WorldWideScience

Sample records for upstream mobility scheme

  1. Willingness of upstream and downstream resource managers to engage in compensation schemes for environmental services

    Directory of Open Access Journals (Sweden)

    Chapika Sangkapitux

    2009-04-01

    Full Text Available Providing compensation for agricultural conservation practices adopted by upstream farmers is still an alien concept in the Thai political context. The governance of common-pool natural resources, such as forest and water, has traditionally been under the control of powerful government line agencies, while the contribution of local communities to natural resource conservation have been hardly recognized by policy-makers. Drawing on a case study in Mae Sa watershed, Chiang Mai province, northern Thailand, this paper discusses the potential of developing compensation schemes in a socio-political context where upland farmers – mostly belonging to ethnic minority groups – tend to be considered a threat to the natural resource base rather than providers of environmental services. Based on data obtained from 371 households in the upstream communities and 151 households in the downstream communities of the watershed, upstream resource managers’ willingness to accept compensation for the conservation measures and downstream resource managers’ willingness to pay for water resource improvements were estimated through the use of choice experiments. Results from the study suggest that downstream resource managers would be willing to provide on average nearly 1% of their annual income for a substantial improvement of the quantity and quality of water resources, which could be achieved by compensating upstream farmers’ change of their agricultural systems towards more environment-friendly practices. Both willingness to pay of downstream respondents and willingness of upstream resource managers to accept compensation were positively correlated with age, education, participation in environmental conservation activities and previous experiences with droughts and/or erosion. The paper concludes that there is a clear potential for establishing compensation schemes for provision of environmental services in northern Thai watersheds. The important policy

  2. Scalable Fault-Tolerant Location Management Scheme for Mobile IP

    Directory of Open Access Journals (Sweden)

    JinHo Ahn

    2001-11-01

    Full Text Available As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home of foreign agents can be allocated to a network in order to improve performance and availability. Previous fault tolerant schemes (denoted by PRT schemes to mask failures of the mobility agents use passive replication techniques. However, they result in high failure-free latency during registration process if the number of mobility agents in the same network increases, and force each mobility agent to manage bindings of all the mobile nodes registering with its network. In this paper, we present a new fault-tolerant scheme (denoted by CML scheme using checkpointing and message logging techniques. The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared with the PRT schemes. Additionally, the CML scheme allows each failed mobility agent to recover bindings of the mobile nodes registering with the mobility agent when it is repaired even if all the other mobility agents in the same network concurrently fail.

  3. (LBA-and-WRM)-based DBA scheme for multi-wavelength upstream transmission supporting 10 Gbps and 1 Gbps in MAN

    Science.gov (United States)

    Zhang, Yuchao; Gan, Chaoqin; Gou, Kaiyu; Xu, Anni; Ma, Jiamin

    2018-01-01

    DBA scheme based on Load balance algorithm (LBA) and wavelength recycle mechanism (WRM) for multi-wavelength upstream transmission is proposed in this paper. According to 1 Gbps and 10 Gbps line rates, ONUs are grouped into different VPONs. To facilitate wavelength management, resource pool is proposed to record wavelength state. To realize quantitative analysis, a mathematical model describing metro-access network (MAN) environment is presented. To 10G-EPON upstream, load balance algorithm is designed to ensure load distribution fairness for 10G-OLTs. To 1G-EPON upstream, wavelength recycle mechanism is designed to share remained wavelengths. Finally, the effectiveness of the proposed scheme is demonstrated by simulation and analysis.

  4. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  5. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  6. A note on macro-financial implications of mobile money schemes

    OpenAIRE

    Mas, Ignacio; Klein, Michael

    2012-01-01

    Across the world mobile money schemes are being launched. In such schemes financial service providers interact with clients via mobile phones or other mobile devices such as tablets. Service offerings include payments and saving as well as basic insurance products and sometimes credit based on scoring methods that use information about the client’s payment history. The world of mobile money is still in the experimental stage. Some schemes like M-PESA in Kenya have, at least initially, been ru...

  7. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  8. A Transactional Asynchronous Replication Scheme for Mobile Database Systems

    Institute of Scientific and Technical Information of China (English)

    丁治明; 孟小峰; 王珊

    2002-01-01

    In mobile database systems, mobility of users has a significant impact on data replication. As a result, the various replica control protocols that exist today in traditional distributed and multidatabase environments are no longer suitable. To solve this problem, a new mobile database replication scheme, the Transaction-Level Result-Set Propagation (TLRSP)model, is put forward in this paper. The conflict detection and resolution strategy based on TLRSP is discussed in detail, and the implementation algorithm is proposed. In order to compare the performance of the TLRSP model with that of other mobile replication schemes, we have developed a detailed simulation model. Experimental results show that the TLRSP model provides an efficient support for replicated mobile database systems by reducing reprocessing overhead and maintaining database consistency.

  9. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data

    Directory of Open Access Journals (Sweden)

    Qingqing Xie

    2016-11-01

    Full Text Available With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP can provide location-based service (LBS for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman algorithm and ciphertext policy attribute-based encryption (CP-ABE scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA and efficient enough for practical applications in terms of user side computation overhead.

  10. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-11-25

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.

  11. A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Laicheng Cao

    2016-01-01

    Full Text Available In order to verify the data integrity in mobile multicloud computing environment, a MMCDIV (mobile multicloud data integrity verification scheme is proposed. First, the computability and nondegeneracy of verification can be obtained by adopting BLS (Boneh-Lynn-Shacham short signature scheme. Second, communication overhead is reduced based on HVR (Homomorphic Verifiable Response with random masking and sMHT (sequence-enforced Merkle hash tree construction. Finally, considering the resource constraints of mobile devices, data integrity is verified by lightweight computing and low data transmission. The scheme improves shortage that mobile device communication and computing power are limited, it supports dynamic data operation in mobile multicloud environment, and data integrity can be verified without using direct source file block. Experimental results also demonstrate that this scheme can achieve a lower cost of computing and communications.

  12. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN.

    Science.gov (United States)

    Bag, Gargi; Raza, Muhammad Taqi; Kim, Ki-Hyung; Yoo, Seung-Wha

    2009-01-01

    Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob), which employs Mobility Support Points (MSPs) to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.

  13. LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN

    Directory of Open Access Journals (Sweden)

    Seung-Wha Yoo

    2009-07-01

    Full Text Available Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks is being utilized in realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as a baseline for the link layer technology, 6LoWPAN implies low data rate and low power consumption with periodic sleep and wakeups for sensor nodes, without requiring them to incorporate complex hardware. Also enabling sensor nodes with IPv6 ensures that the sensor data can be accessed anytime and anywhere from the world. Several existing mobility-related schemes like HMIPv6, MIPv6, HAWAII, and Cellular IP require active participation of mobile nodes in the mobility signaling, thus leading to the mobility-related changes in the protocol stack of mobile nodes. In this paper, we present LoWMob, which is a network-based mobility scheme for mobile 6LoWPAN nodes in which the mobility of 6LoWPAN nodes is handled at the network-side. LoWMob ensures multi-hop communication between gateways and mobile nodes with the help of the static nodes within a 6LoWPAN. In order to reduce the signaling overhead of static nodes for supporting mobile nodes, LoWMob proposes a mobility support packet format at the adaptation layer of 6LoWPAN. Also we present a distributed version of LoWMob, named as DLoWMob (or Distributed LoWMob, which employs Mobility Support Points (MSPs to distribute the traffic concentration at the gateways and to optimize the multi-hop routing path between source and destination nodes in a 6LoWPAN. Moreover, we have also discussed the security considerations for our proposed mobility schemes. The performance of our proposed schemes is evaluated in terms of mobility signaling costs, end-to-end delay, and packet success ratio.

  14. The evaluation of interblock mobility using a modified midpoint weighting scheme

    Energy Technology Data Exchange (ETDEWEB)

    Ito, Y

    1981-01-01

    A modified midpoint weighting scheme is a technique which can be used for increasing the accuracy and stability of finite difference numerical simulations. Generally, if midpoint weighting is used to evaluate the transmissibility at an interface between adjacent blocks in an oil reservoir, explicit methods may not produce the correct solution and implicit methods may lead to an oscillatory behavior. Reasons for this behavior have been investigated and it has been found that these problems occur because of numerical limitations during accumulation of the displacing fluid within the upstream block. A proposed modified version of midpoint weighting appears to eliminate this problem and several linear displacement test runs have indicated that the local truncation errors are comparable to those in the two-point upsteam scheme the use of which is constrained due to its assymetric charcter. The results were also compared to the single-point upsteam scheme the use of which is constrained due to its assymetric character. The results were also compared to the singlepoint upstream weighting method and it was found that the modified midpoint weighting scheme allowed the use of a coarser grid while maintaining similar accuracy. An additional advantage to this new technique is that it can also be used in an implicit formulation. 8 refs., 11 figs.

  15. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  16. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-01-01

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead. PMID:27897984

  17. A Comprehensive Study of Data Collection Schemes Using Mobile Sinks in Wireless Sensor Networks

    Science.gov (United States)

    Khan, Abdul Waheed; Abdullah, Abdul Hanan; Anisi, Mohammad Hossein; Bangash, Javed Iqbal

    2014-01-01

    Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink. PMID:24504107

  18. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  19. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  20. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  1. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Directory of Open Access Journals (Sweden)

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  2. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  3. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  4. AN AGENT BASED TRANSACTION PROCESSING SCHEME FOR DISCONNECTED MOBILE NODES

    Directory of Open Access Journals (Sweden)

    J.L. Walter Jeyakumar

    2010-12-01

    Full Text Available We present a mobile transaction framework in which mobile users can share data which is stored in the cache of a mobile agent. This mobile agent is a special mobile node which coordinates the sharing process. The proposed framework allows mobile affiliation work groups to be formed dynamically with a mobile agent and mobile hosts. Using short range wireless communication technology, mobile users can simultaneously access the data from the cache of the mobile agent. The data Access Manager module at the mobile agent enforces concurrency control using cache invalidation technique. This model supports disconnected mobile computing allowing mobile agent to move along with the Mobile Hosts. The proposed Transaction frame work has been simulated in Java 2 and performance of this scheme is compared with existing frame works.

  5. An Energy-aware Routing Scheme in Delay Tolerant Mobile Sensor Networking

    Directory of Open Access Journals (Sweden)

    Zhe Chen

    2014-08-01

    Full Text Available In Delay Tolerant Mobile Sensor Networking (DTMSN, mobile sensor nodes are usually limited to their energy capacity, one important concern in routing design of DTMSN is energy consumption. This paper presents a number of variations of the Epidemic Routing Protocol (ERP to extend the DTMSN lifetime. It introduces the analytical model for ERP, after introducing the concepts behind the Target Delivery Probability and Minimum Delivery Probability, it defines the network lifetime. In this paper, it firstly studies many variations of the Epidemic Routing Protocol to extend the lifetime of the DTMSN. Secondly, based on the Epidemic Routing Protocol, three schemes are introduced. Those schemes rely on the limiting the times of message allowed for propagation (LT scheme, directly controlling the number of the copies (LC scheme, split the copies to the residual energies of the nodes (LE scheme. Finally, with the experiment and the validation of the simulation, the LE scheme can significantly maximize the lifetime of DTMSN, because it minimizes the number of copies and that shifts the generation of the copies to the nodes with larger residual energy.

  6. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  7. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  8. DRO: domain-based route optimization scheme for nested mobile networks

    Directory of Open Access Journals (Sweden)

    Chuang Ming-Chin

    2011-01-01

    Full Text Available Abstract The network mobility (NEMO basic support protocol is designed to support NEMO management, and to ensure communication continuity between nodes in mobile networks. However, in nested mobile networks, NEMO suffers from the pinball routing problem, which results in long packet transmission delays. To solve the problem, we propose a domain-based route optimization (DRO scheme that incorporates a domain-based network architecture and ad hoc routing protocols for route optimization. DRO also improves the intra-domain handoff performance, reduces the convergence time during route optimization, and avoids the out-of-sequence packet problem. A detailed performance analysis and simulations were conducted to evaluate the scheme. The results demonstrate that DRO outperforms existing mechanisms in terms of packet transmission delay (i.e., better route-optimization, intra-domain handoff latency, convergence time, and packet tunneling overhead.

  9. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  10. CS-DRM: A Cloud-Based SIM DRM Scheme for Mobile Internet

    Directory of Open Access Journals (Sweden)

    Liu Zhang

    2011-01-01

    Full Text Available With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremendous impact on digital content providers as well as the mobile industry that a large number of digital content have been pirated and illegally distributed. Digital Rights Management (DRM aims at protecting digital contents from being abused through regulating their usage. Unfortunately, to the best of our knowledge, fewer of these DRM schemes are concerned with the cost of the servers in a DRM system when the number of users scales up, and consider benefits of content providers who can be seen as tenants of a content server. In this paper, we propose CS-DRM, a cloud-based SIM DRM scheme, for the mobile Internet. The SIM card is introduced into CS-DRM to both reduce the cost and provide higher security. Also, the characteristics of cloud computing enable CS-DRM to bring benefits for content providers, and well satisfy the performance requirements with low cost when the number of users increases significantly. Furthermore, we have implemented a prototype of our DRM scheme, which demonstrates that CS-DRM is efficient, secure, and practicable.

  11. Data Transmission Scheme Using Mobile Sink in Static Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Awais Ahmad

    2015-01-01

    Full Text Available Multihop communication in wireless sensor network (WSN brings new challenges in reliable data transmission. Recent work shows that data collection from sensor nodes using mobile sink minimizes multihop data transmission and improves energy efficiency. However, due to continuous movements, mobile sink has limited communication time to collect data from sensor nodes, which results in rapid depletion of node’s energy. Therefore, we propose a data transmission scheme that addresses the aforementioned constraints. The proposed scheme first finds out the group based region on the basis of localization information of the sensor nodes and predefined trajectory information of a mobile sink. After determining the group region in the network, selection of master nodes is made. The master nodes directly transmit their data to the mobile sink upon its arrival at their group region through restricted flooding scheme. In addition, the agent node concept is introduced for swapping of the role of the master nodes in each group region. The master node when consuming energy up to a certain threshold, neighboring node with second highest residual energy is selected as an agent node. The mathematical analysis shows that the selection of agent node maximizes the throughput while minimizing transmission delay in the network.

  12. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  13. Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology

    Directory of Open Access Journals (Sweden)

    Yichuan Wang

    2018-01-01

    Full Text Available Mobile botnet has recently evolved due to the rapid growth of smartphone technologies. Unlike legacy botnets, mobile devices are characterized by limited power capacity, calculation capabilities, and wide communication methods. As such, the logical topology structure and communication mode have to be redesigned for mobile botnets to narrow energy gap and lower the reduction speed of nodes. In this paper, we try to design a novel Gini-based energy balancing scheme (Gleer for the atomic network, which is a fundamental component of the heterogeneous multilayer mobile botnet. Firstly, for each operation cycle, we utilize the dynamic energy threshold to categorize atomic network into two groups. Then, the Gini coefficient is introduced to estimate botnet energy gap and to regulate the probability for each node to be picked as a region C&C server. Experimental results indicate that our proposed method can effectively prolong the botnet lifetime and prevent the reduction of network size. Meanwhile, the stealthiness of botnet with Gleer scheme is analyzed from users’ perspective, and results show that the proposed scheme works well in the reduction of user’ detection awareness.

  14. Modeling and performance analysis of an improved movement-based location management scheme for packet-switched mobile communication systems.

    Science.gov (United States)

    Chung, Yun Won; Kwon, Jae Kyun; Park, Suwon

    2014-01-01

    One of the key technologies to support mobility of mobile station (MS) in mobile communication systems is location management which consists of location update and paging. In this paper, an improved movement-based location management scheme with two movement thresholds is proposed, considering bursty data traffic characteristics of packet-switched (PS) services. The analytical modeling for location update and paging signaling loads of the proposed scheme is developed thoroughly and the performance of the proposed scheme is compared with that of the conventional scheme. We show that the proposed scheme outperforms the conventional scheme in terms of total signaling load with an appropriate selection of movement thresholds.

  15. HiCoDG: a hierarchical data-gathering scheme using cooperative multiple mobile elements.

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-12-17

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption.

  16. Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Jianfeng Lu

    2017-01-01

    Full Text Available QR code (quick response code is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant’s beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS and aesthetic QR code, which contains three primary schemes for different concealment levels. The main steps of these schemes are as follows. Firstly, one original QR code is split into two shadows using VC multiple rules; secondly, the two shadows are embedded into the same background image, respectively, and the embedded results are fused with the same carrier QR code, respectively, using XOR mechanism of RS and QR code error correction mechanism. Finally, the two aesthetic QR codes can be stacked precisely and the original QR code is restored according to the defined VCS. Experiments corresponding to three proposed schemes are conducted and demonstrate the feasibility and security of the mobile payment authentication, the significant improvement of the concealment for the shadows in QR code, and the diversity of mobile payment authentication.

  17. A Novel WLAN Roaming Decision and Selection Scheme for Mobile Data Offloading

    Directory of Open Access Journals (Sweden)

    Nam Nguyen

    2015-01-01

    Full Text Available The existing IEEE and 3GPP standards have laid the foundation for integrating cellular and WiFi network to deliver a seamless experience for the end-users when roaming across multiple access networks. However, in recent studies, the issue of making roaming decision and intelligently selecting the most preferable Point of Service to optimize network resource and improve end user’s experience has not been considered properly. In this paper, we propose a novel cellular and WiFi roaming decision and AP selection scheme based on state of the art, 3GPP TS24.312 and IEEE 802.11u, k standards. Our proposed scheme assists the mobile nodes to decide the right timing to make roaming decision and select preferable point of service based on the operator’s policies and real-time network condition. We also introduce our simulation model of a heterogeneous network with cellular and WiFi interworking as well as 3GPP ANDSF, TS24.312. It is a complete end-to-end system model from application to physical layer with considering user’s mobility and realistic traffic model. The proposed scheme outperformed the conventional WiFi selection scheme in terms of dynamically steering mobile node’s data traffic from macrocell to available Access Points. The proposed scheme increased the utilization and balanced the traffic load of access points and improved user’s experienced throughput.

  18. A Sentiment Delivering Estimate Scheme Based on Trust Chain in Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Meizi Li

    2015-01-01

    Full Text Available User sentiment analysis has become a flourishing frontier in data mining mobile social network platform since the mobile social network plays a significant role in users’ daily communication and sentiment interaction. This study studies the scheme of sentiment estimate by using the users’ trustworthy relationships for evaluating sentiment delivering. First, we address an overview of sentiment delivering estimate scheme and propose its related definitions, that is, trust chain among users, sentiment semantics, and sentiment ontology. Second, this study proposes the trust chain model and its evaluation method, which is composed of evaluation of atomic, serial, parallel, and combined trust chains. Then, we propose sentiment modeling method by presenting its modeling rules. Further, we propose the sentiment delivering estimate scheme from two aspects: explicit and implicit sentiment delivering estimate schemes, based on trust chain and sentiment modeling method. Finally, examinations and results are given to further explain effectiveness and feasibility of our scheme.

  19. An Effective Collaborative Mobile Weighted Clustering Schemes for Energy Balancing in Wireless Sensor Networks.

    Science.gov (United States)

    Tang, Chengpei; Shokla, Sanesy Kumcr; Modhawar, George; Wang, Qiang

    2016-02-19

    Collaborative strategies for mobile sensor nodes ensure the efficiency and the robustness of data processing, while limiting the required communication bandwidth. In order to solve the problem of pipeline inspection and oil leakage monitoring, a collaborative weighted mobile sensing scheme is proposed. By adopting a weighted mobile sensing scheme, the adaptive collaborative clustering protocol can realize an even distribution of energy load among the mobile sensor nodes in each round, and make the best use of battery energy. A detailed theoretical analysis and experimental results revealed that the proposed protocol is an energy efficient collaborative strategy such that the sensor nodes can communicate with a fusion center and produce high power gain.

  20. HiCoDG: A Hierarchical Data-Gathering Scheme Using Cooperative Multiple Mobile Elements

    Directory of Open Access Journals (Sweden)

    Duc Van Le

    2014-12-01

    Full Text Available In this paper, we study mobile element (ME-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that usemobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC and the mobile relay (MR. MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS-based and cooperative movement scheduling (CMS-based, are proposed to facilitate cooperative data forwarding from MCs to theMR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP-based approach. The simulation results show that HiCoDG outperformsmTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption.

  1. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  2. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  3. HiCoDG: A Hierarchical Data-Gathering Scheme Using Cooperative Multiple Mobile Elements †

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-01-01

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption. PMID:25526356

  4. A new channel allocation scheme and performance optimizing for mobile multimedia wireless networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Fang-ming; JIANG Ling-ge; MA Ming-da

    2008-01-01

    A multimedia channel allocation scheme is proposed and studied in terms of the connection-level QoS. A new traffic model based on multidimensional Markov chain is developed considering the traffic charac-teristic of two special periods of time. And the pre-emptive priority strategies are used to classify real-time serv-ices and non-real-time services. Real-time service is given higher priority for its allowance to pre-empt channels used by non-real-time service. Considering the mobility of persons in a day, which affects the mobile user's den-sity, the simulation was conducted involving the two pre-emptive priority strategies. The result of some compari-sons shows the feasibility of the proposed scheme.

  5. Stochastic porous media modeling and high-resolution schemes for numerical simulation of subsurface immiscible fluid flow transport

    Science.gov (United States)

    Brantson, Eric Thompson; Ju, Binshan; Wu, Dan; Gyan, Patricia Semwaah

    2018-04-01

    This paper proposes stochastic petroleum porous media modeling for immiscible fluid flow simulation using Dykstra-Parson coefficient (V DP) and autocorrelation lengths to generate 2D stochastic permeability values which were also used to generate porosity fields through a linear interpolation technique based on Carman-Kozeny equation. The proposed method of permeability field generation in this study was compared to turning bands method (TBM) and uniform sampling randomization method (USRM). On the other hand, many studies have also reported that, upstream mobility weighting schemes, commonly used in conventional numerical reservoir simulators do not accurately capture immiscible displacement shocks and discontinuities through stochastically generated porous media. This can be attributed to high level of numerical smearing in first-order schemes, oftentimes misinterpreted as subsurface geological features. Therefore, this work employs high-resolution schemes of SUPERBEE flux limiter, weighted essentially non-oscillatory scheme (WENO), and monotone upstream-centered schemes for conservation laws (MUSCL) to accurately capture immiscible fluid flow transport in stochastic porous media. The high-order schemes results match well with Buckley Leverett (BL) analytical solution without any non-oscillatory solutions. The governing fluid flow equations were solved numerically using simultaneous solution (SS) technique, sequential solution (SEQ) technique and iterative implicit pressure and explicit saturation (IMPES) technique which produce acceptable numerical stability and convergence rate. A comparative and numerical examples study of flow transport through the proposed method, TBM and USRM permeability fields revealed detailed subsurface instabilities with their corresponding ultimate recovery factors. Also, the impact of autocorrelation lengths on immiscible fluid flow transport were analyzed and quantified. A finite number of lines used in the TBM resulted into visual

  6. An Adaptive Handover Prediction Scheme for Seamless Mobility Based Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ali Safa Sadiq

    2014-01-01

    Full Text Available We propose an adaptive handover prediction (AHP scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.

  7. LPTA: location predictive and time adaptive data gathering scheme with mobile sink for wireless sensor networks.

    Science.gov (United States)

    Zhu, Chuan; Wang, Yao; Han, Guangjie; Rodrigues, Joel J P C; Lloret, Jaime

    2014-01-01

    This paper exploits sink mobility to prolong the lifetime of sensor networks while maintaining the data transmission delay relatively low. A location predictive and time adaptive data gathering scheme is proposed. In this paper, we introduce a sink location prediction principle based on loose time synchronization and deduce the time-location formulas of the mobile sink. According to local clocks and the time-location formulas of the mobile sink, nodes in the network are able to calculate the current location of the mobile sink accurately and route data packets timely toward the mobile sink by multihop relay. Considering that data packets generating from different areas may be different greatly, an adaptive dwelling time adjustment method is also proposed to balance energy consumption among nodes in the network. Simulation results show that our data gathering scheme enables data routing with less data transmission time delay and balance energy consumption among nodes.

  8. Sleep Scheduling Schemes Based on Location of Mobile User in Sensor-Cloud

    OpenAIRE

    N. Mahendran; R. Priya

    2016-01-01

    The mobile cloud computing (MCC) with wireless sensor networks (WSNs) technology gets more attraction by research scholars because its combines the sensors data gathering ability with the cloud data processing capacity. This approach overcomes the limitation of data storage capacity and computational ability of sensor nodes. Finally, the stored data are sent to the mobile users when the user sends the request. The most of the integrated sensor-cloud schemes fail to observe the following crite...

  9. LPTA: Location Predictive and Time Adaptive Data Gathering Scheme with Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chuan Zhu

    2014-01-01

    Full Text Available This paper exploits sink mobility to prolong the lifetime of sensor networks while maintaining the data transmission delay relatively low. A location predictive and time adaptive data gathering scheme is proposed. In this paper, we introduce a sink location prediction principle based on loose time synchronization and deduce the time-location formulas of the mobile sink. According to local clocks and the time-location formulas of the mobile sink, nodes in the network are able to calculate the current location of the mobile sink accurately and route data packets timely toward the mobile sink by multihop relay. Considering that data packets generating from different areas may be different greatly, an adaptive dwelling time adjustment method is also proposed to balance energy consumption among nodes in the network. Simulation results show that our data gathering scheme enables data routing with less data transmission time delay and balance energy consumption among nodes.

  10. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  11. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  12. Cooperative Control of Mobile Sensor Networks for Environmental Monitoring: An Event-Triggered Finite-Time Control Scheme.

    Science.gov (United States)

    Lu, Qiang; Han, Qing-Long; Zhang, Botao; Liu, Dongliang; Liu, Shirong

    2017-12-01

    This paper deals with the problem of environmental monitoring by developing an event-triggered finite-time control scheme for mobile sensor networks. The proposed control scheme can be executed by each sensor node independently and consists of two parts: one part is a finite-time consensus algorithm while the other part is an event-triggered rule. The consensus algorithm is employed to enable the positions and velocities of sensor nodes to quickly track the position and velocity of a virtual leader in finite time. The event-triggered rule is used to reduce the updating frequency of controllers in order to save the computational resources of sensor nodes. Some stability conditions are derived for mobile sensor networks with the proposed control scheme under both a fixed communication topology and a switching communication topology. Finally, simulation results illustrate the effectiveness of the proposed control scheme for the problem of environmental monitoring.

  13. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  14. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  15. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  16. Implementation of a Low-Latency Contention-Free Geographical Routing Scheme for Mobile Cyber-Physical Systems

    KAUST Repository

    Bader, Ahmed

    2015-07-09

    Results and lessons learned from the implementation of a novel ultra low-latency geo-routing scheme are presented in this paper. The geo-routing scheme is intended for team-based mobile cyber-physical systems whereby a cluster of unmanned vehicles (robots) are deployed to accomplish a critical mission under human supervision. The contention-free nature of the developed scheme lends itself to jointly achieve lower latency and higher throughput. Implementation challenges are presented and corresponding resolutions are discussed herewith.

  17. Quality of service management efficient scheme for the universal mobile telecommunications system

    Directory of Open Access Journals (Sweden)

    E. Zaleta–Alejandre

    2008-04-01

    Full Text Available This research work proposes a new Radio Resource Management (RRM scheme in order to accomplish the Quality of Service (QoS management for the Universal Mobile Telecommunications System (UMTS. The solution is based on UMTS standardization and a performance evaluation is presented to demonstrate its efficiency.

  18. Effective Scheme of Channel Tracking and Estimation for Mobile WiMAX DL-PUSC System

    Directory of Open Access Journals (Sweden)

    Phuong Thi Thu Pham

    2010-01-01

    Full Text Available This paper introduces an effective joint scheme of channel estimation and tracking for downlink partial usage of subchannel (DL-PUSC mode of mobile WiMAX system. Based on the pilot pattern of this particular system, some channel estimation methods including conventional interpolations and a more favorable least-squares line fitting (LSLF technique are comparatively studied. Besides, channel estimation performance can be remarkably improved by taking advantage of channel tracking derived from the preamble symbol. System performances in terms of packet error rate (PER and user link throughput are investigated in various channels adopted from the well-known ITU models for mobile environments. Simulation results show a significant performance enhancement when the proposed joint scheme is utilized, at least 5 dB, compared to only commonly used channel estimation approaches.

  19. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2016-10-01

    Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

  20. A Classification Scheme for Analyzing Mobile Apps Used to Prevent and Manage Disease in Late Life

    Science.gov (United States)

    Wang, Aiguo; Lu, Xin; Chen, Hongtu; Li, Changqun; Levkoff, Sue

    2014-01-01

    Background There are several mobile apps that offer tools for disease prevention and management among older adults, and promote health behaviors that could potentially reduce or delay the onset of disease. A classification scheme that categorizes apps could be useful to both older adult app users and app developers. Objective The objective of our study was to build and evaluate the effectiveness of a classification scheme that classifies mobile apps available for older adults in the “Health & Fitness” category of the iTunes App Store. Methods We constructed a classification scheme for mobile apps according to three dimensions: (1) the Precede-Proceed Model (PPM), which classifies mobile apps in terms of predisposing, enabling, and reinforcing factors for behavior change; (2) health care process, specifically prevention versus management of disease; and (3) health conditions, including physical health and mental health. Content analysis was conducted by the research team on health and fitness apps designed specifically for older adults, as well as those applicable to older adults, released during the months of June and August 2011 and August 2012. Face validity was assessed by a different group of individuals, who were not related to the study. A reliability analysis was conducted to confirm the accuracy of the coding scheme of the sample apps in this study. Results After applying sample inclusion and exclusion criteria, a total of 119 apps were included in the study sample, of which 26/119 (21.8%) were released in June 2011, 45/119 (37.8%) in August 2011, and 48/119 (40.3%) in August 2012. Face validity was determined by interviewing 11 people, who agreed that this scheme accurately reflected the nature of this application. The entire study sample was successfully coded, demonstrating satisfactory inter-rater reliability by two independent coders (95.8% initial concordance and 100% concordance after consensus was reached). The apps included in the study sample

  1. A scheme for regulating toxic substances to water quality of Chamsil upstream water system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kang Suk; Kim, Jee Hoon [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    This study asserts to reflect a concept of toxicity thoroughly in the present water quality concept. It presents an appropriate solution to control toxic substances flowing into the Chamsil upstream water system. Although a regulation of toxic substances into major rivers in Korea other than Han river is also required urgently, it will be studied in future. It is expected that this study on Chamsil upstream would be a cornerstone for establishing a national regulation policy of toxic substances into water system. 28 refs., 1 fig., 36 tabs.

  2. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  3. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  4. Analysis of an upstream weighted collocation approximation to the transport equation

    International Nuclear Information System (INIS)

    Shapiro, A.; Pinder, G.F.

    1981-01-01

    The numerical behavior of a modified orthogonal collocation method, as applied to the transport equations, can be examined through the use of a Fourier series analysis. The necessity of such a study becomes apparent in the analysis of several techniques which emulate classical upstream weighting schemes. These techniques are employed in orthogonal collocation and other numerical methods as a means of handling parabolic partial differential equations with significant first-order terms. Divergent behavior can be shown to exist in one upstream weighting method applied to orthogonal collocation

  5. Sectoral approaches establishment for climate change mitigation in Thailand upstream oil and gas industry

    International Nuclear Information System (INIS)

    Chaiyapa, Warathida; Esteban, Miguel; Kameyama, Yasuko

    2016-01-01

    Understanding the upstream oil and gas (O&G) industry's responses to climate change and what factors can be influential to trigger their mitigation strategies is crucial for policy-makers to harness the huge resources that this industry can mobilize towards environmental protection. Considering that individual climate change efforts are unlikely to affect global mitigation paths, the study investigates the possibility that sectoral approaches can help in the reduction of greenhouse gas emissions, using Thailand as a case study. It conducted online questionnaire surveys and semi-structured interviews to acquire primary data from companies and key informants from the government, NGOs, NPOs and academics. The results suggested that, among three possible groups of factors that could affect company decisions on whether to promote sectoral approaches, domestic politics (particularly the Thai government) is the most important, though other factors also play important and interrelated roles. The most welcomed type of scheme that could be envisaged would appear to be a sectoral agreement between government and industry. Finally, the authors provide two main policy recommendations, namely the establishment of an industrial association of O&G companies and for it to target how to start looking at measures to reduce greenhouse gas emissions amongst large companies in the sector. - Highlights: •Examining the possibility of establishing a sectoral approach Thailand's upstream O&G industry. •Analytical framework was constructed to ascertain most influential factors. •Questionnaires and interviews were employed with companies, government, NGOs and academic. •Domestic politics is the most determining factor, but other factors have strong interrelation. •Sectoral agreement between government and industry is the most likely scheme to be established.

  6. SDN-Based Mobile Data Offloading Scheme Using a Femtocell and WiFi Networks

    Directory of Open Access Journals (Sweden)

    Chang-Woo Ahn

    2017-01-01

    Full Text Available Because of the many applications running on smartphones, the load of mobile data traffic on cellular networks is increasing rapidly. A femtocell is a solution to increase the cellular network capacity and coverage. However, because it uses the same frequency bands as a macrocell, interference problems have prevented its widespread adoption. In this paper, we propose a scheme for traffic offloading between femtocells and WiFi networks utilizing software-defined networking (SDN technology. In the proposed offloading scheme, the SDN technology allows a terminal to maintain existing sessions after offloading through a centralized control of the SDN-based equipment. We also propose an offloading target selection scheme based on available bandwidth estimation and an association control mechanism to reduce the femtocell load while ensuring quality of service (QoS in terms of throughput. Experimental results on an actual testbed showed that the proposed offloading scheme provides seamless connectivity and reduces the femtocell load by up to 46% with the aid of the proposed target selection scheme, while ensuring QoS after offloading. We also observed that the proposed target selection scheme offloads 28% more traffic to WiFi networks compared to received signal strength indicator-based target selection in a low background traffic environment.

  7. A comparative signaling cost analysis of Macro Mobility scheme in NEMO (MM-NEMO) with mobility management protocol

    Science.gov (United States)

    Islam, Shayla; Abdalla, Aisha H.; Habaebi, Mohamed H.; Latif, Suhaimi A.; Hassan, Wan H.; Hasan, Mohammad K.; Ramli, H. A. M.; Khalifa, Othman O.

    2013-12-01

    NEMO BSP is an upgraded addition to Mobile IPv6 (MIPv6). As MIPv6 and its enhancements (i.e. HMIPv6) possess some limitations like higher handoff latency, packet loss, NEMO BSP also faces all these shortcomings by inheritance. Network Mobility (NEMO) is involved to handle the movement of Mobile Router (MR) and it's Mobile Network Nodes (MNNs) during handoff. Hence it is essential to upgrade the performance of mobility management protocol to obtain continuous session connectivity with lower delay and packet loss in NEMO environment. The completion of handoff process in NEMO BSP usually takes longer period since MR needs to register its single primary care of address (CoA) with home network that may cause performance degradation of the applications running on Mobile Network Nodes. Moreover, when a change in point of attachment of the mobile network is accompanied by a sudden burst of signaling messages, "Signaling Storm" occurs which eventually results in temporary congestion, packet delays or even packet loss. This effect is particularly significant for wireless environment where a wireless link is not as steady as a wired link since bandwidth is relatively limited in wireless link. Hence, providing continuous Internet connection without any interruption through applying multihoming technique and route optimization mechanism in NEMO are becoming the center of attention to the current researchers. In this paper, we propose a handoff cost model to compare the signaling cost of MM-NEMO with NEMO Basic Support Protocol (NEMO BSP) and HMIPv6.The numerical results shows that the signaling cost for the MM-NEMO scheme is about 69.6 % less than the NEMO-BSP and HMIPv6.

  8. A comparative signaling cost analysis of Macro Mobility scheme in NEMO (MM-NEMO) with mobility management protocol

    International Nuclear Information System (INIS)

    Islam, Shayla; Abdalla, Aisha H; Habaebi, Mohamed H; Latif, Suhaimi A; Hassan, Wan H; Hasan, Mohammad K; Ramli, H A M; Khalifa, Othman O

    2013-01-01

    NEMO BSP is an upgraded addition to Mobile IPv6 (MIPv6). As MIPv6 and its enhancements (i.e. HMIPv6) possess some limitations like higher handoff latency, packet loss, NEMO BSP also faces all these shortcomings by inheritance. Network Mobility (NEMO) is involved to handle the movement of Mobile Router (MR) and it's Mobile Network Nodes (MNNs) during handoff. Hence it is essential to upgrade the performance of mobility management protocol to obtain continuous session connectivity with lower delay and packet loss in NEMO environment. The completion of handoff process in NEMO BSP usually takes longer period since MR needs to register its single primary care of address (CoA) with home network that may cause performance degradation of the applications running on Mobile Network Nodes. Moreover, when a change in point of attachment of the mobile network is accompanied by a sudden burst of signaling messages, ''Signaling Storm'' occurs which eventually results in temporary congestion, packet delays or even packet loss. This effect is particularly significant for wireless environment where a wireless link is not as steady as a wired link since bandwidth is relatively limited in wireless link. Hence, providing continuous Internet connection without any interruption through applying multihoming technique and route optimization mechanism in NEMO are becoming the center of attention to the current researchers. In this paper, we propose a handoff cost model to compare the signaling cost of MM-NEMO with NEMO Basic Support Protocol (NEMO BSP) and HMIPv6.The numerical results shows that the signaling cost for the MM-NEMO scheme is about 69.6 % less than the NEMO-BSP and HMIPv6

  9. PS-CARA: Context-Aware Resource Allocation Scheme for Mobile Public Safety Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Kaleem

    2018-05-01

    Full Text Available The fifth-generation (5G communications systems are expecting to support users with diverse quality-of-service (QoS requirements. Beside these requirements, the task with utmost importance is to support the emergency communication services during natural or man-made disasters. Most of the conventional base stations are not properly functional during a disaster situation, so deployment of emergency base stations such as mobile personal cell (mPC is crucial. An mPC having moving capability can move in the disaster area to provide emergency communication services. However, mPC deployment causes severe co-channel interference to the users in its vicinity. The problem in the existing resource allocation schemes is its support for static environment, that does not fit well for mPC. So, a resource allocation scheme for mPC users is desired that can dynamically allocate resources based on users’ location and its connection establishment priority. In this paper, we propose a public safety users priority-based context-aware resource allocation (PS-CARA scheme for users sum-rate maximization in disaster environment. Simulations results demonstrate that the proposed PS-CARA scheme can increase the user average and edge rate around 10.3% and 32.8% , respectively because of context information availability and by prioritizing the public safety users. The simulation results ensure that call blocking probability is also reduced considerably under the PS-CARA scheme.

  10. Improvement Schemes for Indoor Mobile Location Estimation: A Survey

    Directory of Open Access Journals (Sweden)

    Jianga Shang

    2015-01-01

    Full Text Available Location estimation is significant in mobile and ubiquitous computing systems. The complexity and smaller scale of the indoor environment impose a great impact on location estimation. The key of location estimation lies in the representation and fusion of uncertain information from multiple sources. The improvement of location estimation is a complicated and comprehensive issue. A lot of research has been done to address this issue. However, existing research typically focuses on certain aspects of the problem and specific methods. This paper reviews mainstream schemes on improving indoor location estimation from multiple levels and perspectives by combining existing works and our own working experiences. Initially, we analyze the error sources of common indoor localization techniques and provide a multilayered conceptual framework of improvement schemes for location estimation. This is followed by a discussion of probabilistic methods for location estimation, including Bayes filters, Kalman filters, extended Kalman filters, sigma-point Kalman filters, particle filters, and hidden Markov models. Then, we investigate the hybrid localization methods, including multimodal fingerprinting, triangulation fusing multiple measurements, combination of wireless positioning with pedestrian dead reckoning (PDR, and cooperative localization. Next, we focus on the location determination approaches that fuse spatial contexts, namely, map matching, landmark fusion, and spatial model-aided methods. Finally, we present the directions for future research.

  11. Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks.

    Science.gov (United States)

    Yim, Yongbin; Kim, Kyong Hoon; Aldwairi, Monther; Kim, Ki-Il

    2017-12-30

    Mobile sink groups play crucial roles to perform their own missions in many wireless sensor network (WSN) applications. In order to support mobility of such sink groups, it is important to design a mechanism for effective discovery of the group in motion. However, earlier studies obtain group region information by periodic query. For that reason, the mechanism leads to significant signaling overhead due to frequent flooding for the query regardless of the group movement. Furthermore, the mechanism worsens the problem by the flooding in the whole expected area. To deal with this problem, we propose a novel mobile sink group support scheme with low communication cost, called Region-Shift-based Mobile Geocasting Protocol (RSMGP). In this study, we utilize the group mobility feature for which members of a group have joint motion patterns. Thus, we could trace group movement by shifting the region as much as partial members move out of the previous region. Furthermore, the region acquisition is only performed at the moment by just deviated members without collaboration of all members. Experimental results validate the improved signaling overhead of our study compared to the previous studies.

  12. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents.

    Science.gov (United States)

    Wu, Chunxue; Wu, Wenliang; Wan, Caihua; Bekkering, Ernst; Xiong, Naixue

    2017-11-03

    Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  13. Observation Likelihood Model Design and Failure Recovery Scheme toward Reliable Localization of Mobile Robots

    Directory of Open Access Journals (Sweden)

    Chang-bae Moon

    2011-01-01

    Full Text Available Although there have been many researches on mobile robot localization, it is still difficult to obtain reliable localization performance in a human co-existing real environment. Reliability of localization is highly dependent upon developer's experiences because uncertainty is caused by a variety of reasons. We have developed a range sensor based integrated localization scheme for various indoor service robots. Through the experience, we found out that there are several significant experimental issues. In this paper, we provide useful solutions for following questions which are frequently faced with in practical applications: 1 How to design an observation likelihood model? 2 How to detect the localization failure? 3 How to recover from the localization failure? We present design guidelines of observation likelihood model. Localization failure detection and recovery schemes are presented by focusing on abrupt wheel slippage. Experiments were carried out in a typical office building environment. The proposed scheme to identify the localizer status is useful in practical environments. Moreover, the semi-global localization is a computationally efficient recovery scheme from localization failure. The results of experiments and analysis clearly present the usefulness of proposed solutions.

  14. Observation Likelihood Model Design and Failure Recovery Scheme Toward Reliable Localization of Mobile Robots

    Directory of Open Access Journals (Sweden)

    Chang-bae Moon

    2010-12-01

    Full Text Available Although there have been many researches on mobile robot localization, it is still difficult to obtain reliable localization performance in a human co-existing real environment. Reliability of localization is highly dependent upon developer's experiences because uncertainty is caused by a variety of reasons. We have developed a range sensor based integrated localization scheme for various indoor service robots. Through the experience, we found out that there are several significant experimental issues. In this paper, we provide useful solutions for following questions which are frequently faced with in practical applications: 1 How to design an observation likelihood model? 2 How to detect the localization failure? 3 How to recover from the localization failure? We present design guidelines of observation likelihood model. Localization failure detection and recovery schemes are presented by focusing on abrupt wheel slippage. Experiments were carried out in a typical office building environment. The proposed scheme to identify the localizer status is useful in practical environments. Moreover, the semi-global localization is a computationally efficient recovery scheme from localization failure. The results of experiments and analysis clearly present the usefulness of proposed solutions.

  15. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents

    Directory of Open Access Journals (Sweden)

    Chunxue Wu

    2017-11-01

    Full Text Available Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  16. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  17. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  18. Upstream vertical cavity surface-emitting lasers for fault monitoring and localization in WDM passive optical networks

    Science.gov (United States)

    Wong, Elaine; Zhao, Xiaoxue; Chang-Hasnain, Connie J.

    2008-04-01

    As wavelength division multiplexed passive optical networks (WDM-PONs) are expected to be first deployed to transport high capacity services to business customers, real-time knowledge of fiber/device faults and the location of such faults will be a necessity to guarantee reliability. Nonetheless, the added benefit of implementing fault monitoring capability should only incur minimal cost associated with upgrades to the network. In this work, we propose and experimentally demonstrate a fault monitoring and localization scheme based on a highly-sensitive and potentially low-cost monitor in conjunction with vertical cavity surface-emitting lasers (VCSELs). The VCSELs are used as upstream transmitters in the WDM-PON. The proposed scheme benefits from the high reflectivity of the top distributed Bragg reflector (DBR) mirror of optical injection-locked (OIL) VCSELs to reflect monitoring channels back to the central office for monitoring. Characterization of the fault monitor demonstrates high sensitivity, low bandwidth requirements, and potentially low output power. The added advantage of the proposed fault monitoring scheme incurs only a 0.5 dB penalty on the upstream transmissions on the existing infrastructure.

  19. Analysis of a fourth-order compact scheme for convection-diffusion

    International Nuclear Information System (INIS)

    Yavneh, I.

    1997-01-01

    In, 1984 Gupta et al. introduced a compact fourth-order finite-difference convection-diffusion operator with some very favorable properties. In particular, this scheme does not seem to suffer excessively from spurious oscillatory behavior, and it converges with standard methods such as Gauss Seidel or SOR (hence, multigrid) regardless of the diffusion. This scheme has been rederived, developed (including some variations), and applied in both convection-diffusion and Navier-Stokes equations by several authors. Accurate solutions to high Reynolds-number flow problems at relatively coarse resolutions have been reported. These solutions were often compared to those obtained by lower order discretizations, such as second-order central differences and first-order upstream discretizations. The latter, it was stated, achieved far less accurate results due to the artificial viscosity, which the compact scheme did not include. We show here that, while the compact scheme indeed does not suffer from a cross-stream artificial viscosity (as does the first-order upstream scheme when the characteristic direction is not aligned with the grid), it does include a streamwise artificial viscosity that is inversely proportional to the natural viscosity. This term is not always benign. 7 refs., 1 fig., 1 tab

  20. A Novel Mobile Video Community Discovery Scheme Using Ontology-Based Semantical Interest Capture

    Directory of Open Access Journals (Sweden)

    Ruiling Zhang

    2016-01-01

    Full Text Available Leveraging network virtualization technologies, the community-based video systems rely on the measurement of common interests to define and steady relationship between community members, which promotes video sharing performance and improves scalability community structure. In this paper, we propose a novel mobile Video Community discovery scheme using ontology-based semantical interest capture (VCOSI. An ontology-based semantical extension approach is proposed, which describes video content and measures video similarity according to video key word selection methods. In order to reduce the calculation load of video similarity, VCOSI designs a prefix-filtering-based estimation algorithm to decrease energy consumption of mobile nodes. VCOSI further proposes a member relationship estimate method to construct scalable and resilient node communities, which promotes video sharing capacity of video systems with the flexible and economic community maintenance. Extensive tests show how VCOSI obtains better performance results in comparison with other state-of-the-art solutions.

