attempt to mitigate many of these issues, yet transmission scheduling is largely manually configured and routes are determined by a static contact routing graph. A high level of variability exists among the requirements and environmental characteristics of different missions, some of which may allow for the use of more opportunistic routing methods. In all cases, resource allocation and constraints must be balanced with the optimization of data throughput and quality of service. Much work has been done researching routing techniques for terrestrial-based challenged networks in an attempt to optimize contact opportunities and resource usage. This paper examines several popular methods to determine their potential applicability to space networks.

  3. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  4. The Comparative Study Some of Reactive and Proactive Routing Protocols in The Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Anas Ali Hussien

    2018-02-01

    Full Text Available The wireless sensor network (WSN consists mostly of a large number of nodes in a large area where not all nodes are directly connected. The applications of comprise a wide variety of scenarios.The mobile nodes are free to move because this network has selfــstructured topology. Routing protocols are responsible for detecting and maintaining paths in the network, and it classified into reactive (OnـــDemand, proactive (Table driven, and hybrid. In this paper represents a performance study of some WSN routing protocols: the Dynamic Source Routing (DSR, Ad hoc On-Demand Distance Vector (AODV, and Destination-Sequenced Distance-Vector (DSDV. The comparison made according to important metrics like packet delivery ratio (PDR, total packets dropped, Average end-to-end delay (Avg EED, and normalized routing load under the Transmission Control Protocol (TCP and User Datagram Protocol (UDP traffic connection and with varying number of nodes, pause time; and  varying speed. In this work used (NSــ2.35 that installed on (Ubuntu 14.04 operating system to implementing the scenario. Conclude that the DSR has better performance in TCP connection; while the DSDV has better performance in UDP protocol.

  5. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  6. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  7. UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna

    Science.gov (United States)

    Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang

    2018-01-01

    This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.

  8. Analiza protokola kvaliteta usluga telekomunikacionih mreža / Analysis of quality of service protocols in telecommunication networks

    Directory of Open Access Journals (Sweden)

    Milojko Jevtović

    2003-05-01

    Full Text Available Protokoli kvaliteta usluga (Quality of Service - QoS sadašnjih i budućih telekomunikacionih mreža razvijeni su, pored ostalog, sa ciljem da podrže različite klase usluga (Class of Service - CoS komunikaciju u realnom vremenu, kao i prenos multimedijalnih poruka preko paketskih IP (Internet Protocol mreža. U raduje dat pregled karakteristika tih protokola i ocena njihovih konkretnih mogućnosti u obezbeđenju kvaliteta usluga unutar sistema ('s vrha do dna', tj. vertikalno u OSI arhitekturi kao i 'horizontalno' odnosno s kraja na kraj veze, tj. između izvora i odredišta. / Today's and future telecommunication networks must enable transmission throughout heterogeneous environment, using different Quality of Service protocols, Quality of Service protocols use a variety of complementary mechanisms to enable deterministic end-to-end different data delivery. The analysis of these protocols and their efficiency in providing QoS and CoS has been given in this paper.

  9. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  10. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  11. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  12. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  13. Cluster chain based energy efficient routing protocol for moblie WSN

    Directory of Open Access Journals (Sweden)

    WU Ziyu

    2016-04-01

    Full Text Available With the ubiquitous smart devices acting as mobile sensor nodes in the wireless sensor networks(WSNs to sense and transmit physical information,routing protocols should be designed to accommodate the mobility issues,in addition to conventional considerations on energy efficiency.However,due to frequent topology change,traditional routing schemes cannot perform well.Moreover,existence of mobile nodes poses new challenges on energy dissipation and packet loss.In this paper,a novel routing scheme called cluster chain based routing protocol(CCBRP is proposed,which employs a combination of cluster and chain structure to accomplish data collection and transmission and thereafter selects qualified cluster heads as chain leaders to transmit data to the sink.Furthermore,node mobility is handled based on periodical membership update of mobile nodes.Simulation results demonstrate that CCBRP has a good performance in terms of network lifetime and packet delivery,also strikes a better balance between successful packet reception and energy consumption.

  14. Human prion diseases: surgical lessons learned from iatrogenic prion transmission.

    Science.gov (United States)

    Bonda, David J; Manjila, Sunil; Mehndiratta, Prachi; Khan, Fahd; Miller, Benjamin R; Onwuzulike, Kaine; Puoti, Gianfranco; Cohen, Mark L; Schonberger, Lawrence B; Cali, Ignazio

    2016-07-01

    The human prion diseases, or transmissible spongiform encephalopathies, have captivated our imaginations since their discovery in the Fore linguistic group in Papua New Guinea in the 1950s. The mysterious and poorly understood "infectious protein" has become somewhat of a household name in many regions across the globe. From bovine spongiform encephalopathy (BSE), commonly identified as mad cow disease, to endocannibalism, media outlets have capitalized on these devastatingly fatal neurological conditions. Interestingly, since their discovery, there have been more than 492 incidents of iatrogenic transmission of prion diseases, largely resulting from prion-contaminated growth hormone and dura mater grafts. Although fewer than 9 cases of probable iatrogenic neurosurgical cases of Creutzfeldt-Jakob disease (CJD) have been reported worldwide, the likelihood of some missed cases and the potential for prion transmission by neurosurgery create considerable concern. Laboratory studies indicate that standard decontamination and sterilization procedures may be insufficient to completely remove infectivity from prion-contaminated instruments. In this unfortunate event, the instruments may transmit the prion disease to others. Much caution therefore should be taken in the absence of strong evidence against the presence of a prion disease in a neurosurgical patient. While the Centers for Disease Control and Prevention (CDC) and World Health Organization (WHO) have devised risk assessment and decontamination protocols for the prevention of iatrogenic transmission of the prion diseases, incidents of possible exposure to prions have unfortunately occurred in the United States. In this article, the authors outline the historical discoveries that led from kuru to the identification and isolation of the pathological prion proteins in addition to providing a brief description of human prion diseases and iatrogenic forms of CJD, a brief history of prion disease nosocomial transmission

  15. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  16. A tree routing protocol for cognitive radio network

    Directory of Open Access Journals (Sweden)

    Mohammed Hashem

    2017-07-01

    Full Text Available Cognitive Radio (CR technology is an agile solution for spectrum congestion and spectrum access utilization problems that result from the legacy fixed spectrum management policies. CR technology can exploit unused licensed band to meet the increasing demand for radio frequency. The routing process faces many challenges in CR Network (CRN such as the absence of centralized infrastructure, the coordination between the routing module and spectrum management module, in addition to the frequent link failure due to the sudden appearance of PUs. In this paper we propose a Tree routing protocol for cognitive radio network (C-TRP that jointly utilizes the tree routing algorithm with a spectrum management module in routing decisions, and also we proposed a new metric used in taking the best route decisions. In addition, we enhance the traditional tree routing algorithm by using a neighbor table technique that speeds up the forwarding data packets. Moreover, we add a robust recovery module to C-TRP to resume the network in case of the link failure. The main motivation in the design of C-TRP is quick data transmission and maximization of date rates. The performance evaluation is carried out in NS2 simulator. The simulation results proved that C-TRP protocol achieves better performance in terms of average “PDR”, “end-to-end delay” and “routing overhead ratio “compared to “CTBR” and “STOD-RP” routing protocols.

  17. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  18. Dynamic quality of service model for improving performance of multimedia real-time transmission in industrial networks.

    Science.gov (United States)

    Gopalakrishnan, Ravichandran C; Karunakaran, Manivannan

    2014-01-01

    Nowadays, quality of service (QoS) is very popular in various research areas like distributed systems, multimedia real-time applications and networking. The requirements of these systems are to satisfy reliability, uptime, security constraints and throughput as well as application specific requirements. The real-time multimedia applications are commonly distributed over the network and meet various time constraints across networks without creating any intervention over control flows. In particular, video compressors make variable bit-rate streams that mismatch the constant-bit-rate channels typically provided by classical real-time protocols, severely reducing the efficiency of network utilization. Thus, it is necessary to enlarge the communication bandwidth to transfer the compressed multimedia streams using Flexible Time Triggered- Enhanced Switched Ethernet (FTT-ESE) protocol. FTT-ESE provides automation to calculate the compression level and change the bandwidth of the stream. This paper focuses on low-latency multimedia transmission over Ethernet with dynamic quality-of-service (QoS) management. This proposed framework deals with a dynamic QoS for multimedia transmission over Ethernet with FTT-ESE protocol. This paper also presents distinct QoS metrics based both on the image quality and network features. Some experiments with recorded and live video streams show the advantages of the proposed framework. To validate the solution we have designed and implemented a simulator based on the Matlab/Simulink, which is a tool to evaluate different network architecture using Simulink blocks.

  19. Improvement of the SEP protocol based on community structure of node degree

    Science.gov (United States)

    Li, Donglin; Wei, Suyuan

    2017-05-01

    Analyzing the Stable election protocol (SEP) in wireless sensor networks and aiming at the problem of inhomogeneous cluster-heads distribution and unreasonable cluster-heads selectivity and single hop transmission in the SEP, a SEP Protocol based on community structure of node degree (SEP-CSND) is proposed. In this algorithm, network node deployed by using grid deployment model, and the connection between nodes established by setting up the communication threshold. The community structure constructed by node degree, then cluster head is elected in the community structure. On the basis of SEP, the node's residual energy and node degree is added in cluster-heads election. The information is transmitted with mode of multiple hops between network nodes. The simulation experiments showed that compared to the classical LEACH and SEP, this algorithm balances the energy consumption of the entire network and significantly prolongs network lifetime.

  20. Minimizing transfusion requirements for children undergoing craniosynostosis repair: the CHoR protocol.

    Science.gov (United States)

    Vega, Rafael A; Lyon, Camila; Kierce, Jeannette F; Tye, Gary W; Ritter, Ann M; Rhodes, Jennifer L

    2014-08-01

    Children with craniosynostosis may require cranial vault remodeling to prevent or relieve elevated intracranial pressure and to correct the underlying craniofacial abnormalities. The procedure is typically associated with significant blood loss and high transfusion rates. The risks associated with transfusions are well documented and include transmission of infectious agents, bacterial contamination, acute hemolytic reactions, transfusion-related lung injury, and transfusion-related immune modulation. This study presents the Children's Hospital of Richmond (CHoR) protocol, which was developed to reduce the rate of blood transfusion in infants undergoing primary craniosynostosis repair. A retrospective chart review of pediatric patients treated between January 2003 and Febuary 2012 was performed. The CHoR protocol was instituted in November 2008, with the following 3 components; 1) the use of preoperative erythropoietin and iron therapy, 2) the use of an intraoperative blood recycling device, and 3) acceptance of a lower level of hemoglobin as a trigger for transfusion (protocol implementation served as controls. A total of 60 children were included in the study, 32 of whom were treated with the CHoR protocol. The control (C) and protocol (P) groups were comparable with respect to patient age (7 vs 8.4 months, p = 0.145). Recombinant erythropoietin effectively raised the mean preoperative hemoglobin level in the P group (12 vs 9.7 g/dl, p protocol that includes preoperative administration of recombinant erythropoietin, intraoperative autologous blood recycling, and accepting a lower transfusion trigger significantly decreased transfusion utilization (p < 0.001). A decreased length of stay (p < 0.001) was seen, although the authors did not investigate whether composite transfusion complication reductions led to better outcomes.

  1. Small passenger car transmission test-Chevrolet 200 transmission

    Science.gov (United States)

    Bujold, M. P.

    1980-01-01

    The small passenger car transmission was tested to supply electric vehicle manufacturers with technical information regarding the performance of commerically available transmissions which would enable them to design a more energy efficient vehicle. With this information the manufacturers could estimate vehicle driving range as well as speed and torque requirements for specific road load performance characteristics. A 1979 Chevrolet Model 200 automatic transmission was tested per a passenger car automatic transmission test code (SAE J651b) which required drive performance, coast performance, and no load test conditions. The transmission attained maximum efficiencies in the mid-eighty percent range for both drive performance tests and coast performance tests. Torque, speed and efficiency curves map the complete performance characteristics for Chevrolet Model 200 transmission.

  2. Toxoplasma gondii and pre-treatment protocols for polymerase chain reaction analysis of milk samples: a field trial in sheep from Southern Italy

    Directory of Open Access Journals (Sweden)

    Alice Vismarra

    2017-02-01

    Full Text Available Toxoplasmosis is a zoonotic disease caused by the protozoan Toxoplasma gondii. Ingestion of raw milk has been suggested as a risk for transmission to humans. Here the authors evaluated pre-treatment protocols for DNA extraction on T. gondii tachyzoite-spiked sheep milk with the aim of identifying the method that resulted in the most rapid and reliable polymerase chain reaction (PCR positivity. This protocol was then used to analyse milk samples from sheep of three different farms in Southern Italy, including real time PCR for DNA quantification and PCR-restriction fragment length polymorphism for genotyping. The pre-treatment protocol using ethylenediaminetetraacetic acid and Tris-HCl to remove casein gave the best results in the least amount of time compared to the others on spiked milk samples. One sample of 21 collected from sheep farms was positive on one-step PCR, real time PCR and resulted in a Type I genotype at one locus (SAG3. Milk usually contains a low number of tachyzoites and this could be a limiting factor for molecular identification. Our preliminary data has evaluated a rapid, cost-effective and sensitive protocol to treat milk before DNA extraction. The results of the present study also confirm the possibility of T. gondii transmission through consumption of raw milk and its unpasteurised derivatives.

  3. A Mixed Transmission Strategy to Achieve Energy Balancing in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Liu, Tong; Gu, Tao; Jin, Ning

    2017-01-01

    In this paper, we investigate the problem of energy balanced data collection in wireless sensor networks, aiming to balance energy consumption among all sensor nodes during the data propagation process. Energy balanced data collection can potentially save energy consumption and prolong network...... lifetime, and hence, it has many practical implications for sensor network design and deployment. The traditional hop-by-hop transmission model allows a sensor node to propagate its packets in a hop-by-hop manner toward the sink, resulting in poor energy balancing for the entire network. To address...... the problem, we apply a slice-based energy model, and divide the problem into inter-slice and intra-slice energy balancing problems. We then propose a probability-based strategy named inter-slice mixed transmission protocol and an intra-slice forwarding technique to address each of the problems. We propose...

  4. Data and clock transmission interface for the WCDA in LHAASO

    International Nuclear Information System (INIS)

    Chu, S.P.; Zhao, L.; Jiang, Z.Y.; Ma, C.; Gao, X.S.; Yang, Y.F.; Liu, S.B.; An, Q.

    2016-01-01

    The Water Cherenkov Detector Array (WCDA) is one of the major components of the Large High Altitude Air Shower Observatory (LHAASO). In the WCDA, 3600 Photomultiplier Tubes (PMTs) and the Front End Electronics (FEEs) are scattered over a 90000 m 2 area, while high precision time measurements (0.5 ns RMS) are required in the readout electronics. To meet this requirement, the clock has to be distributed to the FEEs with high precision. Due to the ''triggerless'' architecture, high speed data transfer is required based on the TCP/IP protocol. To simplify the readout electronics architecture and be consistent with the whole LHAASO readout electronics, the White Rabbit (WR) switches are used to transfer clock, data, and commands via a single fiber of about 400 meters. In this paper, a prototype of data and clock transmission interface for LHAASO WCDA is developed. The performance tests are conducted and the results indicate that the clock synchronization precision of the data and clock transmission is better than 50 ps. The data transmission throughput can reach 400 Mbps for one FEE board and 180 Mbps for 4 FEE boards sharing one up link port in WR switch, which is better than the requirement of the LHAASO WCDA.

  5. TRANSMISSIBLE VENEREAL TUMOR - LITERATURE REVIEW

    Directory of Open Access Journals (Sweden)

    T. R. B Berndt

    2016-11-01

    Full Text Available Transmissible venereal tumor (TVT is a contagious disease among the family of canines. Has a high prevalence in temperate regions and mainly affects male and female dogs wandering. Transmissible venereal tumor's main characteristic is a sexually transmitted cancer, through intercourse, and also transmitted through cell transplantation, an animal that has the disease to another Sound, which has an abrasion or epithelial discontinuity through licking or contact direct to neoplasia. It has no known etiology, although some authors suggest that there may be some virus as an agent. Is macroscopically observed as a crumbly mass, ulcerated, hemorrhagic, with the appearance of cauliflower. Their cells, if observed microscopically, have very clear, round and giant nucleus stained cytoplasm, and the presence of vacuolated cells in mitosis. The diagnosis can be accomplished by fine needle aspiration cytology, "imprint", histopathology, imaging tests such as x-ray and ultrasound, which are used for observation of metastases in internal organs. The main treatment is chemotherapy with substances such as vincristine dose of 0.5 to 0.7 mg / m², intra venous (IV, or from 0.0125 to 0.025 mg / kg IV once a week, four to eight weeks, and for animals which have acquired resistance to vincristine sulfate, is associated with the chemotherapeutic doxorubicin at a dose of 30 mg / m² IV once a week for four to eight weeks. Some protocols include prednisolone associated with vincristine sulfate for the treatment of Extragenital TVT.

  6. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks.

    Science.gov (United States)

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  7. An Energy-Efficient MAC Protocol Using Dynamic Queue Management for Delay-Tolerant Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yugui Qu

    2011-02-01

    Full Text Available Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  8. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Directory of Open Access Journals (Sweden)

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  9. A reliable, delay bounded and less complex communication protocol for multicluster FANETs

    Directory of Open Access Journals (Sweden)

    Wajiya Zafar

    2017-02-01

    Full Text Available Recently, Flying Ad-hoc Networks (FANETs, enabling ad-hoc networking between Unmanned Aerial Vehicles (UAVs is gaining importance in several military and civilian applications. The sensitivity of the applications requires adaptive; efficient; delay bounded and scalable communication network among UAVs for data transmission. Due to communication protocol complexity; rigidity; cost of commercial-off-the-shelf (COT components; limited radio bandwidth; high mobility and computational resources; maintaining the desired level of Quality of Service (QoS becomes a daunting task. For the first time in this research we propose multicluster FANETs for efficient network management; the proposed scheme considerably reduces communication cost and optimizes network performance as well as exploit low power; less complex and low cost IEEE 802.15.4 (MAC protocol for intercluster and intracluster communication. In this research both beacon enabled mode and beaconless modes have been investigated with Guaranteed Time Slots (GTS and virtual Time Division Multiple Access (TDMA respectively. The methodology plays a key role towards reserving bandwidth for latency critical applications; eliminate collisions and medium access delays. Moreover analysis ad-hoc routing protocols including two proactive (OLSR, DSDV and one reactive (AODV is also presented. The results shows that the proposed scheme guarantees high packet delivery ratios while maintaining acceptable levels of latency requirements comparable with more complex and dedicatedly designed protocols in literature.

  10. Survey of Transmission Cost Allocation Methodologies for Regional Transmission Organizations

    Energy Technology Data Exchange (ETDEWEB)

    Fink, S.; Porter, K.; Mudd, C.; Rogers, J.

    2011-02-01

    The report presents transmission cost allocation methodologies for reliability transmission projects, generation interconnection, and economic transmission projects for all Regional Transmission Organizations.

  11. The 'Milwaukee protocol' (MP hope does not succeeds for rabies victim

    Directory of Open Access Journals (Sweden)

    Anil Kumar Agarwal

    2017-01-01

    Full Text Available Rabies is caused by the rabies virus, an RNA-based virus in the genus Lyssavirus. Transmission typically occurs when virus-laden saliva from a rabid animal enters a wound or mucous membrane. The Milwaukee protocol, a novel procedure in which the patient was placed in a drug-induced coma and given an antiviral cocktail composed of ketamine, ribavirin, and amantadine. Considering the theory that rabies pathology stems from central nervous system neurotransmitter dysfunction, doctors hypothesized suppressed brain activity would minimize damage while the patient's immune system developed an adequate response.

  12. Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols

    Science.gov (United States)

    Schoolcraft, Joshua; Wilson, Keith

    2011-01-01

    Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of

  13. An improved energy aware distributed unequal clustering protocol for heterogeneous wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Vrinda Gupta

    2016-06-01

    Full Text Available In this paper, an improved version of the energy aware distributed unequal clustering protocol (EADUC is projected. The EADUC protocol is commonly used for solving energy hole problem in multi-hop wireless sensor networks. In the EADUC, location of base station and residual energy are given importance as clustering parameters. Based on these parameters, different competition radii are assigned to nodes. Herein, a new approach has been proposed to improve the working of EADUC, by electing cluster heads considering number of nodes in the neighborhood in addition to the above two parameters. The inclusion of the neighborhood information for computation of the competition radii provides better balancing of energy in comparison with the existing approach. Furthermore, for the selection of next hop node, the relay metric is defined directly in terms of energy expense instead of only the distance information used in the EADUC and the data transmission phase has been extended in every round by performing the data collection number of times through use of major slots and mini-slots. The methodology used is of retaining the same clusters for a few rounds and is effective in reducing the clustering overhead. The performance of the proposed protocol has been evaluated under three different scenarios and compared with existing protocols through simulations. The results show that the proposed scheme outperforms the existing protocols in terms of network lifetime in all the scenarios.

  14. Measurements on wireless transmission of ECG signals

    International Nuclear Information System (INIS)

    Gabrielli, A.; Lax, I.

    2016-01-01

    The scope of this research is to design an electronic prototype, an operative system as a proof of concept, to transmit and receive biological parameters, in particular electrocardiogram signals, through dedicated wireless circuits. The apparatus features microelectronics chips that were developed for more general biomedical applications, here adapted to deal with cardiac signals. The paper mainly focuses on the electronic aspects, as in this study we do not face medical or clinical aspects of the system. The transmitter circuit uses a commercial instrumentation amplifier and the receiver has been equipped with wide-band amplifiers along with made-in-the-lab band-pass filters centered at the carrier. We have been able to mount the entire system prototype into a preliminary data acquisition chain that reads out the electrocardiogram signal. The prototype allows acquiring the waveform, converting it to a digital pattern and open the transmission through a series of high-frequency packets exploiting the Ultra Wide Band protocol. The sensor value is embedded in the transmission through the rate of the digital packets. In fact, these are sent wireless at a specific packet-frequency that depends on the sensor amplitude and are detected into a receiver circuit that recovers the information.

  15. Measurements on wireless transmission of ECG signals

    Science.gov (United States)

    Gabrielli, A.; Lax, I.

    2016-12-01

    The scope of this research is to design an electronic prototype, an operative system as a proof of concept, to transmit and receive biological parameters, in particular electrocardiogram signals, through dedicated wireless circuits. The apparatus features microelectronics chips that were developed for more general biomedical applications, here adapted to deal with cardiac signals. The paper mainly focuses on the electronic aspects, as in this study we do not face medical or clinical aspects of the system. The transmitter circuit uses a commercial instrumentation amplifier and the receiver has been equipped with wide-band amplifiers along with made-in-the-lab band-pass filters centered at the carrier. We have been able to mount the entire system prototype into a preliminary data acquisition chain that reads out the electrocardiogram signal. The prototype allows acquiring the waveform, converting it to a digital pattern and open the transmission through a series of high-frequency packets exploiting the Ultra Wide Band protocol. The sensor value is embedded in the transmission through the rate of the digital packets. In fact, these are sent wireless at a specific packet-frequency that depends on the sensor amplitude and are detected into a receiver circuit that recovers the information.

  16. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  17. On the Performance Evaluation of a MIMO-WCDMA Transmission Architecture for Building Management Systems.

