WorldWideScience

Sample records for transmission protocol sctp

  1. A transport layer protocol for the future high speed grid computing: SCTP versus fast tcp multihoming

    International Nuclear Information System (INIS)

    Arshad, M.J.; Mian, M.S.

    2010-01-01

    TCP (Transmission Control Protocol) is designed for reliable data transfer on the global Internet today. One of its strong points is its use of flow control algorithm that allows TCP to adjust its congestion window if network congestion is occurred. A number of studies and investigations have confirmed that traditional TCP is not suitable for each and every type of application, for example, bulk data transfer over high speed long distance networks. TCP sustained the time of low-capacity and short-delay networks, however, for numerous factors it cannot be capable to efficiently deal with today's growing technologies (such as wide area Grid computing and optical-fiber networks). This research work surveys the congestion control mechanism of transport protocols, and addresses the different issues involved for transferring the huge data over the future high speed Grid computing and optical-fiber networks. This work also presents the simulations to compare the performance of FAST TCP multihoming with SCTP (Stream Control Transmission Protocol) multihoming in high speed networks. These simulation results show that FAST TCP multihoming achieves bandwidth aggregation efficiently and outperforms SCTP multihoming under a similar network conditions. The survey and simulation results presented in this work reveal that multihoming support into FAST TCP does provide a lot of benefits like redundancy, load-sharing and policy-based routing, which largely improves the whole performance of a network and can meet the increasing demand of the future high-speed network infrastructures (such as in Grid computing). (author)

  2. Network protocol changes can improve DisCom WAN performance : evaluating TCP modifications and SCTP in the ASC tri-lab environment.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Hu, Tan Chang

    2005-06-01

    The Advanced Simulation and Computing (ASC) Distance Computing (DisCom) Wide Area Network (WAN) is a high performance, long distance network environment that is based on the ubiquitous TCP/IP protocol set. However, the Transmission Control Protocol (TCP) and the algorithms that govern its operation were defined almost two decades ago for a network environment vastly different from the DisCom WAN. In this paper we explore and evaluate possible modifications to TCP that purport to improve TCP performance in environments like the DisCom WAN. We also examine a much newer protocol, SCTP (Stream Control Transmission Protocol) that claims to provide reliable network transport while also implementing multi-streaming, multi-homing capabilities that are appealing in the DisCom high performance network environment. We provide performance comparisons and recommendations for continued development that will lead to network communications protocol implementations capable of supporting the coming ASC Petaflop computing environments.

  3. Analisis Pengaruh Ukuran Window Pada Pengendali Kemacetan di SCTP Menggunakan Fitur Multihoming

    Directory of Open Access Journals (Sweden)

    Agus Halid

    2015-07-01

    Abstract  Stream Control Transmission Protocol (SCTP is a protocol that is similar to the Transmission Control Protocol (TCP and User Datagram Protocol (UDP. SCTP is a protocol that is both reliable and connectionless. This protocol has the ability multistreaming and multihoming in the transmit data. This research is the modeling of the SCTP using OPNET simulator that can be accelerated for researchers in the field of networking. SCTP on the simulator was built to perform modifications to TCP. Modeling starts with building a network scenarios and determine the bandwidth on the path that will be passed by data packets. Modification of window size in this research using 1 MMS, 2 MMS up to 10 MMS on congestion control. The aim is to disclose the effect of modification of the window size to the value packet loss, delay and throughput. The measurement results show that the throughput rate is highest in the Second Scenario as shown in Table 6.4 with throughput value of 433.566,0244 bits/s. Using window size in congestion control is intended to prevent a flood of data on the endpoint that can lead to packet loss.   Keywords—Congestion control, throughput, delay, packet loss, window size, multihoming, SCTP

  4. Stream Control Transmission Protocol as a Transport for SIP: a case study

    Directory of Open Access Journals (Sweden)

    Giuseppe De Marco

    2004-06-01

    Full Text Available The dominant signalling protocol both in future wireless and wired networks will be the Session Initiation Protocol (SIP, as pointed out in the 3G IP-based mobile networks specifications, entailing a fully Internet integrated network. The use of SIP in the IP Multimedia Subsytem (IMS of Release 5 involves the development of servers capable to handle a large number of call requests. The signaling traffic associated to such requests could explode, if an intelligent congestion control were not introduced. Stream Control Transmission Protocol (SCTP was born to support transport of SS7 signaling messages. However, many of the SCTP features are also useful for transport of SIP messages, as: congestion control mechanism, good separation among independent messages, multihoming. Indeed, adoption of SCTP as transport of SIP signaling might prove useful in some situations where usual transport protocols, like TCP and UDP, suffer performance degradation. In this paper, we analyse the general framework wherein SIP operates and we discuss the benefits of using SCTP as a transport for SIP, toward fair sharing of network resources. This study is carried on in the context of the implementation of an high-performance SIP Proxy Server. We also present some preliminar results of an implementation of SIP over SCTP/UDP in a real LAN environment.

  5. Analysis of Retransmission Policies for Parallel Data Transmission

    Directory of Open Access Journals (Sweden)

    I. A. Halepoto

    2018-06-01

    Full Text Available Stream control transmission protocol (SCTP is a transport layer protocol, which is efficient, reliable, and connection-oriented as compared to transmission control protocol (TCP and user datagram protocol (UDP. Additionally, SCTP has more innovative features like multihoming, multistreaming and unordered delivery. With multihoming, SCTP establishes multiple paths between a sender and receiver. However, it only uses the primary path for data transmission and the secondary path (or paths for fault tolerance. Concurrent multipath transfer extension of SCTP (CMT-SCTP allows a sender to transmit data in parallel over multiple paths, which increases the overall transmission throughput. Parallel data transmission is beneficial for higher data rates. Parallel transmission or connection is also good in services such as video streaming where if one connection is occupied with errors the transmission continues on alternate links. With parallel transmission, the unordered data packets arrival is very common at receiver. The receiver has to wait until the missing data packets arrive, causing performance degradation while using CMT-SCTP. In order to reduce the transmission delay at the receiver, CMT-SCTP uses intelligent retransmission polices to immediately retransmit the missing packets. The retransmission policies used by CMT-SCTP are RTX-SSTHRESH, RTX-LOSSRATE and RTX-CWND. The main objective of this paper is the performance analysis of the retransmission policies. This paper evaluates RTX-SSTHRESH, RTX-LOSSRATE and RTX-CWND. Simulations are performed on the Network Simulator 2. In the simulations with various scenarios and parameters, it is observed that the RTX-LOSSRATE is a suitable policy.

  6. Analisis Kualitas VoIP pada SCTP Menggunakan ECN dan AQM

    Directory of Open Access Journals (Sweden)

    La Surimi

    2015-07-01

    Abstract VoIP is the real time applications that are highly dependent on the quality of  delay and jitter, which it is difficult to be met by protocol that has reliable data transfer feature and  congestion control such as TCP. On the other hand the use of UDP that has no congestion control make chance of causing congestion in the network is very large. The use of SCTP as an alternative protocol was also not able to accommodate the weaknesses of TCP and UDP. Some research shows that repairs or modifications to the SCTP congestion control mechanism is needed. The Use of ECN and AQM in some studies show that these two mechanisms can reduce delay and jitter. This study tested the quality of VoIP over SCTP with ECN and AVQ, in NS2. Simulations carried out by independent replication technique, and the results showed that ECN and AVQ can increase the value of MOS VoIP calls significantly in non ideal network scenarios. This study also did comparison of SCTP MOS that uses ECN and AVQ with MOS values VoIP using TCP and UDP. The result showed that SCTP with ECN and AVQ outperform TCP but can not surpass UDP yet.   Keywords— VoIP, SCTP, ECN, AQM,AVQ.

  7. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  8. Analysis of SCTP and TCP based communication in high-speed clusters

    International Nuclear Information System (INIS)

    Kozlovszky, M.; Berceli, T.; Kutor, L.

    2006-01-01

    Performance and financial constraints are pushing modern DAQs (Data Acquisition Systems) to use distributed cluster environments instead of monolith one-box systems. Inside clusters application communication layers should support outstanding high performance requirements. We are currently investigating different network protocols that could meet the requirements of high speed/low latency peer-to-peer communication within DAQ clusters. We have carried out various performance measurements with TCP and SCTP over Fast and Gigabit Ethernet. We are focusing on Ethernet Technologies, because this transport medium is broad deployed, cost efficient and it has much better cost/throughput ratio than other available communication alternatives (e.g.: Myrinet, Infiniband). During this study, a protocol performance measurement application with different peer transport components has been developed. In the first part of the paper, we give a short comparison of the two protocols (SCTP and TCP), and an introduction of the transport layer structure developed. Later on we discuss the performance results of single/multi-stream peer-to-peer communication, give overview about application code transition possibilities from application developer point of view between the two protocols, and draw conclusions about usability

  9. Consistent Steering System using SCTP for Bluetooth Scatternet Sensor Network

    Science.gov (United States)

    Dhaya, R.; Sadasivam, V.; Kanthavel, R.

    2012-12-01

    Wireless communication is the best way to convey information from source to destination with flexibility and mobility and Bluetooth is the wireless technology suitable for short distance. On the other hand a wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Using Bluetooth piconet wireless technique in sensor nodes creates limitation in network depth and placement. The introduction of Scatternet solves the network restrictions with lack of reliability in data transmission. When the depth of the network increases, it results in more difficulties in routing. No authors so far focused on the reliability factors of Scatternet sensor network's routing. This paper illustrates the proposed system architecture and routing mechanism to increase the reliability. The another objective is to use reliable transport protocol that uses the multi-homing concept and supports multiple streams to prevent head-of-line blocking. The results show that the Scatternet sensor network has lower packet loss even in the congestive environment than the existing system suitable for all surveillance applications.

  10. Data transmission protocol for Pi-of-the-Sky cameras

    Science.gov (United States)

    Uzycki, J.; Kasprowicz, G.; Mankiewicz, M.; Nawrocki, K.; Sitek, P.; Sokolowski, M.; Sulej, R.; Tlaczala, W.

    2006-10-01

    The large amount of data collected by the automatic astronomical cameras has to be transferred to the fast computers in a reliable way. The method chosen should ensure data streaming in both directions but in nonsymmetrical way. The Ethernet interface is very good choice because of its popularity and proven performance. However it requires TCP/IP stack implementation in devices like cameras for full compliance with existing network and operating systems. This paper describes NUDP protocol, which was made as supplement to standard UDP protocol and can be used as a simple-network protocol. The NUDP does not need TCP protocol implementation and makes it possible to run the Ethernet network with simple devices based on microcontroller and/or FPGA chips. The data transmission idea was created especially for the "Pi of the Sky" project.

  11. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  12. Implementing the GBT data transmission protocol in FPGAs

    CERN Document Server

    Baron, S; Marin, F; Moreira, P; Soos, C

    2009-01-01

    The GBT chip [1] is a radiation tolerant ASIC that can be used to implement bidirectional multipurpose 4.8Gb/s optical links for high-energy physics experiments. It will be proposed to the LHC experiments for combined transmission of physics data, trigger, timing, fast and slow control and monitoring. Although radiation hardness is required on detectors, it is not necessary for the electronics located in the counting rooms, where the GBT functionality can be realized using Commercial Off-The-Shelf (COTS) components. This paper describes efficient physical implementation of the GBT protocol achieved for FPGA devices on Altera and Xilinx devices with source codes developed in Verilog and VHDL. The current platforms are based on Altera StratixIIGX and Xilinx Virtex5.

  13. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  14. Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks

    CSIR Research Space (South Africa)

    Mkuzangwe, NNP

    2015-08-01

    Full Text Available This work implements two anomaly detection algorithms for detecting Transmission Control Protocol Synchronized (TCP SYN) flooding attack. The two algorithms are an adaptive threshold algorithm and a cumulative sum (CUSUM) based algorithm...

  15. Analysis of transmission speed of AX.25 Protocol implemented in satellital earth station UPTC

    Directory of Open Access Journals (Sweden)

    Oscar Fernando Vera Cely

    2015-11-01

    Full Text Available One of the important parameters for the proper functioning of satellital ground station projected on Pedagogical and Technological University of Colombia (UPTC is the efficiency in transmission speed on communications protocol. This paper shows the results of analysis of the transmission speed of the AX.25 protocol implemented in the communication system of the satellital ground station UPTC. It begins with a brief description of the implemented hardware; the behavior of the transmission rate is evaluated using a theoretical analysis based on equations to estimate this parameter in the operation of the protocol, then tests are performed using the hardware that the satellital ground station UPTC has and finally, the conclusions are presented. Based on comparison of the theoretical analysis results obtained experimentally, it became apparent that AX.25 protocol efficiency is higher when increasing the number of frames.

  16. L2-LBMT: A Layered Load Balance Routing Protocol for underwater multimedia data transmission

    Science.gov (United States)

    Lv, Ze; Tang, Ruichun; Tao, Ye; Sun, Xin; Xu, Xiaowei

    2017-12-01

    Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network (UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol (L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer (SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado (3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.

  17. Evaluation of video transmission of MAC protocols in wireless sensor network

    Science.gov (United States)

    Maulidin, Mahmuddin, M.; Kamaruddin, L. M.; Elsaikh, Mohamed

    2016-08-01

    Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmission is one of the important applications for the future that can be transmitted with low aspect in side of cost and also power consumption. In this paper, comparison of five different MAC WSN protocol for video transmission namely IEEE 802.11 standard, IEEE 802.15.4 standard, CSMA/CA, Berkeley-MAC, and Lightweight-MAC protocol are studied. Simulation experiment has been conducted in OMNeT++ with INET network simulator software to evaluate the performance. Obtained results indicate that IEEE 802.11 works better than other protocol in term of packet delivery, throughput, and latency.

  18. An adaptive transmission protocol for managing dynamic shared states in collaborative surgical simulation.

    Science.gov (United States)

    Qin, J; Choi, K S; Ho, Simon S M; Heng, P A

    2008-01-01

    A force prediction algorithm is proposed to facilitate virtual-reality (VR) based collaborative surgical simulation by reducing the effect of network latencies. State regeneration is used to correct the estimated prediction. This algorithm is incorporated into an adaptive transmission protocol in which auxiliary features such as view synchronization and coupling control are equipped to ensure the system consistency. We implemented this protocol using multi-threaded technique on a cluster-based network architecture.

  19. An improved IEEE 802.11 protocol for reliable data transmission in power distribution fault diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)

    2010-10-15

    In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.

  20. A Comparative Analysis of Transmission Control Protocol Improvement Techniques over Space-Based Transmission Media

    National Research Council Canada - National Science Library

    Lawson, Joseph M

    2006-01-01

    ... justification for the implementation of a given enhancement technique. The research questions were answered through model and simulation of a satellite transmission system via a Linux-based network topology...

  1. Protocol: Transmission and prevention of influenza in Hutterites: Zoonotic transmission of influenza A: swine & swine workers

    Directory of Open Access Journals (Sweden)

    Loeb Mark

    2009-11-01

    Full Text Available Abstract Background Among swine, reassortment of influenza virus genes from birds, pigs, and humans could generate influenza viruses with pandemic potential. Humans with acute infection might also be a source of infection for swine production units. This article describes the study design and methods being used to assess influenza A transmission between swine workers and pigs. We hypothesize that transmission of swine influenza viruses to humans, transmission of human influenza viruses to swine, and reassortment of human and swine influenza A viruses is occurring. The project is part of a Team Grant; all Team Grant studies include active surveillance for influenza among Hutterite swine farmers in Alberta, Canada. This project also includes non-Hutterite swine farms that are experiencing swine respiratory illness. Methods/Design Nurses conduct active surveillance for influenza-like-illness (ILI, visiting participating communally owned and operated Hutterite swine farms twice weekly. Nasopharyngeal swabs and acute and convalescent sera are obtained from persons with any two such symptoms. Swabs are tested for influenza A and B by a real time RT-PCR (reverse transcriptase polymerase chain reaction at the Alberta Provincial Laboratory for Public Health (ProvLab. Test-positive participants are advised that they have influenza. The occurrence of test-positive swine workers triggers sampling (swabbing, acute and convalescent serology of the swine herd by veterinarians. Specimens obtained from swine are couriered to St. Jude Children's Research Hospital, Memphis, TN for testing. Veterinarians and herd owners are notified if animal specimens are test-positive for influenza. If swine ILI occurs, veterinarians obtain samples from the pigs; test-positives from the animals trigger nurses to obtain specimens (swabbing, acute and convalescent serology from the swine workers. ProvLab cultures influenza virus from human specimens, freezes these cultures and

  2. A reliable transmission protocol for ZigBee-based wireless patient monitoring.

    Science.gov (United States)

    Chen, Shyr-Kuen; Kao, Tsair; Chan, Chia-Tai; Huang, Chih-Ning; Chiang, Chih-Yen; Lai, Chin-Yu; Tung, Tse-Hua; Wang, Pi-Chung

    2012-01-01

    Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking. These systems use wireless technologies to transmit vital signs for medical evaluation. In a multihop ZigBee network, the existing systems usually use broadcast or multicast schemes to increase the reliability of signals transmission; however, both the schemes lead to significantly higher network traffic and end-to-end transmission delay. In this paper, we present a reliable transmission protocol based on anycast routing for wireless patient monitoring. Our scheme automatically selects the closest data receiver in an anycast group as a destination to reduce the transmission latency as well as the control overhead. The new protocol also shortens the latency of path recovery by initiating route recovery from the intermediate routers of the original path. On the basis of a reliable transmission scheme, we implement a ZigBee device for fall monitoring, which integrates fall detection, indoor positioning, and ECG monitoring. When the triaxial accelerometer of the device detects a fall, the current position of the patient is transmitted to an emergency center through a ZigBee network. In order to clarify the situation of the fallen patient, 4-s ECG signals are also transmitted. Our transmission scheme ensures the successful transmission of these critical messages. The experimental results show that our scheme is fast and reliable. We also demonstrate that our devices can seamlessly integrate with the next generation technology of wireless wide area network, worldwide interoperability for microwave access, to achieve real-time patient monitoring.

  3. Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhu Han

    2009-01-01

    Full Text Available Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks, forms virtual MIMO system, and provides diversity gains. In this paper, wireless video transmission protocols are proposed, in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination, and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation, configuration of side information, subject to bandwidth and power constraints. For multiuser cases, most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition, it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.

  4. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    Science.gov (United States)

    Townsend, Ben; Abawajy, Jemal; Kim, Tai-Hoon

    2011-01-01

    People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors. PMID:22163845

  5. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    Directory of Open Access Journals (Sweden)

    Tai-Hoon Kim

    2011-04-01

    Full Text Available People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors.

  6. Correct mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme on ping-pong protocol

    OpenAIRE

    Zhang, Zhanjun

    2004-01-01

    Comment: The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected

  7. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-07-01

    Full Text Available Information technology (IT security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

  8. Policies and protocols for preventing transmission of HIV infection in oral health care in South Africa.

    Science.gov (United States)

    Ogunbodede, E O; Rudolph, M J

    2002-12-01

    Human immunodeficiency virus (HIV) infection constitutes an unparalleled public health challenge. The unique nature of most oral health procedures, instrumentation and patient-care settings requires specific strategies and protocols aimed at preventing the transmission of HIV/AIDS between oral health care providers and patients, as well as between patients themselves. The present study investigated the level of information and training about protocols and policies for preventing the transmission of HIV/AIDS in oral health care settings in South Africa. The data collection techniques utilised available information, in-depth interviews and an open-ended questionnaire. The respondents were 20 purposively selected key informants who were senior officers for HIV/AIDS programmes and/or oral health organisations. Sixteen (80%) of the respondents reported that there were no existing oral health policies on HIV/AIDS in their health care institutions or organisations. None of the interviewees knew of any specific protocols on HIV/AIDS in the oral health care setting that emanated from South Africa. In addition, none of the dental professional associations had established an infection control committee or a support system for members who might become infected with HIV and develop AIDS. Territorial boundaries existed between sectors within the medical disciplines, as well as between the medical and oral health disciplines. Numerous general impediments were identified, such as prejudice, denial and fear, inadequate training and/or information about the infection, lack of representation and resources for policy planning, a lack of interest from the business sector, and approaching HIV/AIDS in the workplace as a 'one-time issue' Other obstacles identified included unemployment, poverty, illiteracy, disempowerment of women and inadequate communication of policies to service providers. Additional issues raised included the migrant labour systeM, complexities of language and culture

  9. HISTOPATHOLOGICAL AND CYTOLOGICAL ANALYSIS OF TRANSMISSIBLE VENEREAL TUMOR IN DOGS AFTER TWO TREATMENT PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Fabiana Aguena Sales Lapa

    2012-06-01

    Full Text Available The transmissible venereal tumor (TVT is a contagious neoplasm of round cells that frequently affect dogs. The treatment consists of chemotherapy being more effective the vincristine alone, however the resistance emergence to this agent due multidrug resistance of the P-glycoprotein (P-gp, a transporter protein encoded by the MDR1 gene, has been taking the association with other drugs. Recent studies demonstrated the antitumoral effect of the avermectins when associated to the vincristine in the treatment of some neoplasms. Therefore, the objective of the present study was to compare the effectiveness of standard treatment of TVT with vincristine only when compared to combined treatment with vincristine and ivermectin, evaluated through number of applications of the two protocols, histopathological and cytological analysis from 50 dogs diagnosed with TVT during the period of 2007 to 2010. The combined protocol significant reduced the number of applications and cytological and histopathological findings collaborate with the hypothesis that the combination of vincristine and ivermectin promotes faster healing than the use of vincristine alone. Combination treatment with vincristine and ivermectin could be in the future an excellent therapeutic alternative for the treatment of TVT for probably reducing the resistance to vincristine, simultaneously reducing the cost of TVT treatment and promoting a faster recovery of the dog.

  10. The transmission protocols of gender as female submission device to marital violence

    Directory of Open Access Journals (Sweden)

    Maria Fátima Scaffo

    2011-12-01

    Full Text Available This article examines the way in which women historically respond , in the familiar scenario, to marital violence. In principle, the snip, adopted as an object of study and analysis, consists of a typical mode of violence to the woman filed in the context of the cogs which  configure  the encounter between men and women. It points out the factors enhanced in this  meeting  which produce violence, exploring the  the possibility to reflect on aspects of the masculine condition or in ghosts   of the feminine universe. Considering the gender issue,    the following question is raised: Is the position of women  constructed based on educational principles  which determine  a particular type of role to  them or are there  other determinants? The analysis and discussion of this theme will be carried out considering the generational transmission of norms of gender-protocols from mother to daughter as well as  the constant reissue, in an unreflective manner, , that has been constituted as formative  roots of the   women’s behavior and which are part of the dynamics of the feminine in gender relations, in which the woman occupies a historically subordinate plan. Probably the condition of inferiority reflects  the transmission, from mother to daughter, of stereotyped patterns culturally assigned to women and that are accepted and replicated, almost automatically, in the scenario of marital relations.

  11. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  12. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  13. The Achilles' heel of prevention to mother-to-child transmission of HIV: Protocol implementation, uptake, and sustainability.

    Science.gov (United States)

    Rodriguez, Violeta J; LaCabe, Richard P; Privette, C Kyle; Douglass, K Marie; Peltzer, Karl; Matseke, Gladys; Mathebula, Audrey; Ramlagan, Shandir; Sifunda, Sibusiso; Prado, Guillermo Willy; Horigian, Viviana; Weiss, Stephen M; Jones, Deborah L

    2017-12-01

    The Joint United Nations Programme on HIV and AIDS proposed to reduce the vertical transmission of HIV from ∼72,200 to ∼8300 newly infected children by 2015 in South Africa (SA). However, cultural, infrastructural, and socio-economic barriers hinder the implementation of the prevention of mother-to-child transmission (PMTCT) protocol, and research on potential solutions to address these barriers in rural areas is particularly limited. This study sought to identify challenges and solutions to the implementation, uptake, and sustainability of the PMTCT protocol in rural SA. Forty-eight qualitative interviews, 12 focus groups discussions (n = 75), and one two-day workshop (n = 32 participants) were conducted with district directors, clinic leaders, staff, and patients from 12 rural clinics. The delivery and uptake of the PMTCT protocol was evaluated using the Consolidated Framework for Implementation Research (CFIR); 15 themes associated with challenges and solutions emerged. Intervention characteristics themes included PMTCT training and HIV serostatus disclosure. Outer-setting themes included facility space, health record management, and staff shortage; inner-setting themes included supply use and availability, staff-patient relationship, and transportation and scheduling. Themes related to characteristics of individuals included staff relationships, initial antenatal care visit, adherence, and culture and stigma. Implementation process themes included patient education, test results delivery, and male involvement. Significant gaps in care were identified in rural areas. Information obtained from participants using the CFIR framework provided valuable insights into solutions to barriers to PMTCT implementation. Continuously assessing and correcting PMTCT protocol implementation, uptake and sustainability appear merited to maximize HIV prevention.

  14. The Achilles’ heel of prevention to mother-to-child transmission of HIV: Protocol implementation, uptake, and sustainability

    Science.gov (United States)

    Rodriguez, Violeta J.; LaCabe, Richard P.; Privette, C. Kyle; Douglass, K. Marie; Peltzer, Karl; Matseke, Gladys; Mathebula, Audrey; Ramlagan, Shandir; Sifunda, Sibusiso; Prado, Guillermo “Willy”; Horigian, Viviana; Weiss, Stephen M.; Jones, Deborah L.

    2017-01-01

    Abstract The Joint United Nations Programme on HIV and AIDS proposed to reduce the vertical transmission of HIV from ∼72,200 to ∼8300 newly infected children by 2015 in South Africa (SA). However, cultural, infrastructural, and socio-economic barriers hinder the implementation of the prevention of mother-to-child transmission (PMTCT) protocol, and research on potential solutions to address these barriers in rural areas is particularly limited. This study sought to identify challenges and solutions to the implementation, uptake, and sustainability of the PMTCT protocol in rural SA. Forty-eight qualitative interviews, 12 focus groups discussions (n = 75), and one two-day workshop (n = 32 participants) were conducted with district directors, clinic leaders, staff, and patients from 12 rural clinics. The delivery and uptake of the PMTCT protocol was evaluated using the Consolidated Framework for Implementation Research (CFIR); 15 themes associated with challenges and solutions emerged. Intervention characteristics themes included PMTCT training and HIV serostatus disclosure. Outer-setting themes included facility space, health record management, and staff shortage; inner-setting themes included supply use and availability, staff–patient relationship, and transportation and scheduling. Themes related to characteristics of individuals included staff relationships, initial antenatal care visit, adherence, and culture and stigma. Implementation process themes included patient education, test results delivery, and male involvement. Significant gaps in care were identified in rural areas. Information obtained from participants using the CFIR framework provided valuable insights into solutions to barriers to PMTCT implementation. Continuously assessing and correcting PMTCT protocol implementation, uptake and sustainability appear merited to maximize HIV prevention. PMID:28922974

  15. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

    OpenAIRE

    Townsend, Ben; Abawajy, Jemal; Kim, Tai-Hoon

    2011-01-01

    People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase...

  16. Surgical protocol for confirmed or suspected cases of Ebola and other highly transmissible diseases.

    Science.gov (United States)

    Badia, Josep M; Rubio-Pérez, Inés; Arias Díaz, Javier; Guirao Garriga, Xavier; Serrablo, Alejandro; Jover Navalón, José M

    2016-01-01

    Outbreaks of viral haemorrhagic fevers such as Ebola can lead to imported cases in Europe and America. The eventuality of surgery in the setting of Ebola Virus Disease (EVD) is low, but the Spanish Association of Surgeons elaborated a surgical protocol for EVD. Elective surgical procedures are not indicated. Emergency cases can be considered in: persons under investigation, possible cases and early confirmed cases. In some conditions usually treated by surgery a medical treatment can be tested. All cases must be treated in high technology hospitals. These hospitals must be equipped with adequate means for healthcare provider's protection. All members of the healthcare team should practice thorough simulation prior to caring for a possible Ebola patient. This protocol is based on international guidelines on use of Personal Protective Equipment, protocols of other scientific societies, and specific recommendations for the operating room environment. Copyright © 2015 AEC. Publicado por Elsevier España, S.L.U. All rights reserved.

  17. Improvement The Transmission Efficiency For Wireless Packet Communication Systems Using Automatic Control for power And Time Slot Width Of Slotted Non persistent ISMA Protocol

    Directory of Open Access Journals (Sweden)

    Saad M. Hardan

    2013-05-01

    Full Text Available In packed communication systems which use a protocol, the protocol should perform the allocation of channels such that the transmission channel is used efficiently. Efficiency is usually measured in terms of channel throughput and the average transmission  delay. The Slotted Nonpersistent ISMA protocol is one of random access protocols used in packed communication systems. In this research a Slotted Nonpersistent ISMA protocol Model with automatic control for power and time slot is proposed. the suggested algorithm enable the base station(access point to control  the protocol time slot length and  transmission power in a dynamic way to control the normalized propagation delay d and to maintain all the uplink signals in the limit of captured power threshold (capture ratio in order to control the  throughput and the average transmission delay of the communication system by an automatic method. the computer simulation results  confirm the activity of the  proposed algorithm for increasing the  throughput and decreasing the average transmission delay by an accepted ratios.

  18. Optimizing the ASC WAN: evaluating network performance tools for comparing transport protocols.

    Energy Technology Data Exchange (ETDEWEB)

    Lydick, Christopher L.

    2007-07-01

    The Advanced Simulation & Computing Wide Area Network (ASC WAN), which is a high delay-bandwidth network connection between US Department of Energy National Laboratories, is constantly being examined and evaluated for efficiency. One of the current transport-layer protocols which is used, TCP, was developed for traffic demands which are different from that on the ASC WAN. The Stream Control Transport Protocol (SCTP), on the other hand, has shown characteristics which make it more appealing to networks such as these. Most important, before considering a replacement for TCP on any network, a testing tool that performs well against certain criteria needs to be found. In order to try to find such a tool, two popular networking tools (Netperf v.2.4.3 & v.2.4.6 (OpenSS7 STREAMS), and Iperf v.2.0.6) were tested. These tools implement both TCP and SCTP and were evaluated using four metrics: (1) How effectively can the tool reach a throughput near the bandwidth? (2) How much of the CPU does the tool utilize during operation? (3) Is the tool freely and widely available? And, (4) Is the tool actively developed? Following the analysis of those tools, this paper goes further into explaining some recommendations and ideas for future work.

  19. Improving a mother to child HIV transmission programme through health system redesign: quality improvement, protocol adjustment and resource addition.

    Directory of Open Access Journals (Sweden)

    Michele S Youngleson

    2010-11-01

    Full Text Available Health systems that deliver prevention of mother to child transmission (PMTCT services in low and middle income countries continue to underperform, resulting in thousands of unnecessary HIV infections of newborns each year. We used a combination of approaches to health systems strengthening to reduce transmission of HIV from mother to infant in a multi-facility public health system in South Africa.All primary care sites and specialized birthing centers in a resource constrained sub-district of Cape Metro District, South Africa, were enrolled in a quality improvement (QI programme. All pregnant women receiving antenatal, intrapartum and postnatal infant care in the sub-district between January 2006 and March 2009 were included in the intervention that had a prototype-innovation phase and a rapid spread phase. System changes were introduced to help frontline healthcare workers to identify and improve performance gaps at each step of the PMTCT pathway. Improvement was facilitated and spread through the use of a Breakthrough Series Collaborative that accelerated learning and the spread of successful changes. Protocol changes and additional resources were introduced by provincial and municipal government. The proportion of HIV-exposed infants testing positive declined from 7.6% to 5%. Key intermediate PMTCT processes improved (antenatal AZT increased from 74% to 86%, PMTCT clients on HAART at the time of labour increased from 10% to 25%, intrapartum AZT increased from 43% to 84%, and postnatal HIV testing from 79% to 95% compared to baseline.System improvement methods, protocol changes and addition/reallocation of resources contributed to improved PMTCT processes and outcomes in a resource constrained setting. The intervention requires a clear design, leadership buy-in, building local capacity to use systems improvement methods, and a reliable data system. A systems improvement approach offers a much needed approach to rapidly improve under

  20. A prospective cohort study to evaluate peridomestic infection as a determinant of dengue transmission: Protocol

    Directory of Open Access Journals (Sweden)

    Martínez-Vega Ruth

    2012-04-01

    Full Text Available Abstract Background Vector control programs, which have focused mainly on the patient house and peridomestic areas around dengue cases, have not produced the expected impact on transmission. This project will evaluate the assumption that the endemic/epidemic transmission of dengue begins around peridomestic vicinities of the primary cases. Its objective is to assess the relationship between symptomatic dengue case exposure and peridomestic infection incidence. Methods/Design A prospective cohort study will be conducted (in Tepalcingo and Axochiapan, in the state of Morelos, Mexico, using the state surveillance system for the detection of incident cases. Paired blood specimens will be collected from both the individuals who live with the incident cases and a sample of subjects residing within a 25-meter radius of such cases (exposed cohort, in order to measure dengue-specific antibodies. Other subjects will be selected from areas which have not presented any incident cases within 200 meters, during the two months preceding the sampling (non-exposed cohort. Symptomatic/asymptomatic incident infection will be considered as the dependent variable, exposure to confirmed dengue cases, as the principal variable, and the socio-demographic, environmental and socio-cultural conditions of the subjects, as additional explanatory variables. Discussion Results indicating a high infection rate among the exposed subjects would justify the application of peridomestic control measures and call for an evaluation of alternate causes for insufficient program impact. On the other hand, a low incidence of peridomestic-infected subjects would support the hypothesis that infection occurs outside the domicile, and would thus explain why the vector control measures applied in the past have exerted such a limited impact on cases incidence rates. The results of the present study may therefore serve to reassess site selection for interventions of this type.