  1. Joint Optimized CPU and Networking Control Scheme for Improved Energy Efficiency in Video Streaming on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Sung-Woong Jo

    2017-01-01

    Full Text Available Video streaming service is one of the most popular applications for mobile users. However, mobile video streaming services consume a lot of energy, resulting in a reduced battery life. This is a critical problem that results in a degraded user’s quality of experience (QoE. Therefore, in this paper, a joint optimization scheme that controls both the central processing unit (CPU and wireless networking of the video streaming process for improved energy efficiency on mobile devices is proposed. For this purpose, the energy consumption of the network interface and CPU is analyzed, and based on the energy consumption profile a joint optimization problem is formulated to maximize the energy efficiency of the mobile device. The proposed algorithm adaptively adjusts the number of chunks to be downloaded and decoded in each packet. Simulation results show that the proposed algorithm can effectively improve the energy efficiency when compared with the existing algorithms.

  2. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  3. A Hybrid Scheme Based on Pipelining and Multitasking in Mobile Application Processors for Advanced Video Coding

    Directory of Open Access Journals (Sweden)

    Muhammad Asif

    2015-01-01

    Full Text Available One of the key requirements for mobile devices is to provide high-performance computing at lower power consumption. The processors used in these devices provide specific hardware resources to handle computationally intensive video processing and interactive graphical applications. Moreover, processors designed for low-power applications may introduce limitations on the availability and usage of resources, which present additional challenges to the system designers. Owing to the specific design of the JZ47x series of mobile application processors, a hybrid software-hardware implementation scheme for H.264/AVC encoder is proposed in this work. The proposed scheme distributes the encoding tasks among hardware and software modules. A series of optimization techniques are developed to speed up the memory access and data transferring among memories. Moreover, an efficient data reusage design is proposed for the deblock filter video processing unit to reduce the memory accesses. Furthermore, fine grained macroblock (MB level parallelism is effectively exploited and a pipelined approach is proposed for efficient utilization of hardware processing cores. Finally, based on parallelism in the proposed design, encoding tasks are distributed between two processing cores. Experiments show that the hybrid encoder is 12 times faster than a highly optimized sequential encoder due to proposed techniques.

  4. RLAM: A Dynamic and Efficient Reinforcement Learning-Based Adaptive Mapping Scheme in Mobile WiMAX Networks

    Directory of Open Access Journals (Sweden)

    M. Louta

    2014-01-01

    Full Text Available WiMAX (Worldwide Interoperability for Microwave Access constitutes a candidate networking technology towards the 4G vision realization. By adopting the Orthogonal Frequency Division Multiple Access (OFDMA technique, the latest IEEE 802.16x amendments manage to provide QoS-aware access services with full mobility support. A number of interesting scheduling and mapping schemes have been proposed in research literature. However, they neglect a considerable asset of the OFDMA-based wireless systems: the dynamic adjustment of the downlink-to-uplink width ratio. In order to fully exploit the supported mobile WiMAX features, we design, develop, and evaluate a rigorous adaptive model, which inherits its main aspects from the reinforcement learning field. The model proposed endeavours to efficiently determine the downlink-to-uplinkwidth ratio, on a frame-by-frame basis, taking into account both the downlink and uplink traffic in the Base Station (BS. Extensive evaluation results indicate that the model proposed succeeds in providing quite accurate estimations, keeping the average error rate below 15% with respect to the optimal sub-frame configurations. Additionally, it presents improved performance compared to other learning methods (e.g., learning automata and notable improvements compared to static schemes that maintain a fixed predefined ratio in terms of service ratio and resource utilization.

  5. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  6. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  7. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  8. Cost-Effective Location Management for Mobile Agents on the Internet

    Directory of Open Access Journals (Sweden)

    Chien-Sheng Chen

    2015-01-01

    Full Text Available Many mobile agent system-related services and applications require interacting with a mobile agent by passing messages. However, an agent’s mobility raises several challenges in delivering messages to a mobile agent accurately. Consisting of tracking and message delivery phases, most mobile agent location management schemes create or receive many update messages and interaction messages to ensure the effectiveness of the schemes. In addition to downgrading the overall performance of a mobile agent location management scheme, excessive transmission of messages increases the network load. The migration locality of a mobile agent and the interaction rate between mobile agents significantly affect the performance of a mobile agent location management scheme with respect to location management cost. This work presents a novel Dual Home based Scheme (DHS that can lower the location management costs in terms of migration locality and interaction rate. While the DHS scheme uniquely adopts dual home location management architecture, a selective update strategy based on that architecture is also designed for cost-effective location management of mobile agents. Moreover, DHS is compared with available schemes based on formulations and simulation experiments from the perspective of location management costs. Simulation results demonstrate that the proposed DHS scheme performs satisfactorily in terms of migration locality and interaction rate.

  9. Distance tracking scheme for seamless handover in IMS-based ...

    African Journals Online (AJOL)

    This paper proposes a fast and seamless handover scheme for systems based on IP Multimedia Subsystem (IMS) architectural framework with Universal Mobile Telecommunications System (UMTS) access network. In the scheme the location, direction and movement pattern of a Mobile Node (MN) in a network cell are ...

  10. Mobile phone collection, reuse and recycling in the UK

    International Nuclear Information System (INIS)

    Ongondo, F.O.; Williams, I.D.

    2011-01-01

    Highlights: → We characterized the key features of the voluntary UK mobile phone takeback network via a survey. → We identified 3 flows: information; product (handsets and accessories); and incentives. → There has been a significant rise in the number of UK takeback schemes since 1997. → Most returned handsets are low quality; little data exists on quantities of mobile phones collected. → Takeback schemes increasingly divert EoL mobile phones from landfill and enable reuse/recycling. - Abstract: Mobile phones are the most ubiquitous electronic product on the globe. They have relatively short lifecycles and because of their (perceived) in-built obsolescence, discarded mobile phones represent a significant and growing problem with respect to waste electrical and electronic equipment (WEEE). An emerging and increasingly important issue for industry is the shortage of key metals, especially the types of metals found in mobile phones, and hence the primary aim of this timely study was to assess and evaluate the voluntary mobile phone takeback network in the UK. The study has characterised the information, product and incentives flows in the voluntary UK mobile phone takeback network and reviewed the merits and demerits of the incentives offered. A survey of the activities of the voluntary mobile phone takeback schemes was undertaken in 2008 to: identify and evaluate the takeback schemes operating in the UK; determine the target groups from whom handsets are collected; and assess the collection, promotion and advertising methods used by the schemes. In addition, the survey sought to identify and critically evaluate the incentives offered by the takeback schemes, evaluate their ease and convenience of use; and determine the types, qualities and quantities of mobile phones they collect. The study has established that the UK voluntary mobile phone takeback network can be characterised as three distinctive flows: information flow; product flow (handsets and related

  11. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  12. Mobile phone collection, reuse and recycling in the UK.

    Science.gov (United States)

    Ongondo, F O; Williams, I D

    2011-06-01

    Mobile phones are the most ubiquitous electronic product on the globe. They have relatively short lifecycles and because of their (perceived) in-built obsolescence, discarded mobile phones represent a significant and growing problem with respect to waste electrical and electronic equipment (WEEE). An emerging and increasingly important issue for industry is the shortage of key metals, especially the types of metals found in mobile phones, and hence the primary aim of this timely study was to assess and evaluate the voluntary mobile phone takeback network in the UK. The study has characterised the information, product and incentives flows in the voluntary UK mobile phone takeback network and reviewed the merits and demerits of the incentives offered. A survey of the activities of the voluntary mobile phone takeback schemes was undertaken in 2008 to: identify and evaluate the takeback schemes operating in the UK; determine the target groups from whom handsets are collected; and assess the collection, promotion and advertising methods used by the schemes. In addition, the survey sought to identify and critically evaluate the incentives offered by the takeback schemes, evaluate their ease and convenience of use; and determine the types, qualities and quantities of mobile phones they collect. The study has established that the UK voluntary mobile phone takeback network can be characterised as three distinctive flows: information flow; product flow (handsets and related accessories); and incentives flow. Over 100 voluntary schemes offering online takeback of mobile phone handsets were identified. The schemes are operated by manufacturers, retailers, mobile phone network service operators, charities and by mobile phone reuse, recycling and refurbishing companies. The latter two scheme categories offer the highest level of convenience and ease of use to their customers. Approximately 83% of the schemes are either for-profit/commercial-oriented and/or operate to raise funds

  13. A Novel Cache Invalidation Scheme for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In this paper, we propose a strategy of maintaining cache consistency in wireless mobile environments, which adds a validation server (VS) into the GPRS network, utilizes the location information of mobile terminal in SGSN located at GPRS backbone, just sends invalidation information to mobile terminal which is online in accordance with the cached data, and reduces the information amount in asynchronous transmission. This strategy enables mobile terminal to access cached data with very little computing amount, little delay and arbitrary disconnection intervals, and excels the synchronous IR and asynchronous state (AS) in the total performances.

  14. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  15. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  16. A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet

    Science.gov (United States)

    Yan, Shi; Jiayin, Cheng; Shanzhi, Chen

    A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.

  17. COLLECTIVE ACTION AND COLLECTIVE SCHEME IN THE MOBILIZATION OF LEARNING CHEMISTRY ACCORDING TO VERGNAUD’S THEORY OF CONCEPTUAL FIELDS

    Directory of Open Access Journals (Sweden)

    Lucia Machado de Andrade

    2017-10-01

    Full Text Available This research’s aim was to analyze the mobilization in learning chemistry promoted by the collective action of three entrant students in higher education courses, in a college located in Santo André. For such, cognitive indicators mobilized by them while living individual and group situations on water’s boiling point, using Screencast video lessons as a motivational strategy, were analyzed. The fulfilment of these situations’ corresponding tasks was filmed, and the recordings were transcribed and analyzed with the help from the Transana software. The indicators used for the Discursive Textual Analysis were created by associating Vicente Talanquer’s Chemistry Knowledge Space to Gérard Vergnaud’s Theory of Conceptual Fields. The results displayed higher quantity and better quality to the indicators in situations with collective character, to the detriment to the ones with individual character. Thus, one might conclude that, under this research’s conditions, collective action, generated by a collective scheme, was capable of mobilizing the learning of chemistry.

  18. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  19. Numerical investigation on compressible flow characteristics in axial compressors using a multi block finite-volume scheme

    International Nuclear Information System (INIS)

    Farhanieh, B.; Amanifard, N.; Ghorbanian, K.

    2002-01-01

    An unsteady two-dimensional numerical investigation was performed on the viscous flow passing through a multi-blade cascade. A Cartesian finite-volume approach was linked to Van-Leer's and Roe's flux splitting schemes to evaluate inviscid flux terms. To prevent the oscillatory behavior of numerical results and to increase the accuracy, Mon tonic Upstream Scheme for Conservation Laws was added to flux splitting schemes. The Baldwin-Lo max (B L) turbulence model was implemented to solve the turbulent case studies. Implicit solution was also provided using Lower and Upper (L U) decomposition technique to compare with explicit solutions. To validate the numerical procedure, two test cases are prepared and flow over a Na Ca 0012 airfoil was investigated and the pressure coefficients were compared to the reference data. The numerical solver was implemented to study the flow passing over a compressor cascade. The results of various combinations of splitting schemes and the Mon tonic Upstream Scheme for Conventional Laws limiter were compared with each other to find the suitable methods in cascade problems. Finally the convergence histories of implemented schemes were compared to each other to show the behavior of the solver in using various methods before implementation of them in flow instability studies

  20. A conservative scheme for 2D and 3D adaptive semi-Lagrangian advection

    OpenAIRE

    Behrens, Jörn; Mentrup, Lars

    2005-01-01

    This article describes a 2D and 3D adaptive and mass conservingsemi-Lagrangian advection scheme for atmospheric transport problems. Fromthe integral form of the conservation law we derive a semi-Lagrangian schemebased on conservation of mass along trajectories. The mapping of mass fromthe old (adaptively refined and possibly different) grid to the upstream controlvolume is performed by a mass packet based scheme, essentially consistingof a sub-grid discretization. We validate the new adaptive...

  1. Cost-Effective Location Management for Mobile Agents on the Internet

    OpenAIRE

    Chien-Sheng Chen; Jiing-Dong Hwang; Chyuan-Der Lu; Ting-Yuan Yeh

    2015-01-01

    Many mobile agent system-related services and applications require interacting with a mobile agent by passing messages. However, an agent’s mobility raises several challenges in delivering messages to a mobile agent accurately. Consisting of tracking and message delivery phases, most mobile agent location management schemes create or receive many update messages and interaction messages to ensure the effectiveness of the schemes. In addition to downgrading the overall performance of a mobile ...

  2. Adaptive Detection and ISI Mitigation for Mobile Molecular Communication.

    Science.gov (United States)

    Chang, Ge; Lin, Lin; Yan, Hao

    2018-03-01

    Current studies on modulation and detection schemes in molecular communication mainly focus on the scenarios with static transmitters and receivers. However, mobile molecular communication is needed in many envisioned applications, such as target tracking and drug delivery. Until now, investigations about mobile molecular communication have been limited. In this paper, a static transmitter and a mobile bacterium-based receiver performing random walk are considered. In this mobile scenario, the channel impulse response changes due to the dynamic change of the distance between the transmitter and the receiver. Detection schemes based on fixed distance fail in signal detection in such a scenario. Furthermore, the intersymbol interference (ISI) effect becomes more complex due to the dynamic character of the signal which makes the estimation and mitigation of the ISI even more difficult. In this paper, an adaptive ISI mitigation method and two adaptive detection schemes are proposed for this mobile scenario. In the proposed scheme, adaptive ISI mitigation, estimation of dynamic distance, and the corresponding impulse response reconstruction are performed in each symbol interval. Based on the dynamic channel impulse response in each interval, two adaptive detection schemes, concentration-based adaptive threshold detection and peak-time-based adaptive detection, are proposed for signal detection. Simulations demonstrate that the ISI effect is significantly reduced and the adaptive detection schemes are reliable and robust for mobile molecular communication.

  3. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  4. Modeling and Simulation of Handover Scheme in Integrated EPON-WiMAX Networks

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    In this paper, we tackle the seamless handover problem in integrated optical wireless networks. Our model applies for the convergence network of EPON and WiMAX and a mobilityaware signaling protocol is proposed. The proposed handover scheme, Integrated Mobility Management Scheme (IMMS), is assisted...... by enhancing the traditional MPCP signaling protocol, which cooperatively collects mobility information from the front-end wireless network and makes centralized bandwidth allocation decisions in the backhaul optical network. The integrated network architecture and the joint handover scheme are simulated using...... OPNET modeler. Results show validation of the protocol, i.e., integrated handover scheme gains better network performances....

  5. Energy-Efficient Deadline-Aware Data-Gathering Scheme Using Multiple Mobile Data Collectors.

    Science.gov (United States)

    Dasgupta, Rumpa; Yoon, Seokhoon

    2017-04-01

    In wireless sensor networks, the data collected by sensors are usually forwarded to the sink through multi-hop forwarding. However, multi-hop forwarding can be inefficient due to the energy hole problem and high communications overhead. Moreover, when the monitored area is large and the number of sensors is small, sensors cannot send the data via multi-hop forwarding due to the lack of network connectivity. In order to address those problems of multi-hop forwarding, in this paper, we consider a data collection scheme that uses mobile data collectors (MDCs), which visit sensors and collect data from them. Due to the recent breakthroughs in wireless power transfer technology, MDCs can also be used to recharge the sensors to keep them from draining their energy. In MDC-based data-gathering schemes, a big challenge is how to find the MDCs' traveling paths in a balanced way, such that their energy consumption is minimized and the packet-delay constraint is satisfied. Therefore, in this paper, we aim at finding the MDCs' paths, taking energy efficiency and delay constraints into account. We first define an optimization problem, named the delay-constrained energy minimization (DCEM) problem, to find the paths for MDCs. An integer linear programming problem is formulated to find the optimal solution. We also propose a two-phase path-selection algorithm to efficiently solve the DCEM problem. Simulations are performed to compare the performance of the proposed algorithms with two heuristics algorithms for the vehicle routing problem under various scenarios. The simulation results show that the proposed algorithms can outperform existing algorithms in terms of energy efficiency and packet delay.

  6. On the modelling of compressible inviscid flow problems using AUSM schemes

    Directory of Open Access Journals (Sweden)

    Hajžman M.

    2007-11-01

    Full Text Available During last decades, upwind schemes have become a popular method in the field of computational fluid dynamics. Although they are only first order accurate, AUSM (Advection Upstream Splitting Method schemes proved to be well suited for modelling of compressible flows due to their robustness and ability of capturing shock discontinuities. In this paper, we review the composition of the AUSM flux-vector splitting scheme and its improved version noted AUSM+, proposed by Liou, for the solution of the Euler equations. Mach number splitting functions operating with values from adjacent cells are used to determine numerical convective fluxes and pressure splitting is used for the evaluation of numerical pressure fluxes. Both versions of the AUSM scheme are applied for solving some test problems such as one-dimensional shock tube problem and three dimensional GAMM channel. Features of the schemes are discussed in comparison with some explicit central schemes of the first order accuracy (Lax-Friedrichs and of the second order accuracy (MacCormack.

  7. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  8. An Efficient Offloading Scheme For MEC System Considering Delay and Energy Consumption

    Science.gov (United States)

    Sun, Yanhua; Hao, Zhe; Zhang, Yanhua

    2018-01-01

    With the increasing numbers of mobile devices, mobile edge computing (MEC) which provides cloud computing capabilities proximate to mobile devices in 5G networks has been envisioned as a promising paradigm to enhance users experience. In this paper, we investigate a joint consideration of delay and energy consumption offloading scheme (JCDE) for MEC system in 5G heterogeneous networks. An optimization is formulated to minimize the delay as well as energy consumption of the offloading system, which the delay and energy consumption of transmitting and calculating tasks are taken into account. We adopt an iterative greedy algorithm to solve the optimization problem. Furthermore, simulations were carried out to validate the utility and effectiveness of our proposed scheme. The effect of parameter variations on the system is analysed as well. Numerical results demonstrate delay and energy efficiency promotion of our proposed scheme compared with another paper’s scheme.

  9. Categorisation of Mobile EEG: A Researcher’s Perspective

    Directory of Open Access Journals (Sweden)

    Anthony D. Bateson

    2017-01-01

    Full Text Available Researchers are increasingly attempting to undertake electroencephalography (EEG recordings in novel environments and contexts outside of the traditional static laboratory setting. The term “mobile EEG,” although commonly used to describe many of these undertakings, is ambiguous, since it attempts to encompass a wide range of EEG device mobility, participant mobility, and system specifications used across investigations. To provide quantitative parameters for “mobile EEG,” we developed a Categorisation of Mobile EEG (CoME scheme based upon scoring of device mobility (D, from 0, off-body, to 5, head-mounted with no additional equipment, participant mobility (P, from 0, static, to 5, unconstrained running, system specification (S, from 4, lowest, to 20, highest, and number of channels (C used. The CoME scheme was applied to twenty-nine published mobile EEG studies. Device mobility scores ranged from 0D to 4D, participant mobility scores from 0P to 4P, and system specification scores from 6S to 17S. The format of the scores for the four parameters is given, for example, as (2D, 4P, 17S, 32C and readily enables comparisons across studies. Our CoME scheme enables researchers to quantify the degree of device mobility, participant mobility, and system specification used in their “mobile EEG” investigations in a standardised way.

  10. Design of Optimized Multimedia Data Streaming Management Using OMDSM over Mobile Networks

    Directory of Open Access Journals (Sweden)

    Byungjoo Park

    2017-01-01

    Full Text Available Mobility management is an essential challenge for supporting reliable multimedia data streaming over wireless and mobile networks in the Internet of Things (IoT for location-based mobile marketing applications. The communications among mobile nodes for IoT need to have a seamless handover for delivering high quality multimedia services. The Internet Engineering Task Force (IETF mobility management schemes are the proposals for handling the routing of IPv6 packets to mobile nodes that have moved away from their home network. However, the standard mobility management scheme cannot prevent packet losses due to longer handover latency. In this article, a new enhanced data streaming route optimization scheme is introduced that uses an optimized Transmission Control Protocol (TCP realignment algorithm in order to prevent the packet disordering problem whenever the nodes in the IoT environment are communicating with each other. With the proposed scheme, data packets sequence realignment can be prevented, the packet traffic speed can be controlled, and the TCP performance can be improved. The experimental results show that managing the packet order in proposed new scheme remarkably increases the overall TCP performance over mobile networks within the IoT environment thus ensuring the high quality of service (QoS for multimedia data streaming in location-based mobile marketing applications.

  11. A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Xingpo; Liu, Xingjian; Liang, Junbin; Li, Yin; Li, Ran; Ma, Wenpeng; Qi, Chuanda

    2018-03-15

    A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top- k queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject.

  12. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  13. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  14. Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Xia Chen

    2008-05-01

    Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.

  15. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  16. Joint Transmit Antenna Selection and Power Allocation for ISDF Relaying Mobile-to-Mobile Sensor Networks.

    Science.gov (United States)

    Xu, Lingwei; Zhang, Hao; Gulliver, T Aaron

    2016-02-19

    The outage probability (OP) performance of multiple-relay incremental-selective decode-and-forward (ISDF) relaying mobile-to-mobile (M2M) sensor networks with transmit antenna selection (TAS) over N-Nakagami fading channels is investigated. Exact closed-form OP expressions for both optimal and suboptimal TAS schemes are derived. The power allocation problem is formulated to determine the optimal division of transmit power between the broadcast and relay phases. The OP performance under different conditions is evaluated via numerical simulation to verify the analysis. These results show that the optimal TAS scheme has better OP performance than the suboptimal scheme. Further, the power allocation parameter has a significant influence on the OP performance.

  17. Spatial-Temporal Data Collection with Compressive Sensing in Mobile Sensor Networks.

    Science.gov (United States)

    Zheng, Haifeng; Li, Jiayin; Feng, Xinxin; Guo, Wenzhong; Chen, Zhonghui; Xiong, Neal

    2017-11-08

    Compressive sensing (CS) provides an energy-efficient paradigm for data gathering in wireless sensor networks (WSNs). However, the existing work on spatial-temporal data gathering using compressive sensing only considers either multi-hop relaying based or multiple random walks based approaches. In this paper, we exploit the mobility pattern for spatial-temporal data collection and propose a novel mobile data gathering scheme by employing the Metropolis-Hastings algorithm with delayed acceptance, an improved random walk algorithm for a mobile collector to collect data from a sensing field. The proposed scheme exploits Kronecker compressive sensing (KCS) for spatial-temporal correlation of sensory data by allowing the mobile collector to gather temporal compressive measurements from a small subset of randomly selected nodes along a random routing path. More importantly, from the theoretical perspective we prove that the equivalent sensing matrix constructed from the proposed scheme for spatial-temporal compressible signal can satisfy the property of KCS models. The simulation results demonstrate that the proposed scheme can not only significantly reduce communication cost but also improve recovery accuracy for mobile data gathering compared to the other existing schemes. In particular, we also show that the proposed scheme is robust in unreliable wireless environment under various packet losses. All this indicates that the proposed scheme can be an efficient alternative for data gathering application in WSNs .

  18. Supporting seamless mobility for P2P live streaming.

    Science.gov (United States)

    Kim, Eunsam; Kim, Sangjin; Lee, Choonhwa

    2014-01-01

    With advent of various mobile devices with powerful networking and computing capabilities, the users' demand to enjoy live video streaming services such as IPTV with mobile devices has been increasing rapidly. However, it is challenging to get over the degradation of service quality due to data loss caused by the handover. Although many handover schemes were proposed at protocol layers below the application layer, they inherently suffer from data loss while the network is being disconnected during the handover. We therefore propose an efficient application-layer handover scheme to support seamless mobility for P2P live streaming. By simulation experiments, we show that the P2P live streaming system with our proposed handover scheme can improve the playback continuity significantly compared to that without our scheme.

  19. Supporting Seamless Mobility for P2P Live Streaming

    Directory of Open Access Journals (Sweden)

    Eunsam Kim

    2014-01-01

    Full Text Available With advent of various mobile devices with powerful networking and computing capabilities, the users' demand to enjoy live video streaming services such as IPTV with mobile devices has been increasing rapidly. However, it is challenging to get over the degradation of service quality due to data loss caused by the handover. Although many handover schemes were proposed at protocol layers below the application layer, they inherently suffer from data loss while the network is being disconnected during the handover. We therefore propose an efficient application-layer handover scheme to support seamless mobility for P2P live streaming. By simulation experiments, we show that the P2P live streaming system with our proposed handover scheme can improve the playback continuity significantly compared to that without our scheme.

  20. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-01-01

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period. PMID:26389903

  1. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements.

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-09-15

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period.

  2. Autonomous distributed self-organization for mobile wireless sensor networks.

    Science.gov (United States)

    Wen, Chih-Yu; Tang, Hung-Kai

    2009-01-01

    This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  3. NFC Secure Payment and Verification Scheme with CS E-Ticket

    Directory of Open Access Journals (Sweden)

    Kai Fan

    2017-01-01

    Full Text Available As one of the most important techniques in IoT, NFC (Near Field Communication is more interesting than ever. NFC is a short-range, high-frequency communication technology well suited for electronic tickets, micropayment, and access control function, which is widely used in the financial industry, traffic transport, road ban control, and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such as man-in-the-middle-attack and brute force attack, have hindered its further development. To address the security problems and specific application scenarios, we propose a NFC mobile electronic ticket secure payment and verification scheme in the paper. The proposed scheme uses a CS E-Ticket and offline session key generation and distribution technology to prevent major attacks and increase the security of NFC. As a result, the proposed scheme can not only be a good alternative to mobile e-ticket system but also be used in many NFC fields. Furthermore, compared with other existing schemes, the proposed scheme provides a higher security.

  4. A Computer Clone of Human Expert for Mobility Management Scheme (E-MMS): Step toward Green Transportation

    Science.gov (United States)

    Resdiansyah; O. K Rahmat, R. A.; Ismail, A.

    2018-03-01

    Green transportation refers to a sustainable transport that gives the least impact in terms of social and environmental but at the same time is able to supply energy sources globally that includes non-motorized transport strategies deployment to promote healthy lifestyles, also known as Mobility Management Scheme (MMS). As construction of road infrastructure cannot help solve the problem of congestion, past research has shown that MMS is an effective measure to mitigate congestion and to achieve green transportation. MMS consists of different strategies and policies that subdivided into categories according to how they are able to influence travel behaviour. Appropriate selection of mobility strategies will ensure its effectiveness in mitigating congestion problems. Nevertheless, determining appropriate strategies requires human expert and depends on a number of success factors. This research has successfully developed a computer clone system based on human expert, called E-MMS. The process of knowledge acquisition for MMS strategies and the next following process to selection of strategy has been encode in a knowledge-based system using a shell expert system. The newly developed computer cloning system was successfully verified, validated and evaluated (VV&E) by comparing the result output with the real transportation expert recommendation in which the findings suggested Introduction

  5. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    Science.gov (United States)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  6. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  7. Exploring the Evolution of New Mobile Services

    Directory of Open Access Journals (Sweden)

    Yong Chen

    2017-01-01

    Full Text Available The emergence and widespread use of mobile Internet technology has led to many different kinds of new mobile communications services, such as WeChat. Users could have more choices when attempting to satisfy their communications needs. The ability to predict the way in which users will use new mobile communications services is extremely valuable to mobile communications service providers. In this work, we propose a method for predicting how a user will use a new mobile service. Our scheme is inspired by the evolutionary game theory. With large-scale real world datasets collected from mobile service providers, we first extract the benefit-related features for users who were starting to use a new mobile service. Then we design our training and prediction methods for predicting potential users. We evaluate our scheme using experiments with large-scale real data. The results show that our approach can predict users’ future behavior with satisfying accuracy.

  8. Static and dynamic efficiency of white certificate schemes

    International Nuclear Information System (INIS)

    Giraudet, L.G.; Finon, D.

    2011-01-01

    White Certificate Schemes mandate energy companies to promote energy efficiency through flexibility mechanisms, including the trading of energy savings. They can be characterized as a quantity-based, baseline-and-credit system for the diffusion of energy efficient technologies. This paper compares experiences with White Certificate Schemes in Great Britain, Italy and France, in order to identify the basic drivers of each, and ultimately offer an original interpretation as an adaptive instrument, in the sense that it can take different forms in response to specific institutional contexts. A first analysis shows that Schemes perform well in terms of static efficiency, i.e. they are cost-effective and generate net social benefits over the period considered, though with large discrepancies rooted in different technological potentials. Regarding dynamic efficiency, i.e. the ability to induce and sustain technological change over the long haul, market transformation occurred in Great Britain, but was poorly incentivized in Italy and France by inadequate compliance cost recovery rules. Substantial organizational change has occurred in every country, mainly by strengthening vertical relationships between obliged parties and upstream businesses. Overall, the obligation (rather than the market component) drives the early phases of the Schemes. (authors)

  9. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    Science.gov (United States)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  10. A study of malware detection on smart mobile devices

    Science.gov (United States)

    Yu, Wei; Zhang, Hanlin; Xu, Guobin

    2013-05-01

    The growing in use of smart mobile devices for everyday applications has stimulated the spread of mobile malware, especially on popular mobile platforms. As a consequence, malware detection becomes ever more critical in sustaining the mobile market and providing a better user experience. In this paper, we review the existing malware and detection schemes. Using real-world malware samples with known signatures, we evaluate four popular commercial anti-virus tools and our data shows that these tools can achieve high detection accuracy. To deal with the new malware with unknown signatures, we study the anomaly based detection using decision tree algorithm. We evaluate the effectiveness of our detection scheme using malware and legitimate software samples. Our data shows that the detection scheme using decision tree can achieve a detection rate up to 90% and a false positive rate as low as 10%.

  11. Autonomous Distributed Self-Organization for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chih-Yu Wen

    2009-11-01

    Full Text Available This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently. A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  12. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  13. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  14. CAC DPLB MCN: A Distributed Load Balancing Scheme in Multimedia Mobile Cellular Networks

    Directory of Open Access Journals (Sweden)

    Sharma Abhijit

    2016-11-01

    Full Text Available The problem of non-uniform traffic demand in different cells of a cellular network may lead to a gross imbalance in the system performance. Thus, the users in hot cells may suffer from low throughput. In this paper, an effective and simple load balancing scheme CAC_DPLB_MCN is proposed that can effectively reduce the overall call blocking. This model considers dealing with multi-media traffic as well as time-varying geographical traffic distribution. The proposed scheme uses the concept of cell-tiering thereby creating fractional frequency reuse environment. A message exchange based distributed scheme instead of centralized one is used which help the proposed scheme be implemented in a multiple hot cell environment also. Furthermore, concept of dynamic pricing is used to serve the best interest of the users as well as for the service providers. The performance of the proposed scheme is compared with two other existing schemes in terms of call blocking probability and bandwidth utilization. Simulation results show that the proposed scheme can reduce the call blocking significantly in highly congested cell with highest bandwidth utilization. Use of dynamic pricing also makes the scheme useful to increase revenue of the service providers in contrast with compared schemes.

  15. A new encoding scheme for visible light communications with applications to mobile connections

    Science.gov (United States)

    Benton, David M.; St. John Brittan, Paul

    2017-10-01

    A new, novel and unconventional encoding scheme called concurrent coding, has recently been demonstrated and shown to offer interesting features and benefits in comparison to conventional techniques, such as robustness against burst errors and improved efficiency of transmitted power. Free space optical communications can suffer particularly from issues of alignment which requires stable, fixed links to be established and beam wander which can interrupt communications. Concurrent coding has the potential to help ease these difficulties and enable mobile, flexible optical communications to be implemented through the use of a source encoding technique. This concept has been applied for the first time to optical communications where standard light emitting diodes (LEDs) have been used to transmit information encoded with concurrent coding. The technique successfully transmits and decodes data despite unpredictable interruptions to the transmission causing significant drop-outs to the detected signal. The technique also shows how it is possible to send a single block of data in isolation with no pre-synchronisation required between transmitter and receiver, and no specific synchronisation sequence appended to the transmission. Such systems are robust against interference - intentional or otherwise - as well as intermittent beam blockage.

  16. Provisioning of adaptability to variable topologies for routing schemes in MANETs

    DEFF Research Database (Denmark)

    Jiang, Shengming; Liu, Yaoda; Jiang, Yuming

    2004-01-01

    .g., low, medium, and high mobility) have been proposed in the,literature. However, since a mobile node should not be limited to operate in a particular MANET assumed by-a routing scheme, an important issue is how to enable, a mobile node to achieve routing performance as high as possible when it roams...... in the dynamic source routing protocol to provide the adaptability to variable topologies caused by mobility through computer simulation in NS-2....

  17. 双卡双待移动终端锁网方案研究%Research on network locking scheme for DCDS mobile terminal

    Institute of Scientific and Technical Information of China (English)

    高杰; 张岳彤; 包志祥

    2015-01-01

    Since the competition of mobile communication market becomes more intense with the arrival of 3G & 4G mobile communication era,communication operators launch series marketing strategies including charging phone calls for free mobile phone or cheap sale of mobile phone. In this situation,to ensure operators′ legal rights and interests,network locking function has become the operators′ basic requirements for customized mobile terminal gradually. How to meet the demands of customers′personalization and intelligentization to the utmost while ensuring operators′ legal rights and interests,becomes the important problem that the DCDS mobile terminal network locking is faced. As for current DCDS mobile terminal network locking tech⁃niques,three different kinds of network locking technologies were formed. In this paper,three DCDS network locking schemes are introduced,and a new DCDS network locking scheme based on them is proposed.%随着3G乃至4G移动通信时代的到来,移动通信市场的竞争越来越激烈,各运营商推出了充话费送手机或廉价出售手机等一系列的营销策略。这种情况下,为了充分保证自己的合法权益,锁网功能逐渐成为运营商定制移动终端的基本需求。同时,双卡双待移动终端在整个终端市场上的占比也越来越高。如何能在满足运营商合法权益的前提下,最大限度地兼顾到客户的个性化和智能化需求,成为双卡双待移动终端锁网所面临的重要问题。就当前双卡双待移动终端锁网技术领域的发展而言,形成了三种方式各异的锁网技术,对这三种锁网技术方案进行了介绍,并在此基础上提出了一种新的双卡双待移动终端锁网方案。

  18. A Deployment Scheme Based Upon Virtual Force for Directional Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chiu-Kuo Liang

    2015-11-01

    Full Text Available A directional sensor network is composed of many directional sensor nodes. Unlike conventional omni-directional sensors that always have an omni-angle of sensing range; directional sensors may have a limited angle of sensing range due to technical constraints or cost considerations. Area coverage is still an essential issue in a directional sensor network. In this paper, we study the area coverage problem in directional sensor networks with mobile sensors, which can move to the correct places to get high coverage. We present distributed self-deployment schemes of mobile sensors. After sensors are randomly deployed, each sensor calculates its next new location to move in order to obtain a better coverage than previous one. The locations of sensors are adjusted round by round so that the coverage is gradually improved. Based on the virtual force of the directional sensors, we design a scheme, namely Virtual force scheme. Simulation results show the effectiveness of our scheme in term of the coverage improvement.

  19. Upstream cash cloud

    International Nuclear Information System (INIS)

    Shepherd, R.

    1998-01-01

    This paper focuses on the effects of the slowdown in budgetary growth on the upstream business and offshore services. The dangers facing investors, the strong growth in energy demand, oil company priorities, the dip in profits of the oil companies, new field economics, the budgets for exploration and production, and the rig market outlook are discussed. (UK)

  20. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  1. BossPro: a biometrics-based obfuscation scheme for software protection

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.

  2. Analysis and study of a handoff scheme with multiple priority strategies

    Institute of Scientific and Technical Information of China (English)

    李波; 吴成柯; 椋本介士; 福田明

    2000-01-01

    A handoff scheme with the combination of channel reservation and preemptive priority in integrated voice/data cellular mobile systems is proposed. In the scheme, calls are divided into three different classes: handoff voice calls, originating voice calls, and data calls. An access strategy with the combination of channel reservation and preemptive priority is provided to a handoff voice call. Furthermore, in order to improve the system capacity for the total voice traffic, preemptive priority is also given to partial originating voice calls. The system is modeled by a two-dimensional Markov chain. Both the iteration method and the approximate method are used to calculate and analyze some of the most important performance measures of the system. It is shown that our scheme can provide better quality of services for mobile subscribers.

  3. Machine protection schemes for the SLC

    International Nuclear Information System (INIS)

    Ross, M.C.

    1991-01-01

    The beamline components of a linear collider must be protected from high power beams in a way that is both reliable and has a minimum impact on integrated luminosity. When an upstream accelerator component fault occurs, the machine protection system suppresses the appropriate beam pulses and restores them when the fault clears or is compensated for. If an unacceptable localized beam loss is detected, without an accompanying component fault that is a likely cause of the loss, the system must provide identical, lower rate (lower average power), beam pulses to be used for diagnosis. This must not be done at the expense of any upstream beam stabilization system since fault diagnosis and recovery may take some time. Since the SLC beam pulse sequence is a regenerative one, i.e. correct function on a given pulse requires that several preceding pulses have been successfully completed, beam pulse repetition rate limiting is not trivial. Smooth, rapid, recovery from this type of fault is very important and can have a significant impact on luminosity. This paper provides an overview of the beam suppression and repetition rate limiting schemes used at the SLC

  4. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  5. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  6. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  7. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  8. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  9. An Ultra-Low-Latency Geo-Routing Scheme for Team-Based Unmanned Vehicular Applications

    KAUST Repository

    Bader, Ahmed; Alouini, Mohamed-Slim

    2016-01-01

    Results and lessons learned from the implementation of a novel ultra low-latency geo-routing scheme are presented in this paper. The geo-routing scheme is intended for team-based mobile systems whereby a cluster of unmanned autonomous vehicles

  10. Energy-saving scheme based on downstream packet scheduling in ethernet passive optical networks

    Science.gov (United States)

    Zhang, Lincong; Liu, Yejun; Guo, Lei; Gong, Xiaoxue

    2013-03-01

    With increasing network sizes, the energy consumption of Passive Optical Networks (PONs) has grown significantly. Therefore, it is important to design effective energy-saving schemes in PONs. Generally, energy-saving schemes have focused on sleeping the low-loaded Optical Network Units (ONUs), which tends to bring large packet delays. Further, the traditional ONU sleep modes are not capable of sleeping the transmitter and receiver independently, though they are not required to transmit or receive packets. Clearly, this approach contributes to wasted energy. Thus, in this paper, we propose an Energy-Saving scheme that is based on downstream Packet Scheduling (ESPS) in Ethernet PON (EPON). First, we design both an algorithm and a rule for downstream packet scheduling at the inter- and intra-ONU levels, respectively, to reduce the downstream packet delay. After that, we propose a hybrid sleep mode that contains not only ONU deep sleep mode but also independent sleep modes for the transmitter and the receiver. This ensures that the energy consumed by the ONUs is minimal. To realize the hybrid sleep mode, a modified GATE control message is designed that involves 10 time points for sleep processes. In ESPS, the 10 time points are calculated according to the allocated bandwidths in both the upstream and the downstream. The simulation results show that ESPS outperforms traditional Upstream Centric Scheduling (UCS) scheme in terms of energy consumption and the average delay for both real-time and non-real-time packets downstream. The simulation results also show that the average energy consumption of each ONU in larger-sized networks is less than that in smaller-sized networks; hence, our ESPS is better suited for larger-sized networks.

  11. Upstream passage, spawning, and stock identification of fall chinook in the Snake River, 1992 and 1993. Final report

    International Nuclear Information System (INIS)

    Blankenship, H.L.; Mendel, G.W.

    1997-05-01

    This final report of the 3-year study summarizes activities and results for 1993. Study objectives were to: (1) determine the source of losses (or accounting errors) for adult chinook salmon between Ice Harbor Dam (IHR) and Lower Granite Dam (LGR), and upstream of LGR in the Snake River; (2) identify spawning locations upstream of LGR for calibration of aerial redd surveys, redd habitat mapping, carcass recovery for genetic stock profile analysis, and correction of estimated adult/redd ratios; and (3) estimate passage and migration times at Snake River. 200 fall chinook salmon were radio tagged and tracked with aerial, fixed-site, and ground mobile tracking. Fish were released upstream of IHR at Charbonneau Park (CHAR). 190 of the fish were tracked or relocated away from CHAR. 59 fish descended to below IHR without crossing Lower Monumental Dam (LMO). Another 128 salmon passed upstream of LMO without falling back at IHR. Only 80 salmon passed Little Goose Dam (LGO) without falling back at a downstream dam; 66 of these fish passed LGR. Many fish that fell back reascended the dams. A total of 72 salmon released at CHAR passed upstream of LGR, including fish that had fallen back and reascended a dam. Over 80 percent of the salmon that entered Lyons Ferry Hatchery each year had reached LGO before descending to the hatchery. Extensive wandering was documented between LMO and upstream of LGR before salmon entered Lyons Ferry Hatchery or the Tucannon River. In 1993, 41 salmon were found to be of hatchery origin when recovered. These fish entered Lyons Ferry Hatchery with similar movements to unmarked salmon. Each year a few salmon have remained near the hatchery without entering, which suggests the hatchery may have inadequate attraction flows. Fall chinook passed lower Snake River dams in 2-5 days each on average. Median travel times through LMO and LGO were 1.0-1.3 days each, which was slower than for spring chinook or steelhead in 1993. 5 refs., 21 figs., 20 tabs

  12. A Spatial Discretization Scheme for Solving the Transport Equation on Unstructured Grids of Polyhedra

    International Nuclear Information System (INIS)

    Thompson, K.G.

    2000-01-01

    In this work, we develop a new spatial discretization scheme that may be used to numerically solve the neutron transport equation. This new discretization extends the family of corner balance spatial discretizations to include spatial grids of arbitrary polyhedra. This scheme enforces balance on subcell volumes called corners. It produces a lower triangular matrix for sweeping, is algebraically linear, is non-negative in a source-free absorber, and produces a robust and accurate solution in thick diffusive regions. Using an asymptotic analysis, we design the scheme so that in thick diffusive regions it will attain the same solution as an accurate polyhedral diffusion discretization. We then refine the approximations in the scheme to reduce numerical diffusion in vacuums, and we attempt to capture a second order truncation error. After we develop this Upstream Corner Balance Linear (UCBL) discretization we analyze its characteristics in several limits. We complete a full diffusion limit analysis showing that we capture the desired diffusion discretization in optically thick and highly scattering media. We review the upstream and linear properties of our discretization and then demonstrate that our scheme captures strictly non-negative solutions in source-free purely absorbing media. We then demonstrate the minimization of numerical diffusion of a beam and then demonstrate that the scheme is, in general, first order accurate. We also note that for slab-like problems our method actually behaves like a second-order method over a range of cell thicknesses that are of practical interest. We also discuss why our scheme is first order accurate for truly 3D problems and suggest changes in the algorithm that should make it a second-order accurate scheme. Finally, we demonstrate 3D UCBL's performance on several very different test problems. We show good performance in diffusive and streaming problems. We analyze truncation error in a 3D problem and demonstrate robustness in a

  13. Reducing Downlink Signaling Traffic in Wireless Systems Using Mobile-Assisted Scheduling

    OpenAIRE

    Moosavi, Reza; Larsson, Erik G.

    2010-01-01

    We present an idea to reduce the part of the downlink signaling traffic in wireless multiple access systems that contains scheduling information. The theoretical basis of the scheme is that the scheduling decisions made by the base station are correlated with the CSI reports from the mobiles. This correlation can be exploited by the source coding scheme that is used to compress the scheduling maps before they are sent to the mobiles. In the proposed scheme, this idea is implemented by letting...

  14. Call Admission Scheme for Multidimensional Traffic Assuming Finite Handoff User

    Directory of Open Access Journals (Sweden)

    Md. Baitul Al Sadi

    2017-01-01

    Full Text Available Usually, the number of users within a cell in a mobile cellular network is considered infinite; hence, M/M/n/k model is appropriate for new originated traffic, but the number of ongoing calls around a cell is always finite. Hence, the traffic model of handoff call will be M/M/n/k/N. In this paper, a K-dimensional traffic model of a mobile cellular network is proposed using the combination of limited and unlimited users case. A new call admission scheme (CAS is proposed based on both thinning scheme and fading condition. The fading condition of the wireless channel access to a handoff call is prioritized compared to newly originated calls.

  15. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  16. Upstream Atlantic salmon (Salmo salar) passage

    International Nuclear Information System (INIS)

    Clay, C.H.

    1993-01-01

    Upstream salmon passage though a dam is discussed with respect to three main components: the fishway entrance, the fishway, and the exit. Design considerations and alternative types of components are presented. For fishway entrances, an important consideration is the positioning of the entrance as far upstream as the fish can swim with respect to obstacles. For powerhouses using water diverted from a river, the problem of leading fish past the powerhouse may be overcome by either installing a tailrace barrier or increasing the flow until the home stream odor is sufficient to attract fish. Swimming ability should be the first consideration in fishway design. Fishways with 50 cm drops per pool would be satisfactory in most cases. The problem of headwater fluctuation is overcome through careful fishway selection. Fish locks, hoists, and elevators are other alternatives to pool/weir fishways. The location for a fish exit must be decided on the basis of whether the fishway will be used only for upstream migrations. 5 refs., 1 fig., 1 tab

  17. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  18. Recovery of Flash Memories for Reliable Mobile Storages

    Directory of Open Access Journals (Sweden)

    Daesung Moon

    2010-01-01

    Full Text Available As the mobile appliance is applied to many ubiquitous services and the importance of the information stored in it is increased, the security issue to protect the information becomes one of the major concerns. However, most previous researches focused only on the communication security, not the storage security. Especially, a flash memory whose operational characteristics are different from those of HDD is used increasingly as a storage device for the mobile appliance because of its resistance to physical shock and lower power requirement. In this paper, we propose a flash memory management scheme targeted for guaranteeing the data integrity of the mobile storage. By maintaining the old data specified during the recovery window, we can recover the old data when the mobile appliance is attacked. Also, to reduce the storage requirement for the recovery, we restrict the number of versions to be copied, called Degree of Integrity (DoI. Especially, we consider both the reclaim efficiency and the wear leveling which is a unique characteristic of the flash memory. Based on the performance evaluation, we confirm that the proposed scheme can be acceptable to many applications as a flash memory management scheme for improving data integrity.

  19. Modeling and Performance Analysis for Cell Access and Handoff Schemes in Two-Tier Cellular Networks

    Directory of Open Access Journals (Sweden)

    Kyungkoo Jun

    2014-01-01

    Full Text Available We investigate the effects of handoff on system performance in two-tier cellular networks. Two of the main performance metrics are new call blocking probability and handoff drop rate. We develop analytical models to evaluate the performance of two different handoff schemes. One scheme considers only femto-to-macrocell handoff while the other is bidirectional including macro-to-femtocell handoff. Our model is more elaborate than existing ones which have not considered the mobility of mobile stations. Numerical results show that the bidirectional scheme performs better than the femto-to-macrocell handoff as it achieves lower blocking probability and drop rate.