    Science.gov (United States)

    Tsampasis, Eleftherios; Gkonis, Panagiotis K; Trakadas, Panagiotis; Zahariadis, Theodοre

    2018-01-08

    The goal of this study was to investigate the performance of a realistic wireless sensor nodes deployment in order to support modern building management systems (BMSs). A three-floor building orientation is taken into account, where each node is equipped with a multi-antenna system while a central base station (BS) collects and processes all received information. The BS is also equipped with multiple antennas; hence, a multiple input-multiple output (MIMO) system is formulated. Due to the multiple reflections during transmission in the inner of the building, a wideband code division multiple access (WCDMA) physical layer protocol has been considered, which has already been adopted for third-generation (3G) mobile networks. Results are presented for various MIMO orientations, where the mean transmission power per node is considered as an output metric for a specific signal-to-noise ratio (SNR) requirement and number of resolvable multipath components. In the first set of presented results, the effects of multiple access interference on overall transmission power are highlighted. As the number of mobile nodes per floor or the requested transmission rate increases, MIMO systems of a higher order should be deployed in order to maintain transmission power at adequate levels. In the second set of results, a comparison is performed among transmission in diversity combining and spatial multiplexing mode, which clearly indicate that the first case is the most appropriate solution for indoor communications.

  18. Transmission eigenvalues

    Science.gov (United States)

    Cakoni, Fioralba; Haddar, Houssem

    2013-10-01

    In inverse scattering theory, transmission eigenvalues can be seen as the extension of the notion of resonant frequencies for impenetrable objects to the case of penetrable dielectrics. The transmission eigenvalue problem is a relatively late arrival to the spectral theory of partial differential equations. Its first appearance was in 1986 in a paper by Kirsch who was investigating the denseness of far-field patterns for scattering solutions of the Helmholtz equation or, in more modern terminology, the injectivity of the far-field operator [1]. The paper of Kirsch was soon followed by a more systematic study by Colton and Monk in the context of developing the dual space method for solving the inverse scattering problem for acoustic waves in an inhomogeneous medium [2]. In this paper they showed that for a spherically stratified media transmission eigenvalues existed and formed a discrete set. Numerical examples were also given showing that in principle transmission eigenvalues could be determined from the far-field data. This first period of interest in transmission eigenvalues was concluded with papers by Colton et al in 1989 [3] and Rynne and Sleeman in 1991 [4] showing that for an inhomogeneous medium (not necessarily spherically stratified) transmission eigenvalues, if they existed, formed a discrete set. For the next seventeen years transmission eigenvalues were ignored. This was mainly due to the fact that, with the introduction of various sampling methods to determine the shape of an inhomogeneous medium from far-field data, transmission eigenvalues were something to be avoided and hence the fact that transmission eigenvalues formed at most a discrete set was deemed to be sufficient. In addition, questions related to the existence of transmission eigenvalues or the structure of associated eigenvectors were recognized as being particularly difficult due to the nonlinearity of the eigenvalue problem and the special structure of the associated transmission

  19. Small passenger car transmission test; Chevrolet LUV transmission

    Science.gov (United States)

    Bujold, M. P.

    1980-01-01

    A 1978 Chevrolet LUV manual transmission tested per the applicable portions of a passenger car automatic transmission test code (SAE J65lb) which required drive performance, coast performance, and no load test conditions. Under these test conditions, the transmission attained maximum efficiencies in the upper ninety percent range for both drive performance tests and coast performance tests. The major results of this test (torque, speed, and efficiency curves) are presented. Graphs map the complete performance characteristics for the Chevrolet LUV transmission.

  20. PROTOCOLS FOR INCREASING THE LIFETIME OF NODES OF AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    B.Malarkodi

    2010-03-01

    Full Text Available Power consumption of nodes in ad hoc networks is a critical issue as they predominantly operate on batteries. In order to improve the lifetime of an ad hoc network, all the nodes must be utilized evenly and the power required for connections must be minimized. Energy management deals with the process of managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources so as to increase the lifetime of the nodes of an ad hoc wireless network. In this paper, two protocols are proposed to improve the lifetime of the nodes. The first protocol assumes smart battery packages with L cells and uses dynamic programming (DP to optimally select the set of cells used to satisfy a request for power. The second one proposes a MAC layer protocol denoted as Power Aware medium Access Control (PAMAC protocol which enables the network layer to select a route with minimum total power requirement among the possible routes between a source and a destination provided all nodes in the routes have battery capacity above a threshold. The life time of the nodes using the DP based scheduling policy is found through simulation and compared with that obtained using the techniques reported in the literature. It is found that DP based policy increases the lifetime of the mobile nodes by a factor of 1.15 to 1.8. The life expectancy, the average power consumption and throughput of the network using PAMAC protocol are computed through simulation and compared with that of the other MAC layer protocols 802.11, MACA, and CSMA. Besides this, the life expectancy and average power consumption of the network for different values of threshold are also compared. From the simulation results, it is observed that PAMAC consumes the least power and provides the longest lifetime among the various MAC Layer protocols. Moreover, using PAMAC as the MAC layer protocol, the performance obtained using different routing layer

  1. Transmission issues

    International Nuclear Information System (INIS)

    Bradford, J.; Wilson, L.; Thon, S.; Millar, N.

    2005-01-01

    This session on transmission issues focused on the role that transmission plays in electricity markets and the importance of getting the market structure right in terms of generation divestiture with buy back contracts, demand side responsive programs, transmission upgrades and long term contracts. The difficulties of distinguishing between market power and scarcity were examined along with some of the complications that ensue if transmission experiences congestion, as exemplified by the August 2003 blackout in eastern North America. The presentations described the best ways to handle transmission issues, and debated whether transmission should be deregulated or follow market forces. Issues of interconnections and reliability of connections were also debated along with the attempt to integrate renewables into the grid. Some presentations identified what new transmission must be built and what must be done to ensure that transmission gets built. The challenges and business opportunities for transmission in Alberta were discussed with reference to plans to invest in new infrastructure, where it is going outside of the province and how it works with other jurisdictions. Manitoba's Conawapa Hydro Project and its 2000 MW tie line to Ontario was also discussed. Some examples of non-optimal use of interconnections in Europe were also discussed in an effort to learn from these mistakes and avoid them in Canada. tabs., figs

  2. Evaluation of PLC Channel Capacity and ABER Performances for OFDM-Based Two-Hop Relaying Transmission

    Directory of Open Access Journals (Sweden)

    Sana Ezzine

    2017-01-01

    Full Text Available Powerline network is recognized as a favorable infrastructure for Smart Grid to transmit information in the network thanks to its broad coverage and low cost deployment. The existing works are trying to improve and adapt transmission techniques to reduce Powerline Communication (PLC channel attenuation and exploit the limited bandwidth to support high data rate over long distances. Two-hop relaying BroadBand PLC (BB-PLC system, in which Orthogonal Frequency Division Multiplexing (OFDM is used, is considered in this paper. We derive and compare the PLC channel capacity and the end-to-end Average BER (ABER for OFDM-based direct link (DL BB-PLC system and for OFDM-based two-hop relaying BB-PLC system for Amplify and Forward (AF and Decode and Forward (DF protocols. We analyze the improvements when we consider the direct link in a cooperative communication when the relay node only transmits the correctly decoded signal. Maximum ratio combining is employed at the destination node to detect the transmitted signal. In addition, in this paper, we highlight the impact of the relay location on the channel capacity and ABER for AF and DF transmission protocols. Moreover, an efficient use of the direct link was also investigated in this paper.

  3. Downlink Cooperative Broadcast Transmission Based on Superposition Coding in a Relaying System for Future Wireless Sensor Networks.

    Science.gov (United States)

    Liu, Yang; Han, Guangjie; Shi, Sulong; Li, Zhengquan

    2018-06-20

    This study investigates the superiority of cooperative broadcast transmission over traditional orthogonal schemes when applied in a downlink relaying broadcast channel (RBC). Two proposed cooperative broadcast transmission protocols, one with an amplify-and-forward (AF) relay, and the other with a repetition-based decode-and-forward (DF) relay, are investigated. By utilizing superposition coding (SupC), the source and the relay transmit the private user messages simultaneously instead of sequentially as in traditional orthogonal schemes, which means the channel resources are reused and an increased channel degree of freedom is available to each user, hence the half-duplex penalty of relaying is alleviated. To facilitate a performance evaluation, theoretical outage probability expressions of the two broadcast transmission schemes are developed, based on which, we investigate the minimum total power consumption of each scheme for a given traffic requirement by numerical simulation. The results provide details on the overall system performance and fruitful insights on the essential characteristics of cooperative broadcast transmission in RBCs. It is observed that better overall outage performances and considerable power gains can be obtained by utilizing cooperative broadcast transmissions compared to traditional orthogonal schemes.

  4. GUI implementation of image encryption and decryption using Open CV-Python script on secured TFTP protocol

    Science.gov (United States)

    Reddy, K. Rasool; Rao, Ch. Madhava

    2018-04-01

    Currently safety is one of the primary concerns in the transmission of images due to increasing the use of images within the industrial applications. So it's necessary to secure the image facts from unauthorized individuals. There are various strategies are investigated to secure the facts. In that encryption is certainly one of maximum distinguished method. This paper gives a sophisticated Rijndael (AES) algorithm to shield the facts from unauthorized humans. Here Exponential Key Change (EKE) concept is also introduced to exchange the key between client and server. The things are exchange in a network among client and server through a simple protocol is known as Trivial File Transfer Protocol (TFTP). This protocol is used mainly in embedded servers to transfer the data and also provide protection to the data if protection capabilities are integrated. In this paper, implementing a GUI environment for image encryption and decryption. All these experiments carried out on Linux environment the usage of Open CV-Python script.

  5. Amyotrophic lateral sclerosis and organ donation: is there risk of disease transmission?

    Science.gov (United States)

    Holmes, Brandon B; Diamond, Marc I

    2012-12-01

    A new protocol suggests that patients with amyotrophic lateral sclerosis (ALS) are a viable source of tissue for organ transplantation. However, multiple lines of evidence suggest that many neurodegenerative diseases, including ALS, might progress due to transcellular propagation of protein aggregation among neurons. Transmission of the disease state from donor to host thus may be possible under the permissive circumstances of graft transplantation. We argue for careful patient selection and close longitudinal follow-up of recipients when harvesting organs from individuals with neurodegenerative disease, especially dominantly inherited forms. Copyright © 2012 American Neurological Association.

  6. First Annual Progress Report on Transmission of Information by Acoustic Communication along Metal Pathways in Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Heifetz, A. [Argonne National Lab. (ANL), Argonne, IL (United States). Nuclear Engineering Division; Bakhtiari, S. [Argonne National Lab. (ANL), Argonne, IL (United States). Nuclear Engineering Division; Huang, X. [Argonne National Lab. (ANL), Argonne, IL (United States). Nuclear Engineering Division; Ponciroli, R. [Argonne National Lab. (ANL), Argonne, IL (United States). Nuclear Engineering Division; Vilim, R. B. [Argonne National Lab. (ANL), Argonne, IL (United States). Nuclear Engineering Division

    2017-09-30

    The objective of this project is to develop and demonstrate methods for transmission of information in nuclear facilities by acoustic means along existing in-place metal piping infrastructure. Pipes are omnipresent in a nuclear facility, and penetrate enclosures and partitions, such as the containment building wall. In the envisioned acoustic communication (AC) system, packets of information will be transmitted as guided acoustic waves along pipes. Performance of AC hardware and network protocols for efficient and secure communications under development in this project will be eventually evaluated in a representative nuclear power plant environment. Research efforts in the first year of this project have been focused on identification of appropriate transducers, and evaluation of their performance for information transmission along nuclear-grade metallic pipes. COMSOL computer simulations were performed to study acoustic wave generation, propagation, and attenuation on pipes. An experimental benchtop system was used to evaluate signal attenuation and spectral dispersion using piezo-electric transducers (PZTs) and electromagnetic acoustic transducers (EMATs). Communication protocols under evaluation consisted on-off keying (OOK) signal modulation, in particular amplitude shift keying (ASK) and phase shift keying (PSK). Tradeoffs between signal power and communication data rate were considered for ASK and PSK coding schemes.

  7. Additional protocol between France, EURATOM and IAEA. 2001-2002 ordinary session. Project of law authorizing the ratification of the additional protocol to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the application of warranties in France

    International Nuclear Information System (INIS)

    2002-01-01

    This additional protocol to the agreement between France, EURATOM and the IAEA aims at reinforcing the nuclear weapons non-proliferation regime. This protocol widens the field of competences of the IAEA with the supply of new information relative to: the civil nuclear cooperation between France and countries having no nuclear weapons in the domain of fuel cycle; the regular inspection of French nuclear facilities; the trade (import and export) of medium- or high-level radioactive wastes containing plutonium, highly enriched uranium or 233 U, and the trade of some non-nuclear equipments or materials with countries having no nuclear weapons. The protocol defines also some practical dispositions relative to the delays and periodicity of controls, to the transmission of data, to the appointment of IAEA inspectors and their access to the facilities and sites considered. The list of the activities and equipments covered by the protocol are given in appendixes. (J.S.)

  8. A feedback-retransmission based asynchronous frequency hopping MAC protocol for military aeronautical ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jinhui TANG

    2018-05-01

    Full Text Available Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control (MAC designed for this application works well only in very light-load scenarios; as a consequence, the performances of system throughput and channel utilization are degraded. For this problem, a feedback-retransmission based asynchronous FRequency hopping Media Access (FRMA control protocol is proposed. Burst communication, asynchronous Frequency Hopping (FH, channel coding, and feedback retransmission are utilized in FRMA. With the mechanism of asynchronous FH, immediate packet transmission and multi-packet reception can be realized, and thus the timeliness is improved. Furthermore, reliability can be achieved via channel coding and feedback retransmission. With theories of queuing theory, Markov model, packets collision model, and discrete Laplace transformation, the formulas of packet success probability, system throughput, average packet end-to-end delay, and delay distribution are obtained. The approximation accuracy of theoretical derivation is verified by experimental results. Within a light-load network, the proposed FRMA has the ability of millisecond delay and 99% reliability as well as outperforms the non-feedback-retransmission based asynchronous frequency hopping media access control protocol. Keywords: Ad hoc networks, Aeronautical communications, Frequency hopping, Media Access Control (MAC, Time-sensitive

  9. Modelling a New Product Model on the Basis of an Existing STEP Application Protocol

    Directory of Open Access Journals (Sweden)

    B.-R. Hoehn

    2005-01-01

    Full Text Available During the last years a great range of computer aided tools has been generated to support the development process of various products. The goal of a continuous data flow, needed for high efficiency, requires powerful standards for the data exchange. At the FZG (Gear Research Centre of the Technical University of Munich there was a need for a common gear data format for data exchange between gear calculation programs. The STEP standard ISO 10303 was developed for this type of purpose, but a suitable definition of gear data was still missing, even in the Application Protocol AP 214, developed for the design process in the automotive industry. The creation of a new STEP Application Protocol or the extension of existing protocol would be a very time consumpting normative process. So a new method was introduced by FZG. Some very general definitions of an Application Protocol (here AP 214 were used to determine rules for an exact specification of the required kind of data. In this case a product model for gear units was defined based on elements of the AP 214. Therefore no change of the Application Protocol is necessary. Meanwhile the product model for gear units has been published as a VDMA paper and successfully introduced for data exchange within the German gear industry associated with FVA (German Research Organisation for Gears and Transmissions. This method can also be adopted for other applications not yet sufficiently defined by STEP. 

  10. Secure and Efficient Transmission of Hyperspectral Images for Geosciences Applications

    Science.gov (United States)

    Carpentieri, Bruno; Pizzolante, Raffaele

    2017-12-01

    Hyperspectral images are acquired through air-borne or space-borne special cameras (sensors) that collect information coming from the electromagnetic spectrum of the observed terrains. Hyperspectral remote sensing and hyperspectral images are used for a wide range of purposes: originally, they were developed for mining applications and for geology because of the capability of this kind of images to correctly identify various types of underground minerals by analysing the reflected spectrums, but their usage has spread in other application fields, such as ecology, military and surveillance, historical research and even archaeology. The large amount of data obtained by the hyperspectral sensors, the fact that these images are acquired at a high cost by air-borne sensors and that they are generally transmitted to a base, makes it necessary to provide an efficient and secure transmission protocol. In this paper, we propose a novel framework that allows secure and efficient transmission of hyperspectral images, by combining a reversible invisible watermarking scheme, used in conjunction with digital signature techniques, and a state-of-art predictive-based lossless compression algorithm.

  11. A novel power efficient location-based cooperative routing with transmission power-upper-limit for wireless sensor networks.

    Science.gov (United States)

    Shi, Juanfei; Calveras, Anna; Cheng, Ye; Liu, Kai

    2013-05-15

    The extensive usage of wireless sensor networks (WSNs) has led to the development of many power- and energy-efficient routing protocols. Cooperative routing in WSNs can improve performance in these types of networks. In this paper we discuss the existing proposals and we propose a routing algorithm for wireless sensor networks called Power Efficient Location-based Cooperative Routing with Transmission Power-upper-limit (PELCR-TP). The algorithm is based on the principle of minimum link power and aims to take advantage of nodes cooperation to make the link work well in WSNs with a low transmission power. In the proposed scheme, with a determined transmission power upper limit, nodes find the most appropriate next nodes and single-relay nodes with the proposed algorithm. Moreover, this proposal subtly avoids non-working nodes, because we add a Bad nodes Avoidance Strategy (BAS). Simulation results show that the proposed algorithm with BAS can significantly improve the performance in reducing the overall link power, enhancing the transmission success rate and decreasing the retransmission rate.

  12. A Novel Power Efficient Location-Based Cooperative Routing with Transmission Power-Upper-Limit for Wireless Sensor Networks

    Science.gov (United States)

    Shi, Juanfei; Calveras, Anna; Cheng, Ye; Liu, Kai

    2013-01-01

    The extensive usage of wireless sensor networks (WSNs) has led to the development of many power- and energy-efficient routing protocols. Cooperative routing in WSNs can improve performance in these types of networks. In this paper we discuss the existing proposals and we propose a routing algorithm for wireless sensor networks called Power Efficient Location-based Cooperative Routing with Transmission Power-upper-limit (PELCR-TP). The algorithm is based on the principle of minimum link power and aims to take advantage of nodes cooperation to make the link work well in WSNs with a low transmission power. In the proposed scheme, with a determined transmission power upper limit, nodes find the most appropriate next nodes and single-relay nodes with the proposed algorithm. Moreover, this proposal subtly avoids non-working nodes, because we add a Bad nodes Avoidance Strategy (BAS). Simulation results show that the proposed algorithm with BAS can significantly improve the performance in reducing the overall link power, enhancing the transmission success rate and decreasing the retransmission rate. PMID:23676625

  13. Information-guided transmission in decode-and-forward relaying systems: Spatial exploitation and throughput enhancement

    KAUST Repository

    Yang, Yuli

    2011-07-01

    In addressing the issue of achieving high throughput in half-duplex relay channels, we exploit a concept of information-guided transmission for the network consisting of a source node, a destination node, and multiple half-duplex relay nodes. For further benefiting from multiple relay nodes, the relay-selection patterns are defined as the arbitrary combinations of given relay nodes. By exploiting the difference among the spatial channels states, in each relay-help transmission additional information to be forwarded is mapped onto the index of the active relay-selection pattern besides the basic information mapped onto the traditional constellation, which is forwarded by the relay node(s) in the active relay-selection pattern, so as to enhance the relay throughtput. With iterative decoding, the destination node can achieve a robust detection by decoupling the signals forwarded in different ways. We investigate the proposed scheme considering "decode-and-forward" protocol and establish its achievable transmission rate. The analytical results on capacity behaviors prove the efficiency of the proposed scheme by showing that it achieves better capacity performance than the conventional scheme. © 2011 IEEE.

  14. A New Resource Allocation Protocol for the Backhaul of Underwater Cellular Wireless Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2018-01-01

    Full Text Available In this paper, an underwater base station initiating (UBSI resource allocation is proposed for underwater cellular wireless networks (UCWNs, which is a new approach to determine the backhaul capacity of underwater base stations (UBSs. This backhaul is a communication link from a UBS to a UBS controller (UBSC. Contrary to conventional resource allocation protocols, a UBS initiates to re-determine its backhaul capacity for itself according to its queue status; it releases a portion of its backhaul capacity in the case of experiencing resource under-utilization, and also requests additional backhaul capacity to the UBSC if packet drops are caused due to queue-overflow. This protocol can be appropriate and efficient to the underwater backhaul link where the transmission rate is quite low and the latency is unneglectable. In order to investigate the applicability of the UBSI resource allocation protocol to the UCWN, its performance is extensively analyzed via system level simulations. In our analysis, considered performance measures include average packet drop rate, average resource utilization, average message overhead, and the reserved capacity of the UBSC. In particular, the simulation results show that our proposed protocol not only utilizes most of the given backhaul capacity (more than 90 percent of resource utilization on the average, but also reduces controlling message overheads induced by resource allocation (less than 2 controlling messages on the average. It is expected that the simulation results and analysis in this paper can be used as operating guidelines to apply our new resource allocation protocol for the UCWN.

  15. Effects of a peracetic acid disinfection protocol on the biocompatibility and biomechanical properties of human patellar tendon allografts.

    Science.gov (United States)

    Lomas, R J; Jennings, L M; Fisher, J; Kearney, J N

    2004-01-01

    Patellar tendon allografts, retrieved from cadaveric human donors, are widely used for replacement of damaged cruciate ligaments. In common with other tissue allografts originating from cadaveric donors, there are concerns regarding the potential for disease transmission from the donor to the recipient. Additionally, retrieval and subsequent processing protocols expose the graft to the risk of environmental contamination. For these reasons, disinfection or sterilisation protocols are necessary for these grafts before they are used clinically. A high-level disinfection protocol, utilising peracetic acid (PAA), has been developed and investigated for its effects on the biocompatibility and biomechanics of the patellar tendon allografts. PAA disinfection did not render the grafts either cytotoxic or liable to provoke an inflammatory response as assessed in vitro . However, the protocol was shown to increase the size of gaps between the tendon fibres in the matrix and render the grafts more susceptible to digestion with collagenase. Biomechanical studies of the tendons showed that PAA treatment had no effect on the ultimate tensile stress or Young's modulus of the tendons, and that ultimate strain was significantly higher in PAA treated tendons.

  16. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum

    International Nuclear Information System (INIS)

    Wang Le; Zhao Sheng-Mei; Cheng Wei-Wen; Gong Long-Yan

    2015-01-01

    In this paper, we propose a measurement-device-independent quantum-key-distribution (MDI-QKD) protocol using orbital angular momentum (OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol, the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie’s successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover, the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence (AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. (paper)

  17. Data Recovery using Side Information from the Wireless M-Bus Protocol

    DEFF Research Database (Denmark)

    Melchior Jacobsen, Rasmus; Popovski, Petar

    2013-01-01

    Dedicated infrastructure for wireless battery-powered smart meters involves a costly setup. To reduce the cost, one often made compromise is the link reliability, where a majority of packets are allowed to be in error, as long as a few packets are received over a long time frame. On the other hand......, each meter transmits frequently to accommodate for drive-by/walk-by remote reading applications, leaving redundancy in the transmissions seen on a dedicated receiver. We utilize the redundancy and the inherent timing structure of the protocol in order to recover metering data from multiple erroneous...