  1. Congenital transmission of Trypanosoma cruzi in Argentina, Honduras, and Mexico: study protocol

    Science.gov (United States)

    2013-01-01

    Background Trypanosoma cruzi has been divided into Discrete Typing Units I and non-I (II-VI). T. cruzi I is predominant in Mexico and Central America, while non-I is predominant in most of South America, including Argentina. Little is known about congenital transmission of T. cruzi I. The specific aim of this study is to determine the rate of congenital transmission of T. cruzi I compared to non-I. Methods/design We are conducting a prospective study to enroll at delivery, 10,000 women in Argentina, 7,500 women in Honduras, and 13,000 women in Mexico. We are measuring transmitted maternal T. cruzi antibodies by performing two rapid tests in cord blood (Stat-Pak, Chembio, Medford, New York, and Trypanosoma Detect, InBios, Seattle, Washington). If at least one of the results is positive, we are identifying infants who are congenitally infected by performing parasitological examinations on cord blood and at 4–8 weeks, and serological follow-up at 10 months. Serological confirmation by ELISA (Wiener, Rosario, Argentina) is performed in cord and maternal blood, and at 10 months. We also are performing T. cruzi standard PCR, real-time quantitative PCR and genotyping on maternal venous blood and on cord blood, and serological examinations on siblings. Data are managed by a Data Center in Montevideo, Uruguay. Data are entered online at the sites in an OpenClinica data management system, and digital pictures of data forms are sent to the Data Center for quality control. Weekly reports allow for rapid feedback to the sites. Trial registration Observational study with ClinicalTrials.gov Identifier NCT01787968 PMID:24119247

  2. Interventions for preventing mother-to-child HIV transmission: protocol of an overview of systematic reviews.

    Science.gov (United States)

    Wariki, Windy Mariane Virenia; Ota, Erika; Mori, Rintaro; Wiysonge, Charles S; Horvath, Hacsi; Read, Jennifer S

    2017-06-21

    Various interventions to prevent mother-to-child-transmission (MTCT) of HIV have been investigated and implemented. A number of systematic reviews assessing the efficacy of interventions for the prevention of MTCT of HIV reported antiretroviral prophylaxis, caesarean section before labour and before ruptured membranes, and complete avoidance of breastfeeding were efficacious for preventing MTCT of HIV. Recent WHO guidelines recommend lifelong antiretroviral therapy for all pregnant women for treatment of the woman's own HIV infection and for prevention of MTCT of HIV. Therefore, the objective of this overview is to evaluate the currently available systematic reviews of interventions for preventing MTCT of HIV, and to identify the current best evidence-based interventions for reducing the risk of MTCT of HIV. We will include only peer-reviewed systematic reviews of randomised or quasi-randomised controlled trials assessing the effects of interventions for preventing MTCT of HIV that target both HIV-infected women and children aged 2 years and younger born to HIV-infected women. We will search the Cochrane Database of Systematic Reviews, the Database of Abstracts of Reviews of Effectiveness, Ovid MEDLINE and EMBASE. We will assess review eligibility, the methodological quality of included systematic reviews using A Measurement Tool to Assess The Systematic Reviews and will extract data, comparing our results and resolving discrepancies by consensus. Finally, we will independently assess the certainty of the evidence using Grades of Recommendation, Assessment, Development and Evaluation. Ethics approval is not required. We will publish the results in a peer-reviewed journal and present at conferences, which will inform future research and will be useful for healthcare managers, administrators and policymakers to guide resource allocation decisions and optimisation of interventions to prevent the MTCT of HIV. © Article author(s) (or their employer(s) unless

  3. Exploring the potential of expatriate social networks to reduce HIV and STI transmission: a protocol for a qualitative study.

    Science.gov (United States)

    Crawford, Gemma; Bowser, Nicole Jasmine; Brown, Graham Ernest; Maycock, Bruce Richard

    2013-01-01

    HIV diagnoses acquired among Australian men working or travelling overseas including  Southeast Asia are increasing. This change within transmission dynamics means traditional approaches to prevention need to be considered in new contexts. The significance and role of social networks in mediating sexual risk behaviours may be influential. Greater understanding of expatriate and traveller behaviour is required to understand how local relationships are formed, how individuals enter and are socialised into networks, and how these networks may affect sexual intentions and behaviours. This paper describes the development of a qualitative protocol to investigate how social networks of Australian expatriates and long-term travellers might support interventions to reduce transmission of HIV and sexually transmitted infections. To explore the interactions of male expatriates and long-term travellers within and between their environments, symbolic interactionism will be the theoretical framework used. Grounded theory methods provide the ability to explain social processes through the development of explanatory theory. The primary data source will be interviews conducted in several rounds in both Australia and Southeast Asia. Purposive and theoretical sampling will be used to access participants whose data can provide depth and individual meaning. The role of expatriate and long-term traveller networks and their potential to impact health are uncertain. This study seeks to gain a deeper understanding of the Australian expatriate culture, behavioural contexts and experiences within social networks in  Southeast Asia. This research will provide tangible recommendations for policy and practice as the findings will be disseminated to health professionals and other stakeholders, academics and the community via local research and evaluation networks, conference presentations and online forums. The Curtin University Human Research Ethics Committee has granted approval for this

  4. Exploring the potential of expatriate social networks to reduce HIV and STI transmission: a protocol for a qualitative study

    Science.gov (United States)

    Crawford, Gemma; Bowser, Nicole Jasmine; Brown, Graham Ernest; Maycock, Bruce Richard

    2013-01-01

    Introduction HIV diagnoses acquired among Australian men working or travelling overseas including  Southeast Asia are increasing. This change within transmission dynamics means traditional approaches to prevention need to be considered in new contexts. The significance and role of social networks in mediating sexual risk behaviours may be influential. Greater understanding of expatriate and traveller behaviour is required to understand how local relationships are formed, how individuals enter and are socialised into networks, and how these networks may affect sexual intentions and behaviours. This paper describes the development of a qualitative protocol to investigate how social networks of Australian expatriates and long-term travellers might support interventions to reduce transmission of HIV and sexually transmitted infections. Methods and analysis To explore the interactions of male expatriates and long-term travellers within and between their environments, symbolic interactionism will be the theoretical framework used. Grounded theory methods provide the ability to explain social processes through the development of explanatory theory. The primary data source will be interviews conducted in several rounds in both Australia and Southeast Asia. Purposive and theoretical sampling will be used to access participants whose data can provide depth and individual meaning. Ethics and dissemination The role of expatriate and long-term traveller networks and their potential to impact health are uncertain. This study seeks to gain a deeper understanding of the Australian expatriate culture, behavioural contexts and experiences within social networks in  Southeast Asia. This research will provide tangible recommendations for policy and practice as the findings will be disseminated to health professionals and other stakeholders, academics and the community via local research and evaluation networks, conference presentations and online forums. The Curtin University Human

  5. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2004-01-01

    In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The

  6. Analysis of the radius and diameter protocols in terms of pricing telecommunication services

    Directory of Open Access Journals (Sweden)

    Vesna M. Radonjić

    2013-06-01

    client and the server, depending on the current needs of the network. At the transport layer, Diameter uses the TCP or SCTP protocols. When compared to UDP, these protocols provide reliable transmission which is very important for applications exchanging data related to accounting. In addition, the Diameter protocol allows the transmission of accounting information in real time and it incorporates several methods for troubleshooting in order to minimize the loss of accounting data when a failure occurs, which is not the case with RADIUS. Given the present benefits, introduced improvements, flexibility, expandability, IETF and 3GPP's support and the support of big companies, there is a great chance that Diameter will replace RADIUS.   Conclusion   This paper presents a general overview of the RADIUS and Diameter protocols, including some of their basic operations with a special emphasis on accounting applications. The similarities of these protocols are reflected in the support of the same functions in a similar format of the packages. The differences are related to the protocol architectures and the methods of determining authentication, authorization and accounting mechanisms. Regarding accounting aspects, the most important advantages of the Diameter protocol are its possibility to transmit accounting information in real time and implemented mechanisms for troubleshooting in order to minimize the loss of accounting data in case of failure. Owing to to these characteristics, the Diameter protocol achieves a significant advantage over RADIUS in next generation networks.

  7. Efficient SCT Protocol for Post Disaster Communication

    Science.gov (United States)

    Ramesh, T. K.; Giriraja, C. V.

    2017-08-01

    Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. Wireless ad-hoc network architecture is proposed in this paper with access nodes. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and Efficient SCTP (ESTP) algorithm is developed which shows better results in terms of cumulative packet loss.

  8. The dynamics of HIV transmission in out of school young heterosexual men in South Africa: a systematic scoping review protocol.

    Science.gov (United States)

    Ntombela, Nonzwakazi; Mashamba-Thompson, Tivani P; Mtshali, Andile; Voce, Anna; Kharsany, Ayesha B M

    2017-01-17

    In South Africa, gender inequality dominated by males and heterosexual HIV epidemic are associated with high HIV infection. Underlying epidemiological and social determinants driving HIV acquisition and transmission are critical to understand the extent and complexity of sexual networks as primary mechanisms through which HIV is likely to spread. The aim of the study is to provide an overview of empiric evidence that links the complex interaction of risk of HIV infection in men. We will conduct a systematic scoping review to identify, describe, and map literature on the dynamics of HIV infection in men, and we will determine the quality of the studies reporting on the dynamics of HIV infections in men. Primary research articles, published in peer-reviewed journals, review articles, and gray literature that address the research question, will be included. We will search PubMed, Web of Knowledge, Science Direct, EBSCOhost, Google Scholar, World Health Organization library, and UNAIDS database. Reference lists and existing networks such as government organizations and conferences will also be included to source relevant literature. Two independent reviewers will extract data in parallel from all relevant search engines, using specific inclusion and exclusion criteria. A thematic content analysis will be used to present the narrative account of the reviews, using NVivo version 10. We anticipate finding relevant literature on the dynamics of HIV transmission in South African men. Once summarized, data will be useful to guide future research. PROSPERO CRD42016039489.

  9. Low latency protocol for transmission of measurement data from FPGA to Linux computer via 10 Gbps Ethernet link

    International Nuclear Information System (INIS)

    Zabolotny, W.M.

    2015-01-01

    This paper presents FADE-10G—an integrated solution for modern multichannel measurement systems. Its main aim is a low latency, reliable transmission of measurement data from FPGA-based front-end electronic boards (FEBs) to a computer-based node in the Data Acquisition System (DAQ), using a standard Ethernet 1 Gbps or 10 Gbps link. In addition to transmission of data, the system allows the user to send reliably simple control commands from DAQ to FEB and to receive responses. The aim of the work is to provide a possible simple base solution, which can be adapted by the end user to his or her particular needs. Therefore, the emphasis is put on the minimal consumption of FPGA resources in FEB and the minimal CPU load in the DAQ computer. The open source implementation of the FPGA IP core and the Linux kernel driver published under permissive license facilitates modifications and reuse of the solution. The system has been successfully tested in real hardware, both with 1 Gbps and 10 Gbps links

  10. Evaluating the sustainability, scalability, and replicability of an STH transmission interruption intervention: The DeWorm3 implementation science protocol

    Science.gov (United States)

    Ajjampur, Sitara S. R.; Bailey, Robin; Galactionova, Katya; Gwayi-Chore, Marie-Claire; Halliday, Katherine; Ibikounle, Moudachirou; Juvekar, Sanjay; Kalua, Khumbo; Kang, Gagandeep; Lele, Pallavi; Luty, Adrian J. F.; Pullan, Rachel; Sarkar, Rajiv; Schär, Fabian; Tediosi, Fabrizio; Weiner, Bryan J.; Yard, Elodie; Walson, Judd

    2018-01-01

    Hybrid trials that include both clinical and implementation science outcomes are increasingly relevant for public health researchers that aim to rapidly translate study findings into evidence-based practice. The DeWorm3 Project is a series of hybrid trials testing the feasibility of interrupting the transmission of soil transmitted helminths (STH), while conducting implementation science research that contextualizes clinical research findings and provides guidance on opportunities to optimize delivery of STH interventions. The purpose of DeWorm3 implementation science studies is to ensure rapid and efficient translation of evidence into practice. DeWorm3 will use stakeholder mapping to identify individuals who influence or are influenced by school-based or community-wide mass drug administration (MDA) for STH and to evaluate network dynamics that may affect study outcomes and future policy development. Individual interviews and focus groups will generate the qualitative data needed to identify factors that shape, contextualize, and explain DeWorm3 trial outputs and outcomes. Structural readiness surveys will be used to evaluate the factors that drive health system readiness to implement novel interventions, such as community-wide MDA for STH, in order to target change management activities and identify opportunities for sustaining or scaling the intervention. Process mapping will be used to understand what aspects of the intervention are adaptable across heterogeneous implementation settings and to identify contextually-relevant modifiable bottlenecks that may be addressed to improve the intervention delivery process and to achieve intervention outputs. Lastly, intervention costs and incremental cost-effectiveness will be evaluated to compare the efficiency of community-wide MDA to standard-of-care targeted MDA both over the duration of the trial and over a longer elimination time horizon. PMID:29346376

  11. Interrupting transmission of soil-transmitted helminths: a study protocol for cluster randomised trials evaluating alternative treatment strategies and delivery systems in Kenya.

    Science.gov (United States)

    Brooker, Simon J; Mwandawiro, Charles S; Halliday, Katherine E; Njenga, Sammy M; Mcharo, Carlos; Gichuki, Paul M; Wasunna, Beatrice; Kihara, Jimmy H; Njomo, Doris; Alusala, Dorcas; Chiguzo, Athuman; Turner, Hugo C; Teti, Caroline; Gwayi-Chore, Claire; Nikolay, Birgit; Truscott, James E; Hollingsworth, T Déirdre; Balabanova, Dina; Griffiths, Ulla K; Freeman, Matthew C; Allen, Elizabeth; Pullan, Rachel L; Anderson, Roy M

    2015-10-19

    In recent years, an unprecedented emphasis has been given to the control of neglected tropical diseases, including soil-transmitted helminths (STHs). The mainstay of STH control is school-based deworming (SBD), but mathematical modelling has shown that in all but very low transmission settings, SBD is unlikely to interrupt transmission, and that new treatment strategies are required. This study seeks to answer the question: is it possible to interrupt the transmission of STH, and, if so, what is the most cost-effective treatment strategy and delivery system to achieve this goal? Two cluster randomised trials are being implemented in contrasting settings in Kenya. The interventions are annual mass anthelmintic treatment delivered to preschool- and school-aged children, as part of a national SBD programme, or to entire communities, delivered by community health workers. Allocation to study group is by cluster, using predefined units used in public health provision-termed community units (CUs). CUs are randomised to one of three groups: receiving either (1) annual SBD; (2) annual community-based deworming (CBD); or (3) biannual CBD. The primary outcome measure is the prevalence of hookworm infection, assessed by four cross-sectional surveys. Secondary outcomes are prevalence of Ascaris lumbricoides and Trichuris trichiura, intensity of species infections and treatment coverage. Costs and cost-effectiveness will be evaluated. Among a random subsample of participants, worm burden and proportion of unfertilised eggs will be assessed longitudinally. A nested process evaluation, using semistructured interviews, focus group discussions and a stakeholder analysis, will investigate the community acceptability, feasibility and scale-up of each delivery system. Study protocols have been reviewed and approved by the ethics committees of the Kenya Medical Research Institute and National Ethics Review Committee, and London School of Hygiene and Tropical Medicine. The study has a

  12. Interrupting seasonal transmission of Schistosoma haematobium and control of soil-transmitted helminthiasis in northern and central Côte d'Ivoire: a SCORE study protocol.

    Science.gov (United States)

    Tian-Bi, Yves-Nathan T; Ouattara, Mamadou; Knopp, Stefanie; Coulibaly, Jean T; Hürlimann, Eveline; Webster, Bonnie; Allan, Fiona; Rollinson, David; Meïté, Aboulaye; Diakité, Nana R; Konan, Cyrille K; N'Goran, Eliézer K; Utzinger, Jürg

    2018-01-29

    To achieve a world free of schistosomiasis, the objective is to scale up control and elimination efforts in all endemic countries. Where interruption of transmission is considered feasible, countries are encouraged to implement a comprehensive intervention package, including preventive chemotherapy, information, education and communication (IEC), water, sanitation and hygiene (WASH), and snail control. In northern and central Côte d'Ivoire, transmission of Schistosoma haematobium is seasonal and elimination might be achieved. In a cluster-randomised trial, we will assess different treatment schemes to interrupt S. haematobium transmission and control soil-transmitted helminthiasis over a 3-year period. We will compare the impact of (i) arm A: annual mass drug administration (MDA) with praziquantel and albendazole before the peak schistosomiasis transmission season; (ii) arm B: annual MDA after the peak schistosomiasis transmission season; (iii) arm C: two yearly treatments before and after peak schistosomiasis transmission; and (iv) arm D: annual MDA before peak schistosomiasis transmission, coupled with chemical snail control using niclosamide. The prevalence and intensity of S. haematobium and soil-transmitted helminth infections will be assessed using urine filtration and Kato-Katz thick smears, respectively, in six administrative regions in northern and central parts of Côte d'Ivoire. Once a year, urine and stool samples will be collected and examined from 50 children aged 5-8 years, 100 children aged 9-12 years and 50 adults aged 20-55 years in each of 60 selected villages. Changes in S. haematobium and soil-transmitted helminth prevalence and intensity will be assessed between years and stratified by intervention arm. In the 15 villages randomly assigned to intervention arm D, intermediate host snails will be collected three times per year, before niclosamide is applied to the selected freshwater bodies. The snail abundance and infection rates over time

  13. Protocol for a population-based molecular epidemiology study of tuberculosis transmission in a high HIV-burden setting: the Botswana Kopanyo study.

    Science.gov (United States)

    Zetola, N M; Modongo, C; Moonan, P K; Click, E; Oeltmann, J E; Shepherd, J; Finlay, A

    2016-05-09

    Mycobacterium tuberculosis (Mtb) is transmitted from person to person via airborne droplet nuclei. At the community level, Mtb transmission depends on the exposure venue, infectiousness of the tuberculosis (TB) index case and the susceptibility of the index case's social network. People living with HIV infection are at high risk of TB, yet the factors associated with TB transmission within communities with high rates of TB and HIV are largely undocumented. The primary aim of the Kopanyo study is to better understand the demographic, clinical, social and geospatial factors associated with TB and multidrug-resistant TB transmission in 2 communities in Botswana, a country where 60% of all patients with TB are also infected with HIV. This manuscript describes the methods used in the Kopanyo study. The study will be conducted in greater Gaborone, which has high rates of HIV and a mobile population; and in Ghanzi, a rural community with lower prevalence of HIV infection and home to the native San population. Kopanyo aims to enrol all persons diagnosed with TB during a 4-year study period. From each participant, sputum will be cultured, and for all Mtb isolates, molecular genotyping (24-locus mycobacterial interspersed repetitive units-variable number of tandem repeats) will be performed. Patients with matching genotype results will be considered members of a genotype cluster, a proxy for recent transmission. Demographic, behavioural, clinical and social information will be collected by interview. Participant residence, work place, healthcare facilities visited and social gathering venues will be geocoded. We will assess relationships between these factors and cluster involvement to better plan interventions for reducing TB transmission. Ethical approval from the Independent Review Boards at the University of Pennsylvania, US Centers for Disease Control and Prevention, Botswana Ministry of Health and University of Botswana has been obtained. Published by the BMJ

  14. Effects on instruments of the World Health Organization--recommended protocols for decontamination after possible exposure to transmissible spongiform encephalopathy-contaminated tissue.

    Science.gov (United States)

    Brown, Stanley A; Merritt, Katharine; Woods, Terry O; Busick, Deanna N

    2005-01-15

    It has been recommended by the World Health Organization (WHO) and Centers for Disease Control and Prevention (CDC) that rigorous decontamination protocols be used on surgical instruments that have been exposed to tissue possibly contaminated with Creutzfeldt-Jakob disease (CJD). This study was designed to examine the effects of these protocols on various types of surgical instruments. The most important conclusions are: (1) autoclaving in 1N NaOH will cause darkening of some instruments; (2) soaking in 1N NaOH at room temperature damages carbon steel but not stainless steel or titanium; (3) soaking in chlorine bleach will badly corrode gold-plated instruments and will damage some, but not all, stainless-steel instruments, especially welded and soldered joints. Damage became apparent after the first exposure and therefore long tests are not necessary to establish which instruments will be damaged. Copyright 2004 Wiley Periodicals, Inc.

  15. A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines

    Directory of Open Access Journals (Sweden)

    Jun Yu

    2015-01-01

    Full Text Available Optimization of energy consumption in Wireless Sensor Network (WSN nodes has become a critical link that constrains the engineering application of the smart grid due to the fact that the smart grid is characterized by long-distance transmission in a special environment. The paper proposes a linear hierarchical network topological structure specific to WSN energy conservation in environmental monitoring of the long-distance electric transmission lines in the smart grid. Based on the topological structural characteristics and optimization of network layers, the paper also proposes a Topological Structure be Layered Configurations (TSLC routing algorithm to improve the quality of WSN data transmission performance. Coprocessing of the network layer and the media access control (MAC layer is achieved by using the cross-layer design method, accessing the status for the nodes in the network layer and obtaining the status of the network nodes of the MAC layer. It efficiently saves the energy of the whole network, improves the quality of the network service performance, and prolongs the life cycle of the network.

  16. Assessing the feasibility of interrupting the transmission of soil-transmitted helminths through mass drug administration: The DeWorm3 cluster randomized trial protocol.

    Science.gov (United States)

    Ásbjörnsdóttir, Kristjana Hrönn; Ajjampur, Sitara S Rao; Anderson, Roy M; Bailey, Robin; Gardiner, Iain; Halliday, Katherine E; Ibikounle, Moudachirou; Kalua, Khumbo; Kang, Gagandeep; Littlewood, D Timothy J; Luty, Adrian J F; Means, Arianna Rubin; Oswald, William; Pullan, Rachel L; Sarkar, Rajiv; Schär, Fabian; Szpiro, Adam; Truscott, James E; Werkman, Marleen; Yard, Elodie; Walson, Judd L

    2018-01-01

    Current control strategies for soil-transmitted helminths (STH) emphasize morbidity control through mass drug administration (MDA) targeting preschool- and school-age children, women of childbearing age and adults in certain high-risk occupations such as agricultural laborers or miners. This strategy is effective at reducing morbidity in those treated but, without massive economic development, it is unlikely it will interrupt transmission. MDA will therefore need to continue indefinitely to maintain benefit. Mathematical models suggest that transmission interruption may be achievable through MDA alone, provided that all age groups are targeted with high coverage. The DeWorm3 Project will test the feasibility of interrupting STH transmission using biannual MDA targeting all age groups. Study sites (population ≥80,000) have been identified in Benin, Malawi and India. Each site will be divided into 40 clusters, to be randomized 1:1 to three years of twice-annual community-wide MDA or standard-of-care MDA, typically annual school-based deworming. Community-wide MDA will be delivered door-to-door, while standard-of-care MDA will be delivered according to national guidelines. The primary outcome is transmission interruption of the STH species present at each site, defined as weighted cluster-level prevalence ≤2% by quantitative polymerase chain reaction (qPCR), 24 months after the final round of MDA. Secondary outcomes include the endline prevalence of STH, overall and by species, and the endline prevalence of STH among children under five as an indicator of incident infections. Secondary analyses will identify cluster-level factors associated with transmission interruption. Prevalence will be assessed using qPCR of stool samples collected from a random sample of cluster residents at baseline, six months after the final round of MDA and 24 months post-MDA. A smaller number of individuals in each cluster will be followed with annual sampling to monitor trends in

  17. A Seamless Ubiquitous Telehealthcare Tunnel

    Directory of Open Access Journals (Sweden)

    Sao-Jie Chen

    2013-08-01

    Full Text Available Mobile handheld devices are rapidly using to implement healthcare services around the World. Fundamentally, these services utilize telemedicine technologies. A disconnection of a mobile telemedicine system usually results in an interruption, which is embarrassing, and reconnection is necessary during the communication session. In this study, the Stream Control Transmission Protocol (SCTP is adopted to build a stable session tunnel to guarantee seamless switching among heterogeneous wireless communication standards, such as Wi-Fi and 3G. This arrangement means that the telemedicine devices will not be limited by a fixed wireless connection and can switch to a better wireless channel if necessary. The tunnel can transmit plain text, binary data, and video streams. According to the evaluation of the proposed software-based SCTP-Tunnel middleware shown, the performance is lower than anticipated and is slightly slower than a fixed connection. However, the transmission throughput is still acceptable for healthcare professionals in a healthcare enterprise or home care site. It is necessary to build more heterogeneous wireless protocols into the proposed tunnel-switching scheme to support all possible communication protocols. In addition, SCTP is another good choice for promoting communication in telemedicine and healthcare fields.

  18. Evidence of accessibility and utility of point-of-care diagnostics as an integral part of prevention of mother-to-child transmission services: systematic scoping review protocol.

    Science.gov (United States)

    Katoba, Juliet; Hangulu, Lydia; Mashamba-Thompson, Tivani Phosa

    2017-11-04

    Point-of-care (POC) testing has been shown to help improve healthcare access in resource-limited settings. However, there is paucity of evidence on accessibility of POC testing for prevention of mother-to-child transmission (PMTCT) in resource-limited settings. We propose to conduct a systematic scoping review to map the evidence on POC testing services for PMTCT. A scoping review framework, proposed by Arksey and O'Malley, will guide the study. A comprehensive literature search will be performed in the following electronic databases: PubMed, Science Direct, Cochrane Central, Google Scholar and databases within EBSCOhost (Medline and CINAHL). The primary research articles published in peer-reviewed journals and grey articles addressing our question will be included. One reviewer will conduct title screening and the results will be exported to endnote library. Two independent reviewers will perform abstract, then full article screening in parallel. The same process shall be employed to extract data from eligible studies. Data analysis will involve a narrative summary of included studies and thematic content analysis aided by NVIVO software V.11. The mixed methods assessment tool will be used to assess the quality of studies that will be included. Ethical approval is not applicable to this study. The study findings will be disseminated through publication in a peer-reviewed journal and presentations at conferences related to syphilis, HIV, PMTCT, bacterial infections and POC diagnostics. CRD42017056267. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  19. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  20. Alternative approaches to transmission investment

    Energy Technology Data Exchange (ETDEWEB)

    Welch, J.L. [International Transmission Co., Detroit, MI (United States)

    2004-07-01

    The International Transmission Company (ITC) is an independent power transmission company that owns, operates and maintains the high voltage transmission system in southeastern Michigan. The company's current focus is on investing in the transmission infrastructure to improve reliability, relieve congestion, improve access to generation and reduce energy costs for consumers. There is a need for investment in power transmission. Trends indicate that power transactions are on the rise while transmission investment is lagging because pricing protocols are inadequate and there is no regional tariff mechanism to allocate the benefits of new investment. The presentation reviewed the applicability of FTRs to transmission owners and the pitfalls of participant funding pricing. It also outlined the regional benefit allocation mechanism (RBAM) with an illustrative example. It was concluded that existing pricing policies must be improved to address the growing need for transmission investment. RBAM is needed to help investors recover costs from project beneficiaries. figs.

  1. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  2. Probabilistic Chain Teleportation of a Qutrit-State

    International Nuclear Information System (INIS)

    Wang Meiyu; Yan Fengli

    2010-01-01

    We investigate chain teleportation of a qutrit-state via the non-maximally two-qutrit entangled channels. For the case of four parties, the efficiencies of two chain teleportation protocols, the separate chain teleportation protocol (SCTP), and the global chain teleportation protocol (GCTP), are calculated. In SCTP the errors are corrected between every step while in GCTP the errors are corrected only at the end. Furthermore, we present a piecewise global chain teleportation protocol (PGCTP) for keeping away from the inconvenience of error-correction of GCTP. We show that PGCTP is more efficient than SCTP. (general)

  3. Evaluating the effectiveness of selected community-level interventions on key maternal, child health, and prevention of mother-to-child transmission of HIV outcomes in three countries (the ACCLAIM Project): a study protocol for a randomized controlled trial.

    Science.gov (United States)

    Woelk, Godfrey B; Kieffer, Mary Pat; Walker, Damilola; Mpofu, Daphne; Machekano, Rhoderick

    2016-02-16

    Efforts to scale up and improve programs for prevention of mother-to-child transmission of HIV (PMTCT) have focused primarily at the health facility level, and limited attention has been paid to defining an effective set of community interventions to improve demand and uptake of services and retention. Many barriers to PMTCT are also barriers to pregnancy, childbirth, and postnatal care faced by mothers regardless of HIV status. Demand for maternal and child health (MCH) and PMTCT services can be limited by critical social, cultural, and structural barriers. Yet, rigorous evaluation has shown limited evidence of effectiveness of multilevel community-wide interventions aimed at improving MCH and HIV outcomes for pregnant women living with HIV. We propose to assess the effect of a package of multilevel community interventions: a social learning and action component, community dialogues, and peer-led discussion groups, on the demand for, uptake of, and retention of HIV positive pregnant/postpartum women in MCH/PMTCT services. This study will undertake a three-arm randomized trial in Swaziland, Uganda, and Zimbabwe. Districts/regions (n = 9) with 45 PMTCT-implementing health facilities and their catchment areas (populations 7,300-27,500) will be randomly allocated to three intervention arms: 1) community leader engagement, 2) community leader engagement with community days, or 3) community leader engagement with community days and male and female community peer groups. The primary study outcome is HIV exposed infants (HEIs) returning to the health facility within 2 months for early infant diagnosis (EID) of HIV. Secondary study outcomes include gestational age of women attending for first antenatal care, male partners tested for HIV, and HEIs receiving nevirapine prophylaxis at birth. Changes in community knowledge, attitudes, practices, and beliefs on MCH/PMTCT will be assessed through household surveys. Implementation of the protocol necessitated changes in the

  4. Neuroglial Transmission

    DEFF Research Database (Denmark)

    Gundersen, Vidar; Storm-Mathisen, Jon; Bergersen, Linda Hildegard

    2015-01-01

    as a signaling substance recently shown to act on specific lactate receptors in the brain. Complementing neurotransmission at a synapse, neuroglial transmission often implies diffusion of the transmitter over a longer distance and concurs with the concept of volume transmission. Transmission from glia modulates...... synaptic neurotransmission based on energetic and other local conditions in a volume of tissue surrounding the individual synapse. Neuroglial transmission appears to contribute significantly to brain functions such as memory, as well as to prevalent neuropathologies....

  5. Transmission issues

    International Nuclear Information System (INIS)

    Bradford, J.; Wilson, L.; Thon, S.; Millar, N.

    2005-01-01

    This session on transmission issues focused on the role that transmission plays in electricity markets and the importance of getting the market structure right in terms of generation divestiture with buy back contracts, demand side responsive programs, transmission upgrades and long term contracts. The difficulties of distinguishing between market power and scarcity were examined along with some of the complications that ensue if transmission experiences congestion, as exemplified by the August 2003 blackout in eastern North America. The presentations described the best ways to handle transmission issues, and debated whether transmission should be deregulated or follow market forces. Issues of interconnections and reliability of connections were also debated along with the attempt to integrate renewables into the grid. Some presentations identified what new transmission must be built and what must be done to ensure that transmission gets built. The challenges and business opportunities for transmission in Alberta were discussed with reference to plans to invest in new infrastructure, where it is going outside of the province and how it works with other jurisdictions. Manitoba's Conawapa Hydro Project and its 2000 MW tie line to Ontario was also discussed. Some examples of non-optimal use of interconnections in Europe were also discussed in an effort to learn from these mistakes and avoid them in Canada. tabs., figs

  6. Transmission eigenvalues

    Science.gov (United States)

    Cakoni, Fioralba; Haddar, Houssem

    2013-10-01

    In inverse scattering theory, transmission eigenvalues can be seen as the extension of the notion of resonant frequencies for impenetrable objects to the case of penetrable dielectrics. The transmission eigenvalue problem is a relatively late arrival to the spectral theory of partial differential equations. Its first appearance was in 1986 in a paper by Kirsch who was investigating the denseness of far-field patterns for scattering solutions of the Helmholtz equation or, in more modern terminology, the injectivity of the far-field operator [1]. The paper of Kirsch was soon followed by a more systematic study by Colton and Monk in the context of developing the dual space method for solving the inverse scattering problem for acoustic waves in an inhomogeneous medium [2]. In this paper they showed that for a spherically stratified media transmission eigenvalues existed and formed a discrete set. Numerical examples were also given showing that in principle transmission eigenvalues could be determined from the far-field data. This first period of interest in transmission eigenvalues was concluded with papers by Colton et al in 1989 [3] and Rynne and Sleeman in 1991 [4] showing that for an inhomogeneous medium (not necessarily spherically stratified) transmission eigenvalues, if they existed, formed a discrete set. For the next seventeen years transmission eigenvalues were ignored. This was mainly due to the fact that, with the introduction of various sampling methods to determine the shape of an inhomogeneous medium from far-field data, transmission eigenvalues were something to be avoided and hence the fact that transmission eigenvalues formed at most a discrete set was deemed to be sufficient. In addition, questions related to the existence of transmission eigenvalues or the structure of associated eigenvectors were recognized as being particularly difficult due to the nonlinearity of the eigenvalue problem and the special structure of the associated transmission

  7. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  8. Quantifying Transmission.