  20. Functional promoter upstream p53 regulatory sequence of IGFBP3 that is silenced by tumor specific methylation

    International Nuclear Information System (INIS)

    Hanafusa, Tadashi; Shinji, Toshiyuki; Shiraha, Hidenori; Nouso, Kazuhiro; Iwasaki, Yoshiaki; Yumoto, Eichiro; Ono, Toshiro; Koide, Norio

    2005-01-01

    Insulin-like growth factor binding protein (IGFBP)-3 functions as a carrier of insulin-like growth factors (IGFs) in circulation and a mediator of the growth suppression signal in cells. There are two reported p53 regulatory regions in the IGFBP3 gene; one upstream of the promoter and one intronic. We previously reported a hot spot of promoter hypermethylation of IGFBP-3 in human hepatocellular carcinomas and derivative cell lines. As the hot spot locates at the putative upstream p53 consensus sequences, these p53 consensus sequences are really functional is a question to be answered. In this study, we examined the p53 consensus sequences upstream of the IGFBP-3 promoter for the p53 induced expression of IGFBP-3. Deletion, mutagenesis, and methylation constructs of IGFBP-3 promoter were assessed in the human hepatoblastoma cell line HepG2 for promoter activity. Deletions and mutations of these sequences completely abolished the expression of IGFBP-3 in the presence of p53 overexpression. In vitro methylation of these p53 consensus sequences also suppressed IGFBP-3 expression. In contrast, the expression of IGFBP-3 was not affected in the absence of p53 overexpression. Further, we observed by electrophoresis mobility shift assay that p53 binding to the promoter region was diminished when methylated. From these observations, we conclude that four out of eleven p53 consensus sequences upstream of the IGFBP-3 promoter are essential for the p53 induced expression of IGFBP-3, and hypermethylation of these sequences selectively suppresses p53 induced IGFBP-3 expression in HepG2 cells

  1. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    Science.gov (United States)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  2. Upstream health law.

    Science.gov (United States)

    Sage, William M; McIlhattan, Kelley

    2014-01-01

    For the first time, entrepreneurs are aggressively developing new technologies and business models designed to improve individual and population health, not just to deliver specialized medical care. Consumers of these goods and services are not yet "patients"; they are simply people. As this sector of the health care industry expands, it is likely to require new forms of legal governance, which we term "upstream health law." © 2014 American Society of Law, Medicine & Ethics, Inc.

  3. Kinematics, dynamics and control design of 4WIS4WID mobile robots

    Directory of Open Access Journals (Sweden)

    Ming-Han Lee

    2015-01-01

    Full Text Available Kinematic and dynamic modelling and corresponding control design of a four-wheel-independent steering and four-wheel-independent driving (4WIS4WID mobile robot are presented in this study. Different from the differential or car-like mobile robot, the 4WIS4WID mobile robot is controlled by four steering and four driving motors, so the control scheme should possess the ability to integrate and manipulate the four independent wheels. A trajectory tracking control scheme is developed for the 4WIS4WID mobile robot, where both non-linear kinematic control and dynamic sliding-mode control are designed. All of the stabilities of the kinematic and dynamic control laws are proved by Lyapunov stability analysis. Finally, the feasibility and validity of the proposed trajectory tracking control scheme are confirmed through computer simulations.

  4. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  5. Adaptive guard channel allocation scheme with buffer for mobile ...

    African Journals Online (AJOL)

    The devastating effect congestion has on the quality of service delivery and overall network performance demands an utmost attention. This certainly calls for taking some expedient measures to deal with congestion so as to salvage the network from total collapse. In this paper, an adaptive guard channel allocation scheme ...

  6. A vertical handoff scheme based on adaptive period

    Directory of Open Access Journals (Sweden)

    Li Yang

    2017-08-01

    Full Text Available This paper presents a periodic adaptive vertical handoff scheme.In the phase of handoff initiation,the mobile terminal will adjust the interfaces activating interval to scan the potential new wireless signals according to the Received Signals Strength.In the phase of handoff decision,multiple attribute judgment method are adopted to judge the comprehensive perfomance of each network.The simulation shows that the proposed scheme can discover new wireless networks access the network that has the best comprehensive performance saving consumed power.

  7. Energetic particle diffusion coefficients upstream of quasi-parallel interplanetary shocks

    Science.gov (United States)

    Tan, L. C.; Mason, G. M.; Gloeckler, G.; Ipavich, F. M.

    1989-01-01

    The properties of about 30 to 130-keV/e protons and alpha particles upstream of six quasi-parallel interplanetary shocks that passed by the ISEE 3 spacecraft during 1978-1979 were analyzed, and the values for the upstream energegic particle diffusion coefficient, kappa, in these six events were deduced for a number of energies and upstream positions. These observations were compared with predictions of Lee's (1983) theory of shock acceleration. It was found that the observations verified the prediction of the A/Q dependence (where A and Q are the particle atomic mass and ionization state, respectively) of kappa for alpha and proton particles upstream of the quasi-parallel shocks.

  8. Tracking Mobile Robot in Indoor Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Liping Zhang

    2014-01-01

    Full Text Available This work addresses the problem of tracking mobile robots in indoor wireless sensor networks (WSNs. Our approach is based on a localization scheme with RSSI (received signal strength indication which is used widely in WSN. The developed tracking system is designed for continuous estimation of the robot’s trajectory. A WSN, which is composed of many very simple and cheap wireless sensor nodes, is deployed at a specific region of interest. The wireless sensor nodes collect RSSI information sent by mobile robots. A range-based data fusion scheme is used to estimate the robot’s trajectory. Moreover, a Kalman filter is designed to improve tracking accuracy. Experiments are provided to assess the performance of the proposed scheme.

  9. Design of inspection equipment vehicle of mobile cobalt-60 container scanner

    International Nuclear Information System (INIS)

    Zhang Yanmin; An Jigang; Zhou Liye; Liu Yisi; Wu Zhifang; Xiang Xincheng; Huang Songling

    2000-01-01

    The author introduced the design principle of Inspection Equipment Vehicle of TCM-SCAN Mobile 60 Co container inspection system. Three schemes had been compared. The scheme of scan gate in form of pucker-able rails standing on the vehicle was determined. Prototype was prepared in September 1999. Mobile 60 Co container inspection system had the same inspection performance of fixed 60 Co container inspection system

  10. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service.

    Science.gov (United States)

    Yang, Xue; Yin, Fan; Tang, Xiaohu

    2017-07-11

    Location-based services (LBS), as one of the most popular location-awareness applications, has been further developed to achieve low-latency with the assistance of fog computing. However, privacy issues remain a research challenge in the context of fog computing. Therefore, in this paper, we present a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based services, hereafter referred to as FGPQ. In particular, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that the FGPQ scheme can significantly reduce computational and communication overheads and ensure the low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching.

  11. An extra power saving scheme for prolonging lifetime of mobile handset in the 4G mobile networks.

    Science.gov (United States)

    Chen, Jenhui; Tarn, Woei-Hwa; Lee, Jiann-Der

    2014-01-01

    In the fourth generation or next generation networks, services of non-real-time variable bit rate (NRT-VBR) and best effort (BE) will dominate over 85% of the total traffic in the networks. In this paper, we study the power saving mechanism of NRT-VBR and BE services for mobile handsets (MHs) to prolong their battery lifetime (i.e., the sustained operation duration) in the fourth generation networks. Because the priority of NRT-VBR and BE is lower than that of real-time VBR (RT-VBR) or guaranteed bit rate (GBR) services, we investigate an extended sleep mode for lower priority services (e.g., NRT-VBR and BE) in an MH to conserve the energy. The extended sleep mode is used when the MH wakes up from the sleep mode but it cannot obtain the bandwidth from base station (BS). The proposed mechanism, named extra power saving scheme (EPSS), uses the M/M/k/k Markovian queuing model to estimate the extended sleep duration to let MHs conserve their battery energy when the networks traffic is congested. To study the performance of EPSS, an accurate analysis model of energy is presented and validated by taking a series of simulations. Numerical experiments show that EPSS can achieve 43% extra energy conservation at most when downlink resource is saturated. We conclude that the energy of MHs can be conserved further by applying EPSS when the traffic load is saturated. The effect of energy saving becomes more obvious when the portion of NRT-VBR and BE services is greater than that of RT-VBR and GBR services.

  12. Distributed Schemes for Crowdsourcing-Based Sensing Task Assignment in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Linbo Zhai

    2017-01-01

    Full Text Available Spectrum sensing is an important issue in cognitive radio networks. The unlicensed users can access the licensed wireless spectrum only when the licensed wireless spectrum is sensed to be idle. Since mobile terminals such as smartphones and tablets are popular among people, spectrum sensing can be assigned to these mobile intelligent terminals, which is called crowdsourcing method. Based on the crowdsourcing method, this paper studies the distributed scheme to assign spectrum sensing task to mobile terminals such as smartphones and tablets. Considering the fact that mobile terminals’ positions may influence the sensing results, a precise sensing effect function is designed for the crowdsourcing-based sensing task assignment. We aim to maximize the sensing effect function and cast this optimization problem to address crowdsensing task assignment in cognitive radio networks. This problem is difficult to be solved because the complexity of this problem increases exponentially with the growth in mobile terminals. To assign crowdsensing task, we propose four distributed algorithms with different transition probabilities and use a Markov chain to analyze the approximation gap of our proposed schemes. Simulation results evaluate the average performance of our proposed algorithms and validate the algorithm’s convergence.

  13. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  14. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  15. Human Resource Local Content in Ghana's Upstream Petroleum Industry

    Science.gov (United States)

    Benin, Papa

    Enactment of Ghana's Petroleum (Local Content and Local Participation) Regulations, 2013 (L.I. 2204) was intended to regulate the percentage of local products, personnel, financing, and goods and services rendered within Ghana's upstream petroleum industry value chain. Five years after the inception of Ghana's upstream oil and gas industry, a gap is evident between the requirements of L.I. 2204 and professional practice. Drawing on Lewin's change theory, a cross-sectional study was conducted to examine the extent of differences between the prevailing human resource local content and the requirements of L.I. 2204 in Ghana's upstream petroleum industry. The extent to which training acquired by indigenous Ghanaians seeking jobs in Ghana's oil fields affects the prevalent local content in its upstream petroleum industry was also examined. Survey data were collected from 97 management, technical, and other staff in 2 multinational petroleum companies whose oil and gas development plans have been approved by the Petroleum Commission of Ghana. To answer the research questions and test their hypotheses, one-way ANOVA was performed with staff category (management, technical, and other) as the independent variable and prevalent local content as the dependent variable. Results indicated that prevailing local content in Ghana's upstream petroleum industry meets the requirements of L.I. 2204. Further, training acquired by indigenous Ghanaians seeking jobs in Ghana's oil fields affects the prevalent local content in its offshore petroleum industry. Findings may encourage leaders within multinational oil companies and the Petroleum Commission of Ghana to organize educational seminars that equip indigenous Ghanaians with specialized skills for working in Ghana's upstream petroleum industry.

  16. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  17. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  18. Clustering in large networks does not promote upstream reciprocity.

    Directory of Open Access Journals (Sweden)

    Naoki Masuda

    Full Text Available Upstream reciprocity (also called generalized reciprocity is a putative mechanism for cooperation in social dilemma situations with which players help others when they are helped by somebody else. It is a type of indirect reciprocity. Although upstream reciprocity is often observed in experiments, most theories suggest that it is operative only when players form short cycles such as triangles, implying a small population size, or when it is combined with other mechanisms that promote cooperation on their own. An expectation is that real social networks, which are known to be full of triangles and other short cycles, may accommodate upstream reciprocity. In this study, I extend the upstream reciprocity game proposed for a directed cycle by Boyd and Richerson to the case of general networks. The model is not evolutionary and concerns the conditions under which the unanimity of cooperative players is a Nash equilibrium. I show that an abundance of triangles or other short cycles in a network does little to promote upstream reciprocity. Cooperation is less likely for a larger population size even if triangles are abundant in the network. In addition, in contrast to the results for evolutionary social dilemma games on networks, scale-free networks lead to less cooperation than networks with a homogeneous degree distribution.

  19. Clustering in large networks does not promote upstream reciprocity.

    Science.gov (United States)

    Masuda, Naoki

    2011-01-01

    Upstream reciprocity (also called generalized reciprocity) is a putative mechanism for cooperation in social dilemma situations with which players help others when they are helped by somebody else. It is a type of indirect reciprocity. Although upstream reciprocity is often observed in experiments, most theories suggest that it is operative only when players form short cycles such as triangles, implying a small population size, or when it is combined with other mechanisms that promote cooperation on their own. An expectation is that real social networks, which are known to be full of triangles and other short cycles, may accommodate upstream reciprocity. In this study, I extend the upstream reciprocity game proposed for a directed cycle by Boyd and Richerson to the case of general networks. The model is not evolutionary and concerns the conditions under which the unanimity of cooperative players is a Nash equilibrium. I show that an abundance of triangles or other short cycles in a network does little to promote upstream reciprocity. Cooperation is less likely for a larger population size even if triangles are abundant in the network. In addition, in contrast to the results for evolutionary social dilemma games on networks, scale-free networks lead to less cooperation than networks with a homogeneous degree distribution.

  20. Optimal powering schemes for legged robotics

    Science.gov (United States)

    Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.

    2010-04-01

    Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.

  1. Structure-charge mobility relation for hexabenzocoronene derivatives

    Energy Technology Data Exchange (ETDEWEB)

    Kirkpatrick, James [Max Planck Institute for Polymer Research, Ackermannweg 10, Mainz 55128 (Germany); Department of Physics, Imperial College London, Prince Consort Road, London SW7 2BW (United Kingdom); Marcon, Valentina; Kremer, Kurt [Max Planck Institute for Polymer Research, Ackermannweg 10, Mainz 55128 (Germany); Nelson, Jenny [Department of Physics, Imperial College London, Prince Consort Road, London SW7 2BW (United Kingdom); Andrienko, Denis

    2008-05-15

    Charge mobilities of several derivatives of discotic liquid crystals have been determined by combining three methods into one scheme: (i) quantum chemical methods for the calculation of molecular electronic structures and reorganization energies (ii) molecular dynamics for simulation of the relative positions and orientations of molecules in a columnar mesophase, and (iii) kinetic Monte Carlo simulations and Master Equation approach to simulate charge transport. Applying this scheme to differently substituted hexabenzocoronene derivatives we reproduce the trends and magnitudes of mobilities as measured by pulse-radiolysis time-resolved microwave conductivity (PR-TRMC) and connect mobility directly to the microscopic morphology of the columns. Our study also shows that it is possible to understand and reproduce experimental charge transport parameters, and, in some cases, accurately predict them. (copyright 2008 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  2. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  3. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Science.gov (United States)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  4. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    International Nuclear Information System (INIS)

    Sklavos, N; Selimis, G; Koufopavlou, O

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given

  5. Energy-Saving Mechanism in WDM/TDM-PON Based on Upstream Network Traffic

    Directory of Open Access Journals (Sweden)

    Paola Garfias

    2014-08-01

    Full Text Available One of the main challenges of Passive Optical Networks (PONs is the resource (bandwidth and wavelength management. Since it has been shown that access networks consume a significant part of the overall energy of the telecom networks, the resource management schemes should also consider energy minimization strategies. To sustain the increased bandwidth demand of emerging applications in the access section of the network, it is expected that next generation optical access networks will adopt the wavelength division/time division multiplexing (WDM/TDM technique to increase PONs capacity. Compared with traditional PONs, the architecture of a WDM/TDM-PON requires more transceivers/receivers, hence they are expected to consume more energy. In this paper, we focus on the energy minimization in WDM/TDM-PONs and we propose an energy-efficient Dynamic Bandwidth and Wavelength Allocation mechanism whose objective is to turn off, whenever possible, the unnecessary upstream traffic receivers at the Optical Line Terminal (OLT. We evaluate our mechanism in different scenarios and show that the proper use of upstream channels leads to relevant energy savings. Our proposed energy-saving mechanism is able to save energy at the OLT while maintaining the introduced penalties in terms of packet delay and cycle time within an acceptable range. We might highlight the benefits of our proposal as a mechanism that maximizes the channel utilization. Detailed implementation of the proposed algorithm is presented, and simulation results are reported to quantify energy savings and effects on network performance on different network scenarios.

  6. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Science.gov (United States)

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  7. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Directory of Open Access Journals (Sweden)

    Byungseok Kang

    Full Text Available Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6 is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6 protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN to an MN. Since the problem affects the quality of service (QoS of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  8. A Mathematical Scheme for Calculating Flows and Pressure Drops in Lit and Unlit Cigarettes

    Directory of Open Access Journals (Sweden)

    Dwyer RW

    2014-12-01

    Full Text Available A computational methodology is presented for evaluating the flows and pressure drops in both lit and unlit cigarettes. The flows and pressure drops across rows of tipping-paper perforations are considered explicitly, as are the locations and relative sizes of the ventilation holes. The flows and pressure drops across air-permeable cigarette papers are included. The influence of plugwrappermeabilities on filter ventilation is developed. Lit cigarettes are mimicked by adding a “coal” pressure drop to the upstream end of the cigarette. The computational scheme is used to predict the effects of tobacco-rod length, puff volume, and vent blocking on cigarette ventilation and pressure drop. A derivation of the pressure-drop and flow equations for a cigarette with an upstream pressure drop is included in an appendix.

  9. An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme

    Directory of Open Access Journals (Sweden)

    Juan Qu

    2013-01-01

    Full Text Available In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In 2012, Wen and Li proposed a dynamic ID-based remote user authentication with key agreement scheme. They claimed that their scheme can resist impersonation attack and insider attack and provide anonymity for the users. However, we will show that Wen and Li's scheme cannot withstand insider attack and forward secrecy, does not provide anonymity for the users, and inefficiency for error password login. In this paper, we propose a novel ECC-based remote user authentication scheme which is immune to various known types of attack and is more secure and practical for mobile clients.

  10. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  11. An ICMP-Based Mobility Management Approach Suitable for Protocol Deployment Limitation

    Directory of Open Access Journals (Sweden)

    Jeng-Yueng Chen

    2009-01-01

    Full Text Available Mobility management is one of the important tasks on wireless networks. Many approaches have been proposed in the past, but none of them have been widely deployed so far. Mobile IP (MIP and Route Optimization (ROMIP, respectively, suffer from triangular routing problem and binding cache supporting upon each node on the entire Internet. One step toward a solution is the Mobile Routing Table (MRT, which enables edge routers to take over address binding. However, this approach demands that all the edge routers on the Internet support MRT, resulting in protocol deployment difficulties. To address this problem and to offset the limitation of the original MRT approach, we propose two different schemes, an ICMP echo scheme and an ICMP destination-unreachable scheme. These two schemes work with the MRT to efficiently find MRT-enabled routers that greatly reduce the number of triangular routes. In this paper, we analyze and compare the standard MIP and the proposed approaches. Simulation results have shown that the proposed approaches reduce transmission delay, with only a few routers supporting MRT.

  12. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  13. Design of an anti-Rician-fading modem for mobile satellite communication systems

    Science.gov (United States)

    Kojima, Toshiharu; Ishizu, Fumio; Miyake, Makoto; Murakami, Keishi; Fujino, Tadashi

    1995-01-01

    To design a demodulator applicable to mobile satellite communication systems using differential phase shift keying modulation, we have developed key technologies including an anti-Rician-fading demodulation scheme, an initial acquisition scheme, automatic gain control (AGC), automatic frequency control (AFC), and bit timing recovery (BTR). Using these technologies, we have developed one-chip digital signal processor (DSP) modem for mobile terminal, which is compact, of light weight, and of low power consumption. Results of performance test show that the developed DSP modem achieves good performance in terms of bit error ratio in mobile satellite communication environment, i.e., Rician fading channel. It is also shown that the initial acquisition scheme acquires received signal rapidly even if the carrier-to-noise power ratio (CNR) of the received signal is considerably low.

  14. Participation costs can suppress the evolution of upstream reciprocity.

    Science.gov (United States)

    Peña, Jorge; Pestelacci, Enea; Berchtold, André; Tomassini, Marco

    2011-03-21

    Indirect reciprocity, one of the many mechanisms proposed to explain the evolution of cooperation, is the idea that altruistic actions can be rewarded by third parties. Upstream or generalized reciprocity is one type of indirect reciprocity in which individuals help someone if they have been helped by somebody else in the past. Although empirically found to be at work in humans, the evolution of upstream reciprocity is difficult to explain from a theoretical point of view. A recent model of upstream reciprocity, first proposed by Nowak and Roch (2007) and further analyzed by Iwagami and Masuda (2010), shows that while upstream reciprocity alone does not lead to the evolution of cooperation, it can act in tandem with mechanisms such as network reciprocity and increase the total level of cooperativity in the population. We argue, however, that Nowak and Roch's model systematically leads to non-uniform interaction rates, where more cooperative individuals take part in more games than less cooperative ones. As a result, the critical benefit-to-cost ratios derived under this model in previous studies are not invariant with respect to the addition of participation costs. We show that accounting for these costs can hinder and even suppress the evolution of upstream reciprocity, both for populations with non-random encounters and graph-structured populations. Copyright © 2011 Elsevier Ltd. All rights reserved.

  15. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  16. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  17. On the Performance of Counter-Based Broadcast Scheme for Mobile ...

    African Journals Online (AJOL)

    Despite its simplicity, it can result in high redundant retransmission, contention and collision, a phenomenon collectively referred to as the broadcast storm problem. Counter-based broadcast scheme has been proposed to mitigate this inherent problem and it relies on counter threshold value for rebroadcast decision. Thus ...

  18. A Numerical Scheme Based on an Immersed Boundary Method for Compressible Turbulent Flows with Shocks: Application to Two-Dimensional Flows around Cylinders

    Directory of Open Access Journals (Sweden)

    Shun Takahashi

    2014-01-01

    Full Text Available A computational code adopting immersed boundary methods for compressible gas-particle multiphase turbulent flows is developed and validated through two-dimensional numerical experiments. The turbulent flow region is modeled by a second-order pseudo skew-symmetric form with minimum dissipation, while the monotone upstream-centered scheme for conservation laws (MUSCL scheme is employed in the shock region. The present scheme is applied to the flow around a two-dimensional cylinder under various freestream Mach numbers. Compared with the original MUSCL scheme, the minimum dissipation enabled by the pseudo skew-symmetric form significantly improves the resolution of the vortex generated in the wake while retaining the shock capturing ability. In addition, the resulting aerodynamic force is significantly improved. Also, the present scheme is successfully applied to moving two-cylinder problems.

  19. An Ultra-Low-Latency Geo-Routing Scheme for Team-Based Unmanned Vehicular Applications

    KAUST Repository

    Bader, Ahmed

    2016-02-26

    Results and lessons learned from the implementation of a novel ultra low-latency geo-routing scheme are presented in this paper. The geo-routing scheme is intended for team-based mobile systems whereby a cluster of unmanned autonomous vehicles are deployed to accomplish a critical mission under human supervision. The contention-free nature of the developed scheme lends itself to jointly achieve lower latency and higher throughput. Implementation challenges are presented and corresponding resolutions are discussed herewith. © 2015 IEEE.

  20. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Directory of Open Access Journals (Sweden)

    Weirong Cui

    Full Text Available Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched, and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  1. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Science.gov (United States)

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  2. Congestion Control and Traffic Scheduling for Collaborative Crowdsourcing in SDN Enabled Mobile Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dawei Shen

    2018-01-01

    Full Text Available Currently, a number of crowdsourcing-based mobile applications have been implemented in mobile networks and Internet of Things (IoT, targeted at real-time services and recommendation. The frequent information exchanges and data transmissions in collaborative crowdsourcing are heavily injected into the current communication networks, which poses great challenges for Mobile Wireless Networks (MWN. This paper focuses on the traffic scheduling and load balancing problem in software-defined MWN and designs a hybrid routing forwarding scheme as well as a congestion control algorithm to achieve the feasible solution. The traffic scheduling algorithm first sorts the tasks in an ascending order depending on the amount of tasks and then solves it using a greedy scheme. In the proposed congestion control scheme, the traffic assignment is first transformed into a multiknapsack problem, and then the Artificial Fish Swarm Algorithm (AFSA is utilized to solve this problem. Numerical results on practical network topology reveal that, compared with the traditional schemes, the proposed congestion control and traffic scheduling schemes can achieve load balancing, reduce the probability of network congestion, and improve the network throughput.

  3. An overview on real-time control schemes for wheeled mobile robot

    Science.gov (United States)

    Radzak, M. S. A.; Ali, M. A. H.; Sha’amri, S.; Azwan, A. R.

    2018-04-01

    The purpose of this paper is to review real-time control motion algorithms for wheeled mobile robot (WMR) when navigating in environment such as road. Its need a good controller to avoid collision with any disturbance and maintain a track error at zero level. The controllers are used with other aiding sensors to measure the WMR’s velocities, posture, and interference to estimate the required torque to be applied on the wheels of mobile robot. Four main categories for wheeled mobile robot control systems have been found in literature which are namely: Kinematic based controller, Dynamic based controllers, artificial intelligence based control system, and Active Force control. A MATLAB/Simulink software is the main software to simulate and implement the control system. The real-time toolbox in MATLAB/SIMULINK are used to receive/send data from sensors/to actuator with presence of disturbances, however others software such C, C++ and visual basic are rare to be used.

  4. Biologically based neural network for mobile robot navigation

    Science.gov (United States)

    Torres Muniz, Raul E.

    1999-01-01

    The new tendency in mobile robots is to crete non-Cartesian system based on reactions to their environment. This emerging technology is known as Evolutionary Robotics, which is combined with the Biorobotic field. This new approach brings cost-effective solutions, flexibility, robustness, and dynamism into the design of mobile robots. It also provides fast reactions to the sensory inputs, and new interpretation of the environment or surroundings of the mobile robot. The Subsumption Architecture (SA) and the action selection dynamics developed by Brooks and Maes, respectively, have successfully obtained autonomous mobile robots initiating this new trend of the Evolutionary Robotics. Their design keeps the mobile robot control simple. This work present a biologically inspired modification of these schemes. The hippocampal-CA3-based neural network developed by Williams Levy is used to implement the SA, while the action selection dynamics emerge from iterations of the levels of competence implemented with the HCA3. This replacement by the HCA3 results in a closer biological model than the SA, combining the Behavior-based intelligence theory with neuroscience. The design is kept simple, and it is implemented in the Khepera Miniature Mobile Robot. The used control scheme obtains an autonomous mobile robot that can be used to execute a mail delivery system and surveillance task inside a building floor.

  5. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    Science.gov (United States)

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  6. Adaptive multi-node multiple input and multiple output (MIMO) transmission for mobile wireless multimedia sensor networks.

    Science.gov (United States)

    Cho, Sunghyun; Choi, Ji-Woong; You, Cheolwoo

    2013-10-02

    Mobile wireless multimedia sensor networks (WMSNs), which consist of mobile sink or sensor nodes and use rich sensing information, require much faster and more reliable wireless links than static wireless sensor networks (WSNs). This paper proposes an adaptive multi-node (MN) multiple input and multiple output (MIMO) transmission to improve the transmission reliability and capacity of mobile sink nodes when they experience spatial correlation. Unlike conventional single-node (SN) MIMO transmission, the proposed scheme considers the use of transmission antennas from more than two sensor nodes. To find an optimal antenna set and a MIMO transmission scheme, a MN MIMO channel model is introduced first, followed by derivation of closed-form ergodic capacity expressions with different MIMO transmission schemes, such as space-time transmit diversity coding and spatial multiplexing. The capacity varies according to the antenna correlation and the path gain from multiple sensor nodes. Based on these statistical results, we propose an adaptive MIMO mode and antenna set switching algorithm that maximizes the ergodic capacity of mobile sink nodes. The ergodic capacity of the proposed scheme is compared with conventional SN MIMO schemes, where the gain increases as the antenna correlation and path gain ratio increase.

  7. Analysis of key thresholds leading to upstream dependencies in global transboundary water bodies

    Science.gov (United States)

    Munia, Hafsa Ahmed; Guillaume, Joseph; Kummu, Matti; Mirumachi, Naho; Wada, Yoshihide

    2017-04-01

    Transboundary water bodies supply 60% of global fresh water flow and are home to about 1/3 of the world's population; creating hydrological, social and economic interdependencies between countries. Trade-offs between water users are delimited by certain thresholds, that, when crossed, result in changes in system behavior, often related to undesirable impacts. A wide variety of thresholds are potentially related to water availability and scarcity. Scarcity can occur because of the country's own water use, and that is potentially intensified by upstream water use. In general, increased water scarcity escalates the reliance on shared water resources, which increases interdependencies between riparian states. In this paper the upstream dependencies of global transboundary river basins are examined at the scale of sub-basin areas. We aim to assess how upstream water withdrawals cause changes in the scarcity categories, such that crossing thresholds is interpreted in terms of downstream dependency on upstream water availability. The thresholds are defined for different types of water availability on which a sub-basin relies: - reliable local runoff (available even in a dry year), - less reliable local water (available in the wet year), - reliable dry year inflows from possible upstream area, and - less reliable wet year inflows from upstream. Possible upstream withdrawals reduce available water downstream, influencing the latter two water availabilities. Upstream dependencies have then been categorized by comparing a sub-basin's scarcity category across different water availability types. When population (or water consumption) grows, the sub-basin satisfies its needs using less reliable water. Thus, the factors affecting the type of water availability being used are different not only for each type of dependency category, but also possibly for every sub- basin. Our results show that, in the case of stress (impacts from high use of water), in 104 (12%) sub- basins out of

  8. Time cycle calculation procedure for the special crew during the mining mobile machine complex operation

    International Nuclear Information System (INIS)

    Shmurygin, V; Lukyanov, V; Maslovsky, A

    2015-01-01

    The relevance of the research is specified by the necessity to optimize the delft mobile tunneling equipment operation. Target of the research is tunneling time cycle justification for the special crew during the mining mobile machine complex operation. Methods of the research included the consideration of operation organization schemes in the drifting face and effective use of the mobile equipment during mine exploratory working operations. Time cycle calculation procedures for major processes have been considered. This has been done for the special crew during the mobile machine complex operations for several working faces and various organization schemes

  9. Valuating Indonesian upstream oil management scenario through system dynamics modelling

    Science.gov (United States)

    Ketut Gunarta, I.; Putri, F. A.

    2018-04-01

    Under the existing regulation in Constitution Number 22 Year 2001 (UU No 22 Tahun 2001), Production Sharing Contract (PSC) continues to be the scenario in conducting oil and gas upstream mining activities as the previous regulation (UU No. 8 Tahun 1971). Because of the high costs and risks in upstream mining activities, the contractors are dominated by foreign companies, meanwhile National Oil Company (NOC) doesn’t act much. The domination of foreign contractor companies also warned Indonesia in several issues addressing to energy independence and energy security. Therefore, to achieve the goals of energy which is independence and security, there need to be a revision in upstream oil activities regulating scenario. The scenarios will be comparing the current scenario, which is PSC, with the “full concession” scenario for National Oil Company (NOC) in managing oil upstream mining activities. Both scenario will be modelled using System Dynamics methodology and assessed furthermore using financial valuation method of income approach. Under the 2 scenarios, the author will compare which scenario is better for upstream oil management in reaching the goals mentioned before and more profitable in financial aspect. From the simulation, it is gathered that concession scenario offers better option than PSC in reaching energy independence and energy security.

  10. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  11. Toward Cultural Policy Studies on Mobility: Reflections on a Study of the Hong Kong Working Holiday Scheme

    Directory of Open Access Journals (Sweden)

    Louis Ho

    2017-05-01

    Full Text Available Cultural policy is predominantly, and practically, considered the sum of a government’s activities with respect to the arts, humanities and heritage. Thus, cultural policy encompasses a much broader range of activities than was traditionally associated with an arts policy. Critical cultural policy studies, then, sees a distinction between ‘explicit’ cultural policies that are manifestly labelled as ‘cultural’, and ‘implicit’ cultural policies that are not labelled as such, but that work to shape cultural experiences. This article considers this explicit/implicit cultural policy distinction through John Urry’s idea of ‘social as mobility’, suggesting that some public policies regarding mobility (such as immigration, international trade and labour policy have led to specific cultural consequences and therefore qualify as implicit cultural policy. Using Hong Kong’s working holiday scheme as a case study, this article explores how an economic policy on temporary immigrant labour involves a deliberate cultural agenda as well as ‘unintentional’ cultural consequences and problematises the fact that cultural policy studies are largely framed by the idea of ‘social as society’.

  12. A Novel Criterion for Optimum MultilevelCoding Systems in Mobile Fading Channels

    Institute of Scientific and Technical Information of China (English)

    YUAN Dongfeng; WANG Chengxiang; YAO Qi; CAO Zhigang

    2001-01-01

    A novel criterion that is "capac-ity rule" and "mapping rule" for the design of op-timum MLC scheme over mobile fading channels isproposed.According to this theory,the performanceof multilevel coding with multistage decoding schemes(MLC/MSD) in mobile fading channels is investi-gated,in which BCH codes are chosen as componentcodes,and three mapping strategies with 8ASK mod-ulation are used.Numerical results indicate that whencode rates of component codes in MLC scheme are de-signed based on "capacity rule",the performance ofthe system with block partitioning (BP) is optimumfor Rayleigh fading channels,while the performance ofthe system with Ungerboeck partioning (UP) is bestfor AWGN channels.

  13. A privacy authentication scheme based on cloud for medical environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn

    2014-11-01

    With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.

  14. Inlet effect induced ''upstream'' critical heat flux in smooth tubes

    International Nuclear Information System (INIS)

    Kitto, J.B. Jr.

    1986-01-01

    An unusual form of ''upstream'' critical heat flux (CHF) has been observed and directly linked to the inlet flow pattern during an experimental study of high pressure (17 - 20 MPa) water flowing through a vertical 38.1 mm ID smooth bore tube with uniform axial and nonuniform circumferential heating. These upstream CHF data were characterized by temperature excursions which initially occurred at a relatively fixed axial location in the middle of the test section while the outlet and inlet heated lengths experienced no change. A rifled tube inlet flow conditioner could be substituted for a smooth tube section to generate the desired swirling inlet flow pattern. The upstream CHF data were found to match data from a uniformly heated smooth bore tube when the comparison was made using the peak local heat flux. The mechanism proposed to account for the upstream CHF observations involves the destructive interference between the decaying swirl flow and the secondary circumferential liquid flow field resulting from the one-sided heating

  15. The LHCb Upstream Tracker Project

    CERN Document Server

    Steinkamp, Olaf

    2015-01-01

    The LHCb detector performs searches for New Physics in CP-violating observables and rare heavy-quark decays at the LHC. A comprehensive upgrade is planned for the long shutdown of the LHC in 2018/19. A goal of this upgrade is to abolish hardware triggers and read out the full detector at 40 MHz. This requires to replace the existing TT station upstream of the LHCb magnet by a new silicon micro-strip detector, the Upstream Tracker (UT). The UT will have a new front-end chip compatible with 40 MHz readout, silicon sensors with improved radiation hardness, finer readout granularity, and improved acceptance coverage at small polar angles. The outer region of each detection layer will be covered by p-in-n sensors with 10 cm long strips and a pitch of about 180 mum, while n-in-p sensors with half the pitch and strip length will be employed in the regions of highest particle density close to the beam pipe. The innermost sensors will have a circular cutout to optimize the forward acceptance. The front-end chip is bei...

  16. Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Jung-Shyr Wu

    2012-01-01

    Full Text Available CAC (Call Admission Control plays a significant role in providing QoS (Quality of Service in mobile wireless networks. In addition to much research that focuses on modified Mobile IP to get better efficient handover performance, CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. In this paper, we propose a CAC scheme which incorporates multiple traffic types and adjusts the admission threshold dynamically using fuzzy control logic to achieve better usage of resources. The method can provide QoS in Mobile IPv6 networks with few modifications on MAP (Mobility Anchor Point functionality and slight change in BU (Binding Update message formats. According to the simulation results, the proposed scheme presents good performance of voice and video traffic at the expenses of poor performance on data traffic. It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.

  17. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Danyang Qin

    2016-01-01

    Full Text Available Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.

  18. Multi-User Interference Cancellation Scheme(s) for Muliple Carrier Frequency Offset Compensation in Uplink OFDMA

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Carvalho, Elisabeth De; Prasad, Ramjee

    2006-01-01

    (ICI) and degrade the system performance considerably. In this paper, we propose a novel Multi-User Interference (MUI) cancellation scheme for uplink OFDMA, which utilizes multiple OFDM-demodulators architecture to correct and then compensate the negative effects of multiple CFOs at the receiver's side......We consider the uplink of an Orthogonal Frequency Division Multiple Access (OFDMA)-based system, where each Mobile Station (MS) experiences a different Carrier Frequency Offset (CFO). Uncorrected CFO destroy the orthogonality among subcarriers, which could cause severe Inter-Carrier Interference...

  19. PERFORMANCE ANALYSIS OF AI BASED QOS SCHEDULER FOR MOBILE WIMAX

    Directory of Open Access Journals (Sweden)

    D. David Neels Pon Kumar

    2012-09-01

    Full Text Available Interest in broadband wireless access (BWA has been growing due to increased user mobility and the need for data access at all times. IEEE 802.16e based WiMAX networks promise the best available quality of experience for mobile data service users. WiMAX networks incorporate several Quality of Service (QoS mechanisms at the Media Access Control (MAC level for guaranteed services for multimedia viz. data, voice and video. The problem of assuring QoS is how to allocate available resources among users to meet the QoS criteria such as delay, delay jitter, fairness and throughput requirements. IEEE standard does not include a standard scheduling mechanism and leaves it for various implementer differentiations. Although a lot of the real-time and non real-time packet scheduling schemes has been proposed, it needs to be modified to apply to Mobile WiMAX system that supports five kinds of service classes. In this paper, we propose a novel Priority based Scheduling scheme that uses Artificial Intelligence to support various services by considering the QoS constraints of each class. The simulation results show that slow mobility does not affect the performances and faster mobility and the increment in users beyond a particular load have their say in defining average throughput, average per user throughput, fairness index, average end to end delay and average delay jitter. Nevertheless the results are encouraging that the proposed scheme provides QoS support for each class efficiently.

  20. SC-FDMA for mobile communications

    CERN Document Server

    Abd El-Samie, Fathi E

    2013-01-01

    SC-FDMA for Mobile Communications examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Explaining this rapidly evolving system for mobile communications, it describes its advantages and limitations and outlines possible solutions for addressing its current limitations. The book explores the emerging trend of cooperative communication with SC-FDMA and how it can improve the physical layer security. It considers the design of distributed coding schemes and protocols for wireless relay networks where users cooperate to send their data to the destination. Supplying you with the re

  1. Upstream waves simultaneously observed by ISEE and UKS

    International Nuclear Information System (INIS)

    Russell, C.T.; Luhmann, J.G.; Elphic, R.C.; Southwood, D.J.; Smith, M.F.; Johnstone, A.D.

    1987-01-01

    Measurements obtained in the solar wind by ISEE-2 and the United Kingdom Subsatellite (UKS) have been examined for observations of upstream waves. These data reveal that the waves in the foreshock region are enhanced at all frequencies from at least 0.003 Hz to 0.5 Hz. The wave spectra generally have a spectral peak, but this peak is usually broad and the peak frequency depends on the position of the spacecraft. Generally, the spectra seen at the two spacecraft are most similar at high frequencies and least similar at low frequencies. The geometry of the interaction is displayed in the plane containing the magnetic field, the solar wind velocity, and the spacecraft location. However, this coordinate system does not order all the observed wave properties. It does not clearly explain or order the handedness of the waves, or their direction of propagation. It is clear that the upstream region is inherently three-dimensional. The position-dependent nature of the upstream waves indicates that comparisons between ground-based measurements and in-situ observations must be undertaken with some caution

  2. Meeting the challenge : capturing the upstream

    International Nuclear Information System (INIS)

    Bogle, E.W.

    1998-01-01

    The challenge facing the exploration and production sector of the petroleum industry to capture and hold onto the upstream was the main focus of this paper. The exploration and production (E and P) business was described as being highly complex, characterized by constant change and increasing competition. Some of the dynamic changes which have occurred in the Western Canada Basin (WCB) during the last five years and how they relate to the international playing field were reviewed. Significant changes to the production ranking profile as a result of acquisitions, and basin reserve endowment and maturity are the two major factors affecting current and future dynamics of upstream WCB E and P activity. Competitive pressures, contractor relationships, infrastructure access and controls, environmental issues are some of the other factors. Taking these factors into account, Talisman Energy Inc. has used its growth in the WCB to leverage its international activities, diversifying to less mature, but proven hydrocarbon basins. The company's international exploration strategy is designed to be adaptive and flexible and is guided by focus on a limited number of core areas with proven source rock and existing production, achievement of a set production level within a five-year time frame, ensuring strong relationships with host governments and partners, and selecting areas where a multiple of opportunity types are available. In general, for any upstream company it is important to recognize that the more predictable traditional order has given way to a market-driven environment where the rules change almost daily, and success depends on the ability to adapt to change.14 figs

  3. Pemodelan dan Verifikasi Formal Pengaruh Mobility pattern Terhadap Handoff Latency pada Jaringan WiMAX

    Directory of Open Access Journals (Sweden)

    I Nym Saputra Wahyu Wijaya

    2016-01-01

    Full Text Available In order to decrease handoff latency and increase the successful of HHO conventional scheme, a development of handover scheme is done in standard protocol WiMAX IEEE 802.16e by adding mobility pattern. The superiority of handover scheme with mobility pattern can reduce handoff latency up to 50%, mean while the weakness of this scheme is a wrong act in determining target base station are often happen. Simulation can not showing the cause of that error. So, we do formal verification in to hard handover model with mobility pattern.             In this research, behaviour system is modeled with continuous-time Markov chain (CTMC. The model is foccused to aproximating the influence of mobility pattern in to handoff latency from WiMAX hard handover mechanism. In order to set up a series markov chain models handover system can follow steps, such as: represents the state space, give a number in all transitions, generate the rate transition matrix (infinitesimal generator.             Probabilistic model checking in the research are using quantitative properties and qualitative properties. Formal verification concerning properties has relation with handover in WiMAX network showing that 70% from mobile station which doing scanning with mobility pattern are success doing handover. 24% of them doing scanning conventional as a result of wrongness in act determining target base station, so handoff latency which is pictured will bigger than a system that is only use conventional scanning method.

  4. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo

    2015-01-01

    With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks.

  5. An Unexpected Location of the Arginine Catabolic Mobile Element (ACME) in a USA300-Related MRSA Strain

    DEFF Research Database (Denmark)

    Damkjær Bartels, Mette; Hansen, Lars H.; Boye, Kit

    2011-01-01

    In methicillin resistant Staphylococcus aureus (MRSA), the arginine catabolic mobile element (ACME) was initially described in USA300 (t008-ST8) where it is located downstream of the staphylococcal cassette chromosome mec (SCCmec). A common health-care associated MRSA in Copenhagen, Denmark (t024......-ST8) is clonally related to USA300 and is frequently PCR positive for the ACME specific arcA-gene. This study is the first to describe an ACME element upstream of the SCCmec in MRSA. By traditional SCCmec typing schemes, the SCCmec of t024-ST8 strain M1 carries SCCmec IVa, but full sequencing...... of SCCmec, M1 had two new DR between the orfX gene and the J3 region of the SCCmec. The region between the orfX DR (DR1) and DR2 contained the ccrAB4 genes. An ACME II-like element was located between DR2 and DR3. The entire 26,468 bp sequence between DR1 and DR3 was highly similar to parts of the ACME...

  6. Spatial distribution of upstream magnetospheric ≥50 keV ions

    Directory of Open Access Journals (Sweden)

    G. C. Anagnostopoulos

    2000-01-01

    Full Text Available We present for the first time a statistical study of \\geq50 keV ion events of a magnetospheric origin upstream from Earth's bow shock. The statistical analysis of the 50-220 keV ion events observed by the IMP-8 spacecraft shows: (1 a dawn-dusk asymmetry in ion distributions, with most events and lower intensities upstream from the quasi-parallel pre-dawn side (4 LT-6 LT of the bow shock, (2 highest ion fluxes upstream from the nose/dusk side of the bow shock under an almost radial interplanetary magnetic field (IMF configuration, and (3 a positive correlation of the ion intensities with the solar wind speed and the index of geomagnetic index Kp, with an average solar wind speed as high as 620 km s-1 and values of the index Kp > 2. The statistical results are consistent with (1 preferential leakage of ~50 keV magnetospheric ions from the dusk magnetopause, (2 nearly scatter free motion of ~50 keV ions within the magnetosheath, and (3 final escape of magnetospheric ions from the quasi-parallel dawn side of the bow shock. An additional statistical analysis of higher energy (290-500 keV upstream ion events also shows a dawn-dusk asymmetry in the occurrence frequency of these events, with the occurrence frequency ranging between ~16%-~34% in the upstream region.Key words. Interplanetary physics (energetic particles; planetary bow shocks

  7. Spatial distribution of upstream magnetospheric ≥50 keV ions

    Directory of Open Access Journals (Sweden)

    G. Kaliabetsos

    Full Text Available We present for the first time a statistical study of geq50 keV ion events of a magnetospheric origin upstream from Earth's bow shock. The statistical analysis of the 50-220 keV ion events observed by the IMP-8 spacecraft shows: (1 a dawn-dusk asymmetry in ion distributions, with most events and lower intensities upstream from the quasi-parallel pre-dawn side (4 LT-6 LT of the bow shock, (2 highest ion fluxes upstream from the nose/dusk side of the bow shock under an almost radial interplanetary magnetic field (IMF configuration, and (3 a positive correlation of the ion intensities with the solar wind speed and the index of geomagnetic index Kp, with an average solar wind speed as high as 620 km s-1 and values of the index Kp > 2. The statistical results are consistent with (1 preferential leakage of ~50 keV magnetospheric ions from the dusk magnetopause, (2 nearly scatter free motion of ~50 keV ions within the magnetosheath, and (3 final escape of magnetospheric ions from the quasi-parallel dawn side of the bow shock. An additional statistical analysis of higher energy (290-500 keV upstream ion events also shows a dawn-dusk asymmetry in the occurrence frequency of these events, with the occurrence frequency ranging between ~16%-~34% in the upstream region.Key words. Interplanetary physics (energetic particles; planetary bow shocks

  8. Urban search mobile platform modeling in hindered access conditions

    Science.gov (United States)

    Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.

    2018-05-01

    The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.

  9. Social Class, Family Background and Intergenerational Mobility

    DEFF Research Database (Denmark)

    D. Munk, Martin; McIntosh, James

    This research examines the various approaches taken by economists and sociologists for analyzing intergenerational mobility. Social mobility models based on social classes arising from an occupational classification scheme are analyzed. A test for the statistical validity of classification schemes...... is proposed and tested using Danish sample survey data that was first collected in 1976 and augmented in 2000. This is referred to as a homogeneity test and is a likelihood ratio test of a set of linear restrictions which define social classes. For Denmark it is shown that this test fails for an Erikson......-Goldthorpe classification system, raising doubts about the statistical validity of occupational classification systems in general. We also estimate regression models of occupational earnings, household earnings, and educational attainment using family background variables as covariates controlling for unobservables...

  10. Social Class, Family Background and Intergenerational Mobility

    DEFF Research Database (Denmark)

    D. Munk, Martin; McIntosh, James

    This research examines the various approaches taken by economists and sociologists for analyzing intergenerational mobility. Social mobility models based on social classes arising from an occupational classi.cation scheme are analyzed. A test for the statistical validity of classi.cation schemes...... is proposed and tested using Danish sample survey data that was .rst collected in 1976 and augmented in 2000. This is referred to as a homogeneity test and is a likelihood ratio test of a set of linear restrictions which define social classes. For Denmark it is shown that this test fails for an Erikson......-Goldthorpe classi.cation system, raising doubts about the statistical validity of occupational classication systems in general. We also estimate regression models of occupational earnings, household earnings, and educational attainment using family background variables as covariates controlling for unobservables...