  18. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998

    International Nuclear Information System (INIS)

    2005-04-01

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  19. Neuroglial Transmission

    DEFF Research Database (Denmark)

    Gundersen, Vidar; Storm-Mathisen, Jon; Bergersen, Linda Hildegard

    2015-01-01

    as a signaling substance recently shown to act on specific lactate receptors in the brain. Complementing neurotransmission at a synapse, neuroglial transmission often implies diffusion of the transmitter over a longer distance and concurs with the concept of volume transmission. Transmission from glia modulates...... synaptic neurotransmission based on energetic and other local conditions in a volume of tissue surrounding the individual synapse. Neuroglial transmission appears to contribute significantly to brain functions such as memory, as well as to prevalent neuropathologies....

  20. 47 CFR 25.212 - Narrowband analog transmissions, digital transmissions, and video transmissions in the GSO Fixed...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Narrowband analog transmissions, digital transmissions, and video transmissions in the GSO Fixed-Satellite Service. 25.212 Section 25.212 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS...

  1. Additional protocol between France, EURATOM and IAEA. 2001-2002 ordinary session. Project of law authorizing the ratification of the additional protocol to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the application of warranties in France; Protocole additionnel entre la France, Euratom et l'AIEA. Session ordinaire de 2001-2002. Projet de loi autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This additional protocol to the agreement between France, EURATOM and the IAEA aims at reinforcing the nuclear weapons non-proliferation regime. This protocol widens the field of competences of the IAEA with the supply of new information relative to: the civil nuclear cooperation between France and countries having no nuclear weapons in the domain of fuel cycle; the regular inspection of French nuclear facilities; the trade (import and export) of medium- or high-level radioactive wastes containing plutonium, highly enriched uranium or {sup 233}U, and the trade of some non-nuclear equipments or materials with countries having no nuclear weapons. The protocol defines also some practical dispositions relative to the delays and periodicity of controls, to the transmission of data, to the appointment of IAEA inspectors and their access to the facilities and sites considered. The list of the activities and equipments covered by the protocol are given in appendixes. (J.S.)

  2. Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach

    Directory of Open Access Journals (Sweden)

    Cheng Xiuzhen

    2010-01-01

    Full Text Available Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC protocol that is latency-optimized and energy-efficient scheme and combines the physical layer and the MAC layer to shorten transmission delay. On physical layer, we apply convolution coding and interleaver for transmitted information. Moreover, dynamic code rate is exploited at the receiver side to accelerate data reception rate. On MAC layer, unfixed frame length scheme is applied to reduce transmission delay, and to ensure the data successful transmission rate at the same time. Furthermore, we propose a network topology: an underwater acoustic sensor network with mobile agent. Through fully utilizing the supper capabilities on computation and mobility of autonomous underwater vehicles, the energy consumption for fixed sensor nodes can be extremely reduced, so that the lifetime of networks is extended.

  3. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  4. QoS and energy aware cooperative routing protocol for wildfire monitoring wireless sensor networks.

    Science.gov (United States)

    Maalej, Mohamed; Cherif, Sofiane; Besbes, Hichem

    2013-01-01

    Wireless sensor networks (WSN) are presented as proper solution for wildfire monitoring. However, this application requires a design of WSN taking into account the network lifetime and the shadowing effect generated by the trees in the forest environment. Cooperative communication is a promising solution for WSN which uses, at each hop, the resources of multiple nodes to transmit its data. Thus, by sharing resources between nodes, the transmission quality is enhanced. In this paper, we use the technique of reinforcement learning by opponent modeling, optimizing a cooperative communication protocol based on RSSI and node energy consumption in a competitive context (RSSI/energy-CC), that is, an energy and quality-of-service aware-based cooperative communication routing protocol. Simulation results show that the proposed algorithm performs well in terms of network lifetime, packet delay, and energy consumption.

  5. The Traffic Adaptive Data Dissemination (TrAD Protocol for both Urban and Highway Scenarios

    Directory of Open Access Journals (Sweden)

    Bin Tian

    2016-06-01

    Full Text Available The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  6. The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.

    Science.gov (United States)

    Tian, Bin; Hou, Kun Mean; Zhou, Haiying

    2016-06-21

    The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  7. Consensus for linear multi-agent system with intermittent information transmissions using the time-scale theory

    Science.gov (United States)

    Taousser, Fatima; Defoort, Michael; Djemai, Mohamed

    2016-01-01

    This paper investigates the consensus problem for linear multi-agent system with fixed communication topology in the presence of intermittent communication using the time-scale theory. Since each agent can only obtain relative local information intermittently, the proposed consensus algorithm is based on a discontinuous local interaction rule. The interaction among agents happens at a disjoint set of continuous-time intervals. The closed-loop multi-agent system can be represented using mixed linear continuous-time and linear discrete-time models due to intermittent information transmissions. The time-scale theory provides a powerful tool to combine continuous-time and discrete-time cases and study the consensus protocol under a unified framework. Using this theory, some conditions are derived to achieve exponential consensus under intermittent information transmissions. Simulations are performed to validate the theoretical results.

  8. Quantifying Transmission.

    Science.gov (United States)

    Woolhouse, Mark

    2017-07-01

    Transmissibility is the defining characteristic of infectious diseases. Quantifying transmission matters for understanding infectious disease epidemiology and designing evidence-based disease control programs. Tracing individual transmission events can be achieved by epidemiological investigation coupled with pathogen typing or genome sequencing. Individual infectiousness can be estimated by measuring pathogen loads, but few studies have directly estimated the ability of infected hosts to transmit to uninfected hosts. Individuals' opportunities to transmit infection are dependent on behavioral and other risk factors relevant given the transmission route of the pathogen concerned. Transmission at the population level can be quantified through knowledge of risk factors in the population or phylogeographic analysis of pathogen sequence data. Mathematical model-based approaches require estimation of the per capita transmission rate and basic reproduction number, obtained by fitting models to case data and/or analysis of pathogen sequence data. Heterogeneities in infectiousness, contact behavior, and susceptibility can have substantial effects on the epidemiology of an infectious disease, so estimates of only mean values may be insufficient. For some pathogens, super-shedders (infected individuals who are highly infectious) and super-spreaders (individuals with more opportunities to transmit infection) may be important. Future work on quantifying transmission should involve integrated analyses of multiple data sources.

  9. Study on the Extremely Low Frequency (ELF) Electromagnetic Field (EMF) emission from overhead High-Voltage Transmission Lines

    International Nuclear Information System (INIS)

    Parthasarathy, S.R.; Roha Tukimin; Wan Saffiey Wan Abdullah; Zulkifli Yusof; Mohd Azizi Mohd Jali

    2016-01-01

    The paper highlights the study on the Extremely Low Frequency (ELF) Electromagnetic Field (EMF) emission performed at an overhead 275-kV High-Voltage Transmission Lines. The study comprised of assessment at the transmission lines on 3 different cases and locations in Klang Valley, specifically on a vacant land near the transmission line, inside and around the house at the vicinity of the transmission line and the area directly under the transmission line. The instrument setup and measurement protocols during the assessment were adopted from standard measurement method and procedures stipulated under the Institute of Electrical and Electronics Engineers (IEEE) Standard. The results were compared with the standards recommended in the International Commission on Non-Ionizing Radiation Protection (ICNIRP) guidelines. The results showed that the measured field strengths are within the safety limit with the highest measured exposure was 10.8 % and 1.8 % of the permissible exposure limit for the electric and magnetic field respectively. Both the field strengths were found to drop significantly against distance from the transmission lines where closer distances showed higher field strengths. Furthermore, the study revealed that buildings and other object such as trees and shrubs screen out the electric field, resulting in a lower value at indoor measurements and near the stated objects. In addition, higher value of electric and magnetic field strengths were recorded when assessment was being done directly under the transmission line compared to the lateral measurement. (author)

  10. Interrupting seasonal transmission of Schistosoma haematobium and control of soil-transmitted helminthiasis in northern and central Côte d'Ivoire: a SCORE study protocol.

    Science.gov (United States)

    Tian-Bi, Yves-Nathan T; Ouattara, Mamadou; Knopp, Stefanie; Coulibaly, Jean T; Hürlimann, Eveline; Webster, Bonnie; Allan, Fiona; Rollinson, David; Meïté, Aboulaye; Diakité, Nana R; Konan, Cyrille K; N'Goran, Eliézer K; Utzinger, Jürg

    2018-01-29

    To achieve a world free of schistosomiasis, the objective is to scale up control and elimination efforts in all endemic countries. Where interruption of transmission is considered feasible, countries are encouraged to implement a comprehensive intervention package, including preventive chemotherapy, information, education and communication (IEC), water, sanitation and hygiene (WASH), and snail control. In northern and central Côte d'Ivoire, transmission of Schistosoma haematobium is seasonal and elimination might be achieved. In a cluster-randomised trial, we will assess different treatment schemes to interrupt S. haematobium transmission and control soil-transmitted helminthiasis over a 3-year period. We will compare the impact of (i) arm A: annual mass drug administration (MDA) with praziquantel and albendazole before the peak schistosomiasis transmission season; (ii) arm B: annual MDA after the peak schistosomiasis transmission season; (iii) arm C: two yearly treatments before and after peak schistosomiasis transmission; and (iv) arm D: annual MDA before peak schistosomiasis transmission, coupled with chemical snail control using niclosamide. The prevalence and intensity of S. haematobium and soil-transmitted helminth infections will be assessed using urine filtration and Kato-Katz thick smears, respectively, in six administrative regions in northern and central parts of Côte d'Ivoire. Once a year, urine and stool samples will be collected and examined from 50 children aged 5-8 years, 100 children aged 9-12 years and 50 adults aged 20-55 years in each of 60 selected villages. Changes in S. haematobium and soil-transmitted helminth prevalence and intensity will be assessed between years and stratified by intervention arm. In the 15 villages randomly assigned to intervention arm D, intermediate host snails will be collected three times per year, before niclosamide is applied to the selected freshwater bodies. The snail abundance and infection rates over time

  11. Transmission Line Series Compensation for Wind Energy Transmission

    International Nuclear Information System (INIS)

    Palanichamy, C; Wong, Y C

    2015-01-01

    Wind energy has demonstrated to be a clean, copious and absolutely renewable source of energy, and the large penetration of it into the power grid indicates that wind energy is considered an effective means of power generation, Transmission of wind energy from remote locations to load centers necessitates long transmission lines. Series compensation is a proven and economical transmission solution to address system power transfer strength, grid stability, and voltage profile issues of long transmission lines. In this paper, a programmable approach to determine the capacitive reactance of series capacitor and optimum location for its placement to achieve maximum power transfer gas been presented. The respective program with sample solutions has been provided for real-time applications. (paper)

  12. Space power transmission

    Energy Technology Data Exchange (ETDEWEB)

    Kuribayashi, Shizuma [Mitsubishi Heavy Industries, Ltd., Tokyo, (Japan)

    1989-10-05

    There being a conception to utilize solar energy by use of a space power station (SPS), a method to bring that universal grace to mankind is wireless energy transmission. The wireless energy transmission is regarded to be microwave transmission or laser beam transmission. The microwave transmission is to transmit 2.45GHz band microwave from the SPS to a receiving station on the ground to meet power demand on earth. The microwave, as small in attenuation in atmosphere and resistant against rain and cloud, is made candidate and, however, problematic in influence on organism, necessary large area of receiving antenna and many other points to be studied. While the laser transmission, as more convergent of beam than the microwave transmission, is advantageous with enabling the receiving area to be small and, however, disadvantageous with being not resistant against dust, rain and cloud, if used for the energy transmission between the space and earth. 2 refs., 2 figs.

  13. Wireless Transmission of Big Data: A Transmission Time Analysis over Fading Channel

    KAUST Repository

    Wang, Wen-Jing; Yang, Hong-Chuan; Alouini, Mohamed-Slim

    2018-01-01

    In this paper, we investigate the transmission time of a large amount of data over fading wireless channel with adaptive modulation and coding (AMC). Unlike traditional transmission systems, where the transmission time of a fixed amount of data is typically regarded as a constant, the transmission time with AMC becomes a random variable, as the transmission rate varies with the fading channel condition. To facilitate the design and optimization of wireless transmission schemes for big data applications, we present an analytical framework to determine statistical characterizations for the transmission time of big data with AMC. In particular, we derive the exact statistics of transmission time over block fading channels. The probability mass function (PMF) and cumulative distribution function (CDF) of transmission time are obtained for both slow and fast fading scenarios. We further extend our analysis to Markov channel, where transmission time becomes the sum of a sequence of exponentially distributed time slots. Analytical expression for the probability density function (PDF) of transmission time is derived for both fast fading and slow fading scenarios. These analytical results are essential to the optimal design and performance analysis of future wireless transmission systems for big data applications.

  14. Wireless Transmission of Big Data: A Transmission Time Analysis over Fading Channel

    KAUST Repository

    Wang, Wen-Jing

    2018-04-10

    In this paper, we investigate the transmission time of a large amount of data over fading wireless channel with adaptive modulation and coding (AMC). Unlike traditional transmission systems, where the transmission time of a fixed amount of data is typically regarded as a constant, the transmission time with AMC becomes a random variable, as the transmission rate varies with the fading channel condition. To facilitate the design and optimization of wireless transmission schemes for big data applications, we present an analytical framework to determine statistical characterizations for the transmission time of big data with AMC. In particular, we derive the exact statistics of transmission time over block fading channels. The probability mass function (PMF) and cumulative distribution function (CDF) of transmission time are obtained for both slow and fast fading scenarios. We further extend our analysis to Markov channel, where transmission time becomes the sum of a sequence of exponentially distributed time slots. Analytical expression for the probability density function (PDF) of transmission time is derived for both fast fading and slow fading scenarios. These analytical results are essential to the optimal design and performance analysis of future wireless transmission systems for big data applications.

  15. Self-Adaptive Context Aware Routing Protocol for Unicast Communication in Delay and Tolerant Network

    Directory of Open Access Journals (Sweden)

    Yunbo Chen

    2014-05-01

    Full Text Available At present, most of research works in mobile network focus on the network overhead of the known path which exists between the sender and the receiver. However, the trend of the current practical application demands is becoming increasingly distributed and decentralized. The Delay and Tolerant Network (DTN just comes out of such background of the conflicts between them. The DTN could effectively eliminate the gap between the mobile network and the practical application demands. In this paper, a Self-Adaptive Context Aware Routing Protocol (SACARP for the unicast communication in delay and tolerant networks is presented. Meanwhile, according to the real-time context information of DTN, the Kalman filter theory is introduced to predict the information state of mobility for the optional message ferrying node, and then gives the optimal selection strategy of the message ferrying nodes. The simulation experiments have shown that, compared to the familiar single- copy and multi-copy protocols, the SACARP proposed in this paper has better transmission performance and stability, especially when the network is free, the protocol would keep a good performance with fewer connections and less buffer space.

  16. A distance-aware replica adaptive data gathering protocol for Delay Tolerant Mobile Sensor Networks.

    Science.gov (United States)

    Feng, Yong; Gong, Haigang; Fan, Mingyu; Liu, Ming; Wang, Xiaomin

    2011-01-01

    In Delay Tolerant Mobile Sensor Networks (DTMSNs) that have the inherent features of intermitted connectivity and frequently changing network topology it is reasonable to utilize multi-replica schemes to improve the data gathering performance. However, most existing multi-replica approaches inject a large amount of message copies into the network to increase the probability of message delivery, which may drain each mobile node's limited battery supply faster and result in too much contention for the restricted resources of the DTMSN, so a proper data gathering scheme needs a trade off between the number of replica messages and network performance. In this paper, we propose a new data gathering protocol called DRADG (for Distance-aware Replica Adaptive Data Gathering protocol), which economizes network resource consumption through making use of a self-adapting algorithm to cut down the number of redundant replicas of messages, and achieves a good network performance by leveraging the delivery probabilities of the mobile sensors as main routing metrics. Simulation results have shown that the proposed DRADG protocol achieves comparable or higher message delivery ratios at the cost of the much lower transmission overhead than several current DTMSN data gathering schemes.

  17. Rate-Optimized Power Allocation for DF-Relayed OFDM Transmission under Sum and Individual Power Constraints

    Directory of Open Access Journals (Sweden)

    Vandendorpe Luc

    2009-01-01

    Full Text Available We consider an OFDM (orthogonal frequency division multiplexing point-to-point transmission scheme which is enhanced by means of a relay. Symbols sent by the source during a first time slot may be (but are not necessarily retransmitted by the relay during a second time slot. The relay is assumed to be of the DF (decode-and-forward type. For each relayed carrier, the destination implements maximum ratio combining. Two protocols are considered. Assuming perfect CSI (channel state information, the paper investigates the power allocation problem so as to maximize the rate offered by the scheme for two types of power constraints. Both cases of sum power constraint and individual power constraints at the source and at the relay are addressed. The theoretical analysis is illustrated through numerical results for the two protocols and both types of constraints.

  18. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  19. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  20. MATLAB Simulation of RFID Communication Protocol for Sensor Data Acquisition

    Directory of Open Access Journals (Sweden)

    Soumen GHOSH

    2015-05-01

    Full Text Available Data acquisition processes the sampling and conditioning the signals that measure real world physical conditions such as temperature, pressure, flow etc. and convert the signal into in appropriate format for displaying and transmission to remote end. Now a days RFID i.e. Radio Frequency Identification plays a vital role in Data acquisition system. The present article proposes a smart DAS scheme containing RFID reader and Active tag. The data acquisition system is interfaced with tag through I2C bus. The reader communicates with tag following RFID communication protocol requesting to send the logged data which are refreshed and stored into tag memory periodically. The communication is simulated using MATLAB software successfully.

  1. Planning Electric Transmission Lines: A Review of Recent Regional Transmission Plans

    Energy Technology Data Exchange (ETDEWEB)

    Eto, Joseph H. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2017-04-13

    The first Quadrennial Energy Review (QER) recommends that the U.S. Department of Energy (DOE) conduct a national review of transmission plans and assess the barriers and incentives to their implementation. DOE tasked Lawrence Berkeley National Laboratory (LBNL) to prepare two reports to support the agency’s response to this recommendation. This report reviews regional transmission plans and regional transmission planning processes that have been directed by Federal Energy Regulatory Commission (FERC) Order Nos. 890 and 1000. We focus on the most recent regional transmission plans (those issued in 2015 and through approximately mid-year 2016) and current regional transmission planning processes. A companion report focuses on non-plan-related factors that affect transmission projects.

  2. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  3. Sample Preparation and Imaging of Exosomes by Transmission Electron Microscopy.

    Science.gov (United States)

    Jung, Min Kyo; Mun, Ji Young

    2018-01-04

    Exosomes are nano-sized extracellular vesicles secreted by body fluids and are known to represent the characteristics of cells that secrete them. The contents and morphology of the secreted vesicles reflect cell behavior or physiological status, for example cell growth, migration, cleavage, and death. The exosomes' role may depend highly on size, and the size of exosomes varies from 30 to 300 nm. The most widely used method for exosome imaging is negative staining, while other results are based on Cryo-Transmission Electron Microscopy, Scanning Electron Microscopy, and Atomic Force Microscopy. The typical exosome's morphology assessed through negative staining is a cup-shape, but further details are not yet clear. An exosome well-characterized through structural study is necessary particular in medical and pharmaceutical fields. Therefore, function-dependent morphology should be verified by electron microscopy techniques such as labeling a specific protein in the detailed structure of exosome. To observe detailed structure, ultrathin sectioned images and negative stained images of exosomes were compared. In this protocol, we suggest transmission electron microscopy for the imaging of exosomes including negative staining, whole mount immuno-staining, block preparation, thin section, and immuno-gold labelling.

  4. The consultation timetabling problem at Danish high schools

    DEFF Research Database (Denmark)

    Kristiansen, Simon; Sørensen, Matias; Herold, Michald B.

    2013-01-01

    Gurobi and Adaptive Large Neighborhood Search (ALNS), and computational results are established using 300 real-life datasets. These tests show that the developed ALNS algorithm is significantly outperforming both Gurobi and a currently applied heuristic for the PCTP. For both the PCTP and the SCTP......, it is shown that the ALNS algorithm in average provides results within 5 % of optimum. The developed algorithm has been implemented in the commercial product Lectio, and is therefore available for approximately 95 % of the Danish high schools....

  5. Quench detection electronics testing protocol for SST-1 magnets

    International Nuclear Information System (INIS)

    Banaudha, Moni; Varmora, Pankaj; Parghi, Bhadresh; Prasad, Upendra

    2017-01-01

    Quench Detection (QD) system consisting 204 signal channels has been successfully installed and working well during plasma experiment of SST-1 Tokamak. QD system requires testing, validation and maintenance in every SST-1 campaign for better reliability and maintainability of the system. Standalone test of each channel of the system is essential for hard-ware validation. The standard Testing Protocol follow in every campaign which validate each section of QD electronics as well as voltage tap signal cables which are routed inside the cryostat and then extended outside of the SST-1 machine up-to the magnet control room. Fiber link for Quench signal transmission to the SST-1 magnet power supply is also test and validate before every plasma campaign. Precise instrument used as a dummy source of quench signal and for manual quench generation to test the each channel and Master Quench Logic. Each signal Integrated with the magnet DAQ system, signal observed at 1Hz and 50Hz configuration to validate the logging data, compare with actual and previous test data. This paper describes the testing protocol follow in every campaign to validate functionality of QD electronics, limitation of testing, test results and overall integration of the quench detection system for SST-1 magnet. (author)

  6. Radiation exposure during transmission measurements: comparison between CT- and germanium-based techniques with a current PET scanner

    International Nuclear Information System (INIS)

    Wu, Tung-Hsin; Huang, Yung-Hui; Lee, Jason J.S.; Wang, Shih-Yuan; Wang, Su-Cheng; Su, Cheng-Tau; Chen, Liang-Kung; Chu, Tieh-Chi

    2004-01-01

    In positron emission tomographic (PET) scanning, transmission measurements for attenuation correction are commonly performed by using external germanium-68 rod sources. Recently, combined PET and computed tomographic (CT) scanners have been developed in which the CT data can be used for both anatomical-metabolic image formation and attenuation correction of the PET data. The purpose of this study was to evaluate the difference between germanium- and CT-based transmission scanning in terms of their radiation doses by using the same measurement technique and to compare the doses that patients receive during brain, cardiac and whole-body scans. Measurement of absorbed doses to organs was conducted by using a Rando Alderson phantom with thermoluminescent dosimeters. Effective doses were calculated according to the guidelines in the International Commission on Radiation Protection Publication Number 60. Compared with radionuclide doses used in routine 2-[fluorine-18]-fluoro-2-deoxy-d-glucose PET imaging, doses absorbed during germanium-based transmission scans were almost negligible. On the other hand, absorbed doses from CT-based transmission scans were significantly higher, particularly with a whole-body scanning protocol. Effective doses were 8.81 mSv in the high-speed mode and 18.97 mSv in the high-quality mode for whole-body CT-based transmission scans. These measurements revealed that the doses received by a patient during CT-based transmission scanning are more than those received in a typical PET examination. Therefore, the radiation doses represent a limitation to the generalised use of CT-based transmission measurements with current PET/CT scanner systems. (orig.)