    Science.gov (United States)

    Woolhouse, Mark

    2017-07-01

    Transmissibility is the defining characteristic of infectious diseases. Quantifying transmission matters for understanding infectious disease epidemiology and designing evidence-based disease control programs. Tracing individual transmission events can be achieved by epidemiological investigation coupled with pathogen typing or genome sequencing. Individual infectiousness can be estimated by measuring pathogen loads, but few studies have directly estimated the ability of infected hosts to transmit to uninfected hosts. Individuals' opportunities to transmit infection are dependent on behavioral and other risk factors relevant given the transmission route of the pathogen concerned. Transmission at the population level can be quantified through knowledge of risk factors in the population or phylogeographic analysis of pathogen sequence data. Mathematical model-based approaches require estimation of the per capita transmission rate and basic reproduction number, obtained by fitting models to case data and/or analysis of pathogen sequence data. Heterogeneities in infectiousness, contact behavior, and susceptibility can have substantial effects on the epidemiology of an infectious disease, so estimates of only mean values may be insufficient. For some pathogens, super-shedders (infected individuals who are highly infectious) and super-spreaders (individuals with more opportunities to transmit infection) may be important. Future work on quantifying transmission should involve integrated analyses of multiple data sources.

  9. Force transmissibility versus displacement transmissibility

    Science.gov (United States)

    Lage, Y. E.; Neves, M. M.; Maia, N. M. M.; Tcherniak, D.

    2014-10-01

    It is well-known that when a single-degree-of-freedom (sdof) system is excited by a continuous motion of the foundation, the force transmissibility, relating the force transmitted to the foundation to the applied force, equals the displacement transmissibility. Recent developments in the generalization of the transmissibility to multiple-degree-of-freedom (mdof) systems have shown that similar simple and direct relations between both types of transmissibility do not appear naturally from the definitions, as happens in the sdof case. In this paper, the authors present their studies on the conditions under which it is possible to establish a relation between force transmissibility and displacement transmissibility for mdof systems. As far as the authors are aware, such a relation is not currently found in the literature, which is justified by being based on recent developments in the transmissibility concept for mdof systems. Indeed, it does not appear naturally, but the authors observed that the needed link is present when the displacement transmissibility is obtained between the same coordinates where the applied and reaction forces are considered in the force transmissibility case; this implies that the boundary conditions are not exactly the same and instead follow some rules. This work presents a formal derivation of the explicit relation between the force and displacement transmissibilities for mdof systems, and discusses its potential and limitations. The authors show that it is possible to obtain the displacement transmissibility from measured forces, and the force transmissibility from measured displacements, opening new perspectives, for example, in the identification of applied or transmitted forces. With this novel relation, it becomes possible, for example, to estimate the force transmissibility matrix with the structure off its supports, in free boundary conditions, and without measuring the forces. As far as force identification is concerned, this

  10. Data transmission

    National Research Council Canada - National Science Library

    Tugal, Dogan A; Tugal, Osman

    1989-01-01

    This updated second edition provides working answers to today's critical questions about designing and managing all types of data transmission systems and features a new chapter on local area networks (LANs...

  11. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  12. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  13. Electrical transmission

    Energy Technology Data Exchange (ETDEWEB)

    Sayers, D P

    1960-05-01

    After briefly tracing the history of electricity transmission, trends in high voltage transmission and experiments being conducted on 650 kV are discussed. 5000 miles of the U.K. grid are operated at 132 kV and 1000 at 275 kV, ultimately to provide a super grid at 380 kV. Problems are insulation, radio interference and the cost of underground lines (16 times that of overhead lines). Also considered are the economics of the grid as a means of transporting energy and as a means of spreading the peak load over the power stations in the most efficient manner. Finally, the question of amenities is discussed.

  14. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  15. Caltech computer scientists develop FAST protocol to speed up Internet

    CERN Multimedia

    2003-01-01

    "Caltech computer scientists have developed a new data transfer protocol for the Internet fast enough to download a full-length DVD movie in less than five seconds. The protocol is called FAST, standing for Fast Active queue management Scalable Transmission Control Protocol" (1 page).

  16. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  17. Transcending Transmission

    DEFF Research Database (Denmark)

    Schoeneborn, Dennis; Trittin, Hannah

    2013-01-01

    Purpose – Extant research on corporate social responsibility (CSR) communication primarily relies on a transmission model of communication that treats organizations and communication as distinct phenomena. This approach has been criticized for neglecting the formative role of communication...... in the emergence of organizations. This paper seeks to propose to reconceptualize CSR communication by drawing on the “communication constitutes organizations” (CCO) perspective. Design/methodology/approach – This is a conceptual paper that explores the implications of switching from an instrumental...... to a constitutive notion of communication. Findings – The study brings forth four main findings: from the CCO view, organizations are constituted by several, partly dissonant, and potentially contradictory communicative practices. From that viewpoint, the potential impact of CSR communication becomes a matter...

  18. Towards designing energy-efficient routing protocol for wireless mesh networks

    CSIR Research Space (South Africa)

    Dludla, AG

    2009-08-01

    Full Text Available Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based...

  19. A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States

    International Nuclear Information System (INIS)

    Gao Gan; Wang Liping

    2010-01-01

    By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the 'two-step' transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. (general)

  20. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  1. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  2. Maritime wideband communication networks video transmission scheduling

    CERN Document Server

    Yang, Tingting

    2014-01-01

    This Springer Brief covers emerging maritime wideband communication networks and how they facilitate applications such as maritime distress, urgency, safety and general communications. It provides valuable insight on the data transmission scheduling and protocol design for the maritime wideband network. This brief begins with an introduction to maritime wideband communication networks including the architecture, framework, operations and a comprehensive survey on current developments. The second part of the brief presents the resource allocation and scheduling for video packet transmission wit

  3. Nuclear data transmission based on zigbee

    International Nuclear Information System (INIS)

    Cui Yan; Fang Fang; Chen Wei; Jiang Zancheng

    2007-01-01

    Zigbee, a new wireless communication protocol, which is an important technology supporting wireless sensor networks. We introduce a solution of nuclear data transmission based on zigbee, the cc2420 build up the core of the data acquisition module and the wireless transceive module, and realized remote monitor and nuclear data quickly analysis. (authors)

  4. Data transmission optical link for RF-GUN project

    Science.gov (United States)

    Olowski, Krzysztof; Zielinski, Jerzy; Jalmuzna, Wojciech; Pozniak, Krzysztof; Romaniuk, Ryszard

    2005-09-01

    Today, the fast optical data transmission is one of the fundamentals of modern distributed control systems. The fibers are widely use as multi-gigabit data stream medium. For a short range transmission, the multimode fibers are in common use. The data rate for this kind of transmission exceeds 10 Gbps for 10 Gigabit Ethernet and 10G Fibre Channel protocols. The Field Programmable Gate Arrays are one of the opportunities of managing the optical transmission. This article is concerning a synchronous optical transmission system via a multimode fiber. The transmission is controlled by the FPGA of two manufacturers: Xilinx and Altera. This paper contains the newest technology overview and market device parameters. It also describes a board for the optical transmission, technical details of the transmission and optical transmission results.

  5. The effect of an interactive weekly mobile phone messaging on retention in prevention of mother to child transmission (PMTCT) of HIV program: study protocol for a randomized controlled trial (WELTEL PMTCT).

    Science.gov (United States)

    Awiti, Patricia Opondo; Grotta, Alessandra; van der Kop, Mia; Dusabe, John; Thorson, Anna; Mwangi, Jonathan; Belloco, Rino; Lester, Richard; Ternent, Laura; Were, Edwin; Ekström, Anna Mia

    2016-07-11

    Improving retention in prevention of mother to child transmission (PMTCT) of HIV programs is critical to optimize maternal and infant health outcomes, especially now that lifelong treatment is immediate regardless of CD4 cell count). The WelTel strategy of using weekly short message service (SMS) to engage patients in care in Kenya, where mobile coverage even in poor areas is widespread has been shown to improve adherence to antiretroviral therapy (ART) and viral load suppression among those on ART. The aim of this study is to determine the effect of the WelTel SMS intervention compared to standard care on retention in PMTCT program in Kenya. WelTel PMTCT is a four to seven-centers, two-arm open randomized controlled trial (RCT) that will be conducted in urban and rural Kenya. Over 36 months, we plan to recruit 600 pregnant women at their first antenatal care visit and follow the mother-infant pair until they are discharged from the PMTCT program (when infant is aged 24 months). Participants will be randomly allocated to the intervention or control arm (standard care) at a 1:1 ratio. Intervention arm participants will receive an interactive weekly SMS 'How are you?' to which they are supposed to respond within 24 h. Depending on the response (ok, problem or no answer), a PMTCT nurse will follow-up and triage any problems that are identified. The primary outcome will be retention in care defined as the proportion of mother-infant pairs coming for infant HIV testing at 24 months from delivery. Secondary outcomes include a) adherence to WelTel; (b) adherence to antiretroviral medicine; (c) acceptance of WelTel and (d) cost-effectiveness of the WelTel intervention. This trial will provide evidence on the effectiveness of mHealth for PMTCT retention. Trial results and the cost-effectiveness evaluation will be used to inform policy and potential scale-up of mHealth among mothers living with HIV. ISRCTN98818734 ; registered on 9th December 2014.

  6. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  7. Adaptive Relay Activation in the Network Coding Protocols

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2015-01-01

    State-of-the-art Network coding based routing protocols exploit the link quality information to compute the transmission rate in the intermediate nodes. However, the link quality discovery protocols are usually inaccurate, and introduce overhead in wireless mesh networks. In this paper, we presen...

  8. Survey of Transmission Cost Allocation Methodologies for Regional Transmission Organizations

    Energy Technology Data Exchange (ETDEWEB)

    Fink, S.; Porter, K.; Mudd, C.; Rogers, J.

    2011-02-01

    The report presents transmission cost allocation methodologies for reliability transmission projects, generation interconnection, and economic transmission projects for all Regional Transmission Organizations.

  9. Statistical performance evaluation of ECG transmission using wireless networks.

    Science.gov (United States)

    Shakhatreh, Walid; Gharaibeh, Khaled; Al-Zaben, Awad

    2013-07-01

    This paper presents simulation of the transmission of biomedical signals (using ECG signal as an example) over wireless networks. Investigation of the effect of channel impairments including SNR, pathloss exponent, path delay and network impairments such as packet loss probability; on the diagnosability of the received ECG signal are presented. The ECG signal is transmitted through a wireless network system composed of two communication protocols; an 802.15.4- ZigBee protocol and an 802.11b protocol. The performance of the transmission is evaluated using higher order statistics parameters such as kurtosis and Negative Entropy in addition to the common techniques such as the PRD, RMS and Cross Correlation.

  10. Background Traffic-Based Retransmission Algorithm for Multimedia Streaming Transfer over Concurrent Multipaths

    Directory of Open Access Journals (Sweden)

    Yuanlong Cao

    2012-01-01

    Full Text Available The content-rich multimedia streaming will be the most attractive services in the next-generation networks. With function of distribute data across multipath end-to-end paths based on SCTP's multihoming feature, concurrent multipath transfer SCTP (CMT-SCTP has been regarded as the most promising technology for the efficient multimedia streaming transmission. However, the current researches on CMT-SCTP mainly focus on the algorithms related to the data delivery performance while they seldom consider the background traffic factors. Actually, background traffic of realistic network environments has an important impact on the performance of CMT-SCTP. In this paper, we firstly investigate the effect of background traffic on the performance of CMT-SCTP based on a close realistic simulation topology with reasonable background traffic in NS2, and then based on the localness nature of background flow, a further improved retransmission algorithm, named RTX_CSI, is proposed to reach more benefits in terms of average throughput and achieve high users' experience of quality for multimedia streaming services.

  11. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  12. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    Science.gov (United States)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  13. A Hierarchical Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prabhudutta Mohanty

    2014-12-01

    Full Text Available The two important requirements for many Wireless Senor Networks (WSNs are prolonged network lifetime and end-to-end reliability. The sensor nodes consume more energy during data transmission than the data sensing. In WSN, the redundant data increase the energy consumption, latency and reduce reliability during data transmission. Therefore, it is important to support energy efficient reliable data transport in WSNs. In this paper, we present a Hierarchical Energy Efficient Reliable Transport Protocol (HEERTP for the data transmission within the WSN. This protocol maximises the network lifetime by controlling the redundant data transmission with the co-ordination of Base Station (BS. The proposed protocol also achieves end-to-end reliability using a hop-by-hop acknowledgement scheme. We evaluate the performance of the proposed protocol through simulation. The simulation results reveal that our proposed protocol achieves better performance in terms of energy efficiency, latency and reliability than the existing protocols.

  14. Improving the security of quantum protocols via commit-and-open

    NARCIS (Netherlands)

    I.B. Damgård (Ivan); S. Fehr (Serge); C. Luneman; L. Salvail (Louis); C. Schaffner (Christian)

    2009-01-01

    htmlabstractWe consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general compiler improving the security of such protocols: if the original protocol is secure against an almost honest adversary, then the

  15. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  16. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  17. Space power transmission

    Energy Technology Data Exchange (ETDEWEB)

    Kuribayashi, Shizuma [Mitsubishi Heavy Industries, Ltd., Tokyo, (Japan)

    1989-10-05

    There being a conception to utilize solar energy by use of a space power station (SPS), a method to bring that universal grace to mankind is wireless energy transmission. The wireless energy transmission is regarded to be microwave transmission or laser beam transmission. The microwave transmission is to transmit 2.45GHz band microwave from the SPS to a receiving station on the ground to meet power demand on earth. The microwave, as small in attenuation in atmosphere and resistant against rain and cloud, is made candidate and, however, problematic in influence on organism, necessary large area of receiving antenna and many other points to be studied. While the laser transmission, as more convergent of beam than the microwave transmission, is advantageous with enabling the receiving area to be small and, however, disadvantageous with being not resistant against dust, rain and cloud, if used for the energy transmission between the space and earth. 2 refs., 2 figs.

  18. Transmission on Balance 2006

    International Nuclear Information System (INIS)

    2007-02-01

    Every year he Dutch Transmission System Operator (TSO) TenneT issues the title publication 'Transmission on Balance'. This report provides information about the main technical operating results in the past year.

  19. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  20. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  1. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  2. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  3. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  4. The automotive transmission book

    CERN Document Server

    Fischer, Robert; Jürgens, Gunter; Najork, Rolf; Pollak, Burkhard

    2015-01-01

    This book presents essential information on systems and interactions in automotive transmission technology and outlines the methodologies used to analyze and develop transmission concepts and designs. Functions of and interactions between components and subassemblies of transmissions are introduced, providing a basis for designing transmission systems and for determining their potentials and properties in vehicle-specific applications: passenger cars, trucks, buses, tractors, and motorcycles. With these fundamentals the presentation provides universal resources for both state-of-the-art and future transmission technologies, including systems for electric and hybrid electric vehicles.

  5. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  6. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  7. Pellicle transmission uniformity requirements

    Science.gov (United States)

    Brown, Thomas L.; Ito, Kunihiro

    1998-12-01

    Controlling critical dimensions of devices is a constant battle for the photolithography engineer. Current DUV lithographic process exposure latitude is typically 12 to 15% of the total dose. A third of this exposure latitude budget may be used up by a variable related to masking that has not previously received much attention. The emphasis on pellicle transmission has been focused on increasing the average transmission. Much less, attention has been paid to transmission uniformity. This paper explores the total demand on the photospeed latitude budget, the causes of pellicle transmission nonuniformity and examines reasonable expectations for pellicle performance. Modeling is used to examine how the two primary errors in pellicle manufacturing contribute to nonuniformity in transmission. World-class pellicle transmission uniformity standards are discussed and a comparison made between specifications of other components in the photolithographic process. Specifications for other materials or parameters are used as benchmarks to develop a proposed industry standard for pellicle transmission uniformity.

  8. Multi-protocol header generation system

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, David A.; Ignatowski, Michael; Jayasena, Nuwan; Loh, Gabriel

    2017-09-05

    A communication device includes a data source that generates data for transmission over a bus, and a data encoder that receives and encodes outgoing data. An encoder system receives outgoing data from a data source and stores the outgoing data in a first queue. An encoder encodes outgoing data with a header type that is based upon a header type indication from a controller and stores the encoded data that may be a packet or a data word with at least one layered header in a second queue for transmission. The device is configured to receive at a payload extractor, a packet protocol change command from the controller and to remove the encoded data and to re-encode the data to create a re-encoded data packet and placing the re-encoded data packet in the second queue for transmission.

  9. TRANSMISSIBLE VENEREAL TUMOR - LITERATURE REVIEW

    Directory of Open Access Journals (Sweden)

    T. R. B Berndt

    2016-11-01

    Full Text Available Transmissible venereal tumor (TVT is a contagious disease among the family of canines. Has a high prevalence in temperate regions and mainly affects male and female dogs wandering. Transmissible venereal tumor's main characteristic is a sexually transmitted cancer, through intercourse, and also transmitted through cell transplantation, an animal that has the disease to another Sound, which has an abrasion or epithelial discontinuity through licking or contact direct to neoplasia. It has no known etiology, although some authors suggest that there may be some virus as an agent. Is macroscopically observed as a crumbly mass, ulcerated, hemorrhagic, with the appearance of cauliflower. Their cells, if observed microscopically, have very clear, round and giant nucleus stained cytoplasm, and the presence of vacuolated cells in mitosis. The diagnosis can be accomplished by fine needle aspiration cytology, "imprint", histopathology, imaging tests such as x-ray and ultrasound, which are used for observation of metastases in internal organs. The main treatment is chemotherapy with substances such as vincristine dose of 0.5 to 0.7 mg / m², intra venous (IV, or from 0.0125 to 0.025 mg / kg IV once a week, four to eight weeks, and for animals which have acquired resistance to vincristine sulfate, is associated with the chemotherapeutic doxorubicin at a dose of 30 mg / m² IV once a week for four to eight weeks. Some protocols include prednisolone associated with vincristine sulfate for the treatment of Extragenital TVT.

  10. Transmission Integration | Grid Modernization | NREL

    Science.gov (United States)

    Transmission Integration Transmission Integration The goal of NREL's transmission integration integration issues and provide data, analysis, and models to enable the electric power system to more and finding solutions to address them to enable transmission grid integration. Capabilities Power

  11. A Comparative Analysis of Transmission Control Protocol Improvement Techniques over Space-Based Transmission Media

    National Research Council Canada - National Science Library

    Lawson, Joseph M

    2006-01-01

    The purpose of this study was to assess the throughput improvement afforded by the various TCP optimization techniques, with respect to a simulated geosynchronous satellite system, to provide a cost...

  12. Series Transmission Line Transformer

    Science.gov (United States)

    Buckles, Robert A.; Booth, Rex; Yen, Boris T.

    2004-06-29

    A series transmission line transformer is set forth which includes two or more of impedance matched sets of at least two transmissions lines such as shielded cables, connected in parallel at one end ans series at the other in a cascading fashion. The cables are wound about a magnetic core. The series transmission line transformer (STLT) which can provide for higher impedance ratios and bandwidths, which is scalable, and which is of simpler design and construction.

  13. Design and implementation on wireless transmission platform of area radiation monitoring data

    International Nuclear Information System (INIS)

    Li Dan; Ge Liangquan; Lai Wanchang; Ren Yong; Liu Huijun; Wang Guangxi

    2011-01-01

    To solve data transmission problems of radiation area monitoring system, Wireless transmission platform is built based on ZigBee module, thus wireless transmission between the radiation area central node and the monitoring points is achieved. It introduces the framework of ZigBee protocol, APL applications between FFD and RFD module, FFD, module and central node host, and RFD module and monitoring equipment, are developed using simplified protocol stack. Wireless network is set up using a FFD module and two RFD modules, the results show that RSSI are above 50, and the data communication is normal for the transmission distance of 60 m. (authors)

  14. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  15. Drivers of Tuberculosis Transmission.

    Science.gov (United States)

    Mathema, Barun; Andrews, Jason R; Cohen, Ted; Borgdorff, Martien W; Behr, Marcel; Glynn, Judith R; Rustomjee, Roxana; Silk, Benjamin J; Wood, Robin

    2017-11-03

    Measuring tuberculosis transmission is exceedingly difficult, given the remarkable variability in the timing of clinical disease after Mycobacterium tuberculosis infection; incident disease can result from either a recent (ie, weeks to months) or a remote (ie, several years to decades) infection event. Although we cannot identify with certainty the timing and location of tuberculosis transmission for individuals, approaches for estimating the individual probability of recent transmission and for estimating the fraction of tuberculosis cases due to recent transmission in populations have been developed. Data used to estimate the probable burden of recent transmission include tuberculosis case notifications in young children and trends in tuberculin skin test and interferon γ-release assays. More recently, M. tuberculosis whole-genome sequencing has been used to estimate population levels of recent transmission, identify the distribution of specific strains within communities, and decipher chains of transmission among culture-positive tuberculosis cases. The factors that drive the transmission of tuberculosis in communities depend on the burden of prevalent tuberculosis; the ways in which individuals live, work, and interact (eg, congregate settings); and the capacity of healthcare and public health systems to identify and effectively treat individuals with infectious forms of tuberculosis. Here we provide an overview of these factors, describe tools for measurement of ongoing transmission, and highlight knowledge gaps that must be addressed. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  16. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  17. High-Performance CCSDS AOS Protocol Implementation in FPGA

    Science.gov (United States)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  18. Cultural Transmission of Civicness

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    2012-01-01

    This paper estimates the intergeneration transmission of civicness by studying second generation immigrants in 29 European countries with ancestry in 83 nations. There is significant transmission of civicness both on the mother’s and the father’s side. The estimates are quantitatively significant...

  19. Cultural Transmission of Civicness

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the intergeneration transmission of civicness by studying second generation immigrants in 29 European countries with ancestry in 83 nations. There is significant transmission of civicness both on the mother’s and the father’s side. The estimates are quantitatively significant...

  20. Poverty and price transmission

    DEFF Research Database (Denmark)

    Elleby, Christian

    A key parameter determining the welfare impact from a world market shock is the transmission elasticity which measures the average domestic response to an international price change. Many studies have estimated price transmission elasticities for a large number of countries but the variation in t...

  1. Transmission market support system

    International Nuclear Information System (INIS)

    Reinschmidt, K.F.; Coles, B.C.

    1995-01-01

    An interactive, computer-based market support system has been developed for transmission access that is efficient, equitable, and fair to all parties concerned with electrical transmission: utilities, electric generators, owners of transmission networks, and wholesale purchasers of electrical power. Each participant transmits electronically to the computer system his proposed price schedule for buying, selling, or transmitting power for each future time period. The price for transmission on a single line in one direction can differ from the price in the other direction. The total quantity offered in the transmission bid represents the capacity of the line, and the flow on the line cannot exceed this value. The system automatically computes the prices that clear the market; that is, the price that each generator receives at each bus, the price that each transmission operator receives on each line, and the price that each customer pays at each bus. The computer system maximizes the benefits to all three classes while satisfying the electrical characteristics of the transmission system by means of load flow calculations. Customers never pay more than their bid prices (but may pay less), and generators and transmission operators never receive less than their bid prices (but may receive more). The price at each bus applies to all buyers and sellers at that bus: all buyers at the same bus pay the same price and all generators at a bus receive the same price

  2. Pricing transmission services

    International Nuclear Information System (INIS)

    Haaden, E.

    1995-01-01

    The price structure for transmission of electric power through the main lines in Sweden is analyzed. After deregulation of the electricity market, the main transmission lines are owned by a separate national company, with no interests from the power producers. Comparisons are made to ideal marginal price structures. 6 refs

  3. Eliminating Perinatal HIV Transmission

    Centers for Disease Control (CDC) Podcasts

    In this podcast, CDC’s Dr. Steve Nesheim discusses perinatal HIV transmission, including the importance of preventing HIV among women, preconception care, and timely HIV testing of the mother. Dr. Nesheim also introduces the revised curriculum Eliminating Perinatal HIV Transmission intended for faculty of OB/GYN and pediatric residents and nurse midwifery students.

  4. Electric transmission technology

    International Nuclear Information System (INIS)

    Shah, K.R.

    1990-01-01

    Electric transmission technology has matured and can transmit bulk power more reliably and economically than the technology 10 years ago.In 1882, Marcel Depres transmitted 15 kW electric power at 2 kV, using a constant direct current; present transmission voltages have risen to ± 600 kV direct current (DC) and 765 kV alternating current (AC), and it is now possible to transmit bulk electric power at voltages as high as ± 1000 kV DC and 1500 kV AC. Affordable computer systems are now available to optimize transmission reliably. New materials have reduced the bulk of insulation for lines and equipment. New conducting materials and configurations have reduced losses in transmission. Advances in line structures and conductor motion, understanding of flashover characteristics of insulators and air-gaps and electrical performance of lines have resulted in more compact urban transmission lines. (author). 15 refs., 7 tabs., 11 figs

  5. Microwave energy transmission

    Energy Technology Data Exchange (ETDEWEB)

    Matsumoto, Hiroshi [Kyoto Univ. (Japan)

    1989-03-05

    Laying stress on the technological problems and effect on the environment of microwave energy transmission, recent scientific and engineering problems and related subjects are described. Because no fuel is required for the solar power generation, the power generation system can not be considered as an expensive one when the unit cost of energy is taken into consideration. Some of the important technological problems in the microwave energy transmission are accurate microwave beam control technology to receiving stations and improvement in the efficiency of transmission system. Microwave energy beam has effects on living bodies, communication, and plasma atmosphere of the earth. Microwave energy transmission using a space flyer unit is scheduled. Its objective is the development of microwave wireless transmission technology and the study of the correlation between high power microwave and ionosphere plasma. Experiments on such a small scale application as a microwave driven space ship to bring results seem also important. 12 refs., 13 figs.

  6. A new architecture and MAC protocol for fully flexible hybrid WDM/TDM PON

    NARCIS (Netherlands)

    Das, G.; Lannoo, B.; Jung, H.D.; Koonen, A.M.J.; Colle, D.; Pickavet, M.; Demeester, P.

    2009-01-01

    In this paper we propose a novel architecture and MAC protocol for a scalable, cost effective WDM / TDM PON providing fully flexible dynamic bandwidth allocation for upstream and downstream data transmission.

  7. [Perinatal HIV transmission prophylaxis in the Liege region].

    Science.gov (United States)

    Jacquet, Y; Hoyoux, C; Dresse, M F

    1998-08-01

    In Liège, since February 1994, Protocole ACTG 076 has been followed for prevention of perinatal transmission of VIH. The pregnant women are treated by AZT during pregnancy and delivery. The newborn is also treated during 6 weeks. Following this treatment strategy, vertical transmission rate of VIH has dropped from 25.6% to 8.7%. The PCR is particulary promising for the early detection of infection in newborn, but definitive conclusion about infective status of the newborn can't be done during the first week of life. The potential role of intrapartum transmission is now under evaluation in the hope to establish the safest mode of delivery.

  8. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  9. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  10. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  11. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  12. Cost characteristics of transmission

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    FERC regulation of transmission is predicated, at least in part, on a belief that, in the absence of regulation, some utilities would be able to exercise monopoly power and the ability to extract monopoly profits. This monopoly power follows from the view that transmission facilities inevitably are a natural monopoly for both economic and social/regulatory reasons. In the first part of this section the authors present the argument that transmission is a natural monopoly. They then consider the impact of this on regulation and the problems that that view creates

  13. Understanding Ebola Virus Transmission

    Directory of Open Access Journals (Sweden)

    Seth Judson

    2015-02-01

    Full Text Available An unprecedented number of Ebola virus infections among healthcare workers and patients have raised questions about our understanding of Ebola virus transmission. Here, we explore different routes of Ebola virus transmission between people, summarizing the known epidemiological and experimental data. From this data, we expose important gaps in Ebola virus research pertinent to outbreak situations. We further propose experiments and methods of data collection that will enable scientists to fill these voids in our knowledge about the transmission of Ebola virus.

  14. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  15. Transmissions in vehicles 2010

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    Within the international VDI congress 'Gears in vehicles 2010' of the VDI Wissensforum GmbH (Duesseldorf, Federal Republic of Germany) between 22nd and 23rd June, 2010, in Friedrichshafen (Federal Republic of Germany), the following lectures were held: (1) 8HP70H - The moldhybrid transmission from ZF - Cjallenges and achievements (P. Gutmann); (2) GETRAG boosted range extender - A highly flexible electric powertrain for maximum CO{sub 2} reduction (S. Huepkes); (3) E-Transmission between full-hybrid and E-drive (P. Tenberge); (4) Reducing NO{sub x} and particulate emissions in electrified drivelines (R. Kuberczyk); (5) Simulation aided HEV and EV development: from the component to the whole powertrain (A. Gacometti); (6) Investigations on operating behaviour of the optimized CVT hybrid driveline (B.-R. Hoehn); (7) Customer-oriented dimensioning of electrified drivetrains (M. Eghtessad); (8) Decentralized optimal control strategy for parallel hybrid electric vehicles (A. Frenkel); (9) The new generation 6-speed automatic transmission AF40 (G. Bednarek); (10) Customized mechatronic solutions for integrated transmission control units (M. Wieczorek); (11) The optimal automatic transmission for front-transverse applications - Planetary transmissions or dual clutch transmissions? (G. Gumpoltsberger); (12) The new shift-by-wire gearshift lever for the Audi A8 - Requirements and concept (T. Guttenbergere); (13) The new shift-by-wire gearshift lever for the Audi A8 - Realization (A. Giefer); (14) Fuel-efficient transmissions of the future: Calculation of the efficiency factor for vehicle transmissions (B. Volpert); (15) HT-ACM: A new polymer generation for static and dynamic gearbox sealing solutions (E. Osen); (16) 'Energy efficiency equipped solutions by SKF' for power train applications - A contribution to CO{sub 2} - emission reduction and sustainability (T. Bobke); (17) 6-Ratio planetary shift transmission controlled by 4 external brakes, and design

  16. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  17. A Review of Communications Protocol for Intelligent Remote Terminal Unit Development

    Directory of Open Access Journals (Sweden)

    Mohd Ruddin Ab. Ghani

    2013-11-01

    Full Text Available This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU. Supervisory Control and Data Acquisition (SCADA system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI and International Standard Organization (ISO. The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3, controller area network (CAN, International Electro-technical Commission (IEC 60870, transmission control protocol/internet protocol (TCP/IP.

  18. Transmission issues in Alberta

    International Nuclear Information System (INIS)

    Levson, D.

    2002-01-01

    This paper outlined the major issues and concerns facing users of the transmission system in Alberta. They include congestion management issues that make investors uncertain about power generation. It is necessary to know the difference between which transmission price signals will be faced by low cost cogeneration at Fort McMurray and Cold Lake coal-fired generation near Edmonton compared to combined cycle gas generation near Calgary. Import and export policy tariffs are another concern. Most new generation opportunities in Alberta require access to export markets, but transmission facilities for export need policy support and appropriate tariffs. It was noted that the past actions of Alberta's Transmission Administrator and balancing pool may be distorting market signals for ancillary service markets, and that loss studies and calculations need upgrading

  19. Kansas Electric Transmission Lines

    Data.gov (United States)

    Kansas Data Access and Support Center — This data set is a digital representation of the EletcircTransmission lines for the State of Kansas as maintained by the Kansas Corporation Commission. Data is...

  20. ECRH transmission system

    International Nuclear Information System (INIS)

    Tancredi, J.

    1983-01-01

    Hughes, Electron Dynamics Division is developing gyrotrons for ECRH requirements. In the development program, techniques have been evolved for transmission system components. These techniques include over-moded waveguide tapers, high average power windows, and rf water loads for testing

  1. Electric Power Transmission Lines

    Data.gov (United States)

    Department of Homeland Security — Transmission Lines are the system of structures, wires, insulators and associated hardware that carry electric energy from one point to another in an electric power...

  2. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  3. Investigating a reduced size real-time transport protocol for low-bandwidth networks

    CSIR Research Space (South Africa)

    Kakande, JN

    2011-09-01

    Full Text Available in this work as RTP-Lite, requires investigation. A cyclical approach to compression of the RTP headers was used with different compression cycle patterns for Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) transport. Measurements over...

  4. Mosquito transmission of the rodent malaria parasite Plasmodium chabaudi

    Directory of Open Access Journals (Sweden)

    Spence Philip J

    2012-12-01

    Full Text Available Abstract Background Serial blood passage of Plasmodium increases virulence, whilst mosquito transmission inherently regulates parasite virulence within the mammalian host. It is, therefore, imperative that all aspects of experimental malaria research are studied in the context of the complete Plasmodium life cycle. Methods Plasmodium chabaudi chabaudi displays many characteristics associated with human Plasmodium infection of natural mosquito vectors and the mammalian host, and thus provides a unique opportunity to study the pathogenesis of malaria in a single infection setting. An optimized protocol that permits efficient and reproducible vector transmission of P. c. chabaudi via Anopheles stephensi was developed. Results and conclusions This protocol was utilized for mosquito transmission of genetically distinct P. c. chabaudi isolates, highlighting differential parasite virulence within the mosquito vector and the spectrum of host susceptibility to infection initiated via the natural route, mosquito bite. An apposite experimental system in which to delineate the pathogenesis of malaria is described in detail.