  11. Analysis of Blocking Rate and Bandwidth Usage of Mobile IPTV Services in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingfu Li

    2014-01-01

    Full Text Available Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  12. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Science.gov (United States)

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  13. STUDY OF PRESERVING PRIVACY IN MOBILE SOCIAL NETWORK BY PERSONALIZATION OF FINE GRAINED SPAM FILTERING SCHEME

    OpenAIRE

    S. B. GHATTE , A. B. RAJMANE

    2018-01-01

    Mobile social-networking is a social networking where people with similar interests connect to their social communities with a mobile device. Mobile users share various types of information, such as newsletters, advertisements, experiences, interests, opinions and personal content through their mobile devices. Because of Mobile social network (MSN) it is possible for mobile users to share information in the near area and makes their cyber–physical–social interaction easier.

  14. LHCb upstream tracker

    CERN Multimedia

    Artuso, Marina

    2016-01-01

    The detector for the LHCb upgrade is designed for 40MHz readout, allowing the experiment to run at an instantaneous luminosity of 2x10^33 cm$^2$s$^-1$. The upgrade of the tracker subsystem in front of the dipole magnet, the Upstream Tracker, is crucial for charged track reconstruction and fast trigger decisions based on a tracking algorithm involving also vertex detector information. The detector consists of 4 planes with a total area of about 8.5m$^2$, made of single sided silicon strip sensors read-out by a novel custom-made ASIC (SALT). Details on the performance of prototype sensors, front-end electronics, near-detector electronics and mechanical components are presented.

  15. Conditions for acceptance and usage of mobile payment procedures

    OpenAIRE

    Pousttchi, Key

    2003-01-01

    Mobile payment (MP) is crucial for, but not limited to mobile commerce. The key to mobile payment acceptance is in the hands of customers. In this paper we examine the conditions for acceptance and actual usage of MP procedures by the customer. We identify essential conditions which belong to the categories costs, security and convenience. Different preferences lead to an individual set of essential conditions for any single user. We propose a scheme for their representation and comparison an...

  16. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    OpenAIRE

    Jeong, Young-Sik; Lee, Jae Dong; Lee, Jeong-Bae; Jung, Jai-Jin; Park, Jong Hyuk

    2014-01-01

    Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks repre...

  17. A concentration correction scheme for Lagrangian particle model and its application in street canyon air dispersion modelling

    Energy Technology Data Exchange (ETDEWEB)

    Jiyang Xia [Shanghai Jiao Tong University, Shanghai (China). Department of Engineering Mechanics; Leung, D.Y.C. [The University of Hong Kong (Hong Kong). Department of Mechanical Engineering

    2001-07-01

    Pollutant dispersion in street canyons with various configurations was simulated by discharging a large number of particles into the computation domain after developing a time-dependent wind field. Trajectory of the released particles was predicted using a Lagrangian particle model developed in an earlier study. A concentration correction scheme, based on the concept of 'visibility', was adopted for the Lagrangian particle model to correct the calculated pollutant concentration field in street canyons. The corrected concentrations compared favourably with those from wind tunnel experiments and a linear relationship between the computed concentrations and wind tunnel data were found. The developed model was then applied to four simulations to test for the suitability of the correction scheme and to study pollutant distribution in street canyons with different configurations. For those cases with obstacles presence in the computation domain, the correction scheme gives more reasonable results compared with the one without using it. Different flow regimes are observed in the street canyons, which depend on building configurations. A counter-clockwise rotating vortex may appear in a two-building case with wind flow from left to right, causing lower pollutant concentration at the leeward side of upstream building and higher concentration at the windward side of downstream building. On the other hand, a stable clockwise rotating vortex is formed in the street canyon with multiple identical buildings, resulting in poor natural ventilation in the street canyon. Moreover, particles emitted in the downstream canyon formed by buildings with large height-to-width ratios will be transported to upstream canyons. (author)

  18. Inventories and upstream gasoline price dynamics

    NARCIS (Netherlands)

    Kuper, Gerard H.

    This paper sheds new light on the asymmetric dynamics in upstream U.S. gasoline prices. The model is based on Pindyck's inventory model of commodity price dynamics. We show that asymmetry in gasoline price dynamics is caused by changes in the net marginal convenience yield: higher costs of marketing

  19. Upstream-downstream cooperation approach in Guanting Reservoir watershed.

    Science.gov (United States)

    Yang, Zhi-Feng; Zhang, Wen-Guo

    2005-01-01

    A case study is introduced and discussed concerning water dispute of misuse and pollution between up- and down-stream parts. The relations between water usage and local industrial structures are analyzed. Results show it is important to change industrial structures of the target region along with controlling water pollution by technical and engineering methods. Three manners of upstream-downstream cooperation are presented and discussed based on the actual conditions of Guangting Reservoir watershed. Two typical scenarios are supposed and studied along with the local plan on water resources development. The best solution for this cooperation presents a good way to help the upstream developing in a new pattern of eco-economy.

  20. Trellis-coded CPM for satellite-based mobile communications

    Science.gov (United States)

    Abrishamkar, Farrokh; Biglieri, Ezio

    1988-01-01

    Digital transmission for satellite-based land mobile communications is discussed. To satisfy the power and bandwidth limitations imposed on such systems, a combination of trellis coding and continuous-phase modulated signals are considered. Some schemes based on this idea are presented, and their performance is analyzed by computer simulation. The results obtained show that a scheme based on directional detection and Viterbi decoding appears promising for practical applications.

  1. Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI or identity-based cryptosystem (IBC have been proposed in the literature; however, no certificateless short sequential (or serial multisignature (CL-SSMS or short broadcast (or parallel multisignature (CL-SBMS schemes have been proposed. In this paper, we propose two such new CL-SSMS and CL-SBMS schemes based on elliptic curve bilinear pairing. Like any certificateless public key cryptosystem (CL-PKC, the proposed schemes are free from the public key certificate management burden and the private key escrow problem as found in PKI- and IBC-based cryptosystems, respectively. In addition, the requirements of the expected security level and the fixed length signature with constant verification time have been achieved in our schemes. The schemes are communication efficient as the length of the multisignature is equivalent to a single elliptic curve point and thus become the shortest possible multisignature scheme. The proposed schemes are then suitable for communication systems having resource constrained devices such as PDAs, mobile phones, RFID chips, and sensors where the communication bandwidth, battery life, computing power and storage space are limited.

  2. Flexible Transmission Scheme for 4G Wireless Systems with Multiple Antennas

    Directory of Open Access Journals (Sweden)

    Horlin François

    2005-01-01

    Full Text Available New air interfaces are currently being developed to meet the high requirements of the emerging wireless communication systems. In this context, the combinations of the multicarrier (MC and spread-spectrum (SS technologies are promising candidates. In this paper, we propose a generic transmission scheme that allows to instantiate all the combinations of orthogonal frequency-division multiplexing (OFDM and cyclic-prefixed single-carrier (SC modulations with direct-sequence code-division multiple access (DS-CDMA. The generic transmission scheme is extended to integrate the space-division multiplexing (SDM and the orthogonal space-time block coding (STBC. Based on a generalized matrix model, the linear frequency-domain minimum mean square error (MMSE joint detector is derived. A mode selection strategy for up- and downlink is advised that efficiently trades off the cost of the mobile terminal and the achieved performance of a high-mobility cellular system. It is demonstrated that an adaptive transceiver that supports the proposed communication modes is necessary to track the changing communication conditions.

  3. Performance Evaluation of Concurrent Multipath Video Streaming in Multihomed Mobile Networks

    Directory of Open Access Journals (Sweden)

    James Nightingale

    2013-01-01

    Full Text Available High-quality real-time video streaming to users in mobile networks is challenging due to the dynamically changing nature of the network paths, particularly the limited bandwidth and varying end-to-end delay. In this paper, we empirically investigate the performance of multipath streaming in the context of multihomed mobile networks. Existing schemes that make use of the aggregated bandwidth of multiple paths can overcome bandwidth limitations on a single path but suffer an efficiency penalty caused by retransmission of lost packets in reliable transport schemes or path switching overheads in unreliable transport schemes. This work focuses on the evaluation of schemes to permit concurrent use of multiple paths to deliver video streams. A comprehensive streaming framework for concurrent multipath video streaming is proposed and experimentally evaluated, using current state-of-the-art H.264 Scalable Video Coding (H.264/SVC and the next generation High Efficiency Video Coding (HEVC standards. It provides a valuable insight into the benefit of using such schemes in conjunction with encoder specific packet prioritisation mechanisms for quality-aware packet scheduling and scalable streaming. The remaining obstacles to deployment of concurrent multipath schemes are identified, and the challenges in realising HEVC based concurrent multipath streaming are highlighted.

  4. A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment

    Science.gov (United States)

    Lee, Kijeong; Tolentino, Randy S.; Park, Gil-Cheol; Kim, Yong-Tae

    Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information. Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.

  5. Effects of Distributed Generation on Overcurrent Relay Coordination and an Adaptive Protection Scheme

    Science.gov (United States)

    Ilik, Semih C.; Arsoy, Aysen B.

    2017-07-01

    Integration of distributed generation (DG) such as renewable energy sources to electrical network becomes more prevalent in recent years. Grid connection of DG has effects on load flow directions, voltage profile, short circuit power and especially protection selectivity. Applying traditional overcurrent protection scheme is inconvenient when system reliability and sustainability are considered. If a fault happens in DG connected network, short circuit contribution of DG, creates additional branch element feeding the fault current; compels to consider directional overcurrent (OC) protection scheme. Protection coordination might get lost for changing working conditions when DG sources are connected. Directional overcurrent relay parameters are determined for downstream and upstream relays when different combinations of DG connected singular or plural, on radial test system. With the help of proposed flow chart, relay parameters are updated and coordination between relays kept sustained for different working conditions in DigSILENT PowerFactory program.

  6. Emissions trading in the transport sector. Feasible approach for an upstream model. Executive summary; Emissionshandel im Verkehr. Ansaetze fuer einen moeglichen Up-Stream-Handel im Verkehr. Endbericht

    Energy Technology Data Exchange (ETDEWEB)

    Bertenrath, Roman; Liebig, Lars [Koeln Univ. (Germany). Finanzwissenschaftliches Forschungsinstitut; Betz, Regina; Rogge, Karoline; Schade, Wolfgang [Fraunhofer-Institut fuer Systemtechnik und Innovationsforschung (ISI), Karlsruhe (Germany); Duennebeil, Frank; Lambrecht, Udo [ifeu-Institut fuer Energie- und Umweltforschung GmbH, Heidelberg (Germany); Bergmann, Heidi

    2005-11-15

    In July, 2003, FiFo Koeln (Cologne Centre for Public Economics) was mandated by the German Federal Environmental Agency (UBA) with the examination of the UFOPLAN scheme 'Emissions Trading System for the Transport Sector - Development of a possible Trading Approach'. The main task of this study was the development of a concrete emissions trading approach for the transport sector, which triggers off a compulsory holding of emissions certificates at the beginning of the energy supply chain (upstream approach). The main focus was rather put on the practical options of the implementation of an upstream approach in the transport sector and its specific problems. The transaction costs of a trading system in the transport sector had to be kept at a minimum level. The upsteam approach discussed in his study seems to be more adequate to include further carbon dioxide emissions of other sectors than the EU downstream model. This can mainly be attributed to the amount and nature of the respective transaction costs. In Germany allocative failure in fuel taxation between diesel and petrol can be diminished regardless of the prices for CO{sub 2}. Emissions trading therefore leads to structural changes. An upstream approach has only indirect effects on the motorcar industry and refiners. Therefore, technical CO{sub 2} reduction can primarily be realised via an increased consumer demand for ore fuel-efficient vehicles, new propulsion technology or alternative fuels based on renewable energies. In the case of an open trading system the amount of transport emissions was estimated that actually could be reduced to be relatively small. The authors of the contribution under consideration are not convinced that the full potential of existing adaptation options in the transport sector can be tapped by an open emissions trading. The transport sector will cope with additional CO{sub 2} costs without tapping the potential of relatively cheap adaptation options. Also at closed

  7. Employment and Training Schemes for Rural Youth: Learning from Experience.

    Science.gov (United States)

    Phan-Thuy, N.

    1985-01-01

    Over the past two decades a number of African and Asian governments have experimented with various types of youth mobilization or employment and training schemes in trying to cope with rural youth unemployment. A critical appraisal is made of some of these in an attempt to establish criteria that productive employment programs for rural youth…

  8. Russian upstream joint ventures logging progress

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that Occidental Petroleum Corp. has begun exporting oil from Russia as part of an enhanced recovery joint venture in western Siberia. Oxy holds a 50% interest in the joint venture company, Vanyoganneft, and will market the oil. In other activity, two Canadian companies are marking progress with Russian upstream joint ventures

  9. Sparse Localization with a Mobile Beacon Based on LU Decomposition in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunhui Zhao

    2015-09-01

    Full Text Available Node localization is the core in wireless sensor network. It can be solved by powerful beacons, which are equipped with global positioning system devices to know their location information. In this article, we present a novel sparse localization approach with a mobile beacon based on LU decomposition. Our scheme firstly translates node localization problem into a 1-sparse vector recovery problem by establishing sparse localization model. Then, LU decomposition pre-processing is adopted to solve the problem that measurement matrix does not meet the re¬stricted isometry property. Later, the 1-sparse vector can be exactly recovered by compressive sensing. Finally, as the 1-sparse vector is approximate sparse, weighted Cen¬troid scheme is introduced to accurately locate the node. Simulation and analysis show that our scheme has better localization performance and lower requirement for the mobile beacon than MAP+GC, MAP-M, and MAP-MN schemes. In addition, the obstacles and DOI have little effect on the novel scheme, and it has great localization performance under low SNR, thus, the scheme proposed is robust.

  10. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  11. Discretization of convection-diffusion equations with finite-difference scheme derived from simplified analytical solutions

    International Nuclear Information System (INIS)

    Kriventsev, Vladimir

    2000-09-01

    Most of thermal hydraulic processes in nuclear engineering can be described by general convection-diffusion equations that are often can be simulated numerically with finite-difference method (FDM). An effective scheme for finite-difference discretization of such equations is presented in this report. The derivation of this scheme is based on analytical solutions of a simplified one-dimensional equation written for every control volume of the finite-difference mesh. These analytical solutions are constructed using linearized representations of both diffusion coefficient and source term. As a result, the Efficient Finite-Differencing (EFD) scheme makes it possible to significantly improve the accuracy of numerical method even using mesh systems with fewer grid nodes that, in turn, allows to speed-up numerical simulation. EFD has been carefully verified on the series of sample problems for which either analytical or very precise numerical solutions can be found. EFD has been compared with other popular FDM schemes including novel, accurate (as well as sophisticated) methods. Among the methods compared were well-known central difference scheme, upwind scheme, exponential differencing and hybrid schemes of Spalding. Also, newly developed finite-difference schemes, such as the the quadratic upstream (QUICK) scheme of Leonard, the locally analytic differencing (LOAD) scheme of Wong and Raithby, the flux-spline scheme proposed by Varejago and Patankar as well as the latest LENS discretization of Sakai have been compared. Detailed results of this comparison are given in this report. These tests have shown a high efficiency of the EFD scheme. For most of sample problems considered EFD has demonstrated the numerical error that appeared to be in orders of magnitude lower than that of other discretization methods. Or, in other words, EFD has predicted numerical solution with the same given numerical error but using much fewer grid nodes. In this report, the detailed

  12. Current Mobile Payment Procedures on the German Market from the View of Customer Requirements

    OpenAIRE

    Pousttchi, Key; Zenker, M.

    2003-01-01

    The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the most relevant acceptance criteria. The outcome of the paper is an evaluation scheme containing the covered payment scenarios, important main criteria (security, costs and convenience) and additional functionality requirements for each MP procedure. The scheme is based on empirical results and can assess a given MP proce...

  13. Lattice Based Mix Network for Location Privacy in Mobile System

    Directory of Open Access Journals (Sweden)

    Kunwar Singh

    2015-01-01

    Full Text Available In 1981, David Chaum proposed a cryptographic primitive for privacy called mix network (Mixnet. A mixnet is cryptographic construction that establishes anonymous communication channel through a set of servers. In 2004, Golle et al. proposed a new cryptographic primitive called universal reencryption which takes the input as encrypted messages under the public key of the recipients not the public key of the universal mixnet. In Eurocrypt 2010, Gentry, Halevi, and Vaikunthanathan presented a cryptosystem which is an additive homomorphic and a multiplicative homomorphic for only one multiplication. In MIST 2013, Singh et al. presented a lattice based universal reencryption scheme under learning with error (LWE assumption. In this paper, we have improved Singh et al.’s scheme using Fairbrother’s idea. LWE is a lattice hard problem for which till now there is no polynomial time quantum algorithm. Wiangsripanawan et al. proposed a protocol for location privacy in mobile system using universal reencryption whose security is reducible to Decision Diffie-Hellman assumption. Once quantum computer becomes a reality, universal reencryption can be broken in polynomial time by Shor’s algorithm. In postquantum cryptography, our scheme can replace universal reencryption scheme used in Wiangsripanawan et al. scheme for location privacy in mobile system.

  14. Prediction-based association control scheme in dense femtocell networks

    Science.gov (United States)

    Pham, Ngoc-Thai; Huynh, Thong; Hwang, Won-Joo; You, Ilsun; Choo, Kim-Kwang Raymond

    2017-01-01

    The deployment of large number of femtocell base stations allows us to extend the coverage and efficiently utilize resources in a low cost manner. However, the small cell size of femtocell networks can result in frequent handovers to the mobile user, and consequently throughput degradation. Thus, in this paper, we propose predictive association control schemes to improve the system’s effective throughput. Our design focuses on reducing handover frequency without impacting on throughput. The proposed schemes determine handover decisions that contribute most to the network throughput and are proper for distributed implementations. The simulation results show significant gains compared with existing methods in terms of handover frequency and network throughput perspective. PMID:28328992

  15. Efficient Mobile Client Caching Supporting Transaction Semantics

    Directory of Open Access Journals (Sweden)

    IlYoung Chung

    2000-05-01

    Full Text Available In mobile client-server database systems, caching of frequently accessed data is an important technique that will reduce the contention on the narrow bandwidth wireless channel. As the server in mobile environments may not have any information about the state of its clients' cache(stateless server, using broadcasting approach to transmit the updated data lists to numerous concurrent mobile clients is an attractive approach. In this paper, a caching policy is proposed to maintain cache consistency for mobile computers. The proposed protocol adopts asynchronous(non-periodic broadcasting as the cache invalidation scheme, and supports transaction semantics in mobile environments. With the asynchronous broadcasting approach, the proposed protocol can improve the throughput by reducing the abortion of transactions with low communication costs. We study the performance of the protocol by means of simulation experiments.

  16. An Interference Cancellation Scheme for High Reliability Based on MIMO Systems

    Directory of Open Access Journals (Sweden)

    Jae-Hyun Ro

    2018-03-01

    Full Text Available This article proposes a new interference cancellation scheme in a half-duplex based two-path relay system. In the conventional two-path relay system, inter-relay-interference (IRI which severely degrades the error performances at a destination occurs because a source and a relay transmit signals simultaneously at a specific time. The proposed scheme removes the IRI at a relay for higher signal-to-interference plus noise ratio (SINR to receive interference free signal at a destination, unlike the conventional relay system, which removes IRI at a destination. To handle the IRI, the proposed scheme uses multiple-input multiple-output (MIMO signal detection at the relays and it makes low-complexity signal processing at a destination which is a usually mobile user. At the relays, the proposed scheme uses the low-complexity QR decomposition-M algorithm (QRD-M to optimally remove the IRI. Also, for obtaining diversity gain, the proposed scheme uses cyclic delay diversity (CDD to transmit the signals at a source and the relays. In simulation results, the error performance for the proposed scheme is better when the distance between one relay and another relay is low unlike the conventional scheme because the QRD-M detects received signal in order of higher post signal-to-noise ratio (SNR.

  17. A Replica Detection Scheme Based on the Deviation in Distance Traveled Sliding Window for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Alekha Kumar Mishra

    2017-01-01

    Full Text Available Node replication attack possesses a high level of threat in wireless sensor networks (WSNs and it is severe when the sensors are mobile. A limited number of replica detection schemes in mobile WSNs (MWSNs have been reported till date, where most of them are centralized in nature. The centralized detection schemes use time-location claims and the base station (BS is solely responsible for detecting replica. Therefore, these schemes are prone to single point of failure. There is also additional communication overhead associated with sending time-location claims to the BS. A distributed detection mechanism is always a preferred solution to the above kind of problems due to significantly lower communication overhead than their counterparts. In this paper, we propose a distributed replica detection scheme for MWSNs. In this scheme, the deviation in the distance traveled by a node and its replica is recorded by the observer nodes. Every node is an observer node for some nodes in the network. Observers are responsible for maintaining a sliding window of recent time-distance broadcast of the nodes. A replica is detected by an observer based on the degree of violation computed from the deviations recorded using the time-distance sliding window. The analysis and simulation results show that the proposed scheme is able to achieve higher detection probability compared to distributed replica detection schemes such as Efficient Distributed Detection (EDD and Multi-Time-Location Storage and Diffusion (MTLSD.

  18. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  19. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  20. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  1. On-line soft sensing in upstream bioprocessing.

    Science.gov (United States)

    Randek, Judit; Mandenius, Carl-Fredrik

    2018-02-01

    This review provides an overview and a critical discussion of novel possibilities of applying soft sensors for on-line monitoring and control of industrial bioprocesses. Focus is on bio-product formation in the upstream process but also the integration with other parts of the process is addressed. The term soft sensor is used for the combination of analytical hardware data (from sensors, analytical devices, instruments and actuators) with mathematical models that create new real-time information about the process. In particular, the review assesses these possibilities from an industrial perspective, including sensor performance, information value and production economy. The capabilities of existing analytical on-line techniques are scrutinized in view of their usefulness in soft sensor setups and in relation to typical needs in bioprocessing in general. The review concludes with specific recommendations for further development of soft sensors for the monitoring and control of upstream bioprocessing.

  2. CERTIFICATE REVOCATION SCHEME BASED ON WEIGHTED VOTING GAME AND RATIONAL SECURE MULTIPARTY COMPUTING

    Directory of Open Access Journals (Sweden)

    N Aravinthan

    2017-03-01

    Full Text Available The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication. Moreover, malicious nodes present in MANET make use of this modification and can easily launch highly vulnerable attacks on the routing path of the network. Hence, Security issue such as removing misbehaving nodes is the primary issue in MANET. Effective certificate revocation scheme was introduced to identify and eliminate the node with malicious activities in the network based on the weighted voting game (ECR-WVG approach. In this approach, weights and quota were two factors, determined for an effective revocation of malicious nodes certificates. However, security during multiparty transmission was not taken into account in ECR-WVG. In Effective Certificate Revocation Scheme based on Weighted Voting Game and Rational Secure Multi-Party Computing (ECR-WVG-RSMPC method, rational secret sharing scheme is introduced along with ECR-WVG approach for securing multiparty transmission. Performance evaluation can be done between ECR-WVG and ECR-WVG-RSMPC in terms of false revocation, malicious node revocation, normalized time for revocation and revocation accuracy ratio.

  3. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  4. A New Adaptive Checkpointing Strategy for Mobile Computing

    Institute of Scientific and Technical Information of China (English)

    MENChaoguang; ZUODecheng; YANGXiaozong

    2005-01-01

    Adaptive checkpointing strategy is an efficient recovery scheme, which is suitable for mobile computing system. However, all existing adaptive checkpointing schemes are not correct to recover system when failure occurs in some special period. In this paper, the issues that will lead to system inconsistency are first discussed and then a new adaptive strategy that can recover system to correct consistent state is proposed. Our algorithm improves system recovery performance because only failure process needs rollback through logging.

  5. A Novel Loss Recovery and Tracking Scheme for Maneuvering Target in Hybrid WSNs.

    Science.gov (United States)

    Qian, Hanwang; Fu, Pengcheng; Li, Baoqing; Liu, Jianpo; Yuan, Xiaobing

    2018-01-25

    Tracking a mobile target, which aims to timely monitor the invasion of specific target, is one of the most prominent applications in wireless sensor networks (WSNs). Traditional tracking methods in WSNs only based on static sensor nodes (SNs) have several critical problems. For example, to void the loss of mobile target, many SNs must be active to track the target in all possible directions, resulting in excessive energy consumption. Additionally, when entering coverage holes in the monitoring area, the mobile target may be missing and then its state is unknown during this period. To tackle these problems, in this paper, a few mobile sensor nodes (MNs) are introduced to cooperate with SNs to form a hybrid WSN due to their stronger abilities and less constrained energy. Then, we propose a valid target tracking scheme for hybrid WSNs to dynamically schedule the MNs and SNs. Moreover, a novel loss recovery mechanism is proposed to find the lost target and recover the tracking with fewer SNs awakened. Furthermore, to improve the robustness and accuracy of the recovery mechanism, an adaptive unscented Kalman filter (AUKF) algorithm is raised to dynamically adjust the process noise covariance. Simulation results demonstrate that our tracking scheme for maneuvering target in hybrid WSNs can not only track the target effectively even if the target is lost but also maintain an excellent accuracy and robustness with fewer activated nodes.

  6. Large-eddy simulation/Reynolds-averaged Navier-Stokes hybrid schemes for high speed flows

    Science.gov (United States)

    Xiao, Xudong

    Three LES/RANS hybrid schemes have been proposed for the prediction of high speed separated flows. Each method couples the k-zeta (Enstrophy) BANS model with an LES subgrid scale one-equation model by using a blending function that is coordinate system independent. Two of these functions are based on turbulence dissipation length scale and grid size, while the third one has no explicit dependence on the grid. To implement the LES/RANS hybrid schemes, a new rescaling-reintroducing method is used to generate time-dependent turbulent inflow conditions. The hybrid schemes have been tested on a Mach 2.88 flow over 25 degree compression-expansion ramp and a Mach 2.79 flow over 20 degree compression ramp. A special computation procedure has been designed to prevent the separation zone from expanding upstream to the recycle-plane. The code is parallelized using Message Passing Interface (MPI) and is optimized for running on IBM-SP3 parallel machine. The scheme was validated first for a flat plate. It was shown that the blending function has to be monotonic to prevent the RANS region from appearing in the LES region. In the 25 deg ramp case, the hybrid schemes provided better agreement with experiment in the recovery region. Grid refinement studies demonstrated the importance of using a grid independent blend function and further improvement with experiment in the recovery region. In the 20 deg ramp case, with a relatively finer grid, the hybrid scheme characterized by grid independent blending function well predicted the flow field in both the separation region and the recovery region. Therefore, with "appropriately" fine grid, current hybrid schemes are promising for the simulation of shock wave/boundary layer interaction problems.

  7. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  8. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  9. Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments

    OpenAIRE

    Saha, Amal; Sanyal, Sugata

    2014-01-01

    After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security s...

  10. Interaction control of a redundant mobile manipulator

    International Nuclear Information System (INIS)

    Chung, J.H.; Velinsky, S.A.; Hess, R.A.

    1998-01-01

    This paper discusses the modeling and control of a spatial mobile manipulator that consists of a robotic manipulator mounted on a wheeled mobile platform. The Lagrange-d'Alembert formulation is used to obtain a concise description of the dynamics of the system, which is subject to nonholonomic constraints. The complexity of the model is increased by introducing kinematic redundancy, which is created when a multilinked manipulator is used. The kinematic redundancy is resolved by decomposing the mobile manipulator into two subsystems: the mobile platform and the manipulator. The redundancy resolution scheme employs a nonlinear interaction-control algorithm, which is developed and applied to coordinate the two subsystems' controllers. The subsystem controllers are independently designed, based on each subsystem's dynamic characteristics. Simulation results show the promise of the developed algorithm

  11. Upstream structural management measures for an urban area flooding in Turkey

    Science.gov (United States)

    Akyurek, Z.; Bozoğlu, B.; Sürer, S.; Mumcu, H.

    2015-06-01

    In recent years, flooding has become an increasing concern across many parts of the world of both the general public and their governments. The climate change inducing more intense rainfall events occurring in short period of time lead flooding in rural and urban areas. In this study the flood modelling in an urbanized area, namely Samsun-Terme in Blacksea region of Turkey is performed. MIKE21 with flexible grid is used in 2-dimensional shallow water flow modelling. 1 × 1000-1 scaled maps with the buildings for the urbanized area and 1 × 5000-1 scaled maps for the rural parts are used to obtain DTM needed in the flood modelling. The bathymetry of the river is obtained from additional surveys. The main river passing through the urbanized area has a capacity of 500 m3 s-1 according to the design discharge obtained by simple ungauged discharge estimation depending on catchment area only. The upstream structural base precautions against flooding are modelled. The effect of four main upstream catchments on the flooding in the downstream urban area are modelled as different scenarios. It is observed that if the flow from the upstream catchments can be retarded through a detention pond constructed in one of the upstream catchments, estimated Q100 flood can be conveyed by the river without overtopping from the river channel. The operation of the upstream detention ponds and the scenarios to convey Q500 without causing flooding are also presented. Structural management measures to address changes in flood characteristics in water management planning are discussed.

  12. DENSITY FLUCTUATIONS UPSTREAM AND DOWNSTREAM OF INTERPLANETARY SHOCKS

    Energy Technology Data Exchange (ETDEWEB)

    Pitňa, A.; Šafránková, J.; Němeček, Z.; Goncharov, O.; Němec, F.; Přech, L. [Charles University, Faculty of Mathematics and Physics, V Holešovičkách 2, 180 00 Prague 8 (Czech Republic); Chen, C. H. K. [Department of Physics, Imperial College London, London SW7 2AZ (United Kingdom); Zastenker, G. N., E-mail: jana.safrankova@mff.cuni.cz [Space Research Institute of Russian Academy of Sciences, Moscow, Russia, Profsoyuznaya ul. 84/32, Moscow 117997 (Russian Federation)

    2016-03-01

    Interplanetary (IP) shocks as typical large-scale disturbances arising from processes such as stream–stream interactions or Interplanetary Coronal Mass Ejection (ICME) launching play a significant role in the energy redistribution, dissipation, particle heating, acceleration, etc. They can change the properties of the turbulent cascade on shorter scales. We focus on changes of the level and spectral properties of ion flux fluctuations upstream and downstream of fast forward oblique shocks. Although the fluctuation level increases by an order of magnitude across the shock, the spectral slope in the magnetohydrodynamic range is conserved. The frequency spectra upstream of IP shocks are the same as those in the solar wind (if not spoiled by foreshock waves). The spectral slopes downstream are roughly proportional to the corresponding slopes upstream, suggesting that the properties of the turbulent cascade are conserved across the shock; thus, the shock does not destroy the shape of the spectrum as turbulence passes through it. Frequency spectra downstream of IP shocks often exhibit “an exponential decay” in the ion kinetic range that was earlier reported at electron scales in the solar wind or at ion scales in the interstellar medium. We suggest that the exponential shape of ion flux spectra in this range is caused by stronger damping of the fluctuations in the downstream region.

  13. Mobility Management of Mobile IP Based on Multi-tier Cellular Systems%基于多层小区结构的移动IP移动性管理

    Institute of Scientific and Technical Information of China (English)

    唐宏; 吴中福; 聂能; 赵军; 熊思民

    2003-01-01

    In this paper,several currently existed Mobility Management Schemes of Mobile IP are simply analyzed,and so does the network structure of multi-tier cellular which nowadays is easily seen. Then we propose a few promo-tions on the strategies of mobility management when realizing mobile IP in multi-tier cellular network structure. Thekey of the promotions is that the required type of cell for a MN is determined based on the classification of its mobilitypattern. Consequently,the capacity of system may be increased while the frequency of handoff is decreased.

  14. LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

    Directory of Open Access Journals (Sweden)

    Ming Chen

    2016-01-01

    Full Text Available Recent years have witnessed the rapid growth of location-based services (LBSs for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users’ location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache content maintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.

  15. Mobilizing local innovation capacity through a simulation game in a participatory research project on agricultural innovation in El Brahmi irrigation scheme (Tunisia).

    Science.gov (United States)

    Dolinska, Aleksandra; d'Aquino, Patrick; Imache, Amar; Dionnet, Mathieu; Rougier, Jean-Emmanuel

    2015-04-01

    In the framework of the European Union and African Union cooperative research to increase Food production in irrigated farming systems in Africa (EAU4Food project) we conducted a participatory research on the possible innovative practices to increase production of dairy farms in the irrigation scheme El Brahmi in Tunisia in the face of changing economic, political and environmental conditions. Our aim was to find effective research method to stimulate farmers' participation in the innovation process. Although the capacities of farmers in producing knowledge and in innovating are recognized and the shift from the linear model of technology transfer towards more participatory approaches to innovation is postulated, in which the role of researchers changes from providing solutions towards supporting farmers in finding their own solutions, in practice, the position of farmers in shaping innovation practice and process remains weak. After a series of participatory workshops and in-depth interviews with the actors of the local innovation system we developed and tested a simple open simulation game Laitconomie for farmers. The game proved to be effective in increasing our understanding of the system as the farmers were adding new elements and rules while playing, and in mobilizing farmers' knowledge (including tacit knowledge) in the simulated innovation process. The result reported by the participants was learning how to improve farm management, soil fertility management and cow nutrition practices. Some of the participants used the game as a decision support tool. While our game and its scope were modest and mobilized only two types of players (farmers and extension agent), open simulation proved to be a useful tool to analyze a local innovation system. Designing similar type of tools that would mobilize more diverse players and hence have a larger scope can be imagined.

  16. Exploring Social Learning through Upstream Engagement in Science and Technology

    DEFF Research Database (Denmark)

    Mortensen, Jonas Egmose

    This discussion paper deliberates on how the concept of social learning can be used for evaluating upstream engagement initiatives in science and technology.  The paper briefly introduces to the concept of upstream engagement and a concrete case, the UK Citizen Science for Sustainability project...... (SuScit), as an outset for discussing how the concept of social learning can be used for analysing and understanding relations between citizen participation, Science and research, and sustainability. A number of relevant research questions and methodological considerations are distilled...

  17. Monitoring upstream sinkhole development by detailed sonar profiling

    Energy Technology Data Exchange (ETDEWEB)

    Rigbey, S. [Acres International Ltd., Niagara Falls, ON (Canada)

    2004-09-01

    This paper describes the development and use of a simple sonar system that has been used by engineers for routine monitoring of small sinkholes on the upstream face of a distressed earth dam. Improper construction of the dam led to the development of several sinkholes measuring 10 to 20 m in diameter upstream from the dam which is founded on deep alluvial sands and gravels. The dam has a central core of silt and leakage varies between 200 and 500 l/s, depending on the water level of the reservoir. The main issues with the upstream blanket are: improper fill placement due to the inability to dewater the area properly; omission of a filter material between the blanket and the alluvium foundation; thin placement of fill and runnelling of the blanket prior to impoundment; and, short upstream extent of the blanket. A downstream weighting toe of material was placed to address the seepage and piping that developed immediately following impounding. Other incidents continued over the years, such as downstream sinkholes, slumping of the crest and repairs about 12 years after construction. An inverter filter was also constructed to better control the seepage. Simple bathymetric surveys conducted by sounding the bottom of the reservoir from the ice surface each winter revealed the presence of several large sinkholes. Although infilling programs were conducted, sinkholes redeveloped after each program. The bathymetric surveys were found to be limited in accuracy and repeatability. Therefore, it was not possible to monitor small developments on a yearly basis. A 3-dimensional seepage model was developed to reconcile some of the unexplained piezometric patterns and to better understand the seepage patterns. However, this was also unsuccessful on its own. A trial sonar survey was then undertaken in 2002 by a Vancouver-based sonar company using an Imagenix profiling sonar head. It was successful in locating a small, previously unknown sinkhole measuring a few metres in diameter at

  18. Pseudo Last Useful Instant Queuing Strategy for Handovers in Low Earth Orbit Mobile Satellite Networks

    OpenAIRE

    W. Kiamouche; M. Benslama

    2008-01-01

    This paper presents an alternative strategy of queuing handover called Pseudo Last Useful Instant PLUI scheme for Low Earth Orbit Mobile Satellite Systems LEO MSSs. The PLUI scheme uses the same approach as the Last Useful Instant LUI scheme previously proposed in literature, with less complex implementation. Simulation tests were carried out using Dynamic Channel Allocation DCA in order to evaluate the performance of this scheme and also an analytical approach has been p...

  19. Diagnostic perspectives of mobile x-ray computerized tomography

    International Nuclear Information System (INIS)

    Portnoj, L.M.; Dibirov, M.P.; Denisova, L.B.

    1992-01-01

    Mobile x-ray computerized tomography (CT) and an organization and methodological scheme of its application were assessed. CT is realized in special hospitals of large regions, where the patients with the optimal indications for CT are assembled. Over 15000 examinations were carried out with the use of the suggested CT program over 4 years, that resulted in detection of 1295 brain tumors, 804 cases with neoplastic involvement of the abdominal cavity and the retroperitoneal space. Wide application of mobile CT devices according to the program will help to decide the problem of unavailability of such examinations. One mobile device may replace 3 permanent CT devices

  20. A Hybrid Web Browser Architecture for Mobile Devices

    Directory of Open Access Journals (Sweden)

    CHO, J.

    2014-08-01

    Full Text Available Web browsing on mobile networks is slow in comparison to wired or Wi-Fi networks. Particularly, the connection establishment phase including DNS lookups and TCP handshakes takes a long time on mobile networks due to its long round-trip latency. In this paper, we propose a novel web browser architecture that aims to improve mobile web browsing performance. Our approach delegates the connection establishment and HTTP header field delivery tasks to a dedicated proxy server located at the joint point between the WAN and mobile network. Since the traffic for the connection establishment and HTTP header fields delivery passes only through the WAN between the proxy and web servers, our approach significantly reduces both the number and size of packets on the mobile network. Our evaluation showed that the proposed scheme reduces the number of mobile network packets by up to 42% and, consequently, the average page loading time is shortened by up to 52%.

  1. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...

  2. Efficient demodulation scheme for rolling-shutter-patterning of CMOS image sensor based visible light communications.

    Science.gov (United States)

    Chen, Chia-Wei; Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung

    2017-10-02

    Recently even the low-end mobile-phones are equipped with a high-resolution complementary-metal-oxide-semiconductor (CMOS) image sensor. This motivates using a CMOS image sensor for visible light communication (VLC). Here we propose and demonstrate an efficient demodulation scheme to synchronize and demodulate the rolling shutter pattern in image sensor based VLC. The implementation algorithm is discussed. The bit-error-rate (BER) performance and processing latency are evaluated and compared with other thresholding schemes.

  3. Moving Upstream in U.S. Hospital Care Toward Investments in Population Health.

    Science.gov (United States)

    Begun, James W; Potthoff, Sandra

    The root causes for most health outcomes are often collectively referred to as the social determinants of health. Hospitals and health systems now must decide how much to "move upstream," or invest in programs that directly affect the social determinants of health. Moving upstream in healthcare delivery requires an acceptance of responsibility for the health of populations. We examine responses of 950 nonfederal, general hospitals in the United States to the 2015 American Hospital Association Population Health Survey to identify characteristics that distinguish those hospitals that are most aligned with population health and most engaged in addressing social determinants of health. Those "upstream" hospitals are significantly more likely to be large, not-for-profit, metropolitan, teaching-affiliated, and members of systems. Internally, the more upstream hospitals are more likely to organize their population health activities with strong executive-level involvement, full-time-equivalent support, and coordination at the system level.The characteristics differentiating hospitals strongly involved in population health and upstream activity are not unlike those characteristics associated with diffusion of many innovations in hospitals. These hospitals may be the early adopters in a diffusion process that will eventually include most hospitals or, at least, most not-for-profit hospitals. Alternatively, the population health and social determinants movements could be transient or could be limited to a small portion of hospitals such as those identified here, with distinctive patient populations, missions, and resources.

  4. Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2017-01-01

    Full Text Available The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID but different locations. To facilitate the discovery of contradictory conflicts, we propose a hybrid local and global detection method. The local detection is performed in a local area smaller than the whole deployed area to improve the meeting probability of contradictory nodes, while the distant replicated nodes in larger area can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick discovery by searching of the replicas with reasonable overhead.

  5. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  6. Cloning and functional analysis of 5'-upstream region of the Pokemon gene.

    Science.gov (United States)

    Yang, Yutao; Zhou, Xiaowei; Zhu, Xudong; Zhang, Chuanfu; Yang, Zhixin; Xu, Long; Huang, Peitang

    2008-04-01

    Pokemon, the POK erythroid myeloid ontogenic factor, not only regulates the expression of many genes, but also plays an important role in cell tumorigenesis. To investigate the molecular mechanism regulating expression of the Pokemon gene in humans, its 5'-upstream region was cloned and analyzed. Transient analysis revealed that the Pokemon promoter is constitutive. Deletion analysis and a DNA decoy assay indicated that the NEG-U and NEG-D elements were involved in negative regulation of the Pokemon promoter, whereas the POS-D element was mainly responsible for its strong activity. Electrophoretic mobility shift assays suggested that the NEG-U, NEG-D and POS-D elements were specifically bound by the nuclear extract from A549 cells in vitro. Mutation analysis demonstrated that cooperation of the NEG-U and NEG-D elements led to negative regulation of the Pokemon promoter. Moreover, the NEG-U and NEG-D elements needed to be an appropriate distance apart in the Pokemon promoter in order to cooperate. Taken together, our results elucidate the mechanism underlying the regulation of Pokemon gene transcription, and also define a novel regulatory sequence that may be used to decrease expression of the Pokemon gene in cancer gene therapy.

  7. Characterization of upstream sequences of the LIM2 gene that bind developmentally regulated and lens-specific proteins

    Institute of Scientific and Technical Information of China (English)

    HSU Heng; Robert L. CHURCH

    2004-01-01

    During lens development, lens epithelial cells differentiate into fiber cells. To date, four major lens fiber cell intrinsic membrane proteins (MIP) ranging in size from 70 kD to 19 kD have been characterized. The second most abundant lens fiber cell intrinsic membrane protein is MP19. This protein probably is involved with lens cell communication and relates with cataractogenesis. The aim of this research is to characterize upstream sequences of the MP19 (also called LIM2) gene that bind developmentally regulated and lens-specific proteins. We have used the gel mobility assays and corresponding competition experiments to identify and characterize cis elements within approximately 500 bases of LIM2 upstream sequences. Our studies locate the positions of some cis elements, including a "CA" repeat, a methylation Hha I island, an FnuD II site, an Ap1 and an Ap2 consensus sequences, and identify some specific cis elements which relate to lens-specific transcription of LIM2. Our experiments also preliminarily identify trans factors which bind to specific cis elements of the LIM2 promoter and/or regulate transcription of LIM2. We conclude that developmental regulation and coordination of the MP 19 gene in ocular lens fiber cells is controlled by the presence of specific cis elements that bind regulatory trans factors that affect LIM2 gene expression. DNA methylation is one mechanism of controlling LIM2 gene expression during lens development.

  8. Optical power equalization for upstream traffic with injection-locked Fabry-Perot lasers in TDM-PON

    Science.gov (United States)

    Huang, Ting-Tsan; Sheu, Lih-Gen; Chi, Sien

    2010-10-01

    An optical power equalization of upstream traffic in time-division-multiplexed passive optical network (TDM-PON) based on injection-locked Fabry-Perot lasers has been experimentally investigated. The upstream transmitters with stable spectrum are achieved by using an external injection light source in the optical line terminal (OLT). The different upstream powers can be equalized by injection locking a Fabry-Perot laser diode (FP-LD) biased below threshold current in OLT. The dynamic upstream power range from - 8.5 to - 19.5 db m is reduced to a 1.6 dB maximal power variation, when the uplink signal is directly modulated at 1.25 Gb/s.

  9. Anatomy of top 100 upstream players

    International Nuclear Information System (INIS)

    Burk, V.A.

    1992-01-01

    A brief review is given of a recent survey of the top one hundred upstream oil and gas companies which file financial data with the US Securities and Exchange Commission. The analysis indicates the increasing globalisation of the industry with exploration and development spending increasing dramatically outside the US. To survive, companies must operate as efficient low cost finders and producers of oil and gas and anticipate and meet changing market demands quickly. (UK)

  10. N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents

    Directory of Open Access Journals (Sweden)

    Pallavi Bagga

    2017-12-01

    Full Text Available From many past years, the detection of unknown malicious mobile agents before they invade the Mobile Agent Platform has been the subject of much challenging activity. The ever-growing threat of malicious agents calls for techniques for automated malicious agent detection. In this context, the machine learning (ML methods are acknowledged more effective than the Signature-based and Behavior-based detection methods. Therefore, in this paper, the prime contribution has been made to detect the unknown malicious mobile agents based on n-gram features and supervised ML approach, which has not been done so far in the sphere of the Mobile Agents System (MAS security. To carry out the study, the n-grams ranging from 3 to 9 are extracted from a dataset containing 40 malicious and 40 non-malicious mobile agents. Subsequently, the classification is performed using different classifiers. A nested 5-fold cross validation scheme is employed in order to avoid the biasing in the selection of optimal parameters of classifier. The observations of extensive experiments demonstrate that the work done in this paper is suitable for the task of unknown malicious mobile agent detection in a Mobile Agent Environment, and also adds the ML in the interest list of researchers dealing with MAS security.

  11. Multiple upstream modules regulate zebrafish myf5 expression

    Directory of Open Access Journals (Sweden)

    Weng Chih-Wei

    2007-01-01

    Full Text Available Abstract Background Myf5 is one member of the basic helix-loop-helix family of transcription factors, and it functions as a myogenic factor that is important for the specification and differentiation of muscle cells. The expression of myf5 is somite- and stage-dependent during embryogenesis through a delicate regulation. However, this complex regulatory mechanism of myf5 is not clearly understood. Results We isolated a 156-kb bacterial artificial chromosome clone that includes an upstream 80-kb region and a downstream 70-kb region of zebrafish myf5 and generated a transgenic line carrying this 156-kb segment fused to a green fluorescent protein (GFP reporter gene. We find strong GFP expression in the most rostral somite and in the presomitic mesoderm during segmentation stages, similar to endogenous myf5 expression. Later, the GFP signals persist in caudal somites near the tail bud but are down-regulated in the older, rostral somites. During the pharyngula period, we detect GFP signals in pectoral fin buds, dorsal rostral myotomes, hypaxial myotomes, and inferior oblique and superior oblique muscles, a pattern that also corresponds well with endogenous myf5 transcripts. To characterize the specific upstream cis-elements that regulate this complex and dynamic expression pattern, we also generated several transgenic lines that harbor various lengths within the upstream 80-kb segment. We find that (1 the -80 kb/-9977 segment contains a fin and cranial muscle element and a notochord repressor; (2 the -9977/-6213 segment contains a strong repressive element that does not include the notochord-specific repressor; (3 the -6212/-2938 segment contains tissue-specific elements for bone and spinal cord; (4 the -2937/-291 segment contains an eye enhancer, and the -2937/-2457 segment is required for notochord and myocyte expression; and (5 the -290/-1 segment is responsible for basal transcription in somites and the presomitic mesoderm. Conclusion We suggest

  12. Energy harvesting schemes for building interior environment monitoring

    Science.gov (United States)

    Zylka, Pawel; Pociecha, Dominik

    2016-11-01

    A vision to supply microelectronic devices without batteries making them perpetual or extending time of service in battery-oriented mobile supply schemes is the driving force of the research related to ambient energy harvesting. Energy harnessing aims thus at extracting energy from various ambient energy "pools", which generally are cost- or powerineffective to be scaled up for full-size, power-plant energy generation schemes supplying energy in electric form. These include - but are not limited to - waste heat, electromagnetic hum, vibrations, or human-generated power in addition to traditional renewable energy resources like water flow, tidal and wind energy or sun radiation which can also be exploited at the miniature scale by energy scavengers. However, in case of taking advantage of energy harvesting strategies to power up sensors monitoring environment inside buildings adaptable energy sources are restrained to only some which additionally are limited in spatial and temporal accessibility as well as available power. The paper explores experimentally an energy harvesting scheme exploiting human kinesis applicable in indoor environment for supplying a wireless indoor micro-system, monitoring ambient air properties (pressure, humidity and temperature).