  7. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  8. Vertical transmission of Trypanosoma cruzi in the Province of Choapa, IV Region, Chile: Preliminary Report (2005-2008

    Directory of Open Access Journals (Sweden)

    Werner Apt

    2010-01-01

    Full Text Available Congenital Chagas disease acquired special importance in Chile after the certification of the control of Triatoma infestans and transmission by blood donors affected with Trypanosoma cruzi. In order to establish adequate protocols for intervention and control in infected mother-neonate pairs in endemic zones of Chagas disease, we present partial results (2005-2008 of a pilot project which is being carried out in the Province of Choapa, IV Region, Chile, whose objectives are: determine the current prevalence of the disease in pregnant women, estimate the incidence of vertical transmission of T. cruzi to newborns, determine the lineages of the parasite present in mothers who do and do not transmit the disease, determine the prevalence of Chagas disease in maternal grandmothers of neonates and study placental histopathology. Preliminary results indicated that in this study period, 3.7% of the women who gave birth in the Province have Chagas disease and 2.5% of their newborns were infected. The most frequent T. cruzi genotypes found in mothers studied during pregnancy were TCI and TCIId, either alone or in mixed infections. A high percentage (74.3% of the grandmothers studied was infected with the parasite. In 29 placentas from mothers with Chagas disease we observed edema, necrosis, fibrinoid deposits and slight lymphoplasmocyte infiltration. In three placentas we found erythroblastosis and in one of them amastigote forms of T. cruzi; this was one of the cases of congenital infection. The evaluation of the diagnostic and control protocols generated will allow us to determine if it has been possible to modify the natural history of vertical transmission of T. cruzi in Chile.

  9. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  10. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  11. Protocol for a population-based molecular epidemiology study of tuberculosis transmission in a high HIV-burden setting: the Botswana Kopanyo study.

    Science.gov (United States)

    Zetola, N M; Modongo, C; Moonan, P K; Click, E; Oeltmann, J E; Shepherd, J; Finlay, A

    2016-05-09

    Mycobacterium tuberculosis (Mtb) is transmitted from person to person via airborne droplet nuclei. At the community level, Mtb transmission depends on the exposure venue, infectiousness of the tuberculosis (TB) index case and the susceptibility of the index case's social network. People living with HIV infection are at high risk of TB, yet the factors associated with TB transmission within communities with high rates of TB and HIV are largely undocumented. The primary aim of the Kopanyo study is to better understand the demographic, clinical, social and geospatial factors associated with TB and multidrug-resistant TB transmission in 2 communities in Botswana, a country where 60% of all patients with TB are also infected with HIV. This manuscript describes the methods used in the Kopanyo study. The study will be conducted in greater Gaborone, which has high rates of HIV and a mobile population; and in Ghanzi, a rural community with lower prevalence of HIV infection and home to the native San population. Kopanyo aims to enrol all persons diagnosed with TB during a 4-year study period. From each participant, sputum will be cultured, and for all Mtb isolates, molecular genotyping (24-locus mycobacterial interspersed repetitive units-variable number of tandem repeats) will be performed. Patients with matching genotype results will be considered members of a genotype cluster, a proxy for recent transmission. Demographic, behavioural, clinical and social information will be collected by interview. Participant residence, work place, healthcare facilities visited and social gathering venues will be geocoded. We will assess relationships between these factors and cluster involvement to better plan interventions for reducing TB transmission. Ethical approval from the Independent Review Boards at the University of Pennsylvania, US Centers for Disease Control and Prevention, Botswana Ministry of Health and University of Botswana has been obtained. Published by the BMJ

  12. Reasoning About Cultural and Genetic Transmission: Developmental and Cross-Cultural Evidence From Peru, Fiji, and the United States on How People Make Inferences About Trait Transmission.

    Science.gov (United States)

    Moya, Cristina; Boyd, Robert; Henrich, Joseph

    2015-10-01

    Using samples from three diverse populations, we test evolutionary hypotheses regarding how people reason about the inheritance of various traits. First, we provide a framework for differentiat-ing the outputs of mechanisms that evolved for reasoning about variation within and between (a) biological taxa and (b) culturally evolved ethnic categories from (c) a broader set of beliefs and categories that are the outputs of structured learning mechanisms. Second, we describe the results of a modified "switched-at-birth" vignette study that we administered among children and adults in Puno (Peru), Yasawa (Fiji), and adults in the United States. This protocol permits us to study perceptions of prenatal and social transmission pathways for various traits and to differentiate the latter into vertical (i.e., parental) versus horizontal (i.e., peer) cultural influence. These lines of evidence suggest that people use all three mechanisms to reason about the distribution of traits in the population. Participants at all three sites develop expectations that morphological traits are under prenatal influence, and that belief traits are more culturally influenced. On the other hand, each population holds culturally specific beliefs about the degree of social influence on non-morphological traits and about the degree of vertical transmission-with only participants in the United States expecting parents to have much social influence over their children. We reinterpret people's differentiation of trait transmission pathways in light of humans' evolutionary history as a cultural species. Copyright © 2015 Cognitive Science Society, Inc.

  13. A prospective cohort study to evaluate peridomestic infection as a determinant of dengue transmission: Protocol

    Directory of Open Access Journals (Sweden)

    Martínez-Vega Ruth

    2012-04-01

    Full Text Available Abstract Background Vector control programs, which have focused mainly on the patient house and peridomestic areas around dengue cases, have not produced the expected impact on transmission. This project will evaluate the assumption that the endemic/epidemic transmission of dengue begins around peridomestic vicinities of the primary cases. Its objective is to assess the relationship between symptomatic dengue case exposure and peridomestic infection incidence. Methods/Design A prospective cohort study will be conducted (in Tepalcingo and Axochiapan, in the state of Morelos, Mexico, using the state surveillance system for the detection of incident cases. Paired blood specimens will be collected from both the individuals who live with the incident cases and a sample of subjects residing within a 25-meter radius of such cases (exposed cohort, in order to measure dengue-specific antibodies. Other subjects will be selected from areas which have not presented any incident cases within 200 meters, during the two months preceding the sampling (non-exposed cohort. Symptomatic/asymptomatic incident infection will be considered as the dependent variable, exposure to confirmed dengue cases, as the principal variable, and the socio-demographic, environmental and socio-cultural conditions of the subjects, as additional explanatory variables. Discussion Results indicating a high infection rate among the exposed subjects would justify the application of peridomestic control measures and call for an evaluation of alternate causes for insufficient program impact. On the other hand, a low incidence of peridomestic-infected subjects would support the hypothesis that infection occurs outside the domicile, and would thus explain why the vector control measures applied in the past have exerted such a limited impact on cases incidence rates. The results of the present study may therefore serve to reassess site selection for interventions of this type.

  14. Probabilistic Location-based Routing Protocol for Mobile Wireless Sensor Networks with Intermittent Communication

    Directory of Open Access Journals (Sweden)

    Sho KUMAGAI

    2015-02-01

    Full Text Available In a sensor network, sensor data messages reach the nearest stationary sink node connected to the Internet by wireless multihop transmissions. Recently, various mobile sensors are available due to advances of robotics technologies and communication technologies. A location based message-by-message routing protocol, such as Geographic Distance Routing (GEDIR is suitable for such mobile wireless networks; however, it is required for each mobile wireless sensor node to know the current locations of all its neighbor nodes. On the other hand, various intermittent communication methods for a low power consumption requirement have been proposed for wireless sensor networks. Intermittent Receiver-driven Data Transmission (IRDT is one of the most efficient methods; however, it is difficult to combine the location based routing and the intermittent communication. In order to solve this problem, this paper proposes a probabilistic approach IRDT-GEDIR with the help of one of the solutions of the secretaries problem. Here, each time a neighbor sensor node wakes up from its sleep mode, an intermediate sensor node determines whether it forwards its buffered sensor data messages to it or not based on an estimation of achieved pseudo speed of the messages. Simulation experiments show that IRDT-GEDIR achieves higher pseudo speed of sensor data message transmissions and shorter transmission delay than achieves shorter transmission delay than the two naive combinations of IRDT and GEDIR in sensor networks with mobile sensor nodes and a stationary sink node. In addition, the guideline of the estimated numbers of the neighbor nodes of each intermediate sensor node is provided based on the results of the simulation experiments to apply the probabilistic approach IRDT-GEDIR.

  15. Software protocol design: Communication and control in a multi-task robot machine for ITER vacuum vessel assembly and maintenance

    International Nuclear Information System (INIS)

    Li, Ming; Wu, Huapeng; Handroos, Heikki; Yang, Guangyou; Wang, Yongbo

    2015-01-01

    Highlights: • A high-level protocol is proposed for the data inter-transmission. • The protocol design is task-oriented for the robot control in the software system. • The protocol functions as a role of middleware in the software. • The protocol running stand-alone as an independent process in the software provides greater security. • Providing a reference design protocol for the multi-task robot machine in the industry. - Abstract: A specific communication and control protocol for software design of a multi-task robot machine is proposed. In order to fulfill the requirements on the complicated multi machining functions and the high performance motion control, the software design of robot is divided into two main parts accordingly, which consists of the user-oriented HMI part and robot control-oriented real-time control system. The two parts of software are deployed in the different hardware for the consideration of run-time performance, which forms a client–server-control architecture. Therefore a high-level task-oriented protocol is designed for the data inter-communication between the HMI part and the control system part, in which all the transmitting data related to a machining task is divided into three categories: trajectory-oriented data, task control-oriented data and status monitoring-oriented data. The protocol consists of three sub-protocols accordingly – a trajectory protocol, task control protocol and status protocol – which are deployed over the Ethernet and run as independent processes in both the client and server computers. The protocols are able to manage the vast amounts of data streaming due to the multi machining functions in a more efficient way. Since the protocol is functioning in the software as a role of middleware, and providing the data interface standards for the developing groups of two parts of software, it also permits greater focus of both software parts developers on their own requirements-oriented design. By

  16. Software protocol design: Communication and control in a multi-task robot machine for ITER vacuum vessel assembly and maintenance

    Energy Technology Data Exchange (ETDEWEB)

    Li, Ming, E-mail: ming.li@lut.fi [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland); Wu, Huapeng; Handroos, Heikki [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland); Yang, Guangyou [School of Mechanical Engineering, Hubei University of Technology, Wuhan (China); Wang, Yongbo [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland)

    2015-10-15

    Highlights: • A high-level protocol is proposed for the data inter-transmission. • The protocol design is task-oriented for the robot control in the software system. • The protocol functions as a role of middleware in the software. • The protocol running stand-alone as an independent process in the software provides greater security. • Providing a reference design protocol for the multi-task robot machine in the industry. - Abstract: A specific communication and control protocol for software design of a multi-task robot machine is proposed. In order to fulfill the requirements on the complicated multi machining functions and the high performance motion control, the software design of robot is divided into two main parts accordingly, which consists of the user-oriented HMI part and robot control-oriented real-time control system. The two parts of software are deployed in the different hardware for the consideration of run-time performance, which forms a client–server-control architecture. Therefore a high-level task-oriented protocol is designed for the data inter-communication between the HMI part and the control system part, in which all the transmitting data related to a machining task is divided into three categories: trajectory-oriented data, task control-oriented data and status monitoring-oriented data. The protocol consists of three sub-protocols accordingly – a trajectory protocol, task control protocol and status protocol – which are deployed over the Ethernet and run as independent processes in both the client and server computers. The protocols are able to manage the vast amounts of data streaming due to the multi machining functions in a more efficient way. Since the protocol is functioning in the software as a role of middleware, and providing the data interface standards for the developing groups of two parts of software, it also permits greater focus of both software parts developers on their own requirements-oriented design. By

  17. Asymmetric Propagation Delay-Aware TDMA MAC Protocol for Mobile Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    A-Ra Cho

    2018-06-01

    Full Text Available The propagation delay in mobile underwater acoustic sensor network (MUASN is asymmetric because of its low sound propagation speed, and this asymmetry grows with the increase in packet travel time, which damages the collision avoidance mechanism of the spatial reuse medium access control (MAC protocols for MUASN. We propose an asymmetric propagation delay-aware time division multiple access (APD-TDMA for a MUASN in which periodic data packet transmission is required for a sink node (SN. Collisions at the SN are avoided by deferring data packet transmission after reception of a beacon packet from the SN, and data packets are arrived at the SN in a packet-train manner. The time-offset, which is the time for a node to wait before the transmission of a data packet after reception of a beacon packet, is determined by estimating the propagation delay over two consecutive cycles such that the idle interval at the SN is minimized, and this time-offset is announced by the beacon packet. Simulation results demonstrate that the APD-TDMA improves the channel access delay and the channel utilization by approximately 20% and 30%, respectively, compared with those of the block time bounded TDMA under the given network conditions.

  18. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  19. A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines

    Directory of Open Access Journals (Sweden)

    Jun Yu

    2015-01-01

    Full Text Available Optimization of energy consumption in Wireless Sensor Network (WSN nodes has become a critical link that constrains the engineering application of the smart grid due to the fact that the smart grid is characterized by long-distance transmission in a special environment. The paper proposes a linear hierarchical network topological structure specific to WSN energy conservation in environmental monitoring of the long-distance electric transmission lines in the smart grid. Based on the topological structural characteristics and optimization of network layers, the paper also proposes a Topological Structure be Layered Configurations (TSLC routing algorithm to improve the quality of WSN data transmission performance. Coprocessing of the network layer and the media access control (MAC layer is achieved by using the cross-layer design method, accessing the status for the nodes in the network layer and obtaining the status of the network nodes of the MAC layer. It efficiently saves the energy of the whole network, improves the quality of the network service performance, and prolongs the life cycle of the network.

  20. Channel-aware multi-user uplink transmission scheme for SIMO-OFDM systems

    Institute of Scientific and Technical Information of China (English)

    PAN ChengKang; CAI YueMing; XU YouYun

    2009-01-01

    The problem of medium access control (MAC) in wireless single-Input multiple-output-orthogonal frequency division multiplexing (SIMO-OFOM) systems is addressed.Traditional random access protocols have low overheads and inferior performance.Centralized methods have superior performance and high overheads.To achieve the tradeoff between overhead and performance,we propose a channelaware uplink transmission (CaUT) scheme for SIMO-OFDM systems.In CaUT,users transmit requestto-send (RTS) at some subcarriers whose channel gains are above a predetermined threshold.Using the channel state information provided by RTS,access point performs user selection with receive beamforming to decide which users can access and then broadcasts the selection results via clear-to-send (CTS) to users.We present a distributed power control scheme by using a simple fixed modulation mode.We optimize the modulation order and channel gain thresholds to maximize the separable packets subject to the bit-error-rate (BER) and temporal fairness requirements and the Individual average transmit power constraints.The performance of CaUT scheme is analyzed analytically and evaluated by simulations.Simulation results show that CaUT can achieve more significant throughput performance than traditional random access protocols.

  1. Low latency protocol for transmission of measurement data from FPGA to Linux computer via 10 Gbps Ethernet link

    International Nuclear Information System (INIS)

    Zabolotny, W.M.

    2015-01-01

    This paper presents FADE-10G—an integrated solution for modern multichannel measurement systems. Its main aim is a low latency, reliable transmission of measurement data from FPGA-based front-end electronic boards (FEBs) to a computer-based node in the Data Acquisition System (DAQ), using a standard Ethernet 1 Gbps or 10 Gbps link. In addition to transmission of data, the system allows the user to send reliably simple control commands from DAQ to FEB and to receive responses. The aim of the work is to provide a possible simple base solution, which can be adapted by the end user to his or her particular needs. Therefore, the emphasis is put on the minimal consumption of FPGA resources in FEB and the minimal CPU load in the DAQ computer. The open source implementation of the FPGA IP core and the Linux kernel driver published under permissive license facilitates modifications and reuse of the solution. The system has been successfully tested in real hardware, both with 1 Gbps and 10 Gbps links

  2. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  3. Scheme for realizing quantum computation and quantum information transfer with superconducting qubits coupling to a 1D transmission line resonator

    International Nuclear Information System (INIS)

    Zhen-Gang, Shi; Xiong-Wen, Chen; Xi-Xiang, Zhu; Ke-Hui, Song

    2009-01-01

    This paper proposes a simple scheme for realizing one-qubit and two-qubit quantum gates as well as multiqubit entanglement based on dc-SQUID charge qubits through the control of their coupling to a 1D transmission line resonator (TLR). The TLR behaves effectively as a quantum data-bus mode of a harmonic oscillator, which has several practical advantages including strong coupling strength, reproducibility, immunity to 1/f noise, and suppressed spontaneous emission. In this protocol, the data-bus does not need to stay adiabatically in its ground state, which results in not only fast quantum operation, but also high-fidelity quantum information processing. Also, it elaborates the transfer process with the 1D transmission line. (general)

  4. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  5. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  6. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  7. Optimal protocol for teleconsultation with a cellular phone for dentoalveolar trauma: an in-vitro study

    International Nuclear Information System (INIS)

    Park, Won Se; Lee, Hae Na; Jeong, Jin Sun; Kwon, Jung Hoon; Lee, Grace H; Kim, Kee Dong

    2012-01-01

    Dental trauma is frequently unpredictable. The initial assessment and urgent treatment are essential for dentists to save the patient's teeth. Mobile-phone-assisted teleconsultation and telediagnosis for dental trauma could be an aid when a dentist is not available. In the present in-vitro study, we evaluated the success rate and time to transfer images under various conditions. We analyzed the image quality of cameras built into mobile phones based on their resolution, autofocus, white-balance, and anti-movement functions. The image quality of most built-in cameras was acceptable to perform the initial assessment, with the autofocus function being essential to obtain high-quality images. The transmission failure rate increased markedly when the image size exceeded 500 kB and the additional text messaging did not improve the success rate or the transmission time. Our optimal protocol could be useful for emergency programs running on the mobile phones.

  8. Optimal protocol for teleconsultation with a cellular phone for dentoalveolar trauma: an in-vitro study

    Energy Technology Data Exchange (ETDEWEB)

    Park, Won Se; Lee, Hae Na; Jeong, Jin Sun; Kwon, Jung Hoon; Lee, Grace H; Kim, Kee Dong [College of Dentistry, Yonsei University, Seoul (Korea, Republic of)

    2012-06-15

    Dental trauma is frequently unpredictable. The initial assessment and urgent treatment are essential for dentists to save the patient's teeth. Mobile-phone-assisted teleconsultation and telediagnosis for dental trauma could be an aid when a dentist is not available. In the present in-vitro study, we evaluated the success rate and time to transfer images under various conditions. We analyzed the image quality of cameras built into mobile phones based on their resolution, autofocus, white-balance, and anti-movement functions. The image quality of most built-in cameras was acceptable to perform the initial assessment, with the autofocus function being essential to obtain high-quality images. The transmission failure rate increased markedly when the image size exceeded 500 kB and the additional text messaging did not improve the success rate or the transmission time. Our optimal protocol could be useful for emergency programs running on the mobile phones.

  9. Quantitative biological measurement in Transmission Electron Tomography

    International Nuclear Information System (INIS)

    Mantell, Judith M; Verkade, Paul; Arkill, Kenton P

    2012-01-01

    It has been known for some time that biological sections shrink in the transmission electron microscope from exposure to the electron beam. This phenomenon is especially important in Electron Tomography (ET). The effect on shrinkage of parameters such as embedding medium or sample type is less well understood. In addition anisotropic area shrinkage has largely been ignored. The intention of this study is to explore the shrinkage on a number of samples ranging in thickness from 200 nm to 500 nm. A protocol was developed to determine the shrinkage in area and thickness using the gold fiducials used in electron tomography. In brief: Using low dose philosophy on the section, a focus area was used prior to a separate virgin study area for a series of known exposures on a tilted sample. The shrinkage was determined by measurements on the gold beads from both sides of the section as determined by a confirmatory tomogram. It was found that the shrinkage in area (approximately to 90-95% of the original) and the thickness (approximately 65% of the original at most) agreed with pervious authors, but that a lmost all the shrinkage was in the first minute and that although the direction of the in-plane shrinkage (in x and y) was sometimes uneven the end result was consistent. It was observed, in general, that thinner samples showed more percentage shrinkage than thicker ones. In conclusion, if direct quantitative measurements are required then the protocol described should be used for all areas studied.

  10. Quantitative biological measurement in Transmission Electron Tomography

    Science.gov (United States)

    Mantell, Judith M.; Verkade, Paul; Arkill, Kenton P.

    2012-07-01

    It has been known for some time that biological sections shrink in the transmission electron microscope from exposure to the electron beam. This phenomenon is especially important in Electron Tomography (ET). The effect on shrinkage of parameters such as embedding medium or sample type is less well understood. In addition anisotropic area shrinkage has largely been ignored. The intention of this study is to explore the shrinkage on a number of samples ranging in thickness from 200 nm to 500 nm. A protocol was developed to determine the shrinkage in area and thickness using the gold fiducials used in electron tomography. In brief: Using low dose philosophy on the section, a focus area was used prior to a separate virgin study area for a series of known exposures on a tilted sample. The shrinkage was determined by measurements on the gold beads from both sides of the section as determined by a confirmatory tomogram. It was found that the shrinkage in area (approximately to 90-95% of the original) and the thickness (approximately 65% of the original at most) agreed with pervious authors, but that a lmost all the shrinkage was in the first minute and that although the direction of the in-plane shrinkage (in x and y) was sometimes uneven the end result was consistent. It was observed, in general, that thinner samples showed more percentage shrinkage than thicker ones. In conclusion, if direct quantitative measurements are required then the protocol described should be used for all areas studied.

  11. Essays on electricity transmission investment and financial transmission rights

    Science.gov (United States)

    Shang, Wenzhuo

    The U.S. electric power industry has been going through fundamental restructuring and realignment since the 1990's. Many issues and problems have emerged during the transition, and both economists and engineers have been looking for the solutions fervently. In this dissertation, which consists primarily of three essays, we apply economics theory and techniques to the power industry and address two related issues, transmission investment and financial transmission rights (FTRs). The first essay takes the decentralized perspective and investigates the efficiency attribute of market-based transmission investment under perfect competition. We clarify, for the first time, the nature of the externality created by loop flows that causes transmission investment to be inefficient. Our findings have important implications for better understanding of transmission market design and creating incentives for efficient transmission investment. In the second essay, we define several rules for allocating transmission investment cost within the framework of cooperative game theory. These rules provide fair, stable or efficient cost allocations in theory and are good benchmarks against which the allocation mechanism in practice can be compared and improved upon. In the last essay, we make exploratory efforts in analyzing and assessing empirically the performance of the Midwest independent system operator (MISO) FTR auction market. We reveal some stylized facts about this young market and find that it is not efficient under the risk-neutrality assumption. We also point out and correct the drawbacks in previous related work and suggest about more complete empirical work in future. In all, this dissertation makes both theoretic and empirical analysis of the two hot issues related to the power industry and comes up with findings that have important implications for the development of this industry.