  5. Secure and Reliable IPTV Multimedia Transmission Using Forward Error Correction

    Directory of Open Access Journals (Sweden)

    Chi-Huang Shih

    2012-01-01

    Full Text Available With the wide deployment of Internet Protocol (IP infrastructure and rapid development of digital technologies, Internet Protocol Television (IPTV has emerged as one of the major multimedia access techniques. A general IPTV transmission system employs both encryption and forward error correction (FEC to provide the authorized subscriber with a high-quality perceptual experience. This two-layer processing, however, complicates the system design in terms of computational cost and management cost. In this paper, we propose a novel FEC scheme to ensure the secure and reliable transmission for IPTV multimedia content and services. The proposed secure FEC utilizes the characteristics of FEC including the FEC-encoded redundancies and the limitation of error correction capacity to protect the multimedia packets against the malicious attacks and data transmission errors/losses. Experimental results demonstrate that the proposed scheme obtains similar performance compared with the joint encryption and FEC scheme.

  6. Airspace: Antarctic Sound Transmission

    OpenAIRE

    Polli, Andrea

    2009-01-01

    This paper investigates how sound transmission can contribute to the public understanding of climate change within the context of the Poles. How have such transmission-based projects developed specifically in the Arctic and Antarctic, and how do these works create alternative pathways in order to help audiences better understand climate change? The author has created the media project Sonic Antarctica from a personal experience of the Antarctic. The work combines soundscape recordings and son...

  7. Offshore Transmission Technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-10-15

    The purpose of this document is to give an overview of offshore electricity transmission technologies. In particular this document is concerned with the use of High Voltage Direct Current (HVDC) systems and more specifically with the development of Voltage Source Converter (VSC) technology. This report outlines the current state of the main technology groups required for offshore HVDC transmission as well as giving examples of offshore projects (both current and future). Finally some indications of likely unit costs for HV assets are given.

  8. Eliminating Perinatal HIV Transmission

    Centers for Disease Control (CDC) Podcasts

    2012-11-26

    In this podcast, CDC’s Dr. Steve Nesheim discusses perinatal HIV transmission, including the importance of preventing HIV among women, preconception care, and timely HIV testing of the mother. Dr. Nesheim also introduces the revised curriculum Eliminating Perinatal HIV Transmission intended for faculty of OB/GYN and pediatric residents and nurse midwifery students.  Created: 11/26/2012 by Division of HIV/AIDS Prevention.   Date Released: 11/26/2012.

  9. Performance of amplify-and-forward multihop transmission over relay clusters with different routing strategies

    KAUST Repository

    Yilmaz, Ferkan; Khan, Fahd Ahmed; Alouini, Mohamed-Slim

    2014-01-01

    We consider a multihop relay network in which two terminals are communicating with each other via a number of cluster of relays. Performance of such networks depends on the routing protocols employed. In this paper, we find the expressions for the Average Symbol Error Probability (ASEP) performance of Amplify-and-Forward (AF) multihop transmission for the simplest routing protocol in which the relay transmits using the channel having the best Signal to Noise Ratio (SNR). The ASEP performance of a better protocol proposed in Gui et al. (2009) known as the adhoc protocol is also analyzed. The derived expressions for the performance are a convenient tool to analyze the performance of AF multihop transmission over relay clusters. Monte-Carlo simulations verify the correctness of the proposed formulation and are in agreement with analytical results. Furthermore, we propose new generalized protocols termed as last-nhop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol, to get improved ASEP performances. The ASEP performance of these proposed schemes is analysed by computer simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forwardbackward variant. The complexity of the protocols is also studied. Copyright © 2014 Inderscience Enterprises Ltd.

  10. Optical analog transmission device

    International Nuclear Information System (INIS)

    Ikawa, Shinji.

    1994-01-01

    The present invention concerns a device such as electro-optical conversion elements, optoelectric-electric elements and optical transmission channel, not undergoing deleterious effects on the efficiency of conversion and transmission due to temperature, and aging change. That is, a sine wave superposing means superposes, on a detector signal to be transmitted, a sine-wave signal having a predetermined amplitude and at a frequency lower than that of the detector signal. An optoelectric conversion means converts the electric signal as the signal of the sine-wave signal superposing means into an optical signal and outputs the same to an optical transmitting channel. The optoelectric conversion means converts the transmitted signal to an electric signal. A discriminating means discriminates the electric signal into a detector signal and a sine-wave signal. A calculating means calculates an optical transmitting efficiency of the transmitting channel based on the amplitude of the discriminated sine-wave signal. A processing means compensates an amplitude value of the detector signals discriminated by the discriminating means based on the optical transmission efficiency. As a result, an optical analog transmission device can be attained, which conducts optical transmission at a high accuracy without undergoing the defective effects of the optical transmission efficiency. (I.S.)

  11. National transmission grid study

    Energy Technology Data Exchange (ETDEWEB)

    Abraham, Spencer [USDOE Office of the Secretary of Energy, Washington, DC (United States)

    2003-05-31

    The National Energy Policy Plan directed the U.S. Department of Energy (DOE) to conduct a study to examine the benefits of establishing a national electricity transmission grid and to identify transmission bottlenecks and measures to address them. DOE began by conducting an independent analysis of U.S. electricity markets and identifying transmission system bottlenecks using DOE’s Policy Office Electricity Modeling System (POEMS). DOE’s analysis, presented in Section 2, confirms the central role of the nation’s transmission system in lowering costs to consumers through increased trade. More importantly, DOE’s analysis also confirms the results of previous studies, which show that transmission bottlenecks and related transmission system market practices are adding hundreds of millions of dollars to consumers’ electricity bills each year. A more detailed technical overview of the use of POEMS is provided in Appendix A. DOE led an extensive, open, public input process and heard a wide range of comments and recommendations that have all been considered.1 More than 150 participants registered for three public workshops held in Detroit, MI (September 24, 2001); Atlanta, GA (September 26, 2001); and Phoenix, AZ (September 28, 2001).

  12. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  13. Wireless data signal transmission system

    DEFF Research Database (Denmark)

    2014-01-01

    The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver.......The present invention relates to a method for providing a radio frequency signal for transmission, a system for providing a radio frequency signal for transmission and a method for wireless data transmission between a transmitter and a receiver....

  14. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  15. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  16. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  17. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Popovski, Petar

    2018-01-01

    In many practical wireless systems, the signal-to-interference-and-noise ratio (SINR) that is applicable to a certain transmission, referred to as channel state information (CSI), can only be learned after the transmission has taken place and is thereby delayed (outdated). In such systems, hybrid...... automatic repeat request (HARQ) protocols are often used to achieve high throughput with low latency. This paper put forth the family of expandable message space (EMS) protocols that generalize the HARQ protocol and allow for rate adaptation based on delayed CSI at the transmitter (CSIT). Assuming a block...

  18. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  19. Outage Analysis of Cooperative Transmission with Energy Harvesting Relay: Time Switching versus Power Splitting

    Directory of Open Access Journals (Sweden)

    Guanyao Du

    2015-01-01

    Full Text Available This paper investigates the multiuser transmission network with an energy harvesting (EH cooperative relay, where a source transmits independent information to multiple destinations with the help of an energy constrained relay. The relay can harvest energy from the radio frequency (RF signals transmitted from the source, and it helps the multiuser transmission only by consuming the harvested energy. By adopting the time switching and the power splitting relay receiver architectures, we firstly propose two protocols, the time switching cooperative multiuser transmission (TSCMT protocol and the power splitting cooperative multiuser transmission (PSCMT protocol, to enable the simultaneous information processing and EH at the relay for the system. To evaluate the system performance, we theoretically analyze the system outage probability for the two proposed protocols and then derive explicit expressions for each of them, respectively. Numerical results are provided to demonstrate the accuracy of our analytical results and reveal that compared with traditional noncooperative scheme our proposed protocols are green solutions to offer reliable communication and lower system outage probability without consuming additional energy. In particular, for the same transmit power at the source, the PSCMT protocol is superior to the TSCMT protocol to obtain lower system outage probability.

  20. Transmission line capital costs

    International Nuclear Information System (INIS)

    Hughes, K.R.; Brown, D.R.

    1995-05-01

    The displacement or deferral of conventional AC transmission line installation is a key benefit associated with several technologies being developed with the support of the U.S. Department of Energy's Office of Energy Management (OEM). Previous benefits assessments conducted within OEM have been based on significantly different assumptions for the average cost per mile of AC transmission line. In response to this uncertainty, an investigation of transmission line capital cost data was initiated. The objective of this study was to develop a database for preparing preliminary estimates of transmission line costs. An extensive search of potential data sources identified databases maintained by the Bonneville Power Administration (BPA) and the Western Area Power Administration (WAPA) as superior sources of transmission line cost data. The BPA and WAPA data were adjusted to a common basis and combined together. The composite database covers voltage levels from 13.8 to 765 W, with cost estimates for a given voltage level varying depending on conductor size, tower material type, tower frame type, and number of circuits. Reported transmission line costs vary significantly, even for a given voltage level. This can usually be explained by variation in the design factors noted above and variation in environmental and land (right-of-way) costs, which are extremely site-specific. Cost estimates prepared from the composite database were compared to cost data collected by the Federal Energy Regulatory Commission (FERC) for investor-owned utilities from across the United States. The comparison was hampered because the only design specifications included with the FERC data were voltage level and line length. Working within this limitation, the FERC data were not found to differ significantly from the composite database. Therefore, the composite database was judged to be a reasonable proxy for estimating national average costs

  1. Transmission positron microscopes

    International Nuclear Information System (INIS)

    Doyama, Masao; Kogure, Yoshiaki; Inoue, Miyoshi; Kurihara, Toshikazu; Yoshiie, Toshimasa; Oshima, Ryuichiro; Matsuya, Miyuki

    2006-01-01

    Immediate and near-future plans for transmission positron microscopes being built at KEK, Tsukuba, Japan, are described. The characteristic feature of this project is remolding a commercial electron microscope to a positron microscope. A point source of electrons kept at a negative high voltage is changed to a point source of positrons kept at a high positive voltage. Positional resolution of transmission microscopes should be theoretically the same as electron microscopes. Positron microscopes utilizing trapping of positrons have always positional ambiguity due to the diffusion of positrons

  2. ETR transmission systems

    International Nuclear Information System (INIS)

    Metzler, D.

    1983-01-01

    The presentation concentrates on factors associated with transmission systems for reactors and/or reactor relevant devices. For present day mirrors and their upgrades where power levels are in the few hundred kW range, waveguide systems with mode control are preferred. Beyond the early 1990's time frame are the ETR DEMO and reactor devices. These require injected power levels of about 75 MW. If only power oscillators are available at that time, then a MARS like transmission system may be appropriate or possibly a guided wave waveguide

  3. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  4. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  5. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  6. A Performance Evaluation of NACK-Oriented Protocols as the Foundation of Reliable Delay- Tolerant Networking Convergence Layers

    Science.gov (United States)

    Iannicca, Dennis; Hylton, Alan; Ishac, Joseph

    2012-01-01

    Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.

  7. Towards an optimal transmission system

    International Nuclear Information System (INIS)

    Calviou, M.

    2005-01-01

    This presentation provided background on National Grid USA and discussed transmission investment in the United States (US) and United Kingdom. It also discussed barriers to transmission investments and improvements, thoughts on solutions and a long-term vision. The presentation identified that transmission investment should follow from clear reliability rules designed to promote better operation and management; investment does not necessarily mean new rights-of-way; and transmission investment should target benefits to customers. It was stated that US transmission investment levels have decreased. A comparison between US and UK transmission investment was presented along with a chart of increasing US congestion costs. Barriers to investment in US transmission include vertical integration; misperception of transmission as a market product; federal and state jurisdiction issues; fragmentation in transmission ownership and operation; rate cap based plans that impact transmission; lack of clarity in cost allocation; and the site selection process. Possible solutions include policy and incentives, promoting independence and resolving structural issues. tabs., figs

  8. Automated transmission system operation and management : meeting stakeholder information needs

    Energy Technology Data Exchange (ETDEWEB)

    Peelo, D.F.; Toom, P.O. [British Columbia Hydro, Vancouver, BC (Canada)

    1998-12-01

    Information monitoring is considered to be the fundamental basis for moving beyond substation automation and into automated transmission system operation and management. Information monitoring was defined as the acquisition of data and processing the data into decision making. Advances in digital technology and cheaper, more powerful computing capability has made it possible to capture all transmission stakeholder needs in a shared and automated operation and management system. Recognizing that the key to success in the development of transmission systems is automation, BC Hydro has initiated a long-term research and development project to develop the structure and detail of transmission system automation. The involvement of partners, be they utility or equipment suppliers, is essential in order to deal with protocol and similar issues. 3 refs., 1 tab., 3 figs.

  9. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  10. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  11. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  12. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  13. Watching Handball Transmissions

    DEFF Research Database (Denmark)

    Frandsen, Kirsten

    2010-01-01

    and competent when mastering the game and in relation to others. The study shows that entertainment concerns both affective involvement and identity formation, as social and cultural meaning seem to be at the root of involvement. Even though both men and women find great joy in the transmissions, their viewing...

  14. Intergenerational Transmission of Volunteering

    NARCIS (Netherlands)

    Bekkers, René

    2007-01-01

    In this article, I investigate the strength of intergenerational transmission of volunteering for non-profit associations in The Netherlands. Data from the Family Survey of the Dutch Population 2000 reveal that there are significant relations between current volunteering and parental volunteering in

  15. Open access to transmission

    International Nuclear Information System (INIS)

    Keith, D.M.

    1996-01-01

    For the past 12 to 15 years, the US electric power and energy industry and its federal regulators have been going through a prolonged exercise leading to opening up the national interconnected transmission grid for all qualified wholesale users to have open and equal access. The debates have been painful in a sense that not all parties - especially some of the transmission system owning utilities - believe that the concept of Open Access is achievable, due to technical constraints on the systems. The present Open Access activity is limited to wholesales transaction under the federal jurisdiction, but several states are either experimenting with or considering retail wheeling. In fact, the FERC - Federal Energy Regulatory Commission - has already expanded its view to embrace retail transmission, if the retail transaction involves the use of the interstate transmission systems which are under FERC's jurisdiction. This paper delves into some of the results of the technical cost and pricing analysis for open access. The statutes and resulting regulations are not addressed herein. (author). 1 fig

  16. Intergenerational transmission of volunteerism

    NARCIS (Netherlands)

    Bekkers, R.H.F.P.

    2007-01-01

    In this article, I investigate the strength of intergenerational transmission of volunteering for non-profit associations in The Netherlands. Data from the Family Survey of the Dutch Population 2000 reveal that there are significant relations between current volunteering and parental volunteering in

  17. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  18. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  19. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  20. Security Property Validation of the Sensor Network Encryption Protocol (SNEP

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2015-07-01

    Full Text Available Since wireless sensor networks (WSNs have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA, named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

  1. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels

    Directory of Open Access Journals (Sweden)

    Seung Min Hur

    2009-06-01

    Full Text Available We study the problem of how to alleviate the exposed terminal effect in multihop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that schedules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multihop wireless networks.

  2. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  3. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  4. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  5. Improving Wojcik's eavesdropping attack on the ping-pong protocol

    International Nuclear Information System (INIS)

    Zhang Zhanjun; Man Zhongxiao; Li Yong

    2004-01-01

    The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme only induces half of the eavesdropping-induced channel loss in Wojcik's scheme, therefore, in a larger domain of the quantum channel transmission efficiency η, i.e., [0,75%], the eavesdropper Eve can attack all the transmitted bits. The improvement of the ping-pong protocol security produced by Wojcik's is also suitable for our eavesdropping attack

  6. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  7. Processing scarce biological samples for light and transmission electron microscopy

    Directory of Open Access Journals (Sweden)

    P Taupin

    2008-06-01

    Full Text Available Light microscopy (LM and transmission electron microscopy (TEM aim at understanding the relationship structure-function. With advances in biology, isolation and purification of scarce populations of cells or subcellular structures may not lead to enough biological material, for processing for LM and TEM. A protocol for preparation of scarce biological samples is presented. It is based on pre-embedding the biological samples, suspensions or pellets, in bovine serum albumin (BSA and bis-acrylamide (BA, cross-linked and polymerized. This preparation provides a simple and reproducible technique to process biological materials, present in limited quantities that can not be amplified, for light and transmission electron microscopy.

  8. FPGA Implementation of Video Transmission System Based on LTE

    Directory of Open Access Journals (Sweden)

    Lu Yan

    2015-01-01

    Full Text Available In order to support high-definition video transmission, an implementation of video transmission system based on Long Term Evolution is designed. This system is developed on Xilinx Virtex-6 FPGA ML605 Evaluation Board. The paper elaborates the features of baseband link designed in Xilinx ISE and protocol stack designed in Xilinx SDK, and introduces the process of setting up hardware and software platform in Xilinx XPS. According to test, this system consumes less hardware resource and is able to transmit bidirectional video clearly and stably.

  9. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  10. Mechanisms, Transmissions and Applications

    CERN Document Server

    Corves, Burkhard

    2012-01-01

    The first Workshop on Mechanisms, Transmissions and Applications -- MeTrApp-2011 was organized by the Mechatronics Department at the Mechanical Engineering Faculty, “Politehnica” University of Timisoara, Romania, under the patronage of the IFToMM Technical Committees Linkages and Mechanical Controls and Micromachines. The workshop brought together researchers and students who work in disciplines associated with mechanisms science and offered a great opportunity for scientists from all over the world to present their achievements, exchange innovative ideas and create solid international links, setting the trend for future developments in this important and creative field. The topics treated in this volume are mechanisms and machine design, mechanical transmissions, mechatronic and biomechanic applications, computational and experimental methods, history of mechanism and machine science and teaching methods.

  11. Wireless transmission of power

    International Nuclear Information System (INIS)

    Grotz, T.

    1991-01-01

    This paper reports that it has been proven by researchers that electrical energy can be propagated around the world between the surface of the Earth and the ionosphere at extremely low frequencies in what is known as the Schumann Cavity. Experiments to data have shown that electromagnetic waves with frequencies in the range of 8 Hz, the fundamental Schumann Resonance frequency, propagate with litter attenuation around the planet within the Schumann Cavity. It is the intent of this research to determine if the Schumann Cavity can be resonated, if the power that is delivered to the cavity propagated with very low losses, and if power can be extracted at other locations within the cavity. Experimental data collected and calculations made in recent years support the hypothesis that wireless power transmission is a viable and practical alternative to the present systems of power transmission

  12. Regional transmission subsystem planning

    Energy Technology Data Exchange (ETDEWEB)

    Costa Bortoni, Edson da [Quadrante Softwares Especializados Ltda., Itajuba, MG (Brazil); Bajay, Sergio Valdir; Barros Correia, Paulo de [Universidade Estadual de Campinas, SP (Brazil). Faculdade de Engenharia Mecanica; Santos, Afonso Henriques Moreira; Haddad, Jamil [Escola Federal de Engenharia de Itajuba, MG (Brazil)

    1994-12-31

    This work presents an approach for the planning of transmission systems by employing mixed--integer linear programming to obtain a cost and operating characteristics optimized system. The voltage loop equations are written in a modified form, so that, at the end of the analysis, the model behaves as a DC power flow, with the help of the two Kirchhoff`s laws, exempting the need of interaction with an external power flow program for analysis of the line loading. The model considers the occurrence of contingencies, so that the final result is a network robust to the most severe contingencies. This whole technique is adapted to the regional electric power transmission subsystems. (author) 9 refs., 4 figs.

  13. Does automatic transmission improve driving behavior in older drivers?

    Science.gov (United States)

    Selander, Helena; Bolin, Ingrid; Falkmer, Torbjörn

    2012-01-01

    Most older drivers continue to drive as they age. To maintain safe and independent transport, mobility is important for all individuals, but especially for older drivers. The objective of this study was to investigate whether automatic transmission, compared with manual transmission, may improve the driving behavior of older drivers. In total, 31 older drivers (mean age 75.2 years) and 32 younger drivers - used as a control group (mean age 39.2 years) - were assessed twice on the same fixed route; once in a car with manual transmission and once in a car with automatic transmission. The cars were otherwise identical. The driving behavior was assessed with the Ryd On-Road Assessment driving protocol. Time to completion of left turns (right-hand side driving) and the impact of a distraction task were measured. The older group had more driving errors than the younger group, in both the manual and the automatic transmission car. However, and contrary to the younger drivers, automatic transmission improved the older participants' driving behavior as demonstrated by safer speed adjustment in urban areas, greater maneuvering skills, safer lane position and driving in accordance with the speed regulations. Switching to automatic transmission may be recommended for older drivers as a means to maintain safe driving and thereby the quality of their transport mobility. Copyright © 2011 S. Karger AG, Basel.

  14. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  15. Available transmission capacity assessment

    Directory of Open Access Journals (Sweden)

    Škokljev Ivan

    2012-01-01

    Full Text Available Effective power system operation requires the analysis of vast amounts of information. Power market activities expose power transmission networks to high-level power transactions that threaten normal, secure operation of the power system. When there are service requests for a specific sink/source pair in a transmission system, the transmission system operator (TSO must allocate the available transfer capacity (ATC. It is common that ATC has a single numerical value. Additionally, the ATC must be calculated for the base case configuration of the system, while generation dispatch and topology remain unchanged during the calculation. Posting ATC on the internet should benefit prospective users by aiding them in formulating their requests. However, a single numerical value of ATC offers little for prospect for analysis, planning, what-if combinations, etc. A symbolic approach to the power flow problem (DC power flow and ATC offers a numerical computation at the very end, whilst the calculation beforehand is performed by using symbols for the general topology of the electrical network. Qualitative analysis of the ATC using only qualitative values, such as increase, decrease or no change, offers some new insights into ATC evaluation, multiple transactions evaluation, value of counter-flows and their impact etc. Symbolic analysis in this paper is performed after the execution of the linear, symbolic DC power flow. As control variables, the mathematical model comprises linear security constraints, ATC, PTDFs and transactions. The aim is to perform an ATC sensitivity study on a five nodes/seven lines transmission network, used for zonal market activities tests. A relatively complicated environment with twenty possible bilateral transactions is observed.

  16. Dynamic Strategic Information Transmission

    OpenAIRE

    Mikhail Golosov; Vasiliki Skreta; Aleh Tsyvinski; Andrea Wilson

    2011-01-01

    This paper studies strategic information transmission in a dynamic environment where, each period, a privately informed expert sends a message and a decision maker takes an action. Our main result is that, in contrast to a static environment, full information revelation is possible. The gradual revelation of information and the eventual full revelation is supported by the dynamic rewards and punishments. The construction of a fully revealing equilibrium relies on two key features. The first f...

  17. Operational electricity transmission rates

    International Nuclear Information System (INIS)

    Roggen, M.

    1997-01-01

    In a liberalized electricity market both the consumers and the producers of electricity must pay for the use of the power transmission network. Thus, the net manager has unlimited options to realize efficiency improvements. A neutral and transparent management of the power grid is necessary to avoid disturbance of the market. KEMA Consulting translated abstract ideas and strategic advices to operational concepts in its report 'A framework for the determination of tariffs of the transport in the Dutch electricity sector'

  18. [Mumps vaccine virus transmission].

    Science.gov (United States)

    Otrashevskaia, E V; Kulak, M V; Otrashevskaia, A V; Karpov, I A; Fisenko, E G; Ignat'ev, G M

    2013-01-01

    In this work we report the mumps vaccine virus shedding based on the laboratory confirmed cases of the mumps virus (MuV) infection. The likely epidemiological sources of the transmitted mumps virus were children who were recently vaccinated with the mumps vaccine containing Leningrad-Zagreb or Leningrad-3 MuV. The etiology of the described cases of the horizontal transmission of both mumps vaccine viruses was confirmed by PCR with the sequential restriction analysis.

  19. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  20. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  1. Small passenger car transmission test; Chevrolet LUV transmission

    Science.gov (United States)

    Bujold, M. P.

    1980-01-01

    A 1978 Chevrolet LUV manual transmission tested per the applicable portions of a passenger car automatic transmission test code (SAE J65lb) which required drive performance, coast performance, and no load test conditions. Under these test conditions, the transmission attained maximum efficiencies in the upper ninety percent range for both drive performance tests and coast performance tests. The major results of this test (torque, speed, and efficiency curves) are presented. Graphs map the complete performance characteristics for the Chevrolet LUV transmission.

  2. Benefits of transmission interconnections

    International Nuclear Information System (INIS)

    Lyons, D.

    2006-01-01

    The benefits of new power transmission interconnections from Alberta were discussed with reference to the challenges and measures needed to move forward. Alberta's electricity system has had a long period of sustained growth in generation and demand and this trend is expected to continue. However, no new interconnections have been built since 1985 because the transmission network has not expanded in consequence with the growth in demand. As such, Alberta remains weakly interconnected with the rest of the western region. The benefits of stronger transmission interconnections include improved reliability, long-term generation capability, hydrothermal synergies, a more competitive market, system efficiencies and fuel diversity. It was noted that the more difficult challenges are not technical. Rather, the difficult challenges lie in finding an appropriate business model that recognizes different market structures. It was emphasized that additional interconnections are worthwhile and will require significant collaboration among market participants and governments. It was concluded that interties enable resource optimization between systems and their benefits far exceed their costs. tabs., figs

  3. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  4. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  5. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  6. Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

    International Nuclear Information System (INIS)

    Chen-Xu, Feng; Rong-Zhen, Jiao; Wen-Han, Zhang

    2008-01-01

    The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310 nm up-conversion single-photon detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved. (general)

  7. Prioritizing Signaling Information Transmission in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Jasmina Baraković

    2011-01-01

    Full Text Available Next generation transport network is characterized by the use of in-band signaling, where Internet Protocol (IP packets carrying signaling or media information are mixed in transmission. Since transport resources are limited, when any segment of access or core network is congested, IP packets carrying signaling information may be discarded. As a consequence, it may be impossible to implement reachability and quality of service (QoS. Since present approaches are insufficient to completely address this problem, a novel approach is proposed, which is based on prioritizing signaling information transmission. To proof the concept, a simulation study was performed using Network Simulator version 2 (ns-2 and independently developed Session Initiation Protocol (SIP module. The obtained results were statistically processed using Statistical Package for the Social Sciences (SPSS version 15.0. Summarizing our research results, several issues are identified for future work.

  8. A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios.

    Science.gov (United States)

    Ai, Zheng-Yang; Zhou, Yu-Tong; Song, Fei

    2018-06-13

    It is knotty for current routing protocols to meet the needs of reliable data diffusion during the Internet of Things (IoT) deployments. Due to the random placement, limited resources and unattended features of existing sensor nodes, the wireless transmissions are easily exposed to unauthorized users, which becomes a vulnerable area for various malicious attacks, such as wormhole and Sybil attacks. However, the scheme based on geographic location is a suitable candidate to defend against them. This paper is inspired to propose a smart collaborative routing protocol, Geographic energy aware routing and Inspecting Node (GIN), for guaranteeing the reliability of data exchanging. The proposed protocol integrates the directed diffusion routing, Greedy Perimeter Stateless Routing (GPSR), and the inspecting node mechanism. We first discuss current wireless routing protocols from three diverse perspectives (improving transmission rate, shortening transmission range and reducing transmission consumption). Then, the details of GIN, including the model establishment and implementation processes, are presented by means of the theoretical analysis. Through leveraging the game theory, the inspecting node is elected to monitor the network behaviors. Thirdly, we evaluate the network performances, in terms of transmission delay, packet loss ratio, and throughput, between GIN and three traditional schemes (i.e., Flooding, GPSR, and GEAR). The simulation results illustrate that the proposed protocol is able to outperform the others.

  9. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    Science.gov (United States)

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  10. Rural emergency medical technician pre-hospital electrocardiogram transmission.

    Science.gov (United States)

    Powell, A M; Halon, J M; Nelson, J

    2014-01-01

    Emergent care of the acute heart attack patient continues to be at the forefront of quality and cost reduction strategies throughout the healthcare industry. Although the average cardiac door-to-balloon (D2B) times have decreased substantially over the past few years, there are still vast disparities found in D2B times in populations that reside in rural areas. Such disparities are mostly related to prolonged travel time and subsequent delays in cardiac catherization lab team activation. Urban ambulance companies that are routinely staffed with paramedic level providers have been successful in the implementation of pre-hospital 12-lead electrocardiogram (ECG) protocols as a strategy to reduce D2B times. The authors sought to evaluate the evidence related to the risk and benefits associated with the replication of an ECG transmission protocol in a small rural emergency medical service. The latter is staffed with emergency medical technician-basics (EMT-B), emergency medical technician-advanced (EMT-A), and emergency medical technician-intermediate (EMT-I) level. The evidence reviewed was limited to studies with relevant data regarding the challenges and complexities of the ECG transmission process, the difficulties associated with ECG transmission in rural settings, and ECG transmission outcomes by provider level. The evidence supports additional research to further evaluate the feasibility of ECG transmission at the non-paramedic level. Multiple variables must be investigated including equipment cost, utilization, and rural transmission capabilities. Clearly, pre-hospital ECG transmission and early activation of the cardiac catheterization laboratory are critical components to successfully decreasing D2B times.

  11. Our views on transmission policy

    International Nuclear Information System (INIS)

    Wellford, W.H.; Sutley, N.H.

    1990-01-01

    In this article the authors discuss the need for predictable and fair access to transmission facilities in order to ensure competitive generation of power. They propose that the Federal Energy Regulatory Commission should regulate transmission to prevent a utility from gaining a competitive advantage in electricity generation markets, the incorporation of transmission access into every bidding program under state jurisdiction, and requirement of transmission rates, terms and conditions for all in-state utilities be included in the request for proposal

  12. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  13. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  14. Some Protocols For Optical-Fiber Digital Communications

    Science.gov (United States)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  15. Parallel plate transmission line transformer

    NARCIS (Netherlands)

    Voeten, S.J.; Brussaard, G.J.H.; Pemen, A.J.M.

    2011-01-01

    A Transmission Line Transformer (TLT) can be used to transform high-voltage nanosecond pulses. These transformers rely on the fact that the length of the pulse is shorter than the transmission lines used. This allows connecting the transmission lines in parallel at the input and in series at the

  16. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  17. Improving UDP/IP Transmission Without Increasing Congestion

    Science.gov (United States)

    Burleigh, Scott

    2006-01-01

    Datagram Retransmission (DGR) is a computer program that, within certain limits, ensures the reception of each datagram transmitted under the User Datagram Protocol/Internet Protocol. [User Datagram Protocol (UDP) is considered unreliable because it does not involve a reliability-ensuring connection-initiation dialogue between sender and receiver. UDP is well suited to issuing of many small messages to many different receivers.] Unlike prior software for ensuring reception of UDP datagrams, DGR does not contribute to network congestion by retransmitting data more frequently as an ever-increasing number of messages and acknowledgements is lost. Instead, DGR does just the opposite: DGR includes an adaptive timeout-interval- computing component that provides maximum opportunity for reception of acknowledgements, minimizing retransmission. By monitoring changes in the rate at which message-transmission transactions are completed, DGR detects changes in the level of congestion and responds by imposing varying degrees of delay on the transmission of new messages. In addition, DGR maximizes throughput by not waiting for acknowledgement of a message before sending the next message. All DGR communication is asynchronous, to maximize efficient utilization of network connections. DGR manages multiple concurrent datagram transmission and acknowledgement conversations.

  18. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Hadeel Saleh Haj Aliwi

    2016-03-01

    Full Text Available Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway, and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway. The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.

  19. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  20. Planetary Transmission Diagnostics

    Science.gov (United States)

    Lewicki, David G. (Technical Monitor); Samuel, Paul D.; Conroy, Joseph K.; Pines, Darryll J.

    2004-01-01

    This report presents a methodology for detecting and diagnosing gear faults in the planetary stage of a helicopter transmission. This diagnostic technique is based on the constrained adaptive lifting algorithm. The lifting scheme, developed by Wim Sweldens of Bell Labs, is a time domain, prediction-error realization of the wavelet transform that allows for greater flexibility in the construction of wavelet bases. Classic lifting analyzes a given signal using wavelets derived from a single fundamental basis function. A number of researchers have proposed techniques for adding adaptivity to the lifting scheme, allowing the transform to choose from a set of fundamental bases the basis that best fits the signal. This characteristic is desirable for gear diagnostics as it allows the technique to tailor itself to a specific transmission by selecting a set of wavelets that best represent vibration signals obtained while the gearbox is operating under healthy-state conditions. However, constraints on certain basis characteristics are necessary to enhance the detection of local wave-form changes caused by certain types of gear damage. The proposed methodology analyzes individual tooth-mesh waveforms from a healthy-state gearbox vibration signal that was generated using the vibration separation (synchronous signal-averaging) algorithm. Each waveform is separated into analysis domains using zeros of its slope and curvature. The bases selected in each analysis domain are chosen to minimize the prediction error, and constrained to have the same-sign local slope and curvature as the original signal. The resulting set of bases is used to analyze future-state vibration signals and the lifting prediction error is inspected. The constraints allow the transform to effectively adapt to global amplitude changes, yielding small prediction errors. However, local wave-form changes associated with certain types of gear damage are poorly adapted, causing a significant change in the

  1. Coaxial transmission line - Equalization

    International Nuclear Information System (INIS)

    Bonnerue, J.L.; Fremont, Jacques; Haubtmann, Jack; Pillon, Gerard.