  13. Multispacecraft observations of energetic ions upstream and downstream of the bow shock

    International Nuclear Information System (INIS)

    Scholer, M.; Mobius, E.; Kistler, L.M.; Klecker, B.; Ipavich, F.M.; Department of Physics and Astronomy, University of Maryland, College Park)

    1989-01-01

    We present simultaneous measurements of energetic protons and alpha particles inside and outside of the magnetopause, immediately upstream, and downstream as well as further upstream of the bow shock. A comparison between the intensity at the bow shock and further upstream results in an e-folding distance at 30 keV of similar to 6.2 R/sub E/. After transformation of the angular distribution into the solar wind frame a diffusion coefficeint of κ/sub parallel/similar to 3 R/sub E/ is obtained from the anisotropy and the intensity gradient. Immediately downstream of the bow shock the anisotropy in the shock frame is directed toward the magnetopause. After transformation into the plasma rest frame the distribution is isotropic. The intensity in the magnetosheath just outside the magnetopause is smaller than the intensity behind the bow shock. Thus, in the magnetosheath there is no gradient or streaming in the upstream direction. The spectra, intensities, and relative abundances in the magnetosheath and inside the magnetosphere are totally different. These observations are consistent with first order Fermi acceleration at the bow shock and subsequent downstream convection, and exclude a magnetospheric source for these particles. Copyright American Geophysical Union 1989

  14. Influence of Upstream and Downstream Compressor Stators on Rotor Exit Flow Field

    Directory of Open Access Journals (Sweden)

    Nicole L. Key

    2014-01-01

    Full Text Available Measurements acquired at the rotor exit plane illuminate the interaction of the rotor with the upstream vane row and the downstream vane row. The relative phase of the upstream and downstream vane rows is adjusted using vane clocking so that the effect of the upstream propagating potential field from the downstream stator can be distinguished from the effects associated with the wakes shed from the upstream stator. Unsteady absolute flow angle information shows that the downstream potential field causes the absolute flow angle to increase in the vicinity of the downstream stator leading edge. The presence of Stator 1 wake is also detected at this measurement plane using unsteady total pressure data. The rotor wakes are measured at different circumferential locations across the vane passage, and the influence of Stator 1 wake on the suction side of the rotor wake is evident. Also, the influence of the downstream stator is detected on the pressure side of the rotor wake for a particular clocking configuration. Understanding the role of the surrounding vane rows on rotor wake development will lead to improved comparison between experimental data and results from computational models.

  15. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  16. An Authenticated Privacy-Preserving Mobile Matchmaking Protocol Based on Social Connections with Friendship Ownership

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2014-01-01

    person to talk to, to dine with, to play games with, or to see a movie with. The proposed scheme is demonstrated to be secure, effective, and efficient. The implementation of the proposed algorithms on Android system mobile devices allows users to securely find their target via mobile phones.

  17. Upstream ORF affects MYCN translation depending on exon 1b alternative splicing

    International Nuclear Information System (INIS)

    Besançon, Roger; Puisieux, Alain; Valsesia-Wittmann, Sandrine; Locher, Clara; Delloye-Bourgeois, Céline; Furhman, Lydie; Tutrone, Giovani; Bertrand, Christophe; Jallas, Anne-Catherine; Garin, Elisabeth

    2009-01-01

    The MYCN gene is transcribed into two major mRNAs: one full-length (MYCN) and one exon 1b-spliced (MYCN Δ1b ) mRNA. But nothing is known about their respective ability to translate the MYCN protein. Plasmids were prepared to enable translation from the upstream (uORF) and major ORF of the two MYCN transcripts. Translation was studied after transfection in neuroblastoma SH-EP cell line. Impact of the upstream AUG on translation was evaluated after directed mutagenesis. Functional study with the two MYCN mRNAs was conducted by a cell viability assay. Existence of a new protein encoded by the MYCN Δ1b uORF was explored by designing a rabbit polyclonal antibody against a specific epitope of this protein. Both are translated, but higher levels of protein were seen with MYCN Δ1b mRNA. An upstream ORF was shown to have positive cis-regulatory activity on translation from MYCN but not from MYCN Δ1b mRNA. In transfected SH-EP neuroblastoma cells, high MYCN dosage obtained with MYCN Δ1b mRNA translation induces an antiapoptotic effect after serum deprivation that was not observed with low MYCN expression obtained with MYCN mRNA. Here, we showed that MYCNOT: MYCN Overlap Transcript, a new protein of unknown function is translated from the upstream AUG of MYCN Δ1b mRNA. Existence of upstream ORF in MYCN transcripts leads to a new level of MYCN regulation. The resulting MYCN dosage has a weak but significant anti-apoptotic activity after intrinsic apoptosis induction

  18. Increasing cellular coverage within integrated terrestrial/satellite mobile networks

    Science.gov (United States)

    Castro, Jonathan P.

    1995-01-01

    When applying the hierarchical cellular concept, the satellite acts as giant umbrella cell covering a region with some terrestrial cells. If a mobile terminal traversing the region arrives to the border-line or limits of a regular cellular ground service, network transition occurs and the satellite system continues the mobile coverage. To adequately assess the boundaries of service of a mobile satellite system an a cellular network within an integrated environment, this paper provides an optimized scheme to predict when a network transition may be necessary. Under the assumption of a classified propagation phenomenon and Lognormal shadowing, the study applies an analytical approach to estimate the location of a mobile terminal based on a reception of the signal strength emitted by a base station.

  19. OFDM Towards Fixed and Mobile Broadband Wireless Access

    DEFF Research Database (Denmark)

    Shanker Jha, Uma; Prasad, Ramjee

    ) and orthogonal frequency division multiple access (OFDMA) schemes. Essential features of IEEE 802.16d (fixed) and 802.16e (mobile) and the role of the WiMAX Forum in defining interoperability and certification criteria. Important requirements, trade-offs, and other critical design considerations. Key issues...

  20. Multi-Source Cooperative Data Collection with a Mobile Sink for the Wireless Sensor Network.

    Science.gov (United States)

    Han, Changcai; Yang, Jinsheng

    2017-10-30

    The multi-source cooperation integrating distributed low-density parity-check codes is investigated to jointly collect data from multiple sensor nodes to the mobile sink in the wireless sensor network. The one-round and two-round cooperative data collection schemes are proposed according to the moving trajectories of the sink node. Specifically, two sparse cooperation models are firstly formed based on geographical locations of sensor source nodes, the impairment of inter-node wireless channels and moving trajectories of the mobile sink. Then, distributed low-density parity-check codes are devised to match the directed graphs and cooperation matrices related with the cooperation models. In the proposed schemes, each source node has quite low complexity attributed to the sparse cooperation and the distributed processing. Simulation results reveal that the proposed cooperative data collection schemes obtain significant bit error rate performance and the two-round cooperation exhibits better performance compared with the one-round scheme. The performance can be further improved when more source nodes participate in the sparse cooperation. For the two-round data collection schemes, the performance is evaluated for the wireless sensor networks with different moving trajectories and the variant data sizes.

  1. Upstream waves in Saturn's foreshock

    Science.gov (United States)

    Bavassano Cattaneo, M. B.; Cattaneo, P.; Moreno, G.; Lepping, R. P.

    1991-01-01

    An analysis based on plasma and magnetic-field data obtained from Voyager 1 during its Saturn encounter is reported. The plasma data provided every 96 sec and magnetic-field data averaged over 48 sec are utilized. The evidence of upstream waves at Saturn are detected. The waves have a period, in the spacecraft frame, of about 550 sec and a relative amplitude larger than 0.3, are left- and right-hand elliptically polarized, and propagate at about 30 deg with respect to the average magnetic field. The appearance of the waves is correlated with the spacecraft being magnetically connected to the bow shock.

  2. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  3. Static and dynamic efficiency of white certificate schemes; L'efficacite statique et dynamique des dispositifs de -certificats blancs-

    Energy Technology Data Exchange (ETDEWEB)

    Giraudet, L.G. [CIRED-ENPC, 94 - Nogent-sur-Marne (France); Finon, D. [CIRED-CNRS, 94 - Nogent-sur-Marne (France)

    2011-07-15

    White Certificate Schemes mandate energy companies to promote energy efficiency through flexibility mechanisms, including the trading of energy savings. They can be characterized as a quantity-based, baseline-and-credit system for the diffusion of energy efficient technologies. This paper compares experiences with White Certificate Schemes in Great Britain, Italy and France, in order to identify the basic drivers of each, and ultimately offer an original interpretation as an adaptive instrument, in the sense that it can take different forms in response to specific institutional contexts. A first analysis shows that Schemes perform well in terms of static efficiency, i.e. they are cost-effective and generate net social benefits over the period considered, though with large discrepancies rooted in different technological potentials. Regarding dynamic efficiency, i.e. the ability to induce and sustain technological change over the long haul, market transformation occurred in Great Britain, but was poorly incentivized in Italy and France by inadequate compliance cost recovery rules. Substantial organizational change has occurred in every country, mainly by strengthening vertical relationships between obliged parties and upstream businesses. Overall, the obligation (rather than the market component) drives the early phases of the Schemes. (authors)

  4. Simulation of Intelligent Single Wheel Mobile Robot

    Directory of Open Access Journals (Sweden)

    Maki K. Rashid

    2008-11-01

    Full Text Available Stabilization of a single wheel mobile robot attracted researcher attentions in robotic area. However, the budget requirements for building experimental setups capable in investigating isolated parameters and implementing others encouraged the development of new simulation methods and techniques that beat such limitations. In this work we have developed a simulation platform for testing different control tactics to stabilize a single wheel mobile robot. The graphic representation of the robot, the dynamic solution, and, the control scheme are all integrated on common computer platform using Visual Basic. Simulation indicates that we can control such robot without knowing the detail of it's internal structure or dynamics behaviour just by looking at it and using manual operation tactics. Twenty five rules are extracted and implemented using Takagi-Sugeno's fuzzy controller with significant achievement in controlling robot motion during the dynamic simulation. The resulted data from the successful implementation of the fuzzy model are used to utilize and train a neurofuzzy controller using ANFIS scheme to produce further improvement in robot performance

  5. Upcoming opening of CERN's new Mobility Centre

    CERN Multimedia

    2016-01-01

    On 29 February, CERN’s brand new Mobility Centre opened in the Globe car park. The Centre has been created to cater to the transport needs of everyone at CERN, to simplify procedures and to centralise all the transport services on offer: the rental of CERN bikes and cars, the CERN car-sharing scheme and SIXT car rental.   From 29 February onwards, the Mobility Centre in the Globe car park will be the place to go for all your duty travel needs: rental of CERN cars (with or without the CERN logo), SIXT car rental, CERN bike rental, distribution of cards allowing the use of CERN’s self-service bike- and car-sharing schemes. That same day, the premises currently housing the Car Pool in Building 130 will become the CERN garage, responsible for: upkeep and repairs on CERN bikes, minor maintenance work on CERN vehicles (e.g. replacing windscreen wipers, bulbs and fuses, refilling windscreen washer fluid, pumping up tyres, etc.), arranging and following up the repair and maintenan...

  6. A distance-aware replica adaptive data gathering protocol for Delay Tolerant Mobile Sensor Networks.

    Science.gov (United States)

    Feng, Yong; Gong, Haigang; Fan, Mingyu; Liu, Ming; Wang, Xiaomin

    2011-01-01

    In Delay Tolerant Mobile Sensor Networks (DTMSNs) that have the inherent features of intermitted connectivity and frequently changing network topology it is reasonable to utilize multi-replica schemes to improve the data gathering performance. However, most existing multi-replica approaches inject a large amount of message copies into the network to increase the probability of message delivery, which may drain each mobile node's limited battery supply faster and result in too much contention for the restricted resources of the DTMSN, so a proper data gathering scheme needs a trade off between the number of replica messages and network performance. In this paper, we propose a new data gathering protocol called DRADG (for Distance-aware Replica Adaptive Data Gathering protocol), which economizes network resource consumption through making use of a self-adapting algorithm to cut down the number of redundant replicas of messages, and achieves a good network performance by leveraging the delivery probabilities of the mobile sensors as main routing metrics. Simulation results have shown that the proposed DRADG protocol achieves comparable or higher message delivery ratios at the cost of the much lower transmission overhead than several current DTMSN data gathering schemes.

  7. Design and Smartphone-Based Implementation of a Chaotic Video Communication Scheme via WAN Remote Transmission

    Science.gov (United States)

    Lin, Zhuosheng; Yu, Simin; Li, Chengqing; Lü, Jinhu; Wang, Qianxue

    This paper proposes a chaotic secure video remote communication scheme that can perform on real WAN networks, and implements it on a smartphone hardware platform. First, a joint encryption and compression scheme is designed by embedding a chaotic encryption scheme into the MJPG-Streamer source codes. Then, multiuser smartphone communications between the sender and the receiver are implemented via WAN remote transmission. Finally, the transmitted video data are received with the given IP address and port in an Android smartphone. It should be noted that, this is the first time that chaotic video encryption schemes are implemented on such a hardware platform. The experimental results demonstrate that the technical challenges on hardware implementation of secure video communication are successfully solved, reaching a balance amongst sufficient security level, real-time processing of massive video data, and utilization of available resources in the hardware environment. The proposed scheme can serve as a good application example of chaotic secure communications for smartphone and other mobile facilities in the future.

  8. Modeling and Analysis of Hybrid Cellular/WLAN Systems with Integrated Service-Based Vertical Handoff Schemes

    Science.gov (United States)

    Xia, Weiwei; Shen, Lianfeng

    We propose two vertical handoff schemes for cellular network and wireless local area network (WLAN) integration: integrated service-based handoff (ISH) and integrated service-based handoff with queue capabilities (ISHQ). Compared with existing handoff schemes in integrated cellular/WLAN networks, the proposed schemes consider a more comprehensive set of system characteristics such as different features of voice and data services, dynamic information about the admitted calls, user mobility and vertical handoffs in two directions. The code division multiple access (CDMA) cellular network and IEEE 802.11e WLAN are taken into account in the proposed schemes. We model the integrated networks by using multi-dimensional Markov chains and the major performance measures are derived for voice and data services. The important system parameters such as thresholds to prioritize handoff voice calls and queue sizes are optimized. Numerical results demonstrate that the proposed ISHQ scheme can maximize the utilization of overall bandwidth resources with the best quality of service (QoS) provisioning for voice and data services.

  9. ENHANCING THE ROLE OF STAKEHOLDERS IN THE MANAGEMENT OF UPSTREAM CILIWUNG WATERSHED

    Directory of Open Access Journals (Sweden)

    Iis Alviya

    2016-08-01

    Full Text Available Stakeholders have a ver y important role interm of the management of upstream watershed. Thus, the common understanding on the existence and role of stakeholders is an important factor in order to achieve good governance of watershed management, leading to the attainment of environmental, social and economic benefits. This paper aims to analyse the role, interests, and cooperation among stakeholders and its relationship with the condition of upper Ciliwung watershed. Stakeholder analysis was used in this study to identify stakeholders, to categorize them, and to investigate the relationship between stakeholders. The analysis showed the lack of cooperation among stakeholders both between key stakeholders with primar y stakeholders. This resulted in lack of communities' understanding on the benefits and the importance of conservation activities in the upstream Ciliwung watershed. Meanwhile, the cooperation between key stakeholders and supporting stakeholders, especially the providers of funds, was relatively better/stronger. This can be seen from a better management of inter-agency cooperation in the upstream Ciliwung watershed, although the effort was tend to be project-oriented. Therefore, communication forum need to be established, to taking role for synchronizing , collaborating and coordinating stakeholders' efforts, so that the management programs of upstream Ciliwung watershed can be integrated.

  10. DOWNSTREAM ECOCIDE FROM UPSTREAM WATER PIRACY

    OpenAIRE

    Miah Muhammad Adel

    2012-01-01

    Upstream India and downstream Bangladesh share more than 50 international rivers. India has set up water diversion constructions in more than 50% of these rivers, the largest one being on the Bangladeshâs northwest upon the Ganges River, puts Bangladeshâs Gangetic ecosystem at stake. In some border rivers, India has set up groins on her side of river banks. Also, Indian side pumps Bangladesh river water stealthily from border-rivers. Further, India is constructing another dam and reservoir up...

  11. Nonorthogonal multiple access and carrierless amplitude phase modulation for flexible multiuser provisioning in 5G mobile networks

    NARCIS (Netherlands)

    Altabas, J.A.; Rommel, S.; Puerta, R.; Izquierdo, D.; Ignacio Garces, J.; Antonio Lazaro, J.; Vegas Olmos, J.J.; Tafur Monroy, I.

    2017-01-01

    In this paper, a combined nonorthogonal multiple access (NOMA) and multiband carrierless amplitude phase modulation (multiCAP) scheme is proposed for capacity enhancement of and flexible resource provisioning in 5G mobile networks. The proposed scheme is experimentally evaluated over a W-band

  12. Comparative Analysis of Mobility Management Schemes in a Low Earth Orbit Satellite Network

    National Research Council Canada - National Science Library

    Conkling, Stephen

    2000-01-01

    .... This resource must be used efficiently, and this involves reducing the management overhead. This thesis investigates one aspect of management overhead, the bandwidth cost associated with mobility...

  13. The WW domain protein Kibra acts upstream of Hippo in Drosophila

    DEFF Research Database (Denmark)

    Baumgartner, Roland; Poernbacher, Ingrid; Buser, Nathalie

    2010-01-01

    inactivating the transcriptional coactivator Yorkie is well established, much less is known about the upstream events that regulate Hippo signaling activity. The FERM domain proteins Expanded and Merlin appear to represent two different signaling branches that feed into the Hippo pathway. Signaling...... by the atypical cadherin Fat may act via Expanded, but how Merlin is regulated has remained elusive. Here, we show that the WW domain protein Kibra is a Hippo signaling component upstream of Hippo and Merlin. Kibra acts synergistically with Expanded, and it physically interacts with Merlin. Thus, Kibra...

  14. Impact of upstream industrial effluents on irrigation water quality ...

    African Journals Online (AJOL)

    Impact of upstream industrial effluents on irrigation water quality, soils and ... Knowledge of irrigation water quality is critical to predicting, managing and reducing salt ... Presence of heavy metals in concentration higher than the recommended ...

  15. Water Stress in Global Transboundary River Basins: Significance of Upstream Water Use on Downstream Stress

    Science.gov (United States)

    Munia, H.; Guillaume, J. H. A.; Mirumachi, N.; Porkka,M.; Wada, Yoshihide; Kummu, M.

    2016-01-01

    Growing population and water demand have increased pressure on water resources in various parts of the globe, including many transboundary river basins. While the impacts of upstream water use on downstream water availability have been analyzed in many of these international river basins, this has not been systematically done at the global scale using coherent and comparable datasets. In this study, we aim to assess the change in downstream water stress due to upstream water use in the world's transboundary river basins. Water stress was first calculated considering only local water use of each sub-basin based on country-basin mesh, then compared with the situation when upstream water use was subtracted from downstream water availability. Wefound that water stress was generally already high when considering only local water use, affecting 0.95-1.44 billion people or 33%-51% of the population in transboundary river basins. After accounting for upstream water use, stress level increased by at least 1 percentage-point for 30-65 sub-basins, affecting 0.29-1.13 billion people. Altogether 288 out of 298 middle-stream and downstream sub-basin areas experienced some change in stress level. Further, we assessed whether there is a link between increased water stress due to upstream water use and the number of conflictive and cooperative events in the transboundary river basins, as captured by two prominent databases. No direct relationship was found. This supports the argument that conflicts and cooperation events originate from a combination of different drivers, among which upstream-induced water stress may play a role. Our findings contribute to better understanding of upstream-downstream dynamics in water stress to help address water allocation problems.

  16. Sector report: Malaysia. Upstream oil and gas industry

    International Nuclear Information System (INIS)

    1997-01-01

    This report is one of a series designed to introduce British exporters to the opportunities offered by the Malaysian market in oil and natural gas. The report includes Malaysia's oil and gas reserves, production, exploration, major profits upstream, production sharing contracts, pipeline construction, operators in production, service sector, and Petronas. (UK)

  17. Bit Error Rate Performance Analysis of a Threshold-Based Generalized Selection Combining Scheme in Nakagami Fading Channels

    Directory of Open Access Journals (Sweden)

    Kousa Maan

    2005-01-01

    Full Text Available The severity of fading on mobile communication channels calls for the combining of multiple diversity sources to achieve acceptable error rate performance. Traditional approaches perform the combining of the different diversity sources using either the conventional selective diversity combining (CSC, equal-gain combining (EGC, or maximal-ratio combining (MRC schemes. CSC and MRC are the two extremes of compromise between performance quality and complexity. Some researches have proposed a generalized selection combining scheme (GSC that combines the best branches out of the available diversity resources ( . In this paper, we analyze a generalized selection combining scheme based on a threshold criterion rather than a fixed-size subset of the best channels. In this scheme, only those diversity branches whose energy levels are above a specified threshold are combined. Closed-form analytical solutions for the BER performances of this scheme over Nakagami fading channels are derived. We also discuss the merits of this scheme over GSC.

  18. New IES scheme for power conditioning at ultra-high currents: from concept to MHD modeling and first experiments

    International Nuclear Information System (INIS)

    Chuvatin, Alexandre S.; Aranchuk, Leonid E.; Rudakov, Leonid I.; Kokshenev, Vladimir A.; Kurmaev, Nikolai E.; Fursov, Fiodor I.; Huet, Dominique; Gasilov, Vladimir A.; Krukovskii, Alexandre Yu.

    2002-01-01

    This work introduces an inductive energy storage (IES) scheme which aims pulsed-power conditioning at multi- MJ energies. The key element of the scheme represents an additional plasma volume, where a magnetically accelerated wire array is used for inductive current switching. This plasma acceleration volume is connected in parallel to a microsecond capacitor bank and to a 100-ns current ruse-time useful load. Simple estimates suggest that optimized scheme parameters could be reachable even when operating at ultra-high currents. We describe first proof-of-principle experiments carried out on GIT12 generator at the wire-array current level of 2 MA. The obtained confirmation of the concept consists in generation of a 200 kV voltage directly at an inductive load. This load voltage value can be already sufficient to transfer the available magnetic energy into kinetic energy of a liner at this current level. Two-dimensional modeling with the radiational MHD numerical tool Marple confirms the development of inductive voltage in the system. However, the average voltage increase is accompanied by short-duration voltage drops due to interception of the current by the low-density upstream plasma. Upon our viewpoint, this instability of the current distribution represents the main physical limitation to the scheme performance

  19. Strategic human resources study of the upstream petroleum industry : the decade ahead

    International Nuclear Information System (INIS)

    2003-10-01

    This report presents the results of a 10 month study of the human resources issues in Canada's upstream petroleum industry. The study identifies workforce demographics, skills, and supply and demand. It also discusses the impact of technology and other key challenges facing human resources issues. The upstream petroleum industry includes exploration and production, service industries, pipeline transmission, natural gas processing, and heavy oil and bitumen extracting and upgrading. The study defined four regions in Canada: Western Canada Sedimentary Basin, the oil sands, the north, and the east coast. The main influences on the management practices within the upstream petroleum industry are: globalization; cyclical economic conditions; operational excellence business models; government regulatory requirements; stakeholder expectations for involvement; technological advances; changing demographics, and workplace skills. The study also presented suggestions for changes in best practices to improve the efficiency and effectiveness of product and service delivery. refs., tabs., figs

  20. The role of the upstream oil and gas industry in the Canadian economy and the macroeconomic impacts of increased taxation

    International Nuclear Information System (INIS)

    Anon.

    1996-01-01

    The direct, indirect and overall impacts of the upstream oil and gas industry on the Canadian economy and the impact of increased taxation on the industry and the overall economy was assessed. The industry's value of production in 1995 was $25 billion, two-thirds of which were exports that contributed to Canada's trade surplus. In the same year, the industry also spent more than $10 billion in exploration and development. About five per cent of Canadian gross domestic product (GDP) and three per cent of national employment can be traced to the upstream oil and gas industry, therefore, increased taxation on the industry would have significant impacts on overall economic activity. For the purposes of this analysis, three assumptions were made: (1) a one-time $100 million tax increase on the industry, (2) the tax revenue to go toward government debt reduction, and (3) the reduction in industry net revenue to produce an investment impact equal with the average behaviour of the industry in recent years. Given these factors, it was concluded that a one-time $100 million tax increase could reduce national GDP by $250 million and employment by 3000 jobs. The balance of payments impact would be about -$75 million. Once factors related to expectations and capital mobility have been factored in, the negative macroeconomic impacts could be even greater. 6 tabs., 24 figs

  1. Robust Timing Synchronization in Aeronautical Mobile Communication Systems

    Science.gov (United States)

    Xiong, Fu-Qin; Pinchak, Stanley

    2004-01-01

    This work details a study of robust synchronization schemes suitable for satellite to mobile aeronautical applications. A new scheme, the Modified Sliding Window Synchronizer (MSWS), is devised and compared with existing schemes, including the traditional Early-Late Gate Synchronizer (ELGS), the Gardner Zero-Crossing Detector (GZCD), and the Sliding Window Synchronizer (SWS). Performance of the synchronization schemes is evaluated by a set of metrics that indicate performance in digital communications systems. The metrics are convergence time, mean square phase error (or root mean-square phase error), lowest SNR for locking, initial frequency offset performance, midstream frequency offset performance, and system complexity. The performance of the synchronizers is evaluated by means of Matlab simulation models. A simulation platform is devised to model the satellite to mobile aeronautical channel, consisting of a Quadrature Phase Shift Keying modulator, an additive white Gaussian noise channel, and a demodulator front end. Simulation results show that the MSWS provides the most robust performance at the cost of system complexity. The GZCD provides a good tradeoff between robustness and system complexity for communication systems that require high symbol rates or low overall system costs. The ELGS has a high system complexity despite its average performance. Overall, the SWS, originally designed for multi-carrier systems, performs very poorly in single-carrier communications systems. Table 5.1 in Section 5 provides a ranking of each of the synchronization schemes in terms of the metrics set forth in Section 4.1. Details of comparison are given in Section 5. Based on the results presented in Table 5, it is safe to say that the most robust synchronization scheme examined in this work is the high-sample-rate Modified Sliding Window Synchronizer. A close second is its low-sample-rate cousin. The tradeoff between complexity and lowest mean-square phase error determines

  2. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  3. Enhancer elements upstream of the SHOX gene are active in the developing limb.

    Science.gov (United States)

    Durand, Claudia; Bangs, Fiona; Signolet, Jason; Decker, Eva; Tickle, Cheryll; Rappold, Gudrun

    2010-05-01

    Léri-Weill Dyschondrosteosis (LWD) is a dominant skeletal disorder characterized by short stature and distinct bone anomalies. SHOX gene mutations and deletions of regulatory elements downstream of SHOX resulting in haploinsufficiency have been found in patients with LWD. SHOX encodes a homeodomain transcription factor and is known to be expressed in the developing limb. We have now analyzed the regulatory significance of the region upstream of the SHOX gene. By comparative genomic analyses, we identified several conserved non-coding elements, which subsequently were tested in an in ovo enhancer assay in both chicken limb bud and cornea, where SHOX is also expressed. In this assay, we found three enhancers to be active in the developing chicken limb, but none were functional in the developing cornea. A screening of 60 LWD patients with an intact SHOX coding and downstream region did not yield any deletion of the upstream enhancer region. Thus, we speculate that SHOX upstream deletions occur at a lower frequency because of the structural organization of this genomic region and/or that SHOX upstream deletions may cause a phenotype that differs from the one observed in LWD.

  4. An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users

    Directory of Open Access Journals (Sweden)

    Hong Zhong

    2015-01-01

    Full Text Available In a traditional network, server load balancing is used to satisfy the demand for high data volumes. The technique requires large capital investment while offering poor scalability and flexibility, which difficultly supports highly dynamic workload demands from massive mobile users. To solve these problems, this paper analyses the principle of software-defined networking (SDN and presents a new probabilistic method of load balancing based on variance analysis. The method can be used to dynamically manage traffic flows for supporting massive mobile users in SDN networks. The paper proposes a solution using the OpenFlow virtual switching technology instead of the traditional hardware switching technology. A SDN controller monitors data traffic of each port by means of variance analysis and provides a probability-based selection algorithm to redirect traffic dynamically with the OpenFlow technology. Compared with the existing load balancing methods which were designed to support traditional networks, this solution has lower cost, higher reliability, and greater scalability which satisfy the needs of mobile users.

  5. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  6. Restructuring: new relationships between the oil companies and the upstream oil firms

    International Nuclear Information System (INIS)

    Barreau, S.

    2001-11-01

    Since the 1986 oil shock, international oil companies have focused on their base competencies, concentrating on activities viewed as their core businesses and steadily increasing the number of tasks to be subcontracted to the upstream oil and gas service sector. The upstream oil and gas service companies had to be restructured to face this new challenge. The strategies they launched at the end of the 80's were varied. Some firms became largely integrated (Schlumberger, Baker Hughes, Halliburton) whereas other firms chose to broaden their range of services. However generally, they opted for external investment which led to an important wave of mergers and acquisitions. The first part characterizes the upstream oil and gas sector by introducing the main oil and gas service firms and their recent strategic evolution. This concludes with both an economic valuation and a typology of attempted growth strategies. To illustrate this, a matrix has been created to characterise the dynamic paths of the oil and gas service firms. The purpose of the second part is to consider the economic theories related to industrial strategies. The strategies of innovation, market protection, vertical integration and diversification have been studied to illustrate the main conclusion which is that the aim of all these strategies was to change the relationships between the oil companies and the upstream oil and gas service firms. (author)

  7. The upstream escape of energized solar wind protons from the bow shock

    International Nuclear Information System (INIS)

    Greenstadt, E.W.

    1975-01-01

    Recently, there have been some systematic observations of backstreaming protons at the Earth's bow shock with parallel velocity components and total energies much too high to be associated with the usual long-period upstream waves or to be produced by Sonnerup's simple reflection process (Lin et al., 1974), and these protons (30-100keV) were attributed to some unknown acceleration mechanism in the upstream region. The observations of Lof et al. involved protons in high pitch angle, and, although their reasons for favoring an upstream acceleration were quite different, it may seem intuitive that high pitch angle particles would have difficulty escaping the shock, especially at large field-normal angles. Such an inference would superficially support the notion of energization outside the bow shock. It seems worthwhile therefore to examine the extent to which the geometry of individual particle motion alone might select among reflected particles those that can escape upstream and those that cannot. In this paper the geometry of escape is described and some simple numerical examples are worked out for a few special cases. It is found that protons with rather high energies and pitch angles can escape the shock at only marginally quasi-parallel field orientations (i.e., thetasub(nB) approximately 50 0 ), even if they have quite moderate speeds parallel to B. (Auth.)

  8. ENcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments

    National Research Council Canada - National Science Library

    Ratsimor, Olga; Finin, Tim; Joshi, Anupam; Yesha, Yelena

    2005-01-01

    .... eNcentive facilitates peer-to-peer electronic marketing in mobile ad hoc environments. Our framework employs an intelligent marketing scheme, by providing users the capability to collect information like sales promotions and discounts...

  9. Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer in PMIPv6 Networks for IP-Based Internet of Things.

    Directory of Open Access Journals (Sweden)

    Chulhee Cho

    Full Text Available Lately, we see that Internet of things (IoT is introduced in medical services for global connection among patients, sensors, and all nearby things. The principal purpose of this global connection is to provide context awareness for the purpose of bringing convenience to a patient's life and more effectively implementing clinical processes. In health care, monitoring of biosignals of a patient has to be continuously performed while the patient moves inside and outside the hospital. Also, to monitor the accurate location and biosignals of the patient, appropriate mobility management is necessary to maintain connection between the patient and the hospital network. In this paper, a binding update scheme on PMIPv6, which reduces signal traffic during location updates by Virtual LMA (VLMA on the top original Local Mobility Anchor (LMA Domain, is proposed to reduce the total cost. If a Mobile Node (MN moves to a Mobile Access Gateway (MAG-located boundary of an adjacent LMA domain, the MN changes itself into a virtual mode, and this movement will be assumed to be a part of the VLMA domain. In the proposed scheme, MAGs eliminate global binding updates for MNs between LMA domains and significantly reduce the packet loss and latency by eliminating the handoff between LMAs. In conclusion, the performance analysis results show that the proposed scheme improves performance significantly versus PMIPv6 and HMIPv6 in terms of the binding update rate per user and average handoff latency.

  10. Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer in PMIPv6 Networks for IP-Based Internet of Things.

    Science.gov (United States)

    Cho, Chulhee; Choi, Jae-Young; Jeong, Jongpil; Chung, Tai-Myoung

    2017-01-01

    Lately, we see that Internet of things (IoT) is introduced in medical services for global connection among patients, sensors, and all nearby things. The principal purpose of this global connection is to provide context awareness for the purpose of bringing convenience to a patient's life and more effectively implementing clinical processes. In health care, monitoring of biosignals of a patient has to be continuously performed while the patient moves inside and outside the hospital. Also, to monitor the accurate location and biosignals of the patient, appropriate mobility management is necessary to maintain connection between the patient and the hospital network. In this paper, a binding update scheme on PMIPv6, which reduces signal traffic during location updates by Virtual LMA (VLMA) on the top original Local Mobility Anchor (LMA) Domain, is proposed to reduce the total cost. If a Mobile Node (MN) moves to a Mobile Access Gateway (MAG)-located boundary of an adjacent LMA domain, the MN changes itself into a virtual mode, and this movement will be assumed to be a part of the VLMA domain. In the proposed scheme, MAGs eliminate global binding updates for MNs between LMA domains and significantly reduce the packet loss and latency by eliminating the handoff between LMAs. In conclusion, the performance analysis results show that the proposed scheme improves performance significantly versus PMIPv6 and HMIPv6 in terms of the binding update rate per user and average handoff latency.

  11. Multi-Layer Visualization of Mobile Mapping Data

    Directory of Open Access Journals (Sweden)

    D. Eggert

    2013-10-01

    Full Text Available application various different visualization schemes are conceivable. This paper presents a multi-layer based visualization method, enabling fast data browsing of mobile mapping data. In contrast to systems like Google Street View the proposed visualization does not base on 360° panoramas, but on colored point clouds projected on partially translucent images. Those images are rendered as overlapping textures, preserving the depth of the recorded data and still enabling fast rendering on any kind of platform. Furthermore the proposed visualization allows the user to inspect the mobile mapping data in a panoramic fashion with an immersive depth illusion using the parallax scrolling technic.

  12. A Novel Power-Saving Transmission Scheme for Multiple-Component-Carrier Cellular Systems

    Directory of Open Access Journals (Sweden)

    Yao-Liang Chung

    2016-04-01

    Full Text Available As mobile data traffic levels have increased exponentially, resulting in rising energy costs in recent years, the demand for and development of green communication technologies has resulted in various energy-saving designs for cellular systems. At the same time, recent technological advances have allowed multiple component carriers (CCs to be simultaneously utilized in a base station (BS, a development that has made the energy consumption of BSs a matter of increasing concern. To help address this concern, herein we propose a novel scheme aimed at efficiently minimizing the power consumption of BS transceivers during transmission, while still ensuring good service quality and fairness for users. Specifically, the scheme utilizes the dynamic activation/deactivation of CCs during data transmission to increase power usage efficiency. To test its effectiveness, the proposed scheme was applied to a model consisting of a BS with orthogonal frequency division multiple access-based CCs in a downlink transmission environment. The results indicated that, given periods of relatively light traffic loads, the total power consumption of the proposed scheme is significantly lower than that of schemes in which all the CCs of a BS are constantly activated, suggesting the scheme’s potential for reducing both energy costs and carbon dioxide emissions.

  13. Upstream pressure variations associated with the bow shock and their effects on the magnetosphere

    International Nuclear Information System (INIS)

    Fairfield, D.H.; Baumjohann, W.; Paschmann, G.; Luehr, H.; Sibeck, D.G.

    1990-01-01

    Magnetic field enhancements and depressions on the time scales of minutes were frequently observed simultaneously by the AMPTE CCE, GOES 5, and GOES 6 spacecraft in the subsolar magnetosphere. The source of these perturbations has been detected in the high time resolution AMPTE IRM measurements of the kinetic pressure of the solar wind upstream of the bow shock. It is argued that these upstream pressure variations are not inherent in the solar wind but rather are associated with the bow shock. This conclusion follows from the facts that (1) the upstream field strength and the density associated with the perturbations are highly correlated with each other whereas these quantities tend to be anticorrelated in the undisturbed solar wind, and (2) the upstream perturbations occur within the foreshock or at its boundary. The results imply a mode of interaction between the solar wind and the magnetosphere whereby density changes produced in the foreshock subsequently convect through the bow shock and impinge on the magnetosphere. Also velocity decreases deep within the foreshock sometimes reach many tens of kilometers per second and may be associated with further pressure variations as a changing interplanetary field direction changes the foreshock geometry. Upstream pressure perturbations should create significant effects on the magnetopause and at the foot of nearby field lines that lead to the polar cusp ionosphere

  14. A Public-key based Information Management Model for Mobile Agents

    OpenAIRE

    Rodriguez, Diego; Sobrado, Igor

    2000-01-01

    Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile a...

  15. Large eddy simulation of spray and combustion characteristics with realistic chemistry and high-order numerical scheme under diesel engine-like conditions

    International Nuclear Information System (INIS)

    Zhou, Lei; Luo, Kai Hong; Qin, Wenjin; Jia, Ming; Shuai, Shi Jin

    2015-01-01

    Highlights: • MUSCL differencing scheme in LES method is used to investigate liquid fuel spray and combustion process. • Using MUSCL can accurately capture the gas phase velocity distribution and liquid spray features. • Detailed chemistry mechanism with a parallel algorithm was used to calculate combustion process. • Increasing oxygen concentration can decrease ignition delay time and flame LOL. - Abstract: The accuracy of large eddy simulation (LES) for turbulent combustion depends on suitably implemented numerical schemes and chemical mechanisms. In the original KIVA3V code, finite difference schemes such as QSOU (Quasi-second-order upwind) and PDC (Partial Donor Cell Differencing) cannot achieve good results or even computational stability when using coarse grids due to large numerical diffusion. In this paper, the MUSCL (Monotone Upstream-centered Schemes for Conservation Laws) differencing scheme is implemented into KIVA3V-LES code to calculate the convective term. In the meantime, Lu’s n-heptane reduced 58-species mechanisms (Lu, 2011) is used to calculate chemistry with a parallel algorithm. Finally, improved models for spray injection are also employed. With these improvements, the KIVA3V-LES code is renamed as KIVALES-CP (Chemistry with Parallel algorithm) in this study. The resulting code was used to study the gas–liquid two phase jet and combustion under various diesel engine-like conditions in a constant volume vessel. The results show that using the MUSCL scheme can accurately capture the spray shape and fuel vapor penetration using even a coarse grid, in comparison with the Sandia experimental data. Similarly good results are obtained for three single-component fuels, i-Octane (C8H18), n-Dodecanese (C12H26), and n-Hexadecane (C16H34) with very different physical properties. Meanwhile the improved methodology is able to accurately predict ignition delay and flame lift-off length (LOL) under different oxygen concentrations from 10% to 21

  16. LDPC Decoding on GPU for Mobile Device

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2016-01-01

    Full Text Available A flexible software LDPC decoder that exploits data parallelism for simultaneous multicode words decoding on the mobile device is proposed in this paper, supported by multithreading on OpenCL based graphics processing units. By dividing the check matrix into several parts to make full use of both the local memory and private memory on GPU and properly modify the code capacity each time, our implementation on a mobile phone shows throughputs above 100 Mbps and delay is less than 1.6 millisecond in decoding, which make high-speed communication like video calling possible. To realize efficient software LDPC decoding on the mobile device, the LDPC decoding feature on communication baseband chip should be replaced to save the cost and make it easier to upgrade decoder to be compatible with a variety of channel access schemes.

  17. Multiple spacecraft observations of interplanetary shocks: characteristics of the upstream ulf turbulence

    International Nuclear Information System (INIS)

    Russell, C.T.; Smith, E.J.; Tsurutani, B.T.; Gosling, J.T.; Bame, S.J.

    1982-01-01

    All interplanetary shocks observed by ISEE-3 and either ISEE-1 or ISEE-2 or both in 1978 and 1979 are examined for evidence of upstream waves. In order to characterize the properties of these shocks it is necessary to determine accurate shock normals. We invert an overdetermined set of equations to obtain shock normals, velocities and error estimates for all these shocks. Tests of the method indicate it is quite reliable. Using these normals we then calculate the Mach number and angle between the interplanetary magnetic field and the shock normal for each shock. These parameters allow us to separate the upstream waves into two classes: whistler-mode precursors which occur at low Mach numbers and upstream turbulence whose amplitude at Mach numbers greater than 1.5 is controlled by the angle of the field to the shock normal. The former waves are right-hand circularly polarized and quite monochromatic. The latter waves are more linearly polarized and have a broadband featureless spectrum

  18. Biodiesel byproduct bioconversion to rhamnolipids: Upstream aspects.

    Science.gov (United States)

    Salazar-Bryam, Ana Maria; Lovaglio, Roberta Barros; Contiero, Jonas

    2017-06-01

    This study focused on two important aspects of the upstream process: the appropriate use of crude glycerol as a low-cost carbon source, and strain selection. The effect of different crude glycerol concentrations on rhamnolipid biosynthesis by two Pseudomonas aeruginosa strains (wild type LBI and mutant LBI 2A1) was studied. Finally, the synthesized rhamnolipids were characterized by mass spectrometry. When both strains were compared, 50 g/L was the most favorable concentration for both, but P. aeruginosa LBI 2A1 showed an increase in rhamnolipid production (2.55 g/L) of 192% over wild type (1.3 g/L). The higher rhamnolipid production could be related to a possible mechanism developed after the mutation process at high antibiotic concentrations. Mass spectrometry confirmed the glycolipid nature of the produced biosurfactant, and the homologue composition showed a wide mixture of mono and di-rhamnolipids. These results show that high glycerol concentrations can inhibit microbial metabolism, due to osmotic stress, leading to a better understanding of glycerol metabolism towards its optimization in fermentation media. Since P. aeruginosa LBI 2A1 showed higher conversion yields than P. aeruginosa LBI, the use of a mutant strain associated with a low cost carbon source might improve biosurfactant biosynthesis, therefore yielding an important upstream improvement.

  19. An Improved Forwarding of Diverse Events with Mobile Sinks in Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Raza, Waseem; Arshad, Farzana; Ahmed, Imran; Abdul, Wadood; Ghouzali, Sanaa; Niaz, Iftikhar Azim; Javaid, Nadeem

    2016-11-04

    In this paper, a novel routing strategy to cater the energy consumption and delay sensitivity issues in deep underwater wireless sensor networks is proposed. This strategy is named as ESDR: Event Segregation based Delay sensitive Routing. In this strategy sensed events are segregated on the basis of their criticality and, are forwarded to their respective destinations based on forwarding functions. These functions depend on different routing metrics like: Signal Quality Index, Localization free Signal to Noise Ratio, Energy Cost Function and Depth Dependent Function. The problem of incomparable values of previously defined forwarding functions causes uneven delays in forwarding process. Hence forwarding functions are redefined to ensure their comparable values in different depth regions. Packet forwarding strategy is based on the event segregation approach which forwards one third of the generated events (delay sensitive) to surface sinks and two third events (normal events) are forwarded to mobile sinks. Motion of mobile sinks is influenced by the relative distribution of normal nodes. We have also incorporated two different mobility patterns named as; adaptive mobility and uniform mobility for mobile sinks. The later one is implemented for collecting the packets generated by the normal nodes. These improvements ensure optimum holding time, uniform delay and in-time reporting of delay sensitive events. This scheme is compared with the existing ones and outperforms the existing schemes in terms of network lifetime, delay and throughput.

  20. Cross-Layer optimization of the packet loss rate in mobile videoconferencing applications

    OpenAIRE

    Rivera-Rodríguez, R.; Olivares-Domínguez, O. E.; Serrano-Santoyo, A.

    2010-01-01

    Videoconferencing transmission over wireless channels presents relevant challenges in mobile scenarios at vehicular speeds. Previous contributions are focused on the optimization of the transmission of multimedia and delay-sensitive applications over the forward link. In this paper, a new Quality of Service (QoS) parameter adaptation scheme is proposed. This scheme applies the Cross-Layer Design technique on the reverse link of an 1xEV-DO Revision 0 channel. As the wireless channel parameters...

  1. Torque fluctuations caused by upstream mean flow and turbulence

    Science.gov (United States)

    Farr, T. D.; Hancock, P. E.

    2014-12-01

    A series of studies are in progress investigating the effects of turbine-array-wake interactions for a range of atmospheric boundary layer states by means of the EnFlo meteorological wind tunnel. The small, three-blade model wind turbines drive 4-quadrant motor-generators. Only a single turbine in neutral flow is considered here. The motor-generator current can be measured with adequate sensitivity by means of a current sensor allowing the mean and fluctuating torque to be inferred. Spectra of torque fluctuations and streamwise velocity fluctuations ahead of the rotor, between 0.1 and 2 diameters, show that only the large-scale turbulent motions contribute significantly to the torque fluctuations. Time-lagged cross-correlation between upstream velocity and torque fluctuations are largest over the inner part of the blade. They also show the turbulence to be frozen in behaviour over the 2 diameters upstream of the turbine.

  2. An authentication scheme to healthcare security under wireless sensor networks.

    Science.gov (United States)

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  3. Ultra-high capacity WDM-SDM optical access network with self-homodyne detection downstream and 32QAM-FBMC upstream.

    Science.gov (United States)

    Feng, Zhenhua; Xu, Liang; Wu, Qiong; Tang, Ming; Fu, Songnian; Tong, Weijun; Shum, Perry Ping; Liu, Deming

    2017-03-20

    Towards 100G beyond large-capacity optical access networks, wavelength division multiplexing (WDM) techniques incorporating with space division multiplexing (SDM) and affordable spectrally efficient advanced modulation formats are indispensable. In this paper, we proposed and experimentally demonstrated a cost-efficient multicore fiber (MCF) based hybrid WDM-SDM optical access network with self-homodyne coherent detection (SHCD) based downstream (DS) and direct detection optical filter bank multi carrier (DDO-FBMC) based upstream (US). In the DS experiments, the inner core of the 7-core fiber is used as a dedicated channel to deliver the local oscillator (LO) lights while the other 6 outer cores are used to transmit 4 channels of wavelength multiplexed 200-Gb/s PDM-16QAM-OFDM signals. For US transmission, 4 wavelengths with channel spacing of 100 GHz are intensity modulated with 30 Gb/s 32-QAM-FBMC and directly detected by a ~7 GHz bandwidth receiver after transmission along one of the outer core. The results show that a 4 × 6 × 200-Gb/s DS transmission can be realized over 37 km 7-core fiber without carrier frequency offset (CFO) and phase noise (PN) compensation even using 10 MHz linewidth DFB lasers. The SHCD based on MCF provides a compromise and cost efficient scheme between conventional intradyne coherent detection and intensity modulation and direct detection (IM/DD) schemes. Both US and DS have acceptable BER performance and high spectral efficiency.