  12. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  13. Sexual transmission of hepatitis C Transmissão sexual da hepatite C

    Directory of Open Access Journals (Sweden)

    Norma de Paula Cavalheiro

    2007-10-01

    Full Text Available It is generally agreed that the hepatitis C virus (HCV can be efficiently transmitted parenterally, although data on viral transmission by sexual or non-sexual intrafamilial contact are conflicting. Since data collection began in 1989, the first study dealt with the risk of sexual transmission among multiple sex partners. Other investigations followed, emphasizing that risk increases in specific groups such as patients co-infected with HIV and HBV, sex workers, homosexuals, illicit drug users and patients attended at sexually transmittable disease clinics. The question arises as to what might be the risk for monogamous heterosexuals in the general population, in which one of the partners has HCV? The literature provides overall rates that vary from zero to 27%; however, most studies affirm that the chances of sexual transmission are low or almost null, with rates for this mode fluctuating from zero to 3%. Intrafamilial transmission is strongly considered but inconclusive, since when mentioning transmission between sex partners within the same household, specific situations also should be considered, such as the sharing of personal hygiene items, like razorblades, toothbrushes, nail clippers and manicure pliers, which are important risk factors in HCV transmission. In this review, we discuss the hypotheses of sexual and/or intrafamilial transmission.A eficiência da transmissão parenteral da hepatite C é consenso, porém dados na literatura sobre transmissão sexual e intrafamiliar são conflitantes. Data de 1989 o primeiro trabalho que relaciona o risco de transmissão sexual a múltiplos parceiros sexuais, na seqüência, outros estudos também reforçam que os riscos aumentam em populações específicas como co-infectados HIV, HBV, profissionais do sexo, homossexuais, usuários de drogas ilícitas e populações de clínicas de doenças sexualmente transmissíveis. Agora, na população geral qual seria o risco para casais monog

  14. DOW-PR DOlphin and Whale Pods Routing Protocol for Underwater Wireless Sensor Networks (UWSNs).

    Science.gov (United States)

    Wadud, Zahid; Ullah, Khadem; Hussain, Sajjad; Yang, Xiaodong; Qazi, Abdul Baseer

    2018-05-12

    Underwater Wireless Sensor Networks (UWSNs) have intrinsic challenges that include long propagation delays, high mobility of sensor nodes due to water currents, Doppler spread, delay variance, multipath, attenuation and geometric spreading. The existing Weighting Depth and Forwarding Area Division Depth Based Routing (WDFAD-DBR) protocol considers the weighting depth of the two hops in order to select the next Potential Forwarding Node (PFN). To improve the performance of WDFAD-DBR, we propose DOlphin and Whale Pod Routing protocol (DOW-PR). In this scheme, we divide the transmission range into a number of transmission power levels and at the same time select the next PFNs from forwarding and suppressed zones. In contrast to WDFAD-DBR, our scheme not only considers the packet upward advancement, but also takes into account the number of suppressed nodes and number of PFNs at the first and second hops. Consequently, reasonable energy reduction is observed while receiving and transmitting packets. Moreover, our scheme also considers the hops count of the PFNs from the sink. In the absence of PFNs, the proposed scheme will select the node from the suppressed region for broadcasting and thus ensures minimum loss of data. Besides this, we also propose another routing scheme (whale pod) in which multiple sinks are placed at water surface, but one sink is embedded inside the water and is physically connected with the surface sink through high bandwidth connection. Simulation results show that the proposed scheme has high Packet Delivery Ratio (PDR), low energy tax, reduced Accumulated Propagation Distance (APD) and increased the network lifetime.

  15. Paying to waste lives: the affordability of reducing mother-to-child transmission of HIV in South Africa.

    Science.gov (United States)

    Skordis, Jolene; Nattrass, Nicoli

    2002-05-01

    It is estimated that each HIV-positive child in South Africa costs the government more in terms of health and welfare expenses than it does to reduce mother-to-child transmission (MTCT) of HIV through the use of antiretroviral regimens (where the mother continues to breast-feed). Programmes to reduce MTCT of HIV/AIDS are, thus, clearly affordable. Using Nevirapine (according to the HIVNET 012 Protocol) saves more lives and [corrected] is more cost-effective than using Zidovudine (CDC 2 weeks regime).

  16. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  17. An epidemiological model of virus transmission in salmonid fishes of the Columbia River Basin

    Science.gov (United States)

    Ferguson, Paige F. B.; Breyta, Rachel; Brito, Ilana L.; Kurath, Gael; LaDeau, Shannon L.

    2018-01-01

    cohort-sites experienced self-exposure by infected juvenile fish, this transmission route had the greatest probability of infection (0.22). Increased testing and/or determining whether transmission can occur from cohort-sites without testing records (e.g., determining there was no testing record because there were no fish at the cohort-site) are expected to improve inference about infection probabilities. Increased use of secure water supplies and continued use of biosecurity protocols may reduce IHNV transmission from adult fish and juvenile fish within the site, respectively, to juvenile salmonids at hatcheries. Models and conclusions from this study are potentially relevant to understanding the relative importance of transmission routes for other important aquatic pathogens in salmonids, including the agents of bacterial kidney disease and coldwater disease, and the basic approach may be useful for other pathogens and hosts in other geographic regions.

  18. [Initial evaluation of a programme to prevent mother-to-child transmission of human immunodeficiency virus infection in Equatorial Guinea].

    Science.gov (United States)

    Badillo-Navarro, Katie; Prieto-Tato, Luis; Obiang-Esomoyo, Jacinta; Avedillo-Jiménez, Pedro; Vargas-Brizuela, Antonio; Rojo-Conejo, Pablo

    2014-01-01

    The prevalence of human immunodeficiency virus (HIV)-infected pregnant women in Equatorial Guinea (EG) has been reported as 7.3%. In 2008 an updated version of the PMTCT protocol was accepted according to the current WHO guidelines. The aim of this study was to describe the characteristics and outcome of children exposed to HIV after the introduction of the protocol. A retrospective review was conducted on the clinical characteristics of the infants born to HIV-infected mothers in the Hospital Regional de Bata and Primary Health Care Centre Maria Rafols in Bata (EG) between June 2008 and November 2011. The diagnosis of HIV infection in children was based on rapid serology tests. A total of 103 children were included, of which 47 were males. Fifty three patients (51%) completed the follow-up (51%). Fourteen children (26%) were diagnosed with HIV infection (11 presumptive diagnosis, 3 due to persistence of antibodies at 18 months). Six children (12%) died before a definitive diagnosis. Just over than half (52%) of mothers received antiretroviral therapy (ART) during pregnancy. The transmission rate in children whose mothers received ART was 16% (3/19), compared with 43% (10/23) in children whose mothers did not receive it. Only one child was infected (8%) when the mother received ART, and child received postnatal prophylaxis. The PMTCT protocol compliance was still very low. Antiretroviral therapy in pregnant women decreased the rate of vertical transmission, but the rate still remains very high. Many children were lost to follow-up. Strategies to prevent loss to follow-up and methods for earlier virological diagnostic are needed. Copyright © 2012 Elsevier España, S.L. All rights reserved.

  19. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  20. The automotive transmission book

    CERN Document Server

    Fischer, Robert; Jürgens, Gunter; Najork, Rolf; Pollak, Burkhard

    2015-01-01

    This book presents essential information on systems and interactions in automotive transmission technology and outlines the methodologies used to analyze and develop transmission concepts and designs. Functions of and interactions between components and subassemblies of transmissions are introduced, providing a basis for designing transmission systems and for determining their potentials and properties in vehicle-specific applications: passenger cars, trucks, buses, tractors, and motorcycles. With these fundamentals the presentation provides universal resources for both state-of-the-art and future transmission technologies, including systems for electric and hybrid electric vehicles.

  1. Pellicle transmission uniformity requirements

    Science.gov (United States)

    Brown, Thomas L.; Ito, Kunihiro

    1998-12-01

    Controlling critical dimensions of devices is a constant battle for the photolithography engineer. Current DUV lithographic process exposure latitude is typically 12 to 15% of the total dose. A third of this exposure latitude budget may be used up by a variable related to masking that has not previously received much attention. The emphasis on pellicle transmission has been focused on increasing the average transmission. Much less, attention has been paid to transmission uniformity. This paper explores the total demand on the photospeed latitude budget, the causes of pellicle transmission nonuniformity and examines reasonable expectations for pellicle performance. Modeling is used to examine how the two primary errors in pellicle manufacturing contribute to nonuniformity in transmission. World-class pellicle transmission uniformity standards are discussed and a comparison made between specifications of other components in the photolithographic process. Specifications for other materials or parameters are used as benchmarks to develop a proposed industry standard for pellicle transmission uniformity.

  2. The Impact of Dynamic RTS Threshold Adjustment for IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Mostafa Mjidi

    2009-01-01

    Full Text Available In recent years, wireless technologies and application received great attention. The Medium Access Control (MAC protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel in wireless local area networks (WLANs. IEEE 802.11 introduced the optional RTS/CTS handshaking mechanism to address the hidden terminal problem as well as to reduces the chance of collision in case of higher node density and traffic. RTS Threshold (RT determines when RTS/CTS mechanism should be used and proved to be an important parameter for performance characteristics in data transmission. We first investigate to find a meaningful threshold value according to the network situation and determine the impact of using or disengaging the RTS/CTS optional mechanism and dynamically adjust the RTS Threshold to maximize data transmission. The results show a significant improvement over existing CSMA/CA and RTS/CTS schemes. Our adaptive scheme performed even better when data rate increases. We verify our proposed scheme both analytically and with extensive network simulation using ns-2.

  3. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  4. Towards an optimal transmission system

    International Nuclear Information System (INIS)

    Calviou, M.

    2005-01-01

    This presentation provided background on National Grid USA and discussed transmission investment in the United States (US) and United Kingdom. It also discussed barriers to transmission investments and improvements, thoughts on solutions and a long-term vision. The presentation identified that transmission investment should follow from clear reliability rules designed to promote better operation and management; investment does not necessarily mean new rights-of-way; and transmission investment should target benefits to customers. It was stated that US transmission investment levels have decreased. A comparison between US and UK transmission investment was presented along with a chart of increasing US congestion costs. Barriers to investment in US transmission include vertical integration; misperception of transmission as a market product; federal and state jurisdiction issues; fragmentation in transmission ownership and operation; rate cap based plans that impact transmission; lack of clarity in cost allocation; and the site selection process. Possible solutions include policy and incentives, promoting independence and resolving structural issues. tabs., figs

  5. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  6. Effects on instruments of the World Health Organization--recommended protocols for decontamination after possible exposure to transmissible spongiform encephalopathy-contaminated tissue.

    Science.gov (United States)

    Brown, Stanley A; Merritt, Katharine; Woods, Terry O; Busick, Deanna N

    2005-01-15

    It has been recommended by the World Health Organization (WHO) and Centers for Disease Control and Prevention (CDC) that rigorous decontamination protocols be used on surgical instruments that have been exposed to tissue possibly contaminated with Creutzfeldt-Jakob disease (CJD). This study was designed to examine the effects of these protocols on various types of surgical instruments. The most important conclusions are: (1) autoclaving in 1N NaOH will cause darkening of some instruments; (2) soaking in 1N NaOH at room temperature damages carbon steel but not stainless steel or titanium; (3) soaking in chlorine bleach will badly corrode gold-plated instruments and will damage some, but not all, stainless-steel instruments, especially welded and soldered joints. Damage became apparent after the first exposure and therefore long tests are not necessary to establish which instruments will be damaged. Copyright 2004 Wiley Periodicals, Inc.

  7. Microwave energy transmission

    Energy Technology Data Exchange (ETDEWEB)

    Matsumoto, Hiroshi [Kyoto Univ. (Japan)

    1989-03-05

    Laying stress on the technological problems and effect on the environment of microwave energy transmission, recent scientific and engineering problems and related subjects are described. Because no fuel is required for the solar power generation, the power generation system can not be considered as an expensive one when the unit cost of energy is taken into consideration. Some of the important technological problems in the microwave energy transmission are accurate microwave beam control technology to receiving stations and improvement in the efficiency of transmission system. Microwave energy beam has effects on living bodies, communication, and plasma atmosphere of the earth. Microwave energy transmission using a space flyer unit is scheduled. Its objective is the development of microwave wireless transmission technology and the study of the correlation between high power microwave and ionosphere plasma. Experiments on such a small scale application as a microwave driven space ship to bring results seem also important. 12 refs., 13 figs.

  8. Electric transmission technology

    International Nuclear Information System (INIS)

    Shah, K.R.

    1990-01-01

    Electric transmission technology has matured and can transmit bulk power more reliably and economically than the technology 10 years ago.In 1882, Marcel Depres transmitted 15 kW electric power at 2 kV, using a constant direct current; present transmission voltages have risen to ± 600 kV direct current (DC) and 765 kV alternating current (AC), and it is now possible to transmit bulk electric power at voltages as high as ± 1000 kV DC and 1500 kV AC. Affordable computer systems are now available to optimize transmission reliably. New materials have reduced the bulk of insulation for lines and equipment. New conducting materials and configurations have reduced losses in transmission. Advances in line structures and conductor motion, understanding of flashover characteristics of insulators and air-gaps and electrical performance of lines have resulted in more compact urban transmission lines. (author). 15 refs., 7 tabs., 11 figs

  9. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  10. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  11. Wireless data signal transmission system

    DEFF Research Database (Denmark)

    2014-01-01

    The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver.......The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver....

  12. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite

  13. Drivers of Tuberculosis Transmission.

    Science.gov (United States)

    Mathema, Barun; Andrews, Jason R; Cohen, Ted; Borgdorff, Martien W; Behr, Marcel; Glynn, Judith R; Rustomjee, Roxana; Silk, Benjamin J; Wood, Robin

    2017-11-03

    Measuring tuberculosis transmission is exceedingly difficult, given the remarkable variability in the timing of clinical disease after Mycobacterium tuberculosis infection; incident disease can result from either a recent (ie, weeks to months) or a remote (ie, several years to decades) infection event. Although we cannot identify with certainty the timing and location of tuberculosis transmission for individuals, approaches for estimating the individual probability of recent transmission and for estimating the fraction of tuberculosis cases due to recent transmission in populations have been developed. Data used to estimate the probable burden of recent transmission include tuberculosis case notifications in young children and trends in tuberculin skin test and interferon γ-release assays. More recently, M. tuberculosis whole-genome sequencing has been used to estimate population levels of recent transmission, identify the distribution of specific strains within communities, and decipher chains of transmission among culture-positive tuberculosis cases. The factors that drive the transmission of tuberculosis in communities depend on the burden of prevalent tuberculosis; the ways in which individuals live, work, and interact (eg, congregate settings); and the capacity of healthcare and public health systems to identify and effectively treat individuals with infectious forms of tuberculosis. Here we provide an overview of these factors, describe tools for measurement of ongoing transmission, and highlight knowledge gaps that must be addressed. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  14. Possibilities for Advanced Encoding Techniques at Signal Transmission in the Optical Transmission Medium

    Directory of Open Access Journals (Sweden)

    Filip Čertík

    2016-01-01

    Full Text Available This paper presents a possible simulation of negative effects in the optical transmission medium and an analysis for the utilization of different signal processing techniques at the optical signal transmission. An attention is focused on the high data rate signal transmission in the optical fiber influenced by linear and nonlinear environmental effects presented by the prepared simulation model. The analysis includes possible utilization of OOK, BPSK, DBPSK, BFSK, QPSK, DQPSK, 8PSK, and 16QAM modulation techniques together with RS, BCH, and LDPC encoding techniques for the signal transmission in the optical fiber. Moreover, the prepared simulation model is compared with real optical transmission systems. In the final part, a comparison of the selected modulation techniques with different encoding techniques and their implementation in real transmission systems is shown.

  15. Transmissions in vehicles 2010

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    Within the international VDI congress 'Gears in vehicles 2010' of the VDI Wissensforum GmbH (Duesseldorf, Federal Republic of Germany) between 22nd and 23rd June, 2010, in Friedrichshafen (Federal Republic of Germany), the following lectures were held: (1) 8HP70H - The moldhybrid transmission from ZF - Cjallenges and achievements (P. Gutmann); (2) GETRAG boosted range extender - A highly flexible electric powertrain for maximum CO{sub 2} reduction (S. Huepkes); (3) E-Transmission between full-hybrid and E-drive (P. Tenberge); (4) Reducing NO{sub x} and particulate emissions in electrified drivelines (R. Kuberczyk); (5) Simulation aided HEV and EV development: from the component to the whole powertrain (A. Gacometti); (6) Investigations on operating behaviour of the optimized CVT hybrid driveline (B.-R. Hoehn); (7) Customer-oriented dimensioning of electrified drivetrains (M. Eghtessad); (8) Decentralized optimal control strategy for parallel hybrid electric vehicles (A. Frenkel); (9) The new generation 6-speed automatic transmission AF40 (G. Bednarek); (10) Customized mechatronic solutions for integrated transmission control units (M. Wieczorek); (11) The optimal automatic transmission for front-transverse applications - Planetary transmissions or dual clutch transmissions? (G. Gumpoltsberger); (12) The new shift-by-wire gearshift lever for the Audi A8 - Requirements and concept (T. Guttenbergere); (13) The new shift-by-wire gearshift lever for the Audi A8 - Realization (A. Giefer); (14) Fuel-efficient transmissions of the future: Calculation of the efficiency factor for vehicle transmissions (B. Volpert); (15) HT-ACM: A new polymer generation for static and dynamic gearbox sealing solutions (E. Osen); (16) 'Energy efficiency equipped solutions by SKF' for power train applications - A contribution to CO{sub 2} - emission reduction and sustainability (T. Bobke); (17) 6-Ratio planetary shift transmission controlled by 4 external brakes, and design

  16. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  17. Low Duty-Cycling MAC Protocol for Low Data-Rate Medical Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chongqing Zhang

    2017-05-01

    Full Text Available Wireless body area networks (WBANs are severely energy constrained, and how to improve the energy efficiency so as to prolong the network lifetime as long as possible is one of the most important goals of WBAN research. Low data-rate WBANs are promising to cut down the energy consumption and extend the network lifetime. Considering the characteristics and demands of low data-rate WBANs, a low duty-cycling medium access control (MAC protocol is specially designed for this kind of WBAN in this paper. Longer superframes are exploited to cut down the energy consumed on the transmissions and receptions of redundant beacon frames. Insertion time slots are embedded into the inactive part of a superframe to deliver the frames and satisfy the quality of service (QoS requirements. The number of the data subsections in an insertion time slot can be adaptively adjusted so as to accommodate low data-rate WBANs with different traffic. Simulation results show that the proposed MAC protocol performs well under the condition of low data-rate monitoring traffic.

  18. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  19. ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS – A SURVEY

    Directory of Open Access Journals (Sweden)

    K. Sankar

    2012-06-01

    Full Text Available Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in wireless communication. The performance of the medium access control (MAC scheme not only has a fairly significant end-result on the behaviour of the routing approach employed, but also on the energy consumption of the wireless network interface card (NIC. We investigate the inadequacies of the MAC schemes designed for ad hoc wireless networks in the context of power awareness herein. The topology changes due to uncontrollable factors such as node mobility, weather, interference, noise, as well as on controllable parameters such as transmission power and antenna direction results in significant amount of energy loss. Controlling rapid topology changes by minimizing the maximum transmission power used in ad hoc wireless networks, while still maintaining networks connectivity can prolong battery life and hence network lifetime considerably. In addition, we systematically explore the potential energy consumption pitfalls of non–power-based and power based routing schemes. We suggest a thorough energy-based performance survey of energy aware routing protocols for wireless mobile ad-hoc networks. We also present the statistical performance metrics measured by our simulations.

  20. Transmission Integration | Grid Modernization | NREL

    Science.gov (United States)

    Transmission Integration Transmission Integration The goal of NREL's transmission integration integration issues and provide data, analysis, and models to enable the electric power system to more and finding solutions to address them to enable transmission grid integration. Capabilities Power

  1. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  2. Development of a Laboratory Synchrophasor Network and an Application to Estimate Transmission Line Parameters in Real Time

    Science.gov (United States)

    Almiron Bonnin, Rubens Eduardo

    The development of an experimental synchrophasors network and application of synchrophasors for real-time transmission line parameter monitoring are presented in this thesis. In the laboratory setup, a power system is simulated in a RTDS real-time digital simulator, and the simulated voltages and currents are input to hardware phasor measurement units (PMUs) through the analog outputs of the simulator. Time synchronizing signals for the PMU devices are supplied from a common GPS clock. The real time data collected from PMUs are sent to a phasor data concentrator (PDC) through Ethernet using the TCP/IP protocol. A real-time transmission line parameter monitoring application program that uses the synchrophasor data provided by the PDC is implemented and validated. The experimental synchrophasor network developed in this thesis is expected to be used in research on synchrophasor applications as well as in graduate and undergraduate teaching.

  3. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  4. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  5. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  6. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  7. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  8. Challenges and Ideas to Achieve Wireless 100 Gb/s Transmission: An Overview of Challenges and Solutions within the German Research Foundation (DFG) Special Priority Program SPP1655

    Science.gov (United States)

    Kraemer, Rolf

    2017-09-01

    Wireless communications is one of the fastest growing technology fields, driving numerous other innovations in electronics. One challenging research area within the wireless field is to achieve much higher transmission rates. First products with up to 3 Gb/s are in the market. In the coming years we predict this speed growing quickly up to and beyond 100 Gb/s. Today it is an open question how we can realize a wireless system at this speed. If we intend to use such systems in a mobile environment, we can only afford to spend approximately 1-10 pW/b for the end-to-end communication. This includes RF-transmission and all processing and protocol steps. The SPP1655 of the DFG was set up to investigate new paradigms for achieving the 100 Gb/s wireless transmission goal. Within 11 coordinated projects researchers from all over Germany are addressing several relevant issues ranging from the antennas and RF-Frontend, baseband-processing and error correction to protocol processing. A number of limitations of current approaches have to be investigated and new algorithms must be found in order to achieve the intended goal. One of the big challenges is finding the correct balance between analog and digital signal processing to achieve an extremely high performance at very low energy consumption. Another challenge is to find a good balance between bandwidth and bandwidth efficiency to achieve the 100 Gbps goal. Finally, protocol processing will need new approaches to decouple the central processor of a computer from the high-end input/output operations. Within this editorial we will address the main challenges and briefly outline the approaches of the running projects. The rest of this special issue will be devoted to more detailed descriptions and achievements of the individual projects of SPP1655.

  9. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  10. Transmission rights and market power

    International Nuclear Information System (INIS)

    Bushnell, J.

    1999-01-01

    Most of the concerns about physical transmission rights relate to the ability to implicitly or explicitly remove that transmission capacity from the market-place. Under a very strict form of physical right, owners could simply choose not to sell it if they don't want to use it. Modifications that require the release of spare capacity back into an open market could potentially alleviate this problem but there is concern that such releases would not occur far enough in advance to be of much use to schedulers. Similarly, the transmission capacity that is made available for use by non-rights holders can also be manipulated by the owners of transmission rights. The alternative form, financial transmission rights, provide to their owners congestion payments, but physical control of transmission paths. In electricity markets such as California's, even financial transmission rights could potentially be utilized to effectively withhold transmission capacity from the marketplace. However, methods for withholding transmission capacity are somewhat more convoluted, and probably more difficult, for owners of financial rights than for owners of physical rights. In this article, the author discusses some of the potential concerns over transmission rights and their use for the exercise of various forms of market power

  11. Simple algorithm for improved security in the FDDI protocol

    Science.gov (United States)

    Lundy, G. M.; Jones, Benjamin

    1993-02-01

    We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.

  12. Transmission of Zika virus through breast milk and other breastfeeding-related bodily-fluids: A systematic review.

    Directory of Open Access Journals (Sweden)

    Susannah Colt

    2017-04-01

    Full Text Available Zika virus (ZIKV infection is an emerging mosquito-borne disease, which is associated with an increase in central nervous system malformations and newborn microcephaly cases. This review investigated evidence of breastfeeding transmission from ZIKV-infected mothers to their children and the presence of ZIKV infection in breastfeeding-related fluids.We conducted a systematic review of observational studies, case studies, and surveillance reports involving breastfeeding women with ZIKV infection in several international databases. Data extraction and analysis were conducted following a PROSPERO-registered protocol. From 472 non-duplicate records, two case reports met criteria for inclusion. We reviewed three cases of ZIKV infection among lactating mothers near the time of delivery. Two of the three (2/3 associated newborns had evidence of ZIKV infection. ZIKV was detected in breast milk of all three mothers. Breast milk detection results were positive in all mothers (3/3 by RT-PCR, one was positive by culture (1/3, and none was tested for ZIKV-specific antibodies. Serum samples were ZIKV positive in all mothers (3/3, and sweat was not tested for ZIKV.We describe three cases of ZIKV-infected breastfeeding mothers who were symptomatic within three days of delivery, and two cases with ZIKV-infected newborns. While ZIKV was detected in the breast milk of all three mothers, the data are not sufficient to conclude ZIKV transmission via breastfeeding. More evidence is needed to distinguish breastfeeding transmission from other perinatal transmission routes.