    1981-09-01

    The transmission of electrical signal through a coaxial line is not perfect and signal distortions are increased as much as the frequency spectrum is extended. We have designed and achieved passive filters (named equalizers) with transfer functions which are inverse of coaxial transfer functions. Doing so our attempt is to avoid definitive loss of information in the recorded data. The main feature of our equalization method lies in the fact it could be either an electrical or a numerical correction or both of them. Some examples in the use of this technique are also proposed [fr

  2. Dynamically prioritized progressive transmission

    Science.gov (United States)

    Blanford, Ronald

    1992-04-01

    Retrieval of image data from a centralized database may be subject to bandwidth limitations, whether due to a low-bandwidth communications link or to contention from simultaneous accesses over a high-bandwidth link. Progressive transmission can alleviate this problem by encoding image data so that any prefix of the data stream approximates the complete image at a coarse level of resolution. The longer the prefix, the finer the resolution. In many cases, as little at 1 percent of the image data may be sufficient to decide whether to discard the image, to permit the retrieval to continue, or to restrict retrieval to a subsection of the image. Our approach treats resolution not as a fixed attribute of the image, but rather as a resource which may be allocated to portions of the image at the direction of a user-specified priority function. The default priority function minimizes error by allocating more resolution to regions of high variance. The user may also point to regions of interest requesting priority transmission. More advanced target recognition strategies may be incorporated at the user's discretion. Multispectral imagery is supported. The user engineering implications are profounded. There is immediate response to a query that might otherwise take minutes to complete. The data is transmitted in small increments so that no single user dominates the communications bandwidth. The user-directed improvement means that bandwidth is focused on interesting information. The user may continue working with the first coarse approximations while further image data is still arriving. The algorithm has been implemented in C on Sun, Silicon Graphics, and NeXT workstations, and in Lisp on a Symbolics. Transmission speeds reach as high as 60,000 baud using a Sparc or 68040 processor when storing data to memory; somewhat less if also updating a graphical display. The memory requirements are roughly five bytes per image pixel. Both computational and memory costs may be reduced

  3. Research and Transmission

    Directory of Open Access Journals (Sweden)

    Denise Pumain

    2001-01-01

    Full Text Available The present situation provides a challenge for us to reconsider the necessary link between science and pedagogy, between research and the transmission of knowledge. The Ministry of National education has just inaugurated a broad consultation of teachers on every level with a view to modernising and giving coherence to the programs of secondary education. Armand Frémont will head the group of experts responsible for history and geography. Is this a coincidence? The changeover in the jury for t...

  4. Persistent RCSMA: A MAC Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

    Directory of Open Access Journals (Sweden)

    J. Alonso-Zárate

    2008-05-01

    Full Text Available The persistent relay carrier sensing multiple access (PRCSMA protocol is presented in this paper as a novel medium access control (MAC protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

  5. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  6. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  7. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  8. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  9. Economy of electric power transmission

    International Nuclear Information System (INIS)

    Manzoni, G.; Delfanti, M.

    2008-01-01

    An analysis is presented of the impact of H V and Ehv transmission costs on the final value of the kWh supplied, with reference both to transmission systems of the European type and to long distance point-to-point transmission links. The analysis is extended to A C transmission by underground cables and to Hvdc submarine and aerial links. In the European power system, the impact of transmission costs results to be usually modest, but it may become important in the case of network congestions [it

  10. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  11. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  12. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  13. Adaptive transmission based on multi-relay selection and rate-compatible LDPC codes

    Science.gov (United States)

    Su, Hualing; He, Yucheng; Zhou, Lin

    2017-08-01

    In order to adapt to the dynamical changeable channel condition and improve the transmissive reliability of the system, a cooperation system of rate-compatible low density parity check (RC-LDPC) codes combining with multi-relay selection protocol is proposed. In traditional relay selection protocol, only the channel state information (CSI) of source-relay and the CSI of relay-destination has been considered. The multi-relay selection protocol proposed by this paper takes the CSI between relays into extra account in order to obtain more chances of collabration. Additionally, the idea of hybrid automatic request retransmission (HARQ) and rate-compatible are introduced. Simulation results show that the transmissive reliability of the system can be significantly improved by the proposed protocol.

  14. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  15. Minimising the risk of prion transmission by contact tonometry.

    Science.gov (United States)

    Amin, S Z; Smith, L; Luthert, P J; Cheetham, M E; Buckley, R J

    2003-11-01

    The unknown prevalence of variant Creutzfeldt-Jakob disease (vCJD) in the UK population has led to fears of horizontal transmission through routine medical procedures. The potential risk of transmission via contact tonometry was examined. The total amount of protein carried over by tonometer tips after applanation of patients was assessed. Tonometer tips had an inherent ability to carry proteinaceous material. There was a large variability in the load carried over between individual patients. Rinsing tonometer tips in water reduced protein carryover. Wiping the tonometer tips also reduced carriage, though less dramatically. There is a small theoretical risk of transmission of vCJD by contact tonometry through reuse, but this should be reduced if the prisms are washed and wiped. In the light of these findings a protocol for the management of reusable tonometer prisms is recommended.

  16. FPGA-based network data transmission scheme for CSNS

    International Nuclear Information System (INIS)

    Wang Xiuku; Zhang Hongyu; Gu Minhao; Xiao Liang

    2012-01-01

    This paper presents the FPGA-based network data transmission solutions for the Data Acquisition System of China Spallation Neutron Source (CSNS). The board with FPGA as the core is used as the hardware platform to realize the transmission of network data. A SOPC system is built and an embedded Linux is transplanted on PowerPC Core. An application program based on Linux has been finished to realize the data transmission via embedded Gigabit Ethernet. The relationship between network transfer performance and packet size was obtained by a test program. In addition, the paper also tried to realize some other ways to transfer data: transplanting PetaLinux on Microblaze, transplanting Lwip protocol stack on PowerPC Core and Microblaze. Their advantages and disadvantages are analyzed and compared in this paper, so that different options and recommendations can be given to meet the actual needs of different projects in the future. (authors)

  17. Effective Data Acquisition Protocol for Multi-Hop Heterogeneous Wireless Sensor Networks Using Compressive Sensing

    Directory of Open Access Journals (Sweden)

    Ahmed M. Khedr

    2015-10-01

    Full Text Available In designing wireless sensor networks (WSNs, it is important to reduce energy dissipation and prolong network lifetime. Clustering of nodes is one of the most effective approaches for conserving energy in WSNs. Cluster formation protocols generally consider the heterogeneity of sensor nodes in terms of energy difference of nodes but ignore the different transmission ranges of them. In this paper, we propose an effective data acquisition clustered protocol using compressive sensing (EDACP-CS for heterogeneous WSNs that aims to conserve the energy of sensor nodes in the presence of energy and transmission range heterogeneity. In EDACP-CS, cluster heads are selected based on the distance from the base station and sensor residual energy. Simulation results show that our protocol offers a much better performance than the existing protocols in terms of energy consumption, stability, network lifetime, and throughput.

  18. Small passenger car transmission test-Chevrolet 200 transmission

    Science.gov (United States)

    Bujold, M. P.

    1980-01-01

    The small passenger car transmission was tested to supply electric vehicle manufacturers with technical information regarding the performance of commerically available transmissions which would enable them to design a more energy efficient vehicle. With this information the manufacturers could estimate vehicle driving range as well as speed and torque requirements for specific road load performance characteristics. A 1979 Chevrolet Model 200 automatic transmission was tested per a passenger car automatic transmission test code (SAE J651b) which required drive performance, coast performance, and no load test conditions. The transmission attained maximum efficiencies in the mid-eighty percent range for both drive performance tests and coast performance tests. Torque, speed and efficiency curves map the complete performance characteristics for Chevrolet Model 200 transmission.

  19. Centrifugation speed affects light transmission aggregometry.

    Science.gov (United States)

    Merolla, M; Nardi, M A; Berger, J S

    2012-02-01

    Light transmission aggregometry (LTA) is considered the gold standard for investigating platelet activity ex vivo. However, LTA protocols are not standardized, and differences in LTA procedure are a potential source of variance in results. Centrifugation speed is an essential component of platelet preparation in LTA, has yet to be standardized, and may affect platelet aggregation results. We sought to investigate the effect of relative centrifugal force (RCF) intensity on LTA results. Ten healthy controls had venous blood drawn and centrifuged at 150, 200, 300, and 500 g for 10 min. Cell counts in whole blood and platelet-rich plasma (PRP) were measured using a hematology analyzer. LTA was performed using 1.0 μm adenosine diphosphate (ADP) and 0.4 μm epinephrine as an agonist. Aggregation (%) was compared at 60, 120, 180, and 300 s and at maximum aggregation. Centrifugation speed was associated with decreasing platelet count (P centrifuge RCF at 60, 120, 180, 300 s and at maximum aggregation (P centrifugation speed in the interpretation of LTA results, supporting the need for standardization of centrifugation RCF in LTA protocols. © 2011 Blackwell Publishing Ltd.

  20. Quantitative biological measurement in Transmission Electron Tomography

    International Nuclear Information System (INIS)

    Mantell, Judith M; Verkade, Paul; Arkill, Kenton P

    2012-01-01

    It has been known for some time that biological sections shrink in the transmission electron microscope from exposure to the electron beam. This phenomenon is especially important in Electron Tomography (ET). The effect on shrinkage of parameters such as embedding medium or sample type is less well understood. In addition anisotropic area shrinkage has largely been ignored. The intention of this study is to explore the shrinkage on a number of samples ranging in thickness from 200 nm to 500 nm. A protocol was developed to determine the shrinkage in area and thickness using the gold fiducials used in electron tomography. In brief: Using low dose philosophy on the section, a focus area was used prior to a separate virgin study area for a series of known exposures on a tilted sample. The shrinkage was determined by measurements on the gold beads from both sides of the section as determined by a confirmatory tomogram. It was found that the shrinkage in area (approximately to 90-95% of the original) and the thickness (approximately 65% of the original at most) agreed with pervious authors, but that a lmost all the shrinkage was in the first minute and that although the direction of the in-plane shrinkage (in x and y) was sometimes uneven the end result was consistent. It was observed, in general, that thinner samples showed more percentage shrinkage than thicker ones. In conclusion, if direct quantitative measurements are required then the protocol described should be used for all areas studied.

  1. Quantitative biological measurement in Transmission Electron Tomography

    Science.gov (United States)

    Mantell, Judith M.; Verkade, Paul; Arkill, Kenton P.

    2012-07-01

    It has been known for some time that biological sections shrink in the transmission electron microscope from exposure to the electron beam. This phenomenon is especially important in Electron Tomography (ET). The effect on shrinkage of parameters such as embedding medium or sample type is less well understood. In addition anisotropic area shrinkage has largely been ignored. The intention of this study is to explore the shrinkage on a number of samples ranging in thickness from 200 nm to 500 nm. A protocol was developed to determine the shrinkage in area and thickness using the gold fiducials used in electron tomography. In brief: Using low dose philosophy on the section, a focus area was used prior to a separate virgin study area for a series of known exposures on a tilted sample. The shrinkage was determined by measurements on the gold beads from both sides of the section as determined by a confirmatory tomogram. It was found that the shrinkage in area (approximately to 90-95% of the original) and the thickness (approximately 65% of the original at most) agreed with pervious authors, but that a lmost all the shrinkage was in the first minute and that although the direction of the in-plane shrinkage (in x and y) was sometimes uneven the end result was consistent. It was observed, in general, that thinner samples showed more percentage shrinkage than thicker ones. In conclusion, if direct quantitative measurements are required then the protocol described should be used for all areas studied.

  2. Link-state-estimation-based transmission power control in wireless body area networks.

    Science.gov (United States)

    Kim, Seungku; Eom, Doo-Seop

    2014-07-01

    This paper presents a novel transmission power control protocol to extend the lifetime of sensor nodes and to increase the link reliability in wireless body area networks (WBANs). We first experimentally investigate the properties of the link states using the received signal strength indicator (RSSI). We then propose a practical transmission power control protocol based on both short- and long-term link-state estimations. Both the short- and long-term link-state estimations enable the transceiver to adapt the transmission power level and target the RSSI threshold range, respectively, to simultaneously satisfy the requirements of energy efficiency and link reliability. Finally, the performance of the proposed protocol is experimentally evaluated in two experimental scenarios-body posture change and dynamic body motion-and compared with the typical WBAN transmission power control protocols, a real-time reactive scheme, and a dynamic postural position inference mechanism. From the experimental results, it is found that the proposed protocol increases the lifetime of the sensor nodes by a maximum of 9.86% and enhances the link reliability by reducing the packet loss by a maximum of 3.02%.

  3. MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME

    Directory of Open Access Journals (Sweden)

    R. Shalin

    2012-09-01

    Full Text Available The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion. In order to provide a efficient communication it is necessary to recover the loss of packets. The proposed scheme implements Hash based FEC with auto XOR scheme for this purpose. The scheme is implemented through Forward error correction, MD5 and XOR for providing efficient transmission of multimedia data. The proposed scheme provides transmission high accuracy, throughput and low latency and loss.

  4. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  5. Transmission rights and market power

    International Nuclear Information System (INIS)

    Bushnell, J.

    1999-01-01

    Most of the concerns about physical transmission rights relate to the ability to implicitly or explicitly remove that transmission capacity from the market-place. Under a very strict form of physical right, owners could simply choose not to sell it if they don't want to use it. Modifications that require the release of spare capacity back into an open market could potentially alleviate this problem but there is concern that such releases would not occur far enough in advance to be of much use to schedulers. Similarly, the transmission capacity that is made available for use by non-rights holders can also be manipulated by the owners of transmission rights. The alternative form, financial transmission rights, provide to their owners congestion payments, but physical control of transmission paths. In electricity markets such as California's, even financial transmission rights could potentially be utilized to effectively withhold transmission capacity from the marketplace. However, methods for withholding transmission capacity are somewhat more convoluted, and probably more difficult, for owners of financial rights than for owners of physical rights. In this article, the author discusses some of the potential concerns over transmission rights and their use for the exercise of various forms of market power

  6. Stress transmission in soil

    DEFF Research Database (Denmark)

    Lamandé, Mathieu; Schjønning, Per

    We urgently need increased quantitative knowledge on stress transmission in real soils loaded with agricultural machinery. 3D measurements of vertical stresses under tracked wheels were performed in situ in a Stagnic Luvisol (clay content 20 %) continuously cropped with small grain cereals......). Seven load cells were inserted horizontally from a pit with minimal disturbance of soil in each of three depths (0.3, 0.6 and 0.9 m), covering the width of the wheeled area. The position of the wheel relative to the transducers was recorded using a laser sensor. Finally, the vertical stresses near...... the soil-tyre interface were measured in separate tests by 17 stress transducers across the width of the tyres. The results showed that the inflation pressure controlled the level of maximum stresses at 0.3 m depth, while the wheel load was correlated to the measured stresses at 0.9 m depth. This supports...

  7. Information transmission strategy

    International Nuclear Information System (INIS)

    Moreau, A.

    1989-01-01

    The four propositions on which our radiation protection information transmission strategy is based are as follows: 1. Emotion exists. It rules our lives at work as well as at home, particularly when radiation safety is involved. Emotion is therefore the terrain for our strategy. 2. The basic emotion is that of fear. This must be recognized and accepted if we want to transmit objective information. The basis of our strategy is therefore listening. 3. A person cannot be divided into parts. The whole person is concerned about safety. We have to deal with that whole person. 4. To follow a strategy we need strategists. We must look at our own emotions and our own motivation before going into the field

  8. Underground transmission tomography

    International Nuclear Information System (INIS)

    Geibka, C.

    1990-01-01

    Several underground tomographic transmission surveys have been carried out. Targets were cavities, ore veins and fault zones. Examples from measurements in a german heavy/fluor spar mine a lead/zinc mine and a rock laboratory of the Swiss National Cooperative for the Storage of Radioactive waste are presented. Measurements were carried out between boreholes and road ways. The recording equipment was the intrinsically safe SEAMEX85 system built and sold by WBK. Receivers were mounted in a chain of 6 two-component probes. Sources were an inhole hammer a sledge hammer a sparker and explosives from a single detonator to 180 g depending on the distance and absorption of the rock material. Cavities showed very distinct velocity reductions between 30 and 50%. Different vein material showed velocity reduction as well as velocity increase relative to the surrounding rock

  9. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  10. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  11. Measurements on wireless transmission of ECG signals

    International Nuclear Information System (INIS)

    Gabrielli, A.; Lax, I.

    2016-01-01

    The scope of this research is to design an electronic prototype, an operative system as a proof of concept, to transmit and receive biological parameters, in particular electrocardiogram signals, through dedicated wireless circuits. The apparatus features microelectronics chips that were developed for more general biomedical applications, here adapted to deal with cardiac signals. The paper mainly focuses on the electronic aspects, as in this study we do not face medical or clinical aspects of the system. The transmitter circuit uses a commercial instrumentation amplifier and the receiver has been equipped with wide-band amplifiers along with made-in-the-lab band-pass filters centered at the carrier. We have been able to mount the entire system prototype into a preliminary data acquisition chain that reads out the electrocardiogram signal. The prototype allows acquiring the waveform, converting it to a digital pattern and open the transmission through a series of high-frequency packets exploiting the Ultra Wide Band protocol. The sensor value is embedded in the transmission through the rate of the digital packets. In fact, these are sent wireless at a specific packet-frequency that depends on the sensor amplitude and are detected into a receiver circuit that recovers the information.

  12. Measurements on wireless transmission of ECG signals

    Science.gov (United States)

    Gabrielli, A.; Lax, I.

    2016-12-01

    The scope of this research is to design an electronic prototype, an operative system as a proof of concept, to transmit and receive biological parameters, in particular electrocardiogram signals, through dedicated wireless circuits. The apparatus features microelectronics chips that were developed for more general biomedical applications, here adapted to deal with cardiac signals. The paper mainly focuses on the electronic aspects, as in this study we do not face medical or clinical aspects of the system. The transmitter circuit uses a commercial instrumentation amplifier and the receiver has been equipped with wide-band amplifiers along with made-in-the-lab band-pass filters centered at the carrier. We have been able to mount the entire system prototype into a preliminary data acquisition chain that reads out the electrocardiogram signal. The prototype allows acquiring the waveform, converting it to a digital pattern and open the transmission through a series of high-frequency packets exploiting the Ultra Wide Band protocol. The sensor value is embedded in the transmission through the rate of the digital packets. In fact, these are sent wireless at a specific packet-frequency that depends on the sensor amplitude and are detected into a receiver circuit that recovers the information.

  13. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  14. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  15. A review on transport layer protocol performance for delivering video on an adhoc network

    Science.gov (United States)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  16. BTP: a Block Transfer Protocol for Delay Tolerant Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Biagioni, Edoardo S.

    2010-01-01

    Wireless sensor networks that are energy-constrained must transmit and receive data as efficiently as possible.  If the transmission is delay tolerant, transferring blocks of accumulated data can be more efficient than transferring each sensed measurement as soon as it is available.  This paper...... proposes a Block Transfer Protocol (BTP) designed for efficient and reliable transmission in wireless sensor networks.  BTP reduces the time it takes to reliably transfer a block of packets compared to conventional link layer protocols, by piggybacking in data packets information about the transfer......, minimizing the number of acknowledgements needed for reliable transmission, and reducing the need for timeouts, which can substantially slow down communication when transmission is unreliable.  In addition, BTP improves reliability by handling false positive acknowledgements and by letting the receivers...

  17. An Energy Balanced and Lifetime Extended Routing Protocol for Underwater Sensor Networks.

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Lu, Luxi

    2018-05-17

    Energy limitation is an adverse problem in designing routing protocols for underwater sensor networks (UWSNs). To prolong the network lifetime with limited battery power, an energy balanced and efficient routing protocol, called energy balanced and lifetime extended routing protocol (EBLE), is proposed in this paper. The proposed EBLE not only balances traffic loads according to the residual energy, but also optimizes data transmissions by selecting low-cost paths. Two phases are operated in the EBLE data transmission process: (1) candidate forwarding set selection phase and (2) data transmission phase. In candidate forwarding set selection phase, nodes update candidate forwarding nodes by broadcasting the position and residual energy level information. The cost value of available nodes is calculated and stored in each sensor node. Then in data transmission phase, high residual energy and relatively low-cost paths are selected based on the cost function and residual energy level information. We also introduce detailed analysis of optimal energy consumption in UWSNs. Numerical simulation results on a variety of node distributions and data load distributions prove that EBLE outperforms other routing protocols (BTM, BEAR and direct transmission) in terms of network lifetime and energy efficiency.

  18. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Osama Moh’d Alia

    2014-01-01

    Full Text Available Energy conservation in wireless sensor networks (WSNs is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network’s lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  19. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    Science.gov (United States)

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  20. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  1. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  2. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  3. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  4. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  5. Transmission diamond imaging detector

    Energy Technology Data Exchange (ETDEWEB)

    Smedley, John, E-mail: smedley@bnl.gov; Pinelli, Don; Gaoweia, Mengjia [Brookhaven National Laboratory, Upton, NY (United States); Muller, Erik; Ding, Wenxiang; Zhou, Tianyi [Stony Brook University, Stony Brook, NY (United States); Bohon, Jen [Case Center for Synchrotron Biosciences, Center for Proteomics and Bioinformatics, Case Western Reserve University, Cleveland, OH (United States)

    2016-07-27

    Many modern synchrotron techniques are trending toward use of high flux beams and/or beams which require enhanced stability and precise understanding of beam position and intensity from the front end of the beamline all the way to the sample. For high flux beams, major challenges include heat load management in optics (including the vacuum windows) and a mechanism of real-time volumetric measurement of beam properties such as flux, position, and morphology. For beam stability in these environments, feedback from such measurements directly to control systems for optical elements or to sample positioning stages would be invaluable. To address these challenges, we are developing diamond-based instrumented vacuum windows with integrated volumetric x-ray intensity, beam profile and beam-position monitoring capabilities. A 50 µm thick single crystal diamond has been lithographically patterned to produce 60 µm pixels, creating a >1kilopixel free-standing transmission imaging detector. This device, coupled with a custom, FPGA-based readout, has been used to image both white and monochromatic x-ray beams and capture the last x-ray photons at the National Synchrotron Light Source (NSLS). This technology will form the basis for the instrumented end-station window of the x-ray footprinting beamline (XFP) at NSLS-II.

  6. Control of schistosomiasis transmission

    Directory of Open Access Journals (Sweden)

    Luiz C. de S. Dias

    1995-04-01

    Full Text Available Despite the success of control programmes, schistosomiasis is still a serious public health problem in the world. More than 70 countries where 200 million individuals are evaluated to be infected of a total 600 million at risk. Though there have been important local success in the control of transmission, globally the infection has increased. Economic constrains in developing countries, environmental changes associated with migration and water resources development have been blocking the progress. The main objective of schistosomiasis control is to achieve reduction of disease due to schistosomiasis. We discussed the control measures like: health education, diagnosis and chemotherapy, safe water supplies, sanitation and snail control. We emphasized the need to give priority to school-age children and the importance of integrating the measures of control into locally available systems of health care. The control of schistosomiasis is directly related to the capacity of the preventive health services of an endemic country. The strategy of control requires long-term commitment from the international to the local level.

  7. Transmission acoustic microscopy investigation

    Science.gov (United States)

    Maev, Roman; Kolosov, Oleg; Levin, Vadim; Lobkis, Oleg

    The nature of acoustic contrast, i.e. the connection of the amplitude and phase of the output signal of the acoustic microscope with the local values of the acoustic parameters of the sample (density, elasticity, viscosity) is a central problem of acoustic microscopy. A considerable number of studies have been devoted to the formation of the output signal of the reflection scanning acoustic microscope. For the transmission acoustic microscope (TAM) this problem has remained almost unstudied. Experimental investigation of the confocal system of the TAM was carried out on an independently manufactured laboratory mockup of the TAM with the working frequency of the 420 MHz. Acoustic lenses with the radius of curvature of about 500 microns and aperture angle of 45 deg were polished out in the end faces of two cylindrical sound conductors made from Al2O3 single crystals with an axis parallel to the axis C of the crystal (the length of the sound conductor is 20 mm; diameter, 6 mm). At the end faces of the sound conductor, opposite to the lenses, CdS transducers with a diameter of 2 mm were disposed. The electric channel of the TAM provided a possibility for registering the amplitude of the microscope output signal in the case of the dynamic range of the 50 dB.

  8. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  9. Design of data transmission for a portable DAQ system

    International Nuclear Information System (INIS)

    Zhou Wenxiong; Nan Gangyang; Zhang Jianchuan; Wang Yanyu

    2014-01-01

    Field Programmable Gate Array (FPGA), combined with ARM (Advanced RISC Machines) is increasingly employed in the portable data acquisition (DAQ) system for nuclear experiments to reduce the system volume and achieve powerful and multifunctional capacity. High-speed data transmission between FPGA and ARM is one of the most challenging issues for system implementation. In this paper, we propose a method to realize the high-speed data transmission by using the FPGA to acquire massive data from FEE (Front-end electronics) and send it to the ARM whilst the ARM to transmit the data to the remote computer through the TCP/IP protocol for later process. This paper mainly introduces the interface design of the high-speed transmission method between the FPGA and the ARM, the transmission logic of the FPGA, and the program design of the ARM. The theoretical research shows that the maximal transmission speed between the FPGA and the ARM through this way can reach 50 MB/s. In a realistic nuclear physics experiment, this portable DAQ system achieved 2.2 MB/s data acquisition speed. (authors)

  10. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  11. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  12. HVDC power transmission technology assessment

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, R.L.; Tatro, P.J.; Railing, B.D. [New England Power Service Co., Westborough, MA (United States); Johnson, B.K.; Stewart, J.R. [Power Technologies, Inc., Schenectady, NY (United States); Fink, J.L.

    1997-04-01

    The purpose of this study was to develop an assessment of the national utility system`s needs for electric transmission during the period 1995-2020 that could be met by future reduced-cost HVDC systems. The assessment was to include an economic evaluation of HVDC as a means for meeting those needs as well as a comparison with competing technologies such as ac transmission with and without Flexible AC Transmission System (FACTS) controllers. The role of force commutated dc converters was to be assumed where appropriate. The assessment begins by identifying the general needs for transmission in the U.S. in the context of a future deregulated power industry. The possible roles for direct current transmission are then postulated in terms of representative scenarios. A few of the scenarios are illustrated with the help of actual U.S. system examples. non-traditional applications as well as traditional applications such as long lines and asynchronous interconnections are discussed. The classical ``break-even distance`` concept for comparing HVDC and ac lines is used to assess the selected scenarios. The impact of reduced-cost converters is reflected in terms of the break-even distance. This report presents a comprehensive review of the functional benefits of HVDC transmission and updated cost data for both ac and dc system components. It also provides some provocative thoughts on how direct current transmission might be applied to better utilize and expand our nation`s increasingly stressed transmission assets.

  13. Endoscopic transmission of Helicobacter pylori

    NARCIS (Netherlands)

    Tytgat, G. N.

    1995-01-01

    The contamination of endoscopes and biopsy forceps with Helicobacter pylori occurs readily after endoscopic examination of H. pylori-positive patients. Unequivocal proof of iatrogenic transmission of the organism has been provided. Estimates for transmission frequency approximate to 4 per 1000

  14. Transmission reliability faces future challenges

    International Nuclear Information System (INIS)

    Beaty, W.

    1993-01-01

    The recently published Washington International Energy Group's 1993 Electric Utility Outlook states that nearly one-third (31 percent) of U.S. utility executives expect reliability to decrease in the near future. Electric power system stability is crucial to reliability. Stability analysis determines whether a system will stay intact under normal operating conditions, during minor disturbances such as load fluctuations, and during major disturbances when one or more parts of the system fails. All system elements contribute to reliability or the lack of it. However, this report centers on the transmission segment of the electric system. The North American Electric Reliability Council (NERC) says the transmission systems as planned will be adequate over the next 10 years. However, delays in building new lines and increasing demands for transmission services are serious concerns. Reliability concerns exist in the Mid-Continent Area Power Pool and the Mid-America Interconnected Network regions where transmission facilities have not been allowed to be constructed as planned. Portions of the transmission systems in other regions are loaded at or near their limits. NERC further states that utilities must be allowed to complete planned generation and transmission as scheduled. A reliable supply of electricity also depends on adhering to established operating criteria. Factors that could complicate operations include: More interchange schedules resulting from increased transmission services. Increased line loadings in portions of the transmission systems. Proliferation of non-utility generators

  15. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  16. Energy neutral protocol based on hierarchical routing techniques for energy harvesting wireless sensor network

    Science.gov (United States)

    Muhammad, Umar B.; Ezugwu, Absalom E.; Ofem, Paulinus O.; Rajamäki, Jyri; Aderemi, Adewumi O.

    2017-06-01

    Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting techniques together with proper routing protocols, an Energy Neutral state can be achieved so that sensor nodes can run perpetually. In this paper, we propose an Energy Neutral LEACH routing protocol which is an extension to the traditional LEACH protocol. The goal of the proposed protocol is to use Gateway node in each cluster so as to reduce the data transmission ranges of cluster head nodes. Simulation results show that the proposed routing protocol achieves a higher throughput and ensure the energy neutral status of the entire network.

  17. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    Science.gov (United States)

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  18. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    Science.gov (United States)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  19. Energy Transmission and Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Mathison, Jane

    2012-12-31

    The objective of Energy Transmission and Infrastructure Northern Ohio (OH) was to lay the conceptual and analytical foundation for an energy economy in northern Ohio that will: • improve the efficiency with which energy is used in the residential, commercial, industrial, agricultural, and transportation sectors for Oberlin, Ohio as a district-wide model for Congressional District OH-09; • identify the potential to deploy wind and solar technologies and the most effective configuration for the regional energy system (i.e., the ratio of distributed or centralized power generation); • analyze the potential within the district to utilize farm wastes to produce biofuels; • enhance long-term energy security by identifying ways to deploy local resources and building Ohio-based enterprises; • identify the policy, regulatory, and financial barriers impeding development of a new energy system; and • improve energy infrastructure within Congressional District OH-09. This objective of laying the foundation for a renewable energy system in Ohio was achieved through four primary areas of activity: 1. district-wide energy infrastructure assessments and alternative-energy transmission studies; 2. energy infrastructure improvement projects undertaken by American Municipal Power (AMP) affiliates in the northern Ohio communities of Elmore, Oak Harbor, and Wellington; 3. Oberlin, OH-area energy assessment initiatives; and 4. a district-wide conference held in September 2011 to disseminate year-one findings. The grant supported 17 research studies by leading energy, policy, and financial specialists, including studies on: current energy use in the district and the Oberlin area; regional potential for energy generation from renewable sources such as solar power, wind, and farm-waste; energy and transportation strategies for transitioning the City of Oberlin entirely to renewable resources and considering pedestrians, bicyclists, and public transportation as well as drivers

  20. Regional Transmission Projects: Finding Solutions

    Energy Technology Data Exchange (ETDEWEB)

    The Keystone Center

    2005-06-15

    The Keystone Center convened and facilitated a year-long Dialogue on "Regional Transmission Projects: Finding Solutions" to develop recommendations that will help address the difficult and contentious issues related to expansions of regional electric transmission systems that are needed for reliable and economic transmission of power within and across regions. This effort brought together a cross-section of affected stakeholders and thought leaders to address the problem with the collective wisdom of their experience and interests. Transmission owners sat at the table with consumer advocates and environmental organizations. Representatives from regional transmission organizations exchanged ideas with state and federal regulators. Generation developers explored common interests with public power suppliers. Together, the Dialogue participants developed consensus solutions about how to begin unraveling some of the more intractable issues surrounding identification of need, allocation of costs, and reaching consensus on siting issues that can frustrate the development of regional transmission infrastructure. The recommendations fall into three broad categories: 1. Recommendations on appropriate institutional arrangements and processes for achieving regional consensus on the need for new or expanded transmission infrastructure 2. Recommendations on the process for siting of transmission lines 3. Recommendations on the tools needed to support regional planning, cost allocation, and siting efforts. List of Dialogue participants: List of Dialogue Participants: American Electric Power American Transmission Company American Wind Energy Association California ISO Calpine Corporation Cinergy Edison Electric Institute Environmental Defense Federal Energy Regulatory Commission Great River Energy International Transmission Company ISO-New England Iowa Public Utility Board Kanner & Associates Midwest ISO National Association of Regulatory Utility Commissioners National Association

  1. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  2. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  3. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  4. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  5. RObust header compression (ROHC) performance for multimedia transmission over 3G/4G wireless networks

    DEFF Research Database (Denmark)

    Fitzek, Frank; Rein, S.; Seeling, P.

    2005-01-01

    Robust Header Compression (ROHC) has recently been proposed to reduce the large protocol header overhead when transmitting voice and other continuous meadi over IP based control stacks in wireless networks. In this paper we evaluate the real-time transmission of GSM encoded voice and H. 26L encod...

  6. The evolution of transmission mode

    Science.gov (United States)

    Forbes, Mark R.; Hauffe, Heidi C.; Kallio, Eva R.; Okamura, Beth; Sait, Steven M.