  4. Application-oriented offloading in heterogeneous networks for mobile cloud computing

    Science.gov (United States)

    Tseng, Fan-Hsun; Cho, Hsin-Hung; Chang, Kai-Di; Li, Jheng-Cong; Shih, Timothy K.

    2018-04-01

    Nowadays Internet applications have become more complicated that mobile device needs more computing resources for shorter execution time but it is restricted to limited battery capacity. Mobile cloud computing (MCC) is emerged to tackle the finite resource problem of mobile device. MCC offloads the tasks and jobs of mobile devices to cloud and fog environments by using offloading scheme. It is vital to MCC that which task should be offloaded and how to offload efficiently. In the paper, we formulate the offloading problem between mobile device and cloud data center and propose two algorithms based on application-oriented for minimum execution time, i.e. the Minimum Offloading Time for Mobile device (MOTM) algorithm and the Minimum Execution Time for Cloud data center (METC) algorithm. The MOTM algorithm minimizes offloading time by selecting appropriate offloading links based on application categories. The METC algorithm minimizes execution time in cloud data center by selecting virtual and physical machines with corresponding resource requirements of applications. Simulation results show that the proposed mechanism not only minimizes total execution time for mobile devices but also decreases their energy consumption.

  5. Collisionless shocks and upstream waves and particles: Introductory remarks

    International Nuclear Information System (INIS)

    Kennel, C.F.

    1981-01-01

    We discuss more aspects of collisionless shock theory that might be pertinent to the problem of upstream waves and particles. It is hoped that our qualititive remarks may be a useful guide for the general reader as he goes through the detailed papers to come

  6. Research on performance of upstream pumping mechanical seal with different deep spiral groove

    International Nuclear Information System (INIS)

    Wang, Q; Chen, H L; Liu, T; Liu, Y H; Liu, Z B; Liu, D H

    2012-01-01

    As one new type of mechanical seal, Upstream Pumping Mechanical Seal has been widely used in fluid machinery. In this paper, structure of spiral groove is innovatively optimized to improve performance of Upstream Pumping Mechanical Seal with Spiral Groove: keeping the dam zone and the weir zone not changed, changing the bottom shape of spiral groove only, substituting different deep spiral groove for equal deep spiral groove. The simulation on Upstream Pumping Mechanical Seal with different deep spiral grooves is done using FVM method. According to calculation, the performances of opening force and pressure distribution on seals face are obtained. Five types of spiral grooves are analyzed, namely equal deep spiral groove, circumferential convergent ladder-like different deep spiral groove, circumferential divergent ladder-like different deep spiral groove, radial convergent ladder-like different deep spiral groove and radial divergent ladder-like different deep spiral groove. This paper works on twenty-five working conditions. The results indicate the performances of circumferential divergent 2-ladder different deep spiral groove are better than the others, with more opening force and better stabilization, while with the same leakage. The outcome provides theoretical support for application of Upstream Pumping Mechanical Seal with circumferential convergent ladder-like different deep spiral groove.

  7. Research on performance of upstream pumping mechanical seal with different deep spiral groove

    Science.gov (United States)

    Wang, Q.; Chen, H. L.; Liu, T.; Liu, Y. H.; Liu, Z. B.; Liu, D. H.

    2012-11-01

    As one new type of mechanical seal, Upstream Pumping Mechanical Seal has been widely used in fluid machinery. In this paper, structure of spiral groove is innovatively optimized to improve performance of Upstream Pumping Mechanical Seal with Spiral Groove: keeping the dam zone and the weir zone not changed, changing the bottom shape of spiral groove only, substituting different deep spiral groove for equal deep spiral groove. The simulation on Upstream Pumping Mechanical Seal with different deep spiral grooves is done using FVM method. According to calculation, the performances of opening force and pressure distribution on seals face are obtained. Five types of spiral grooves are analyzed, namely equal deep spiral groove, circumferential convergent ladder-like different deep spiral groove, circumferential divergent ladder-like different deep spiral groove, radial convergent ladder-like different deep spiral groove and radial divergent ladder-like different deep spiral groove. This paper works on twenty-five working conditions. The results indicate the performances of circumferential divergent 2-ladder different deep spiral groove are better than the others, with more opening force and better stabilization, while with the same leakage. The outcome provides theoretical support for application of Upstream Pumping Mechanical Seal with circumferential convergent ladder-like different deep spiral groove.

  8. Identification of the first PAR1 deletion encompassing upstream SHOX enhancers in a family with idiopathic short stature.

    Science.gov (United States)

    Benito-Sanz, Sara; Aza-Carmona, Miriam; Rodríguez-Estevez, Amaya; Rica-Etxebarria, Ixaso; Gracia, Ricardo; Campos-Barros, Angel; Heath, Karen E

    2012-01-01

    Short stature homeobox-containing gene, MIM 312865 (SHOX) is located within the pseudoautosomal region 1 (PAR1) of the sex chromosomes. Mutations in SHOX or its downstream transcriptional regulatory elements represent the underlying molecular defect in ~60% of Léri-Weill dyschondrosteosis (LWD) and ~5-15% of idiopathic short stature (ISS) patients. Recently, three novel enhancer elements have been identified upstream of SHOX but to date, no PAR1 deletions upstream of SHOX have been observed that only encompass these enhancers in LWD or ISS patients. We set out to search for genetic alterations of the upstream SHOX regulatory elements in 63 LWD and 100 ISS patients with no known alteration in SHOX or the downstream enhancer regions using a specifically designed MLPA assay, which covers the PAR1 upstream of SHOX. An upstream SHOX deletion was identified in an ISS proband and her affected father. The deletion was confirmed and delimited by array-CGH, to extend ~286 kb. The deletion included two of the upstream SHOX enhancers without affecting SHOX. The 13.3-year-old proband had proportionate short stature with normal GH and IGF-I levels. In conclusion, we have identified the first PAR1 deletion encompassing only the upstream SHOX transcription regulatory elements in a family with ISS. The loss of these elements may result in SHOX haploinsufficiency because of decreased SHOX transcription. Therefore, this upstream region should be included in the routine analysis of PAR1 in patients with LWD, LMD and ISS.

  9. Problem solving in magnetic field: Animation in mobile application

    Science.gov (United States)

    Najib, A. S. M.; Othman, A. P.; Ibarahim, Z.

    2014-09-01

    This paper is focused on the development of mobile application for smart phone, Android, tablet, iPhone, and iPad as a problem solving tool in magnetic field. Mobile application designs consist of animations that were created by using Flash8 software which could be imported and compiled to prezi.com software slide. The Prezi slide then had been duplicated in Power Point format and instead question bank with complete answer scheme was also additionally generated as a menu in the application. Results of the published mobile application can be viewed and downloaded at Infinite Monkey website or at Google Play Store from your gadgets. Statistics of the application from Google Play Developer Console shows the high impact of the application usage in all over the world.

  10. Assessment of Climate Air Energy Regional Schemes in Burgundy and in Franche-Comte - Intermediate review on June 27, 2017. Burgundy Climate Air Energy Regional Scheme. Project, Scheme, Appendix to the SRCAE - Wind regional scheme of Burgundy, synthesis, opinion of the Burgundy CESER. Territorial Climate Energy Plan - Program of actions, Plenary session of the November 25, 2013. Climate Air Energy Regional Scheme - Franche-Comte SRCAE

    International Nuclear Information System (INIS)

    2011-09-01

    A first report proposes an assessment of the various aspects addressed by the Climate Air Energy Regional Schemes (SRCAE) of Burgundy and Franche-Comte: global aspects, and aspects related to adaptation to climate change, to air quality, to land planning, to the building sector, to mobility, to good transports, to agriculture, to forest, to industry and craft, to renewable energies, and to ecological responsibility. A synthetic presentation of the Burgundy scheme is proposed, and then an extended version which contains a description of the situation, an analysis of the regional potential, and a definition of orientations for the same above-mentioned aspects. A document more particularly addresses wind energy: role of wind energy in the energy mix of the region, role of small installations, wind energy potential, challenges and constraints (heritage and landscapes, natural environment, technical constraints), identification of areas of interest for wind energy projects, qualitative objectives. Documents published by the regional economic, social and environmental Council (CESER) of Burgundy are then proposed: a contribution to the Climate Air Energy Regional Scheme, a discussion and a presentation of a program of actions for the Climate Energy Territorial Plan (a large number of sheets of presentation of actions is proposed). The last document presents the Franche-Comte regional scheme: overview of regional knowledge on climate, air quality and environmental issues, challenges and potential per activity sector (transports and development, building, agriculture, industry, renewable energy production), definition of orientations and objectives for axes of action

  11. Multi-Layer Mobility Load Balancing in a Heterogeneous LTE Network

    DEFF Research Database (Denmark)

    Fotiadis, Panagiotis; Polignano, Michele; Laselva, Daniela

    2012-01-01

    This paper analyzes the behavior of a distributed Mobility Load Balancing (MLB) scheme in a multi-layer 3GPP (3rd Generation Partnership Project) Long Term Evolution (LTE) deployment with different User Equipment (UE) densities in certain network areas covered with pico cells. Target of the study...

  12. Biodiesel byproduct bioconversion to rhamnolipids: Upstream aspects

    OpenAIRE

    Salazar-Bryam, Ana Maria; Lovaglio, Roberta Barros; Contiero, Jonas

    2017-01-01

    This study focused on two important aspects of the upstream process: the appropriate use of crude glycerol as a low-cost carbon source, and strain selection. The effect of different crude glycerol concentrations on rhamnolipid biosynthesis by two Pseudomonas aeruginosa strains (wild type LBI and mutant LBI 2A1) was studied. Finally, the synthesized rhamnolipids were characterized by mass spectrometry. When both strains were compared, 50 g/L was the most favorable concentration for both, but P...

  13. Towards a Fraud-Prevention Framework for Software Defined Radio Mobile Devices

    Directory of Open Access Journals (Sweden)

    Brawerman Alessandro

    2005-01-01

    Full Text Available The superior reconfigurability of software defined radio mobile devices has made it the most promising technology on the wireless network and in the communication industry. Despite several advantages, there are still a lot to discuss regarding security, for instance, the radio configuration data download, storage and installation, user's privacy, and cloning. The objective of this paper is to present a fraud-prevention framework for software defined radio mobile devices that enhances overall security through the use of new pieces of hardware, modules, and protocols. The framework offers security monitoring against malicious attacks and viruses, protects sensitive information, creates and protects an identity for the system, employs a secure protocol for radio configuration download, and finally, establishes an anticloning scheme, which besides guaranteeing that no units can be cloned over the air, also elevates the level of difficulty to clone units if the attacker has physical access to the mobile device. Even if cloned units exist, the anticloning scheme is able to identify and deny services to those units. Preliminary experiments and proofs that analyze the correctness of the fraud-prevention framework are also presented.

  14. Employee assistance programs in the upstream petroleum industry

    International Nuclear Information System (INIS)

    Crutcher, R.A.; Yip, R.Y.; Young, M.R.

    1991-01-01

    This paper is a descriptive overview of Employee Assistance Programs (EAPs) in the upstream Canadian petroleum industry. The authors review current EAP models within the occupational health setting and the Canadian health care context. This article also explores the challenging issues of EAP's emergent functions in workplace substance abuse programs, its changing role in organizational effectiveness and its professional identity

  15. Motion Planning for Omnidirectional Wheeled Mobile Robot by Potential Field Method

    Directory of Open Access Journals (Sweden)

    Weihao Li

    2017-01-01

    Full Text Available In this paper, potential field method has been used to navigate a three omnidirectional wheels’ mobile robot and to avoid obstacles. The potential field method is used to overcome the local minima problem and the goals nonreachable with obstacles nearby (GNRON problem. For further consideration, model predictive control (MPC has been used to incorporate motion constraints and make the velocity more realistic and flexible. The proposed method is employed based on the kinematic model and dynamics model of the mobile robot in this paper. To show the performance of proposed control scheme, simulation studies have been carried to perform the motion process of mobile robot in specific workplace.

  16. Oman: Current status, upstream and export developments, investment opportunities

    International Nuclear Information System (INIS)

    Skeet, I.

    1994-01-01

    Oil production in Oman has consistently increased since 1980 to reach its current level of ca 800,000 bbl/d. Reserves total ca 5 billion bbl and gas reserves are over 20 trillion ft 3 , of which a third is being dedicated for export. The main operator is Petroleum Development Oman (PDO), which is 60% owned by the Omani government. Some production areas are taken up by other companies under production sharing contracts. Gas is used for local industrial purposes and a third of gas reserves are being dedicated to a liquefied natural gas export scheme planned to be on-stream by 2000. The government has been seeking foreign investment and increasing private-sector participation, an example being a Belgian-Omani consortium to construct a 100-MW gas-fired power station. However, opportunities for investing in the upstream oil/gas sector are limited since most prospective areas have already been taken up. The economic, political, and social problems which may affect future investment are discussed. Oman is essentially a one-resource economy and declines in oil prices have led to widening government deficits. Social expectations created by the oil-financed welfare state make it difficult for government expenditures to be cut back. There is lack of public debate in the state-controlled media and no public participation in policy and decision making. There is a perception of widening corruption in government and a nascent movement toward a more rigid Islamic view of society. Controls are needed to maintain a reasonable balance between oil revenues and public expenditures, while pressures from an increasingly literate and numerous population will demand changes to the traditional autocratic system of government. 5 figs., 2 tabs

  17. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    Science.gov (United States)

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  18. Biodiesel byproduct bioconversion to rhamnolipids: Upstream aspects

    Directory of Open Access Journals (Sweden)

    Ana Maria Salazar-Bryam

    2017-06-01

    Full Text Available This study focused on two important aspects of the upstream process: the appropriate use of crude glycerol as a low-cost carbon source, and strain selection. The effect of different crude glycerol concentrations on rhamnolipid biosynthesis by two Pseudomonas aeruginosa strains (wild type LBI and mutant LBI 2A1 was studied. Finally, the synthesized rhamnolipids were characterized by mass spectrometry. When both strains were compared, 50 g/L was the most favorable concentration for both, but P. aeruginosa LBI 2A1 showed an increase in rhamnolipid production (2.55 g/L of 192% over wild type (1.3 g/L. The higher rhamnolipid production could be related to a possible mechanism developed after the mutation process at high antibiotic concentrations. Mass spectrometry confirmed the glycolipid nature of the produced biosurfactant, and the homologue composition showed a wide mixture of mono and di-rhamnolipids. These results show that high glycerol concentrations can inhibit microbial metabolism, due to osmotic stress, leading to a better understanding of glycerol metabolism towards its optimization in fermentation media. Since P. aeruginosa LBI 2A1 showed higher conversion yields than P. aeruginosa LBI, the use of a mutant strain associated with a low cost carbon source might improve biosurfactant biosynthesis, therefore yielding an important upstream improvement. Keywords: Biotechnology, Microbiology

  19. Tracking- and Scintillation-Aware Channel Model for GEO Satellite to Land Mobile Terminals at Ku-Band

    Directory of Open Access Journals (Sweden)

    Ali M. Al-Saegh

    2015-01-01

    Full Text Available Recent advances in satellite to land mobile terminal services and technologies, which utilize high frequencies with directional antennas, have made the design of an appropriate model for land mobile satellite (LMS channels a necessity. This paper presents LMS channel model at Ku-band with features that enhance accuracy, comprehensiveness, and reliability. The effect of satellite tracking loss at different mobile terminal speeds is considered for directional mobile antenna systems, a reliable tropospheric scintillation model for an LMS scenario at tropical and temperate regions is presented, and finally a new quality indicator module for different modulation and coding schemes is included. The proposed extended LMS channel (ELMSC model is designed based on actual experimental measurements and can be applied to narrow- and wide-band signals at different regions and at different speeds and multichannel states. The proposed model exhibits lower root mean square error (RMSE and significant performance observation compared with the conventional model in terms of the signal fluctuations, fade depth, signal-to-noise ratio (SNR, and quality indicators accompanied for several transmission schemes.

  20. Increased risk of oesophageal adenocarcinoma among upstream petroleum workers

    Science.gov (United States)

    Kirkeleit, Jorunn; Riise, Trond; Bjørge, Tone; Moen, Bente E; Bråtveit, Magne; Christiani, David C

    2013-01-01

    Objectives To investigate cancer risk, particularly oesophageal cancer, among male upstream petroleum workers offshore potentially exposed to various carcinogenic agents. Methods Using the Norwegian Registry of Employers and Employees, 24 765 male offshore workers registered from 1981 to 2003 was compared with 283 002 male referents from the general working population matched by age and community of residence. The historical cohort was linked to the Cancer Registry of Norway and the Norwegian Cause of Death Registry. Results Male offshore workers had excess risk of oesophageal cancer (RR 2.6, 95% CI 1.4 to 4.8) compared with the reference population. Only the adenocarcinoma type had a significantly increased risk (RR 2.7, 95% CI 1.0 to 7.0), mainly because of an increased risk among upstream operators (RR 4.3, 95% CI 1.3 to 14.5). Upstream operators did not have significant excess of respiratory system or colon cancer or mortality from any other lifestyle-related diseases investigated. Conclusion We found a fourfold excess risk of oesophageal adenocarcinoma among male workers assumed to have had the most extensive contact with crude oil. Due to the small number of cases, and a lack of detailed data on occupational exposure and lifestyle factors associated with oesophageal adenocarcinoma, the results must be interpreted with caution. Nevertheless, given the low risk of lifestyle-related cancers and causes of death in this working group, the results add to the observations in other low-powered studies on oesophageal cancer, further suggesting that factors related to the petroleum stream or carcinogenic agents used in the production process might be associated with risk of oesophageal adenocarcinoma. PMID:19858535

  1. Development of a 3D cell-centered Lagrangian scheme for the numerical modeling of the gas dynamics and hyper-elasticity systems

    International Nuclear Information System (INIS)

    Georges, Gabriel

    2016-01-01

    High Energy Density Physics (HEDP) flows are multi-material flows characterized by strong shock waves and large changes in the domain shape due to rare faction waves. Numerical schemes based on the Lagrangian formalism are good candidates to model this kind of flows since the computational grid follows the fluid motion. This provides accurate results around the shocks as well as a natural tracking of multi-material interfaces and free-surfaces. In particular, cell-centered Finite Volume Lagrangian schemes such as GLACE (Godunov-type Lagrangian scheme Conservative for total Energy) and EUCCLHYD (Explicit Unstructured Cell-Centered Lagrangian Hydrodynamics) provide good results on both the modeling of gas dynamics and elastic-plastic equations. The work produced during this PhD thesis is in continuity with the work of Maire and Nkonga [JCP, 2009] for the hydrodynamic part and the work of Kluth and Despres [JCP, 2010] for the hyper elasticity part. More precisely, the aim of this thesis is to develop robust and accurate methods for the 3D extension of the EUCCLHYD scheme with a second-order extension based on MUSCL (Monotonic Upstream-centered Scheme for Conservation Laws) and GRP (Generalized Riemann Problem) procedures. A particular care is taken on the preservation of symmetries and the monotonicity of the solutions. The scheme robustness and accuracy are assessed on numerous Lagrangian test cases for which the 3D extensions are very challenging. (author) [fr

  2. LiteNet: Lightweight Neural Network for Detecting Arrhythmias at Resource-Constrained Mobile Devices

    Directory of Open Access Journals (Sweden)

    Ziyang He

    2018-04-01

    Full Text Available By running applications and services closer to the user, edge processing provides many advantages, such as short response time and reduced network traffic. Deep-learning based algorithms provide significantly better performances than traditional algorithms in many fields but demand more resources, such as higher computational power and more memory. Hence, designing deep learning algorithms that are more suitable for resource-constrained mobile devices is vital. In this paper, we build a lightweight neural network, termed LiteNet which uses a deep learning algorithm design to diagnose arrhythmias, as an example to show how we design deep learning schemes for resource-constrained mobile devices. Compare to other deep learning models with an equivalent accuracy, LiteNet has several advantages. It requires less memory, incurs lower computational cost, and is more feasible for deployment on resource-constrained mobile devices. It can be trained faster than other neural network algorithms and requires less communication across different processing units during distributed training. It uses filters of heterogeneous size in a convolutional layer, which contributes to the generation of various feature maps. The algorithm was tested using the MIT-BIH electrocardiogram (ECG arrhythmia database; the results showed that LiteNet outperforms comparable schemes in diagnosing arrhythmias, and in its feasibility for use at the mobile devices.

  3. LiteNet: Lightweight Neural Network for Detecting Arrhythmias at Resource-Constrained Mobile Devices.

    Science.gov (United States)

    He, Ziyang; Zhang, Xiaoqing; Cao, Yangjie; Liu, Zhi; Zhang, Bo; Wang, Xiaoyan

    2018-04-17

    By running applications and services closer to the user, edge processing provides many advantages, such as short response time and reduced network traffic. Deep-learning based algorithms provide significantly better performances than traditional algorithms in many fields but demand more resources, such as higher computational power and more memory. Hence, designing deep learning algorithms that are more suitable for resource-constrained mobile devices is vital. In this paper, we build a lightweight neural network, termed LiteNet which uses a deep learning algorithm design to diagnose arrhythmias, as an example to show how we design deep learning schemes for resource-constrained mobile devices. Compare to other deep learning models with an equivalent accuracy, LiteNet has several advantages. It requires less memory, incurs lower computational cost, and is more feasible for deployment on resource-constrained mobile devices. It can be trained faster than other neural network algorithms and requires less communication across different processing units during distributed training. It uses filters of heterogeneous size in a convolutional layer, which contributes to the generation of various feature maps. The algorithm was tested using the MIT-BIH electrocardiogram (ECG) arrhythmia database; the results showed that LiteNet outperforms comparable schemes in diagnosing arrhythmias, and in its feasibility for use at the mobile devices.

  4. An Attention-Information-Based Spatial Adaptation Framework for Browsing Videos via Mobile Devices

    Directory of Open Access Journals (Sweden)

    Li Houqiang

    2007-01-01

    Full Text Available With the growing popularity of personal digital assistant devices and smart phones, more and more consumers are becoming quite enthusiastic to appreciate videos via mobile devices. However, limited display size of the mobile devices has been imposing significant barriers for users to enjoy browsing high-resolution videos. In this paper, we present an attention-information-based spatial adaptation framework to address this problem. The whole framework includes two major parts: video content generation and video adaptation system. During video compression, the attention information in video sequences will be detected using an attention model and embedded into bitstreams with proposed supplement-enhanced information (SEI structure. Furthermore, we also develop an innovative scheme to adaptively adjust quantization parameters in order to simultaneously improve the quality of overall encoding and the quality of transcoding the attention areas. When the high-resolution bitstream is transmitted to mobile users, a fast transcoding algorithm we developed earlier will be applied to generate a new bitstream for attention areas in frames. The new low-resolution bitstream containing mostly attention information, instead of the high-resolution one, will be sent to users for display on the mobile devices. Experimental results show that the proposed spatial adaptation scheme is able to improve both subjective and objective video qualities.

  5. Capacity of Heterogeneous Mobile Wireless Networks with D-Delay Transmission Strategy.

    Science.gov (United States)

    Wu, Feng; Zhu, Jiang; Xi, Zhipeng; Gao, Kai

    2016-03-25

    This paper investigates the capacity problem of heterogeneous wireless networks in mobility scenarios. A heterogeneous network model which consists of n normal nodes and m helping nodes is proposed. Moreover, we propose a D-delay transmission strategy to ensure that every packet can be delivered to its destination nodes with limited delay. Different from most existing network schemes, our network model has a novel two-tier architecture. The existence of helping nodes greatly improves the network capacity. Four types of mobile networks are studied in this paper: i.i.d. fast mobility model and slow mobility model in two-dimensional space, i.i.d. fast mobility model and slow mobility model in three-dimensional space. Using the virtual channel model, we present an intuitive analysis of the capacity of two-dimensional mobile networks and three-dimensional mobile networks, respectively. Given a delay constraint D, we derive the asymptotic expressions for the capacity of the four types of mobile networks. Furthermore, the impact of D and m to the capacity of the whole network is analyzed. Our findings provide great guidance for the future design of the next generation of networks.

  6. Differential signaling spread-spectrum modulation of the LED visible light wireless communications using a mobile-phone camera

    Science.gov (United States)

    Chen, Shih-Hao; Chow, Chi-Wai

    2015-02-01

    Visible light communication (VLC) using spread spectrum modulation (SSM) and differential signaling (DS), detected by a mobile-phone camera is proposed and demonstrated for the first time to provide high immunity to background ambient light interference. The SSM signal provides the coding gain while the DS scheme enhances the clock recovery particular under high background ambient light. Experiment results confirm the feasibility of the proposed scheme, showing that the proposed system has 6-dB gain comparing with the traditional on-off keying (OOK) modulation under background ambient light of 3000 lux. The direct incident ambient light to the mobile-phone camera is 520 lux.

  7. Wind Predictions Upstream Wind Turbines from a LiDAR Database

    Directory of Open Access Journals (Sweden)

    Soledad Le Clainche

    2018-03-01

    Full Text Available This article presents a new method to predict the wind velocity upstream a horizontal axis wind turbine from a set of light detection and ranging (LiDAR measurements. The method uses higher order dynamic mode decomposition (HODMD to construct a reduced order model (ROM that can be extrapolated in space. LiDAR measurements have been carried out upstream a wind turbine at six different planes perpendicular to the wind turbine axis. This new HODMD-based ROM predicts with high accuracy the wind velocity during a timespan of 24 h in a plane of measurements that is more than 225 m far away from the wind turbine. Moreover, the technique introduced is general and obtained with an almost negligible computational cost. This fact makes it possible to extend its application to both vertical axis wind turbines and real-time operation.

  8. Utilization of symmetrical components in a communication-assisted protection scheme for radial MV feeders with variable or reduced short-circuit currents

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Bak, Claus Leth; Blaabjerg, Frede

    2017-01-01

    because the fault current is significantly lower in the islanded mode compared to the grid-connected mode and consequently a single set of settings for the OC relays is not sufficient. This paper propose a communication-assisted protection scheme that is able to operate correctly in a radial Medium...... over positive-sequence current, while the relays placed downstream the fault detect a zero magnitude for their corresponding ratios. Protection relays calculate the magnitude of the proposed ratio and then exchange the obtained value with the adjacent upstream relays using communication. Therefore......, each relay would have access to its own ratio and to the ratio provided by the adjacent relay. Finally, the relay with the highest calculated magnitude of the ratio of zero-sequence to positive-sequence current will trip, thus clearing the fault. The new protection scheme is implemented in a test...

  9. Game Theoretic Analysis of Cooperative Message Forwarding in Opportunistic Mobile Networks.

    Science.gov (United States)

    Pal, Sujata; Saha, Barun Kumar; Misra, Sudip

    2017-12-01

    In cooperative communication, a set of players forming a coalition ensures communal behavior among themselves by helping one another in message forwarding. Opportunistic mobile networks (OMNs) require multihop communications for transferring messages from the source to the destination nodes. However, noncooperative nodes only forward their own messages to others, and drop others' messages upon receiving them. So, the message delivery overhead increases in OMN. For minimizing the overhead and maximizing the delivery rate, we propose two coalition-based cooperative schemes: 1) simple coalition formation (SCF) and 2) overlapping coalition formation (OCF) game. In SCF, we consider the presence of a central information center, whereas OCF is a fully distributed scheme. In SCF, coalitions are disjoint, whereas in OCF, a node may be the member of multiple coalitions at the same time. All nodes in a coalition help each other cooperatively by forwarding group messages to the intermediate or destination nodes. The goal of the nodes is to achieve high success rate in delivering messages. The proposed SCF scheme is cohesive, in which disjoint coalitions always combine to form grand coalition. In OCF, a node reaches a stable grand coalition when all the nodes of the OMN are members of overlapping coalition of the node. No node gains by deviating from the grand coalition in SCF and OCF. Simulation results based on synthetic mobility model and real-life traces show that the message delivery ratio of OMNs increase by up to 67%, as compared to the noncooperative scenario. Moreover, the message overhead ratio using the proposed coalition-based schemes reduces by up to about (1/3)rd of that of the noncooperative communication scheme.

  10. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  11. A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach

    Directory of Open Access Journals (Sweden)

    Qiao Liu

    2017-01-01

    Full Text Available Security issue has been considered as one of the most pivotal aspects for the fifth-generation mobile network (5G due to the increasing demands of security service as well as the growing occurrence of security threat. In this paper, instead of focusing on the security architecture in the upper layer, we investigate the secure transmission for a basic channel model in a heterogeneous network, that is, two-way relay channels. By exploiting the properties of the transmission medium in the physical layer, we propose a novel secure scheme for the aforementioned channel mode. With precoding design, the proposed scheme is able to achieve a high transmission efficiency as well as security. Two different approaches have been introduced: information theoretical approach and physical layer encryption approach. We show that our scheme is secure under three different adversarial models: (1 untrusted relay attack model, (2 trusted relay with eavesdropper attack model, and (3 untrusted relay with eavesdroppers attack model. We also derive the secrecy capacity of the two different approaches under the three attacks. Finally, we conduct three simulations of our proposed scheme. The simulation results agree with the theoretical analysis illustrating that our proposed scheme could achieve a better performance than the existing schemes.

  12. Canada's upstream petroleum industry : 1997 perspective

    International Nuclear Information System (INIS)

    1997-06-01

    A review of the trends and activities in the upstream petroleum industry during 1996 were presented, emphasizing the significance of the industry' contribution to Canada's economy. Among the areas included were highlights of Canada's hydrocarbon reserves, conventional production, frontier production, and non-conventional (oil sands) production. New market opportunities and activities in the pipeline transportation sector were also discussed. Environmental issues including health and safety received due attention. In this regard, the industry's efforts to work with government and other stakeholders to ensure that requirements for land use are balanced with the need to protect wilderness and wildlife habitat, received special mention. 16 figs

  13. How downstream sub-basins depend on upstream inflows to avoid scarcity: typology and global analysis of transboundary rivers

    Science.gov (United States)

    Munia, Hafsa Ahmed; Guillaume, Joseph H. A.; Mirumachi, Naho; Wada, Yoshihide; Kummu, Matti

    2018-05-01

    Countries sharing river basins are often dependent upon water originating outside their boundaries; meaning that without that upstream water, water scarcity may occur with flow-on implications for water use and management. We develop a formalisation of this concept drawing on ideas about the transition between regimes from resilience literature, using water stress and water shortage as indicators of water scarcity. In our analytical framework, dependency occurs if water from upstream is needed to avoid scarcity. This can be diagnosed by comparing different types of water availability on which a sub-basin relies, in particular local runoff and upstream inflows. At the same time, possible upstream water withdrawals reduce available water downstream, influencing the latter water availability. By developing a framework of scarcity and dependency, we contribute to the understanding of transitions between system regimes. We apply our analytical framework to global transboundary river basins at the scale of sub-basin areas (SBAs). Our results show that 1175 million people live under water stress (42 % of the total transboundary population). Surprisingly, the majority (1150 million) of these currently suffer from stress only due to their own excessive water use and possible water from upstream does not have impact on the stress status - i.e. they are not yet dependent on upstream water to avoid stress - but could still impact on the intensity of the stress. At the same time, 386 million people (14 %) live in SBAs that can avoid stress owing to available water from upstream and have thus upstream dependency. In the case of water shortage, 306 million people (11 %) live in SBAs dependent on upstream water to avoid possible shortage. The identification of transitions between system regimes sheds light on how SBAs may be affected in the future, potentially contributing to further refined analysis of inter- and intrabasin hydro-political power relations and strategic planning

  14. Environmental regulatory framework for the upstream petroleum industry

    International Nuclear Information System (INIS)

    1996-01-01

    In order to provide its member companies with a useful reference document in environmental analysis and compliance, CAPP compiled a list of Canadian legislation, regulations and guidelines which relate to the upstream petroleum industry. Text of all federal, Alberta, British Columbia and Saskatchewan legislation, regulations, guidelines and related documents were provided. Pending legislation, regulations and government policy have been identified. Annual updates will be provided to all subscribers

  15. Effects on the upstream flood inundation caused from the operation of Chao Phraya Dam

    Directory of Open Access Journals (Sweden)

    Sutham Visutimeteegorn

    2007-11-01

    Full Text Available During the flooding events, the operation of Chao Phraya Dam to control downstream water discharge is one of the causes of the inundation occuring over the upstream area. The purposes of this research are to study the effects of the operation of Chao Phraya Dam upon the upstream flood inundation and to find out the new measures of the flood mitigation in the upstream areas of Chao Phraya Dam by using a hydrodynamic model. The results show that Manning's n in the Chao Phraya River and its tributaries is 0.030-0.035 in the main channels and 0.050-0.070 in the flood plain areas. The backwater due to the operation of the Chao Praya dam affects as far as 110 kilometers upstream. New methods of water diversion can mitigate the flood inundation without the effect on the floating rice fields. The construction of reservoirs in the Upper Sakaekang River Basin and the Upper Yom River Basin will mitigate the flood not only in their own basins but also in the Lower Chao Phraya River Basin. The coordinated operation of the Chao Phraya Dam, the regulators and the upper basin reservoirs will efficiently mitigate the flood inundation.

  16. HH-MIP: An Enhancement of Mobile IP by Home Agent Handover

    Directory of Open Access Journals (Sweden)

    Yang Chun-Chuan

    2010-01-01

    Full Text Available We propose an enhancement of Mobile IP (MIP called MIP with Home Agent Handover (HH-MIP to enjoy most of the advantages of Route Optimization MIP (ROMIP but with only a small increase of signaling overhead. In HH-MIP, the concept of Temporary HA (THA is proposed and the mobile host (MH registers the new CoA with its THA rather than its original HA. Since the THA of an MH is selected to be close to the current location of MH, HH-MIP reduces the handoff latency and shortens the signaling path of registration as well. Moreover, HH-MIP adopts an aggressive approach in selecting THA for an MH, that is, whenever an MH is moving away from its HA or previous THA, the MH triggers the handover of THA. Theoretical analysis demonstrates that the proposed scheme enjoys small handoff latency as well as routing efficiency, and the signaling cost of the proposed scheme is significantly less than that in ROMIP.

  17. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  18. A cooperative online learning scheme for resource allocation in 5G systems

    KAUST Repository

    Alqerm, Ismail; Shihada, Basem

    2016-01-01

    The demand on mobile Internet related services has increased the need for higher bandwidth in cellular networks. The 5G technology is envisioned as a solution to satisfy this demand as it provides high data rates and scalable bandwidth. The multi-tier heterogeneous structure of 5G with dense base station deployment, relays, and device-to-device (D2D) communications intends to serve users with different QoS requirements. However, the multi-tier structure causes severe interference among the multi-tier users which further complicates the resource allocation problem. In this paper, we propose a cooperative scheme to tackle the interference problem, including both cross-tier interference that affects macro users from other tiers and co-tier interference, which is among users belong to the same tier. The scheme employs an online learning algorithm for efficient spectrum allocation with power and modulation adaptation capability. Our evaluation results show that our online scheme outperforms others and achieves significant improvements in throughput, spectral efficiency, fairness, and outage ratio. © 2016 IEEE.

  19. A cooperative online learning scheme for resource allocation in 5G systems

    KAUST Repository

    Alqerm, Ismail

    2016-07-26

    The demand on mobile Internet related services has increased the need for higher bandwidth in cellular networks. The 5G technology is envisioned as a solution to satisfy this demand as it provides high data rates and scalable bandwidth. The multi-tier heterogeneous structure of 5G with dense base station deployment, relays, and device-to-device (D2D) communications intends to serve users with different QoS requirements. However, the multi-tier structure causes severe interference among the multi-tier users which further complicates the resource allocation problem. In this paper, we propose a cooperative scheme to tackle the interference problem, including both cross-tier interference that affects macro users from other tiers and co-tier interference, which is among users belong to the same tier. The scheme employs an online learning algorithm for efficient spectrum allocation with power and modulation adaptation capability. Our evaluation results show that our online scheme outperforms others and achieves significant improvements in throughput, spectral efficiency, fairness, and outage ratio. © 2016 IEEE.

  20. Observations of two distinct populations of bow shock ions in the upstream solar wind

    International Nuclear Information System (INIS)

    Gosling, J.T.; Asbridge, J.; Bame, S.J.; Paschmann, G.; Sckopke, N.

    1978-01-01

    Observations upstream of the earth's bow shock with the LASL/MPI fast plasma experiments on ISEE 1 and 2 reveal the presence of two distinct and mutually exclusive populations of low energy (< or approx. =40keV) ions apparently accelerated at the bow shock. The first of these, the ''reflected'' population, is characterized by 1) sharply peaked spectra seldom extending much above approx. 10 keV/ion and 2) relatively collimated flow coming from the direction of the shock. On the other hand, the ''diffuse'' ions are distinguished by relatively flat energy spectra above approx. 10 keV and broad angular distributions. They are by far the most commonly observed upstream ion event. A close causal association is suggested between the diffuse ion population in the upstream solar wind and energetic plasma ions observed within the magnetosheath

  1. MESSENGER Magnetic Field Observations of Upstream Ultra-Low Frequency Waves at Mercury

    Science.gov (United States)

    Le, G.; Chi, P. J.; Boardsen, S.; Blanco-Cano, X.; Anderosn, B. J.; Korth, H.

    2012-01-01

    The region upstream from a planetary bow shock is a natural plasma laboratory containing a variety of wave particle phenomena. The study of foreshocks other than the Earth's is important for extending our understanding of collisionless shocks and foreshock physics since the bow shock strength varies with heliocentric distance from the Sun, and the sizes of the bow shocks are different at different planets. The Mercury's bow shock is unique in our solar system as it is produced by low Mach number solar wind blowing over a small magnetized body with a predominately radial interplanetary magnetic field. Previous observations of Mercury upstream ultra-low frequency (ULF) waves came exclusively from two Mercury flybys of Mariner 10. The MESSENGER orbiter data enable us to study of upstream waves in the Mercury's foreshock in depth. This paper reports an overview of upstream ULF waves in the Mercury's foreshock using high-time resolution magnetic field data, 20 samples per second, from the MESSENGER spacecraft. The most common foreshock waves have frequencies near 2 Hz, with properties similar to the I-Hz waves in the Earth's foreshock. They are present in both the flyby data and in every orbit of the orbital data we have surveyed. The most common wave phenomenon in the Earth's foreshock is the large-amplitude 30-s waves, but similar waves at Mercury have frequencies at near 0.1 Hz and occur only sporadically with short durations (a few wave cycles). Superposed on the "30-s" waves, there are spectral peaks at near 0.6 Hz, not reported previously in Mariner 10 data. We will discuss wave properties and their occurrence characteristics in this paper.

  2. Exergame Grading Scheme: Concept Development and Preliminary Psychometric Evaluations in Cancer Survivors

    Directory of Open Access Journals (Sweden)

    Hsiao-Lan Wang

    2017-01-01

    Full Text Available The challenge of using exergames to promote physical activity among cancer survivors lies in the selection of the exergames that match their fitness level. There is a need for a standardized grading scheme by which to judge an exergame’s capacity to address specific physical fitness attributes with different levels of physical engagement. The study aimed to develop an Exergame Grading Scheme and preliminarily evaluate its psychometric properties. Fourteen (14 items were created from the human movement and exergame literature. The content validity index (CVI was rated by content experts with two consecutive rounds (N=5 and N=3 independently. The interrater reliability (IRR was determined by two raters who used the Exergame Grading Scheme to determine the grading score of the five exergames performed by two cancer survivors (N=10. Each item had a score of 1 for item-level CVI and 1 for k. For IRR, 9 items had rho values of 1, 1 item had 0.93, and 4 items had between 0.80 and 0.89. This valid and reliable Exergame Grading Scheme makes it possible to develop a personalized physical activity program using any type of exergame or fitness mobile application in rehabilitation practice to meet the needs of cancer survivors.

  3. EMMPRIN, an upstream regulator of MMPs, in CNS biology.

    Science.gov (United States)

    Kaushik, Deepak Kumar; Hahn, Jennifer Nancy; Yong, V Wee

    2015-01-01

    Matrix metalloproteinases (MMPs) are engaged in pathologies associated with infections, tumors, autoimmune disorders and neurological dysfunctions. With the identification of an upstream regulator of MMPs, EMMPRIN (Extracellular matrix metalloproteinase inducer, CD147), it is relevant to address if EMMPRIN plays a role in the pathology of central nervous system (CNS) diseases. This would enable the possibility of a more upstream and effective therapeutic target. Indeed, conditions including gliomas, Alzheimer's disease (AD), multiple sclerosis (MS), and other insults such as hypoxia/ischemia show elevated levels of EMMPRIN which correlate with MMP production. In contrast, given EMMPRIN's role in CNS homeostasis with respect to regulation of monocarboxylate transporters (MCTs) and interactions with adhesion molecules including integrins, we need to consider that EMMPRIN may also serve important regulatory or protective functions. This review summarizes the current understanding of EMMPRIN's involvement in CNS homeostasis, its possible roles in escalating or reducing neural injury, and the mechanisms of EMMPRIN including and apart from MMP induction. Copyright © 2015 International Society of Matrix Biology. Published by Elsevier B.V. All rights reserved.

  4. Upstream Tracking and the Decay $B^{0} \\to K^{+}\\pi^{-}\\mu^{+}\\mu^{-}$ at the LHCb Experiment

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00388407; Serra, Nicola; Steinkamp, Olaf; Storaci, Barbara

    The LHCb detector is a single-arm forward spectrometer covering the pseudorapidity range $2 < \\eta < 5$, designed to search for indirect evidence of New Physics in $C\\!P$ violation and rare decays of beauty and charm hadrons. The unique geometry takes advantage of the large $b$ and $c$ quark production in the forward region at the LHC. The detector includes a high granularity silicon-strip vertex detector, a silicon-strip detector upstream of the magnet and three stations of silicon-strip detectors and straw drift tubes downstream of the magnet. This thesis is divided into two main parts. The first part details the development of improved algorithms to perform track reconstruction using the sub-detectors upstream of the LHCb magnet. A novel idea to perform upstream tracking as an intermediate step of the track reconstruction sequence was investigated. The vast gains in tracking performance obtained when using upstream tracks led to the algorithm being adopted into the default reconstruction sequence for...

  5. Design and recognition of artificial landmarks for reliable indoor self-localization of mobile robots

    Directory of Open Access Journals (Sweden)

    Xu Zhong

    2017-02-01

    Full Text Available This article presents a self-localization scheme for indoor mobile robot navigation based on reliable design and recognition of artificial visual landmarks. Each landmark is patterned with a set of concentric circular rings in black and white, which reliably encodes the landmark’s identity under environmental illumination. A mobile robot in navigation uses an onboard camera to capture landmarks in the environment. The landmarks in an image are detected and identified using a bilayer recognition algorithm: A global recognition process initially extracts candidate landmark regions across the whole image and tries to identify enough landmarks; if necessary, a local recognition process locally enhances those unidentified regions of interest influenced by illumination and incompleteness and reidentifies them. The recognized landmarks are used to estimate the position and orientation of the onboard camera in the environment, based on the geometric relationship between the image and environmental frames. The experiments carried out in a real indoor environment show high robustness of the proposed landmark design and recognition scheme to the illumination condition, which leads to reliable and accurate mobile robot localization.

  6. Contract-Based Incentive Mechanism for Mobile Crowdsourcing Networks

    Directory of Open Access Journals (Sweden)

    Nan Zhao

    2017-09-01

    Full Text Available Mobile crowdsourcing networks (MCNs are a promising method of data collecting and processing by leveraging the mobile devices’ sensing and computing capabilities. However, because of the selfish characteristics of the service provider (SP and mobile users (MUs, crowdsourcing participants only aim to maximize their own benefits. This paper investigates the incentive mechanism between the above two parties to create mutual benefits. By modeling MCNs as a labor market, a contract-based crowdsourcing model with moral hazard is proposed under the asymmetric information scenario. In order to incentivize the potential MUs to participate in crowdsourcing tasks, the optimization problem is formulated to maximize the SP’s utility by jointly examining the crowdsourcing participants’ risk preferences. The impact of crowdsourcing participants’ attitudes of risks on the incentive mechanism has been studied analytically and experimentally. Numerical simulation results demonstrate the effectiveness of the proposed contract design scheme for the crowdsourcing incentive.

  7. Effect of Polarization on the Mobility of C60

    DEFF Research Database (Denmark)

    Volpi, Riccardo; Kottravel, Sathish; Nørby, Morten Steen

    2016-01-01

    We present a study of mobility field and temperature dependence for C60 with Kinetic Monte Carlo simulations. We propose a new scheme to take into account polarization effects in organic materials through atomic induced dipoles on nearby molecules. This leads to an energy correction for the singl...

  8. Prediction Schemes to Enhance the Routing Process in Geographical GPSR Ad Hoc Protocol

    Directory of Open Access Journals (Sweden)

    Raed Saqour

    2007-01-01

    Full Text Available Geographical routing protocols have received a serious attention due to more advantages they have in comparison to the conventional routing protocols. They require information about the physical position of nodes needed to be available. Commonly, each node determines its own position through the use of Global Positioning System (GPS or some other type of positioning service. Greedy Perimeter Stateless Routing (GPSR protocol, which is one of geographical routing protocols, limits the forwarding decision of the packet based on the node's own position, the destination's position and the position of the forwarding node's neighbors. Location information has some inaccuracy depending on the localization system and the environment exists in. This paper aims to study the impact of mobility metrics (beacon interval, and node speed on introducing location information error in GPSR protocol using different mobility models. The effect of these metrics is identified in GPSR as Neighbor Break Link (NBL problem. Based on simulation analysis, mobility prediction schemes are proposed to migrate the observed problem.

  9. Characterization of upstream sequences from the 8S globulin gene ...

    African Journals Online (AJOL)

    Administrator

    2011-09-21

    Sep 21, 2011 ... added recombinant proteins and enzymes for industries. The upstream region ... cost, eukaryotic expression and no endogenous patho- gen pollution, thus it ... developmental process (Santino et al., 1997) which may deplete nutrient ... ideal bioreactors for economic production and storage of value-added ...

  10. Entrepreneurial Leadership in Upstream Oil and Gas Industry

    OpenAIRE

    Kalu, Mona Ukpai

    2015-01-01

    The study examined Entrepreneurial leadership in Upstream Oil and Gas industry and its ability to accelerate innovative energy technology development. The declining deliverability from existing reservoirs and ever increasing demand for energy to fuel growth in many parts of the world is driving oil and gas exploration into more difficult to access reservoirs like bituminous sands and shale gas. Accelerating new innovative technology development to access these new streams of profitable oil an...