  13. Transmission of Zika virus through breast milk and other breastfeeding-related bodily-fluids: A systematic review

    Science.gov (United States)

    Colt, Susannah; Garcia-Casal, Maria N.; Peña-Rosas, Juan Pablo; Finkelstein, Julia L.; Rayco-Solon, Pura; Weise Prinzo, Zita C.

    2017-01-01

    Background Zika virus (ZIKV) infection is an emerging mosquito-borne disease, which is associated with an increase in central nervous system malformations and newborn microcephaly cases. This review investigated evidence of breastfeeding transmission from ZIKV-infected mothers to their children and the presence of ZIKV infection in breastfeeding-related fluids. Methodology/Principal findings We conducted a systematic review of observational studies, case studies, and surveillance reports involving breastfeeding women with ZIKV infection in several international databases. Data extraction and analysis were conducted following a PROSPERO-registered protocol. From 472 non-duplicate records, two case reports met criteria for inclusion. We reviewed three cases of ZIKV infection among lactating mothers near the time of delivery. Two of the three (2/3) associated newborns had evidence of ZIKV infection. ZIKV was detected in breast milk of all three mothers. Breast milk detection results were positive in all mothers (3/3) by RT-PCR, one was positive by culture (1/3), and none was tested for ZIKV-specific antibodies. Serum samples were ZIKV positive in all mothers (3/3), and sweat was not tested for ZIKV. Conclusions/Significance We describe three cases of ZIKV-infected breastfeeding mothers who were symptomatic within three days of delivery, and two cases with ZIKV-infected newborns. While ZIKV was detected in the breast milk of all three mothers, the data are not sufficient to conclude ZIKV transmission via breastfeeding. More evidence is needed to distinguish breastfeeding transmission from other perinatal transmission routes. PMID:28394887

  14. Transmission market support system

    International Nuclear Information System (INIS)

    Reinschmidt, K.F.; Coles, B.C.

    1995-01-01

    An interactive, computer-based market support system has been developed for transmission access that is efficient, equitable, and fair to all parties concerned with electrical transmission: utilities, electric generators, owners of transmission networks, and wholesale purchasers of electrical power. Each participant transmits electronically to the computer system his proposed price schedule for buying, selling, or transmitting power for each future time period. The price for transmission on a single line in one direction can differ from the price in the other direction. The total quantity offered in the transmission bid represents the capacity of the line, and the flow on the line cannot exceed this value. The system automatically computes the prices that clear the market; that is, the price that each generator receives at each bus, the price that each transmission operator receives on each line, and the price that each customer pays at each bus. The computer system maximizes the benefits to all three classes while satisfying the electrical characteristics of the transmission system by means of load flow calculations. Customers never pay more than their bid prices (but may pay less), and generators and transmission operators never receive less than their bid prices (but may receive more). The price at each bus applies to all buyers and sellers at that bus: all buyers at the same bus pay the same price and all generators at a bus receive the same price

  15. Assessing the feasibility of interrupting the transmission of soil-transmitted helminths through mass drug administration: The DeWorm3 cluster randomized trial protocol.

    Science.gov (United States)

    Ásbjörnsdóttir, Kristjana Hrönn; Ajjampur, Sitara S Rao; Anderson, Roy M; Bailey, Robin; Gardiner, Iain; Halliday, Katherine E; Ibikounle, Moudachirou; Kalua, Khumbo; Kang, Gagandeep; Littlewood, D Timothy J; Luty, Adrian J F; Means, Arianna Rubin; Oswald, William; Pullan, Rachel L; Sarkar, Rajiv; Schär, Fabian; Szpiro, Adam; Truscott, James E; Werkman, Marleen; Yard, Elodie; Walson, Judd L

    2018-01-01

    Current control strategies for soil-transmitted helminths (STH) emphasize morbidity control through mass drug administration (MDA) targeting preschool- and school-age children, women of childbearing age and adults in certain high-risk occupations such as agricultural laborers or miners. This strategy is effective at reducing morbidity in those treated but, without massive economic development, it is unlikely it will interrupt transmission. MDA will therefore need to continue indefinitely to maintain benefit. Mathematical models suggest that transmission interruption may be achievable through MDA alone, provided that all age groups are targeted with high coverage. The DeWorm3 Project will test the feasibility of interrupting STH transmission using biannual MDA targeting all age groups. Study sites (population ≥80,000) have been identified in Benin, Malawi and India. Each site will be divided into 40 clusters, to be randomized 1:1 to three years of twice-annual community-wide MDA or standard-of-care MDA, typically annual school-based deworming. Community-wide MDA will be delivered door-to-door, while standard-of-care MDA will be delivered according to national guidelines. The primary outcome is transmission interruption of the STH species present at each site, defined as weighted cluster-level prevalence ≤2% by quantitative polymerase chain reaction (qPCR), 24 months after the final round of MDA. Secondary outcomes include the endline prevalence of STH, overall and by species, and the endline prevalence of STH among children under five as an indicator of incident infections. Secondary analyses will identify cluster-level factors associated with transmission interruption. Prevalence will be assessed using qPCR of stool samples collected from a random sample of cluster residents at baseline, six months after the final round of MDA and 24 months post-MDA. A smaller number of individuals in each cluster will be followed with annual sampling to monitor trends in

  16. Karakteristik Traksi dan Kinerja Transmisi pada Sistem Gear Transmission dan Gearless Transmission

    Directory of Open Access Journals (Sweden)

    A.A.I.A. Sri Komaladewi

    2015-07-01

    Full Text Available Abstrak : Sistem transmisi adalah salah satu komponen penting pada sistem drive train, yang fungsiutamanya adalah mentramsmisikan atau mentransformasikan torsi yang keluar dari mesin sampaike torsi yang terjadi pada roda penggerak. Ratio transmisi berpengaruh terhadap besarnya torsiyang dapat ditransmisikan, sedangkan jumlah tingkat kecepatannya berpengaruh terhadapkehalusan (smoothness proses transmisi dan transformasi daya pada sistem transmisi tersebut.Karakteristik traksi dan kinerja transmisi kendaraan yang diuji adalah Toyota Kijang Inova tahun2012, Pemodelan kinerja traksi dilakukan dengan metode simulasi. Karakteristik traksi dari sistemtransmisi kendaraan dianalisa paada beberapa tingkat kecepatan untuk mengatasi berbagaihambatan sepanjang kondisi operasi kendaraan. Perhitungan awal dari ratio gigi antara yangtertinggi dan terendah dapat dicari dengan menggunakan hukum Progresi Geometri. Ratio dariroda gigi akhir (terendah ditentukan oleh kecepatan maksimum kendaraan yang akan dirancang.Sedangkan traksi maksimum atau tanjakan maksimum menentukan besar ratio roda gigi awal(tertinggi. Kemudian ratio diantara kedua batas tersebut dibuat sedemikian rupa agar traksi yangdihasilkan kendaraan dapat mendekati karakteristik idealnya. Modifikasi ratio gigi transmisi daristandarnya mendapatkan kebutuhan traksi yang lebih kecil untuk kecepatan yang sama, baikpemasangan 4 tingkat, 5 tingkat, maupun 6 tingkat kecepatan. Jarak kurva traksi antara dua ratiogigi menunjukkan besarnya traksi yang tidak terpakai. Dari grafik kinerja transmisi menunjukkansemakin banyak tingkat transmisi, semakin kecil traksi yang terbuang.Karakteristik traksi mendekatikarakteristik idealnya pada gearless transmission system dengan 10 stages.Kata kunci: drive train, rasio transmisi, kinerja traksi, progresi geometri, gearless transmission Abstract : The transmission system is one of the important components in the drive train system, whose mainfunction is to transmit or to

  17. Cyber Security in Industrial Control Systems and SCADA Applications: Modbus TCP Protocol Example

    Directory of Open Access Journals (Sweden)

    Erdal IRMAK

    2017-12-01

    Full Text Available Electrical energy generation, transmission and distribution systems are evaluated in terms of national security dimension and defined as critical infrastructures. Monitoring and controlling of these systems is provided by Industrial Control Systems (ICS or Supervisory Control and Data Acquisition (SCADA systems. According to the latest advances in communication and internet technology, ICS/SCADA systems have started to become integrated with these systems. As a result of this situation, current or existing vulnerabilities in information and communication technology affect to SCADA systems directly. Therefore, this paper focuses on the cyber security of ICS/SCADA systems. It has been proved that the lack of authentication detected in Modbus TCP protocol, one of the most used in ICS/SCADA systems, can be exploited. In order to solve this security issue, a software is developed using the Python programming language for blocking or mitigating the cyber attacks. The proposed solution is subjected to several tests and results show that the attacks can be prevented successfully. Thus, it is considered that the proposed work will contribute to the security of ICS/SCADA systems and the industrial protocols using for communicating these systems.

  18. 320 Gb/s Single polarization OTDM Transmission over 80 km Standard Transmission Fiber

    DEFF Research Database (Denmark)

    Siahlo, Andrei; Seoane, Jorge; Clausen, Anders

    2005-01-01

    Optical time-division multiplexing (OTDM) is an attractive technique for increasing the capacity of optical transmission systems. 320 Gbit/s single-channel and single-polarization error-free transmission over continuous spans of either 80 km SMF or 77 km NZDSF are realized.......Optical time-division multiplexing (OTDM) is an attractive technique for increasing the capacity of optical transmission systems. 320 Gbit/s single-channel and single-polarization error-free transmission over continuous spans of either 80 km SMF or 77 km NZDSF are realized....

  19. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  20. Molecules for security measures: from keypad locks to advanced communication protocols.

    Science.gov (United States)

    Andréasson, J; Pischel, U

    2018-04-03

    The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.

  1. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  2. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  3. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  4. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  5. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  6. Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state

    International Nuclear Information System (INIS)

    Chang Yan; Zhang Shi-Bin; Yan Li-Li; Han Gui-Hua

    2015-01-01

    By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0′〉 state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0′〉. By using the |0′〉 state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping–pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042. (paper)

  7. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  8. The Cost of Transmission for Wind Energy: A Review of Transmission Planning Studies

    Energy Technology Data Exchange (ETDEWEB)

    Mills, Andrew D.; Wiser, Ryan; Porter, Kevin

    2009-02-02

    The rapid development of wind power that the United States has experienced over the last several years has been coupled with a growing concern that wind development will require substantial additions to the nation's transmission infrastructure. Transmission is particularly important for wind power due to the locational dependence of wind resources, the relatively low capacity factor of wind plants, and the mismatch between the short lead time to build a new wind project and the longer lead time often needed to plan, permit, and construct transmission. It is clear that institutional issues related to transmission planning, siting, and cost allocation will pose major obstacles to accelerated wind power deployment, but also of concern is the potential cost of this infrastructure build out. Simply put, how much extra cost will society bear to deliver wind power to load centers? Without an answer to this question, there can be no consensus on whether or not the cost of developing transmission for wind will be a major barrier to further wind deployment, or whether the institutional barriers to transmission expansion are likely to be of more immediate concern. In this report, we review a sample of 40 detailed transmission studies that have included wind power. These studies cover a broad geographic area, and were completed from 2001-2008. Our primary goal in reviewing these studies is to develop a better understanding of the transmission costs needed to access growing quantities of wind generation. A secondary goal is to gain a better appreciation of the differences in transmission planning approaches in order to identify those methodologies that seem most able to estimate the incremental transmission costs associated with wind development. Finally, we hope that the resulting dataset and discussion might be used to inform the assumptions, methods, and results of higher-level assessment models that are sometimes used to estimate the cost of wind deployment (e.g. NEMS

  9. Economy of electric power transmission

    International Nuclear Information System (INIS)

    Manzoni, G.; Delfanti, M.

    2008-01-01

    An analysis is presented of the impact of H V and Ehv transmission costs on the final value of the kWh supplied, with reference both to transmission systems of the European type and to long distance point-to-point transmission links. The analysis is extended to A C transmission by underground cables and to Hvdc submarine and aerial links. In the European power system, the impact of transmission costs results to be usually modest, but it may become important in the case of network congestions [it

  10. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  11. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum

    Science.gov (United States)

    Wang, Le; Zhao, Sheng-Mei; Gong, Long-Yan; Cheng, Wei-Wen

    2015-12-01

    In this paper, we propose a measurement-device-independent quantum-key-distribution (MDI-QKD) protocol using orbital angular momentum (OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol, the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie’s successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover, the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence (AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271238 and 61475075), the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20123223110003), the Natural Science Research Foundation for Universities of Jiangsu Province of China (Grant No. 11KJA510002), the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, China (Grant No. NYKL2015011), and the

  12. The impact of transmission errors on progressive 720 lines HDTV coded with H.264

    Science.gov (United States)

    Brunnström, Kjell; Stålenbring, Daniel; Pettersson, Martin; Gustafsson, Jörgen

    2010-02-01

    TV sent over the networks based on the Internet Protocol i.e IPTV is moving towards high definition (HDTV). There has been quite a lot of work on how the HDTV is affected by different codecs and bitrates, but the impact of transmission errors over IP-networks have been less studied. The study was focusing on H.264 encoded 1280x720 progressive HDTV format and was comparing three different concealment methods for different packet loss rates. One is included in a propriety decoder, one is part of FFMPEG and different length of freezing. The target is to simulate what typically IPTV settop-boxes will do when encountering packet loss. Another aim is to study whether the presentation upscaled on the full HDTV screen or presented pixel mapped in a smaller area in the center of the sceen would have an effect on the quality. The results show that there were differences between the two packet loss concealment methods in FFMPEG and in the propriety codec. Freezing seemed to have similar effect as been reported before. For low rates of transmission errors the coding impairments has impact on the quality, but for higher degree of transmission errors these does not affect the quality, since they become overshadowed by transmission error. An interesting effect where the higher bitrate videos goes from having higher quality for lower degree of packet loss, to having lower quality than the lower bitrate video at higher packet loss, was discovered. The different way of presenting the video i.e. upscaled or not-upscaled was significant on the 95% level, but just about.

  13. A protocol for preparation and transfection of rat entorhinal cortex organotypic cultures for electrophysiological whole-cell recordings

    Directory of Open Access Journals (Sweden)

    Nicholas I. Cilz

    2017-01-01

    Full Text Available Understanding how neuromodulators influence synaptic transmission and intrinsic excitability within the entorhinal cortex (EC is critical to furthering our understanding of the molecular and cellular aspects of this region. Organotypic cultures can provide a cost-effective means to employ selective molecular biological strategies in elucidating cellular mechanisms of neuromodulation in the EC. We therefore adapted our acute slice model for organotypic culture applications and optimized a protocol for the preparation and biolistic transfection of cultured horizontal EC slices. Here, we present our detailed protocol for culturing EC slices. Using an n-methyl-d-glucamine (NMDG-containing cutting solution, we obtain healthy EC slice cultures for electrophysiological recordings. We also present our protocol for the preparation of “bullets” carrying one or more constructs and demonstrate successful transfection of EC slices. We build upon previous methods and highlight specific aspects in our method that greatly improved the quality of our results. We validate our methods using immunohistochemical, imaging, and electrophysiological techniques. The novelty of this method is that it provides a description of culturing and transfection of EC neurons for specifically addressing their functionality. This method will enable researchers interested in entorhinal function to quickly adopt a similar slice culture transfection system for their own investigations.

  14. Value transmissions between parents and children: gender and developmental phase as transmission belts.

    Science.gov (United States)

    Roest, Annette M C; Dubas, Judith Semon; Gerris, Jan R M

    2010-02-01

    This study applied the gender role model of socialization theory, the developmental aging theory, and the topic salience perspective to the investigation of parent-child value transmissions. Specifically, we examined whether the bi-directionality and selectivity of value transmissions differed as a function of parents' and children's gender and children's developmental phase (adolescence versus emerging adulthood). Transmissions between parents and children from 402 Dutch families on the topics of work as duty and hedonism were studied across a 5-year period using structural equation modeling. As expected, we did not find convincing support for the general models of gender socialization and developmental aging. Instead, parent-child value transmissions appeared to be qualified by value salience. Particularly, high salience of work as duty for fathers was related with great paternal involvement in transmissions on this value orientation and high salience of hedonism for sons and adolescents was linked to transmissions from these groups to parents. Copyright (c) 2009 The Association for Professionals in Services for Adolescents. Published by Elsevier Ltd. Published by Elsevier Ltd. All rights reserved.

  15. Minimizing the Risk of Disease Transmission in Emergency Settings: Novel In Situ Physico-Chemical Disinfection of Pathogen-Laden Hospital Wastewaters.

    Directory of Open Access Journals (Sweden)

    Emanuele Sozzi

    Full Text Available The operation of a health care facility, such as a cholera or Ebola treatment center in an emergency setting, results in the production of pathogen-laden wastewaters that may potentially lead to onward transmission of the disease. The research presented here evaluated the design and operation of a novel treatment system, successfully used by Médecins Sans Frontières in Haiti to disinfect CTC wastewaters in situ, eliminating the need for road haulage and disposal of the waste to a poorly-managed hazardous waste facility, thereby providing an effective barrier to disease transmission through a novel but simple sanitary intervention. The physico-chemical protocols eventually successfully treated over 600 m3 of wastewater, achieving coagulation/flocculation and disinfection by exposure to high pH (Protocol A and low pH (Protocol B environments, using thermotolerant coliforms as a disinfection efficacy index. In Protocol A, the addition of hydrated lime resulted in wastewater disinfection and coagulation/flocculation of suspended solids. In Protocol B, disinfection was achieved by the addition of hydrochloric acid, followed by pH neutralization and coagulation/flocculation of suspended solids using aluminum sulfate. Removal rates achieved were: COD >99%; suspended solids >90%; turbidity >90% and thermotolerant coliforms >99.9%. The proposed approach is the first known successful attempt to disinfect wastewater in a disease outbreak setting without resorting to the alternative, untested, approach of 'super chlorination' which, it has been suggested, may not consistently achieve adequate disinfection. A basic analysis of costs demonstrated a significant saving in reagent costs compared with the less reliable approach of super-chlorination. The proposed approach to in situ sanitation in cholera treatment centers and other disease outbreak settings represents a timely response to a UN call for onsite disinfection of wastewaters generated in such

  16. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  17. Design and implementation of a telemedicine system using Bluetooth protocol and GSM/GPRS network, for real time remote patient monitoring.

    Science.gov (United States)

    Jasemian, Yousef; Nielsen, Lars Arendt

    2005-01-01

    This paper introduces the design and implementation of a generic wireless and Real-time Multi-purpose Health Care Telemedicine system applying Bluetooth protocol, Global System for Mobile Communications (GSM) and General Packet Radio Service (GPRS). The paper explores the factors that should be considered when evaluating different technologies for application in telemedicine system. The design and implementation of an embedded wireless communication platform utilising Bluetooth protocol is described, and the implementation problems and limitations are investigated. The system is tested and its telecommunication general aspects are verified. The results showed that the system has (97.9 +/- 1.3)% Up-time, 2.5 x 10(-5) Bit Error Rate, 1% Dropped Call Rate, 97.4% Call Success Rate, 5 second transmission delay in average, (3.42 +/- 0.11) kbps throughput, and the system may have application in electrocardiography.

  18. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  19. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  20. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  1. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  2. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  3. National transmission grid study

    Energy Technology Data Exchange (ETDEWEB)

    Abraham, Spencer [USDOE Office of the Secretary of Energy, Washington, DC (United States)

    2003-05-31

    The National Energy Policy Plan directed the U.S. Department of Energy (DOE) to conduct a study to examine the benefits of establishing a national electricity transmission grid and to identify transmission bottlenecks and measures to address them. DOE began by conducting an independent analysis of U.S. electricity markets and identifying transmission system bottlenecks using DOE’s Policy Office Electricity Modeling System (POEMS). DOE’s analysis, presented in Section 2, confirms the central role of the nation’s transmission system in lowering costs to consumers through increased trade. More importantly, DOE’s analysis also confirms the results of previous studies, which show that transmission bottlenecks and related transmission system market practices are adding hundreds of millions of dollars to consumers’ electricity bills each year. A more detailed technical overview of the use of POEMS is provided in Appendix A. DOE led an extensive, open, public input process and heard a wide range of comments and recommendations that have all been considered.1 More than 150 participants registered for three public workshops held in Detroit, MI (September 24, 2001); Atlanta, GA (September 26, 2001); and Phoenix, AZ (September 28, 2001).

  4. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  5. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  6. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  7. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  8. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  9. 76 FR 49841 - Transmission Planning and Cost Allocation by Transmission Owning and Operating Public Utilities

    Science.gov (United States)

    2011-08-11

    ... Commission-approved RTOs and ISOs. The Commission stated that it expected all non-public utility transmission... transmission planning processes that public utility transmission providers in regions outside of RTOs and ISOs...

  10. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  11. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  12. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  13. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  14. Pricing transmission services

    International Nuclear Information System (INIS)

    Haaden, E.

    1995-01-01

    The price structure for transmission of electric power through the main lines in Sweden is analyzed. After deregulation of the electricity market, the main transmission lines are owned by a separate national company, with no interests from the power producers. Comparisons are made to ideal marginal price structures. 6 refs

  15. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  16. Spatial data efficient transmission in WebGIS based on IPv6

    Science.gov (United States)

    Wang, Zhen-feng; Liu, Ji-ping; Wang, Liang; Tao, Kun-wang

    2008-12-01

    Large-size of spatial data and limited bandwidth of network make it restricted to transmit spatial data in WebGIS. This paper employs IPv6 (Internet Protocol version 6), the successor of IPv4 running now, to transmit spatial data efficiently. As the core of NGN (Next Generation Network), IPv6 brings us many advantages to resolve performance problems in current IPv4 network applications. Multicast, which is mandatory in IPv6 routers, can make one server serve many clients simultaneously efficiently, thus to improve capacity of network applications. The new type of anycast address in IPv6 will make network client applications possible to find the nearest server. This makes data transmission between client and server fastest. The paper introduces how to apply IPv6 multicast and anycast in WebGIS to transmit data efficiently.

  17. A concept to standardize raw biosignal transmission for brain-computer interfaces.

    Science.gov (United States)

    Breitwieser, Christian; Neuper, Christa; Müller-Putz, Gernot R

    2011-01-01

    With this concept we introduced the attempt of a standardized interface called TiA to transmit raw biosignals. TiA is able to deal with multirate and block-oriented data transmission. Data is distinguished by different signal types (e.g., EEG, EOG, NIRS, …), whereby those signals can be acquired at the same time from different acquisition devices. TiA is built as a client-server model. Multiple clients can connect to one server. Information is exchanged via a control- and a separated data connection. Control commands and meta information are transmitted over the control connection. Raw biosignal data is delivered using the data connection in a unidirectional way. For this purpose a standardized handshaking protocol and raw data packet have been developed. Thus, an abstraction layer between hardware devices and data processing was evolved facilitating standardization.

  18. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  19. The impact of "Option B" on HIV transmission from mother to child in Rwanda: An interrupted time series analysis.