    2017-01-01

    This article reviews research on the evolutionary mechanisms leading to different transmission modes. Such modes are often under genetic control of the host or the pathogen, and often in conflict with each other via trade-offs. Transmission modes may vary among pathogen strains and among host populations. Evolutionary changes in transmission mode have been inferred through experimental and phylogenetic studies, including changes in transmission associated with host shifts and with evolution of the unusually complex life cycles of many parasites. Understanding the forces that determine the evolution of particular transmission modes presents a fascinating medley of problems for which there is a lack of good data and often a lack of conceptual understanding or appropriate methodologies. Our best information comes from studies that have been focused on the vertical versus horizontal transmission dichotomy. With other kinds of transitions, theoretical approaches combining epidemiology and population genetics are providing guidelines for determining when and how rapidly new transmission modes may evolve, but these are still in need of empirical investigation and application to particular cases. Obtaining such knowledge is a matter of urgency in relation to extant disease threats. This article is part of the themed issue ‘Opening the black box: re-examining the ecology and evolution of parasite transmission’. PMID:28289251

  7. Alternative approaches to transmission investment

    Energy Technology Data Exchange (ETDEWEB)

    Thon, S. [AltaLink Management Ltd., Calgary, AB (Canada)

    2004-07-01

    AltaLink is Canada's first stand-alone power transmission company, serving all major centres in Alberta and 85 per cent of Alberta's population. It has more than $1 billion in assets, 11,500 km of transmission lines and 300 substations. It was noted that there has not been any significant investment in power transmission in Alberta for the past 20 years, partly because transmission assets have a very long lifespan. The new role of the power grid is to ensure reliability, safety, efficiency, market effectiveness and supply diversity. The benefits and costs of AltaLink's 500 kV North-South upgrade project were outlined. It was noted that a healthy transmission system is the basis for economic growth throughout the province and for the development of Alberta's resource base. The transmission policy in Alberta endorses that all consumers pay postage stamp tariffs. It also promotes a proactive plan for transmission projects, the time to maximum rate (TMR) in limited cases only, a congestion-free grid under normal conditions, the financial commitment of generators, specific time limits on permitting processes, and regional interconnections to benefit all customers. tabs., figs.

  8. Transmission Line Series Compensation for Wind Energy Transmission

    International Nuclear Information System (INIS)

    Palanichamy, C; Wong, Y C

    2015-01-01

    Wind energy has demonstrated to be a clean, copious and absolutely renewable source of energy, and the large penetration of it into the power grid indicates that wind energy is considered an effective means of power generation, Transmission of wind energy from remote locations to load centers necessitates long transmission lines. Series compensation is a proven and economical transmission solution to address system power transfer strength, grid stability, and voltage profile issues of long transmission lines. In this paper, a programmable approach to determine the capacitive reactance of series capacitor and optimum location for its placement to achieve maximum power transfer gas been presented. The respective program with sample solutions has been provided for real-time applications. (paper)

  9. Midwest Transmission Workshop I Summary

    Energy Technology Data Exchange (ETDEWEB)

    Kevin Bryan

    2001-05-01

    OAK-B135 The meeting was opened with a review of the purposes of the workshop: (1) Present and discuss key studies and assessments of transmission upgrades, additions and related issues for the upper Midwest, including work that addresses the full range of views on these topics; (2) Understand the various transmission issues in the upper Midwest and discuss options for addressing the issues; and (3) Identify the decision makers and entities that need to play an active role if transmission issues are to be resolved, and agree on next steps for engaging these individuals and organizations through education, outreach, and information dissemination.

  10. Markets for financial transmission rights

    International Nuclear Information System (INIS)

    Kristiansen, T.

    2004-01-01

    Results of a survey of markets for financial transmission rights that facilitate competitive, open and non-discriminatory electricity market design are discussed. Specifically, the survey covered Pennsylvania, New Jersey, Maryland (PJM), New York, California, New England, Texas and New Zealand. The main emphasis was on the PJM and the New York markets, since they are the most mature. Interwowen with the results is a thorough discussion of the properties, features and the design of financial transaction rights in the various jurisdictions, the advantages, disadvantages and market performance of financial transmission rights, market performance criteria, and the mechanism for acquiring financial transmission rights. 49 refs., 14 tabs., 6 figs

  11. Transmission eigenvalues and thermoacoustic tomography

    International Nuclear Information System (INIS)

    Finch, David; Hickmann, Kyle S

    2013-01-01

    The spectrum of the interior transmission problem is related to the unique determination of the acoustic properties of a body in thermoacoustic imaging. Under a non-trapping hypothesis, we show that sparsity of the interior transmission spectrum implies a range separation condition for the thermoacoustic operator. In odd dimensions greater than or equal to 3, we prove that the interior transmission spectrum for a pair of radially symmetric non-trapping sound speeds is countable, and conclude that the ranges of the associated thermoacoustic maps have only trivial intersection. (paper)

  12. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  13. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  14. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    Science.gov (United States)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  15. Timing Analysis of Rate Constrained Traffic for the TTEthernet Communication Protocol

    DEFF Research Database (Denmark)

    Tamas-Selicean, Domitian; Pop, Paul; Steiner, Wilfried

    2015-01-01

    Ethernet is a low-cost communication solution offering high transmission speeds. Although its applications extend beyond computer networking, Ethernet is not suitable for real-time and safety-critical systems. To alleviate this, several real-time Ethernet-based communication protocols have been...

  16. The evolution of plant virus transmission pathways

    Science.gov (United States)

    Frédéric M. Hamelin; Linda J.S. Allen; Holly R. Prendeville; M. Reza Hajimorad; Michael J. Jeger

    2016-01-01

    The evolution of plant virus transmission pathways is studied through transmission via seed, pollen, oravector. We address the questions: under what circumstances does vector transmission make pollen transmission redundant? Can evolution lead to the coexistence of multiple virus transmission pathways? We restrict the analysis to an annual plant population in which...

  17. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  18. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  19. Energy Consumption Research of Mobile Data Collection Protocol for Underwater Nodes Using an USV

    Directory of Open Access Journals (Sweden)

    Zhichao Lv

    2018-04-01

    Full Text Available The Unmanned Surface Vehicle (USV integrated with an acoustic modem is a novel mobile vehicle for data collection, which has an advantage in terms of mobility, efficiency, and collection cost. In the scenario of data collection, the USV is controlled autonomously along the planning trajectory and the data of underwater nodes are dynamically collected. In order to improve the efficiency of data collection and extend the life of the underwater nodes, a mobile data collection protocol for underwater nodes using the USV was proposed. In the protocol, the stop-and-wait ARQ transmission mechanism is adopted, where the duty cycle is designed considering the ratio between the sleep mode and the detection mode, and the transmission ratio is defined by the duty cycle, wake-up signal cycles, and USV’s speed. According to protocol, the evaluation index for energy consumption is constructed based on the duty cycle and the transmission ratio. The energy consumption of the protocol is simulated and analyzed using the mobile communication experiment data of USV, taking into consideration USV’s speed, data sequence length, and duty cycle. Optimized protocol parameters are identified, which in turn denotes the proposed protocol’s feasibility and effectiveness.

  20. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels.

    Science.gov (United States)

    Son, In Keun; Mao, Shiwen; Hur, Seung Min

    2009-01-01

    We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks.

  1. Echinococcosis : disease, detection and transmission

    NARCIS (Netherlands)

    Craig, P.S.; Rogan, M T; Campos-Ponce, M

    2003-01-01

    Echinococcosis is one of the world's most geographically widespread parasitic zoonoses, with transmission occurring in tropical, temperate and arctic biomes. Most human infections are due to Echinococcus granulosus transmitted between domestic dogs and livestock, but this cosmopolitan species also

  2. Hybrid-Vehicle Transmission System

    Science.gov (United States)

    Lupo, G.; Dotti, G.

    1985-01-01

    Continuously-variable transmission system for hybrid vehicles couples internal-combustion engine and electric motor section, either individually or in parallel, to power vehicle wheels during steering and braking.

  3. Accounting-related transmission issues

    International Nuclear Information System (INIS)

    Niehaus, M.; Bjorn, P.; Pate, G.

    1999-01-01

    Various initiatives have been undertaken by the Federal Energy Regulatory Commission (FERC) to deregulate wholesale electric energy markets. These initiatives have focused on restructuring the transmission systems in the US and recently have culminated in a proposal requiring formation of and participation in regional transmission organizations. The overall form of regulation selected to determine rates for transmission entities as well as underlying regulatory decisions reached on key issues will have profound implications for transmission entities. For example, traditional cost-based regulation would require one set of accounting and reporting rules, while incentive-based regulation may not be subject to those same rules. An overview of some of the major accounting and financial reporting issues that will need to be considered is presented

  4. Transmission of Information: An Overview.

    Science.gov (United States)

    Thoma, George R.

    1981-01-01

    Outlines the basic principles underlying the transmission of information, including analog and digital modulation, limitations to communications, configurations of communications networks, optical fiber cables, and earth satellites. Six references are cited. (FM)

  5. Evidence of localized wave transmission

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    LLNL [Lawrence Livermore National Lab.] experiments to test the feasibility of launching an acoustic, directed-energy pulse train (ADEPT) in water have demonstrated localized transmission of wave energy far beyond the classical Rayleigh length that defines the boundary between near-field and far-field transmission for Gaussian (diffraction-limited) pulses. The results of the experiments are in excellent agreement with computer simulations

  6. Radio and line transmission 2

    CERN Document Server

    Roddy, Dermot

    2013-01-01

    Radio and Line Transmission, Volume 2 gives a detailed treatment of the subject as well as an introduction to additional advanced subject matter. Organized into 14 chapters, this book begins by explaining the radio wave propagation, signal frequencies, and bandwidth. Subsequent chapters describe the transmission lines and cables; the aerials; tuned and coupled circuits; bipolar transistor amplifiers; field-effect transistors and circuits; thermionic valve amplifiers; LC oscillators; the diode detectors and modulators; and the superheterodyne receiver. Other chapters explore noise and interfere

  7. Heartland Alliance for Regional Transmission

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, Nancy [Climate and Energy Project, Inc., Hutchinson, KS (United States)

    2017-03-15

    The Heartland Alliance for Regional Transmission (HART) will foster a candid, productive conversation among stakeholders that identifies challenges to and benefits from a massive build out of wind generation and transmission across the Southwest Power Pool. Based on the outcomes of those deliberations, HART will develop and deliver an ambitious, coordinated, peer-to-peer outreach effort that spans the SPP to improve market acceptance for wind.

  8. Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network

    Science.gov (United States)

    Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru

    Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.

  9. Data Acquisition and Transmission System for Building Energy Consumption Monitoring

    Directory of Open Access Journals (Sweden)

    Liang Zhao

    2013-01-01

    Full Text Available Building energy consumption monitoring and management system have been developed widely in China in order to gain the real-time data of energy consumption in buildings for analyzing it in the next state work. This paper describes a low-cost and small-sized collector based on the STM32 microcontroller, which can be placed in a building easily to implement the work of data acquisition, storage, and transmission. The collector gathers the electricity, water, heat, and energy consumption data through the RS485 field bus and stores the data into an SD card with mass storage, finally, using Internet to finish the communication and transmission to data server through TCP protocol. The collector has been used in application for two years, and the results show that the system is reliable and stable.

  10. Transmission Scheduling and Routing Algorithms for Delay Tolerant Networks

    Science.gov (United States)

    Dudukovich, Rachel; Raible, Daniel E.

    2016-01-01

    The challenges of data processing, transmission scheduling and routing within a space network present a multi-criteria optimization problem. Long delays, intermittent connectivity, asymmetric data rates and potentially high error rates make traditional networking approaches unsuitable. The delay tolerant networking architecture and protocols attempt to mitigate many of these issues, yet transmission scheduling is largely manually configured and routes are determined by a static contact routing graph. A high level of variability exists among the requirements and environmental characteristics of different missions, some of which may allow for the use of more opportunistic routing methods. In all cases, resource allocation and constraints must be balanced with the optimization of data throughput and quality of service. Much work has been done researching routing techniques for terrestrial-based challenged networks in an attempt to optimize contact opportunities and resource usage. This paper examines several popular methods to determine their potential applicability to space networks.

  11. Remote control of the industry processes. POWERLINK protocol application

    Science.gov (United States)

    Wóbel, A.; Paruzel, D.; Paszkiewicz, B.

    2017-08-01

    The present technological development enables the use of solutions characterized by a lower failure rate, and work with greater precision. This allows you to obtain the most efficient production, high speed production and reliability of individual components. The main scope of this article was POWERLINK protocol application for communication with the controller B & R through communication Ethernet for recording process parameters. This enables control of run production cycle using an internal network connected to the PC industry. Knowledge of the most important parameters of the production in real time allows detecting of a failure immediately after occurrence. For this purpose, the position of diagnostic use driver X20CP1301 B&R to record measurement data such as pressure, temperature valve between the parties and the torque required to change the valve setting was made. The use of POWERLINK protocol allows for the transmission of information on the status of every 200 μs.

  12. Essays on electricity transmission investment and financial transmission rights

    Science.gov (United States)

    Shang, Wenzhuo

    The U.S. electric power industry has been going through fundamental restructuring and realignment since the 1990's. Many issues and problems have emerged during the transition, and both economists and engineers have been looking for the solutions fervently. In this dissertation, which consists primarily of three essays, we apply economics theory and techniques to the power industry and address two related issues, transmission investment and financial transmission rights (FTRs). The first essay takes the decentralized perspective and investigates the efficiency attribute of market-based transmission investment under perfect competition. We clarify, for the first time, the nature of the externality created by loop flows that causes transmission investment to be inefficient. Our findings have important implications for better understanding of transmission market design and creating incentives for efficient transmission investment. In the second essay, we define several rules for allocating transmission investment cost within the framework of cooperative game theory. These rules provide fair, stable or efficient cost allocations in theory and are good benchmarks against which the allocation mechanism in practice can be compared and improved upon. In the last essay, we make exploratory efforts in analyzing and assessing empirically the performance of the Midwest independent system operator (MISO) FTR auction market. We reveal some stylized facts about this young market and find that it is not efficient under the risk-neutrality assumption. We also point out and correct the drawbacks in previous related work and suggest about more complete empirical work in future. In all, this dissertation makes both theoretic and empirical analysis of the two hot issues related to the power industry and comes up with findings that have important implications for the development of this industry.

  13. Evaluating the merchant transmission market

    International Nuclear Information System (INIS)

    Hsieh, E.; Bartholomew Fisher, E.

    2007-01-01

    This paper reviewed the North American bulk electric transmission system, with particular reference to the following merchant power transmission projects that have applied to sell transmission at negotiated rates by the Federal Energy Regulatory Commission (FERC): Cross Sound Cable; Neptune Phase 1; TransCanada's Northern Lights HVDC line; Montana Alberta Tie; Juan de Fuca Cable; Linden VFT; Connecticut-Long Island Cable; Lake Erie Link; Empire Connection; Harbor Cable; Chesapeake Transmission; and the Neptune/Green Line. The projects were sorted by status as either active, inactive and restructured. Each summary included the interconnection points, capacity, and sponsor. This paper also identified the major hurdles in their approvals. The relative success of the merchant transmission framework in attracting new investment was then reviewed. The successful projects shared 3 common attributes. They connected areas with large price differentials and they used advanced flow control technology such as HVDC, PARs, and VFTs. The successful projects also bridged some type of border, either geographic, electrical, economic, or a combination. Three of the active projects crossed the Canadian-US border, while the other 3 connected New York City to neighbouring regions. It was shown that merchant transmission fills a niche, enabling market responses to connect areas that may be overlooked by a regional planning process. 27 refs

  14. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  15. Human prion diseases: surgical lessons learned from iatrogenic prion transmission.

    Science.gov (United States)

    Bonda, David J; Manjila, Sunil; Mehndiratta, Prachi; Khan, Fahd; Miller, Benjamin R; Onwuzulike, Kaine; Puoti, Gianfranco; Cohen, Mark L; Schonberger, Lawrence B; Cali, Ignazio

    2016-07-01

    The human prion diseases, or transmissible spongiform encephalopathies, have captivated our imaginations since their discovery in the Fore linguistic group in Papua New Guinea in the 1950s. The mysterious and poorly understood "infectious protein" has become somewhat of a household name in many regions across the globe. From bovine spongiform encephalopathy (BSE), commonly identified as mad cow disease, to endocannibalism, media outlets have capitalized on these devastatingly fatal neurological conditions. Interestingly, since their discovery, there have been more than 492 incidents of iatrogenic transmission of prion diseases, largely resulting from prion-contaminated growth hormone and dura mater grafts. Although fewer than 9 cases of probable iatrogenic neurosurgical cases of Creutzfeldt-Jakob disease (CJD) have been reported worldwide, the likelihood of some missed cases and the potential for prion transmission by neurosurgery create considerable concern. Laboratory studies indicate that standard decontamination and sterilization procedures may be insufficient to completely remove infectivity from prion-contaminated instruments. In this unfortunate event, the instruments may transmit the prion disease to others. Much caution therefore should be taken in the absence of strong evidence against the presence of a prion disease in a neurosurgical patient. While the Centers for Disease Control and Prevention (CDC) and World Health Organization (WHO) have devised risk assessment and decontamination protocols for the prevention of iatrogenic transmission of the prion diseases, incidents of possible exposure to prions have unfortunately occurred in the United States. In this article, the authors outline the historical discoveries that led from kuru to the identification and isolation of the pathological prion proteins in addition to providing a brief description of human prion diseases and iatrogenic forms of CJD, a brief history of prion disease nosocomial transmission

  16. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  17. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  18. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  19. Atlas transmission line breakdown analysis

    CERN Document Server

    Nielsen, K E; Ballard, E O; Elizondo, J M; Gribble, R F; McCuistian, B T; Parsons, W M

    1999-01-01

    The Atlas facility will use 24 radially converging, vertically oriented and tapered, oil insulated, triplate transmission lines between the Marx generators and the central load region. Among the requirements of the transmission lines are low inductance and high reliability. The inter-conductor gap is nominally 2 cm and the lines taper from a height of 1.75 m at the Marx end to 0.32 m at the output end. The aluminum conductors, held together by 20 insulating spacers, are assembled and inserted as a unit into radial oil-filled steel tanks. The negative, high-voltage, center conductor is 2.54-cm thick and the outer ground conductors are 1.59-cm thick. All 24 triplate transmission lines connect to a transition section at near 1 m radius that couples the transmission lines to a disk/conical solid- dielectric-insulated power flow channel transmission line terminating at the load. Peak operating voltage on the lines can be as high as 240 kV with an effective stress time of 0.8 mu s. Testing of small sections of the ...

  20. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  1. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  2. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  3. Implementation of two-party protocols in the noisy-storage model

    International Nuclear Information System (INIS)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-01-01

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  4. Fault discovery protocol for passive optical networks

    Science.gov (United States)

    Hajduczenia, Marek; Fonseca, Daniel; da Silva, Henrique J. A.; Monteiro, Paulo P.

    2007-06-01

    All existing flavors of passive optical networks (PONs) provide an attractive alternative to legacy copper-based access lines deployed between a central office (CO) of the service provider (SP) and a customer site. One of the most challenging tasks for PON network planners is the reduction of the overall cost of employing protection schemes for the optical fiber plant while maintaining a reasonable level of survivability and reducing the downtime, thus ensuring acceptable levels of quality of service (QoS) for end subscribers. The recently growing volume of Ethernet PONs deployment [Kramer, IEEE 802.3, CFI (2006)], connected with low-cost electronic and optical components used in the optical network unit (ONU) modules, results in the situation where remote detection of faulty/active subscriber modules becomes indispensable for proper operation of an EPON system. The problem of the remote detection of faulty ONUs in the system is addressed where the upstream channel is flooded with the cw transmission from one or more damaged ONUs and standard communication is severed, providing a solution that is applicable in any type of PON network, regardless of the operating protocol, physical structure, and data rate.

  5. Sigma Routing Metric for RPL Protocol

    Directory of Open Access Journals (Sweden)

    Paul Sanmartin

    2018-04-01

    Full Text Available This paper presents the adaptation of a specific metric for the RPL protocol in the objective function MRHOF. Among the functions standardized by IETF, we find OF0, which is based on the minimum hop count, as well as MRHOF, which is based on the Expected Transmission Count (ETX. However, when the network becomes denser or the number of nodes increases, both OF0 and MRHOF introduce long hops, which can generate a bottleneck that restricts the network. The adaptation is proposed to optimize both OFs through a new routing metric. To solve the above problem, the metrics of the minimum number of hops and the ETX are combined by designing a new routing metric called SIGMA-ETX, in which the best route is calculated using the standard deviation of ETX values between each node, as opposed to working with the ETX average along the route. This method ensures a better routing performance in dense sensor networks. The simulations are done through the Cooja simulator, based on the Contiki operating system. The simulations showed that the proposed optimization outperforms at a high margin in both OF0 and MRHOF, in terms of network latency, packet delivery ratio, lifetime, and power consumption.

  6. Plasmodium vivax Transmission in Africa.

    Directory of Open Access Journals (Sweden)

    Rosalind E Howes

    2015-11-01

    Full Text Available Malaria in sub-Saharan Africa has historically been almost exclusively attributed to Plasmodium falciparum (Pf. Current diagnostic and surveillance systems in much of sub-Saharan Africa are not designed to identify or report non-Pf human malaria infections accurately, resulting in a dearth of routine epidemiological data about their significance. The high prevalence of Duffy negativity provided a rationale for excluding the possibility of Plasmodium vivax (Pv transmission. However, review of varied evidence sources including traveller infections, community prevalence surveys, local clinical case reports, entomological and serological studies contradicts this viewpoint. Here, these data reports are weighted in a unified framework to reflect the strength of evidence of indigenous Pv transmission in terms of diagnostic specificity, size of individual reports and corroboration between evidence sources. Direct evidence was reported from 21 of the 47 malaria-endemic countries studied, while 42 countries were attributed with infections of visiting travellers. Overall, moderate to conclusive evidence of transmission was available from 18 countries, distributed across all parts of the continent. Approximately 86.6 million Duffy positive hosts were at risk of infection in Africa in 2015. Analysis of the mechanisms sustaining Pv transmission across this continent of low frequency of susceptible hosts found that reports of Pv prevalence were consistent with transmission being potentially limited to Duffy positive populations. Finally, reports of apparent Duffy-independent transmission are discussed. While Pv is evidently not a major malaria parasite across most of sub-Saharan Africa, the evidence presented here highlights its widespread low-level endemicity. An increased awareness of Pv as a potential malaria parasite, coupled with policy shifts towards species-specific diagnostics and reporting, will allow a robust assessment of the public health

  7. Topics in lightwave transmission systems

    CERN Document Server

    Li, Tingye

    1991-01-01

    Topics in Lightwave Transmission Systems is a second volume of a treatise on optical fiber communications that is devoted to the science, engineering, and application of information transmission via optical fibers. The first volume, published in 1985, dealt exclusively with fiber fabrication. The present volume contains topics that pertain to subsystems and systems. The book contains five chapters and begins with discussions of transmitters and receivers, which are basic to systems now operating in the field. Subsequent chapters cover topics relating to coherent systems: frequency and phase m

  8. Transmission pricing: paradigms and methodologies

    Energy Technology Data Exchange (ETDEWEB)

    Shirmohammadi, Dariush [Pacific Gas and Electric Co., San Francisco, CA (United States); Vieira Filho, Xisto; Gorenstin, Boris [Centro de Pesquisas de Energia Eletrica (CEPEL), Rio de Janeiro, RJ (Brazil); Pereira, Mario V.P. [Power System Research, Rio de Janeiro, RJ (Brazil)

    1994-12-31

    In this paper we describe the principles of several paradigms and methodologies for pricing transmission services. The paper outlines some of the main characteristics of these paradigms and methodologies such as where they may be used for best results. Due to their popularity, power flow based MW-mile and short run marginal cost pricing methodologies will be covered in some detail. We conclude the paper with examples of the application of these two pricing methodologies for pricing transmission services in Brazil. (author) 25 refs., 2 tabs.

  9. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  10. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  11. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  12. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  13. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  14. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  15. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  16. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  17. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  18. On the Performance of the Cache Coding Protocol

    Directory of Open Access Journals (Sweden)

    Behnaz Maboudi

    2018-03-01

    Full Text Available Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these attacks while allowing for the benefits of coding in mesh networks, the cache coding protocol was proposed. This protocol only allows recoding at the relays when the relay has received enough coded packets to decode an entire generation of packets. At that point, the relay node recodes and signs the recoded packets with its own private key, allowing the system to detect and minimize the effect of pollution attacks and making the relays accountable for changes on the data. This paper analyzes the delay performance of cache coding to understand the security-performance trade-off of this scheme. We introduce an analytical model for the case of two relays in an erasure channel relying on an absorbing Markov chain and an approximate model to estimate the performance in terms of the number of transmissions before successfully decoding at the receiver. We confirm our analysis using simulation results. We show that cache coding can overcome the security issues of unrestricted recoding with only a moderate decrease in system performance.

  19. Money and transmission of bacteria.

    NARCIS (Netherlands)

    Gedik, H.; Voss, T.A.; Voss, A.

    2013-01-01

    Money is one of the most frequently passed items in the world. The aim of this study was to ascertain the survival status of bacteria including Staphylococcus aureus, Escherichia coli, and Vancomycin- Resistant Enterococci (VRE) on banknotes from different countries and the transmission of bacteria

  20. Solution of the Transmission Problem

    Czech Academy of Sciences Publication Activity Database

    Medková, Dagmar

    2010-01-01

    Roč. 110, č. 3 (2010), s. 1489-1500 ISSN 0167-8019 Institutional research plan: CEZ:AV0Z10190503 Keywords : Laplace equation * transmission problem * single layer potential * double layer potential Subject RIV: BA - General Mathematics Impact factor: 0.979, year: 2010 http://link.springer.com/article/10.1007%2Fs10440-009-9522-5

  1. Neutron Transmission through Sapphire Crystals

    DEFF Research Database (Denmark)

    of simulations, in order to reproduce the transmission of cold neutrons through sapphire crystals. Those simulations were part of the effort of validating and improving the newly developed interface between the Monte-Carlo neutron transport code MCNP and the Monte Carlo ray-tracing code McStas....

  2. Transmission electron microscopy of bone

    NARCIS (Netherlands)

    Everts, Vincent; Niehof, Anneke; Tigchelaar-Gutter, Wikky; Beertsen, Wouter

    2012-01-01

    This chapter describes procedures to process mineralized tissues obtained from different sources for transmission electron microscopy (TEM). Methods for fixation, resin embedding, staining of semi-thin sections and ultrathin sections are presented. In addition, attention will be paid to processing

  3. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  4. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  5. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  6. Direct measurement of the quantum state of the electromagnetic field in a superconducting transmission line

    International Nuclear Information System (INIS)

    Melo, F. de; Aolita, L.; Davidovich, L.; Toscano, F.

    2006-01-01

    We propose an experimental procedure to directly measure the state of an electromagnetic field inside a resonator, corresponding to a superconducting transmission line, coupled to a Cooper-pair box (CPB). The measurement protocol is based on the use of a dispersive interaction between the field and the CPB, and the coupling to an external classical field that is tuned to resonance with either the field or the CPB. We present a numerical simulation that demonstrates the feasibility of this protocol, which is within reach of present technology

  7. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  8. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  9. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  10. A tree routing protocol for cognitive radio network

    Directory of Open Access Journals (Sweden)

    Mohammed Hashem

    2017-07-01

    Full Text Available Cognitive Radio (CR technology is an agile solution for spectrum congestion and spectrum access utilization problems that result from the legacy fixed spectrum management policies. CR technology can exploit unused licensed band to meet the increasing demand for radio frequency. The routing process faces many challenges in CR Network (CRN such as the absence of centralized infrastructure, the coordination between the routing module and spectrum management module, in addition to the frequent link failure due to the sudden appearance of PUs. In this paper we propose a Tree routing protocol for cognitive radio network (C-TRP that jointly utilizes the tree routing algorithm with a spectrum management module in routing decisions, and also we proposed a new metric used in taking the best route decisions. In addition, we enhance the traditional tree routing algorithm by using a neighbor table technique that speeds up the forwarding data packets. Moreover, we add a robust recovery module to C-TRP to resume the network in case of the link failure. The main motivation in the design of C-TRP is quick data transmission and maximization of date rates. The performance evaluation is carried out in NS2 simulator. The simulation results proved that C-TRP protocol achieves better performance in terms of average “PDR”, “end-to-end delay” and “routing overhead ratio “compared to “CTBR” and “STOD-RP” routing protocols.

  11. An XML-based communication protocol for accelerator distributed controls

    International Nuclear Information System (INIS)

    Catani, L.

    2008-01-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding

  12. An XML-based communication protocol for accelerator distributed controls

    Energy Technology Data Exchange (ETDEWEB)

    Catani, L. [INFN-Roma Tor Vergata, Rome (Italy)], E-mail: luciano.catani@roma2.infn.it

    2008-03-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding.

  13. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  14. Protocol Processing for 100 Gbit/s and Beyond - A Soft Real-Time Approach in Hardware and Software

    Science.gov (United States)

    Büchner, Steffen; Lopacinski, Lukasz; Kraemer, Rolf; Nolte, Jörg

    2017-09-01

    100 Gbit/s wireless communication protocol processing stresses all parts of a communication system until the outermost. The efficient use of upcoming 100 Gbit/s and beyond transmission technology requires the rethinking of the way protocols are processed by the communication endpoints. This paper summarizes the achievements of the project End2End100. We will present a comprehensive soft real-time stream processing approach that allows the protocol designer to develop, analyze, and plan scalable protocols for ultra high data rates of 100 Gbit/s and beyond. Furthermore, we will present an ultra-low power, adaptable, and massively parallelized FEC (Forward Error Correction) scheme that detects and corrects bit errors at line rate with an energy consumption between 1 pJ/bit and 13 pJ/bit. The evaluation results discussed in this publication show that our comprehensive approach allows end-to-end communication with a very low protocol processing overhead.

  15. High voltage transmission of electrical energy over long distances

    Energy Technology Data Exchange (ETDEWEB)

    Tewari, S W

    1962-07-01

    Technical aspects of ac transmission lines, additional means of improving stability ac transmisson lines, insulation problems, ac transmission by cables, high voltage dc transmission, advantages of dc over ac transmission, disadvantages of dc transmission, use of underground cables for dc transmission, history of the development of conversion equipment; transmission schemes adopted on Gotland Island, Sweden; and economics of ac and dc transmission are discussed.

  16. Data and clock transmission interface for the WCDA in LHAASO

    International Nuclear Information System (INIS)

    Chu, S.P.; Zhao, L.; Jiang, Z.Y.; Ma, C.; Gao, X.S.; Yang, Y.F.; Liu, S.B.; An, Q.

    2016-01-01

    The Water Cherenkov Detector Array (WCDA) is one of the major components of the Large High Altitude Air Shower Observatory (LHAASO). In the WCDA, 3600 Photomultiplier Tubes (PMTs) and the Front End Electronics (FEEs) are scattered over a 90000 m 2 area, while high precision time measurements (0.5 ns RMS) are required in the readout electronics. To meet this requirement, the clock has to be distributed to the FEEs with high precision. Due to the ''triggerless'' architecture, high speed data transfer is required based on the TCP/IP protocol. To simplify the readout electronics architecture and be consistent with the whole LHAASO readout electronics, the White Rabbit (WR) switches are used to transfer clock, data, and commands via a single fiber of about 400 meters. In this paper, a prototype of data and clock transmission interface for LHAASO WCDA is developed. The performance tests are conducted and the results indicate that the clock synchronization precision of the data and clock transmission is better than 50 ps. The data transmission throughput can reach 400 Mbps for one FEE board and 180 Mbps for 4 FEE boards sharing one up link port in WR switch, which is better than the requirement of the LHAASO WCDA.

  17. Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.

    Science.gov (United States)

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  18. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Rabindra Bista

    2010-05-01

    Full Text Available Many wireless sensor network (WSN applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  19. Improving Wojcik's eavesdropping attack on the ping-pong protocol

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Zhanjun [Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China) and School of Physics and Material Science, Anhui University, Hefei 230039 (China)]. E-mail: zhangzj@wipm.ac.cn; Man Zhongxiao [Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China); Li Yong [Department of Physics, Central China Normal University, Wuhan 430079 (China)

    2004-11-29

    The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme only induces half of the eavesdropping-induced channel loss in Wojcik's scheme, therefore, in a larger domain of the quantum channel transmission efficiency {eta}, i.e., [0,75%], the eavesdropper Eve can attack all the transmitted bits. The improvement of the ping-pong protocol security produced by Wojcik's is also suitable for our eavesdropping attack.

  20. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  1. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  2. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  3. Searching for management approaches to reduce HAI transmission (SMART): a study protocol.