  11. Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels

    Directory of Open Access Journals (Sweden)

    Hongji Huang

    2017-01-01

    Full Text Available This paper studies the relay selection schemes in mobile communication system over Nakagami-m channel. To make efficient use of licensed spectrum, both single relay selection (SRS scheme and multirelays selection (MRS scheme over the Nakagami-m channel are proposed. Also, the intercept probability (IP and outage probability (OP of the proposed SRS and MRS for the communication links depending on realistic spectrum sensing are derived. Furthermore, this paper assesses the manifestation of conventional direct transmission scheme to compare with the proposed SRS and MRS ones based on the Nakagami-m channel, and the security-reliability trade-off (SRT performance of the proposed schemes and the conventional schemes is well investigated. Additionally, the SRT of the proposed SRS and MRS schemes is demonstrated better than that of direct transmission scheme over the Nakagami-m channel, which can protect the communication transmissions against eavesdropping attacks. Additionally, simulation results show that our proposed relay selection schemes achieve better SRT performance than that of conventional direct transmission over the Nakagami-m channel.

  12. Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void Zones in Underwater WSNs.

    Science.gov (United States)

    Javaid, Nadeem; Ejaz, Mudassir; Abdul, Wadood; Alamri, Atif; Almogren, Ahmad; Niaz, Iftikhar Azim; Guizani, Nadra

    2017-03-13

    In this paper, we propose two schemes; position-aware mobility pattern (PAMP) and cooperative PAMP (Co PAMP). The first one is an optimization scheme that avoids void hole occurrence and minimizes the uncertainty in the position estimation of glider's. The second one is a cooperative routing scheme that reduces the packet drop ratio by using the relay cooperation. Both techniques use gliders that stay at sojourn positions for a predefined time, at sojourn position self-confidence (s-confidence) and neighbor-confidence (n-confidence) regions that are estimated for balanced energy consumption. The transmission power of a glider is adjusted according to those confidence regions. Simulation results show that our proposed schemes outperform the compared existing one in terms of packet delivery ratio, void zones and energy consumption.

  13. The Sharing Economy and the Future of Personal Mobility: New Models Based on Car Sharing

    Directory of Open Access Journals (Sweden)

    Olga Novikova

    2017-08-01

    Full Text Available The sharing economy is an emerging phenomenon that shapes the cultural, economic, and social landscape of our modern world. With variations of the concept of the sharing economy emerging in so many fields, the area of shared mobility – the shared use of a motor vehicle, bicycle, or other mode that enables travellers to gain short-term access to transportation modes on an on-demand basis – has developed as the forerunner of the transformation to be expected in other areas. This article examines how the sphere of personal mobility has been affected by the growth of sharing economy. It contributes to the growing body of shared mobility literature by uncovering innovative mobility-based models that represent solutions on the intersection of shared mobility, physical infrastructure, and integrated-mobility schemes.

  14. Cloud and fog computing in 5G mobile networks emerging advances and applications

    CERN Document Server

    Markakis, Evangelos; Mavromoustakis, Constandinos X; Pallis, Evangelos

    2017-01-01

    This book focuses on the challenges and solutions related to cloud and fog computing for 5G mobile networks, and presents novel approaches to the frameworks and schemes that carry out storage, communication, computation and control in the fog/cloud paradigm.

  15. Managing the safe mobility of older road users: How to cope with their diversity?

    DEFF Research Database (Denmark)

    Haustein, Sonja; Marin-Lamellet, Claude

    2014-01-01

    Against the background of an ageing population, the management of older people's safe mobility is becoming an increasingly important issue. Mobility is vital for older people's quality of life and several examples of good practice that support older people's safe mobility already exist. However...... groups who are already users and improve their (safe) use of the preferred transport mode. However, they do not seem to succeed in increasing mobility options, e.g. by encouraging car-reliant users to cycle or use public transport or by helping older women to continue to drive. We advise that existing...... systems, a lack of programmes to increase perceived security, as well as a comprehensive scheme for older drivers who have to stop driving....

  16. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  17. Signalling design and architecture for a proposed mobile satellite network

    Science.gov (United States)

    Yan, T.-Y.; Cheng, U.; Wang, C.

    1990-01-01

    In a frequency-division/demand-assigned multiple-access (FD/DAMA) architecture, each mobile subscriber must make a connection request to the Network Management Center before transmission for either open-end or closed-end services. Open-end services are for voice calls and long file transfer and are processed on a blocked-call-cleared basis. Closed-end services are for transmitting burst data and are processed on a first-come first-served basis. This paper presents the signalling design and architecture for non-voice services of an FD/DAMA mobile satellite network. The connection requests are made through the recently proposed multiple channel collision resolution scheme which provides a significantly higher throughput than the traditional slotted ALOHA scheme. For non-voice services, it is well known that retransmissions are necessary to ensure the delivery of a message in its entirety from the source to destination. Retransmission protocols for open-end and closed-end data transfer are investigated. The signal structure for the proposed network is derived from X-25 standards with appropriate modifications. The packet types and their usages are described in this paper.

  18. A Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-hoc Networks.

    Science.gov (United States)

    Xu, Yixuan; Chen, Xi; Liu, Anfeng; Hu, Chunhua

    2017-04-18

    Using mobile vehicles as "data mules" to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC) scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D), but also vehicle to vehicle transmission (V2V). Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%.

  19. A Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Yixuan Xu

    2017-04-01

    Full Text Available Using mobile vehicles as “data mules” to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D, but also vehicle to vehicle transmission (V2V. Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%.

  20. A Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-Hoc Networks

    Science.gov (United States)

    Xu, Yixuan; Chen, Xi; Liu, Anfeng; Hu, Chunhua

    2017-01-01

    Using mobile vehicles as “data mules” to collect data generated by a huge number of sensing devices that are widely spread across smart city is considered to be an economical and effective way of obtaining data about smart cities. However, currently most research focuses on the feasibility of the proposed methods instead of their final performance. In this paper, a latency and coverage optimized data collection (LCODC) scheme is proposed to collect data on smart cities through opportunistic routing. Compared with other schemes, the efficiency of data collection is improved since the data flow in LCODC scheme consists of not only vehicle to device transmission (V2D), but also vehicle to vehicle transmission (V2V). Besides, through data mining on patterns hidden in the smart city, waste and redundancy in the utilization of public resources are mitigated, leading to the easy implementation of our scheme. In detail, no extra supporting device is needed in the LCODC scheme to facilitate data transmission. A large-scale and real-world dataset on Beijing is used to evaluate the LCODC scheme. Results indicate that with very limited costs, the LCODC scheme enables the average latency to decrease from several hours to around 12 min with respect to schemes where V2V transmission is disabled while the coverage rate is able to reach over 30%. PMID:28420218

  1. Internal Associations of the Acidic Region of Upstream Binding Factor Control Its Nucleolar Localization.

    Science.gov (United States)

    Ueshima, Shuhei; Nagata, Kyosuke; Okuwaki, Mitsuru

    2017-11-15

    Upstream binding factor (UBF) is a member of the high-mobility group (HMG) box protein family, characterized by multiple HMG boxes and a C-terminal acidic region (AR). UBF is an essential transcription factor for rRNA genes and mediates the formation of transcriptionally active chromatin in the nucleolus. However, it remains unknown how UBF is specifically localized to the nucleolus. Here, we examined the molecular mechanisms that localize UBF to the nucleolus. We found that the first HMG box (HMG box 1), the linker region (LR), and the AR cooperatively regulate the nucleolar localization of UBF1. We demonstrated that the AR intramolecularly associates with and attenuates the DNA binding activity of HMG boxes and confers the structured DNA preference to HMG box 1. In contrast, the LR was found to serve as a nuclear localization signal and compete with HMG boxes to bind the AR, permitting nucleolar localization of UBF1. The LR sequence binds DNA and assists the stable chromatin binding of UBF. We also showed that the phosphorylation status of the AR does not clearly affect the localization of UBF1. Our results strongly suggest that associations of the AR with HMG boxes and the LR regulate UBF nucleolar localization. Copyright © 2017 American Society for Microbiology.

  2. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  3. Analysis and performance assessment of a fragment retransmission scheme for energy efficient IEEE 802.11 WLANs.

    Science.gov (United States)

    Mafole, Prosper; Aritsugi, Masayoshi

    2016-01-01

    Backoff-free fragment retransmission (BFFR) scheme enhances the performance of legacy MAC layer fragmentation by eliminating contention overhead. The eliminated overhead is the result of backoff executed before a retransmission attempt is made when fragment transmission failure occurs within a fragment burst. This paper provides a mathematical analysis of BFFR energy efficiency and further assesses, by means of simulations, the energy efficiency, throughput and delay obtained when BFFR is used. The validity of the new scheme is evaluated in different scenarios namely, constant bit rate traffic, realistic bursty internet traffic, node mobility, rigid and elastic flows and their combinations at different traffic loads. We also evaluate and discuss the impact of BFFR on MAC fairness when the number of nodes is varied from 4 to 10. It is shown that BFFR has advantages over legacy MAC fragmentation scheme in all the scenarios.

  4. Application of kinetic flux vector splitting scheme for solving multi-dimensional hydrodynamical models of semiconductor devices

    Science.gov (United States)

    Nisar, Ubaid Ahmed; Ashraf, Waqas; Qamar, Shamsul

    In this article, one and two-dimensional hydrodynamical models of semiconductor devices are numerically investigated. The models treat the propagation of electrons in a semiconductor device as the flow of a charged compressible fluid. It plays an important role in predicting the behavior of electron flow in semiconductor devices. Mathematically, the governing equations form a convection-diffusion type system with a right hand side describing the relaxation effects and interaction with a self consistent electric field. The proposed numerical scheme is a splitting scheme based on the kinetic flux-vector splitting (KFVS) method for the hyperbolic step, and a semi-implicit Runge-Kutta method for the relaxation step. The KFVS method is based on the direct splitting of macroscopic flux functions of the system on the cell interfaces. The second order accuracy of the scheme is achieved by using MUSCL-type initial reconstruction and Runge-Kutta time stepping method. Several case studies are considered. For validation, the results of current scheme are compared with those obtained from the splitting scheme based on the NT central scheme. The effects of various parameters such as low field mobility, device length, lattice temperature and voltage are analyzed. The accuracy, efficiency and simplicity of the proposed KFVS scheme validates its generic applicability to the given model equations. A two dimensional simulation is also performed by KFVS method for a MESFET device, producing results in good agreement with those obtained by NT-central scheme.

  5. A splitting scheme based on the space-time CE/SE method for solving multi-dimensional hydrodynamical models of semiconductor devices

    Science.gov (United States)

    Nisar, Ubaid Ahmed; Ashraf, Waqas; Qamar, Shamsul

    2016-08-01

    Numerical solutions of the hydrodynamical model of semiconductor devices are presented in one and two-space dimension. The model describes the charge transport in semiconductor devices. Mathematically, the models can be written as a convection-diffusion type system with a right hand side describing the relaxation effects and interaction with a self consistent electric field. The proposed numerical scheme is a splitting scheme based on the conservation element and solution element (CE/SE) method for hyperbolic step, and a semi-implicit scheme for the relaxation step. The numerical results of the suggested scheme are compared with the splitting scheme based on Nessyahu-Tadmor (NT) central scheme for convection step and the same semi-implicit scheme for the relaxation step. The effects of various parameters such as low field mobility, device length, lattice temperature and voltages for one-space dimensional hydrodynamic model are explored to further validate the generic applicability of the CE/SE method for the current model equations. A two dimensional simulation is also performed by CE/SE method for a MESFET device, producing results in good agreement with those obtained by NT-central scheme.

  6. Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

    Directory of Open Access Journals (Sweden)

    Shih-Hao Chang

    2016-01-01

    Full Text Available Mobile crowd sensing (MCS arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attack, which illegally forges multiple identities in peer-to-peer networks, namely, Sybil identities. These Sybil identities will falsify multiple identities that negatively influence the effectiveness of sensing data in this MCS network or degrading entire network performance. To cope with this problem, a cloud based trust management scheme (CbTMS was proposed to detect Sybil attacks in the MCS network. The CbTMS was proffered for performing active and passive checking scheme, in addition to the mobile PCS trustworthiness management, and includes a decision tree algorithm, to verify the covered nodes in the MCS network. Simulation studies show that our CbTMS can efficiently detect the malicious Sybil nodes in the network and cause 6.87 Wh power reduction compared with other malicious Sybil node attack mode.

  7. Numeric Analysis for Relationship-Aware Scalable Streaming Scheme

    Directory of Open Access Journals (Sweden)

    Heung Ki Lee

    2014-01-01

    Full Text Available Frequent packet loss of media data is a critical problem that degrades the quality of streaming services over mobile networks. Packet loss invalidates frames containing lost packets and other related frames at the same time. Indirect loss caused by losing packets decreases the quality of streaming. A scalable streaming service can decrease the amount of dropped multimedia resulting from a single packet loss. Content providers typically divide one large media stream into several layers through a scalable streaming service and then provide each scalable layer to the user depending on the mobile network. Also, a scalable streaming service makes it possible to decode partial multimedia data depending on the relationship between frames and layers. Therefore, a scalable streaming service provides a way to decrease the wasted multimedia data when one packet is lost. However, the hierarchical structure between frames and layers of scalable streams determines the service quality of the scalable streaming service. Even if whole packets of layers are transmitted successfully, they cannot be decoded as a result of the absence of reference frames and layers. Therefore, the complicated relationship between frames and layers in a scalable stream increases the volume of abandoned layers. For providing a high-quality scalable streaming service, we choose a proper relationship between scalable layers as well as the amount of transmitted multimedia data depending on the network situation. We prove that a simple scalable scheme outperforms a complicated scheme in an error-prone network. We suggest an adaptive set-top box (AdaptiveSTB to lower the dependency between scalable layers in a scalable stream. Also, we provide a numerical model to obtain the indirect loss of multimedia data and apply it to various multimedia streams. Our AdaptiveSTB enhances the quality of a scalable streaming service by removing indirect loss.

  8. Technological acceleration and organizational transformations in the upstream oil and gas industry

    International Nuclear Information System (INIS)

    Isabelle, M.

    2000-12-01

    The upstream oil and gas industry experienced a dramatic technological acceleration in the early 1970's. The relationships between the agents in this industry have themselves undergone deep changes since that date. This thesis shows that a tight link exists between the technological acceleration and the organizational transformations in the upstream oil and gas industry. In a first part, it focuses on the economic theory's developments concerning industrial organization. In a second part, it applies these developments to three types of relations: those between the owner-states of hydrocarbon resources and the international petroleum companies; those between the international petroleum companies and their subcontractors; and finally those between the international petroleum companies themselves. (author)

  9. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  10. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  11. Mobile User Connectivity in Relay-Assisted Visible Light Communications

    Directory of Open Access Journals (Sweden)

    Petr Pešek

    2018-04-01

    Full Text Available In this paper, we investigate relay-assisted visible light communications (VLC where a mobile user acts as a relay and forwards data from a transmitter to the end mobile user. We analyse the utilization of the amplify-and-forward (AF and decode-and-forward (DF relaying schemes. The focus of the paper is on analysis of the behavior of the mobile user acting as a relay while considering a realistic locations of the receivers and transmitters on a standard mobile phone, more specifically with two photodetectors on both sides of a mobile phone and a transmitting LED array located upright. We also investigate dependency of the bit error rate (BER performance on the azimuth and elevation angles of the mobile relay device within a typical office environment. We provide a new analytical description of BER for AF and DF-based relays in VLC. In addition we compare AF and DF-based systems and show that DF offers a marginal improvement in the coverage area with a BER < 10–3 and a data rate of 100 Mb/s. Numerical results also illustrate that relay-based systems offer a significant improvement in terms of the coverage compared to direct non-line of sight VLC links.

  12. The economic benefits of vegetation in the upstream area of Ciliwung watershed

    Science.gov (United States)

    Saridewi, T. R.; Nazaruddin

    2018-04-01

    Ciliwung watershed has strategic values since its entire downstream area is located in the Special Administrative Region of Jakarta (DKI Jakarta), the capital of Indonesia. This causes forest and farmland areas are converted into open areas or built-up areas. The existence of these areas provides enormous environmental and economic benefits. Economic benefit values are very important to be considered in developing a policy development plan, but they have not been calculated yet. This study aims to determine the economic benefits provided by trees and other vegetation anddevelops a development policy that takes into account simultaneously ecological and economic aspects. The study is conducted in the upstream Ciliwung watershed, by using land cover patterns in 1989, 2000, 2010 and 2014, and employs GIS and CITY green analysis. The results show that conversion of forest and farmland areas reduces the ability of Ciliwung upstream watershed to store water. Therefore, its ability to reduce the flow of surface has been decreased. This creates a decrease in the cost savings of annual stormwater, from US 15,175,721 in 1989 to US 13,317,469 in 2014. The Environmental Services Payment Policy (PES) for upstream community groups managing the watershed has been considered as a fairly effective policy.

  13. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  14. JEFX 10 demonstration of Cooperative Hunter Killer UAS and upstream data fusion

    Science.gov (United States)

    Funk, Brian K.; Castelli, Jonathan C.; Watkins, Adam S.; McCubbin, Christopher B.; Marshall, Steven J.; Barton, Jeffrey D.; Newman, Andrew J.; Peterson, Cammy K.; DeSena, Jonathan T.; Dutrow, Daniel A.; Rodriguez, Pedro A.

    2011-05-01

    The Johns Hopkins University Applied Physics Laboratory deployed and demonstrated a prototype Cooperative Hunter Killer (CHK) Unmanned Aerial System (UAS) capability and a prototype Upstream Data Fusion (UDF) capability as participants in the Joint Expeditionary Force Experiment 2010 in April 2010. The CHK capability was deployed at the Nevada Test and Training Range to prosecute a convoy protection operational thread. It used mission-level autonomy (MLA) software applied to a networked swarm of three Raven hunter UAS and a Procerus Miracle surrogate killer UAS, all equipped with full motion video (FMV). The MLA software provides the capability for the hunter-killer swarm to autonomously search an area or road network, divide the search area, deconflict flight paths, and maintain line of sight communications with mobile ground stations. It also provides an interface for an operator to designate a threat and initiate automatic engagement of the target by the killer UAS. The UDF prototype was deployed at the Maritime Operations Center at Commander Second Fleet, Naval Station Norfolk to provide intelligence analysts and the ISR commander with a common fused track picture from the available FMV sources. It consisted of a video exploitation component that automatically detected moving objects, a multiple hypothesis tracker that fused all of the detection data to produce a common track picture, and a display and user interface component that visualized the common track picture along with appropriate geospatial information such as maps and terrain as well as target coordinates and the source video.

  15. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Suleiman Zubair

    2016-01-01

    Full Text Available The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage, PU signal protection (by the introduction of a mobility-induced guard (mguard distance and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput. It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works.

  16. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Zubair, Suleiman; Syed Yusoff, Sharifah Kamilah; Fisal, Norsheila

    2016-01-29

    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works.

  17. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks

    Science.gov (United States)

    Zubair, Suleiman; Syed Yusoff, Sharifah Kamilah; Fisal, Norsheila

    2016-01-01

    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works. PMID:26840312

  18. Rate control scheme for consistent video quality in scalable video codec.

    Science.gov (United States)

    Seo, Chan-Won; Han, Jong-Ki; Nguyen, Truong Q

    2011-08-01

    Multimedia data delivered to mobile devices over wireless channels or the Internet are complicated by bandwidth fluctuation and the variety of mobile devices. Scalable video coding has been developed as an extension of H.264/AVC to solve this problem. Since scalable video codec provides various scalabilities to adapt the bitstream for the channel conditions and terminal types, scalable codec is one of the useful codecs for wired or wireless multimedia communication systems, such as IPTV and streaming services. In such scalable multimedia communication systems, video quality fluctuation degrades the visual perception significantly. It is important to efficiently use the target bits in order to maintain a consistent video quality or achieve a small distortion variation throughout the whole video sequence. The scheme proposed in this paper provides a useful function to control video quality in applications supporting scalability, whereas conventional schemes have been proposed to control video quality in the H.264 and MPEG-4 systems. The proposed algorithm decides the quantization parameter of the enhancement layer to maintain a consistent video quality throughout the entire sequence. The video quality of the enhancement layer is controlled based on a closed-form formula which utilizes the residual data and quantization error of the base layer. The simulation results show that the proposed algorithm controls the frame quality of the enhancement layer in a simple operation, where the parameter decision algorithm is applied to each frame.

  19. An Integrated Mobile Application to Improve the Watershed Management in Taiwan

    Science.gov (United States)

    Chou, T. Y.; Chen, M. H.; Lee, C. Y.

    2015-12-01

    This study aims to focus on the application of information technology on the reservoir watershed management. For the civil and commercial water usage, reservoirs and its upstream plays a significant role due to water scarcity and inequality, especially in Taiwan. Due to the progress of information technology, apply it can improve the efficiency and accuracy of daily affairs significantly which already proved by previous researches. Taipei Water Resource District (TWRD) is selected as study area for this study, it is the first reservoir watershed which authorized as special protection district by urban planning act. This study has designed a framework of mobile application, which addressed three types of public affairs relate to watershed management, includes building management, illegal land-use investigation, and a dashboard of real time stream information. This mobile application integrated a dis-connected map and interactive interface to collect, record and calculate field information which helps the authority manage the public affairs more efficiency.

  20. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  1. Research in Mobile Database Query Optimization and Processing

    Directory of Open Access Journals (Sweden)

    Agustinus Borgy Waluyo

    2005-01-01

    Full Text Available The emergence of mobile computing provides the ability to access information at any time and place. However, as mobile computing environments have inherent factors like power, storage, asymmetric communication cost, and bandwidth limitations, efficient query processing and minimum query response time are definitely of great interest. This survey groups a variety of query optimization and processing mechanisms in mobile databases into two main categories, namely: (i query processing strategy, and (ii caching management strategy. Query processing includes both pull and push operations (broadcast mechanisms. We further classify push operation into on-demand broadcast and periodic broadcast. Push operation (on-demand broadcast relates to designing techniques that enable the server to accommodate multiple requests so that the request can be processed efficiently. Push operation (periodic broadcast corresponds to data dissemination strategies. In this scheme, several techniques to improve the query performance by broadcasting data to a population of mobile users are described. A caching management strategy defines a number of methods for maintaining cached data items in clients' local storage. This strategy considers critical caching issues such as caching granularity, caching coherence strategy and caching replacement policy. Finally, this survey concludes with several open issues relating to mobile query optimization and processing strategy.

  2. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  3. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  4. ISEE/IMP Observations of simultaneous upstream ion events

    International Nuclear Information System (INIS)

    Mitchel, D.G.; Roelof, E.C.; Sanderson, T.R.; Reinhard, R.; Wenzel, K.

    1983-01-01

    Propagation of upstream energetic (50--200 keV) ions is analyzed in sixteen events observed simulataneously by solid state detectors on ISEE 3 at approx.200 R/sub E/ and on IMP 8 at approx.35 R/sub E/ from the earth. Conclusions are based on comparisons of the pitch angle distributions observed at the two spacecraft and transformed into the solar wind frame. They are beamlike at ISEE 3 and are confined to the outward hemisphere. When IMP 8 is furtherest from the bow shock, they are also usually beamlike, or hemispheric. However, when IMP 8 is closer to the bow shock, pancakelike distributions are observed. This systematic variation in the IMP 8 pitch angle distributions delimits a scattering region l< or approx. =14 R/sub E/ upstream of the earth's bow shock (l measured along the interplanetary magnetic field) that dominates ion propagation, influences the global distribution of fluxes in the foreshock, and may play a role in acceleration of the ions. When IMP 8 is beyond lapprox.15 R/sub E/, the propagation appears to be essentially scatter-free between IMP 8 and ISEE 3; this is deduced from the absence of earthward fluxes at IMP 8 as well as the tendency for the spin-averaged fluxes to be comparable at the two spacecraft

  5. Performance of Multilevel Coding Schemes with Different Decoding Methods and Mapping Strategies in Mobile Fading Channels

    Institute of Scientific and Technical Information of China (English)

    YUAN Dongfeng; WANG Chengxiang; YAO Qi; CAO Zhigang

    2001-01-01

    Based on "capacity rule", the perfor-mance of multilevel coding (MLC) schemes with dif-ferent set partitioning strategies and decoding meth-ods in AWGN and Rayleigh fading channels is investi-gated, in which BCH codes are chosen as componentcodes and 8ASK modulation is used. Numerical re-sults indicate that MLC scheme with UP strategy canobtain optimal performance in AWGN channels andBP is the best mapping strategy for Rayleigh fadingchannels. BP strategy is of good robustness in bothkinds of channels to realize an optimum MLC system.Multistage decoding (MSD) is a sub-optimal decodingmethod of MLC for both channels. For Ungerboeckpartitioning (UP) and mixed partitioning (MP) strat-egy, MSD is strongly recommended to use for MLCsystem, while for BP strategy, PDL is suggested to useas a simple decoding method compared with MSD.

  6. Effect of Polarization on the Mobility of C60: A Kinetic Monte Carlo Study.

    Science.gov (United States)

    Volpi, Riccardo; Kottravel, Sathish; Nørby, Morten Steen; Stafström, Sven; Linares, Mathieu

    2016-02-09

    We present a study of mobility field and temperature dependence for C60 with Kinetic Monte Carlo simulations. We propose a new scheme to take into account polarization effects in organic materials through atomic induced dipoles on nearby molecules. This leads to an energy correction for the single site energies and to an external reorganization happening after each hopping. The inclusion of polarization allows us to obtain a good agreement with experiments for both mobility field and temperature dependence.

  7. Mapping the social class structure: From occupational mobility to social class categories using network analysis

    DEFF Research Database (Denmark)

    Toubøl, Jonas; Larsen, Anton Grau

    2017-01-01

    This article develops a new explorative method for deriving social class categories from patterns of occupational mobility. In line with Max Weber, our research is based on the notion that, if class boundaries do not inhibit social mobility then the class categories are of little value. Thus......, unlike dominant, theoretically defined class schemes, this article derives social class categories from observed patterns in a mobility network covering intra-generational mobility. The network is based on a mobility table of 109 occupational categories tied together by 1,590,834 job shifts on the Danish...... labour market 2001–2007. The number of categories are reduced from 109 to 34 by applying a new clustering algorithm specifically designed for the study of mobility tables (MONECA). These intra-generational social class categories are related to the central discussions of gender, income, education...

  8. Efficient eNB inter-communication scheme in converged mobile and NG-PON2 system

    Science.gov (United States)

    Xiao, Simiao; Sun, Xiao; Zhang, Kaibin

    2016-02-01

    In LTE, a new X2-interface is defined to facilitate direct communication between neighboring eNBs. Since LTE is an all-IP network, the X2-interface traffic currently needs to be routed and transponded in L3 at the edge router by IP addressing. As mobile data increases, it is a promising trend to backhaul mobile services based on PON. In this paper, an effective approach for eNB inter-communication over TWDM-PON is proposed. By associating the IP address of eNB and the MAC address of ONU, the "inter-eNB communication in L3" can be mapped into "inter-ONU communication in L2" and transponded via the protocol of PON at the OLT. Thus, fast and cost-effective eNB inter-communication can be realized based on TWDM-PON within one wavelength channel and between different wavelength channels. The increasing data traffic pressure to the core network can also be alleviated.

  9. Ion acceleration at the earth's bow shock: A review of observations in the upstream region

    International Nuclear Information System (INIS)

    Gosling, J.T.; Asbridge, J.R.; Bame, S.J.; Feldman, W.C.

    1979-01-01

    Positive ions are accelerated at or near the earth's bow shock and propagate into the upstream region. Two distinctly different population of these ions, distinguished by their greatly different spectral and angular widths, can be identified there. The type of ion population observed in the upstream region is strongly correlated with the presence or absence of long-period compresive waves in the solar wind. Very few ions are accelerated in the vicinity of the shock to energies much above about 100 keV. It is not yet clear whether the most energetic ions (i.e. those near 100 keV) are accelerated at the shock or in the broad disturbed region upstream from the shock. In either case stochastic acceleration by turbulent electrostatic fields seems to be the most viable candidate for the acceleration of the most energetic particles

  10. Ion acceleration at the earth's bow shock: a review of observations in the upstream region

    International Nuclear Information System (INIS)

    Gosling, J.T.; Asbridge, J.R.; Bame, S.J.; Feldman, W.C.

    1979-01-01

    Positive ions are accelerated at or near the earth's bow shock and propagate into the upstream region. Two distinctly different populations of these ions, distinguished by their greatly different spectral and angular widths, can be identified there. The type of ion population observed in the upstream region is strongly correlated with the presence or absence of long-period compressive waves in the solar wind. Very few ions are accelerated in the vicinity of the shock to energies much above about 100 keV. It is not yet clear whether the most energetic ions (i.e., those near 100 keV) are accelerated at the shock or in broad disturbed region upstream from the shock. In either case stochastic acceleration by turbulent electrostatic fields seems to be the most viable candidate for the acceleration of the most energetic particles

  11. Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void Zones in Underwater WSNs

    Science.gov (United States)

    Javaid, Nadeem; Ejaz, Mudassir; Abdul, Wadood; Alamri, Atif; Almogren, Ahmad; Niaz, Iftikhar Azim; Guizani, Nadra

    2017-01-01

    In this paper, we propose two schemes; position-aware mobility pattern (PAMP) and cooperative PAMP (Co PAMP). The first one is an optimization scheme that avoids void hole occurrence and minimizes the uncertainty in the position estimation of glider’s. The second one is a cooperative routing scheme that reduces the packet drop ratio by using the relay cooperation. Both techniques use gliders that stay at sojourn positions for a predefined time, at sojourn position self-confidence (s-confidence) and neighbor-confidence (n-confidence) regions that are estimated for balanced energy consumption. The transmission power of a glider is adjusted according to those confidence regions. Simulation results show that our proposed schemes outperform the compared existing one in terms of packet delivery ratio, void zones and energy consumption. PMID:28335377

  12. Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void Zones in Underwater WSNs

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-03-01

    Full Text Available In this paper, we propose two schemes; position-aware mobility pattern (PAMP and cooperative PAMP (Co PAMP. The first one is an optimization scheme that avoids void hole occurrence and minimizes the uncertainty in the position estimation of glider’s. The second one is a cooperative routing scheme that reduces the packet drop ratio by using the relay cooperation. Both techniques use gliders that stay at sojourn positions for a predefined time, at sojourn position self-confidence (s-confidence and neighbor-confidence (n-confidence regions that are estimated for balanced energy consumption. The transmission power of a glider is adjusted according to those confidence regions. Simulation results show that our proposed schemes outperform the compared existing one in terms of packet delivery ratio, void zones and energy consumption.

  13. Connection adaption for control of networked mobile chaotic agents.

    Science.gov (United States)

    Zhou, Jie; Zou, Yong; Guan, Shuguang; Liu, Zonghua; Xiao, Gaoxi; Boccaletti, S

    2017-11-22

    In this paper, we propose a strategy for the control of mobile chaotic oscillators by adaptively rewiring connections between nearby agents with local information. In contrast to the dominant adaptive control schemes where coupling strength is adjusted continuously according to the states of the oscillators, our method does not request adaption of coupling strength. As the resulting interaction structure generated by this proposed strategy is strongly related to unidirectional chains, by investigating synchronization property of unidirectional chains, we reveal that there exists a certain coupling range in which the agents could be controlled regardless of the length of the chain. This feature enables the adaptive strategy to control the mobile oscillators regardless of their moving speed. Compared with existing adaptive control strategies for networked mobile agents, our proposed strategy is simpler for implementation where the resulting interaction networks are kept unweighted at all time.

  14. Mobil Oil Canada : Kearl Oil Sands Mine

    International Nuclear Information System (INIS)

    1997-01-01

    The upgrader design at Mobil's Kearl Oil Sands Mine were described. Included were feed characteristics, upgrader products, process schemes and their overall economics and upgrader technologies in use, including coking, deasphalting, hydrocracking, hydrotreating and visbreaking. Advantages and disadvantages of the upgrader technologies were highlighted. As far as the product is concerned, much of it is destined to U.S. refineries that are equipped to process the material. The Kearl Oil Sands Mine upgrading facility will likely use a combination of coker/hydrotreating, which is a well proven process for high value products that has been used in all five of Mobil's refineries in the U.S., and visbreaker/deasphalting, which has shown promise in bench-scale testing, but at present still has some potential commercial difficulties. Foremost among these are the high softening product of asphalt from visbroken products, questionable commercial feasibility of the low yield of pitch, and problems in the disposal of asphalt. Severe visbreaking also yields unstable products. Details of Mobil Canada's oil sands project were also summarized 2 tabs., 9 figs

  15. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  16. A new licensing strategy for Canadian mobile earth stations

    Science.gov (United States)

    Amero, Ronald G.

    1990-01-01

    Initiatives presently under consideration by the Department of Communications which will greatly simplify the licensing process for mobile earth stations are addressed. The current licensing approach is reviewed and the limitations of that system identified. A new approach is needed to respond to the needs of mobile satellite users in the 1990's and beyond, one which will have a minimal impact on the user while still respecting the legislative responsibilities of the department under the new Radiocommunication Act and the General Radio Regulations. The objective of this new strategy is to lead to a transparent licensing scheme for the end user, which in turn could lead to license exemption of blanket licenses as soon as possible.

  17. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  18. Broadband and scalable mobile satellite communication system for future access networks

    Science.gov (United States)

    Ohata, Kohei; Kobayashi, Kiyoshi; Nakahira, Katsuya; Ueba, Masazumi

    2005-07-01

    Due to the recent market trends, NTT has begun research into next generation satellite communication systems, such as broadband and scalable mobile communication systems. One service application objective is to provide broadband Internet access for transportation systems, temporal broadband access networks and telemetries to remote areas. While these are niche markets the total amount of capacity should be significant. We set a 1-Gb/s total transmission capacity as our goal. Our key concern is the system cost, which means that the system should be unified system with diversified services and not tailored for each application. As satellites account for a large portion of the total system cost, we set the target satellite size as a small, one-ton class dry mass with a 2-kW class payload power. In addition to the payload power and weight, the mobile satellite's frequency band is extremely limited. Therefore, we need to develop innovative technologies that will reduce the weight and maximize spectrum and power efficiency. Another challenge is the need for the system to handle up to 50 dB and a wide data rate range of other applications. This paper describes the key communication system technologies; the frequency reuse strategy, multiplexing scheme, resource allocation scheme, and QoS management algorithm to ensure excellent spectrum efficiency and support a variety of services and quality requirements in the mobile environment.

  19. Localization with a mobile beacon in underwater acoustic sensor networks.

    Science.gov (United States)

    Lee, Sangho; Kim, Kiseon

    2012-01-01

    Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB). The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node's location and then the node's location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  20. Localization with a Mobile Beacon in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangho Lee

    2012-04-01

    Full Text Available Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB. The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node’s location and then the node’s location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  1. A Comprehensive Ubiquitous Healthcare Solution on an Android™ Mobile Device

    Directory of Open Access Journals (Sweden)

    Pei-Cheng Hii

    2011-06-01

    Full Text Available Provision of ubiquitous healthcare solutions which provide healthcare services at anytime anywhere has become more favorable nowadays due to the emphasis on healthcare awareness and also the growth of mobile wireless technologies. Following this approach, an Android™ smart phone device is proposed as a mobile monitoring terminal to observe and analyze ECG (electrocardiography waveforms from wearable ECG devices in real time under the coverage of a wireless sensor network (WSN. The exploitation of WSN in healthcare is able to substitute the complicated wired technology, moving healthcare away from a fixed location setting. As an extension to the monitoring scheme, medicine care is taken into consideration by utilizing the mobile phone as a barcode decoder, to verify and assist out-patients in the medication administration process, providing a better and more comprehensive healthcare service.

  2. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  3. Experimental Branch Retinal Vein Occlusion Induces Upstream Pericyte Loss and Vascular Destabilization.

    Directory of Open Access Journals (Sweden)

    Elisa Dominguez

    Full Text Available Branch retinal vein occlusion (BRVO leads to extensive vascular remodeling and is important cause of visual impairment. Although the vascular morphological changes following experimental vein occlusion have been described in a variety of models using angiography, the underlying cellular events are ill defined.We here show that laser-induced experimental BRVO in mice leads to a wave of TUNEL-positive endothelial cell (EC apoptosis in the upstream vascular network associated with a transient edema and hemorrhages. Subsequently, we observe an induction of EC proliferation within the dilated vein and capillaries, detected by EdU incorporation, and the edema resolves. However, the pericytes of the upstream capillaries are severely reduced, which was associated with continuing EC apoptosis and proliferation. The vascular remodeling was associated with increased expression of TGFβ, TSP-1, but also FGF2 expression. Exposure of the experimental animals to hypoxia, when pericyte (PC dropout had occurred, led to a dramatic increase in endothelial cell proliferation, confirming the vascular instability induced by the experimental BRVO.Experimental BRVO leads to acute endothelial cells apoptosis and increased permeability. Subsequently the upstream vascular network remains destabilized, characterized by pericyte dropout, un-physiologically high endothelial cells turnover and sensitivity to hypoxia. These early changes might pave the way for capillary loss and subsequent chronic ischemia and edema that characterize the late stage disease.

  4. Does small-bodied salmon spawning activity enhance streambed mobility?

    Science.gov (United States)

    Hassan, Marwan A.; Tonina, Daniele; Buxton, Todd H.

    2015-09-01

    Female salmonids bury and lay their eggs in streambeds by digging a pit, which is then covered with sediment from a second pit that is dug immediately upstream. The spawning process alters streambed topography, winnows fine sediment, and mixes sediment in the active layer. The resulting egg nests (redds) contain coarser and looser sediments than those of unspawned streambed areas, and display a dune-like shape with an amplitude and length that vary with fish size, substrate conditions, and flow conditions. Redds increase local bed surface roughness (drag, resulting in lower grain shear stress and less particle mobility. Spawning, also prevents streambed armoring by mixing surface and subsurface material, potentially increasing particle mobility. Here we use two-dimensional hydraulic modeling with detailed prespawning and postspawning bathymetries and field observations to test the effect of spawning by small-bodied salmonids on sediment transport. Our results show that topographical roughness from small salmon redds has negligible effects on shear stress at the reach-unit scale, and limited effects at the local scale. Conversely, results indicate sediment mixing reduces armoring and enhances sediment mobility, which increases potential bed load transport by subsequent floods. River restoration in fish-bearing streams should take into consideration the effects of redd excavation on channel stability. This is particularly important for streams that historically supported salmonids and are the focus of habitat restoration actions.

  5. Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility.

    Science.gov (United States)

    Akbar, Mariam; Javaid, Nadeem; Khan, Ayesha Hussain; Imran, Muhammad; Shoaib, Muhammad; Vasilakos, Athanasios

    2016-03-19

    Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability.

  6. Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility

    Directory of Open Access Journals (Sweden)

    Mariam Akbar

    2016-03-01

    Full Text Available Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS, i.e., an autonomous underwater vehicle (AUV, and also courier nodes (CNs, to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability.

  7. A FD/DAMA network architecture for the first generation land mobile satellite services

    Science.gov (United States)

    Yan, T.-Y.; Wang, C.; Cheng, U.; Dessouky, K.; Rafferty, W.

    1989-01-01

    A frequency division/demand assigned multiple access (FD/DAMA) network architecture for the first-generation land mobile satellite services is presented. Rationales and technical approaches are described. In this architecture, each mobile subscriber must follow a channel access protocol to make a service request to the network management center before transmission for either open-end or closed-end services. Open-end service requests will be processed on a blocked call cleared basis, while closed-end requests will be processed on a first-come-first-served basis. Two channel access protocols are investigated, namely, a recently proposed multiple channel collision resolution scheme which provides a significantly higher useful throughput, and the traditional slotted Aloha scheme. The number of channels allocated for either open-end or closed-end services can be adaptively changed according to aggregated traffic requests. Both theoretical and simulation results are presented. Theoretical results have been verified by simulation on the JPL network testbed.

  8. Improved surface-roughness scattering and mobility models for multi-gate FETs with arbitrary cross-section and biasing scheme

    Science.gov (United States)

    Lizzit, D.; Badami, O.; Specogna, R.; Esseni, D.

    2017-06-01

    We present a new model for surface roughness (SR) scattering in n-type multi-gate FETs (MuGFETs) and gate-all-around nanowire FETs with fairly arbitrary cross-sections, its implementation in a complete device simulator, and the validation against experimental electron mobility data. The model describes the SR scattering matrix elements as non-linear transformations of interface fluctuations, which strongly influences the root mean square value of the roughness required to reproduce experimental mobility data. Mobility simulations are performed via the deterministic solution of the Boltzmann transport equation for a 1D-electron gas and including the most relevant scattering mechanisms for electronic transport, such as acoustic, polar, and non-polar optical phonon scattering, Coulomb scattering, and SR scattering. Simulation results show the importance of accounting for arbitrary cross-sections and biasing conditions when compared to experimental data. We also discuss how mobility is affected by the shape of the cross-section as well as by its area in gate-all-around and tri-gate MuGFETs.

  9. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Abbas, Ziaul Haq

    2012-07-01

    . Towards this direction, various solutions have been proposed, ranging from deployment strategies for base stations to cooperative techniques etc. However, as base stations have the largest share in a network's energy consumption, methods that allow lightly-loaded base stations sleep or be switched off are possible means as a feasible step towards green communications. In this dissertation, we tackle the above mentioned problems from two perspectives, i.e., mobile station's and operator's perspectives. More specifically, by taking into account the amount of transferred data in uplinks and downlinks individually for various components in a hybrid network, strategies are proposed to reduce mobile station's battery energy consumption. For this purpose, other parameters such as link distance and remaining battery energy can also be considered for handover decision making, in order to maximize energy efficiency of the mobile station. To optimize long-term energy consumption of the mobile stations operated in such scenarios, a Markov decision process-based methodology is proposed as our contribution to this topic. Moreover, from operator's perspective, a network energy conservation scheme which may switch off a base station is proposed for micro- or pico-cells scenarios. Both deterministic and probabilistic schemes are proposed for network energy conservation. The problems considered and the solutions proposed in this dissertation advance the frontiers of the research work within the theme of energy efficiency for mobile devices as well as hybrid mobile and wireless networks.(Author)

  10. Delay-Aware Energy-Efficient Routing towards a Path-Fixed Mobile Sink in Industrial Wireless Sensor Networks

    Science.gov (United States)

    Wu, Shaobo; Chou, Wusheng; Niu, Jianwei; Guizani, Mohsen

    2018-01-01

    Wireless sensor networks (WSNs) involve more mobile elements with their widespread development in industries. Exploiting mobility present in WSNs for data collection can effectively improve the network performance. However, when the sink (i.e., data collector) path is fixed and the movement is uncontrollable, existing schemes fail to guarantee delay requirements while achieving high energy efficiency. This paper proposes a delay-aware energy-efficient routing algorithm for WSNs with a path-fixed mobile sink, named DERM, which can strike a desirable balance between the delivery latency and energy conservation. We characterize the object of DERM as realizing the energy-optimal anycast to time-varying destination regions, and introduce a location-based forwarding technique tailored for this problem. To reduce the control overhead, a lightweight sink location calibration method is devised, which cooperates with the rough estimation based on the mobility pattern to determine the sink location. We also design a fault-tolerant mechanism called track routing to tackle location errors for ensuring reliable and on-time data delivery. We comprehensively evaluate DERM by comparing it with two canonical routing schemes and a baseline solution presented in this work. Extensive evaluation results demonstrate that DERM can provide considerable energy savings while meeting the delay constraint and maintaining a high delivery ratio. PMID:29562628

  11. Delay-Aware Energy-Efficient Routing towards a Path-Fixed Mobile Sink in Industrial Wireless Sensor Networks.

    Science.gov (United States)

    Wu, Shaobo; Chou, Wusheng; Niu, Jianwei; Guizani, Mohsen

    2018-03-18

    Wireless sensor networks (WSNs) involve more mobile elements with their widespread development in industries. Exploiting mobility present in WSNs for data collection can effectively improve the network performance. However, when the sink (i.e., data collector) path is fixed and the movement is uncontrollable, existing schemes fail to guarantee delay requirements while achieving high energy efficiency. This paper proposes a delay-aware energy-efficient routing algorithm for WSNs with a path-fixed mobile sink, named DERM, which can strike a desirable balance between the delivery latency and energy conservation. We characterize the object of DERM as realizing the energy-optimal anycast to time-varying destination regions, and introduce a location-based forwarding technique tailored for this problem. To reduce the control overhead, a lightweight sink location calibration method is devised, which cooperates with the rough estimation based on the mobility pattern to determine the sink location. We also design a fault-tolerant mechanism called track routing to tackle location errors for ensuring reliable and on-time data delivery. We comprehensively evaluate DERM by comparing it with two canonical routing schemes and a baseline solution presented in this work. Extensive evaluation results demonstrate that DERM can provide considerable energy savings while meeting the delay constraint and maintaining a high delivery ratio.

  12. Delay-Aware Energy-Efficient Routing towards a Path-Fixed Mobile Sink in Industrial Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shaobo Wu

    2018-03-01

    Full Text Available Wireless sensor networks (WSNs involve more mobile elements with their widespread development in industries. Exploiting mobility present in WSNs for data collection can effectively improve the network performance. However, when the sink (i.e., data collector path is fixed and the movement is uncontrollable, existing schemes fail to guarantee delay requirements while achieving high energy efficiency. This paper proposes a delay-aware energy-efficient routing algorithm for WSNs with a path-fixed mobile sink, named DERM, which can strike a desirable balance between the delivery latency and energy conservation. We characterize the object of DERM as realizing the energy-optimal anycast to time-varying destination regions, and introduce a location-based forwarding technique tailored for this problem. To reduce the control overhead, a lightweight sink location calibration method is devised, which cooperates with the rough estimation based on the mobility pattern to determine the sink location. We also design a fault-tolerant mechanism called track routing to tackle location errors for ensuring reliable and on-time data delivery. We comprehensively evaluate DERM by comparing it with two canonical routing schemes and a baseline solution presented in this work. Extensive evaluation results demonstrate that DERM can provide considerable energy savings while meeting the delay constraint and maintaining a high delivery ratio.

  13. Characterization of wind velocities in the upstream induction zone of a wind turbine using scanning continuous-wave lidars

    DEFF Research Database (Denmark)

    Simley, Eric; Angelou, Nikolas; Mikkelsen, Torben Krogh

    2016-01-01

    As a wind turbine generates power, induced velocities, lower than the freestream velocity, will be present upstream of the turbine due to perturbation of the flow by the rotor. In this study, the upstream induction zone of a 225kW horizontal axis Vestas V27 wind turbine located at the Danish...... Technical University’s Risø campus is investigated using a scanning Light Detection and Ranging (lidar) system. Three short-range continuous-wave “WindScanner” lidars are positioned in the field around the V27 turbine allowing detection of all three components of the wind velocity vectors within...... the induction zone. The time-averaged mean wind speeds at different locations in the upstream induction zone are measured by scanning a horizontal plane at hub height and a vertical plane centered at the middle of the rotor extending roughly 1.5 rotor diameters (D) upstream of the rotor. Turbulence statistics...