    Science.gov (United States)

    Abimpaye, Monique; Kirk, Catherine M; Iyer, Hari S; Gupta, Neil; Remera, Eric; Mugwaneza, Placidie; Law, Michael R

    2018-01-01

    Nearly a quarter of a million children have acquired HIV, prompting the implementation of new protocols-Option B and B+-for treating HIV+ pregnant women. While efficacy has been demonstrated in randomized trials, there is limited real-world evidence on the impact of these changes. Using longitudinal, routinely collected data we assessed the impact of the adoption of WHO Option B in Rwanda on mother to infant transmission. We used interrupted time series analysis to evaluate the impact of Option B on mother-to-child HIV transmission in Rwanda. Our primary outcome was the proportion of HIV tests in infants with positive results at six weeks of age. We included data for 20 months before and 22 months after the 2010 policy change. Of the 15,830 HIV tests conducted during our study period, 392 tested positive. We found a significant decrease in both the level (-2.08 positive tests per 100 tests conducted, 95% CI: -2.71 to -1.45, p Option B in Rwanda contributed to an immediate decrease in the rate of HIV transmission from mother to child. This suggests other countries may benefit from adopting these WHO guidelines.

  20. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  1. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  2. Transmission Bottleneck Size Estimation from Pathogen Deep-Sequencing Data, with an Application to Human Influenza A Virus.

    Science.gov (United States)

    Sobel Leonard, Ashley; Weissman, Daniel B; Greenbaum, Benjamin; Ghedin, Elodie; Koelle, Katia

    2017-07-15

    advances in sequencing technology have enabled bottleneck size estimation from pathogen genetic data, although there is not yet a consistency in the statistical methods used. Here, we introduce a new approach to infer the bottleneck size that accounts for variant identification protocols and noise during pathogen replication. We show that failing to account for these factors leads to an underestimation of bottleneck sizes. We apply this method to an existing data set of human influenza virus infections, showing that transmission is governed by a loose, but highly variable, transmission bottleneck whose size is positively associated with the severity of infection of the donor. Beyond advancing our understanding of influenza virus transmission, we hope that this work will provide a standardized statistical approach for bottleneck size estimation for viral pathogens. Copyright © 2017 Sobel Leonard et al.

  3. Optical analog transmission device

    International Nuclear Information System (INIS)

    Ikawa, Shinji.

    1994-01-01

    The present invention concerns a device such as electro-optical conversion elements, optoelectric-electric elements and optical transmission channel, not undergoing deleterious effects on the efficiency of conversion and transmission due to temperature, and aging change. That is, a sine wave superposing means superposes, on a detector signal to be transmitted, a sine-wave signal having a predetermined amplitude and at a frequency lower than that of the detector signal. An optoelectric conversion means converts the electric signal as the signal of the sine-wave signal superposing means into an optical signal and outputs the same to an optical transmitting channel. The optoelectric conversion means converts the transmitted signal to an electric signal. A discriminating means discriminates the electric signal into a detector signal and a sine-wave signal. A calculating means calculates an optical transmitting efficiency of the transmitting channel based on the amplitude of the discriminated sine-wave signal. A processing means compensates an amplitude value of the detector signals discriminated by the discriminating means based on the optical transmission efficiency. As a result, an optical analog transmission device can be attained, which conducts optical transmission at a high accuracy without undergoing the defective effects of the optical transmission efficiency. (I.S.)

  4. A System Architecture for Efficient Transmission of Massive DNA Sequencing Data.

    Science.gov (United States)

    Sağiroğlu, Mahmut Şamİl; Külekcİ, M Oğuzhan

    2017-11-01

    The DNA sequencing data analysis pipelines require significant computational resources. In that sense, cloud computing infrastructures appear as a natural choice for this processing. However, the first practical difficulty in reaching the cloud computing services is the transmission of the massive DNA sequencing data from where they are produced to where they will be processed. The daily practice here begins with compressing the data in FASTQ file format, and then sending these data via fast data transmission protocols. In this study, we address the weaknesses in that daily practice and present a new system architecture that incorporates the computational resources available on the client side while dynamically adapting itself to the available bandwidth. Our proposal considers the real-life scenarios, where the bandwidth of the connection between the parties may fluctuate, and also the computing power on the client side may be of any size ranging from moderate personal computers to powerful workstations. The proposed architecture aims at utilizing both the communication bandwidth and the computing resources for satisfying the ultimate goal of reaching the results as early as possible. We present a prototype implementation of the proposed architecture, and analyze several real-life cases, which provide useful insights for the sequencing centers, especially on deciding when to use a cloud service and in what conditions.

  5. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  6. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  7. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  8. Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Orfanidis, Charalampos; Dragoni, Nicola

    2014-01-01

    In receiver-initiated medium access control (MAC) protocols for wireless sensor networks, communication is initiated by the receiver node which transmits beacons indicating its availability to receive data. In the case of multiple senders having traffic for a given receiver, such beacons form...... points where collisions are likely to happen. In this paper, we present altruistic backoff (AB), a novel collision avoidance mechanism that aims to avoid collisions before the transmission of a beacon. As a result of an early backoff, senders spend less time in idle listening waiting for a beacon, thus...... saving significant amounts of energy. We present an implementation of AB for Texas Instruments' eZ430-rf2500 sensor nodes and we evaluate its performance with simulations and experiments....

  9. Stereo-controlled synthesis of polyheterocycles via the diene-transmissive hetero-Diels-Alder reaction of β,γ-unsaturated α-keto esters.

    Science.gov (United States)

    Otani, Takashi; Tamai, Yumiko; Seki, Kazunori; Kikuchi, Tomohiro; Miyazawa, Taiichiro; Saito, Takao

    2015-06-07

    We describe the stereoselective synthesis of polyring-fused heterocyclic compounds based on diene-transmissive hetero-Diels-Alder reactions utilizing β,γ-unsaturated α-keto esters. This protocol involves the initial endo- or exo-selective Diels-Alder (DA) reactions with electron-rich dienophiles, methylenation of the ester carbonyl groups with the Tebbe reagent, and a stereoselective second DA reaction with electron-deficient dienophiles. The use of enantioselective DA reactions in the initial reaction enables access to chiral polyring-fused heterocyclic compounds with multiple chiral centres.

  10. Accounting-related transmission issues

    International Nuclear Information System (INIS)

    Niehaus, M.; Bjorn, P.; Pate, G.

    1999-01-01

    Various initiatives have been undertaken by the Federal Energy Regulatory Commission (FERC) to deregulate wholesale electric energy markets. These initiatives have focused on restructuring the transmission systems in the US and recently have culminated in a proposal requiring formation of and participation in regional transmission organizations. The overall form of regulation selected to determine rates for transmission entities as well as underlying regulatory decisions reached on key issues will have profound implications for transmission entities. For example, traditional cost-based regulation would require one set of accounting and reporting rules, while incentive-based regulation may not be subject to those same rules. An overview of some of the major accounting and financial reporting issues that will need to be considered is presented

  11. Series Transmission Line Transformer

    Science.gov (United States)

    Buckles, Robert A.; Booth, Rex; Yen, Boris T.

    2004-06-29

    A series transmission line transformer is set forth which includes two or more of impedance matched sets of at least two transmissions lines such as shielded cables, connected in parallel at one end ans series at the other in a cascading fashion. The cables are wound about a magnetic core. The series transmission line transformer (STLT) which can provide for higher impedance ratios and bandwidths, which is scalable, and which is of simpler design and construction.

  12. Transmission on Balance 2006

    International Nuclear Information System (INIS)

    2007-02-01

    Every year he Dutch Transmission System Operator (TSO) TenneT issues the title publication 'Transmission on Balance'. This report provides information about the main technical operating results in the past year.

  13. Alternative approaches to transmission investment

    Energy Technology Data Exchange (ETDEWEB)

    Thon, S. [AltaLink Management Ltd., Calgary, AB (Canada)

    2004-07-01

    AltaLink is Canada's first stand-alone power transmission company, serving all major centres in Alberta and 85 per cent of Alberta's population. It has more than $1 billion in assets, 11,500 km of transmission lines and 300 substations. It was noted that there has not been any significant investment in power transmission in Alberta for the past 20 years, partly because transmission assets have a very long lifespan. The new role of the power grid is to ensure reliability, safety, efficiency, market effectiveness and supply diversity. The benefits and costs of AltaLink's 500 kV North-South upgrade project were outlined. It was noted that a healthy transmission system is the basis for economic growth throughout the province and for the development of Alberta's resource base. The transmission policy in Alberta endorses that all consumers pay postage stamp tariffs. It also promotes a proactive plan for transmission projects, the time to maximum rate (TMR) in limited cases only, a congestion-free grid under normal conditions, the financial commitment of generators, specific time limits on permitting processes, and regional interconnections to benefit all customers. tabs., figs.

  14. Our views on transmission policy

    International Nuclear Information System (INIS)

    Wellford, W.H.; Sutley, N.H.

    1990-01-01

    In this article the authors discuss the need for predictable and fair access to transmission facilities in order to ensure competitive generation of power. They propose that the Federal Energy Regulatory Commission should regulate transmission to prevent a utility from gaining a competitive advantage in electricity generation markets, the incorporation of transmission access into every bidding program under state jurisdiction, and requirement of transmission rates, terms and conditions for all in-state utilities be included in the request for proposal

  15. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  16. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  17. Fault discovery protocol for passive optical networks

    Science.gov (United States)

    Hajduczenia, Marek; Fonseca, Daniel; da Silva, Henrique J. A.; Monteiro, Paulo P.

    2007-06-01

    All existing flavors of passive optical networks (PONs) provide an attractive alternative to legacy copper-based access lines deployed between a central office (CO) of the service provider (SP) and a customer site. One of the most challenging tasks for PON network planners is the reduction of the overall cost of employing protection schemes for the optical fiber plant while maintaining a reasonable level of survivability and reducing the downtime, thus ensuring acceptable levels of quality of service (QoS) for end subscribers. The recently growing volume of Ethernet PONs deployment [Kramer, IEEE 802.3, CFI (2006)], connected with low-cost electronic and optical components used in the optical network unit (ONU) modules, results in the situation where remote detection of faulty/active subscriber modules becomes indispensable for proper operation of an EPON system. The problem of the remote detection of faulty ONUs in the system is addressed where the upstream channel is flooded with the cw transmission from one or more damaged ONUs and standard communication is severed, providing a solution that is applicable in any type of PON network, regardless of the operating protocol, physical structure, and data rate.

  18. Data transmission optical link for LLRF TESLA project part I: hardware structure of OPT0 module

    Science.gov (United States)

    Pozniak, Krzysztof T.; Romaniuk, Ryszard S.; Jalmuzna, Wojciech; Olowski, Krzysztof; Perkuszewski, Karol; Zielinski, Jerzy; Kierzkowski, Krzysztof

    2006-03-01

    It may be predicted now, even assuming a very conservative approach, that the next generation of the Low Level RF control systems for future accelerators will use extensively such technologies like: very fast programmable circuits equipped with DSP, embedded PC and optical communication I/O functionalities, as well as multi-gigabit optical transmission of measurement data and control signals. The paper presents the idea and realization of a gigabit synchronous data distributor designed to work in the LLRF control system of TESLA technology based X-ray FEL. The design bases on a relatively simple and cheap FPGA chip Cyclone. Commercially available SERDES (serializer/deserializer) and optical transceiver chips were applied. The optoelectronic module is embedded on the main LLRF BMB (backbone mother board). The MB provides communication with the outside computer control system, programmable chip configuration, integration with other functional modules and power supply. The hardware implementation is here described and the used software for BER (bit-error-rate) testing of the multi-gigabit optical link. The measurement results are presented. The appendix contains a comparison between the available protocols of serial data transmission for FPGA technology. This paper is a partial contribution to the next version of the SIMCON system which is expected to be released this year. The SIMCON, ver 3.0 will contain 8 channels and multi-gigabit optical transmission capability. It will be a fully modular construction.

  19. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  20. Sigma Routing Metric for RPL Protocol

    Directory of Open Access Journals (Sweden)

    Paul Sanmartin

    2018-04-01

    Full Text Available This paper presents the adaptation of a specific metric for the RPL protocol in the objective function MRHOF. Among the functions standardized by IETF, we find OF0, which is based on the minimum hop count, as well as MRHOF, which is based on the Expected Transmission Count (ETX. However, when the network becomes denser or the number of nodes increases, both OF0 and MRHOF introduce long hops, which can generate a bottleneck that restricts the network. The adaptation is proposed to optimize both OFs through a new routing metric. To solve the above problem, the metrics of the minimum number of hops and the ETX are combined by designing a new routing metric called SIGMA-ETX, in which the best route is calculated using the standard deviation of ETX values between each node, as opposed to working with the ETX average along the route. This method ensures a better routing performance in dense sensor networks. The simulations are done through the Cooja simulator, based on the Contiki operating system. The simulations showed that the proposed optimization outperforms at a high margin in both OF0 and MRHOF, in terms of network latency, packet delivery ratio, lifetime, and power consumption.

  1. Distributed Role Selection With ANC and TDBC Protocols in Two-Way Relaying Systems

    KAUST Repository

    Ding, Haiyang

    2015-09-28

    This paper advocates a distributed role selection strategy to coordinate two-way relaying transmissions among three cooperative nodes. For such, the local channel state information comparison and decision feedback mechanism are merged into classical analog network coding (ANC) and time division broadcast (TDBC) protocols such that the cooperative role of each node can be designated in a distributed fashion. We refer to this distributed role selection rule as d-ROSE. In both ANC-based and TDBC-based two-way relaying scenarios, strict proof for the equivalence of d-ROSE and optimal ROSE is given, which indicates that albeit the different form, their final role decision is essentially the same. Outage analysis for the d-ROSE strategy is carried out and the scaling law of the system outage behavior at high signal-to-noise ratio (SNR) is characterized, which manifests that d-ROSE can enhance the system diversity gain to one-order higher relative to the ANC and TDBC protocols. It is also shown that d-ROSE can reduce the signaling overhead upto 60% to perform the outage-optimal role selection. Finally, the impacts of node placement on the outage performance as well as the average signaling overhead of d-ROSE are numerically evaluated and some useful conclusions are drawn. © 2015 IEEE.

  2. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  3. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  4. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  5. Parallel plate transmission line transformer

    NARCIS (Netherlands)

    Voeten, S.J.; Brussaard, G.J.H.; Pemen, A.J.M.

    2011-01-01

    A Transmission Line Transformer (TLT) can be used to transform high-voltage nanosecond pulses. These transformers rely on the fact that the length of the pulse is shorter than the transmission lines used. This allows connecting the transmission lines in parallel at the input and in series at the

  6. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  7. Cross-layer cluster-based energy-efficient protocol for wireless sensor networks.

    Science.gov (United States)

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-04-09

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED).

  8. Cross-Layer Cluster-Based Energy-Efficient Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Aboobeker Sidhik Koyamparambil Mammu

    2015-04-01

    Full Text Available Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs. One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs and a cluster head (CH. The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH and hybrid energy-efficient distributed clustering (HEED.

  9. Transmission issues in Alberta

    International Nuclear Information System (INIS)

    Levson, D.

    2002-01-01

    This paper outlined the major issues and concerns facing users of the transmission system in Alberta. They include congestion management issues that make investors uncertain about power generation. It is necessary to know the difference between which transmission price signals will be faced by low cost cogeneration at Fort McMurray and Cold Lake coal-fired generation near Edmonton compared to combined cycle gas generation near Calgary. Import and export policy tariffs are another concern. Most new generation opportunities in Alberta require access to export markets, but transmission facilities for export need policy support and appropriate tariffs. It was noted that the past actions of Alberta's Transmission Administrator and balancing pool may be distorting market signals for ancillary service markets, and that loss studies and calculations need upgrading

  10. Transmission reliability faces future challenges

    International Nuclear Information System (INIS)

    Beaty, W.

    1993-01-01

    The recently published Washington International Energy Group's 1993 Electric Utility Outlook states that nearly one-third (31 percent) of U.S. utility executives expect reliability to decrease in the near future. Electric power system stability is crucial to reliability. Stability analysis determines whether a system will stay intact under normal operating conditions, during minor disturbances such as load fluctuations, and during major disturbances when one or more parts of the system fails. All system elements contribute to reliability or the lack of it. However, this report centers on the transmission segment of the electric system. The North American Electric Reliability Council (NERC) says the transmission systems as planned will be adequate over the next 10 years. However, delays in building new lines and increasing demands for transmission services are serious concerns. Reliability concerns exist in the Mid-Continent Area Power Pool and the Mid-America Interconnected Network regions where transmission facilities have not been allowed to be constructed as planned. Portions of the transmission systems in other regions are loaded at or near their limits. NERC further states that utilities must be allowed to complete planned generation and transmission as scheduled. A reliable supply of electricity also depends on adhering to established operating criteria. Factors that could complicate operations include: More interchange schedules resulting from increased transmission services. Increased line loadings in portions of the transmission systems. Proliferation of non-utility generators

  11. HVDC power transmission technology assessment

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, R.L.; Tatro, P.J.; Railing, B.D. [New England Power Service Co., Westborough, MA (United States); Johnson, B.K.; Stewart, J.R. [Power Technologies, Inc., Schenectady, NY (United States); Fink, J.L.

    1997-04-01

    The purpose of this study was to develop an assessment of the national utility system`s needs for electric transmission during the period 1995-2020 that could be met by future reduced-cost HVDC systems. The assessment was to include an economic evaluation of HVDC as a means for meeting those needs as well as a comparison with competing technologies such as ac transmission with and without Flexible AC Transmission System (FACTS) controllers. The role of force commutated dc converters was to be assumed where appropriate. The assessment begins by identifying the general needs for transmission in the U.S. in the context of a future deregulated power industry. The possible roles for direct current transmission are then postulated in terms of representative scenarios. A few of the scenarios are illustrated with the help of actual U.S. system examples. non-traditional applications as well as traditional applications such as long lines and asynchronous interconnections are discussed. The classical ``break-even distance`` concept for comparing HVDC and ac lines is used to assess the selected scenarios. The impact of reduced-cost converters is reflected in terms of the break-even distance. This report presents a comprehensive review of the functional benefits of HVDC transmission and updated cost data for both ac and dc system components. It also provides some provocative thoughts on how direct current transmission might be applied to better utilize and expand our nation`s increasingly stressed transmission assets.

  12. An On-Demand Emergency Packet Transmission Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Al Ameen, Moshaddique; Hong, Choong Seon

    2015-12-04

    The rapid developments of sensor devices that can actively monitor human activities have given rise to a new field called wireless body area network (BAN). A BAN can manage devices in, on and around the human body. Major requirements of such a network are energy efficiency, long lifetime, low delay, security, etc. Traffic in a BAN can be scheduled (normal) or event-driven (emergency). Traditional media access control (MAC) protocols use duty cycling to improve performance. A sleep-wake up cycle is employed to save energy. However, this mechanism lacks features to handle emergency traffic in a prompt and immediate manner. To deliver an emergency packet, a node has to wait until the receiver is awake. It also suffers from overheads, such as idle listening, overhearing and control packet handshakes. An external radio-triggered wake up mechanism is proposed to handle prompt communication. It can reduce the overheads and improve the performance through an on-demand scheme. In this work, we present a simple-to-implement on-demand packet transmission scheme by taking into considerations the requirements of a BAN. The major concern is handling the event-based emergency traffic. The performance analysis of the proposed scheme is presented. The results showed significant improvements in the overall performance of a BAN compared to state-of-the-art protocols in terms of energy consumption, delay and lifetime.

  13. An On-Demand Emergency Packet Transmission Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moshaddique Al Ameen

    2015-12-01

    Full Text Available The rapid developments of sensor devices that can actively monitor human activities have given rise to a new field called wireless body area network (BAN. A BAN can manage devices in, on and around the human body. Major requirements of such a network are energy efficiency, long lifetime, low delay, security, etc. Traffic in a BAN can be scheduled (normal or event-driven (emergency. Traditional media access control (MAC protocols use duty cycling to improve performance. A sleep-wake up cycle is employed to save energy. However, this mechanism lacks features to handle emergency traffic in a prompt and immediate manner. To deliver an emergency packet, a node has to wait until the receiver is awake. It also suffers from overheads, such as idle listening, overhearing and control packet handshakes. An external radio-triggered wake up mechanism is proposed to handle prompt communication. It can reduce the overheads and improve the performance through an on-demand scheme. In this work, we present a simple-to-implement on-demand packet transmission scheme by taking into considerations the requirements of a BAN. The major concern is handling the event-based emergency traffic. The performance analysis of the proposed scheme is presented. The results showed significant improvements in the overall performance of a BAN compared to state-of-the-art protocols in terms of energy consumption, delay and lifetime.

  14. "Narrowing the transmission gap: A synthesis of three decades of research on intergenerational transmission of attachment": Correction.

    Science.gov (United States)

    2018-04-01

    Reports an error in "Narrowing the transmission gap: A synthesis of three decades of research on intergenerational transmission of attachment" by Marije L. Verhage, Carlo Schuengel, Sheri Madigan, R. M. Pasco Fearon, Mirjam Oosterman, Rosalinda Cassibba, Marian J. Bakermans-Kranenburg and Marinus H. van IJzendoorn ( Psychological Bulletin , 2016[Apr], Vol 142[4], 337-366). In the article, there are errors in Table 7. The percentages of the attachment classifications do not add up to 100%. The corrected version of Table 7 is provided in the erratum. (The following abstract of the original article appeared in record 2015-55801-001.) Twenty years ago, meta-analytic results (k = 19) confirmed the association between caregiver attachment representations and child-caregiver attachment (Van IJzendoorn, 1995). A test of caregiver sensitivity as the mechanism behind this intergenerational transmission showed an intriguing "transmission gap." Since then, the intergenerational transmission of attachment and the transmission gap have been studied extensively, and now extend to diverse populations from all over the globe. Two decades later, the current review revisited the effect sizes of intergenerational transmission, the heterogeneity of the transmission effects, and the size of the transmission gap. Analyses were carried out with a total of 95 samples (total N = 4,819). All analyses confirmed intergenerational transmission of attachment, with larger effect sizes for secure-autonomous transmission (r = .31) than for unresolved transmission (r = .21), albeit with significantly smaller effect sizes than 2 decades earlier (r = .47 and r = .31, respectively). Effect sizes were moderated by risk status of the sample, biological relatedness of child-caregiver dyads, and age of the children. Multivariate moderator analyses showed that unpublished and more recent studies had smaller effect sizes than published and older studies. Path analyses showed that the transmission could not

  15. Time and Energy Efficient Relay Transmission for Multi-Hop Wireless Sensor Networks.

    Science.gov (United States)

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2016-06-27

    The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications and it is used in IoT applications. It covers all the details related to the MAC and PHY layers of the IoT protocol stack. Due to the nature of IoT, the wireless sensor networks are autonomously self-organized networks without infrastructure support. One of the issues in IoT is the network scalability. To address this issue, it is necessary to support the multi-hop topology. The IEEE 802.15.4 network can support a star, peer-to-peer, or cluster-tree topology. One of the IEEE 802.15.4 topologies suited for the high predictability of performance guarantees and energy efficient behavior is a cluster-tree topology where sensor nodes can switch off their transceivers and go into a sleep state to save energy. However, the IEEE 802.15.4 cluster-tree topology may not be able to provide sufficient bandwidth for the increased traffic load and the additional information may not be delivered successfully. The common drawback of the existing approaches is that they do not address the poor bandwidth utilization problem in IEEE 802.15.4 cluster-tree networks, so it is difficult to increase the network performance. Therefore, to solve this problem in this paper we study a relay transmission protocol based on the standard protocol in the IEEE 802.15.4 MAC. In the proposed scheme, the coordinators can relay data frames to their parent devices or their children devices without contention and can provide bandwidth for the increased traffic load or the number of devices. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the reliability, the end-to-end delay, and the energy consumption.