    Science.gov (United States)

    McAlearney, Ann Scheck; Hefner, Jennifer L; Sieck, Cynthia J; Walker, Daniel M; Aldrich, Alison M; Sova, Lindsey N; Gaughan, Alice A; Slevin, Caitlin M; Hebert, Courtney; Hade, Erinn; Buck, Jacalyn; Grove, Michele; Huerta, Timothy R

    2017-06-28

    Healthcare-associated infections (HAIs) impact patients' lives through prolonged hospitalization, morbidity, and death, resulting in significant costs to both health systems and society. Central line-associated bloodstream infections (CLABSIs) and catheter-associated urinary tract infections (CAUTIs) are two of the most preventable HAIs. As a result, these HAIs have been the focus of significant efforts to identify evidence-based clinical strategies to reduce infection rates. The Comprehensive Unit-based Safety Program (CUSP) provides a formal model for translating CLABSI-reduction evidence into practice. Yet, a national demonstration project found organizations experienced variable levels of success using CUSP to reduce CLABSIs. In addition, in Fiscal year 2019, Medicare will expand use of CLABSI and CAUTI metrics beyond ICUs to the entire hospital for reimbursement purposes. As a result, hospitals need guidance about how to successfully translate HAI-reduction efforts such as CUSP to non-ICU settings (clinical practice), and how to shape context (management practice)-including culture and management strategies-to proactively support clinical teams. Using a mixed-methods approach to evaluate the contribution of management factors to successful HAI-reduction efforts, our study aims to: (1) Develop valid and reliable measures of structural management practices associated with the recommended CLABSI Management Strategies for use as a survey (HAI Management Practice Guideline Survey) to support HAI-reduction efforts in both medical/surgical units and ICUs; (2) Develop, validate, and then deploy the HAI Management Practice Guideline Survey, first across Ohio hospitals, then nationwide, to determine the positive predictive value of the measurement instrument as it relates to CLABSI- and CAUTI-prevention; and (3) Integrate findings into a Management Practices Toolkit for HAI reduction that includes an organization-specific data dashboard for monitoring progress and an implementation program for toolkit use, and disseminate that Toolkit nationwide. Providing hospitals with the tools they need to successfully measure management structures that support clinical care provides a powerful approach that can be leveraged to reduce the incidence of HAIs experienced by patients. This study is critical to providing the information necessary to successfully "make health care safer" by providing guidance on how contextual factors within a healthcare setting can improve patient safety across hospitals.

  4. A Study of Transmission Control Method for Distributed Parameters Measurement in Large Factories and Storehouses

    Directory of Open Access Journals (Sweden)

    Shujing Su

    2015-01-01

    Full Text Available For the characteristics of parameters dispersion in large factories, storehouses, and other applications, a distributed parameter measurement system is designed that is based on the ring network. The structure of the system and the circuit design of the master-slave node are described briefly. The basic protocol architecture about transmission communication is introduced, and then this paper comes up with two kinds of distributed transmission control methods. Finally, the reliability, extendibility, and control characteristic of these two methods are tested through a series of experiments. Moreover, the measurement results are compared and discussed.

  5. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  7. 76 FR 49841 - Transmission Planning and Cost Allocation by Transmission Owning and Operating Public Utilities

    Science.gov (United States)

    2011-08-11

    ... Commission-approved RTOs and ISOs. The Commission stated that it expected all non-public utility transmission... transmission planning processes that public utility transmission providers in regions outside of RTOs and ISOs...

  8. Harmonics in transmission power systems

    DEFF Research Database (Denmark)

    Wiechowski, Wojciech Tomasz

    . The comparison shows that results obtained used both types of the cores are the same, so it is concluded that both cores can be used for harmonic measurements. Low-inductance resistors are introduced in the secondary circuits, in series with the metering and protective relaying. On those resistors, the harmonic......Some time ago, Energinet.dk, the Transmission System Operator of the 150 kV and 400 kV transmission network in Denmark, had experienced operational malfunctions of some of the measuring and protection equipment. Also an overloading of a harmonic filter has been reported, and therefore, a need...... end only so the ground is not used as a return path. A way to reduce the capacitive coupling is to provide shielding. Harmonic currents are measured using the conventional inductive voltage transformers. Both protective and metering cores were compared if they could be used for harmonic measurements...

  9. Alternative approaches to transmission investment

    Energy Technology Data Exchange (ETDEWEB)

    Vlahos, P. [Ontario Energy Board, Toronto, ON (Canada)

    2004-07-01

    The current regulatory framework at the Ontario Energy Board (OEB) was outlined with reference to the 10-year outlook of the Independent Electricity Market Operator (IMO). Power transmitters currently respond to the IMO's outlook, while the OEB approves applications and cost recovery in rates. The Working Group on Congestion has recommended that the IMO produce a 10-year resource plan, that transmitters produce a 10-year expansion plan, and that the OEB develop a framework for project assessment and rate relief. The Task Force has concluded that merchant transmission is not proven, that transmission is an essential public infrastructure, and that regulatory responsibilities and approval processes should be clarified and streamlined. It was noted that the OEB's approach to regulation should be consistent, clear, predictable, fair, timely and in the public interest.

  10. Transmission X-ray mirror

    International Nuclear Information System (INIS)

    Lairson, B.M.; Bilderback, D.H.

    1982-01-01

    Transmission X-ray mirrors have been made from 400 A to 10 000 A thick soap films and have been shown to have novel properties. Using grazing angles of incidence, low energy X-rays were reflected from the front surface while more energetic X-rays were transmitted through the mirror largely unattenuated. A wide bandpass monochromator was made from a silicon carbide mirror followed by a soap film transmission mirror and operated in the white beam at the cornell High Energy Synchrotron Source (CHESS). Bandpasses of ΔE/E=12% to 18% were achieved at 13 keV with peak efficiencies estimated to be between 55% and 75%, respectively. Several wide angle scattering photographs of stretched polyethylene and a phospholipid were obtained in 10 s using an 18% bandpass. (orig.)

  11. Downlink Transmission of Short Packets

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Popovski, Petar

    2017-01-01

    Cellular wireless systems rely on frame-based transmissions. The frame design is conventionally based on heuristics, consisting of a frame header and a data part. The frame header contains control information that provides pointers to the messages within the data part. In this paper, we revisit...... the principles of frame design and show the impact of the new design in scenarios that feature short data packets, which are central to various 5G and Internet of Things applications. We~treat framing for downlink transmission in an AWGN broadcast channel with $K$ users, where the sizes of the messages....... This requires changes in the way control information is sent, and it requires that the users need to spend power decoding other messages, thereby increasing the average power consumption. We~show that the common heuristic design is only one point on a curve that represents the tradeoff between latency and power...

  12. Probabilistic costing of transmission services

    International Nuclear Information System (INIS)

    Wijayatunga, P.D.C.

    1992-01-01

    Costing of transmission services of electrical utilities is required for transactions involving the transport of energy over a power network. The calculation of these costs based on Short Run Marginal Costing (SRMC) is preferred over other methods proposed in the literature due to its economic efficiency. In the research work discussed here, the concept of probabilistic costing of use-of-system based on SRMC which emerges as a consequence of the uncertainties in a power system is introduced using two different approaches. The first approach, based on the Monte Carlo method, generates a large number of possible system states by simulating random variables in the system using pseudo random number generators. A second approach to probabilistic use-of-system costing is proposed based on numerical convolution and multi-area representation of the transmission network. (UK)

  13. Exploiting a Transmission Grating Spectrometer

    Energy Technology Data Exchange (ETDEWEB)

    Ronald E. Bell

    2004-12-08

    The availability of compact transmission grating spectrometers now allows an attractive and economical alternative to the more familiar Czerny-Turner configuration for many high-temperature plasma applications. Higher throughput is obtained with short focal length refractive optics and stigmatic imaging. Many more spectra can be obtained with a single spectrometer since smaller, more densely packed optical input fibers can be used. Multiple input slits, along with a bandpass filter, can be used to maximize the number of spectra per detector, providing further economy. Curved slits can correct for the strong image curvature of the short focal length optics. Presented here are the governing grating equations for both standard and high-dispersion transmission gratings, defining dispersion, image curvature, and desired slit curvature, that can be used in the design of improved plasma diagnostics.

  14. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  15. Exploiting a Transmission Grating Spectrometer

    International Nuclear Information System (INIS)

    Bell, Ronald E.

    2004-01-01

    The availability of compact transmission grating spectrometers now allows an attractive and economical alternative to the more familiar Czerny-Turner configuration for many high-temperature plasma applications. Higher throughput is obtained with short focal length refractive optics and stigmatic imaging. Many more spectra can be obtained with a single spectrometer since smaller, more densely packed optical input fibers can be used. Multiple input slits, along with a bandpass filter, can be used to maximize the number of spectra per detector, providing further economy. Curved slits can correct for the strong image curvature of the short focal length optics. Presented here are the governing grating equations for both standard and high-dispersion transmission gratings, defining dispersion, image curvature, and desired slit curvature, that can be used in the design of improved plasma diagnostics

  16. Transmission of Influenza A Viruses

    Science.gov (United States)

    Neumann, Gabriele; Kawaoka, Yoshihiro

    2015-01-01

    Influenza A viruses cause respiratory infections that range from asymptomatic to deadly in humans. Widespread outbreaks (pandemics) are attributable to ‘novel’ viruses that possess a viral hemagglutinin (HA) gene to which humans lack immunity. After a pandemic, these novel viruses form stable virus lineages in humans and circulate until they are replaced by other novel viruses. The factors and mechanisms that facilitate virus transmission among hosts and the establishment of novel lineages are not completely understood, but the HA and basic polymerase 2 (PB2) proteins are thought to play essential roles in these processes by enabling avian influenza viruses to infect mammals and replicate efficiently in their new host. Here, we summarize our current knowledge of the contributions of HA, PB2, and other viral components to virus transmission and the formation of new virus lineages. PMID:25812763

  17. Unpacking the great transmission debate

    Science.gov (United States)

    Denning, Kathryn

    2010-12-01

    The debate about the wisdom of sending interstellar transmissions is well-known to those involved in SETI, and frustrating for many. Its tendency towards intractability is a result of multiple factors, including: different models of the scientist's role as citizen and/or leader; disparate ideas about society's readiness to cope with frontier science; variable political substrates, particularly ideas concerning individual freedom and state control; competing ideologies of globalization; and the perceived relative risks and benefits of contact. (Variations in the latter, i.e. assessments of the risks and benefits of contact, derive partly from different thinking styles, including tolerance for risk, and partly from inferences based upon episodes of biological and cultural contact on Earth.) Unpacking the debate into its components may be of use to those debating policy about SETI transmissions, or at the very least, help keep in focus what, precisely, the perennial arguments are really about.

  18. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  19. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  20. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  1. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  2. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  3. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  4. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  5. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  6. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  7. Midwest Transmission Workshop II Summary

    Energy Technology Data Exchange (ETDEWEB)

    Kevin Bryan

    2002-12-05

    OAK-B135 After introductions of all participants, Abby Arnold, RESOLVE, reviewed the purpose of the meeting and the agenda. The purpose of the workshop was to share the results of the Midwest Independent System Operator (MISO) scenario development for wind and other fuel sources and the corresponding implications for transmission throughout the MISO control area. The workshop agenda is included in Attachment A.

  8. Transmission and distribution electrical engineering

    CERN Document Server

    Bayliss, Colin

    2003-01-01

    This comprehensive treatment of the theory and practice encountered in the installation and design of transmission and distribution systems for electrical power has been updated and revised to provide the project engineer with all the latest, relevant information to design and specify the correct system for a particular application.Thoroughly updated and revised to include latest developmentsLearn from and Author with extensive experience in managing international projectsFind out the reasoning and implicatons behind the different specifications and methods

  9. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  10. Integrated Transmission and Distribution Control

    Energy Technology Data Exchange (ETDEWEB)

    Kalsi, Karanjit [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Tuffner, Francis K. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lian, Jianming [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Zhang, Wei [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Marinovici, Laurentiu D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fisher, Andrew R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Chassin, Forrest S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hauer, Matthew L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-01-01

    Distributed, generation, demand response, distributed storage, smart appliances, electric vehicles and renewable energy resources are expected to play a key part in the transformation of the American power system. Control, coordination and compensation of these smart grid assets are inherently interlinked. Advanced control strategies to warrant large-scale penetration of distributed smart grid assets do not currently exist. While many of the smart grid technologies proposed involve assets being deployed at the distribution level, most of the significant benefits accrue at the transmission level. The development of advanced smart grid simulation tools, such as GridLAB-D, has led to a dramatic improvement in the models of smart grid assets available for design and evaluation of smart grid technology. However, one of the main challenges to quantifying the benefits of smart grid assets at the transmission level is the lack of tools and framework for integrating transmission and distribution technologies into a single simulation environment. Furthermore, given the size and complexity of the distribution system, it is crucial to be able to represent the behavior of distributed smart grid assets using reduced-order controllable models and to analyze their impacts on the bulk power system in terms of stability and reliability.

  11. METHODS OF POLYMODAL INFORMATION TRANSMISSION

    Directory of Open Access Journals (Sweden)

    O. O. Basov

    2015-03-01

    Full Text Available The research results upon the application of the existing information transmission methods in polymodal info communication systems are presented herein. The analysis of the existing commutation ways and multiplexing schemes has revealed that modern means of telecommunication are capable of providing polymodal information delivery with the required quality to the customer correspondent terminal. Under these conditions substantial capacity resource consumption in the data transmission networks with a simultaneous static time multiplexing is required, however, it is easier to achieve the modality synchronization within that kind of an infrastructure. The data networks with a static time multiplexing demand employing more sophisticated supporting algorithms of the guaranteed data blocks delivery quality. However, due to the stochastic data blocks delays modality synchronizing during the off-line processing is more difficult to provide. Nowadays there are objective preconditions for a data networking realization which is invariable to the applied transmission technology. This capability is defined by a wide (person-to-person application of the optical technologies in the transport infrastructure of the polymodal info communication systems. In case of the availability of the customer terminal and networking functioning matching mode it becomes possible to organize channels in the latter which can adaptively select the most effective networking technology according to the current volume allocation and modality types in the messages.

  12. Wave transmission in nonlinear lattices

    International Nuclear Information System (INIS)

    Hennig, D.; Tsironis, G.P.

    1999-01-01

    The interplay of nonlinearity with lattice discreteness leads to phenomena and propagation properties quite distinct from those appearing in continuous nonlinear systems. For a large variety of condensed matter and optics applications the continuous wave approximation is not appropriate. In the present review we discuss wave transmission properties in one dimensional nonlinear lattices. Our paradigmatic equations are discrete nonlinear Schroedinger equations and their study is done through a dynamical systems approach. We focus on stationary wave properties and utilize well known results from the theory of dynamical systems to investigate various aspects of wave transmission and wave localization. We analyze in detail the more general dynamical system corresponding to the equation that interpolates between the non-integrable discrete nonlinear Schroedinger equation and the integrable Albowitz-Ladik equation. We utilize this analysis in a nonlinear Kronig-Penney model and investigate transmission and band modification properties. We discuss the modifications that are effected through an electric field and the nonlinear Wannier-Stark localization effects that are induced. Several applications are described, such as polarons in one dimensional lattices, semiconductor superlattices and one dimensional nonlinear photonic band gap systems. (Copyright (c) 1999 Elsevier Science B.V., Amsterdam. All rights reserved.)

  13. Coiled transmission line pulse generators

    Science.gov (United States)

    McDonald, Kenneth Fox

    2010-11-09

    Methods and apparatus are provided for fabricating and constructing solid dielectric "Coiled Transmission Line" pulse generators in radial or axial coiled geometries. The pour and cure fabrication process enables a wide variety of geometries and form factors. The volume between the conductors is filled with liquid blends of monomers, polymers, oligomers, and/or cross-linkers and dielectric powders; and then cured to form high field strength and high dielectric constant solid dielectric transmission lines that intrinsically produce ideal rectangular high voltage pulses when charged and switched into matched impedance loads. Voltage levels may be increased by Marx and/or Blumlein principles incorporating spark gap or, preferentially, solid state switches (such as optically triggered thyristors) which produce reliable, high repetition rate operation. Moreover, these Marxed pulse generators can be DC charged and do not require additional pulse forming circuitry, pulse forming lines, transformers, or an a high voltage spark gap output switch. The apparatus accommodates a wide range of voltages, impedances, pulse durations, pulse repetition rates, and duty cycles. The resulting mobile or flight platform friendly cylindrical geometric configuration is much more compact, light-weight, and robust than conventional linear geometries, or pulse generators constructed from conventional components. Installing additional circuitry may accommodate optional pulse shape improvements. The Coiled Transmission Lines can also be connected in parallel to decrease the impedance, or in series to increase the pulse length.

  14. Automatic Transmission Of Liquid Nitrogen

    Directory of Open Access Journals (Sweden)

    Sumedh Mhatre

    2015-08-01

    Full Text Available Liquid Nitrogen is one of the major substance used as a chiller in industry such as Ice cream factory Milk Diary Storage of blood sample Blood Bank etc. It helps to maintain the required product at a lower temperature for preservation purpose. We cannot fully utilise the LN2 so practically if we are using 3.75 litre LN2 for a single day then around 12 of LN2 450 ml is wasted due to vaporisation. A pressure relief valve is provided to create a pressure difference. If there is no pressure difference between the cylinder carrying LN2 and its surrounding it will results in damage of container as well as wastage of LN2.Transmission of LN2 from TA55 to BA3 is carried manually .So care must be taken for the transmission of LN2 in order to avoid its wastage. With the help of this project concept the transmission of LN2 will be carried automatically so as to reduce the wastage of LN2 in case of manual operation.

  15. Fungal transmission of plant viruses.

    Science.gov (United States)

    Campbell, R N

    1996-01-01

    Thirty soilborne viruses or virus-like agents are transmitted by five species of fungal vectors. Ten polyhedral viruses, of which nine are in the family Tombusviridae, are acquired in the in vitro manner and do not occur within the resting spores of their vectors, Olpidium brassicae and O. bornovanus. Fungal vectors for other viruses in the family should be sought even though tombusviruses are reputed to be soil transmitted without a vector. Eighteen rod-shaped viruses belonging to the furo- and bymovirus groups and to an unclassified group are acquired in the in vivo manner and survive within the resting spores of their vector, O. brassicae, Polymyxa graminis, P. betae, and Spongospora subterranea. The viral coat protein has an essential role in in vitro transmission. With in vivo transmission a site in the coat protein-read through protein (CP-RT) of beet necrotic yellow vein furovirus determines vector transmissibility as does a site in a similar 98-kDa polyprotein of barley mild mosaic bymovirus. The mechanisms by which virions move (or are moved) into and out of the protoplasm of zoospores or of thalli needs study.

  16. 47 CFR 25.212 - Narrowband analog transmissions, digital transmissions, and video transmissions in the GSO Fixed...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Narrowband analog transmissions, digital transmissions, and video transmissions in the GSO Fixed-Satellite Service. 25.212 Section 25.212 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS...

  17. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  18. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-01-01

    Full Text Available Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3 design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  19. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  20. Transmission and archiving of digitalised radiography

    International Nuclear Information System (INIS)

    Zscherpel, U.; Rose, P.; Kaestner, R.; Mayer, R.; Heinrich, W.; Petesch, M.

    1995-01-01

    The 'TRENDT' research project is concerned with the transmission and archiving of digitalised radiography and with the application of wide band transmission networks in nondestructive material testing. (orig./HP) [de

  1. European bat Lyssavirus transmission among cats, Europe.

    Science.gov (United States)

    Dacheux, Laurent; Larrous, Florence; Mailles, Alexandra; Boisseleau, Didier; Delmas, Olivier; Biron, Charlotte; Bouchier, Christiane; Capek, Isabelle; Muller, Michel; Ilari, Frédéric; Lefranc, Tanguy; Raffi, François; Goudal, Maryvonne; Bourhy, Hervé

    2009-02-01

    We identified 2 cases of European bat lyssavirus subtype 1 transmission to domestic carnivores (cats) in France. Bat-to-cat transmission is suspected. Low amounts of virus antigen in cat brain made diagnosis difficult.

  2. Theory of transmission through disordered superlattices

    DEFF Research Database (Denmark)

    Wacker, Andreas; Hu, Ben Yu-Kuang

    1999-01-01

    We derive a theory for transmission through disordered finite superlattices in which the interface roughness scattering is treated by disorder averaging. This procedure permits efficient calculation of the transmission through samples with large cross sections. These calculations can be performed...

  3. A Power-Efficient Access Point Operation for Infrastructure Basic Service Set in IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Hua Ye Ming

    2006-01-01

    Full Text Available Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handheld devices with wireless LAN capability. In this paper, a hybrid protocol named improved PCF operation is proposed, which intelligently chooses the access point- (AP- assisted DCF (distributed coordinator function and enhanced PCF (point coordinator function transmission mechanism of IEEE 802.11 protocol in an infrastructure-based wireless LAN environment. Received signal strength indicator (RSSI is used to determine the tradeoff between direct mobile-to-mobile transmission and transmission routed by AP. Based on the estimation, mobile stations can efficiently communicate directly instead of being routed through AP if they are in the vicinity of each other. Furthermore, a smart AP protocol is proposed as extension to the improved PCF operation by utilizing the historical end-to-end delay information to decide the waking up time of mobile stations. Simulation results show that using the proposed protocol, energy consumption of mobile devices can be reduced at the cost of slightly longer end-to-end packet delay compared to traditional IEEE 802.11 PCF protocol. However, in a non-time-critical environment, this option can significantly prolong the operation time of mobile devices.

  4. Amyotrophic Lateral Sclerosis and Organ Donation: Is There Risk of Disease Transmission?

    OpenAIRE

    Holmes, Brandon B.; Diamond, Marc I.

    2012-01-01

    A new protocol suggests that patients with amyotrophic lateral sclerosis (ALS) are a viable source of tissue for organ transplantation. However, multiple lines of evidence suggest that many neurodegenerative diseases, including ALS, might progress due to transcellular propagation of protein aggregation among neurons. Transmission of the disease state from donor to host thus may be possible under the permissive circumstances of graft transplantation. We argue for careful patient selection and ...

  5. Trends in coordination and transmission service

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Investor-owned utilities increasingly are taking significant advantage of the benefits available from coordination transactions and transmission service. This chapter describes Edison Electric Institute (EEI's) estimate as to the growth in sales-for-resale (including coordination service) over the past two decades. With respect to transmission service, this chapter describes the significant growth in both the level of transmission service and the number of transmission agreements

  6. Orbiting transmission source for positron tomography

    International Nuclear Information System (INIS)

    Huesman, R.H.; Derenzo, S.E.; Cahoon, J.L.; Geyer, A.B.; Moses, W.W.; Uber, D.C.; Vuletich, T.; Budinger, T.F.

    1988-01-01

    Accidental suppression and effective data rates have been measured for the orbiting transmission source as implemented in the Donner 600-Crystal Positron Tomograph. A mechanical description of the orbiting source and a description of the electronics used to discard scattered and accidental events is included. Since accidental coincidences were the rate-limiting factor in transmission data acquisition, the new method allows us to acquire sufficient transmission data in a shorter time with a more active transmission source

  7. HVDC transmission from nuclear power plant

    International Nuclear Information System (INIS)

    Yoshida, Yukio; Takenaka, Kiyoshi; Taniguchi, Haruto; Ueda, Kiyotaka

    1980-01-01

    HVDC transmission directly from a nuclear power plant is expected as one of the bulk power transmission systems from distant power generating area. Successively from the analysis of HVDC transmission from BWR-type nuclear power plant, this report discusses dynamic response characteristics of HVDC transmission (double poles, two circuits) from PWR type nuclear power plant due to dc-line faults (DC-1LG, 2LG) and ac-line faults (3LG) near inverter station. (author)

  8. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  9. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  10. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  11. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  12. Topics on Electricity Transmission Pricing

    Energy Technology Data Exchange (ETDEWEB)

    Bjoerndal, Mette

    2000-02-01

    Within the last decade we have experienced deregulation of several industries, such as airlines, telecommunications and the electric utility industry, the last-mentioned being the focus of this work. Both the telecommunications and the electricity sector depend on network facilities, some of which are still considered as natural monopolies. In these industries, open network access is regarded as crucial in order to achieve the gains from increased competition, and transmission tariffs are important in implementing this. Based on the Energy Act that was introduced in 1991, Norway was among the first countries to restructure its electricity sector. On the supply side there are a large number of competing firms, almost exclusively hydro plants, with a combined capacity of about 23000 MW, producing 105-125 TWh per year, depending on the availability of water. Hydro plants are characterized by low variable costs of operation, however since water may be stored in dams, water has an opportunity cost, generally known as the water value, which is the shadow price of water when solving the generator's inter temporal profit maximization problem. Water values are the main factor of the producers' short run marginal cost. Total consumption amounts to 112-117 TWh a year, and consumers, even households, may choose their electricity supplier independent of the local distributor to which the customer is connected. In fact, approximately 10% of the households have actually changed supplier. The web-site www.konkurransetilsynet.no indicates available contracts, and www.dinside.no provides an ''energy-calculator'' where one can check whether it is profitable to switch supplier. If a customer buys energy from a remote supplier, the local distributor only provides transportation facilities for the energy and is compensated accordingly. Transmission and distribution have remained monopolized and regulated by the Norwegian Water Resources and Energy

  13. Topics in Electricity Transmission Pricing

    Energy Technology Data Exchange (ETDEWEB)

    Bjoerndal, Mette

    2000-02-01

    Within the last decade we have experienced deregulation of several industries, such as airlines, telecommunications and the electric utility industry, the last-mentioned being the focus of this work. Both the telecommunications and the electricity sector depend on network facilities, some of which are still considered as natural monopolies. In these industries, open network access is regarded as crucial in order to achieve the gains from increased competition, and transmission tariffs are important in implementing this. Based on the Energy Act that was introduced in 1991, Norway was among the first countries to restructure its electricity sector. On the supply side there are a large number of competing firms, almost exclusively hydro plants, with a combined capacity of about 23000 MW, producing 105-125 TWh per year, depending on the availability of water. Hydro plants are characterized by low variable costs of operation, however since water may be stored in dams, water has an opportunity cost, generally known as the water value, which is the shadow price of water when solving the generator's inter temporal profit maximization problem. Water values are the main factor of the producers' short run marginal cost. Total consumption amounts to 112-117 TWh a year, and consumers, even households, may choose their electricity supplier independent of the local distributor to which the customer is connected. In fact, approximately 10% of the households have actually changed supplier. The web-site www.konkurransetilsynet.no indicates available contracts, and www.dinside.no provides an ''energy-calculator'' where one can check whether it is profitable to switch supplier. If a customer buys energy from a remote supplier, the local distributor only provides transportation facilities for the energy and is compensated accordingly. Transmission and distribution have remained monopolized and regulated by the Norwegian Water Resources and Energy

  14. Topics on Electricity Transmission Pricing

    International Nuclear Information System (INIS)

    Bjoerndal, Mette

    2000-02-01

    Within the last decade we have experienced deregulation of several industries, such as airlines, telecommunications and the electric utility industry, the last-mentioned being the focus of this work. Both the telecommunications and the electricity sector depend on network facilities, some of which are still considered as natural monopolies. In these industries, open network access is regarded as crucial in order to achieve the gains from increased competition, and transmission tariffs are important in implementing this. Based on the Energy Act that was introduced in 1991, Norway was among the first countries to restructure its electricity sector. On the supply side there are a large number of competing firms, almost exclusively hydro plants, with a combined capacity of about 23000 MW, producing 105-125 TWh per year, depending on the availability of water. Hydro plants are characterized by low variable costs of operation, however since water may be stored in dams, water has an opportunity cost, generally known as the water value, which is the shadow price of water when solving the generator's inter temporal profit maximization problem. Water values are the main factor of the producers' short run marginal cost. Total consumption amounts to 112-117 TWh a year, and consumers, even households, may choose their electricity supplier independent of the local distributor to which the customer is connected. In fact, approximately 10% of the households have actually changed supplier. The web-site www.konkurransetilsynet.no indicates available contracts, and www.dinside.no provides an ''energy-calculator'' where one can check whether it is profitable to switch supplier. If a customer buys energy from a remote supplier, the local distributor only provides transportation facilities for the energy and is compensated accordingly. Transmission and distribution have remained monopolized and regulated by the Norwegian Water Resources and Energy Directorate (NVE). To prevent cross

  15. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998

    International Nuclear Information System (INIS)

    2005-04-01

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  16. HVDC transmission from isorated nuclear power plant

    International Nuclear Information System (INIS)

    Takenaka, Kiyoshi; Takasaki, Masahiro; Ichikawa, Tatemi; Hayashi, Toshiyuki

    1985-01-01

    HVDC transmission directly from nuclear power plant is considered as one of the patterns of long distance and large capacity transmission system. This reports considers two route HVDC transmission from PWR type nuclear power plant, and analyzes dynamic response characteristics due to bus fault, main protection failure and etc. using the AC-DC Power System Simulator. (author)

  17. Voluntary transmission access: The PSI proposal

    International Nuclear Information System (INIS)

    Norris, J.E.

    1990-01-01

    This article examines a proposal from PSI Energy, Inc. (formerly Public Service Company of Indiana) to allow open access to its power transmission facilities and the response of the Federal Energy Regulatory Commission's response to that proposal. The topics discussed include transmission tariffs, competition, market share, expansion of transmission capacity and its funding, and reciprocal agreements to provide similar service

  18. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  19. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  20. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  1. Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices

    Directory of Open Access Journals (Sweden)

    Zhiwei Wang

    2017-01-01

    Full Text Available Smart grid aims to improve the reliability, efficiency, and security of the traditional grid, which allows two-way transmission and efficiency-driven response. However, a main concern of this new technique is that the fine-grained metering data may leak the personal privacy information of the customers. Thus, the data aggregation mechanism for privacy protection is required for the meter report protocol in smart grid. In this paper, we propose an efficient privacy-preserving meter report protocol for the isolated smart grid devices. Our protocol consists of an encryption scheme with additively homomorphic property and a linearly homomorphic signature scheme, where the linearly homomorphic signature scheme is suitable for privacy-preserving data aggregation. We also provide security analysis of our protocol in the context of some typical attacks in smart grid. The implementation of our protocol on the Intel Edison platform shows that our protocol is efficient enough for the physical constrained devices, like smart meters.

  2. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  3. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  4. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  5. An implementation of a data-transmission pipelining algorithm on Imote2 platforms

    Science.gov (United States)

    Li, Xu; Dorvash, Siavash; Cheng, Liang; Pakzad, Shamim

    2011-04-01

    Over the past several years, wireless network systems and sensing technologies have been developed significantly. This has resulted in the broad application of wireless sensor networks (WSNs) in many engineering fields and in particular structural health monitoring (SHM). The movement of traditional SHM toward the new generation of SHM, which utilizes WSNs, relies on the advantages of this new approach such as relatively low costs, ease of implementation and the capability of onboard data processing and management. In the particular case of long span bridge monitoring, a WSN should be capable of transmitting commands and measurement data over long network geometry in a reliable manner. While using single-hop data transmission in such geometry requires a long radio range and consequently a high level of power supply, multi-hop communication may offer an effective and reliable way for data transmissions across the network. Using a multi-hop communication protocol, the network relays data from a remote node to the base station via intermediary nodes. We have proposed a data-transmission pipelining algorithm to enable an effective use of the available bandwidth and minimize the energy consumption and the delay performance by the multi-hop communication protocol. This paper focuses on the implementation aspect of the pipelining algorithm on Imote2 platforms for SHM applications, describes its interaction with underlying routing protocols, and presents the solutions to various implementation issues of the proposed pipelining algorithm. Finally, the performance of the algorithm is evaluated based on the results of an experimental implementation.

  6. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  7. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  8. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  9. [Heterosexual transmission of HIV infection

    Science.gov (United States)

    Coulaud, J P

    1993-02-01

    The AIDS epidemic has spread rapidly in Africa among the urban impoverished where multiple sexual partners and sexually transmitted diseases are common. Over 80% of the 9 million Africans who will develop AIDS before the year 2000 will have been contaminated sexually. Poverty, multiple sexual partners in the framework of prostitution, and drug addiction are responsible for rapid spread of HIV infection in Southeast Asia, the West India, and Brazil. Drug addiction has played a major role in diffusion of HIV into the general population of Europe and the US. Prevalence rates are much higher in sexually transmitted disease centers in France and the US than among blood donors or pregnant women. Sexually transmitted diseases and heterosexual transmission have been studied in Africas since diagnostic tests became available. Several studies, the majority conducted among prostitutes in Nairobi or Kinshasa and their clients, allow establishment of a list of sexually transmitted diseases associated with increased risk of seroconversion. Genital ulcers within the past 6 months presented a relative risk of 2-4 depending on the series. Urethral or cervical gonorrhea has a lower relative risk of 1.2 in most studies. Absence of circumcision was also a risk factor. Studies were subsequently conducted in Europe on factors favoring sexual transmission. 513 heterosexual couples together for a minimum duration of 18 months and an average of 38 months were included in the Multicenter European Study conducted in 10 centers in 9 countries. The "index" subject was male in 400 cases and female in 113. At entry into the study, 73 of 400 males (18.2%) and 10 of 113 females (8.8%) had already infected their partners. Duration of union, frequency of intercourse, mode of transmission of the index subject, and oral contraceptive use had no effect on risk of transmission. Factors increasing risk of infection included the severity of immunosuppression of the index subject, whether judged by

  10. [The control of vectorial transmission].