  14. Location-based Mobile Relay Selection and Impact of Inaccurate Path Loss Model Parameters

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2010-01-01

    In this paper we propose a relay selection scheme which uses collected location information together with a path loss model for relay selection, and analyze the performance impact of mobility and different error causes on this scheme. Performance is evaluated in terms of bit error rate...... by simulations. The SNR measurement based relay selection scheme proposed previously is unsuitable for use with fast moving users in e.g. vehicular scenarios due to a large signaling overhead. The proposed location based scheme is shown to work well with fast moving users due to a lower signaling overhead...... in these situations. As the location-based scheme relies on a path loss model to estimate link qualities and select relays, the sensitivity with respect to inaccurate estimates of the unknown path loss model parameters is investigated. The parameter ranges that result in useful performance were found...

  15. PROMoter uPstream Transcripts share characteristics with mRNAs and are produced upstream of all three major types of mammalian promoters

    DEFF Research Database (Denmark)

    Preker, Pascal; Almvig, Kristina; Christensen, Marianne S

    2011-01-01

    RNAs, PROMPTs are largely nuclear and rapidly turned over by the RNA exosome. PROMPT-transcribing DNA is occupied by RNA polymerase II (RNAPII) complexes with serine 2 phosphorylated C-terminal domains (CTDs), mimicking that of the associated genic region. Thus, the inefficient elongation capacity of PROMPT...... transcription cannot solely be assigned to poor CTD phosphorylation. Conditions that reduce gene transcription increase RNAPII occupancy of the upstream PROMPT region, suggesting that they reside in a common transcription compartment. Surprisingly, gene promoters that are actively transcribed by RNAPI...

  16. Essential roles of caspases and their upstream regulators in rotenone-induced apoptosis

    International Nuclear Information System (INIS)

    Lee Jihjong; Huang, M.-S.; Yang, I-C.; Lai, T.-C.; Wang, J.-L.; Pang, V.F.; Hsiao, M.; Kuo, M.Y.P.

    2008-01-01

    In the present study, we examined whether caspases and their upstream regulators are involved in rotenone-induced cytotoxicity. Rotenone significantly inhibited the proliferation of oral cancer cell lines in a dose-dependent manner compared to normal oral mucosal fibroblasts. Flow cytometric analysis of DNA content showed that rotenone treatment induced apoptosis following G2/M arrest. Western blotting showed activation of both the caspase-8 and caspase-9 pathways, which differed from previous studies conducted in other cell types. Furthermore, p53 protein and its downstream pro-apoptotic target, Bax, were induced in SAS cells after treatment with rotenone. Rotenone-induced apoptosis was inhibited by antioxidants (glutathione, N-acetylcysteine, and tiron). In conclusion, our results demonstrate significant involvement of caspases and their upstream regulators in rotenone-induced cytotoxicity

  17. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  18. A Reliable Handoff Mechanism for Mobile Industrial Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Jian; Yang, Dong; Zhang, Hongke; Gidlund, Mikael

    2017-08-04

    With the prevalence of low-power wireless devices in industrial applications, concerns about timeliness and reliability are bound to continue despite the best efforts of researchers to design Industrial Wireless Sensor Networks (IWSNs) to improve the performance of monitoring and control systems. As mobile devices have a major role to play in industrial production, IWSNs should support mobility. However, research on mobile IWSNs and practical tests have been limited due to the complicated resource scheduling and rescheduling compared with traditional wireless sensor networks. This paper proposes an effective mechanism to guarantee the performance of handoff, including a mobility-aware scheme, temporary connection and quick registration. The main contribution of this paper is that the proposed mechanism is implemented not only in our testbed but in a real industrial environment. The results indicate that our mechanism not only improves the accuracy of handoff triggering, but also solves the problem of ping-pong effect during handoff. Compared with the WirelessHART standard and the RSSI-based approach, our mechanism facilitates real-time communication while being more reliable, which can help end-to-end packet delivery remain an average of 98.5% in the scenario of mobile IWSNs.

  19. Interference Robust Transmission for the Downlink of an OFDM-Based Mobile Communications System

    Directory of Open Access Journals (Sweden)

    Markus Konrad

    2008-01-01

    Full Text Available Radio networks for future mobile communications systems, for example, 3GPP Long-Term Evolution (LTE, are likely to use an orthogonal frequency division multiplexing- (OFDM- based air interface in the downlink with a frequency reuse factor of one to avoid frequency planning. Therefore, system capacity is limited by interference, which is particularly crucial for mobile terminals with a single receive antenna. Nevertheless, next generation mobile communications systems aim at increasing downlink throughput. In this paper, a single antenna interference cancellation (SAIC algorithm is introduced for amplitude-shift keying (ASK modulation schemes in combination with bit-interleaved coded OFDM. By using such a transmission strategy, high gains in comparison to a conventional OFDM transmission with quadrature amplitude modulation (QAM can be achieved. The superior performance of the novel scheme is confirmed by an analytical bit-error probability (BEP analysis of the SAIC receiver for a single interferer, Rayleigh fading, and uncoded transmission. For the practically more relevant multiple interferer case we present an adaptive least-mean-square (LMS and an adaptive recursive least-squares (RLS SAIC algorithm. We show that in particular the RLS approach enables a good tradeoff between performance and complexity and is robust even to multiple interferers.

  20. Model-based Evaluation of Location-based Relaying Policies in a Realistic Mobile Indoor Scenario

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Olsen, Rasmus Løvenstein; Madsen, Tatiana Kozlova

    2012-01-01

    For WLAN systems in which relaying is exploited for improving throughput performance, node mobility and in- formation collection delays can have a significant impact on the performance of a relay selection scheme. This paper analyzes this influence on the decision process using a previously...

  1. Online variational Bayesian filtering-based mobile target tracking in wireless sensor networks.

    Science.gov (United States)

    Zhou, Bingpeng; Chen, Qingchun; Li, Tiffany Jing; Xiao, Pei

    2014-11-11

    The received signal strength (RSS)-based online tracking for a mobile node in wireless sensor networks (WSNs) is investigated in this paper. Firstly, a multi-layer dynamic Bayesian network (MDBN) is introduced to characterize the target mobility with either directional or undirected movement. In particular, it is proposed to employ the Wishart distribution to approximate the time-varying RSS measurement precision's randomness due to the target movement. It is shown that the proposed MDBN offers a more general analysis model via incorporating the underlying statistical information of both the target movement and observations, which can be utilized to improve the online tracking capability by exploiting the Bayesian statistics. Secondly, based on the MDBN model, a mean-field variational Bayesian filtering (VBF) algorithm is developed to realize the online tracking of a mobile target in the presence of nonlinear observations and time-varying RSS precision, wherein the traditional Bayesian filtering scheme cannot be directly employed. Thirdly, a joint optimization between the real-time velocity and its prior expectation is proposed to enable online velocity tracking in the proposed online tacking scheme. Finally, the associated Bayesian Cramer-Rao Lower Bound (BCRLB) analysis and numerical simulations are conducted. Our analysis unveils that, by exploiting the potential state information via the general MDBN model, the proposed VBF algorithm provides a promising solution to the online tracking of a mobile node in WSNs. In addition, it is shown that the final tracking accuracy linearly scales with its expectation when the RSS measurement precision is time-varying.

  2. Experience of molecular monitoring techniques in upstream oil and gas operations

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Anthony F.; Anfindsen, Hilde; Liengen, Turid; Molid, Solfrid [Statoil ASA (Denmark)

    2011-07-01

    For a numbers of years, molecular monitoring tools have been used in upstream oil and gas operations but the results have given only limited added value. This paper discusses the various techniques available for upstream molecular monitoring which provides scope for identification of microbial influenced problems. The methodology, which consists of analyzing solid samples using traditional as well as molecular techniques, is detailed. Two cases were studied with the objective of determining if microbial contamination was contributing to the problem. The first case was a study of amorphous deposits in production wells and mainly iron sulphide was found. The second study was of amorphous deposits in water injection wells and the analysis showed typical components of drilling and completion fluids with some organic material. Two more cases, corrosion of tubing in a water injection well and flow line corrosion, are discussed and the results are given. From the study, it can be concluded that failure can be due to several factors, chemical and biological.

  3. Role of nitric oxide in vasodilation in upstream muscle during intermittent pneumatic compression.

    Science.gov (United States)

    Chen, Long-En; Liu, Kang; Qi, Wen-Ning; Joneschild, Elizabeth; Tan, Xiangling; Seaber, Anthony V; Stamler, Jonathan S; Urbaniak, James R

    2002-02-01

    This study investigated the dosage effects of nitric oxide synthase (NOS) inhibitor N(G)-monomethyl-L-arginine (L-NMMA) on intermittent pneumatic compression (IPC)-induced vasodilation in uncompressed upstream muscle and the effects of IPC on endothelial NOS (eNOS) expression in upstream muscle. After L-NMMA infusion, mean arterial pressure increased by 5% from baseline (99.5 +/- 18.7 mmHg; P < 0.05). Heart rate and respiratory rate were not significantly affected. One-hour IPC application on legs induced a 10% dilation from baseline in 10- to 20-microm arterioles and a 10-20% dilation in 21- to 40 microm arterioles and 41- to 70-microm arteries in uncompressed cremaster muscle. IPC-induced vasodilation was dose dependently reduced, abolished, or even reversed by concurrently infused L-NMMA. Moreover, expression of eNOS mRNA in uncompressed cremaster muscle was upregulated to 2 and 2.5 times normal at the end of 1- and 5-h IPC on legs, respectively, and the expression of eNOS protein was upregulated to 1.8 times normal. These increases returned to baseline level after cessation of IPC. The results suggest that eNOS plays an important role in regulating the microcirculation in upstream muscle during IPC.

  4. CLAS: A Novel Communications Latency Based Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Zuochao Dou

    2017-01-01

    Full Text Available We design and implement a novel communications latency based authentication scheme, dubbed CLAS, that strengthens the security of state-of-the-art web authentication approaches by leveraging the round trip network communications latency (RTL between clients and authenticators. In addition to the traditional credentials, CLAS profiles RTL values of clients and uses them to defend against password compromise. The key challenges are (i to prevent RTL manipulation, (ii to alleviate network instabilities, and (iii to address mobile clients. CLAS addresses the first challenge by introducing a novel network architecture, which makes it extremely difficult for attackers to simulate legitimate RTL values. The second challenge is addressed by outlier removal and multiple temporal profiling, while the last challenge is addressed by augmenting CLAS with out-of-band-channels or other authentication schemes. CLAS restricts login to profiled locations while demanding additional information for nonprofiled ones, which highly reduces the attack surface even when the legitimate credentials are compromised. Additionally, unlike many state-of-the-art authentication mechanisms, CLAS is resilient to phishing, pharming, man-in-the-middle, and social engineering attacks. Furthermore, CLAS is transparent to users and incurs negligible overhead. The experimental results show that CLAS can achieve very low false positive and false negative rates.

  5. Sodium Pick-Up Ion Observations in the Solar Wind Upstream of Mercury

    Science.gov (United States)

    Jasinski, J. M.; Raines, J. M.; Slavin, J. A.; Regoli, L. R.; Murphy, N.

    2018-05-01

    We present the first observations of sodium pick-up ions upstream of Mercury’s magnetosphere. From these observations we infer properties of Mercury’s sodium exosphere and implications for the solar wind interaction with Mercury’s magnetosphere.

  6. Network design consideration of a satellite-based mobile communications system

    Science.gov (United States)

    Yan, T.-Y.

    1986-01-01

    Technical considerations for the Mobile Satellite Experiment (MSAT-X), the ground segment testbed for the low-cost spectral efficient satellite-based mobile communications technologies being developed for the 1990's, are discussed. The Network Management Center contains a flexible resource sharing algorithm, the Demand Assigned Multiple Access scheme, which partitions the satellite transponder bandwidth among voice, data, and request channels. Satellite use of multiple UHF beams permits frequency reuse. The backhaul communications and the Telemetry, Tracking and Control traffic are provided through a single full-coverage SHF beam. Mobile Terminals communicate with the satellite using UHF. All communications including SHF-SHF between Base Stations and/or Gateways, are routed through the satellite. Because MSAT-X is an experimental network, higher level network protocols (which are service-specific) will be developed only to test the operation of the lowest three levels, the physical, data link, and network layers.

  7. An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment

    Directory of Open Access Journals (Sweden)

    Mansik Kim

    2017-08-01

    Full Text Available As the Internet of Things (IoT has developed, the emerging sensor network (ESN that integrates emerging technologies, such as autonomous driving, cyber-physical systems, mobile nodes, and existing sensor networks has been in the limelight. Smart homes have been researched and developed by various companies and organizations. Emerging sensor networks have some issues of providing secure service according to a new environment, such as a smart home, and the problems of low power and low-computing capacity for the sensor that previous sensor networks were equipped with. This study classifies various sensors used in smart homes into three classes and contains the hierarchical topology for efficient communication. In addition, a scheme for establishing secure communication among sensors based on physical unclonable functions (PUFs that cannot be physically cloned is suggested in regard to the sensor’s low performance. In addition, we analyzed this scheme by conducting security and performance evaluations proving to constitute secure channels while consuming fewer resources. We believe that our scheme can provide secure communication by using fewer resources in a smart home environment in the future.

  8. Cooperative Transmission in Mobile Wireless Sensor Networks with Multiple Carrier Frequency Offsets: A Double-Differential Approach

    Directory of Open Access Journals (Sweden)

    Kun Zhao

    2014-01-01

    Full Text Available As a result of the rapidly increasing mobility of sensor nodes, mobile wireless sensor networks (MWSNs would be subject to multiple carrier frequency offsets (MCFOs, which result in time-varying channels and drastically degrade the network performance. To enhance the performance of such MWSNs, we propose a relay selection (RS based double-differential (DD cooperative transmission scheme, termed RSDDCT, in which the best relay sensor node is selected to forward the source sensor node’s signals to the destination sensor node with the detect-and-forward (DetF protocol. Assuming a Rayleigh fading environment, first, exact closed-form expressions for the outage probability and average bit error rate (BER of the RSDDCT scheme are derived. Then, simple and informative asymptotic outage probability and average BER expressions at the large signal-to-noise ratio (SNR regime are presented, which reveal that the RSDDCT scheme can achieve full diversity. Furthermore, the optimum power allocation strategy in terms of minimizing the average BER is investigated, and simple analytical solutions are obtained. Simulation results demonstrate that the proposed RSDDCT scheme can achieve excellent performance over fading channels in the presence of unknown random MCFOs. It is also shown that the proposed optimum power allocation strategy offers substantial average BER performance improvement over the equal power allocation strategy.

  9. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  10. An upstream activation element exerting differential transcriptional activation on an archaeal promoter

    DEFF Research Database (Denmark)

    Peng, Nan; Xia, Qiu; Chen, Zhengjun

    2009-01-01

    S gene encoding an arabinose binding protein was characterized using an Sulfolobus islandicus reporter gene system. The minimal active araS promoter (P(araS)) was found to be 59 nucleotides long and harboured four promoter elements: an ara-box, an upstream transcription factor B-responsive element (BRE......), a TATA-box and a proximal promoter element, each of which contained important nucleotides that either greatly decreased or completely abolished promoter activity upon mutagenesis. The basal araS promoter was virtually inactive due to intrinsically weak BRE element, and the upstream activating sequence...... (UAS) ara-box activated the basal promoter by recruiting transcription factor B to its BRE. While this UAS ensured a general expression from an inactive or weak basal promoter in the presence of other tested carbon resources, it exhibited a strong arabinose-responsive transcriptional activation. To our...

  11. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  12. Mobile marketing for mobile games

    OpenAIRE

    Vu, Giang

    2016-01-01

    Highly developed mobile technology and devices enable the rise of mobile game industry and mobile marketing. Hence mobile marketing for mobile game is an essential key for a mobile game success. Even though there are many articles on marketing for mobile games, there is a need of highly understanding mobile marketing strategies, how to launch a mobile campaign for a mobile game. Besides that, it is essential to understand the relationship between mobile advertising and users behaviours. There...

  13. Canadian upstream oil and gas industry profitability: Historical review and future perspectives [with executive summary

    International Nuclear Information System (INIS)

    1991-09-01

    The profitability of the Canadian upstream oil and gas industry is examined by analyzing return on equity and return on capital invested. By all measures and interpretations, the upstream industry has been unprofitable since the mid-1980s; returns generated are far below the industry's own historical cost of capital, and are inadequate relative to other sectors of the Canadian economy and to international oil and gas companies. This poor profitability is attributed to such factors as: overly optimistic price forecasts and healthy cash flows generated in the early 1980s, which led to excess capital spending; poor returns on capital reflective of the physical limitations of the Western Canadian Sedimentary Basin; high capital and operating costs; and a high royalty burden imposed by provincial governments. The consequences of low profitability include inadequate returns to equity investors, a drop in spending on upstream services such as drilling and exploration, a reduced ability of the industry to generate employment, and an adverse effect on the economy of Alberta. Forecasts indicate that the upstream sector is extremely vulnerable to a scenario of relatively flat prices due to high and increasing operating costs and depletion charges, and the significant royalty payments that still are in effect. Little scope is foreseen for industry profitability to return to acceptable levels over the first half of the 1990s. Reduced royalties have the potential to make a significant contribution to improved profitability. 52 figs., 40 tabs

  14. Performance Analysis of a Two-Hop MIMO Mobile-to-Mobile via Stratospheric-Relay Link Employing Hierarchical Modulation

    Directory of Open Access Journals (Sweden)

    Nikolaos Nomikos

    2013-01-01

    Full Text Available Next generation wireless communication networks intend to take advantage of the integration of terrestrial and aerospace infrastructures. Besides, multiple-input multiple-output (MIMO architecture is the key technology, which has brought the wireless gigabit vision closer to reality. In this direction, high-altitude platforms (HAPs could act as relay stations in the stratosphere transferring information from an uplink to a downlink MIMO channel. This paper investigates the performance of a novel transmission scheme for the delivery of mobile-to-mobile (M-to-M services via a stratospheric relay. It is assumed that the source, relay, and destination nodes are equipped with multiple antennas and that amplify-and-forward (AF relaying is adopted. The performance is analyzed through rigorous simulations in terms of the bit-error rate (BER by using a recently proposed 3D geometry-based reference model in spatially correlated flat-fading MIMO channels, employing a hierarchical broadcast technique and minimum mean square error (MMSE receivers.

  15. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  16. The giant mottled eel, Anguilla marmorata, uses blue-shifted rod photoreceptors during upstream migration.

    Science.gov (United States)

    Wang, Feng-Yu; Fu, Wen-Chun; Wang, I-Li; Yan, Hong Young; Wang, Tzi-Yuan

    2014-01-01

    Catadromous fishes migrate between ocean and freshwater during particular phases of their life cycle. The dramatic environmental changes shape their physiological features, e.g. visual sensitivity, olfactory ability, and salinity tolerance. Anguilla marmorata, a catadromous eel, migrates upstream on dark nights, following the lunar cycle. Such behavior may be correlated with ontogenetic changes in sensory systems. Therefore, this study was designed to identify changes in spectral sensitivity and opsin gene expression of A. marmorata during upstream migration. Microspectrophotometry analysis revealed that the tropical eel possesses a duplex retina with rod and cone photoreceptors. The λmax of rod cells are 493, 489, and 489 nm in glass, yellow, and wild eels, while those of cone cells are 508, and 517 nm in yellow, and wild eels, respectively. Unlike European and American eels, Asian eels exhibited a blue-shifted pattern of rod photoreceptors during upstream migration. Quantitative gene expression analyses of four cloned opsin genes (Rh1f, Rh1d, Rh2, and SWS2) revealed that Rh1f expression is dominant at all three stages, while Rh1d is expressed only in older yellow eel. Furthermore, sequence comparison and protein modeling studies implied that a blue shift in Rh1d opsin may be induced by two known (N83, S292) and four putative (S124, V189, V286, I290) tuning sites adjacent to the retinal binding sites. Finally, expression of blue-shifted Rh1d opsin resulted in a spectral shift in rod photoreceptors. Our observations indicate that the giant mottled eel is color-blind, and its blue-shifted scotopic vision may influence its upstream migration behavior and habitat choice.

  17. Frequency effects of upstream wake and blade interaction on the unsteady boundary layer flow

    International Nuclear Information System (INIS)

    Kang, Dong Jin; Bae, Sang Su

    2002-01-01

    Effects of the reduced frequency of upstream wake on downstream unsteady boundary layer flow were simulated by using a Navier-Stokes code. The Navier-Stokes code is based on an unstructured finite volume method and uses a low Reynolds number turbulence model to close the momentum equations. The geometry used in this paper is the MIT flapping foil experimental set-up and the reduced frequency of the upstream wake is varied in the range of 0.91 to 10.86 to study its effect on the unsteady boundary layer flow. Numerical solutions show that they can be divided into two categories. One is so called the low frequency solution, and behaves quite similar to a Stokes layer. Its characteristics is found to be quite similar to those due to either a temporal or spatial wave. The low frequency solutions are observed clearly when reduced frequency is smaller than 3.26. The other one is the high frequency solution. It is observed for the reduced frequency larger than 7.24. It shows a sudden shift of the phase angle of the unsteady velocity around the edge of the boundary layer. The shift of phase angle is about 180 degree, and leads to separation of the boundary layer flow from corresponding outer flow. The high frequency solution shows the characteristics of a temporal wave whose wave length is half of the upstream frequency. This characteristics of the high frequency solution is found to be caused by the strong interaction between unsteady vortices. This strong interaction also leads to destroy of the upstream wake stripe inside the viscous sublayer as well as the buffer layer

  18. Two-level modulation scheme to reduce latency for optical mobile fronthaul networks.

    Science.gov (United States)

    Sung, Jiun-Yu; Chow, Chi-Wai; Yeh, Chien-Hung; Chang, Gee-Kung

    2016-10-31

    A system using optical two-level orthogonal-frequency-division-multiplexing (OFDM) - amplitude-shift-keying (ASK) modulation is proposed and demonstrated to reduce the processing latency for the optical mobile fronthaul networks. At the proposed remote-radio-head (RRH), the high data rate OFDM signal does not need to be processed, but is directly launched into a high speed photodiode (HSPD) and subsequently emitted by an antenna. Only a low bandwidth PD is needed to recover the low data rate ASK control signal. Hence, it is simple and provides low-latency. Furthermore, transporting the proposed system over the already deployed optical-distribution-networks (ODNs) of passive-optical-networks (PONs) is also demonstrated with 256 ODN split-ratios.

  19. Electrorecycling of Critical and Value Metals from Mobile Electronics

    Energy Technology Data Exchange (ETDEWEB)

    Lister, Tedd E.; Wang, Peming; Anderko, Andre

    2014-09-01

    Mobile electronic devices such as smart phones and tablets are a significant source of valuable metals that should be recycled. Each year over a billion devices are sold world-wide and the average life is only a couple years. Value metals in phones are gold, palladium, silver, copper, cobalt and nickel. Devices now contain increasing amounts of rare earth elements (REE). In recent years the supply chain for REE has moved almost exclusively to China. They are contained in displays, speakers and vibrators within the devices. By US Department of Energy (DOE) classification, specific REEs (Nd, Dy, Eu, Tb and Y) are considered critical while others (Ce, La and Pr) are deemed near critical. Effective recycling schemes should include the recovery of these critical materials. By including more value materials in a recovery scheme, more value can be obtained by product diversification and less waste metals remains to be disposed of. REEs are mined as a group such that when specific elements become critical significantly more ore must be processed to capture the dilute but valuable critical elements. Targeted recycling of items containing the more of the less available critical materials could address their future criticality. This presentation will describe work in developing aqueous electrochemistry-based schemes for recycling metals from scrap mobile electronics. The electrorecycling process generates oxidizing agents at an anode while reducing dissolved metals at the cathode. E vs pH diagrams and metals dissolution experiments are used to assess effectiveness of various solution chemistries. Although several schemes were envisioned, a two stages process has been the focus of work: 1) initial dissolution of Cu, Sn, Ag and magnet materials using Fe+3 generated in acidic sulfate and 2) final dissolution of Pd and Au using Cl2 generated in an HCl solution. Experiments were performed using simulated metal mixtures. Both Cu and Ag were recovered at ~ 97% using Fe+3 while

  20. Effects of a Simple Convective Organization Scheme in a Two-Plume GCM

    Science.gov (United States)

    Chen, Baohua; Mapes, Brian E.

    2018-03-01

    A set of experiments is described with the Community Atmosphere Model (CAM5) using a two-plume convection scheme. To represent the differences of organized convection from General Circulation Model (GCM) assumptions of isolated plumes in uniform environments, a dimensionless prognostic "organization" tracer Ω is invoked to lend the second plume a buoyancy advantage relative to the first, as described in Mapes and Neale (2016). When low-entrainment plumes are unconditionally available (Ω = 1 everywhere), deep convection occurs too easily, with consequences including premature (upstream) rainfall in inflows to the deep tropics, excessive convective versus large-scale rainfall, poor relationships to the vapor field, stable bias in the mean state, weak and poor tropical variability, and midday peak in diurnal rainfall over land. Some of these are shown to also be characteristic of CAM4 with its separated deep and shallow convection schemes. When low-entrainment plumes are forbidden by setting Ω = 0 everywhere, some opposite problems can be discerned. In between those extreme cases, an interactive Ω driven by the evaporation of precipitation acts as a local positive feedback loop, concentrating deep convection: In areas of little recent rain, only highly entraining plumes can occur, unfavorable for rain production. This tunable mechanism steadily increases precipitation variance in both space and time, as illustrated here with maps, time-longitude series, and spectra, while avoiding some mean state biases as illustrated with process-oriented diagnostics such as conserved variable profiles and vapor-binned precipitation curves.

  1. A new hybrid scheme for simulations of highly collisional RF-driven plasmas

    International Nuclear Information System (INIS)

    Eremin, Denis; Hemke, Torben; Mussenbrock, Thomas

    2016-01-01

    This work describes a new 1D hybrid approach for modeling atmospheric pressure discharges featuring complex chemistry. In this approach electrons are described fully kinetically using particle-in-cell/Monte-Carlo (PIC/MCC) scheme, whereas the heavy species are modeled within a fluid description. Validity of the popular drift-diffusion approximation is verified against a ‘full’ fluid model accounting for the ion inertia and a fully kinetic PIC/MCC code for ions as well as electrons. The fluid models require knowledge of the momentum exchange frequency and dependence of the ion mobilities on the electric field when the ions are in equilibrium with the latter. To this end an auxiliary Monte-Carlo scheme is constructed. It is demonstrated that the drift-diffusion approximation can overestimate ion transport in simulations of RF-driven discharges with heavy ion species operated in the γ mode at the atmospheric pressure or in all discharge simulations for lower pressures. This can lead to exaggerated plasma densities and incorrect profiles provided by the drift-diffusion models. Therefore, the hybrid code version featuring the full ion fluid model should be favored against the more popular drift-diffusion model, noting that the suggested numerical scheme for the former model implies only a small additional computational cost. (paper)

  2. Wake flow behaviour behind a smaller cylinder oscillating in the wake of an upstream stationary cylinder

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Yangyang; Sun, Zhilin [Ocean College, Zhejiang University, Hangzhou 310058 (China); Tan, Danielle S [Maritime Research Centre, Nanyang Technological University, Singapore 639798 (Singapore); Yu, Dingyong [College of Engineering, Ocean University of China, 266100 (China); Tan, Soon Keat, E-mail: yygao@zju.edu.cn [Nanyang Environment and Water Research Institute, Nanyang Technological University, Singapore 639798 (Singapore)

    2014-04-01

    The flow patterns around a cylinder oscillating freely in the wake of a larger cylinder upstream were investigated using the particle image velocimetry technique. The upstream cylinder was fixed at both ends while the downstream smaller cylinder was held by springs such that it was free to oscillate in the transverse direction. The flow patterns, amplitudes of oscillation and vortex shedding frequencies were compared with those of a single cylinder. In the presence of the upstream cylinder, the three parameters characterizing the oscillation response of the smaller cylinder—amplitude of oscillation, vortex shedding frequency and Reynolds stresses—were greatly reduced. While their magnitude increased with gap ratio, these three parameters were still smaller than the corresponding magnitudes for a single oscillating cylinder. The peak values of turbulence statistics such as Reynolds shear stress and normal stress behind the oscillating downstream cylinder were similarly reduced, and increased with gap ratios. (paper)

  3. POSTRANSLATIONAL MODIFICATIONS OF P53: UPSTREAM SIGNALING PATHWAYS.

    Energy Technology Data Exchange (ETDEWEB)

    ANDERSON,C.W.APPELLA,E.

    2003-10-23

    The p53 tumor suppressor is a tetrameric transcription factor that is posttranslational modified at >20 different sites by phosphorylation, acetylation, or sumoylation in response to various cellular stress conditions. Specific posttranslational modifications, or groups of modifications, that result from the activation of different stress-induced signaling pathways are thought to modulate p53 activity to regulate cell fate by inducing cell cycle arrest, apoptosis, or cellular senescence. Here we review recent progress in characterizing the upstream signaling pathways whose activation in response to various genotoxic and non-genotoxic stresses result in p53 posttranslational modifications.

  4. The Planform Mobility of Large River Channel Confluences

    Science.gov (United States)

    Sambrook Smith, Greg; Dixon, Simon; Nicholas, Andrew; Bull, Jon; Vardy, Mark; Best, James; Goodbred, Steven; Sarker, Maminul

    2017-04-01

    Large river confluences are widely acknowledged as exerting a controlling influence upon both upstream and downstream morphology and thus channel planform evolution. Despite their importance, little is known concerning their longer-term evolution and planform morphodynamics, with much of the literature focusing on confluences as representing fixed, nodal points in the fluvial network. In contrast, some studies of large sand bed rivers in India and Bangladesh have shown large river confluences can be highly mobile, although the extent to which this is representative of large confluences around the world is unknown. Confluences have also been shown to generate substantial bed scours, and if the confluence location is mobile these scours could 'comb' across wide areas. This paper presents field data of large confluences morphologies in the Ganges-Brahmaputra-Meghna river basin, illustrating the spatial extent of large river bed scours and showing scour depth can extend below base level, enhancing long term preservation potential. Based on a global review of the planform of large river confluences using Landsat imagery from 1972 to 2014 this study demonstrates such scour features can be highly mobile and there is an array of confluence morphodynamic types: from freely migrating confluences, through confluences migrating on decadal timescales to fixed confluences. Based on this analysis, a conceptual model of large river confluence types is proposed, which shows large river confluences can be sites of extensive bank erosion and avulsion, creating substantial management challenges. We quantify the abundance of mobile confluence types by classifying all large confluences in both the Amazon and Ganges-Brahmaputra-Meghna basins, showing these two large rivers have contrasting confluence morphodynamics. We show large river confluences have multiple scales of planform adjustment with important implications for river management, infrastructure and interpretation of the rock

  5. Cooperative Optimization QoS Cloud Routing Protocol Based on Bacterial Opportunistic Foraging and Chemotaxis Perception for Mobile Internet

    Directory of Open Access Journals (Sweden)

    Shujuan Wang

    2015-01-01

    Full Text Available In order to strengthen the mobile Internet mobility management and cloud platform resources utilization, optimizing the cloud routing efficiency is established, based on opportunistic bacterial foraging bionics, and puts forward a chemotaxis perception of collaborative optimization QoS (Quality of Services cloud routing mechanism. The cloud routing mechanism is based on bacterial opportunity to feed and bacterial motility and to establish the data transmission and forwarding of the bacterial population behavior characteristics. This mechanism is based on the characteristics of drug resistance of bacteria and the structure of the field, and through many iterations of the individual behavior and population behavior the bacteria can be spread to the food gathering area with a certain probability. Finally, QoS cloud routing path would be selected and optimized based on bacterial bionic optimization and hedge mapping relationship between mobile Internet node and bacterial population evolution iterations. Experimental results show that, compared with the standard dynamic routing schemes, the proposed scheme has shorter transmission delay, lower packet error ratio, QoS cloud routing loading, and QoS cloud route request overhead.

  6. Internet Cognitive Failure and Fatigue Relevant to Learners' Self-Regulation and Learning Progress in English Vocabulary with a Calibration Scheme

    Science.gov (United States)

    Hong, J.-C.; Hwang, M.-Y.; Chang, H.-W.; Tai, K.-H.; Kuo, Y.-C.; Tsai, Y.-H.

    2015-01-01

    To determine the factors of learning effectiveness in English vocabulary learning when using a calibration scheme, this study developed a freshman English mobile device application (for iPhone 4) for students with low levels of English proficiency to practise vocabulary in the beginning of their Freshman English course. Data were collected and…

  7. Mobility as a Service : A Critical Review of Definitions, Assessments of Schemes, and Key Challenges

    NARCIS (Netherlands)

    Jittrapirom, Peraphan; Caiati, Valeria; Feneri, Anna-Maria; Ebrahimigharehbaghi, S.; Alonso González, M.J.; Sreekantan Nair, J.N.

    2017-01-01

    Mobility as a Service (MaaS) is a recent innovative transport concept, anticipated to induce significant changes in the current transport practices. However, there is ambiguity surrounding the concept; it is uncertain what are the core characteristics of MaaS and in which way they can be addressed.

  8. Evaluation of QoS supported in Network Mobility NEMO environments

    International Nuclear Information System (INIS)

    Hussien, L F; Abdalla, A H; Habaebi, M H; Khalifa, O O; Hassan, W H

    2013-01-01

    Network mobility basic support (NEMO BS) protocol is an entire network, roaming as a unit which changes its point of attachment to the Internet and consequently its reachability in the network topology. NEMO BS doesn't provide QoS guarantees to its users same as traditional Internet IP and Mobile IPv6 as well. Typically, all the users will have same level of services without considering about their application requirements. This poses a problem to real-time applications that required QoS guarantees. To gain more effective control of the network, incorporated QoS is needed. Within QoS-enabled network the traffic flow can be distributed to various priorities. Also, the network bandwidth and resources can be allocated to different applications and users. Internet Engineering Task Force (IETF) working group has proposed several QoS solutions for static network such as IntServ, DiffServ and MPLS. These QoS solutions are designed in the context of a static environment (i.e. fixed hosts and networks). However, they are not fully adapted to mobile environments. They essentially demands to be extended and adjusted to meet up various challenges involved in mobile environments. With existing QoS mechanisms many proposals have been developed to provide QoS for individual mobile nodes (i.e. host mobility). In contrary, research based on the movement of the whole mobile network in IPv6 is still undertaking by the IETF working groups (i.e. network mobility). Few researches have been done in the area of providing QoS for roaming networks. Therefore, this paper aims to review and investigate (previous /and current) related works that have been developed to provide QoS in mobile network. Consequently, a new proposed scheme will be introduced to enhance QoS within NEMO environment, achieving by which seamless mobility to users of mobile network node (MNN)

  9. Governing Grazing and Mobility in the Samburu Lowlands, Kenya

    Directory of Open Access Journals (Sweden)

    Annemiek Pas

    2018-03-01

    Full Text Available Pastoral mobility is seen as the most effective strategy to make use of constantly shifting resources. However, mobile pastoralism as a highly-valued strategy to manage grazing areas and exploit resource variability is becoming more complex, due to recurrent droughts, loss of forage, government-led settlement schemes, and enclosure of land for community conservation, among other reasons. Yet knowledge of how Samburu pastoralists perceive these changes, and govern and innovate in their mobility patterns and resource use, has received limited attention. This paper seeks to understand how Samburu pastoralists in the drylands of northern Kenya use and govern natural resources, how livestock grazing and mobility is planned for, and how boundaries and territory are constructed and performed both within and beyond the context of (nongovernmental projects. Fieldwork for this paper was conducted in Sesia, Samburu East, and consisted of interviews, focus group discussions, and participatory observation. Findings show that livestock mobility involves longer periods and more complex distances due to a shrinking resource base and new rules of access. Although access was previously generated based on the value of reciprocity, the creation of new forms of resource management results in conditional processes of inclusion and exclusion. Policy and project implementation has historically been driven by the imperative to secure land tenure and improve pasture in bounded areas. Opportunities to support institutions that promote mobility have been given insufficient attention.

  10. Impacts of shape and height of upstream roof on airflow and pollutant dispersion inside an urban street canyon.

    Science.gov (United States)

    Huang, Yuan-Dong; He, Wen-Rong; Kim, Chang-Nyung

    2015-02-01

    A two-dimensional numerical model for simulating flow and pollutant dispersion in an urban street canyon is firstly developed using the FLUENT code and then validated against the wind tunnel results. After this, the flow field and pollutant dispersion inside an urban street canyon with aspect ratio W/H = 1 are examined numerically considering five different shapes (vaulted, trapezoidal, slanted, upward wedged, and downward wedged roofs) as well as three different roof height to building height ratios (Z H /H = 1/6, 1/3, and 1/2) for the upstream building roof. The results obtained reveal that the shape and height of an upstream roof have significant influences on flow pattern and pollutant distribution in an urban canyon. A large single clockwise vortex is generated in the canyon for the vaulted upstream roof at Z H /H = 1/6, 1/3, and 1/2, the trapezoidal and downward wedged roofs at Z H /H = 1/6 and 1/3, and the slanted and upward wedged roofs at Z H /H = 1/6, while a main clockwise vortex and a secondary counterclockwise vortex are established for the trapezoidal and downward wedged roofs at Z H /H = 1/2 and the slanted and upward wedged roofs at Z H /H = 1/3 and 1/2. In the one-vortex flow regime, the clockwise vortex moves upward and grows in size with increasing upstream roof height for the vaulted, trapezoidal, and downward wedged roofs. In the two-vortex flow regime, the size and rotational velocity of both upper clockwise and lower counterclockwise vortices increase with the upstream roof height for the slanted and upward wedged roofs. At Z H /H = 1/6, the pollution levels in the canyon are close among all the upstream roof shapes studied. At Z H /H = 1/3, the pollution levels in the canyon for the upward wedged roof and slanted roof are much higher than those for the vaulted, trapezoidal, and downward wedged roofs. At Z H /H = 1/2, the lowest pollution level appears in the canyon for the vaulted upstream roof, while

  11. High available and fault tolerant mobile communications infrastructure

    DEFF Research Database (Denmark)

    Beiroumi, Mohammad Zib

    2006-01-01

    using rollback or replication techniques inapplicable. This dissertation presents a novel failure recovery approach based on a behavioral model of the communication protocols. The new recovery method is able to deal with software and hardware faults and is particularly suitable for mobile communications...... as it is the case for many recovery techniques. In addition, the method does not require any modification to mobile clients. The Communicating Extended Finite State Machine (CEFSM) is used to model the behavior of the infrastructure applications. The model based recovery scheme is integrated in the application...... and uses the client/server model to save the application state information during failure-free execution on a stable storage and retrieve them when needed during recovery. When and what information to be saved/retrieved is determined by the behavioral model of the application. To practically evaluate...

  12. How to use Big Data technologies to optimize operations in Upstream Petroleum Industry

    Directory of Open Access Journals (Sweden)

    Abdelkader Baaziz

    2013-12-01

    Full Text Available “Big Data is the oil of the new economy” is the most famous citation during the three last years. It has even been adopted by the World Economic Forum in 2011. In fact, Big Data is like crude! It’s valuable, but if unrefined it cannot be used. It must be broken down, analyzed for it to have value. But what about Big Data generated by the Petroleum Industry and particularly its upstream segment? Upstream is no stranger to Big Data. Understanding and leveraging data in the upstream segment enables firms to remain competitive throughout planning, exploration, delineation, and field development.Oil & Gas Companies conduct advanced geophysics modeling and simulation to support operations where 2D, 3D & 4D Seismic generate significant data during exploration phases. They closely monitor the performance of their operational assets. To do this, they use tens of thousands of data-collecting sensors in subsurface wells and surface facilities to provide continuous and real-time monitoring of assets and environmental conditions. Unfortunately, this information comes in various and increasingly complex forms, making it a challenge to collect, interpret, and leverage the disparate data. As an example, Chevron’s internal IT traffic alone exceeds 1.5 terabytes a day.Big Data technologies integrate common and disparate data sets to deliver the right information at the appropriate time to the correct decision-maker. These capabilities help firms act on large volumes of data, transforming decision-making from reactive to proactive and optimizing all phases of exploration, development and production. Furthermore, Big Data offers multiple opportunities to ensure safer, more responsible operations. Another invaluable effect of that would be shared learning.The aim of this paper is to explain how to use Big Data technologies to optimize operations. How can Big Data help experts to decision-making leading the desired outcomes?Keywords:Big Data; Analytics

  13. A computed torque method based attitude control with optimal force distribution for articulated body mobile robots

    International Nuclear Information System (INIS)

    Fukushima, Edwardo F.; Hirose, Shigeo

    2000-01-01

    This paper introduces an attitude control scheme based in optimal force distribution using quadratic programming which minimizes joint energy consumption. This method shares similarities with force distribution for multifingered hands, multiple coordinated manipulators and legged walking robots. In particular, an attitude control scheme was introduced inside the force distribution problem, and successfully implemented for control of the articulated body mobile robot KR-II. This is an actual mobile robot composed of cylindrical segments linked in series by prismatic joints and has a long snake-like appearance. These prismatic joints are force controlled so that each segment's vertical motion can automatically follow the terrain irregularities. An attitude control is necessary because this system acts like a system of wheeled inverted pendulum carts connected in series, being unstable by nature. The validity and effectiveness of the proposed method is verified by computer simulation and experiments with the robot KR-II. (author)

  14. Investigating the Applicability of Upstream Detection Strategy at Pedestrian Signalised Crossings

    Directory of Open Access Journals (Sweden)

    Sitti A Hassan

    2017-10-01

    Full Text Available In the UK, the Puffin crossing has provision to extend pedestrian green time for those who take longer to cross. However, even at such a pedestrian friendly facility, the traffic signal control is usually designed to minimise vehicle delay while providing the crossing facility. This situation is rather contrary to the current policies to encourage walking. It is this inequity that has prompted the need to re-examine the traffic control of signalised crossings to provide more benefit to both pedestrians and vehicles. In this context, this paper explores the possibility of implementing an Upstream Detection strategy at a Puffin crossing to provide a user friendly crossing. The study has been carried out by simulating a mid-block Puffin crossing for various detector distances and a number of combinations of pedestrian and traffic flows. This paper presents the simulation results and recommends the situations at which Upstream Detection would be suitable.

  15. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  16. The giant mottled eel, Anguilla marmorata, uses blue-shifted rod photoreceptors during upstream migration.

    Directory of Open Access Journals (Sweden)

    Feng-Yu Wang

    Full Text Available Catadromous fishes migrate between ocean and freshwater during particular phases of their life cycle. The dramatic environmental changes shape their physiological features, e.g. visual sensitivity, olfactory ability, and salinity tolerance. Anguilla marmorata, a catadromous eel, migrates upstream on dark nights, following the lunar cycle. Such behavior may be correlated with ontogenetic changes in sensory systems. Therefore, this study was designed to identify changes in spectral sensitivity and opsin gene expression of A. marmorata during upstream migration. Microspectrophotometry analysis revealed that the tropical eel possesses a duplex retina with rod and cone photoreceptors. The λmax of rod cells are 493, 489, and 489 nm in glass, yellow, and wild eels, while those of cone cells are 508, and 517 nm in yellow, and wild eels, respectively. Unlike European and American eels, Asian eels exhibited a blue-shifted pattern of rod photoreceptors during upstream migration. Quantitative gene expression analyses of four cloned opsin genes (Rh1f, Rh1d, Rh2, and SWS2 revealed that Rh1f expression is dominant at all three stages, while Rh1d is expressed only in older yellow eel. Furthermore, sequence comparison and protein modeling studies implied that a blue shift in Rh1d opsin may be induced by two known (N83, S292 and four putative (S124, V189, V286, I290 tuning sites adjacent to the retinal binding sites. Finally, expression of blue-shifted Rh1d opsin resulted in a spectral shift in rod photoreceptors. Our observations indicate that the giant mottled eel is color-blind, and its blue-shifted scotopic vision may influence its upstream migration behavior and habitat choice.

  17. Upstream pumping of radial lip seals by tangentially deforming, rough seal surfaces

    NARCIS (Netherlands)

    Bavel, van P.G.M.; Ruijl, T.A.M.; Leeuwen, van H.J.; Muijderman, E.A.

    1996-01-01

    This paper aims at a theoretical explanation of the following two experimental observations of radial lip seals: fluid film formation and upstream pumping action. The origins of these observations are still poorly understood. A hydrodynamic analysis is presented for the fully flooded contact zone of

  18. Smartphone-Based Patients' Activity Recognition by Using a Self-Learning Scheme for Medical Monitoring.

    Science.gov (United States)

    Guo, Junqi; Zhou, Xi; Sun, Yunchuan; Ping, Gong; Zhao, Guoxing; Li, Zhuorong

    2016-06-01

    Smartphone based activity recognition has recently received remarkable attention in various applications of mobile health such as safety monitoring, fitness tracking, and disease prediction. To achieve more accurate and simplified medical monitoring, this paper proposes a self-learning scheme for patients' activity recognition, in which a patient only needs to carry an ordinary smartphone that contains common motion sensors. After the real-time data collection though this smartphone, we preprocess the data using coordinate system transformation to eliminate phone orientation influence. A set of robust and effective features are then extracted from the preprocessed data. Because a patient may inevitably perform various unpredictable activities that have no apriori knowledge in the training dataset, we propose a self-learning activity recognition scheme. The scheme determines whether there are apriori training samples and labeled categories in training pools that well match with unpredictable activity data. If not, it automatically assembles these unpredictable samples into different clusters and gives them new category labels. These clustered samples combined with the acquired new category labels are then merged into the training dataset to reinforce recognition ability of the self-learning model. In experiments, we evaluate our scheme using the data collected from two postoperative patient volunteers, including six labeled daily activities as the initial apriori categories in the training pool. Experimental results demonstrate that the proposed self-learning scheme for activity recognition works very well for most cases. When there exist several types of unseen activities without any apriori information, the accuracy reaches above 80 % after the self-learning process converges.

  19. On the benefits of location-based relay selection in mobile wireless networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2016-01-01

    We consider infrastructure-based mobile networks that are assisted by a single relay transmission where both the downstream destination and relay nodes are mobile. Selecting the optimal transmission path for a destination node requires up-to-date link quality estimates of all relevant links....... If the relay selection is based on link quality measurements, the number of links to update grows quadratically with the number of nodes, and measurements need to be updated frequently when nodes are mobile. In this paper, we consider a location-based relay selection scheme where link qualities are estimated...... from node positions; in the scenario of a node-based location system such as GPS, the location-based approach reduces signaling overhead, which in this case only grows linearly with the number of nodes. This paper studies these two relay selection approaches and investigates how they are affected...

  20. Drift tube measurements of mobilities and longitudinal diffusion coefficients of ions in gases

    International Nuclear Information System (INIS)

    Chelf, R.D.

    1982-01-01

    The zero-field mobilities of Br - and NH 4+ in O 2 were determined as a function of gas temperature in a high pressure drift tube mass spectrometer. The mobilities and longitudinal diffusion coefficients of the ion-gas combinations Br - in Ne and Kr, Li + in Xe, and Tl/ + in Kr and Xe were determined as a function of E/N, where E is the electric field strength and N is the gas number density in a low pressure drift tube mass spectrometer. The measured longitudinal diffusion coefficients were used for a test and comparison of the generalized Einstein relations of Viehland-Mason and Waldman-Mason theories. The measured mobilities of Br - in Kr and Tl/ + in Kr were used in an iterative-inversion scheme from which the ion-neutral interaction potentials were determined