  16. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  17. Understanding Ebola Virus Transmission

    Directory of Open Access Journals (Sweden)

    Seth Judson

    2015-02-01

    Full Text Available An unprecedented number of Ebola virus infections among healthcare workers and patients have raised questions about our understanding of Ebola virus transmission. Here, we explore different routes of Ebola virus transmission between people, summarizing the known epidemiological and experimental data. From this data, we expose important gaps in Ebola virus research pertinent to outbreak situations. We further propose experiments and methods of data collection that will enable scientists to fill these voids in our knowledge about the transmission of Ebola virus.

  18. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  19. The evolution of transmission mode

    Science.gov (United States)

    Forbes, Mark R.; Hauffe, Heidi C.; Kallio, Eva R.; Okamura, Beth; Sait, Steven M.

    2017-01-01

    This article reviews research on the evolutionary mechanisms leading to different transmission modes. Such modes are often under genetic control of the host or the pathogen, and often in conflict with each other via trade-offs. Transmission modes may vary among pathogen strains and among host populations. Evolutionary changes in transmission mode have been inferred through experimental and phylogenetic studies, including changes in transmission associated with host shifts and with evolution of the unusually complex life cycles of many parasites. Understanding the forces that determine the evolution of particular transmission modes presents a fascinating medley of problems for which there is a lack of good data and often a lack of conceptual understanding or appropriate methodologies. Our best information comes from studies that have been focused on the vertical versus horizontal transmission dichotomy. With other kinds of transitions, theoretical approaches combining epidemiology and population genetics are providing guidelines for determining when and how rapidly new transmission modes may evolve, but these are still in need of empirical investigation and application to particular cases. Obtaining such knowledge is a matter of urgency in relation to extant disease threats. This article is part of the themed issue ‘Opening the black box: re-examining the ecology and evolution of parasite transmission’. PMID:28289251

  20. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  1. Regional Transmission Projects: Finding Solutions

    Energy Technology Data Exchange (ETDEWEB)

    The Keystone Center

    2005-06-15

    The Keystone Center convened and facilitated a year-long Dialogue on "Regional Transmission Projects: Finding Solutions" to develop recommendations that will help address the difficult and contentious issues related to expansions of regional electric transmission systems that are needed for reliable and economic transmission of power within and across regions. This effort brought together a cross-section of affected stakeholders and thought leaders to address the problem with the collective wisdom of their experience and interests. Transmission owners sat at the table with consumer advocates and environmental organizations. Representatives from regional transmission organizations exchanged ideas with state and federal regulators. Generation developers explored common interests with public power suppliers. Together, the Dialogue participants developed consensus solutions about how to begin unraveling some of the more intractable issues surrounding identification of need, allocation of costs, and reaching consensus on siting issues that can frustrate the development of regional transmission infrastructure. The recommendations fall into three broad categories: 1. Recommendations on appropriate institutional arrangements and processes for achieving regional consensus on the need for new or expanded transmission infrastructure 2. Recommendations on the process for siting of transmission lines 3. Recommendations on the tools needed to support regional planning, cost allocation, and siting efforts. List of Dialogue participants: List of Dialogue Participants: American Electric Power American Transmission Company American Wind Energy Association California ISO Calpine Corporation Cinergy Edison Electric Institute Environmental Defense Federal Energy Regulatory Commission Great River Energy International Transmission Company ISO-New England Iowa Public Utility Board Kanner & Associates Midwest ISO National Association of Regulatory Utility Commissioners National Association

  2. 75 FR 63826 - Transmission Infrastructure Program-TransWest Express Transmission Project Capacity

    Science.gov (United States)

    2010-10-18

    ... Administration (Western), a Federal power marketing administration of the United States Department of Energy (DOE... operates an integrated 17,000 circuit mile, high-voltage transmission system across 15 western states... transmission lines and related facilities with at least one terminus in Western's marketing area, that deliver...

  3. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  4. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  5. [Staphylococcus aureus nasal colonization in medical students: importance in nosocomial transmission].

    Science.gov (United States)

    López-Aguilera, Sara; Goñi-Yeste, María Del Mar; Barrado, Laura; González-Rodríguez-Salinas, M Carmen; Otero, Joaquín R; Chaves, Fernando

    2013-10-01

    Staphylococcus aureus is the main pathogen causing nosocomial infections. Health professionals, including medical students, could be a source of transmission. The aims of the study were to determine the rate of nasal carriage of S.aureus susceptible and resistant to methicillin (MRSA) and evaluate the knowledge and adherence that students had about hand hygiene. The study included medical students attached to the Hospital Universitario 12 de Octubre (Madrid, Spain). We collected samples from both nasal vestibules, and the antimicrobial susceptibility was determined on all isolates. Data collection was performed using a self-administered questionnaire that included risk factors for colonization, hygiene habits and knowledge of hand hygiene protocols. Of the 140 students included, 55 (39.3%) were colonized by S.aureus, and 3 (2,1%) by MRSA. The exposure to antibiotics in the last 3 months was lower in colonized students (12.3% vs. 25.9%, P=.03). Self-assessment showed that 56.4% of students almost never washed their hands before to attending to the first patient, and only 38.6% always washed after examining patients. More than a third (35.7%) ignored the hand hygiene protocol, and 38.6% had not received specific formation. Medical students should be included in hospital infection control programs. Hand hygiene training should be given to students before they begin their practices in the hospital. Copyright © 2012 Elsevier España, S.L. All rights reserved.

  6. Cost characteristics of transmission

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    FERC regulation of transmission is predicated, at least in part, on a belief that, in the absence of regulation, some utilities would be able to exercise monopoly power and the ability to extract monopoly profits. This monopoly power follows from the view that transmission facilities inevitably are a natural monopoly for both economic and social/regulatory reasons. In the first part of this section the authors present the argument that transmission is a natural monopoly. They then consider the impact of this on regulation and the problems that that view creates

  7. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  8. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  9. Mother-to-child transmission of HIV-1: advances and controversies of the twentieth centuries.

    Science.gov (United States)

    Scarlatti, G

    2004-01-01

    Mother-to-child transmission (MTCT) is the overwhelming source of HIV-1 infection in young children. According to the World Health Organization (WHO), during the year 2003, despite effective antiretroviral (ARV) therapy, there were approximately 700,000 new infections in children worldwide, the majority of whom were from resource-limited countries. Alternative protocols to the long-course and complex regimens of ARV drugs, which in high-income countries have almost eradicated HIV MTCT, have been shown to reduce early transmission rates by 38-50%. However, the accumulation of drug resistance and the long-term toxicities of ARVs mean that alternative approaches need to be developed. Furthermore, transmission via breastfeeding, which accounts for one third of all transmission events, can reduce the benefits of short-course therapies given to women for the prevention of MTCT. The complex mechanisms and determinants of HIV-1 MTCT and its prevention in the different routes of transmission are still not completely understood. Despite the large contribution that many international agencies have made during the past 10-15 years in support of observational and intervention trials, as well as basic scientific research, HIV-1 MTCT intervention trials and basic research often are not integrated, leading to the generation of a fragmented picture. Maternal RNA levels, CD4+ T-cell counts, mode of delivery and gestational age were shown to be independent factors associated with transmission. However, these markers are only partial surrogates and cannot be used as absolute predictors of MTCT of HIV-1. Studies on the role of viral characteristics, immune response and host genomic polymorphisms did not always achieve conclusive results. Although CCR5-using viruses are preferentially carried by HIV-1 infected women as well as transmitted to their infants, the 32-basepair deletion of the CCR5 gene was not shown to influence perinatal MTCT. X4 viruses are apparently hampered in MTCT

  10. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  11. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  12. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  13. The evolution of plant virus transmission pathways

    Science.gov (United States)

    Frédéric M. Hamelin; Linda J.S. Allen; Holly R. Prendeville; M. Reza Hajimorad; Michael J. Jeger

    2016-01-01

    The evolution of plant virus transmission pathways is studied through transmission via seed, pollen, oravector. We address the questions: under what circumstances does vector transmission make pollen transmission redundant? Can evolution lead to the coexistence of multiple virus transmission pathways? We restrict the analysis to an annual plant population in which...

  14. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  15. Transmission access issues: Present and future

    International Nuclear Information System (INIS)

    Bahl, P.K.; Gray, R.G.

    1992-01-01

    In recent years, the electric industry has undergone dramatic changes as the federal and state governments have encouraged bulk power production by Independent Power Producers (IPPS) and Qualified Facilities (QFs). With decentralization and the consequent competition in the field of bulk power production, there has emerged the problem of non-utility generators (NUGS) and of transmission dependent utilities accessing the existing transmission systems owned by electric utilities. This paper presents current and future issues related to transmission access by IPPS, QFs and transmission dependent utilities. These issues include: (a) impact on system reliability, (b) impact of pricing strategies, (c) changes in state and federal regulations, (d) transmission proposals by various entities, (e) present access arrangements, (f) formation of the Western Systems Power Pool (WSPP), and (g) siting difficulties. The transmission access problem warrants consideration of transmission services, coordination among electric utilities, joint planning on a regional basis, and accommodation of IPPs and NUGs

  16. Cultural Transmission of Civicness

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    2012-01-01

    This paper estimates the intergeneration transmission of civicness by studying second generation immigrants in 29 European countries with ancestry in 83 nations. There is significant transmission of civicness both on the mother’s and the father’s side. The estimates are quantitatively significant...

  17. Cultural Transmission of Civicness

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the intergeneration transmission of civicness by studying second generation immigrants in 29 European countries with ancestry in 83 nations. There is significant transmission of civicness both on the mother’s and the father’s side. The estimates are quantitatively significant...

  18. Long-distance power transmission technology. Microwave power transmission; Denryoku no chokyori yuso gijutsu. Micro ha musen soden

    Energy Technology Data Exchange (ETDEWEB)

    Kaya, N [Kobe University, Kobe (Japan). Faculty of Engineering

    1994-11-05

    This paper explains the principles of microwave power transmission as a long-distance power transmission technology, and the status of its development. Under an assumption of using a wave length of 12 cm (2.45 GHz) and a transmission distance of 1 km, an ideal wireless power transmission can realize transmitting the power at an efficiency of 95% or higher if transmitting and receiving antennas with a radius of 8.8 m are used. What remains as important requirements is raising the efficiency of conversion from power supply into microwaves, and the efficiency of rectification after the power has been received. By using microwave energy sent from a transmission antenna installed on the roof of an automobile, a model airplane with a receiving antenna installed at its rear flew successfully for 40 seconds under the microwave lifted airplane experiment (MILAX). In an experiment of transmitting microwave power in space, power was successfully transmitted to the child rocket as an event under the International Space Year - Microwave Energy Transmission in Space (ISY-METS). The microwave wireless power transmission on the ground would have a possibility of taking over the overhead line transmission into islands. An attempt is scheduled to send power of 5 kW by using transmission and receiving antennas with a diameter of 3 m to investigate effects on transmission efficiency, and communications and electromagnetic environments, and to collect basic data. 3 refs., 3 figs.

  19. Transmission Line Security Monitor: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  20. Transmission policy in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Joskow, P.L. [Massachusetts Institute of Technology, Cambridge, MA (United States). Department of Economics

    2005-06-01

    This paper provides an overview of the development of electric power transmission access, pricing and investment policies in the US over the last 15 years and evaluates the current state of those policies. Pre-liberalization transmission access and pricing policies are reviewed first since more recent policies have evolved from them. FERC's efforts to ensure that transmission owning utilities provide non-discriminatory access and pricing to wholesale transmission customers, culminating in Order 888 and 889 are discussed. These rules did not respond to problems created by a highly balkanized transmission system and only partially responded to problems caused by common ownership and operation of transmission networks with generating and marketing businesses in the same regions. These problems motivated FERC to seek to create Regional Transmission Organizations (RTO) meeting a long list of criteria related to governance, network operations, transmission pricing and investment as reflected in Order 2000. The slow pace of 'voluntary' reform following Order 2000 led FERC to issue a proposed Standard Market Design Rule (SMD) which provided more detailed prescriptions for wholesale market design, network operations, regional planning, resource adequacy, and transmission investment. The SMD rule confronted enormous resistance from groups of utilities and states that had not embraced an electricity sector liberalization agenda. However, many of the provisions of the SMD are being implemented by the RTOs and ISOs in the Northeast and Midwest. PJM's market rules and transmission pricing, planning and investment policies are reviewed as an articulation of FERC's RTO and SMD visions. (author)

  1. Transmission policy in the United States

    International Nuclear Information System (INIS)

    Joskow, P.L.

    2005-01-01

    This paper provides an overview of the development of electric power transmission access, pricing and investment policies in the US over the last 15 years and evaluates the current state of those policies. Pre-liberalization transmission access and pricing policies are reviewed first since more recent policies have evolved from them. FERC's efforts to ensure that transmission owning utilities provide non-discriminatory access and pricing to wholesale transmission customers, culminating in Order 888 and 889 are discussed. These rules did not respond to problems created by a highly balkanized transmission system and only partially responded to problems caused by common ownership and operation of transmission networks with generating and marketing businesses in the same regions. These problems motivated FERC to seek to create Regional Transmission Organizations (RTO) meeting a long list of criteria related to governance, network operations, transmission pricing and investment as reflected in Order 2000. The slow pace of 'voluntary' reform following Order 2000 led FERC to issue a proposed Standard Market Design Rule (SMD) which provided more detailed prescriptions for wholesale market design, network operations, regional planning, resource adequacy, and transmission investment. The SMD rule confronted enormous resistance from groups of utilities and states that had not embraced an electricity sector liberalization agenda. However, many of the provisions of the SMD are being implemented by the RTOs and ISOs in the Northeast and Midwest. PJM's market rules and transmission pricing, planning and investment policies are reviewed as an articulation of FERC's RTO and SMD visions. (author)

  2. Trends in coordination and transmission service

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Investor-owned utilities increasingly are taking significant advantage of the benefits available from coordination transactions and transmission service. This chapter describes Edison Electric Institute (EEI's) estimate as to the growth in sales-for-resale (including coordination service) over the past two decades. With respect to transmission service, this chapter describes the significant growth in both the level of transmission service and the number of transmission agreements

  3. Macedonian transmission grid capability and development

    International Nuclear Information System (INIS)

    Naumoski, K.; Achkoska, E.; Paunoski, A.

    2015-01-01

    The main task of the transmission grid is to guarantee evacuation of electricity from production facilities and, at the same time, supply the electricity to all customers, in a secure, reliable and qualitative manner. During the last years, transmission grid goes through the period of fast and important development, as a result of implementation of renewable and new technologies and creation of internal European electricity market. Due to these reasons, capacity of the existing grid needs to be upgraded either with optimization of existing infrastructure or constructing the new transmission projects. Among the various solutions for strengthening the grid, the one with the minimal investment expenses for construction is selected. While planning the national transmission grid, MEPSO planners apply multi-scenarios analyses, in order to handle all uncertainties, particularly in the forecasts on loads, production and exchange of electricity, location and size of the new power plants, hydrological conditions, integration of renewable sources and the evolution of the electricity market. Visions for development of European transmission grid are also considered. Special attention in the development plan is paid to modelling of power systems in the region of South-Eastern Europe and covering a wider area of the regional transmission grid with simulations of various market transactions. Macedonian transmission grid is developed to satisfy all requirements for electricity production/supply and transits, irrespective which scenario will be realized on long-term basis. Transmission development plan gives the road map for grid evolution from short-term and mid-term period towards long-term horizons (15-20 years ahead). While creating long-term visions, a big challenge in front of transmission planners is implementation of NPP. The paper gives overview of the planning process of Macedonian transmission grid,comprising: definition of scenarios,planning methodology and assessment of

  4. Plasma HIV Viral Rebound following Protocol-Indicated Cessation of ART Commenced in Primary and Chronic HIV Infection

    DEFF Research Database (Denmark)

    Hamlyn, Elizabeth; Ewings, Fiona M; Porter, Kholoud

    2012-01-01

    OBJECTIVES: The magnitude of HIV viral rebound following ART cessation has consequences for clinical outcome and onward transmission. We compared plasma viral load (pVL) rebound after stopping ART initiated in primary (PHI) and chronic HIV infection (CHI). DESIGN: Two populations with protocol......VL levels, at a median of 50 (95% CI 48-51) weeks after stopping ART. Four weeks after stopping treatment, although the proportion with pVL≥400 copies/ml was similar (78% PHI versus 79% CHI), levels were 0.45 (95% CI 0.26-0.64) log(10) copies/ml lower for PHI versus CHI, and remained lower up to 48 weeks...

  5. Low-current solutions for wireless point-to-point sensor data transmission for long-term applications; Stromsparende Loesungen fuer drahtlose Punkt-zu-Punkt-Sensordatenuebertragung fuer langjaehrigen Betrieb

    Energy Technology Data Exchange (ETDEWEB)

    Milosiu, H. [Fraunhofer-Institut fuer Integrierte Schaltungen IIS, Erlangen (Germany)

    2008-07-01

    Choosing wireless standard such as Bluetooth or Zigbee, the customer can find numerous low-cost chip sets. In particular applications proprietary solutions are superior to wireless standard solutions, especially for transmission of small data amounts from point to point. The complex transmission protocol of a wireless standard forms a inflexible precondition for the user and may exclude the choice of a wireless standard. In addition, a relatively high energy consumption disables battery-operated low-maintenance applications. Fraunhofer Institute for Integrated Circuits IIS in Erlangen now offers a solution to that problem. This article would like to show the benefits of low-current proprietary wireless systems. An implementation of a lowcurrent wireless system using BiCMOS technology for wireless sensor networks is presented. (orig.)

  6. Poverty and price transmission

    DEFF Research Database (Denmark)

    Elleby, Christian

    A key parameter determining the welfare impact from a world market shock is the transmission elasticity which measures the average domestic response to an international price change. Many studies have estimated price transmission elasticities for a large number of countries but the variation in t...

  7. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  8. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  9. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  10. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  11. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  12. Electrical transmission

    Energy Technology Data Exchange (ETDEWEB)

    Sayers, D P

    1960-05-01

    After briefly tracing the history of electricity transmission, trends in high voltage transmission and experiments being conducted on 650 kV are discussed. 5000 miles of the U.K. grid are operated at 132 kV and 1000 at 275 kV, ultimately to provide a super grid at 380 kV. Problems are insulation, radio interference and the cost of underground lines (16 times that of overhead lines). Also considered are the economics of the grid as a means of transporting energy and as a means of spreading the peak load over the power stations in the most efficient manner. Finally, the question of amenities is discussed.

  13. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  14. MEMS-based transmission lines for microwave applications

    Science.gov (United States)

    Wu, Qun; Fu, Jiahui; Gu, Xuemai; Shi, Huajuan; Lee, Jongchul

    2003-04-01

    This paper mainly presents a briefly review for recent progress in MEMS-based transmission lines for use in microwave and millimeterwave range. MEMS-based transmission lines including different transmission line structure such as membrane-supported microstrip line microstrip line, coplanar microshield transmission line, LIGA micromachined planar transmission line, micromachined waveguides and coplanar waveguide are discussed. MEMS-based transmission lines are characterized by low propagation loss, wide operation frequency band, low dispersion and high quality factor, in addition, the fabrication is compatible with traditional processing of integrated circuits (IC"s). The emergence of MEMS-based transmission lines provided a solution for miniaturizing microwave system and monolithic microwave integrated circuits.

  15. CystiSim - An Agent-Based Model for Taenia solium Transmission and Control.

    Science.gov (United States)

    Braae, Uffe Christian; Devleesschauwer, Brecht; Gabriël, Sarah; Dorny, Pierre; Speybroeck, Niko; Magnussen, Pascal; Torgerson, Paul; Johansen, Maria Vang

    2016-12-01

    Taenia solium taeniosis/cysticercosis was declared eradicable by the International Task Force for Disease Eradication in 1993, but remains a neglected zoonosis. To assist in the attempt to regionally eliminate this parasite, we developed cystiSim, an agent-based model for T. solium transmission and control. The model was developed in R and available as an R package (http://cran.r-project.org/package=cystiSim). cystiSim was adapted to an observed setting using field data from Tanzania, but adaptable to other settings if necessary. The model description adheres to the Overview, Design concepts, and Details (ODD) protocol and consists of two entities-pigs and humans. Pigs acquire cysticercosis through the environment or by direct contact with a tapeworm carrier's faeces. Humans acquire taeniosis from slaughtered pigs proportional to their infection intensity. The model allows for evaluation of three interventions measures or combinations hereof: treatment of humans, treatment of pigs, and pig vaccination, and allows for customary coverage and efficacy settings. cystiSim is the first agent-based transmission model for T. solium and suggests that control using a strategy consisting of an intervention only targeting the porcine host is possible, but that coverage and efficacy must be high if elimination is the ultimate goal. Good coverage of the intervention is important, but can be compensated for by including an additional intervention targeting the human host. cystiSim shows that the scenarios combining interventions in both hosts, mass drug administration to humans, and vaccination and treatment of pigs, have a high probability of success if coverage of 75% can be maintained over at least a four year period. In comparison with an existing mathematical model for T. solium transmission, cystiSim also includes parasite maturation, host immunity, and environmental contamination. Adding these biological parameters to the model resulted in new insights in the potential

  16. The unknown risk of vertical transmission in sleeping sickness--a literature review.

    Directory of Open Access Journals (Sweden)

    Andreas K Lindner

    Full Text Available BACKGROUND: Children with human African trypanosomiasis (HAT present with a range of generally non-specific symptoms. Late diagnosis is frequent with often tragic outcomes. Trypanosomes can infect the foetus by crossing the placenta. Unequivocal cases of congenital infection that have been reported include newborn babies of infected mothers who were diagnosed with HAT in the first 5 days of life and children of infected mothers who had never entered an endemic country themselves. METHODS: This review systematically summarizes the literature on the vertical transmission of HAT, to our knowledge for the first time. To approach the broader aspects of the subject, articles considering the epidemiology of childhood HAT and HAT in pregnancy were also included. The HAT guidelines and technical reports of the World Health Organisation, Médecins Sans Frontières, Institut de Recherche pour le Développement, and of one endemic country were reviewed. RESULTS: Publications describing congenital HAT are very limited and consist only of single case reports and small case series. Generally it is assumed to be a rare event, but it has never been systematically investigated. In two publications, it is hypothesized that congenital HAT occurs more often than suspected. Not all guidelines and not all HAT literature mention this transmission route. CONCLUSIONS: The risk of vertical transmission is unknown. Awareness of congenital HAT is insufficient, and as a result opportunities for an early diagnosis in newborns may be missed. All HAT guidelines and local HAT protocols should stress that in endemic areas pregnant women should be systematically checked for HAT and that newborns of HAT infected mothers should be assessed for the disease as soon as possible. Studies on the impact of HAT on fertility and pregnancy and studies on congenital HAT are long overdue.

  17. Value transmissions between parents and children: Gender and developmental phase as transmission belts

    NARCIS (Netherlands)

    Roest, A.M.C.; Dubas, J.S.; Gerris, J.R.M.

    2010-01-01

    This study applied the gender role model of socialization theory. the developmental aging theory, and the topic salience perspective to the investigation of parent-child value transmissions Specifically, we examined whether the bi-directionality and selectivity of value transmissions differed as a

  18. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  19. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  20. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.