    Science.gov (United States)

    Silveira, Antônio Carlos; Dias, João Carlos Pinto

    2011-01-01

    Between 1950 and 1951, the first Prophylactic campaign against Chagas Diseases was carried on in Brazil by the so existing Serviço Nacional de Malária. The actions involving chemical vector control comprehended 74 municipalities along the Rio Grande Valley, between the States of São Paulo and Minas Gerais. Ever since, until 1975, the activities were performed according the availability of resources, being executed with more or less regularity and coverage. At that time, Chagas disease did no represent priority, in comparison with other endemic diseases prevalent in the Country. Even so, taking into account the accumulated data along those 25 years, the volume of work realized cannot be considered despicable. Nevertheless, it was few consistent, in terms of its impact on disease transmission. In 1975, with an additional injection of resources surpassed from the malaria program, plus the methodological systematization of the activities, and with the results of two extensive national inquiries (entomologic and serologic), the activities for vector control could be performed regularly, following two basic principles: interventions in always contiguous areas, progressively enlarged, and sustainability (continuity) of the activities, until being attained determined requirements and purpose previously established. Such actions and strategies lead into the exhaustion of the populations of the principal vector species, Triatoma infestans, no autochthonous and exclusively domiciliary, as well as the control of the domiciliary colonization of autochthonous species important to disease transmission. Vector transmission today is being considered residual, by means of some few native and peridomestic species, such as Triatoma brasiliensis and Triatoma pseudomaculata. There is, also, the risk of progressive domiciliation of some species before considered sylvatic, such as Panstrongylus lutzi and Triatoma rubrovaria. Finally, there is the possibility of the occurrence of cases

  11. Transmission system planning in Ontario

    Energy Technology Data Exchange (ETDEWEB)

    Barrie, D; Macedo, F X; Mcconnach, J S [Ontario Hydro, Toronto, ON (Canada)

    1994-12-31

    In recent years, new and modified approaches to planning the large transmission system that serves the province of Ontario, Canada, have been necessary to accommodate the rapidly changing planning environment including slower uncertain growth, ageing of facilities, integration of demand side management and non utility generation options, increased competitiveness, increased financial stresses and affordable constraints. This paper describes some of the new and modified approaches and tools that have been adopted or are being developed by Ontario Hydro to cope with this changing environment. (author) 9 refs., 4 figs.

  12. Transmission analysis in WDM networks

    DEFF Research Database (Denmark)

    Rasmussen, Christian Jørgen

    1999-01-01

    This thesis describes the development of a computer-based simulator for transmission analysis in optical wavelength division multiplexing networks. A great part of the work concerns fundamental optical network simulator issues. Among these issues are identification of the versatility and user...... the different component models are invoked during the simulation of a system. A simple set of rules which makes it possible to simulate any network architectures is laid down. The modelling of the nonlinear fibre and the optical receiver is also treated. The work on the fibre concerns the numerical solution...

  13. Neutron transmission through crystalline Fe

    International Nuclear Information System (INIS)

    Adib, M.; Habib, N.; Kilany, M.; El-Mesiry, M.S.

    2004-01-01

    The neutron transmission through crystalline Fe has been calculated for neutron energies in the range 10 4 < E<10 eV using an additive formula. The formula permits calculation of the nuclear capture, thermal diffuse and Bragg scattering cross-section as a function of temperature and crystalline form. The obtained agreement between the calculated values and available experimental ones justifies the applicability of the used formula. A feasibility study on using poly-crystalline Fe as a cold neutron filter and a large Fe single crystal as a thermal one is given

  14. Force transmission in epithelial tissues.

    Science.gov (United States)

    Vasquez, Claudia G; Martin, Adam C

    2016-03-01

    In epithelial tissues, cells constantly generate and transmit forces between each other. Forces generated by the actomyosin cytoskeleton regulate tissue shape and structure and also provide signals that influence cells' decisions to divide, die, or differentiate. Forces are transmitted across epithelia because cells are mechanically linked through junctional complexes, and forces can propagate through the cell cytoplasm. Here, we review some of the molecular mechanisms responsible for force generation, with a specific focus on the actomyosin cortex and adherens junctions. We then discuss evidence for how these mechanisms promote cell shape changes and force transmission in tissues. © 2016 Wiley Periodicals, Inc.

  15. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  16. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  17. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    Directory of Open Access Journals (Sweden)

    Prasan Kumar Sahoo

    2014-11-01

    Full Text Available Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  18. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-11-25

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  19. Adaptive Beaconing in Mobility Aware Clustering Based MAC Protocol for Safety Message Dissemination in VANET

    Directory of Open Access Journals (Sweden)

    Nishu Gupta

    2017-01-01

    Full Text Available Majority of research contributions in wireless access in vehicular environment (WAVE/IEEE 802.11p standard focus on life critical safety-related applications. These applications require regular status update of vehicle’s position referred to as beaconing. Periodic beaconing in vehicle to vehicle communication leads to severe network congestion in the communication channel. The condition worsens under high vehicular density where it impacts reliability and upper bound latency of safety messages. In this paper, WAVE compliant enhancement to the existing IEEE 802.11p protocol is presented which targets prioritized delivery of safety messages while simultaneously provisioning the dissemination of nonsafety messages. Proposed scheme relies on dynamic generation of beacons to mitigate channel congestion and inefficient bandwidth utilization by reducing transmission frequency of beacons. Through the use of clustering mechanism, different beaconing frequencies and different data transmission rates are assigned to prioritize vehicular mobility. Through extensive simulation results, the performance of the proposed approach is evaluated in terms of a wide range of quality of service (QoS parameters for two different transmission ranges. Results show that the proposed protocol provides significant enhancement and stability of the clustered topology in vehicular ad hoc network over existing standard and other protocols with similar applications.

  20. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    Science.gov (United States)

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  1. FF-LYNX: protocol and interfaces for the control and readout of future Silicon detectors

    Energy Technology Data Exchange (ETDEWEB)

    Amendola, A; Bianchi, G; Fanucci, L; Saponara, S; Tongiani, C [Universita di Pisa, Dipartimento di Ingegneria dell' Informazione (DII-EIT), Via G. Caruso 16, 56122 Pisa (Italy); Castaldi, R; Minuti, M; Verdini, P G [INFN, Sezione di Pisa, Largo B. Pontecorvo 3, 56018 Pisa (Italy); Incandela, J; Magazzu, G; Rossin, R, E-mail: Guido.Magazzu@pi.infn.i [University of California at Santa Barbara (UCSB), Department of Physics, 5113 Broida Hall, CA 93106 Santa Barbara (United States)

    2010-06-15

    The FF-LYNX protocol provides an innovative solution for the integrated distribution of Timing, Trigger and Control signals and the data readout in future High Energy Physics experiments. Transmitter and receiver interfaces implementing the FF-LYNX protocol have been simulated with a high-level simulator and in an FPGA based emulator. The design of the interfaces in a commercial CMOS technology as radiation tolerant and low power modules is ongoing and the submission of a test circuit is foreseen in fall 2010. The key features of the protocol are described in this paper as well as its possible application for the transmission from Silicon Trackers to trigger processors with short and constant latency of data to be used for the L1 trigger generation.

  2. Improved Wojcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss

    International Nuclear Information System (INIS)

    Zhang Zhanjun; Li Yong; Man Zhongxiao

    2005-01-01

    The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme has a zero eavesdropping-induced channel loss and produces perfect anticorrelation. Therefore, the eavesdropper Eve can safely attack all the transmitted bits and the eavesdropping information gain can always exceed the legitimate user's information gain in the whole domain of the quantum channel transmission efficiency η, i.e., [0,100%]. This means that the ping-pong protocol can be completely eavesdropped in its original version. But the improvement of the ping-pong protocol security produced by Wojcik is also suitable for our eavesdropping attack

  3. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  4. A Multipath Routing Protocol Based on Bloom Filter for Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Junwei Jin

    2016-01-01

    Full Text Available On-demand multipath routing in a wireless ad hoc network is effective in achieving load balancing over the network and in improving the degree of resilience to mobility. In this paper, the salvage capable opportunistic node-disjoint multipath routing (SNMR protocol is proposed, which forms multiple routes for data transmission and supports packet salvaging with minimum overhead. The proposed mechanism constructs a primary path and a node-disjoint backup path together with alternative paths for the intermediate nodes in the primary path. It can be achieved by considering the reverse route back to the source stored in the route cache and the primary path information compressed by a Bloom filter. Our protocol presents higher capability in packet salvaging and lower overhead in forming multiple routes. Simulation results show that SNMR outperforms the compared protocols in terms of packet delivery ratio, normalized routing load, and throughput.

  5. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  6. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  7. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  8. Imaging dopamine transmission in schizophrenia

    International Nuclear Information System (INIS)

    Laruelle, M.

    1998-01-01

    Over the last ten years, several positron emission tomography (PET) and single photon computerized tomography (SPECT) studies of the dopamine (DA) system in patients with schizophrenia were performed to test the hypothesis that DA hyperactivity is associated with this illness. In this paper are reviewed the results of fifteen brain imaging studies comparing indices of DA function in drug naive or drug free patients with schizophrenia and healthy controls: thirteen studies included measurements of Da D 2 receptor density, two studies compared amphetamine-induced DA release, and two studies measured DOPA decarboxylase activity, an enzyme involved in DA synthesis. It was conducted a meta-analysis of the studies measuring D 2 receptor density parameters, under the assumption that all tracers labeled the same population of D 2 receptors. This analysis revealed that, compared to healthy controls, patients with schizophrenia present a significant but mild elevation of D 2 receptor density parameters and a significant larger variability of these indices. It was found no statistical evidence that studies performed with radiolabeled butyrophenones detected a larger increase in D 2 receptor density parameters than studies performed with other radioligands, such as benzamides. Studies of presynaptic activity revealed an increase in DA transmission response to amphetamine challenge, and an increase in DOPA decarboxylase activity. Together, these data are compatible with both pre- and post-synaptic alterations of DA transmission in schizophrenia. Future studies should aim at a better characterization of these alterations, and at defining their role in the pathophysiology of the illness

  9. Wildlife and electric power transmission

    Science.gov (United States)

    Ellis, D.H.; Goodwin, J.G.; Hunt, J.R.; Fletcher, John L.; Busnel, R.G.

    1978-01-01

    Hundreds of thousands of miles of transmission lines have been introduced into our natural environment. These lines and their corridors can be damaging or beneficial to wildlife communities depending on how they are designed, where they are placed, and when they are constructed and maintained. With the current trend toward UHV systems, new problems (associated with additional increments in audible noise, electric and magnetic force fields, etc.) must be addressed. We recommend the following areas for careful study: (1) the response of wilderness species to transmission lines and line construction and maintenance activities (2) the magnitude of bird collision and electrocution mortality, (3) the response of power corridor and power tower in habiting wildlife to laboratory and field doses of electro-chemical oxidants, corona noise, electric and magnetic fields, etc., (4) the productivity of tower inhabiting birds compared with nearby non-tower nesters, and (5) the influence of powerline corridors on mammalian and avian migration patterns. It is our hope that the questions identified in this study will help stimulate further research so that we can maximize wildlife benefits and minimize wildlife detriments.

  10. neutron transmission through crystalline materials

    International Nuclear Information System (INIS)

    El Mesiry, M.S.

    2011-01-01

    The aim of the present work is to study the neutron transmission through crystalline materials. Therefore a study of pyrolytic graphite (PG) as a highly efficient selective thermal neutron filter and Iron single crystal as a whole one, as well as the applicability of using their polycrystalline powders as a selective cold neutron filters is given. Moreover, the use of PG and iron single crystal as an efficient neutron monochromator is also investigated. An additive formula is given which allows calculating the contribution of the total neutron cross-section including the Bragg scattering from different )(hkl planes to the neutron transmission through crystalline iron and graphite. The formula takes into account their crystalline form. A computer CFe program was developed in order to provide the required calculations for both poly- and single-crystalline iron. The validity of the CFe program was approved from the comparison of the calculated iron cross-section data with the available experimental ones. The CFe program was also adapted to calculate the reflectivity from iron single crystal when it used as a neutron monochromator The computer package GRAPHITE, developed in Neutron Physics laboratory, Nuclear Research Center, has been used in order to provide the required calculations for crystalline graphite in the neutron energy range from 0.1 meV to 10 eV. A Mono-PG code was added to the computer package GRAPHITE in order to calculate the reflectivity from PG crystal when it used as a neutron monochromator.

  11. [Human transmissible subacute spongiform encephalopathy].

    Science.gov (United States)

    Dormont, D

    1994-05-01

    Human transmissible spongiform encephalopathies (TSE) are rare chronic subacute degenerative diseases of the central nervous system (CNS) which include Creutzfeldt-Jakob disease (CJD), Kuru, Gerstmann-Sträussler-Scheinker syndrome (GSS), and Fatal Familial Insomnia (FFI). CJD can be either inherited or sporadic. All these diseases are always fatal. Neuropathological features are mainly constituted of neuronal vacuolisation, neuronal death, gliosis with hyperastrocytosis; plaques might be evidenced in kuru and GSS. Neither inflammatory syndrome nor demyelination is detectable. No virus like structure could be identified reproducibly. Human TSE are transmissible to non human primates and rodents. Iatrogenic CJD have been described after tissue grafting (cornea, dura mater), neurosurgery, electrophysiology investigation, and treatment with pituitary derived gonadotrophins and growth hormone. Molecular biochemistry of the CNS investigation revealed that a host encoded protein, the prion protein (PrP), accumulates proportionally to the infectious titer: this abnormality is the only detectable hallmark in TSE. Infectious fractions contain no detectable specific nucleic acid, and are mainly constituted of PrP under an isoform which resists to proteinase K digestion (PrP-res). The PrP gene (PRNP) is located on chromosome 20 in humans. Several mutations of this gene have been described in all inherited TSE (CJD, GSS, and IFF). No treatment is available today. Agents inducing TSE (TSA) are not known: several authors claim that TSA are only constituted of PrP-res; others support the hypothesis of a conventional agent with a specific genetic information.

  12. Money and transmission of bacteria.

    Science.gov (United States)

    Gedik, Habip; Voss, Timothy A; Voss, Andreas

    2013-08-28

    Money is one of the most frequently passed items in the world. The aim of this study was to ascertain the survival status of bacteria including Staphylococcus aureus, Escherichia coli, and Vancomycin- Resistant Enterococci (VRE) on banknotes from different countries and the transmission of bacteria to people who come in contact with the banknotes. The survival rate was highest for the Romanian Leu yielding all three microorganisms used after both three and six hours of drying. Furthermore, the Leu was the only banknote to yield VRE after one day of drying. Other currencies either enabled the survival of Extended-Spectrum Beta-Lactamases (ESBL) and VRE (e.g. Euro), but not of MRSA, or the other way round (e.g. US Dollar). While a variety of factors such as community hygiene levels, people's behaviour, and antimicrobial resistance rates at community level obviously have influence on the transmission of resistant microorganisms, the type of banknote-paper may be an additional variable to consider.

  13. The limits of HVDC transmission

    International Nuclear Information System (INIS)

    Pickard, William F.

    2013-01-01

    Renewable energy is abundant, but not necessarily near the urban centers where it will be used. Therefore, it must be transported; and this transport entails a systemic energy penalty. In this paper simple qualitative calculations are introduced to show (i) that high-voltage direct-current (HVDC) power lines for megameter and greater distances are unlikely to achieve power capacities much beyond 2 GW, although they can be paralleled; (ii) that most sources and sinks of electric power are rather less than 10,000 km apart; (iii) that such long lines can be constructed to have transmission losses -tilde 2%; and (iv) that lines of such low loss in fact meet minimal standards of intergenerational equity. - Highlights: • Renewable Energy is abundant, but not necessarily near population centers. • Its transportation requires energy and can be a major systemic inefficiency. • HVDC can be transmitted 10,000 km with 2% loss and near-optimal embodied energy. • Such transmission meets the requirements of intergenerational equity

  14. Information transmission on hybrid networks

    Science.gov (United States)

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  15. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  16. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  17. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  18. Transmission access issues: Present and future

    International Nuclear Information System (INIS)

    Bahl, P.K.; Gray, R.G.

    1992-01-01

    In recent years, the electric industry has undergone dramatic changes as the federal and state governments have encouraged bulk power production by Independent Power Producers (IPPS) and Qualified Facilities (QFs). With decentralization and the consequent competition in the field of bulk power production, there has emerged the problem of non-utility generators (NUGS) and of transmission dependent utilities accessing the existing transmission systems owned by electric utilities. This paper presents current and future issues related to transmission access by IPPS, QFs and transmission dependent utilities. These issues include: (a) impact on system reliability, (b) impact of pricing strategies, (c) changes in state and federal regulations, (d) transmission proposals by various entities, (e) present access arrangements, (f) formation of the Western Systems Power Pool (WSPP), and (g) siting difficulties. The transmission access problem warrants consideration of transmission services, coordination among electric utilities, joint planning on a regional basis, and accommodation of IPPs and NUGs

  19. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  20. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  1. APEnet+ 34 Gbps data transmission system and custom transmission logic

    International Nuclear Information System (INIS)

    Ammendola, R; Biagioni, A; Frezza, O; Lonardo, A; Cicero, F Lo; Paolucci, P S; Rossetti, D; Simula, F; Tosoratto, L; Vicini, P

    2013-01-01

    APEnet+ is a point-to-point, low-latency, 3D-torus network controller integrated in a PCIe Gen2 board based on the Altera Stratix IV FPGA. We characterize the transmission system (embedded transceivers driving external QSFP+ modules) analyzing signal integrity, throughput, latency, BER and jitter at different data rates up to 34 Gbps. We estimate the efficiency of a custom logic able to sustain 2.6 GB/s per link with an FPGA on-chip memory footprint of 40 KB, providing deadlock-free routing and systemic awareness of faults. Finally, we show the preliminary results obtained with the embedded transceivers of a next-generation FPGA and outline some ideas to increase the performance with the same FPGA memory footprint

  2. APEnet+ 34 Gbps data transmission system and custom transmission logic

    Energy Technology Data Exchange (ETDEWEB)

    Ammendola, R [INFN Sezione di Roma Tor Vergata, Via della Ricerca Scientifica, 1 - 00133 Roma Italy (Italy); Biagioni, A; Frezza, O; Lonardo, A; Cicero, F Lo; Paolucci, P S; Rossetti, D; Simula, F; Tosoratto, L; Vicini, P [INFN Sezione di Roma, P.le Aldo Moro, 2 - 00185 Roma Italy (Italy)

    2013-12-01

    APEnet+ is a point-to-point, low-latency, 3D-torus network controller integrated in a PCIe Gen2 board based on the Altera Stratix IV FPGA. We characterize the transmission system (embedded transceivers driving external QSFP+ modules) analyzing signal integrity, throughput, latency, BER and jitter at different data rates up to 34 Gbps. We estimate the efficiency of a custom logic able to sustain 2.6 GB/s per link with an FPGA on-chip memory footprint of 40 KB, providing deadlock-free routing and systemic awareness of faults. Finally, we show the preliminary results obtained with the embedded transceivers of a next-generation FPGA and outline some ideas to increase the performance with the same FPGA memory footprint.

  3. MDP-based resource allocation for triple-play transmission on xDSL systems

    Science.gov (United States)

    de Souza, Lamartine V.; de Carvalho, Glaucio H. S.; Cardoso, Diego L.; de Carvalho, Solon V.; Frances, Carlos R. L.; Costa, João C. W. A.; Riu, Jaume Rius i.

    2007-09-01

    Many broadband services are based on multimedia applications, such as voice over internet protocol (VoIP), video conferencing, video on demand (VoD), and internet protocol television (IPTV). The combination "triple-play" is often used with IPTV. It simply means offering voice, video and data. IPTV and others services uses digital broadband networks such as ADSL2+ (Asymmetric Digital Subscriber Line) and VDSL (Very High Rate DSL) to transmit the data. We have formulated a MDP (Markov Decision Process) for a triple-play transmission on DSL environment. In this paper, we establish the relationship between DSL transmission characteristics and its finite-state Markov model for a triple-play transmission system. This relationship can be used for a resource management for multimedia applications delivered through a broadband infrastructure. The solution to our optimization problem can be found using dynamic programming (DP) techniques, such as value iteration and its variants. Our study results in a transmission strategy that chooses the optimal resource allocation according the triple-play traffic requirements, defined in technical report TR-126 (Triple-Play Services Quality of Experience Requirements) from DSL Forum, minimizing quality of service (QoS) violations with respect to bandwidth. Three traffic classes (video, audio, and best effort internet data) are defined and analyzed. Our simulation results show parameters like as blocking probability for each class, link utilization and optimal control policies. The MDP-based approach provides a satisfactory way of resource management for a DSL system.

  4. Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks

    Directory of Open Access Journals (Sweden)

    Yulong Shen

    2014-03-01

    Full Text Available This work considers the problem of secure and reliable information transmission via relay cooperation in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While previous work on this problem mainly studied infinite networks and their asymptotic behavior and scaling law results, this papers focuses on a more practical network with finite number of system nodes and explores the corresponding exact result on the number of eavesdroppers one network can tolerate to ensure desired secrecy and reliability. We first study the scenario where path-loss is equal between all pairs of nodes and consider two transmission protocols there, one adopts an optimal but complex relay selection process with less load balance capacity while the other adopts a random but simple relay selection process with good load balance capacity. Theoretical analysis and numerical results are then provided to determine the maximum number of eavesdroppers one network can tolerate to ensure a desired performance in terms of the secrecy outage probability and transmission outage probability. We further extend our study to the more general scenario where path-loss between each pair of nodes also depends on the distance between them, for which a new transmission protocol with both preferable relay selection and good load balance as well as the corresponding theoretical analysis and numerical results are presented.

  5. Transmission Algorithm with QoS Considerations for a Sustainable MPEG Streaming Service

    Directory of Open Access Journals (Sweden)

    Sang-Hyong Kim

    2017-03-01

    Full Text Available With the proliferation of heterogeneous networks, there is a need to provide multimedia stream services in a sustainable manner. It is especially critical to maintain the Quality of Service (QoS standards. Existing multimedia streaming services have been studied to guarantee QoS on the receiving side. QoS has not been ensured due to the fact that the loss of streaming data to be transmitted has not been considered in network conditions. With an algorithm that considers the QoS and can reduce the overhead of the network, it will be possible to reduce the transmission error and wastage of communication network resources. In this paper, we propose a scheme that improves the reliability of multimedia transmissions by using an adaptive algorithm that switches between UDP (User Datagram Protocol and TCP (Transmission Control Protocol based on the size of the data. In addition, we present a method that retransmits essential portions of the multimedia data, thus improving transmission efficiency. We simulate an MPEG (Moving Picture Experts Group stream service and evaluate the performance of the proposed adaptive MPEG stream service.

  6. Novel technical solutions for wireless ECG transmission & analysis in the age of the internet cloud.

    Science.gov (United States)

    Al-Zaiti, Salah S; Shusterman, Vladimir; Carey, Mary G

    2013-01-01

    Current guidelines recommend early reperfusion therapy for ST-elevation myocardial infarction (STEMI) within 90 min of first medical encounter. Telecardiology entails the use of advanced communication technologies to transmit the prehospital 12-lead electrocardiogram (ECG) to offsite cardiologists for early triage to the cath lab; which has been shown to dramatically reduce door-to-balloon time and total mortality. However, hospitals often find adopting ECG transmission technologies very challenging. The current review identifies seven major technical challenges of prehospital ECG transmission, including: paramedics inconvenience and transport delay; signal noise and interpretation errors; equipment malfunction and transmission failure; reliability of mobile phone networks; lack of compliance with the standards of digital ECG formats; poor integration with electronic medical records; and costly hardware and software pre-requisite installation. Current and potential solutions to address each of these technical challenges are discussed in details and include: automated ECG transmission protocols; annotatable waveform-based ECGs; optimal routing solutions; and the use of cloud computing systems rather than vendor-specific processing stations. Nevertheless, strategies to monitor transmission effectiveness and patient outcomes are essential to sustain initial gains of implementing ECG transmission technologies. © 2013.

  7. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    Science.gov (United States)

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  8. On the Performance Evaluation of a MIMO-WCDMA Transmission Architecture for Building Management Systems.

    Science.gov (United States)

    Tsampasis, Eleftherios; Gkonis, Panagiotis K; Trakadas, Panagiotis; Zahariadis, Theodοre

    2018-01-08

    The goal of this study was to investigate the performance of a realistic wireless sensor nodes deployment in order to support modern building management systems (BMSs). A three-floor building orientation is taken into account, where each node is equipped with a multi-antenna system while a central base station (BS) collects and processes all received information. The BS is also equipped with multiple antennas; hence, a multiple input-multiple output (MIMO) system is formulated. Due to the multiple reflections during transmission in the inner of the building, a wideband code division multiple access (WCDMA) physical layer protocol has been considered, which has already been adopted for third-generation (3G) mobile networks. Results are presented for various MIMO orientations, where the mean transmission power per node is considered as an output metric for a specific signal-to-noise ratio (SNR) requirement and number of resolvable multipath components. In the first set of presented results, the effects of multiple access interference on overall transmission power are highlighted. As the number of mobile nodes per floor or the requested transmission rate increases, MIMO systems of a higher order should be deployed in order to maintain transmission power at adequate levels. In the second set of results, a comparison is performed among transmission in diversity combining and spatial multiplexing mode, which clearly indicate that the first case is the most appropriate solution for indoor communications.

  9. MATLAB Simulation of RFID Communication Protocol for Sensor Data Acquisition

    Directory of Open Access Journals (Sweden)

    Soumen GHOSH

    2015-05-01

    Full Text Available Data acquisition processes the sampling and conditioning the signals that measure real world physical conditions such as temperature, pressure, flow etc. and convert the signal into in appropriate format for displaying and transmission to remote end. Now a days RFID i.e. Radio Frequency Identification plays a vital role in Data acquisition system. The present article proposes a smart DAS scheme containing RFID reader and Active tag. The data acquisition system is interfaced with tag through I2C bus. The reader communicates with tag following RFID communication protocol requesting to send the logged data which are refreshed and stored into tag memory periodically. The communication is simulated using MATLAB software successfully.

  10. SIMULATION AND ANALYSIS OF GREEDY ROUTING PROTOCOL IN VIEW OF ENERGY CONSUMPTION AND NETWORK LIFETIME IN THREE DIMENSIONAL UNDERWATER WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    SHEENA KOHLI

    2017-11-01

    Full Text Available Underwater Wireless Sensor Network (UWSN comprises of a number of miniature sized sensing devices deployed in the sea or ocean, connected by dint of acoustic links to each other. The sensors trap the ambient conditions and transmit the data from one end to another. For transmission of data in any medium, routing protocols play a crucial role. Moreover, being battery limited, an unavoidable parameter to be considered in operation and analysis of protocols is the network energy and the network lifetime. The paper discusses the greedy routing protocol for underwater wireless sensor networks. The simulation of this routing protocol also takes into consideration the characteristics of acoustic communication like attenuation, transmission loss, signal to noise ratio, noise, propagation delay. The results from these observations may be used to construct an accurate underwater communication model.

  11. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  12. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  13. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  14. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  15. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  16. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  17. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  18. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  19. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  20. Transmission policy in the United States

    International Nuclear Information System (INIS)

    Joskow, P.L.

    2005-01-01

    This paper provides an overview of the development of electric power transmission access, pricing and investment policies in the US over the last 15 years and evaluates the current state of those policies. Pre-liberalization transmission access and pricing policies are reviewed first since more recent policies have evolved from them. FERC's efforts to ensure that transmission owning utilities provide non-discriminatory access and pricing to wholesale transmission customers, culminating in Order 888 and 889 are discussed. These rules did not respond to problems created by a highly balkanized transmission system and only partially responded to problems caused by common ownership and operation of transmission networks with generating and marketing businesses in the same regions. These problems motivated FERC to seek to create Regional Transmission Organizations (RTO) meeting a long list of criteria related to governance, network operations, transmission pricing and investment as reflected in Order 2000. The slow pace of 'voluntary' reform following Order 2000 led FERC to issue a proposed Standard Market Design Rule (SMD) which provided more detailed prescriptions for wholesale market design, network operations, regional planning, resource adequacy, and transmission investment. The SMD rule confronted enormous resistance from groups of utilities and states that had not embraced an electricity sector liberalization agenda. However, many of the provisions of the SMD are being implemented by the RTOs and ISOs in the Northeast and Midwest. PJM's market rules and transmission pricing, planning and investment policies are reviewed as an articulation of FERC's RTO and SMD visions. (author)

  1. Magnetically insulated transmission line oscillator

    Science.gov (United States)

    Bacon, L.D.; Ballard, W.P.; Clark, M.C.; Marder, B.M.

    1987-05-19

    A magnetically insulated transmission line oscillator employs self-generated magnetic fields to generate microwave energy. An anode of the oscillator includes slow-wave structures which are formed of a plurality of thin conductive vanes defining cavities therebetween, and a gap is formed between the anode and a cathode of the oscillator. In response to a pulsed voltage applied to the anode and cathode, self-generated magnetic fields are produced in a cross-field orientation with respect to the orientation of the electric field between the anode and the cathode. The cross-field magnetic fields insulate the flow of electrons in the gap and confine the flow of electrons within the gap. 11 figs.

  2. Multimedia signal coding and transmission

    CERN Document Server

    Ohm, Jens-Rainer

    2015-01-01

    This textbook covers the theoretical background of one- and multidimensional signal processing, statistical analysis and modelling, coding and information theory with regard to the principles and design of image, video and audio compression systems. The theoretical concepts are augmented by practical examples of algorithms for multimedia signal coding technology, and related transmission aspects. On this basis, principles behind multimedia coding standards, including most recent developments like High Efficiency Video Coding, can be well understood. Furthermore, potential advances in future development are pointed out. Numerous figures and examples help to illustrate the concepts covered. The book was developed on the basis of a graduate-level university course, and most chapters are supplemented by exercises. The book is also a self-contained introduction both for researchers and developers of multimedia compression systems in industry.

  3. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  4. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  5. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  6. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  7. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  8. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  9. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  10. Electricity transmission pricing and technology

    International Nuclear Information System (INIS)

    Einhorn, M.; Siddiqi, R.

    1996-01-01

    The electric utility industry and its stake holders in the United States appear to be at a critical juncture in time. Powerful forces of global proportions are propelling the industry instinctively and in a secular fashion towards restructuring. That the industry will change is a fait accomplii. The nature and timing of the change is still a matter of intense debate, however. Because of the evolution of the industry into its present-day form, i.e. regulated local monopolies in their designated franchise service territories, the relative roles and expectations of various institutions would have to change to conform to the new state in the future. In either encouraging, or allowing this change to happen, society is essentially saying that future societal welfare would be better served by the changed structure contemplated. What that assumption translates into in more direct terms is that creation of future wealth would be better accomplished through redistribution of wealth today. Thoughtful individuals recognize the enormous responsibility placed upon the various entities empowered with jurisdiction over the timing and nature of the structural change. They are trying hard to bring analytical rigor to bear on the debate. One very critical element of this debate on restructuring is the issue of the treatment of transmission. The issue has been variously labeled transmission access, or pricing. Volumes have been written and spoken on this topic. We felt that there was a pressing need to assemble a volume which would serve as a one-stop source for varied viewpoints and comprehensive coverage of the subject, both technical and economic. 58 figs., 23 tabs., 103 refs

  11. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  12. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  13. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  14. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  15. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  16. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  17. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  18. Secure and Efficient Transmission of Hyperspectral Images for Geosciences Applications

    Science.gov (United States)

    Carpentieri, Bruno; Pizzolante, Raffaele

    2017-12-01

    Hyperspectral images are acquired through air-borne or space-borne special cameras (sensors) that collect information coming from the electromagnetic spectrum of the observed terrains. Hyperspectral remote sensing and hyperspectral images are used for a wide range of purposes: originally, they were developed for mining applications and for geology because of the capability of this kind of images to correctly identify various types of underground minerals by analysing the reflected spectrums, but their usage has spread in other application fields, such as ecology, military and surveillance, historical research and even archaeology. The large amount of data obtained by the hyperspectral sensors, the fact that these images are acquired at a high cost by air-borne sensors and that they are generally transmitted to a base, makes it necessary to provide an efficient and secure transmission protocol. In this paper, we propose a novel framework that allows secure and efficient transmission of hyperspectral images, by combining a reversible invisible watermarking scheme, used in conjunction with digital signature techniques, and a state-of-art predictive-based lossless compression algorithm.

  19. Sample Preparation and Imaging of Exosomes by Transmission Electron Microscopy.

    Science.gov (United States)

    Jung, Min Kyo; Mun, Ji Young

    2018-01-04

    Exosomes are nano-sized extracellular vesicles secreted by body fluids and are known to represent the characteristics of cells that secrete them. The contents and morphology of the secreted vesicles reflect cell behavior or physiological status, for example cell growth, migration, cleavage, and death. The exosomes' role may depend highly on size, and the size of exosomes varies from 30 to 300 nm. The most widely used method for exosome imaging is negative staining, while other results are based on Cryo-Transmission Electron Microscopy, Scanning Electron Microscopy, and Atomic Force Microscopy. The typical exosome's morphology assessed through negative staining is a cup-shape, but further details are not yet clear. An exosome well-characterized through structural study is necessary particular in medical and pharmaceutical fields. Therefore, function-dependent morphology should be verified by electron microscopy techniques such as labeling a specific protein in the detailed structure of exosome. To observe detailed structure, ultrathin sectioned images and negative stained images of exosomes were compared. In this protocol, we suggest transmission electron microscopy for the imaging of exosomes including negative staining, whole mount immuno-staining, block preparation, thin section, and immuno-gold labelling.

  20. Simple algorithm for improved security in the FDDI protocol

    Science.gov (United States)

    Lundy, G. M.; Jones, Benjamin

    1993-02-01

    We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.